Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 07:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
72c3d5ba11300153cf7479c7577e97f0N.exe
Resource
win7-20240708-en
6 signatures
120 seconds
General
-
Target
72c3d5ba11300153cf7479c7577e97f0N.exe
-
Size
78KB
-
MD5
72c3d5ba11300153cf7479c7577e97f0
-
SHA1
8896621fc3c1632646bdf385437fb04fbc6848d5
-
SHA256
2a94a389f31087a12f21d8d914a635f31ea7be44ba119b1a26abf1e79c22090f
-
SHA512
5b75b7fe69057d1bc9d1633fa0c647e4690c68396919fe635340d19cb5beec777a7318d42fe64cc0020dd8668ca3265bc2c509a94adf0663847f1b4b93164171
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2wVEJNQv:ymb3NkkiQ3mdBjF+3TU2KEJNQv
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral1/memory/2596-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1932-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2636-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2848-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1220-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1620-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2576-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/864-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2080-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2136-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1312-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2268-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/544-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1880-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1284-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1060-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/780-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1040-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2236-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3036-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1648-260-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2452-269-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2108-278-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1932 pvvvp.exe 2772 3frffrf.exe 2636 bnbbhh.exe 2848 vjvvd.exe 1220 fxrflxl.exe 2576 rxllllr.exe 1620 hntbbh.exe 864 dvpvp.exe 2080 rxfffxl.exe 2136 tntbbt.exe 1312 nhtbhh.exe 2268 vjpjv.exe 2728 lfxfllx.exe 544 lfflxfr.exe 1880 bhnhtt.exe 1284 vvvdp.exe 1060 vpjvv.exe 780 frxxfff.exe 2228 btnttb.exe 1040 5htnnh.exe 2000 7vjpv.exe 1444 vjvvv.exe 2236 rllrxxl.exe 304 7nthth.exe 3036 tnhntt.exe 1648 vdpvv.exe 2452 xxrlxlx.exe 2108 7thnhh.exe 1752 ppvpd.exe 1076 ddppd.exe 2644 xxlllrf.exe 1228 nbtbhh.exe 1932 btnnht.exe 2792 jjvpv.exe 2620 frxxlrx.exe 2664 lfllfll.exe 2780 nbttbt.exe 2516 nbhhbt.exe 3000 9vppv.exe 2580 9pvvp.exe 1456 9frlrrf.exe 1820 frfffxr.exe 864 ttbhnt.exe 2152 bhnhbh.exe 2724 5jddj.exe 2740 vjddj.exe 2700 1rrxrrr.exe 2268 nhhhnn.exe 828 btbthb.exe 2604 9jvjd.exe 2832 dvvdv.exe 1960 vjvpj.exe 1964 1xlfllx.exe 1956 lfffxfx.exe 2364 bbbbhn.exe 2148 5dvdj.exe 2400 pdjpd.exe 3056 fxxlxrx.exe 1496 frxlxrr.exe 2280 htbthn.exe 1124 tnnnnb.exe 1048 pvjjd.exe 1772 pdjpp.exe 3036 rfrrffl.exe -
resource yara_rule behavioral1/memory/2596-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1932-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1220-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1620-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/864-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/864-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/864-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2080-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2136-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1312-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2268-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/544-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1880-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1284-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1060-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/780-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1040-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3036-251-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1648-260-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2452-269-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2108-278-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvddp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbtbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfrlfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrllff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1932 2596 72c3d5ba11300153cf7479c7577e97f0N.exe 30 PID 2596 wrote to memory of 1932 2596 72c3d5ba11300153cf7479c7577e97f0N.exe 30 PID 2596 wrote to memory of 1932 2596 72c3d5ba11300153cf7479c7577e97f0N.exe 30 PID 2596 wrote to memory of 1932 2596 72c3d5ba11300153cf7479c7577e97f0N.exe 30 PID 1932 wrote to memory of 2772 1932 pvvvp.exe 31 PID 1932 wrote to memory of 2772 1932 pvvvp.exe 31 PID 1932 wrote to memory of 2772 1932 pvvvp.exe 31 PID 1932 wrote to memory of 2772 1932 pvvvp.exe 31 PID 2772 