Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/12/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe
Resource
win7-20241010-en
General
-
Target
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe
-
Size
298KB
-
MD5
c48150ae1df943cec9e198000905216a
-
SHA1
5291d5b56a928717af19a756cdacde64cd9c0fdd
-
SHA256
850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb
-
SHA512
565c590c3a124b9016ee1fb2d0f3686146c0d1511f90c8825f1f3d83d5291b42b11a4f40e1d70444f5bd179688cf6b31b96557a5a4146ac48ff73cd5db1be379
-
SSDEEP
6144:n3C9BRo/AIuuOthLmH403Pyr6UWO6jUl7sPgvU:n3C9uDVOXLmHBKWyn+PgvU
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 18 IoCs
resource yara_rule behavioral1/memory/2128-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3036-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2440-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2892-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2696-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1032-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2596-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2980-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2328-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2408-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1696-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1944-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1608-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1904-226-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 3036 hpthtv.exe 2440 ppvhrpx.exe 2892 xxnnn.exe 3048 vbdxt.exe 2752 hhhjxth.exe 2696 hhpnjr.exe 2692 rfdjx.exe 1032 hrlxj.exe 108 fjfxptr.exe 2596 jbphfr.exe 2960 tfndnpj.exe 2980 hhvhr.exe 1148 pffpt.exe 2016 bxppx.exe 2368 vvbxbn.exe 428 lvhphx.exe 2328 ppvrjl.exe 2408 lvnjrtf.exe 1696 tfbtf.exe 1944 rxbtjf.exe 1608 pprbnth.exe 2332 trfhptp.exe 1904 bbvjhbj.exe 2612 rrjdn.exe 2096 rprjh.exe 1400 jnjhp.exe 1492 vdrdb.exe 1716 tfxbrh.exe 2504 bfhbfrj.exe 844 blvth.exe 1684 pbbpjh.exe 852 vrbff.exe 2496 ftptxvl.exe 2152 tfbvh.exe 2944 hdxptrl.exe 2872 nvvjv.exe 3064 fvbpbx.exe 1508 bvntrv.exe 2860 ljjth.exe 2672 lrvthj.exe 2836 xvtbrf.exe 2644 lnprv.exe 1064 xnbvj.exe 2712 bjjpbl.exe 1032 httnjlr.exe 1376 jtvhpx.exe 2360 pbjpr.exe 2908 xxxfpt.exe 2960 rxpxd.exe 2164 pnjnv.exe 2848 brvjv.exe 1488 vxxpdj.exe 2372 pjjvlr.exe 756 lpljfxt.exe 2176 nphtf.exe 2084 vnlnpvj.exe 2408 djftvp.exe 2424 rbtvn.exe 1732 bnfdbjp.exe 1944 brrvp.exe 2436 ttrlpdh.exe 1968 rfhpvl.exe 660 rjtlp.exe 1972 xdffl.exe -
resource yara_rule behavioral1/memory/2128-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3036-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2440-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2892-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2892-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2892-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2696-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1032-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2596-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2328-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2408-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1696-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1944-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