Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 02:57
Static task
static1
Behavioral task
behavioral1
Sample
765e7940e30473f76c0ed2cb8eb1604447f64ce4cc7528afd5fa19bc5f4091baN.exe
Resource
win7-20240903-en
General
-
Target
765e7940e30473f76c0ed2cb8eb1604447f64ce4cc7528afd5fa19bc5f4091baN.exe
-
Size
83KB
-
MD5
53ba38a37b6381e2ff8d282025783d10
-
SHA1
eeb7079c29be0c453cf6259c5d8c0843276c4921
-
SHA256
765e7940e30473f76c0ed2cb8eb1604447f64ce4cc7528afd5fa19bc5f4091ba
-
SHA512
11f8f1d21cd2e5a1fc3a6a89a09a85e6415178d244d2e942046a20d2fe93ea69996cb4379fee26bab337c5347314bb7717ca0767049be8173a6aef498d138081
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89QF:ymb3NkkiQ3mdBjFIIp9L9QrrA8Q
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2132-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2768-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2852-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2568-39-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2568-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2924-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1232-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2212-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/888-272-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1768-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2792-226-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3016-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2992-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2716-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2164-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1520-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1980-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/540-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2548-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2768 xrfflfr.exe 2852 nhthnt.exe 2568 ppjpj.exe 2680 jvdjv.exe 2548 9xlflxl.exe 2924 9thhbb.exe 540 1hbnhn.exe 2392 lfrrflx.exe 1484 frrxxfr.exe 1980 bbtbnb.exe 1520 3hbbnt.exe 1232 dvppp.exe 1000 pjvvd.exe 1936 rflfrrx.exe 2164 3rrrxrx.exe 2716 nhttbb.exe 2212 tnbhbn.exe 2992 jpdvp.exe 3016 9jjjp.exe 1660 llfrxxf.exe 772 1lfrxxl.exe 2792 rlflxxl.exe 1740 tnnbnn.exe 2336 nhbbhb.exe 1768 dvvdv.exe 2188 pdpvv.exe 888 1jjjd.exe 1752 lfxffrf.exe 108 3rllrxf.exe 2132 hhbnbh.exe 1044 hthnbb.exe 2688 7dppp.exe 2816 vpvpd.exe 2580 1vjjd.exe 2468 fxrrxxl.exe 2680 rllrflx.exe 2548 9xrxffr.exe 1648 ttntht.exe 2832 7nhhtb.exe 2704 btnbnn.exe 1632 pjdjp.exe 1612 dpvdj.exe 1636 dvpdj.exe 2172 xxrlxfr.exe 1992 rlxflrf.exe 348 xrfflxf.exe 1704 ffflxfl.exe 864 btbhnn.exe 2512 bthbbn.exe 1700 3nhhnn.exe 2940 vvppd.exe 2248 1dpdj.exe 444 xrllxxl.exe 2988 5tnhbb.exe 1148 hbbtbb.exe 652 pdppv.exe 1112 fxlrrxx.exe 2496 nhnnnt.exe 3048 1nnntb.exe 1560 7ppvp.exe 916 frxxlrx.exe 1788 5hhntb.exe 1004 vpppd.exe 352 pjvvv.exe -
