Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 15:08
Static task
static1
Behavioral task
behavioral1
Sample
99af7873f0df3f7d6dc9bfec3895259b554755c6e479ea8ac448fccde1b83da4N.exe
Resource
win7-20240903-en
General
-
Target
99af7873f0df3f7d6dc9bfec3895259b554755c6e479ea8ac448fccde1b83da4N.exe
-
Size
72KB
-
MD5
0eb6da3ab12da2004224e2979d5ff0d0
-
SHA1
c13bbf22ce0e5f046a87d489f33e2d74dd507623
-
SHA256
99af7873f0df3f7d6dc9bfec3895259b554755c6e479ea8ac448fccde1b83da4
-
SHA512
f0fd27f65e01d2bf0dae924b39e7151c31c1b345790cfa83977376eea361b687785e383db9f5c6e15a4df99f68425a97ab73a01957570029a7796b4ea1313447
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfjP:ymb3NkkiQ3mdBjFI4V/
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral1/memory/2964-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-7-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2056-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3068-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1956-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2792-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2792-71-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1956-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1232-40-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1232-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2668-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2768-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2768-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2252-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/680-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1788-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1168-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1832-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1324-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/376-221-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-265-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2124-283-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2056 fxlrlxr.exe 3068 1bnnnb.exe 1232 vvvjd.exe 1956 lxrllrx.exe 2828 lfrrffl.exe 2792 5tthtb.exe 2896 hnbbhh.exe 2768 rrrffxr.exe 2668 nhnntb.exe 2252 tnhhnn.exe 680 pdvdd.exe 524 3fllfxl.exe 1788 lfrlflr.exe 1268 hhhbtn.exe 1168 nhtbht.exe 1832 9vvjv.exe 1376 jjjvd.exe 1324 rlllrxl.exe 2700 bbbhnt.exe 2200 ttnbbb.exe 2432 jddjp.exe 376 pdvdj.exe 2080 9fxlxfr.exe 1520 tbhnbh.exe 940 pjjjp.exe 1608 vpdvj.exe 2516 ffrxlfr.exe 1864 hhbhbn.exe 2124 vjvdd.exe 896 rlflrxl.exe 2324 lfrxflr.exe 1952 btbbtt.exe 2508 nhthhn.exe 2120 pppvd.exe 2788 ffflflr.exe 1564 nhbnht.exe 2880 tnbnht.exe 2736 ddvdp.exe 2760 3jpvp.exe 2204 rlxfrxx.exe 2892 llflrff.exe 2660 ttbhtt.exe 2648 hhhnth.exe 2724 ddpdv.exe 2096 1rfrxrf.exe 1552 xfxrrlx.exe 784 7nhhnt.exe 108 hbtbhn.exe 904 jjpdp.exe 696 fxfxlrx.exe 1084 fxxlxrf.exe 1352 bbthtt.exe 1832 tnhnnt.exe 1040 vjdjp.exe 2780 vpjpv.exe 2084 dpdjv.exe 2404 lfrrffr.exe 2424 xlxxlrx.exe 1576 9tnhtb.exe 876 ttnthh.exe 1704 1dpdp.exe 1316 vpdvp.exe 1988 fflrrrf.exe 1000 rxrfrll.exe -