1608-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1904-226-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxrdbht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tprljfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdbvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tlvhx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvhjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtjnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdpbxfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbjvtvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbrvnrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txflbxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jxbnjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtxrfp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jnbrhxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpbpbv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xhlblj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfhbfrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvffh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vxxbvf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjjjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjxdbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrxdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fnvjxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htpnf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btfjbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tfndnpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lvhxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjfpnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrbbbnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfrvbpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fvjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdlvfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttfdjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llbjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvpddx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pxbbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lbpdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drvrpnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pfnxvr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 3036 2128 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 30 PID 2128 wrote to memory of 3036 2128 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 30 PID 2128 wrote to memory of 3036 2128 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 30 PID 2128 wrote to memory of 3036 2128 850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe 30 PID 3036 wrote to memory of 2440 3036 hpthtv.exe 31 PID 3036 wrote to memory of 2440 3036 hpthtv.exe 31 PID 3036 wrote to memory of 2440 3036 hpthtv.exe 31 PID 3036 wrote to memory of 2440 3036 hpthtv.exe 31 PID 2440 wrote to memory of 2892 2440 ppvhrpx.exe 32 PID 2440 wrote to memory of 2892 2440 ppvhrpx.exe 32 PID 2440 wrote to memory of 2892 2440 ppvhrpx.exe 32 PID 2440 wrote to memory of 2892 2440 ppvhrpx.exe 32 PID 2892 wrote to memory of 3048 2892 xxnnn.exe 33 PID 2892 wrote to memory of 3048 2892 xxnnn.exe 33 PID 2892 wrote to memory of 3048 2892 xxnnn.exe 33 PID 2892 wrote to