resource yara_rule behavioral1/memory/2132-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/540-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1232-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2212-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/888-272-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1768-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2792-226-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3016-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2164-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1520-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1980-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/540-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/540-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-63-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1thnnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxlrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xllffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nhnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1thhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbtnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxllrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrfrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7xrlxxf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2768 2132 765e7940e30473f76c0ed2cb8eb1604447f64ce4cc7528afd5fa19bc5f4091baN.exe 30 PID 2132 wrote to memory of 2768 2132 765e7940e30473f76c0ed2cb8eb1604447f64ce4cc7528afd5fa19bc5f4091baN.exe 30 PID 2132 wrote to memory of 2768 2132 765e7940e30473f76c0ed2cb8eb1604447f64ce4cc7528afd5fa19bc5f4091baN.exe 30 PID 2132 wrote to memory of 2768 2132 765e7940e30473f76c0ed2cb8eb1604447f64ce4cc7528afd5fa19bc5f4091baN.exe 30 PID 2768 wrote to memory of 2852 2768 xrfflfr.exe 31 PID 2768 wrote to memory of 2852 2768 xrfflfr.exe 31 PID 2768 wrote to memory of 2852 2768 xrfflfr.exe 31 PID 2768 wrote to memory of 2852 2768 xrfflfr.exe 31 PID 2852 wrote to memory of 2568 2852 nhthnt.exe 32 PID 2852 wrote to memory of 2568 2852 nhthnt.exe 32 PID 2852 wrote to memory of 2568 2852 nhthnt.exe 32 PID 2852 wrote to memory of 2568 2852 nhthnt.exe 32 PID 2568 wrote to memory of 2680 2568 ppjpj.exe 65 PID 2568 wrote to memory of 2680 2568 ppjpj.exe 65 PID 2568 wrote to memory of 2680 2568 ppjpj.exe 65 PID 2568 wrote to memory of 2680 2568 ppjpj.exe 65 PID 2680 wrote to memory of 2548 2680 jvdjv.exe 66 PID 2680 wrote to memory of 2548 2680 jvdjv.exe 66 PID 2680 wrote to memory of 2548 2680 jvdjv.exe 66 PID 2680 wrote to memory of 2548 2680 jvdjv.exe 66 PID 2548 wrote to memory of 2924 2548 9xlflxl.exe 35 PID 2548 wrote to memory of 2924 2548 9xlflxl.exe 35 PID 2548 wrote to memory of 2924 2548 9xlflxl.exe 35 PID 2548 wrote to memory of 2924 2548 9xlflxl.exe 35 PID 2924 wrote to memory of 540 2924 9thhbb.exe 36 PID 2924 wrote to memory of 540 2924 9thhbb.exe 36 PID 2924 wrote to memory of 540 2924 9thhbb.exe 36 PID 2924 wrote to memory of 540 2924 9thhbb.exe 36 PID 540 wrote to memory of 2392 540 1hbnhn.exe 37 PID 540 wrote to memory of 2392 540 1hbnhn.exe 37 PID 540 wrote to memory of 2392 540 1hbnhn.exe 37 