resource yara_rule behavioral1/memory/2964-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3068-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1956-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2792-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1956-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1232-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2252-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/680-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1788-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1168-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1832-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1324-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/376-221-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-265-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2124-283-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllffff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxffrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhttbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fllfrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fxfrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bttbbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2056 2964 99af7873f0df3f7d6dc9bfec3895259b554755c6e479ea8ac448fccde1b83da4N.exe 30 PID 2964 wrote to memory of 2056 2964 99af7873f0df3f7d6dc9bfec3895259b554755c6e479ea8ac448fccde1b83da4N.exe 30 PID 2964 wrote to memory of 2056 2964 99af7873f0df3f7d6dc9bfec3895259b554755c6e479ea8ac448fccde1b83da4N.exe 30 PID 2964 wrote to memory of 2056 2964 99af7873f0df3f7d6dc9bfec3895259b554755c6e479ea8ac448fccde1b83da4N.exe 30 PID 2056 wrote to memory of 3068 2056 fxlrlxr.exe 31 PID 2056 wrote to memory of 3068 2056 fxlrlxr.exe 31 PID 2056 wrote to memory of 3068 2056 fxlrlxr.exe 31 PID 2056 wrote to memory of 3068 2056 fxlrlxr.exe 31 PID 3068 wrote to memory of 1232 3068 1bnnnb.exe 32 PID 3068 wrote to memory of 1232 3068 1bnnnb.exe 32 PID 3068 wrote to memory of 1232 3068 1bnnnb.exe 32 PID 3068 wrote to memory of 1232 3068 1bnnnb.exe 32 PID 1232 wrote to memory of 1956 1232 vvvjd.exe 33 PID 1232 wrote to memory of 1956 1232 vvvjd.exe 33 PID 1232 wrote to memory of 1956 1232 vvvjd.exe 33 PID 1232 wrote to memory of 1956 1232 vvvjd.exe 33 PID 1956 wrote to memory of 2828 1956 lxrllrx.exe 34 PID 1956 wrote to memory of 2828 1956 lxrllrx.exe 34 PID 1956 wrote to memory of 2828 1956 lxrllrx.exe 34 PID 1956 wrote to memory of 2828 1956 lxrllrx.exe 34 PID 2828 wrote to memory of 2792 2828 lfrrffl.exe 35 PID 2828 wrote to memory of 2792 2828 lfrrffl.exe 35 PID 2828 wrote to memory of 2792 2828 lfrrffl.exe 35 PID 2828 wrote to memory of 2792 2828 lfrrffl.exe 35 PID 2792 wrote to memory of 2896 2792 5tthtb.exe 36 PID 2792 wrote to memory of 2896 2792 5tthtb.exe 36 PID 2792 wrote to memory of 2896 2792 5tthtb.exe 36 PID 2792 wrote to memory of 2896 2792 5tthtb.exe 36 PID 2896 wrote to memory of 2768 2896 hnbbhh.exe 37 PID 2896 wrote to