memory of 3048 2892 xxnnn.exe 33 PID 3048 wrote to memory of 2752 3048 vbdxt.exe 34 PID 3048 wrote to memory of 2752 3048 vbdxt.exe 34 PID 3048 wrote to memory of 2752 3048 vbdxt.exe 34 PID 3048 wrote to memory of 2752 3048 vbdxt.exe 34 PID 2752 wrote to memory of 2696 2752 hhhjxth.exe 35 PID 2752 wrote to memory of 2696 2752 hhhjxth.exe 35 PID 2752 wrote to memory of 2696 2752 hhhjxth.exe 35 PID 2752 wrote to memory of 2696 2752 hhhjxth.exe 35 PID 2696 wrote to memory of 2692 2696 hhpnjr.exe 36 PID 2696 wrote to memory of 2692 2696 hhpnjr.exe 36 PID 2696 wrote to memory of 2692 2696 hhpnjr.exe 36 PID 2696 wrote to memory of 2692 2696 hhpnjr.exe 36 PID 2692 wrote to memory of 1032 2692 rfdjx.exe 37 PID 2692 wrote to memory of 1032 2692 rfdjx.exe 37 PID 2692 wrote to memory of 1032 2692 rfdjx.exe 37 PID 2692 wrote to memory of 1032 2692 rfdjx.exe 37 PID 1032 wrote to memory of 108 1032 hrlxj.exe 38 PID 1032 wrote to memory of 108 1032 hrlxj.exe 38 PID 1032 wrote to memory of 108 1032 hrlxj.exe 38 PID 1032 wrote to memory of 108 1032 hrlxj.exe 38 PID 108 wrote to memory of 2596 108 fjfxptr.exe 39 PID 108 wrote to memory of 2596 108 fjfxptr.exe 39 PID 108 wrote to memory of 2596 108 fjfxptr.exe 39 PID 108 wrote to memory of 2596 108 fjfxptr.exe 39 PID 2596 wrote to memory of 2960 2596 jbphfr.exe 40 PID 2596 wrote to memory of 2960 2596 jbphfr.exe 40 PID 2596 wrote to memory of 2960 2596 jbphfr.exe 40 PID 2596 wrote to memory of 2960 2596 jbphfr.exe 40 PID 2960 wrote to memory of 2980 2960 tfndnpj.exe 41 PID 2960 wrote to memory of 2980 2960 tfndnpj.exe 41 PID 2960 wrote to memory of 2980 2960 tfndnpj.exe 41 PID 2960 wrote to memory of 2980 2960 tfndnpj.exe 41 PID 2980 wrote to memory of 1148 2980 hhvhr.exe 42 PID 2980 wrote to memory of 1148 2980 hhvhr.exe 42 PID 2980 wrote to memory of 1148 2980 hhvhr.exe 42 PID 2980 wrote to memory of 1148 2980 hhvhr.exe 42 PID 1148 wrote to memory of 2016 1148 pffpt.exe 43 PID 1148 wrote to memory of 2016 1148 pffpt.exe 43 PID 1148 wrote to memory of 2016 1148 pffpt.exe 43 PID 1148 wrote to memory of 2016 1148 pffpt.exe 43 PID 2016 wrote to memory of 2368 2016 bxppx.exe 44 PID 2016 wrote to memory of 2368 2016 bxppx.exe 44 PID 2016 wrote to memory of 2368 2016 bxppx.exe 44 PID 2016 wrote to memory of 2368 2016 bxppx.exe 44 PID 2368 wrote to memory of 428 2368 vvbxbn.exe 45 PID 2368 wrote to memory of 428 2368 vvbxbn.exe 45 PID 2368 wrote to memory of 428 2368 vvbxbn.exe 45 PID 2368 wrote to memory of 428 2368 vvbxbn.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe"C:\Users\Admin\AppData\Local\Temp\850fe874201a706d6196307256f768e37c4026fe43cb4875a95824c9debab0cb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\hpthtv.exec:\hpthtv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\ppvhrpx.exec:\ppvhrpx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\xxnnn.exec:\xxnnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\vbdxt.exec:\vbdxt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\hhhjxth.exec:\hhhjxth.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\hhpnjr.exec:\hhpnjr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\rfdjx.exec:\rfdjx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\hrlxj.exec:\hrlxj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