PID 540 wrote to memory of 2392 540 1hbnhn.exe 37 PID 2392 wrote to memory of 1484 2392 lfrrflx.exe 38 PID 2392 wrote to memory of 1484 2392 lfrrflx.exe 38 PID 2392 wrote to memory of 1484 2392 lfrrflx.exe 38 PID 2392 wrote to memory of 1484 2392 lfrrflx.exe 38 PID 1484 wrote to memory of 1980 1484 frrxxfr.exe 39 PID 1484 wrote to memory of 1980 1484 frrxxfr.exe 39 PID 1484 wrote to memory of 1980 1484 frrxxfr.exe 39 PID 1484 wrote to memory of 1980 1484 frrxxfr.exe 39 PID 1980 wrote to memory of 1520 1980 bbtbnb.exe 40 PID 1980 wrote to memory of 1520 1980 bbtbnb.exe 40 PID 1980 wrote to memory of 1520 1980 bbtbnb.exe 40 PID 1980 wrote to memory of 1520 1980 bbtbnb.exe 40 PID 1520 wrote to memory of 1232 1520 3hbbnt.exe 41 PID 1520 wrote to memory of 1232 1520 3hbbnt.exe 41 PID 1520 wrote to memory of 1232 1520 3hbbnt.exe 41 PID 1520 wrote to memory of 1232 1520 3hbbnt.exe 41 PID 1232 wrote to memory of 1000 1232 dvppp.exe 42 PID 1232 wrote to memory of 1000 1232 dvppp.exe 42 PID 1232 wrote to memory of 1000 1232 dvppp.exe 42 PID 1232 wrote to memory of 1000 1232 dvppp.exe 42 PID 1000 wrote to memory of 1936 1000 pjvvd.exe 43 PID 1000 wrote to memory of 1936 1000 pjvvd.exe 43 PID 1000 wrote to memory of 1936 1000 pjvvd.exe 43 PID 1000 wrote to memory of 1936 1000 pjvvd.exe 43 PID 1936 wrote to memory of 2164 1936 rflfrrx.exe 44 PID 1936 wrote to memory of 2164 1936 rflfrrx.exe 44 PID 1936 wrote to memory of 2164 1936 rflfrrx.exe 44 PID 1936 wrote to memory of 2164 1936 rflfrrx.exe 44 PID 2164 wrote to memory of 2716 2164 3rrrxrx.exe 45 PID 2164 wrote to memory of 2716 2164 3rrrxrx.exe 45 PID 2164 wrote to memory of 2716 2164 3rrrxrx.exe 45 PID 2164 wrote to memory of 2716 2164 3rrrxrx.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\765e7940e30473f76c0ed2cb8eb1604447f64ce4cc7528afd5fa19bc5f4091baN.exe"C:\Users\Admin\AppData\Local\Temp\765e7940e30473f76c0ed2cb8eb1604447f64ce4cc7528afd5fa19bc5f4091baN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
\??\c:\xrfflfr.exec:\xrfflfr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\nhthnt.exec:\nhthnt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\ppjpj.exec:\ppjpj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\jvdjv.exec:\jvdjv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\9xlflxl.exec:\9xlflxl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\9thhbb.exec:\9thhbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\1hbnhn.exec:\1hbnhn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540 -
\??\c:\lfrrflx.exec:\lfrrflx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\frrxxfr.exec:\frrxxfr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
\??\c:\bbtbnb.exec:\bbtbnb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
\??\c:\3hbbnt.exec:\3hbbnt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\dvppp.exec:\dvppp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
\??\c:\pjvvd.exec:\pjvvd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
\??\c:\rflfrrx.exec:\rflfrrx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
