Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/12/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
c4260fb2a49485c8cfda8980a4f6c66d5a0b7e722a6382dc1650facb3f9f9b47.exe
Resource
win7-20240729-en
General
-
Target
c4260fb2a49485c8cfda8980a4f6c66d5a0b7e722a6382dc1650facb3f9f9b47.exe
-
Size
83KB
-
MD5
543c7f7d1487155127f9cb6d98fb04d8
-
SHA1
66886af8238289b6ae961059b098368fc223dce1
-
SHA256
c4260fb2a49485c8cfda8980a4f6c66d5a0b7e722a6382dc1650facb3f9f9b47
-
SHA512
0afe03166403d4ab6b42d622b56f11e598adfb4fb43138ac54aa893025952481cc41e67e44d3a265895a93f7de9518477c4bab73aab9022f1efb491b27fe5e77
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIIpIo60L9QrrA89Q7:ymb3NkkiQ3mdBjFIIp9L9QrrA8k
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/1520-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2232-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2232-29-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2980-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2956-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2088-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1968-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2352-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3016-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2784-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1264-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1100-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2388-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2140-218-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2884-244-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2188-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2524 xfrxxlx.exe 2232 9bbthh.exe 2980 nnbtbb.exe 2956 rlxxlfr.exe 2912 9nhnnt.exe 2740 llxxflx.exe 2760 xxlrllr.exe 2088 vdppd.exe 1896 ddpvj.exe 1968 hbntht.exe 2352 1tnntb.exe 3016 dvjpv.exe 2412 lrxlflr.exe 2784 nnthtb.exe 1264 bhthtb.exe 1100 3pdjv.exe 676 xxflflx.exe 2388 hhtbnb.exe 2556 hhthtb.exe 2516 dddjd.exe 2140 jppjv.exe 2164 ffxxlxl.exe 828 1btnnh.exe 2884 9vddp.exe 1808 jpdvj.exe 1624 1xlrxxf.exe 2416 rrfrffl.exe 2188 3vvvd.exe 1128 vvjjv.exe 2880 7frrflr.exe 1944 bbhnhn.exe 1544 5bntth.exe 2844 jpvdv.exe 2132 vvdjp.exe 2732 5lflxlr.exe 2812 3fxxlrf.exe 2860 nthntb.exe 2712 9jddj.exe 2808 pdpdp.exe 2224 5rrrfrf.exe 2916 lrrxllr.exe 1172 7tntht.exe 1420 hntbnb.exe 1212 ppvjd.exe 2136 jpjpj.exe 3048 7xlrrfr.exe 1868 5xlxlrx.exe 2908 ntnbtn.exe 636 tthbnb.exe 2436 pjdjd.exe 1600 lfrrfxx.exe 1100 bhhtnt.exe 1976 jpdpv.exe 2972 jpjjv.exe 492 xxffrxl.exe 3060 nhtbhb.exe 2104 1bbhth.exe 776 pvjjj.exe 716 vvjjp.exe 1984 llfllrf.exe 1768 3fllxxf.exe 2884 bhnbbh.exe 1012 nhntbb.exe 1076 jjpjp.exe -
