Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/09/2024, 21:44
Static task
static1
Behavioral task
behavioral1
Sample
555ec86ee090a9ab3319ac75746be4e4e0f447e1f07ebf70486768b07a9e4181.exe
Resource
win7-20240903-en
General
-
Target
555ec86ee090a9ab3319ac75746be4e4e0f447e1f07ebf70486768b07a9e4181.exe
-
Size
64KB
-
MD5
6411652fed2bc73d96e797a3d7ab1953
-
SHA1
9dcdadd68388776606e272a952b389904b7abe2f
-
SHA256
555ec86ee090a9ab3319ac75746be4e4e0f447e1f07ebf70486768b07a9e4181
-
SHA512
6977a48ad4c75f2abb8b7ee560c1a3b90618a1ea1ca8d4d14d247f1cc762687ad7ffb9415bc1a0e1bf75be2b005dd678fdc6b098c75dc7cad0ff6e0a98d3b244
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxiT:ymb3NkkiQ3mdBjF0y7kbQ
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
resource yara_rule behavioral1/memory/2964-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2192-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/308-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2428-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/548-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/548-59-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1064-49-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1064-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1624-39-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1624-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2628-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2176-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2944-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/672-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2240-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1796-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2544-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2916-226-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/272-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1100-270-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1064-727-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2192 tnhhtb.exe 308 vpddp.exe 1624 pjppj.exe 1064 ffrrffx.exe 548 hbbbnb.exe 2428 5thbth.exe 2628 vvjvd.exe 2864 pjdjv.exe 2176 9rlrflr.exe 2836 fxlxrfr.exe 2528 9tbhtt.exe 2500 nhbhtt.exe 2944 9vpvd.exe 2524 7rxflxf.exe 672 5btnnb.exe 1916 tnbbbh.exe 2240 llrrfrf.exe 1796 rrlflll.exe 756 tnbntb.exe 1944 dvjvd.exe 2544 rlffrxx.exe 1616 7lrfrxl.exe 2916 9hbnnn.exe 2812 7hhbnt.exe 2780 pjvdv.exe 272 9pdvd.exe 1372 lfxfrxl.exe 1100 1hbhnt.exe 3028 pjvdp.exe 1988 dvjjv.exe 2096 xlfllrf.exe 2972 1xrxrlx.exe 2052 htnnnt.exe 268 hhbhbb.exe 836 dvjjv.exe 1724 pjdpv.exe 1208 ffflrxf.exe 1584 xrllrrf.exe 2084 bthhtb.exe 3008 hhbhhn.exe 2248 vvppd.exe 2736 dvppd.exe 2864 frrrxfr.exe 1816 lxrflfx.exe 2688 3tnthh.exe 2716 nhtntt.exe 2720 jjddp.exe 2980 7vjjp.exe 2604 jdvvp.exe 2940 rlflxxl.exe 1672 rrffrrf.exe 648 7hbhtb.exe 1388 hhhnhh.exe 1272 bbtbtt.exe 1992 pjvvj.exe 1184 3dppd.exe 1972 fxllrrx.exe 1928 btnbnn.exe 1956 bnhbnn.exe 2704 pjvpp.exe 2700 7pjpv.exe 2360 rllxlrf.exe 2800 3hhthn.exe 2828 vpppd.exe -