memory of 2768 2896 hnbbhh.exe 37 PID 2896 wrote to memory of 2768 2896 hnbbhh.exe 37 PID 2896 wrote to memory of 2768 2896 hnbbhh.exe 37 PID 2768 wrote to memory of 2668 2768 rrrffxr.exe 38 PID 2768 wrote to memory of 2668 2768 rrrffxr.exe 38 PID 2768 wrote to memory of 2668 2768 rrrffxr.exe 38 PID 2768 wrote to memory of 2668 2768 rrrffxr.exe 38 PID 2668 wrote to memory of 2252 2668 nhnntb.exe 39 PID 2668 wrote to memory of 2252 2668 nhnntb.exe 39 PID 2668 wrote to memory of 2252 2668 nhnntb.exe 39 PID 2668 wrote to memory of 2252 2668 nhnntb.exe 39 PID 2252 wrote to memory of 680 2252 tnhhnn.exe 40 PID 2252 wrote to memory of 680 2252 tnhhnn.exe 40 PID 2252 wrote to memory of 680 2252 tnhhnn.exe 40 PID 2252 wrote to memory of 680 2252 tnhhnn.exe 40 PID 680 wrote to memory of 524 680 pdvdd.exe 41 PID 680 wrote to memory of 524 680 pdvdd.exe 41 PID 680 wrote to memory of 524 680 pdvdd.exe 41 PID 680 wrote to memory of 524 680 pdvdd.exe 41 PID 524 wrote to memory of 1788 524 3fllfxl.exe 42 PID 524 wrote to memory of 1788 524 3fllfxl.exe 42 PID 524 wrote to memory of 1788 524 3fllfxl.exe 42 PID 524 wrote to memory of 1788 524 3fllfxl.exe 42 PID 1788 wrote to memory of 1268 1788 lfrlflr.exe 43 PID 1788 wrote to memory of 1268 1788 lfrlflr.exe 43 PID 1788 wrote to memory of 1268 1788 lfrlflr.exe 43 PID 1788 wrote to memory of 1268 1788 lfrlflr.exe 43 PID 1268 wrote to memory of 1168 1268 hhhbtn.exe 44 PID 1268 wrote to memory of 1168 1268 hhhbtn.exe 44 PID 1268 wrote to memory of 1168 1268 hhhbtn.exe 44 PID 1268 wrote to memory of 1168 1268 hhhbtn.exe 44 PID 1168 wrote to memory of 1832 1168 nhtbht.exe 45 PID 1168 wrote to memory of 1832 1168 nhtbht.exe 45 PID 1168 wrote to memory of 1832 1168 nhtbht.exe 45 PID 1168 wrote to memory of 1832 1168 nhtbht.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\99af7873f0df3f7d6dc9bfec3895259b554755c6e479ea8ac448fccde1b83da4N.exe"C:\Users\Admin\AppData\Local\Temp\99af7873f0df3f7d6dc9bfec3895259b554755c6e479ea8ac448fccde1b83da4N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\fxlrlxr.exec:\fxlrlxr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
\??\c:\1bnnnb.exec:\1bnnnb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\vvvjd.exec:\vvvjd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
\??\c:\lxrllrx.exec:\lxrllrx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\lfrrffl.exec:\lfrrffl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\5tthtb.exec:\5tthtb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\hnbbhh.exec:\hnbbhh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\rrrffxr.exec:\rrrffxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\nhnntb.exec:\nhnntb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\tnhhnn.exec:\tnhhnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\pdvdd.exec:\pdvdd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
\??\c:\3fllfxl.exec:\3fllfxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:524 -