resource yara_rule behavioral1/memory/1520-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2088-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2088-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2088-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2088-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1968-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2352-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3016-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2784-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1264-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1100-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2388-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2140-218-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-244-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2188-280-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxfxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhnnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language httnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3vvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrxlflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rflxlxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnttt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffrrlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2524 1520 c4260fb2a49485c8cfda8980a4f6c66d5a0b7e722a6382dc1650facb3f9f9b47.exe 30 PID 1520 wrote to memory of 2524 1520 c4260fb2a49485c8cfda8980a4f6c66d5a0b7e722a6382dc1650facb3f9f9b47.exe 30 PID 1520 wrote to memory of 2524 1520 c4260fb2a49485c8cfda8980a4f6c66d5a0b7e722a6382dc1650facb3f9f9b47.exe 30 PID 1520 wrote to memory of 2524 1520 c4260fb2a49485c8cfda8980a4f6c66d5a0b7e722a6382dc1650facb3f9f9b47.exe 30 PID 2524 wrote to memory of 2232 2524 xfrxxlx.exe 31 PID 2524 wrote to memory of 2232 2524 xfrxxlx.exe 31 PID 2524 wrote to memory of 2232 2524 xfrxxlx.exe 31 PID 2524 wrote to memory of 2232 2524 xfrxxlx.exe 31 PID 2232 wrote to memory of 2980 2232 9bbthh.exe 32 PID 2232 wrote to memory of 2980 2232 9bbthh.exe 32 PID 2232 wrote to memory of 2980 2232 9bbthh.exe 32 PID 2232 wrote to memory of 2980 2232 9bbthh.exe 32 PID 2980 wrote to memory of 2956 2980 nnbtbb.exe 33 PID 2980 wrote to memory of 2956 2980 nnbtbb.exe 33 PID 2980 wrote to memory of 2956 2980 nnbtbb.exe 33 PID 2980 wrote to memory of 2956 2980 nnbtbb.exe 33 PID 2956 wrote to memory of 2912 2956 rlxxlfr.exe 34 PID 2956 wrote to memory of 2912 2956 rlxxlfr.exe 34 PID 2956 wrote to memory of 2912 2956 rlxxlfr.exe 34 PID 2956 wrote to memory of 2912 2956 rlxxlfr.exe 34 PID 2912 wrote to memory of 2740 2912 9nhnnt.exe 35 PID 2912 wrote to memory of 2740 2912 9nhnnt.exe 35 PID 2912 wrote to memory of 2740 2912 9nhnnt.exe 35 PID 2912 wrote to memory of 2740 2912 9nhnnt.exe 35 PID 2740 wrote to memory of 2760 2740 llxxflx.exe 36 PID 2740 wrote to memory of 2760 2740 llxxflx.exe 36 PID 2740 wrote to memory of 2760 2740 llxxflx.exe 36 PID 2740 wrote to memory of 2760 2740 llxxflx.exe 36 PID 2760 wrote to memory of 2088 2760 xxlrllr.exe 37 PID 2760 wrote to memory of 2088 2760 xxlrllr.exe 37 PID 2760 wrote to memory of 2088 2760 xxlrllr.exe 37 PID 2760 wrote to memory of 2088 2760 xxlrllr.exe 37 PID 2088 