\??\c:\3rrrxrx.exec:\3rrrxrx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2164 -
\??\c:\nhttbb.exec:\nhttbb.exe17⤵
- Executes dropped EXE
PID:2716 -
\??\c:\tnbhbn.exec:\tnbhbn.exe18⤵
- Executes dropped EXE
PID:2212 -
\??\c:\jpdvp.exec:\jpdvp.exe19⤵
- Executes dropped EXE
PID:2992 -
\??\c:\9jjjp.exec:\9jjjp.exe20⤵
- Executes dropped EXE
PID:3016 -
\??\c:\llfrxxf.exec:\llfrxxf.exe21⤵
- Executes dropped EXE
PID:1660 -
\??\c:\1lfrxxl.exec:\1lfrxxl.exe22⤵
- Executes dropped EXE
PID:772 -
\??\c:\rlflxxl.exec:\rlflxxl.exe23⤵
- Executes dropped EXE
PID:2792 -
\??\c:\tnnbnn.exec:\tnnbnn.exe24⤵
- Executes dropped EXE
PID:1740 -
\??\c:\nhbbhb.exec:\nhbbhb.exe25⤵
- Executes dropped EXE
PID:2336 -
\??\c:\dvvdv.exec:\dvvdv.exe26⤵
- Executes dropped EXE
PID:1768 -
\??\c:\pdpvv.exec:\pdpvv.exe27⤵
- Executes dropped EXE
PID:2188 -
\??\c:\1jjjd.exec:\1jjjd.exe28⤵
- Executes dropped EXE
PID:888 -
\??\c:\lfxffrf.exec:\lfxffrf.exe29⤵
- Executes dropped EXE
PID:1752 -
\??\c:\3rllrxf.exec:\3rllrxf.exe30⤵
- Executes dropped EXE
PID:108 -
\??\c:\hhbnbh.exec:\hhbnbh.exe31⤵
- Executes dropped EXE
PID:2132 -
\??\c:\hthnbb.exec:\hthnbb.exe32⤵
- Executes dropped EXE
PID:1044 -
\??\c:\7dppp.exec:\7dppp.exe33⤵
- Executes dropped EXE
PID:2688 -
\??\c:\vpvpd.exec:\vpvpd.exe34⤵
- Executes dropped EXE
PID:2816 -
\??\c:\1vjjd.exec:\1vjjd.exe35⤵
- Executes dropped EXE
PID:2580 -
\??\c:\fxrrxxl.exec:\fxrrxxl.exe36⤵
- Executes dropped EXE
PID:2468 -
\??\c:\rllrflx.exec:\rllrflx.exe37⤵
- Executes dropped EXE
PID:2680 -
\??\c:\9xrxffr.exec:\9xrxffr.exe38⤵
- Executes dropped EXE
PID:2548 -
\??\c:\ttntht.exec:\ttntht.exe39⤵
- Executes dropped EXE
PID:1648 -
\??\c:\7nhhtb.exec:\7nhhtb.exe40⤵
- Executes dropped EXE
PID:2832 -
\??\c:\btnbnn.exec:\btnbnn.exe41⤵
- Executes dropped EXE
PID:2704 -
\??\c:\pjdjp.exec:\pjdjp.exe42⤵
- Executes dropped EXE
PID:1632 -
\??\c:\dpvdj.exec:\dpvdj.exe43⤵
- Executes dropped EXE
PID:1612 -
\??\c:\dvpdj.exec:\dvpdj.exe44⤵
- Executes dropped EXE
PID:1636 -
\??\c:\xxrlxfr.exec:\xxrlxfr.exe45⤵
- Executes dropped EXE
PID:2172 -
\??\c:\rlxflrf.exec:\rlxflrf.exe46⤵
- Executes dropped EXE
PID:1992 -
\??\c:\xrfflxf.exec:\xrfflxf.exe47⤵
- Executes dropped EXE
PID:348 -
\??\c:\ffflxfl.exec:\ffflxfl.exe48⤵
- Executes dropped EXE
PID:1704 -
\??\c:\btbhnn.exec:\btbhnn.exe49⤵
- Executes dropped EXE
PID:864 -
\??\c:\bthbbn.exec:\bthbbn.exe50⤵
- Executes dropped EXE
PID:2512 -
\??\c:\3nhhnn.exec:\3nhhnn.exe51⤵
- Executes dropped EXE
PID:1700 -
\??\c:\vvppd.exec:\vvppd.exe52⤵
- Executes dropped EXE
PID:2940 -
\??\c:\1dpdj.exec:\1dpdj.exe53⤵
- Executes dropped EXE
PID:2248 -
\??\c:\xrllxxl.exec:\xrllxxl.exe54⤵
- Executes dropped EXE
PID:444 -
\??\c:\5tnhbb.exec:\5tnhbb.exe55⤵
- Executes dropped EXE
PID:2988 -
\??\c:\hbbtbb.exec:\hbbtbb.exe56⤵
- Executes dropped EXE
PID:1148 -
\??\c:\pdppv.exec:\pdppv.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:652 -
\??\c:\fxlrrxx.exec:\fxlrrxx.exe58⤵
- Executes dropped EXE
PID:1112 -
\??\c:\nhnnnt.exec:\nhnnnt.exe59⤵