\??\c:\fjfxptr.exec:\fjfxptr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:108 -
\??\c:\jbphfr.exec:\jbphfr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
\??\c:\tfndnpj.exec:\tfndnpj.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
\??\c:\hhvhr.exec:\hhvhr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\pffpt.exec:\pffpt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
\??\c:\bxppx.exec:\bxppx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
\??\c:\vvbxbn.exec:\vvbxbn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\lvhphx.exec:\lvhphx.exe17⤵
- Executes dropped EXE
PID:428 -
\??\c:\ppvrjl.exec:\ppvrjl.exe18⤵
- Executes dropped EXE
PID:2328 -
\??\c:\lvnjrtf.exec:\lvnjrtf.exe19⤵
- Executes dropped EXE
PID:2408 -
\??\c:\tfbtf.exec:\tfbtf.exe20⤵
- Executes dropped EXE
PID:1696 -
\??\c:\rxbtjf.exec:\rxbtjf.exe21⤵
- Executes dropped EXE
PID:1944 -
\??\c:\pprbnth.exec:\pprbnth.exe22⤵
- Executes dropped EXE
PID:1608 -
\??\c:\trfhptp.exec:\trfhptp.exe23⤵
- Executes dropped EXE
PID:2332 -
\??\c:\bbvjhbj.exec:\bbvjhbj.exe24⤵
- Executes dropped EXE
PID:1904 -
\??\c:\rrjdn.exec:\rrjdn.exe25⤵
- Executes dropped EXE
PID:2612 -
\??\c:\rprjh.exec:\rprjh.exe26⤵
- Executes dropped EXE
PID:2096 -
\??\c:\jnjhp.exec:\jnjhp.exe27⤵
- Executes dropped EXE
PID:1400 -
\??\c:\vdrdb.exec:\vdrdb.exe28⤵
- Executes dropped EXE
PID:1492 -
\??\c:\tfxbrh.exec:\tfxbrh.exe29⤵
- Executes dropped EXE
PID:1716 -
\??\c:\bfhbfrj.exec:\bfhbfrj.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2504 -
\??\c:\blvth.exec:\blvth.exe31⤵
- Executes dropped EXE
PID:844 -
\??\c:\pbbpjh.exec:\pbbpjh.exe32⤵
- Executes dropped EXE
PID:1684 -
\??\c:\vrbff.exec:\vrbff.exe33⤵
- Executes dropped EXE
PID:852 -
\??\c:\ftptxvl.exec:\ftptxvl.exe34⤵
- Executes dropped EXE
PID:2496 -
\??\c:\tfbvh.exec:\tfbvh.exe35⤵
- Executes dropped EXE
PID:2152 -
\??\c:\hdxptrl.exec:\hdxptrl.exe36⤵
- Executes dropped EXE
PID:2944 -
\??\c:\nvvjv.exec:\nvvjv.exe37⤵
- Executes dropped EXE
PID:2872 -
\??\c:\fvbpbx.exec:\fvbpbx.exe38⤵
- Executes dropped EXE
PID:3064 -
\??\c:\bvntrv.exec:\bvntrv.exe39⤵
- Executes dropped EXE
PID:1508 -
\??\c:\ljjth.exec:\ljjth.exe40⤵
- Executes dropped EXE
PID:2860 -
\??\c:\lrvthj.exec:\lrvthj.exe41⤵
- Executes dropped EXE
PID:2672 -
\??\c:\xvtbrf.exec:\xvtbrf.exe42⤵
- Executes dropped EXE
PID:2836 -
\??\c:\lnprv.exec:\lnprv.exe43⤵
- Executes dropped EXE
PID:2644 -
\??\c:\xnbvj.exec:\xnbvj.exe44⤵
- Executes dropped EXE
PID:1064 -
\??\c:\bjjpbl.exec:\bjjpbl.exe45⤵
- Executes dropped EXE
PID:2712 -
\??\c:\httnjlr.exec:\httnjlr.exe46⤵
- Executes dropped EXE
PID:1032 -
\??\c:\jtvhpx.exec:\jtvhpx.exe47⤵
- Executes dropped EXE
PID:1376 -
\??\c:\pbjpr.exec:\pbjpr.exe48⤵
- Executes dropped EXE
PID:2360 -
\??\c:\xxxfpt.exec:\xxxfpt.exe49⤵
- Executes dropped EXE
PID:2908 -
\??\c:\rxpxd.exec:\rxpxd.exe50⤵
- Executes dropped EXE
PID:2960 -
\??\c:\pnjnv.exec:\pnjnv.exe51⤵
- Executes dropped EXE
PID:2164 -
\??\c:\brvjv.exec:\brvjv.exe52⤵
- Executes dropped EXE
PID:2848 -
\??\c:\vxxpdj.exec:\vxxpdj.exe53⤵
- Executes dropped EXE
PID:1488 -
\??\c:\pjjvlr.exec:\pjjvlr.exe54⤵
- Executes dropped EXE
PID:2372 -
\??\c:\lpljfxt.exec:\lpljfxt.exe55⤵
- Executes dropped EXE
PID:756 -
\??\c:\nphtf.exec:\nphtf.exe56⤵
- Executes dropped EXE
PID:2176 -