resource yara_rule behavioral1/memory/2964-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2192-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/308-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/548-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1064-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2944-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/672-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2240-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1796-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2916-226-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/272-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1100-270-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxlfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhntnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vppvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxlxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xlxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbthhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrlxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llflxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fxffrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjpvd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2192 2964 555ec86ee090a9ab3319ac75746be4e4e0f447e1f07ebf70486768b07a9e4181.exe 28 PID 2964 wrote to memory of 2192 2964 555ec86ee090a9ab3319ac75746be4e4e0f447e1f07ebf70486768b07a9e4181.exe 28 PID 2964 wrote to memory of 2192 2964 555ec86ee090a9ab3319ac75746be4e4e0f447e1f07ebf70486768b07a9e4181.exe 28 PID 2964 wrote to memory of 2192 2964 555ec86ee090a9ab3319ac75746be4e4e0f447e1f07ebf70486768b07a9e4181.exe 28 PID 2192 wrote to memory of 308 2192 tnhhtb.exe 29 PID 2192 wrote to memory of 308 2192 tnhhtb.exe 29 PID 2192 wrote to memory of 308 2192 tnhhtb.exe 29 PID 2192 wrote to memory of 308 2192 tnhhtb.exe 29 PID 308 wrote to memory of 1624 308 vpddp.exe 30 PID 308 wrote to memory of 1624 308 vpddp.exe 30 PID 308 wrote to memory of 1624 308 vpddp.exe 30 PID 308 wrote to memory of 1624 308 vpddp.exe 30 PID 1624 wrote to memory of 1064 1624 pjppj.exe 31 PID 1624 wrote to memory of 1064 1624 pjppj.exe 31 PID 1624 wrote to memory of 1064 1624 pjppj.exe 31 PID 1624 wrote to memory of 1064 1624 pjppj.exe 31 PID 1064 wrote to memory of 548 1064 ffrrffx.exe 32 PID 1064 wrote to memory of 548 1064 ffrrffx.exe 32 PID 1064 wrote to memory of 548 1064 ffrrffx.exe 32 PID 1064 wrote to memory of 548 1064 ffrrffx.exe 32 PID 548 wrote to memory of 2428 548 hbbbnb.exe 33 PID 548 wrote to memory of 2428 548 hbbbnb.exe 33 PID 548 wrote to memory of 2428 548 hbbbnb.exe 33 PID 548 wrote to memory of 2428 548 hbbbnb.exe 33 PID 2428 wrote to memory of 2628 2428 5thbth.exe 34 PID 2428 wrote to memory of 2628 2428 5thbth.exe 34 PID 2428 wrote to memory of 2628 2428 5thbth.exe 34 PID 2428 wrote to memory of 2628 2428 5thbth.exe 34 PID 2628 wrote to memory of 2864 2628 vvjvd.exe 35 PID 2628 wrote to memory