\??\c:\lfrlflr.exec:\lfrlflr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\hhhbtn.exec:\hhhbtn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
\??\c:\nhtbht.exec:\nhtbht.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\9vvjv.exec:\9vvjv.exe17⤵
- Executes dropped EXE
PID:1832 -
\??\c:\jjjvd.exec:\jjjvd.exe18⤵
- Executes dropped EXE
PID:1376 -
\??\c:\rlllrxl.exec:\rlllrxl.exe19⤵
- Executes dropped EXE
PID:1324 -
\??\c:\bbbhnt.exec:\bbbhnt.exe20⤵
- Executes dropped EXE
PID:2700 -
\??\c:\ttnbbb.exec:\ttnbbb.exe21⤵
- Executes dropped EXE
PID:2200 -
\??\c:\jddjp.exec:\jddjp.exe22⤵
- Executes dropped EXE
PID:2432 -
\??\c:\pdvdj.exec:\pdvdj.exe23⤵
- Executes dropped EXE
PID:376 -
\??\c:\9fxlxfr.exec:\9fxlxfr.exe24⤵
- Executes dropped EXE
PID:2080 -
\??\c:\tbhnbh.exec:\tbhnbh.exe25⤵
- Executes dropped EXE
PID:1520 -
\??\c:\pjjjp.exec:\pjjjp.exe26⤵
- Executes dropped EXE
PID:940 -
\??\c:\vpdvj.exec:\vpdvj.exe27⤵
- Executes dropped EXE
PID:1608 -
\??\c:\ffrxlfr.exec:\ffrxlfr.exe28⤵
- Executes dropped EXE
PID:2516 -
\??\c:\hhbhbn.exec:\hhbhbn.exe29⤵
- Executes dropped EXE
PID:1864 -
\??\c:\vjvdd.exec:\vjvdd.exe30⤵
- Executes dropped EXE
PID:2124 -
\??\c:\rlflrxl.exec:\rlflrxl.exe31⤵
- Executes dropped EXE
PID:896 -
\??\c:\lfrxflr.exec:\lfrxflr.exe32⤵
- Executes dropped EXE
PID:2324 -
\??\c:\btbbtt.exec:\btbbtt.exe33⤵
- Executes dropped EXE
PID:1952 -
\??\c:\nhthhn.exec:\nhthhn.exe34⤵
- Executes dropped EXE
PID:2508 -
\??\c:\pppvd.exec:\pppvd.exe35⤵
- Executes dropped EXE
PID:2120 -
\??\c:\ffflflr.exec:\ffflflr.exe36⤵
- Executes dropped EXE
PID:2788 -
\??\c:\nhbnht.exec:\nhbnht.exe37⤵
- Executes dropped EXE
PID:1564 -
\??\c:\tnbnht.exec:\tnbnht.exe38⤵
- Executes dropped EXE
PID:2880 -
\??\c:\ddvdp.exec:\ddvdp.exe39⤵
- Executes dropped EXE
PID:2736 -
\??\c:\3jpvp.exec:\3jpvp.exe40⤵
- Executes dropped EXE
PID:2760 -
\??\c:\rlxfrxx.exec:\rlxfrxx.exe41⤵
- Executes dropped EXE
PID:2204 -
\??\c:\llflrff.exec:\llflrff.exe42⤵
- Executes dropped EXE
PID:2892 -
\??\c:\ttbhtt.exec:\ttbhtt.exe43⤵
- Executes dropped EXE
PID:2660 -
\??\c:\hhhnth.exec:\hhhnth.exe44⤵
- Executes dropped EXE
PID:2648 -
\??\c:\ddpdv.exec:\ddpdv.exe45⤵
- Executes dropped EXE
PID:2724 -
\??\c:\1rfrxrf.exec:\1rfrxrf.exe46⤵
- Executes dropped EXE
PID:2096 -
\??\c:\xfxrrlx.exec:\xfxrrlx.exe47⤵
- Executes dropped EXE
PID:1552 -
\??\c:\7nhhnt.exec:\7nhhnt.exe48⤵
- Executes dropped EXE
PID:784 -
\??\c:\hbtbhn.exec:\hbtbhn.exe49⤵
- Executes dropped EXE
PID:108 -
\??\c:\jjpdp.exec:\jjpdp.exe50⤵
- Executes dropped EXE
PID:904 -
\??\c:\fxfxlrx.exec:\fxfxlrx.exe51⤵
- Executes dropped EXE
PID:696 -
\??\c:\fxxlxrf.exec:\fxxlxrf.exe52⤵
- Executes dropped EXE
PID:1084 -
\??\c:\bbthtt.exec:\bbthtt.exe53⤵
- Executes dropped EXE
PID:1352 -
\??\c:\tnhnnt.exec:\tnhnnt.exe54⤵
- Executes dropped EXE
PID:1832 -
\??\c:\vjdjp.exec:\vjdjp.exe55⤵
- Executes dropped EXE
PID:1040 -
\??\c:\vpjpv.exec:\vpjpv.exe56⤵
- Executes dropped EXE
PID:2780 -
\??\c:\dpdjv.exec:\dpdjv.exe57⤵
- Executes dropped EXE
PID:2084 -
\??\c:\lfrrffr.exec:\lfrrffr.exe58⤵
- Executes dropped EXE
PID:2404 -
\??\c:\xlxxlrx.exec:\xlxxlrx.exe59⤵