wrote to memory of 1896 2088 vdppd.exe 38 PID 2088 wrote to memory of 1896 2088 vdppd.exe 38 PID 2088 wrote to memory of 1896 2088 vdppd.exe 38 PID 2088 wrote to memory of 1896 2088 vdppd.exe 38 PID 1896 wrote to memory of 1968 1896 ddpvj.exe 39 PID 1896 wrote to memory of 1968 1896 ddpvj.exe 39 PID 1896 wrote to memory of 1968 1896 ddpvj.exe 39 PID 1896 wrote to memory of 1968 1896 ddpvj.exe 39 PID 1968 wrote to memory of 2352 1968 hbntht.exe 40 PID 1968 wrote to memory of 2352 1968 hbntht.exe 40 PID 1968 wrote to memory of 2352 1968 hbntht.exe 40 PID 1968 wrote to memory of 2352 1968 hbntht.exe 40 PID 2352 wrote to memory of 3016 2352 1tnntb.exe 41 PID 2352 wrote to memory of 3016 2352 1tnntb.exe 41 PID 2352 wrote to memory of 3016 2352 1tnntb.exe 41 PID 2352 wrote to memory of 3016 2352 1tnntb.exe 41 PID 3016 wrote to memory of 2412 3016 dvjpv.exe 42 PID 3016 wrote to memory of 2412 3016 dvjpv.exe 42 PID 3016 wrote to memory of 2412 3016 dvjpv.exe 42 PID 3016 wrote to memory of 2412 3016 dvjpv.exe 42 PID 2412 wrote to memory of 2784 2412 lrxlflr.exe 43 PID 2412 wrote to memory of 2784 2412 lrxlflr.exe 43 PID 2412 wrote to memory of 2784 2412 lrxlflr.exe 43 PID 2412 wrote to memory of 2784 2412 lrxlflr.exe 43 PID 2784 wrote to memory of 1264 2784 nnthtb.exe 44 PID 2784 wrote to memory of 1264 2784 nnthtb.exe 44 PID 2784 wrote to memory of 1264 2784 nnthtb.exe 44 PID 2784 wrote to memory of 1264 2784 nnthtb.exe 44 PID 1264 wrote to memory of 1100 1264 bhthtb.exe 45 PID 1264 wrote to memory of 1100 1264 bhthtb.exe 45 PID 1264 wrote to memory of 1100 1264 bhthtb.exe 45 PID 1264 wrote to memory of 1100 1264 bhthtb.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4260fb2a49485c8cfda8980a4f6c66d5a0b7e722a6382dc1650facb3f9f9b47.exe"C:\Users\Admin\AppData\Local\Temp\c4260fb2a49485c8cfda8980a4f6c66d5a0b7e722a6382dc1650facb3f9f9b47.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\xfrxxlx.exec:\xfrxxlx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\9bbthh.exec:\9bbthh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\nnbtbb.exec:\nnbtbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\rlxxlfr.exec:\rlxxlfr.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\9nhnnt.exec:\9nhnnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\llxxflx.exec:\llxxflx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\xxlrllr.exec:\xxlrllr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\vdppd.exec:\vdppd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\ddpvj.exec:\ddpvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1896 -
\??\c:\hbntht.exec:\hbntht.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\1tnntb.exec:\1tnntb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\dvjpv.exec:\dvjpv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\lrxlflr.exec:\lrxlflr.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
\??\c:\nnthtb.exec:\nnthtb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\bhthtb.exec:\bhthtb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