of 2864 2628 vvjvd.exe 35 PID 2628 wrote to memory of 2864 2628 vvjvd.exe 35 PID 2628 wrote to memory of 2864 2628 vvjvd.exe 35 PID 2864 wrote to memory of 2176 2864 pjdjv.exe 36 PID 2864 wrote to memory of 2176 2864 pjdjv.exe 36 PID 2864 wrote to memory of 2176 2864 pjdjv.exe 36 PID 2864 wrote to memory of 2176 2864 pjdjv.exe 36 PID 2176 wrote to memory of 2836 2176 9rlrflr.exe 37 PID 2176 wrote to memory of 2836 2176 9rlrflr.exe 37 PID 2176 wrote to memory of 2836 2176 9rlrflr.exe 37 PID 2176 wrote to memory of 2836 2176 9rlrflr.exe 37 PID 2836 wrote to memory of 2528 2836 fxlxrfr.exe 38 PID 2836 wrote to memory of 2528 2836 fxlxrfr.exe 38 PID 2836 wrote to memory of 2528 2836 fxlxrfr.exe 38 PID 2836 wrote to memory of 2528 2836 fxlxrfr.exe 38 PID 2528 wrote to memory of 2500 2528 9tbhtt.exe 39 PID 2528 wrote to memory of 2500 2528 9tbhtt.exe 39 PID 2528 wrote to memory of 2500 2528 9tbhtt.exe 39 PID 2528 wrote to memory of 2500 2528 9tbhtt.exe 39 PID 2500 wrote to memory of 2944 2500 nhbhtt.exe 40 PID 2500 wrote to memory of 2944 2500 nhbhtt.exe 40 PID 2500 wrote to memory of 2944 2500 nhbhtt.exe 40 PID 2500 wrote to memory of 2944 2500 nhbhtt.exe 40 PID 2944 wrote to memory of 2524 2944 9vpvd.exe 41 PID 2944 wrote to memory of 2524 2944 9vpvd.exe 41 PID 2944 wrote to memory of 2524 2944 9vpvd.exe 41 PID 2944 wrote to memory of 2524 2944 9vpvd.exe 41 PID 2524 wrote to memory of 672 2524 7rxflxf.exe 42 PID 2524 wrote to memory of 672 2524 7rxflxf.exe 42 PID 2524 wrote to memory of 672 2524 7rxflxf.exe 42 PID 2524 wrote to memory of 672 2524 7rxflxf.exe 42 PID 672 wrote to memory of 1916 672 5btnnb.exe 43 PID 672 wrote to memory of 1916 672 5btnnb.exe 43 PID 672 wrote to memory of 1916 672 5btnnb.exe 43 PID 672 wrote to memory of 1916 672 5btnnb.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\555ec86ee090a9ab3319ac75746be4e4e0f447e1f07ebf70486768b07a9e4181.exe"C:\Users\Admin\AppData\Local\Temp\555ec86ee090a9ab3319ac75746be4e4e0f447e1f07ebf70486768b07a9e4181.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\tnhhtb.exec:\tnhhtb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\vpddp.exec:\vpddp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:308 -
\??\c:\pjppj.exec:\pjppj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\ffrrffx.exec:\ffrrffx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
\??\c:\hbbbnb.exec:\hbbbnb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:548 -
\??\c:\5thbth.exec:\5thbth.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\vvjvd.exec:\vvjvd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
\??\c:\pjdjv.exec:\pjdjv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\9rlrflr.exec:\9rlrflr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\fxlxrfr.exec:\fxlxrfr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\9tbhtt.exec:\9tbhtt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\nhbhtt.exec:\nhbhtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\9vpvd.exec:\9vpvd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\7rxflxf.exec:\7rxflxf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\5btnnb.exec:\5btnnb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