- Executes dropped EXE
PID:2496 -
\??\c:\1nnntb.exec:\1nnntb.exe60⤵
- Executes dropped EXE
PID:3048 -
\??\c:\7ppvp.exec:\7ppvp.exe61⤵
- Executes dropped EXE
PID:1560 -
\??\c:\frxxlrx.exec:\frxxlrx.exe62⤵
- Executes dropped EXE
PID:916 -
\??\c:\5hhntb.exec:\5hhntb.exe63⤵
- Executes dropped EXE
PID:1788 -
\??\c:\vpppd.exec:\vpppd.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1004 -
\??\c:\pjvvv.exec:\pjvvv.exe65⤵
- Executes dropped EXE
PID:352 -
\??\c:\xxlxlxx.exec:\xxlxlxx.exe66⤵PID:1736
-
\??\c:\tnbbtb.exec:\tnbbtb.exe67⤵PID:2952
-
\??\c:\hbhnbb.exec:\hbhnbb.exe68⤵PID:2800
-
\??\c:\ddvvp.exec:\ddvvp.exe69⤵PID:2132
-
\??\c:\rlflxfr.exec:\rlflxfr.exe70⤵PID:1044
-
\??\c:\bthhbb.exec:\bthhbb.exe71⤵PID:2556
-
\??\c:\7ttbhb.exec:\7ttbhb.exe72⤵PID:1548
-
\??\c:\3vjvv.exec:\3vjvv.exe73⤵PID:2756
-
\??\c:\9rfxllf.exec:\9rfxllf.exe74⤵PID:1664
-
\??\c:\htbtnb.exec:\htbtnb.exe75⤵PID:2944
-
\??\c:\pjppj.exec:\pjppj.exe76⤵PID:2788
-
\??\c:\lfrfrrf.exec:\lfrfrrf.exe77⤵PID:304
-
\??\c:\7xrrffr.exec:\7xrrffr.exe78⤵PID:1804
-
\??\c:\tnbtnn.exec:\tnbtnn.exe79⤵PID:2768
-
\??\c:\dvddv.exec:\dvddv.exe80⤵PID:2432
-
\??\c:\djvjp.exec:\djvjp.exe81⤵PID:2912
-
\??\c:\lfllrrf.exec:\lfllrrf.exe82⤵PID:1972
-
\??\c:\hbntnn.exec:\hbntnn.exe83⤵PID:1652
-
\??\c:\3htthn.exec:\3htthn.exe84⤵PID:616
-
\??\c:\3vppd.exec:\3vppd.exe85⤵PID:2388
-
\??\c:\llrrxxr.exec:\llrrxxr.exe86⤵PID:592
-
\??\c:\rllxrfr.exec:\rllxrfr.exe87⤵PID:2428
-
\??\c:\thtnbt.exec:\thtnbt.exe88⤵PID:836
-
\??\c:\nhbhtb.exec:\nhbhtb.exe89⤵PID:1936
-
\??\c:\ddvvd.exec:\ddvvd.exe90⤵PID:2880
-
\??\c:\jvjpv.exec:\jvjpv.exe91⤵PID:2980
-
\??\c:\xxrrflr.exec:\xxrrflr.exe92⤵PID:988
-
\??\c:\7rllxrx.exec:\7rllxrx.exe93⤵PID:2460
-
\??\c:\nnhhnn.exec:\nnhhnn.exe94⤵PID:2384
-
\??\c:\vpdjp.exec:\vpdjp.exe95⤵PID:2632
-
\??\c:\dpdjv.exec:\dpdjv.exe96⤵PID:1660
-
\??\c:\1fxlxxl.exec:\1fxlxxl.exe97⤵PID:772
-
\??\c:\rrlllrf.exec:\rrlllrf.exe98⤵PID:2268
-
\??\c:\hhtbnh.exec:\hhtbnh.exe99⤵PID:1332
-
\??\c:\5bnthh.exec:\5bnthh.exe100⤵PID:1812
-
\??\c:\vpjdj.exec:\vpjdj.exe101⤵PID:2500
-
\??\c:\dvdvj.exec:\dvdvj.exe102⤵PID:2044
-
\??\c:\fxllfxl.exec:\fxllfxl.exe103⤵PID:2968
-
\??\c:\rlxxlfl.exec:\rlxxlfl.exe104⤵PID:3064
-
\??\c:\btbbnn.exec:\btbbnn.exe105⤵PID:352
-
\??\c:\bthhtb.exec:\bthhtb.exe106⤵PID:2272
-
\??\c:\3hbtbh.exec:\3hbtbh.exe107⤵PID:2408
-
\??\c:\ppjjd.exec:\ppjjd.exe108⤵PID:2540
-
\??\c:\vpddj.exec:\vpddj.exe109⤵PID:2740
-
\??\c:\xrxxlfl.exec:\xrxxlfl.exe110⤵PID:2276
-
\??\c:\3fxflxf.exec:\3fxflxf.exe111⤵PID:2220
-
\??\c:\hbbnnt.exec:\hbbnnt.exe112⤵PID:1544
-
\??\c:\tnhhtt.exec:\tnhhtt.exe113⤵PID:2576
-
\??\c:\vpvdp.exec:\vpvdp.exe114⤵PID:2636
-
\??\c:\pdppv.exec:\pdppv.exe115⤵PID:2088
-
\??\c:\fxflfrf.exec:\fxflfrf.exe116⤵PID:2056
-
\??\c:\lxxlfrl.exec:\lxxlfrl.exe117⤵PID:2820
-
\??\c:\btnthb.exec:\btnthb.exe118⤵PID:2544
-
\??\c:\3bnthn.exec:\3bnthn.exe119⤵PID:2176
-
\??\c:\vvdpd.exec:\vvdpd.exe120⤵PID:800
-
\??\c:\9fxxrrf.exec:\9fxxrrf.exe121⤵PID:1964
-
\??\c:\fxxfllx.exec:\fxxfllx.exe122⤵PID:1996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-