\??\c:\3pdjv.exec:\3pdjv.exe17⤵
- Executes dropped EXE
PID:1100 -
\??\c:\xxflflx.exec:\xxflflx.exe18⤵
- Executes dropped EXE
PID:676 -
\??\c:\hhtbnb.exec:\hhtbnb.exe19⤵
- Executes dropped EXE
PID:2388 -
\??\c:\hhthtb.exec:\hhthtb.exe20⤵
- Executes dropped EXE
PID:2556 -
\??\c:\dddjd.exec:\dddjd.exe21⤵
- Executes dropped EXE
PID:2516 -
\??\c:\jppjv.exec:\jppjv.exe22⤵
- Executes dropped EXE
PID:2140 -
\??\c:\ffxxlxl.exec:\ffxxlxl.exe23⤵
- Executes dropped EXE
PID:2164 -
\??\c:\1btnnh.exec:\1btnnh.exe24⤵
- Executes dropped EXE
PID:828 -
\??\c:\9vddp.exec:\9vddp.exe25⤵
- Executes dropped EXE
PID:2884 -
\??\c:\jpdvj.exec:\jpdvj.exe26⤵
- Executes dropped EXE
PID:1808 -
\??\c:\1xlrxxf.exec:\1xlrxxf.exe27⤵
- Executes dropped EXE
PID:1624 -
\??\c:\rrfrffl.exec:\rrfrffl.exe28⤵
- Executes dropped EXE
PID:2416 -
\??\c:\3vvvd.exec:\3vvvd.exe29⤵
- Executes dropped EXE
PID:2188 -
\??\c:\vvjjv.exec:\vvjjv.exe30⤵
- Executes dropped EXE
PID:1128 -
\??\c:\7frrflr.exec:\7frrflr.exe31⤵
- Executes dropped EXE
PID:2880 -
\??\c:\bbhnhn.exec:\bbhnhn.exe32⤵
- Executes dropped EXE
PID:1944 -
\??\c:\5bntth.exec:\5bntth.exe33⤵
- Executes dropped EXE
PID:1544 -
\??\c:\jpvdv.exec:\jpvdv.exe34⤵
- Executes dropped EXE
PID:2844 -
\??\c:\vvdjp.exec:\vvdjp.exe35⤵
- Executes dropped EXE
PID:2132 -
\??\c:\5lflxlr.exec:\5lflxlr.exe36⤵
- Executes dropped EXE
PID:2732 -
\??\c:\3fxxlrf.exec:\3fxxlrf.exe37⤵
- Executes dropped EXE
PID:2812 -
\??\c:\nthntb.exec:\nthntb.exe38⤵
- Executes dropped EXE
PID:2860 -
\??\c:\9jddj.exec:\9jddj.exe39⤵
- Executes dropped EXE
PID:2712 -
\??\c:\pdpdp.exec:\pdpdp.exe40⤵
- Executes dropped EXE
PID:2808 -
\??\c:\5rrrfrf.exec:\5rrrfrf.exe41⤵
- Executes dropped EXE
PID:2224 -
\??\c:\lrrxllr.exec:\lrrxllr.exe42⤵
- Executes dropped EXE
PID:2916 -
\??\c:\7tntht.exec:\7tntht.exe43⤵
- Executes dropped EXE
PID:1172 -
\??\c:\hntbnb.exec:\hntbnb.exe44⤵
- Executes dropped EXE
PID:1420 -
\??\c:\ppvjd.exec:\ppvjd.exe45⤵
- Executes dropped EXE
PID:1212 -
\??\c:\jpjpj.exec:\jpjpj.exe46⤵
- Executes dropped EXE
PID:2136 -
\??\c:\7xlrrfr.exec:\7xlrrfr.exe47⤵
- Executes dropped EXE
PID:3048 -
\??\c:\5xlxlrx.exec:\5xlxlrx.exe48⤵
- Executes dropped EXE
PID:1868 -
\??\c:\ntnbtn.exec:\ntnbtn.exe49⤵
- Executes dropped EXE
PID:2908 -
\??\c:\tthbnb.exec:\tthbnb.exe50⤵
- Executes dropped EXE
PID:636 -
\??\c:\pjdjd.exec:\pjdjd.exe51⤵
- Executes dropped EXE
PID:2436 -
\??\c:\lfrrfxx.exec:\lfrrfxx.exe52⤵
- Executes dropped EXE
PID:1600 -
\??\c:\bhhtnt.exec:\bhhtnt.exe53⤵
- Executes dropped EXE
PID:1100 -
\??\c:\jpdpv.exec:\jpdpv.exe54⤵
- Executes dropped EXE
PID:1976 -
\??\c:\jpjjv.exec:\jpjjv.exe55⤵
- Executes dropped EXE
PID:2972 -
\??\c:\xxffrxl.exec:\xxffrxl.exe56⤵
- Executes dropped EXE
PID:492 -
\??\c:\nhtbhb.exec:\nhtbhb.exe57⤵
- Executes dropped EXE
PID:3060 -
\??\c:\1bbhth.exec:\1bbhth.exe58⤵
- Executes dropped EXE
PID:2104 -
\??\c:\pvjjj.exec:\pvjjj.exe59⤵
- Executes dropped EXE
PID:776 -
\??\c:\vvjjp.exec:\vvjjp.exe60⤵
- Executes dropped EXE