\??\c:\tnbbbh.exec:\tnbbbh.exe17⤵
- Executes dropped EXE
PID:1916 -
\??\c:\llrrfrf.exec:\llrrfrf.exe18⤵
- Executes dropped EXE
PID:2240 -
\??\c:\rrlflll.exec:\rrlflll.exe19⤵
- Executes dropped EXE
PID:1796 -
\??\c:\tnbntb.exec:\tnbntb.exe20⤵
- Executes dropped EXE
PID:756 -
\??\c:\dvjvd.exec:\dvjvd.exe21⤵
- Executes dropped EXE
PID:1944 -
\??\c:\rlffrxx.exec:\rlffrxx.exe22⤵
- Executes dropped EXE
PID:2544 -
\??\c:\7lrfrxl.exec:\7lrfrxl.exe23⤵
- Executes dropped EXE
PID:1616 -
\??\c:\9hbnnn.exec:\9hbnnn.exe24⤵
- Executes dropped EXE
PID:2916 -
\??\c:\7hhbnt.exec:\7hhbnt.exe25⤵
- Executes dropped EXE
PID:2812 -
\??\c:\pjvdv.exec:\pjvdv.exe26⤵
- Executes dropped EXE
PID:2780 -
\??\c:\9pdvd.exec:\9pdvd.exe27⤵
- Executes dropped EXE
PID:272 -
\??\c:\lfxfrxl.exec:\lfxfrxl.exe28⤵
- Executes dropped EXE
PID:1372 -
\??\c:\1hbhnt.exec:\1hbhnt.exe29⤵
- Executes dropped EXE
PID:1100 -
\??\c:\pjvdp.exec:\pjvdp.exe30⤵
- Executes dropped EXE
PID:3028 -
\??\c:\dvjjv.exec:\dvjjv.exe31⤵
- Executes dropped EXE
PID:1988 -
\??\c:\xlfllrf.exec:\xlfllrf.exe32⤵
- Executes dropped EXE
PID:2096 -
\??\c:\1xrxrlx.exec:\1xrxrlx.exe33⤵
- Executes dropped EXE
PID:2972 -
\??\c:\htnnnt.exec:\htnnnt.exe34⤵
- Executes dropped EXE
PID:2052 -
\??\c:\hhbhbb.exec:\hhbhbb.exe35⤵
- Executes dropped EXE
PID:268 -
\??\c:\dvjjv.exec:\dvjjv.exe36⤵
- Executes dropped EXE
PID:836 -
\??\c:\pjdpv.exec:\pjdpv.exe37⤵
- Executes dropped EXE
PID:1724 -
\??\c:\ffflrxf.exec:\ffflrxf.exe38⤵
- Executes dropped EXE
PID:1208 -
\??\c:\xrllrrf.exec:\xrllrrf.exe39⤵
- Executes dropped EXE
PID:1584 -
\??\c:\bthhtb.exec:\bthhtb.exe40⤵
- Executes dropped EXE
PID:2084 -
\??\c:\hhbhhn.exec:\hhbhhn.exe41⤵
- Executes dropped EXE
PID:3008 -
\??\c:\vvppd.exec:\vvppd.exe42⤵
- Executes dropped EXE
PID:2248 -
\??\c:\dvppd.exec:\dvppd.exe43⤵
- Executes dropped EXE
PID:2736 -
\??\c:\frrrxfr.exec:\frrrxfr.exe44⤵
- Executes dropped EXE
PID:2864 -
\??\c:\lxrflfx.exec:\lxrflfx.exe45⤵
- Executes dropped EXE
PID:1816 -
\??\c:\3tnthh.exec:\3tnthh.exe46⤵
- Executes dropped EXE
PID:2688 -
\??\c:\nhtntt.exec:\nhtntt.exe47⤵
- Executes dropped EXE
PID:2716 -
\??\c:\jjddp.exec:\jjddp.exe48⤵
- Executes dropped EXE
PID:2720 -
\??\c:\7vjjp.exec:\7vjjp.exe49⤵
- Executes dropped EXE
PID:2980 -
\??\c:\jdvvp.exec:\jdvvp.exe50⤵
- Executes dropped EXE
PID:2604 -
\??\c:\rlflxxl.exec:\rlflxxl.exe51⤵
- Executes dropped EXE
PID:2940 -
\??\c:\rrffrrf.exec:\rrffrrf.exe52⤵
- Executes dropped EXE
PID:1672 -
\??\c:\7hbhtb.exec:\7hbhtb.exe53⤵
- Executes dropped EXE
PID:648 -
\??\c:\hhhnhh.exec:\hhhnhh.exe54⤵
- Executes dropped EXE
PID:1388 -
\??\c:\bbtbtt.exec:\bbtbtt.exe55⤵
- Executes dropped EXE
PID:1272 -
\??\c:\pjvvj.exec:\pjvvj.exe56⤵
- Executes dropped EXE
PID:1992 -
\??\c:\3dppd.exec:\3dppd.exe57⤵
- Executes dropped EXE
PID:1184 -
\??\c:\fxllrrx.exec:\fxllrrx.exe58⤵
- Executes dropped EXE
PID:1972 -
\??\c:\btnbnn.exec:\btnbnn.exe59⤵