\??\c:\vnlnpvj.exec:\vnlnpvj.exe57⤵
- Executes dropped EXE
PID:2084 -
\??\c:\djftvp.exec:\djftvp.exe58⤵
- Executes dropped EXE
PID:2408 -
\??\c:\rbtvn.exec:\rbtvn.exe59⤵
- Executes dropped EXE
PID:2424 -
\??\c:\bnfdbjp.exec:\bnfdbjp.exe60⤵
- Executes dropped EXE
PID:1732 -
\??\c:\brrvp.exec:\brrvp.exe61⤵
- Executes dropped EXE
PID:1944 -
\??\c:\ttrlpdh.exec:\ttrlpdh.exe62⤵
- Executes dropped EXE
PID:2436 -
\??\c:\rfhpvl.exec:\rfhpvl.exe63⤵
- Executes dropped EXE
PID:1968 -
\??\c:\rjtlp.exec:\rjtlp.exe64⤵
- Executes dropped EXE
PID:660 -
\??\c:\xdffl.exec:\xdffl.exe65⤵
- Executes dropped EXE
PID:1972 -
\??\c:\dvvjprv.exec:\dvvjprv.exe66⤵PID:1996
-
\??\c:\jtrpnn.exec:\jtrpnn.exe67⤵PID:2096
-
\??\c:\tdflpjd.exec:\tdflpjd.exe68⤵PID:1400
-
\??\c:\lptvr.exec:\lptvr.exe69⤵PID:1604
-
\??\c:\tlrfj.exec:\tlrfj.exe70⤵PID:2916
-
\??\c:\bxptvh.exec:\bxptvh.exe71⤵PID:1548
-
\??\c:\rljnn.exec:\rljnn.exe72⤵PID:1468
-
\??\c:\ftxjn.exec:\ftxjn.exe73⤵PID:1568
-
\??\c:\rdnfbxr.exec:\rdnfbxr.exe74⤵PID:1884
-
\??\c:\lrbfpv.exec:\lrbfpv.exe75⤵PID:2448
-
\??\c:\djhnp.exec:\djhnp.exe76⤵PID:2940
-
\??\c:\hphttdj.exec:\hphttdj.exe77⤵PID:2080
-
\??\c:\njlvfj.exec:\njlvfj.exe78⤵PID:2756
-
\??\c:\tttvhpp.exec:\tttvhpp.exe79⤵PID:2880
-
\??\c:\vfbnhhx.exec:\vfbnhhx.exe80⤵PID:2784
-
\??\c:\lrxxn.exec:\lrxxn.exe81⤵PID:2852
-
\??\c:\lfndppj.exec:\lfndppj.exe82⤵PID:3004
-
\??\c:\xrdtfr.exec:\xrdtfr.exe83⤵PID:2752
-
\??\c:\pxbbbn.exec:\pxbbbn.exe84⤵
- System Location Discovery: System Language Discovery
PID:2680 -
\??\c:\hnnjj.exec:\hnnjj.exe85⤵PID:2728
-
\??\c:\lrjfdl.exec:\lrjfdl.exe86⤵PID:2820
-
\??\c:\lnnjd.exec:\lnnjd.exe87⤵PID:1748
-
\??\c:\ttnbhbh.exec:\ttnbhbh.exe88⤵PID:2544
-
\??\c:\hdjdtnv.exec:\hdjdtnv.exe89⤵PID:552
-
\??\c:\rfhjt.exec:\rfhjt.exe90⤵PID:3032
-
\??\c:\hbxvxf.exec:\hbxvxf.exe91⤵PID:2972
-
\??\c:\pdrlpx.exec:\pdrlpx.exe92⤵PID:988
-
\??\c:\nnlrrj.exec:\nnlrrj.exe93⤵PID:2988
-
\??\c:\vlndnx.exec:\vlndnx.exe94⤵PID:2056
-
\??\c:\tlfdf.exec:\tlfdf.exe95⤵PID:584
-
\??\c:\bhfnxf.exec:\bhfnxf.exe96⤵PID:1912
-
\??\c:\rhlrb.exec:\rhlrb.exe97⤵PID:516
-
\??\c:\pnlbh.exec:\pnlbh.exe98⤵PID:2160
-
\??\c:\hfdfdtr.exec:\hfdfdtr.exe99⤵PID:2336
-
\??\c:\rhnhjnx.exec:\rhnhjnx.exe100⤵PID:2476
-
\??\c:\vlnxjlr.exec:\vlnxjlr.exe101⤵PID:2148
-
\??\c:\vdbdfnd.exec:\vdbdfnd.exe102⤵PID:1688
-
\??\c:\llbtrnj.exec:\llbtrnj.exe103⤵PID:1320
-
\??\c:\tjlbx.exec:\tjlbx.exe104⤵PID:812
-
\??\c:\pjxdbd.exec:\pjxdbd.exe105⤵
- System Location Discovery: System Language Discovery
PID:3000 -
\??\c:\jrplf.exec:\jrplf.exe106⤵PID:1060
-
\??\c:\tnndxfn.exec:\tnndxfn.exe107⤵PID:2484
-
\??\c:\fvfvp.exec:\fvfvp.exe108⤵PID:1520
-
\??\c:\ppvbrbb.exec:\ppvbrbb.exe109⤵PID:1916
-
\??\c:\tlhpxr.exec:\tlhpxr.exe110⤵PID:744
-
\??\c:\xhpjp.exec:\xhpjp.exe111⤵PID:2256
-
\??\c:\hjxvjx.exec:\hjxvjx.exe112⤵PID:1744
-
\??\c:\llxrrl.exec:\llxrrl.exe113⤵PID:1460
-
\??\c:\lpttnt.exec:\lpttnt.exe114⤵PID:844
-
\??\c:\phdvrh.exec:\phdvrh.exe115⤵PID:1808
-
\??\c:\hhxpr.exec:\hhxpr.exe116⤵PID:2844
-
\??\c:\rfbdvxv.exec:\rfbdvxv.exe117⤵PID:2736
-
\??\c:\lvjtlxb.exec:\lvjtlxb.exe118⤵PID:1592
-
\??\c:\bxvpfrt.exec:\bxvpfrt.exe119⤵PID:2340
-
\??\c:\jxhhxn.exec:\jxhhxn.exe120⤵PID:2884
-
\??\c:\rxvjt.exec:\rxvjt.exe121⤵PID:3052
-
\??\c:\rvbtbnr.exec:\rvbtbnr.exe122⤵PID:2868
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-