PID:716 -
\??\c:\llfllrf.exec:\llfllrf.exe61⤵
- Executes dropped EXE
PID:1984 -
\??\c:\3fllxxf.exec:\3fllxxf.exe62⤵
- Executes dropped EXE
PID:1768 -
\??\c:\bhnbbh.exec:\bhnbbh.exe63⤵
- Executes dropped EXE
PID:2884 -
\??\c:\nhntbb.exec:\nhntbb.exe64⤵
- Executes dropped EXE
PID:1012 -
\??\c:\jjpjp.exec:\jjpjp.exe65⤵
- Executes dropped EXE
PID:1076 -
\??\c:\xrlxxll.exec:\xrlxxll.exe66⤵PID:3052
-
\??\c:\rrxxffr.exec:\rrxxffr.exe67⤵PID:2552
-
\??\c:\hnthht.exec:\hnthht.exe68⤵PID:2376
-
\??\c:\hbnntn.exec:\hbnntn.exe69⤵PID:1448
-
\??\c:\9dvdd.exec:\9dvdd.exe70⤵PID:2880
-
\??\c:\vvpvd.exec:\vvpvd.exe71⤵PID:1964
-
\??\c:\rffrrrr.exec:\rffrrrr.exe72⤵PID:2940
-
\??\c:\3lrrxxf.exec:\3lrrxxf.exe73⤵PID:2800
-
\??\c:\1nnbbh.exec:\1nnbbh.exe74⤵PID:2844
-
\??\c:\bttbnt.exec:\bttbnt.exe75⤵PID:2956
-
\??\c:\dvvdd.exec:\dvvdd.exe76⤵PID:2732
-
\??\c:\frxrflx.exec:\frxrflx.exe77⤵PID:2912
-
\??\c:\fxffxfl.exec:\fxffxfl.exe78⤵PID:2744
-
\??\c:\flfrfrf.exec:\flfrfrf.exe79⤵PID:2256
-
\??\c:\5tnnnn.exec:\5tnnnn.exe80⤵PID:1104
-
\??\c:\tbbntb.exec:\tbbntb.exe81⤵PID:2224
-
\??\c:\pjppd.exec:\pjppd.exe82⤵PID:1340
-
\??\c:\fllxfrr.exec:\fllxfrr.exe83⤵PID:1172
-
\??\c:\lrflfff.exec:\lrflfff.exe84⤵PID:1416
-
\??\c:\9bbtnb.exec:\9bbtnb.exe85⤵PID:2796
-
\??\c:\3thnbh.exec:\3thnbh.exe86⤵PID:2148
-
\??\c:\jppvj.exec:\jppvj.exe87⤵PID:1804
-
\??\c:\jjpvd.exec:\jjpvd.exe88⤵PID:1272
-
\??\c:\flrrllx.exec:\flrrllx.exe89⤵PID:2908
-
\??\c:\rlrflrf.exec:\rlrflrf.exe90⤵PID:2044
-
\??\c:\1tbhth.exec:\1tbhth.exe91⤵PID:1248
-
\??\c:\hhtbhh.exec:\hhtbhh.exe92⤵PID:1980
-
\??\c:\9pvjv.exec:\9pvjv.exe93⤵PID:2056
-
\??\c:\fxlrlxx.exec:\fxlrlxx.exe94⤵PID:2388
-
\??\c:\lrffrxx.exec:\lrffrxx.exe95⤵PID:2316
-
\??\c:\9xllrxx.exec:\9xllrxx.exe96⤵PID:2244
-
\??\c:\hbntbh.exec:\hbntbh.exe97⤵PID:1148
-
\??\c:\5bnnbb.exec:\5bnnbb.exe98⤵PID:104
-
\??\c:\7ppdd.exec:\7ppdd.exe99⤵PID:2164
-
\??\c:\dvvpp.exec:\dvvpp.exe100⤵PID:716
-
\??\c:\1rrrrxf.exec:\1rrrrxf.exe101⤵PID:1812
-
\??\c:\bttbhn.exec:\bttbhn.exe102⤵PID:1632
-
\??\c:\hbnnbt.exec:\hbnnbt.exe103⤵PID:1068
-
\??\c:\jjvdd.exec:\jjvdd.exe104⤵PID:264
-
\??\c:\vvjdp.exec:\vvjdp.exe105⤵PID:2392
-
\??\c:\vdjpp.exec:\vdjpp.exe106⤵PID:1708
-
\??\c:\rlxfxxf.exec:\rlxfxxf.exe107⤵PID:2780
-
\??\c:\1httbh.exec:\1httbh.exe108⤵PID:2524
-
\??\c:\nhnnbh.exec:\nhnnbh.exe109⤵PID:2152
-
\??\c:\vvjpp.exec:\vvjpp.exe110⤵PID:1688
-
\??\c:\3dpvv.exec:\3dpvv.exe111⤵PID:2928
-
\??\c:\ddpdj.exec:\ddpdj.exe112⤵PID:2960
-
\??\c:\1rflxxx.exec:\1rflxxx.exe113⤵PID:3064
-
\??\c:\xxflxxx.exec:\xxflxxx.exe114⤵PID:3024
-
\??\c:\bbnntt.exec:\bbnntt.exe115⤵PID:2868
-
\??\c:\ddddj.exec:\ddddj.exe116⤵PID:2768
-
\??\c:\pjjvd.exec:\pjjvd.exe117⤵PID:2476
-
\??\c:\5jjpj.exec:\5jjpj.exe118⤵PID:2264
-
\??\c:\ffrrlrf.exec:\ffrrlrf.exe119⤵
- System Location Discovery: System Language Discovery
PID:2764 -
\??\c:\tbtntb.exec:\tbtntb.exe120⤵PID:1772
-
\??\c:\1tbbtt.exec:\1tbbtt.exe121⤵PID:2032
-
\??\c:\hhhnbh.exec:\hhhnbh.exe122⤵PID:2116
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-