- Executes dropped EXE
PID:1928 -
\??\c:\bnhbnn.exec:\bnhbnn.exe60⤵
- Executes dropped EXE
PID:1956 -
\??\c:\pjvpp.exec:\pjvpp.exe61⤵
- Executes dropped EXE
PID:2704 -
\??\c:\7pjpv.exec:\7pjpv.exe62⤵
- Executes dropped EXE
PID:2700 -
\??\c:\rllxlrf.exec:\rllxlrf.exe63⤵
- Executes dropped EXE
PID:2360 -
\??\c:\3hhthn.exec:\3hhthn.exe64⤵
- Executes dropped EXE
PID:2800 -
\??\c:\vpppd.exec:\vpppd.exe65⤵
- Executes dropped EXE
PID:2828 -
\??\c:\5vpvv.exec:\5vpvv.exe66⤵PID:912
-
\??\c:\dvdjv.exec:\dvdjv.exe67⤵PID:1132
-
\??\c:\xrxrflf.exec:\xrxrflf.exe68⤵PID:1712
-
\??\c:\xrlrxfl.exec:\xrlrxfl.exe69⤵PID:2420
-
\??\c:\1btbhh.exec:\1btbhh.exe70⤵PID:1664
-
\??\c:\tbhhbn.exec:\tbhhbn.exe71⤵PID:2888
-
\??\c:\nhbhtn.exec:\nhbhtn.exe72⤵PID:352
-
\??\c:\vpdjp.exec:\vpdjp.exe73⤵PID:2188
-
\??\c:\rfrlflx.exec:\rfrlflx.exe74⤵PID:2996
-
\??\c:\fxlrxlx.exec:\fxlrxlx.exe75⤵PID:2080
-
\??\c:\xrlxrxr.exec:\xrlxrxr.exe76⤵PID:2900
-
\??\c:\nnhntt.exec:\nnhntt.exe77⤵PID:2848
-
\??\c:\bnnhht.exec:\bnnhht.exe78⤵PID:2104
-
\??\c:\jdppp.exec:\jdppp.exe79⤵PID:2056
-
\??\c:\jpppp.exec:\jpppp.exe80⤵PID:1588
-
\??\c:\xrfrfrl.exec:\xrfrfrl.exe81⤵PID:1080
-
\??\c:\9rflrfx.exec:\9rflrfx.exe82⤵PID:384
-
\??\c:\ttbnth.exec:\ttbnth.exe83⤵PID:2328
-
\??\c:\btbbhh.exec:\btbbhh.exe84⤵PID:1776
-
\??\c:\1jjvj.exec:\1jjvj.exe85⤵PID:1808
-
\??\c:\jvpvj.exec:\jvpvj.exe86⤵PID:2644
-
\??\c:\rrrrffr.exec:\rrrrffr.exe87⤵PID:1696
-
\??\c:\3xrxxxl.exec:\3xrxxxl.exe88⤵PID:2504
-
\??\c:\lfrlrfr.exec:\lfrlrfr.exe89⤵PID:2712
-
\??\c:\thtthn.exec:\thtthn.exe90⤵PID:2680
-
\??\c:\tnnntt.exec:\tnnntt.exe91⤵PID:2556
-
\??\c:\vpjpd.exec:\vpjpd.exe92⤵PID:2492
-
\??\c:\dpddj.exec:\dpddj.exe93⤵PID:2656
-
\??\c:\lfrrfll.exec:\lfrrfll.exe94⤵PID:2652
-
\??\c:\7llrxxr.exec:\7llrxxr.exe95⤵PID:2444
-
\??\c:\3tttbh.exec:\3tttbh.exe96⤵PID:672
-
\??\c:\nhtthb.exec:\nhtthb.exe97⤵PID:1772
-
\??\c:\jdpdd.exec:\jdpdd.exe98⤵PID:1792
-
\??\c:\7pdvd.exec:\7pdvd.exe99⤵PID:2036
-
\??\c:\xrlfxfl.exec:\xrlfxfl.exe100⤵PID:2424
-
\??\c:\lrxlrff.exec:\lrxlrff.exe101⤵PID:756
-
\??\c:\tnhhtn.exec:\tnhhtn.exe102⤵PID:2584
-
\??\c:\nhtbhh.exec:\nhtbhh.exe103⤵PID:2796
-
\??\c:\vpjjp.exec:\vpjjp.exe104⤵PID:2932
-
\??\c:\pjvdj.exec:\pjvdj.exe105⤵PID:2336
-
\??\c:\rlrrffr.exec:\rlrrffr.exe106⤵PID:3044
-
\??\c:\rrrlxxl.exec:\rrrlxxl.exe107⤵PID:928
-
\??\c:\7bntbn.exec:\7bntbn.exe108⤵PID:1516
-
\??\c:\3bhtbb.exec:\3bhtbb.exe109⤵PID:1656
-
\??\c:\hbtbhn.exec:\hbtbhn.exe110⤵PID:896
-
\??\c:\ppjvp.exec:\ppjvp.exe111⤵PID:564
-
\??\c:\7dvvd.exec:\7dvvd.exe112⤵PID:1844
-
\??\c:\xrrrxrf.exec:\xrrrxrf.exe113⤵PID:780
-
\??\c:\llflxxx.exec:\llflxxx.exe114⤵PID:1612
-
\??\c:\nhtbhh.exec:\nhtbhh.exe115⤵PID:2908
-
\??\c:\hbhbnn.exec:\hbhbnn.exe116⤵PID:2288
-
\??\c:\nhttbh.exec:\nhttbh.exe117⤵PID:2400
-
\??\c:\jdddj.exec:\jdddj.exe118⤵PID:2440
-
\??\c:\dvvpv.exec:\dvvpv.exe119⤵PID:2108
-
\??\c:\rlxfxfr.exec:\rlxfxfr.exe120⤵PID:2564
-
\??\c:\1lffllx.exec:\1lffllx.exe121⤵PID:2408
-
\??\c:\nhbhtt.exec:\nhbhtt.exe122⤵PID:1208
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-