- Executes dropped EXE
PID:2424 -
\??\c:\9tnhtb.exec:\9tnhtb.exe60⤵
- Executes dropped EXE
PID:1576 -
\??\c:\ttnthh.exec:\ttnthh.exe61⤵
- Executes dropped EXE
PID:876 -
\??\c:\1dpdp.exec:\1dpdp.exe62⤵
- Executes dropped EXE
PID:1704 -
\??\c:\vpdvp.exec:\vpdvp.exe63⤵
- Executes dropped EXE
PID:1316 -
\??\c:\fflrrrf.exec:\fflrrrf.exe64⤵
- Executes dropped EXE
PID:1988 -
\??\c:\rxrfrll.exec:\rxrfrll.exe65⤵
- Executes dropped EXE
PID:1000 -
\??\c:\nhtthh.exec:\nhtthh.exe66⤵PID:1036
-
\??\c:\ththtt.exec:\ththtt.exe67⤵PID:2520
-
\??\c:\dvjjv.exec:\dvjjv.exe68⤵PID:2228
-
\??\c:\jddjv.exec:\jddjv.exe69⤵PID:1864
-
\??\c:\xxrxrxl.exec:\xxrxrxl.exe70⤵PID:1648
-
\??\c:\rlrxlxl.exec:\rlrxlxl.exe71⤵PID:2420
-
\??\c:\nnbntt.exec:\nnbntt.exe72⤵PID:1908
-
\??\c:\1hhthh.exec:\1hhthh.exe73⤵PID:2408
-
\??\c:\vpjpv.exec:\vpjpv.exe74⤵PID:772
-
\??\c:\7vdjd.exec:\7vdjd.exe75⤵PID:1712
-
\??\c:\rllxfrf.exec:\rllxfrf.exe76⤵PID:2904
-
\??\c:\xrlffxf.exec:\xrlffxf.exe77⤵PID:1580
-
\??\c:\xrlxfrf.exec:\xrlxfrf.exe78⤵PID:1956
-
\??\c:\nnbhbt.exec:\nnbhbt.exe79⤵PID:2976
-
\??\c:\hhbbtt.exec:\hhbbtt.exe80⤵PID:2888
-
\??\c:\3vpvj.exec:\3vpvj.exe81⤵PID:2800
-
\??\c:\3ddpd.exec:\3ddpd.exe82⤵PID:2332
-
\??\c:\rllfxfl.exec:\rllfxfl.exe83⤵PID:2856
-
\??\c:\9xrlxxl.exec:\9xrlxxl.exe84⤵PID:2604
-
\??\c:\tbthbb.exec:\tbthbb.exe85⤵PID:1828
-
\??\c:\hbbnnt.exec:\hbbnnt.exe86⤵PID:1968
-
\??\c:\vjvvj.exec:\vjvvj.exe87⤵PID:2364
-
\??\c:\jdvvd.exec:\jdvvd.exe88⤵PID:1088
-
\??\c:\1lllflx.exec:\1lllflx.exe89⤵PID:1172
-
\??\c:\rrllrlx.exec:\rrllrlx.exe90⤵PID:2372
-
\??\c:\bthtbt.exec:\bthtbt.exe91⤵PID:2844
-
\??\c:\tnbhbb.exec:\tnbhbb.exe92⤵PID:1412
-
\??\c:\hhhnnh.exec:\hhhnnh.exe93⤵PID:2368
-
\??\c:\5dvjp.exec:\5dvjp.exe94⤵PID:2664
-
\??\c:\ddvdd.exec:\ddvdd.exe95⤵PID:1792
-
\??\c:\llfxflr.exec:\llfxflr.exe96⤵PID:1376
-
\??\c:\xrffxfx.exec:\xrffxfx.exe97⤵PID:1496
-
\??\c:\tththn.exec:\tththn.exe98⤵PID:2084
-
\??\c:\tthnnt.exec:\tthnnt.exe99⤵PID:572
-
\??\c:\vdppj.exec:\vdppj.exe100⤵PID:3044
-
\??\c:\jjdpd.exec:\jjdpd.exe101⤵PID:2072
-
\??\c:\ffxlxfl.exec:\ffxlxfl.exe102⤵PID:2992
-
\??\c:\rlllllx.exec:\rlllllx.exe103⤵PID:2320
-
\??\c:\bthnbh.exec:\bthnbh.exe104⤵PID:1904
-
\??\c:\hbtbhh.exec:\hbtbhh.exe105⤵PID:800
-
\??\c:\jvjpv.exec:\jvjpv.exe106⤵PID:2192
-
\??\c:\pjvdj.exec:\pjvdj.exe107⤵PID:2968
-
\??\c:\fxrrxxl.exec:\fxrrxxl.exe108⤵PID:2436
-
\??\c:\frlxlrx.exec:\frlxlrx.exe109⤵PID:1856
-
\??\c:\hbtbhn.exec:\hbtbhn.exe110⤵PID:1852
-
\??\c:\5btbhh.exec:\5btbhh.exe111⤵PID:2548
-
\??\c:\3dvpj.exec:\3dvpj.exe112⤵PID:2356
-
\??\c:\vppvj.exec:\vppvj.exe113⤵PID:1996
-
\??\c:\xxllrrf.exec:\xxllrrf.exe114⤵PID:1952
-
\??\c:\fxrlxrf.exec:\fxrlxrf.exe115⤵PID:3068
-
\??\c:\btbhhn.exec:\btbhhn.exe116⤵PID:2120
-
\??\c:\9tbbnt.exec:\9tbbnt.exe117⤵PID:2748
-
\??\c:\7hbhtt.exec:\7hbhtt.exe118⤵PID:2956
-
\??\c:\3dppj.exec:\3dppj.exe119⤵PID:2792
-
\??\c:\pjvdv.exec:\pjvdv.exe120⤵PID:2736
-
\??\c:\5rflrrf.exec:\5rflrrf.exe121⤵PID:2632
-
\??\c:\7rflxfr.exec:\7rflxfr.exe122⤵PID:2820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-