wrote to memory of 2636 2772 3frffrf.exe 32 PID 2772 wrote to memory of 2636 2772 3frffrf.exe 32 PID 2772 wrote to memory of 2636 2772 3frffrf.exe 32 PID 2772 wrote to memory of 2636 2772 3frffrf.exe 32 PID 2636 wrote to memory of 2848 2636 bnbbhh.exe 33 PID 2636 wrote to memory of 2848 2636 bnbbhh.exe 33 PID 2636 wrote to memory of 2848 2636 bnbbhh.exe 33 PID 2636 wrote to memory of 2848 2636 bnbbhh.exe 33 PID 2848 wrote to memory of 1220 2848 vjvvd.exe 34 PID 2848 wrote to memory of 1220 2848 vjvvd.exe 34 PID 2848 wrote to memory of 1220 2848 vjvvd.exe 34 PID 2848 wrote to memory of 1220 2848 vjvvd.exe 34 PID 1220 wrote to memory of 2576 1220 fxrflxl.exe 35 PID 1220 wrote to memory of 2576 1220 fxrflxl.exe 35 PID 1220 wrote to memory of 2576 1220 fxrflxl.exe 35 PID 1220 wrote to memory of 2576 1220 fxrflxl.exe 35 PID 2576 wrote to memory of 1620 2576 rxllllr.exe 36 PID 2576 wrote to memory of 1620 2576 rxllllr.exe 36 PID 2576 wrote to memory of 1620 2576 rxllllr.exe 36 PID 2576 wrote to memory of 1620 2576 rxllllr.exe 36 PID 1620 wrote to memory of 864 1620 hntbbh.exe 37 PID 1620 wrote to memory of 864 1620 hntbbh.exe 37 PID 1620 wrote to memory of 864 1620 hntbbh.exe 37 PID 1620 wrote to memory of 864 1620 hntbbh.exe 37 PID 864 wrote to memory of 2080 864 dvpvp.exe 38 PID 864 wrote to memory of 2080 864 dvpvp.exe 38 PID 864 wrote to memory of 2080 864 dvpvp.exe 38 PID 864 wrote to memory of 2080 864 dvpvp.exe 38 PID 2080 wrote to memory of 2136 2080 rxfffxl.exe 39 PID 2080 wrote to memory of 2136 2080 rxfffxl.exe 39 PID 2080 wrote to memory of 2136 2080 rxfffxl.exe 39 PID 2080 wrote to memory of 2136 2080 rxfffxl.exe 39 PID 2136 wrote to memory of 1312 2136 tntbbt.exe 40 PID 2136 wrote to memory of 1312 2136 tntbbt.exe 40 PID 2136 wrote to memory of 1312 2136 tntbbt.exe 40 PID 2136 wrote to memory of 1312 2136 tntbbt.exe 40 PID 1312 wrote to memory of 2268 1312 nhtbhh.exe 41 PID 1312 wrote to memory of 2268 1312 nhtbhh.exe 41 PID 1312 wrote to memory of 2268 1312 nhtbhh.exe 41 PID 1312 wrote to memory of 2268 1312 nhtbhh.exe 41 PID 2268 wrote to memory of 2728 2268 vjpjv.exe 42 PID 2268 wrote to memory of 2728 2268 vjpjv.exe 42 PID 2268 wrote to memory of 2728 2268 vjpjv.exe 42 PID 2268 wrote to memory of 2728 2268 vjpjv.exe 42 PID 2728 wrote to memory of 544 2728 lfxfllx.exe 43 PID 2728 wrote to memory of 544 2728 lfxfllx.exe 43 PID 2728 wrote to memory of 544 2728 lfxfllx.exe 43 PID 2728 wrote to memory of 544 2728 lfxfllx.exe 43 PID 544 wrote to memory of 1880 544 lfflxfr.exe 44 PID 544 wrote to memory of 1880 544 lfflxfr.exe 44 PID 544 wrote to memory of 1880 544 lfflxfr.exe 44 PID 544 wrote to memory of 1880 544 lfflxfr.exe 44 PID 1880 wrote to memory of 1284 1880 bhnhtt.exe 45 PID 1880 wrote to memory of 1284 1880 bhnhtt.exe 45 PID 1880 wrote to memory of 1284 1880 bhnhtt.exe 45 PID 1880 wrote to memory of 1284 1880 bhnhtt.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\72c3d5ba11300153cf7479c7577e97f0N.exe"C:\Users\Admin\AppData\Local\Temp\72c3d5ba11300153cf7479c7577e97f0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
\??\c:\pvvvp.exec:\pvvvp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
\??\c:\3frffrf.exec:\3frffrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\bnbbhh.exec:\bnbbhh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\vjvvd.exec:\vjvvd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\fxrflxl.exec:\fxrflxl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
\??\c:\rxllllr.exec:\rxllllr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\hntbbh.exec:\hntbbh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
\??\c:\dvpvp.exec:\dvpvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:864 -
\??\c:\rxfffxl.exec:\rxfffxl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\tntbbt.exec:\tntbbt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\nhtbhh.exec:\nhtbhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
\??\c:\vjpjv.exec:\vjpjv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\lfxfllx.exec:\lfxfllx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\lfflxfr.exec:\lfflxfr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
\??\c:\bhnhtt.exec:\bhnhtt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
\??\c:\vvvdp.exec:\vvvdp.exe17⤵
- Executes dropped EXE
PID:1284 -
\??\c:\vpjvv.exec:\vpjvv.exe18⤵
- Executes dropped EXE
PID:1060 -
\??\c:\frxxfff.exec:\frxxfff.exe19⤵
- Executes dropped EXE
PID:780 -
\??\c:\btnttb.exec:\btnttb.exe20⤵
- Executes dropped EXE
PID:2228 -
\??\c:\5htnnh.exec:\5htnnh.exe21⤵
- Executes dropped EXE
PID:1040 -
\??\c:\7vjpv.exec:\7vjpv.exe22⤵
- Executes dropped EXE
PID:2000 -
\??\c:\vjvvv.exec:\vjvvv.exe23⤵
- Executes dropped EXE
PID:1444 -
\??\c:\rllrxxl.exec:\rllrxxl.exe24⤵
- Executes dropped EXE
PID:2236 -
\??\c:\7nthth.exec:\7nthth.exe25⤵
- Executes dropped EXE
PID:304 -
\??\c:\tnhntt.exec:\tnhntt.exe26⤵
- Executes dropped EXE
PID:3036 -
\??\c:\vdpvv.exec:\vdpvv.exe27⤵
- Executes dropped EXE
PID:1648 -
\??\c:\xxrlxlx.exec:\xxrlxlx.exe28⤵
- Executes dropped EXE
PID:2452 -
\??\c:\7thnhh.exec:\7thnhh.exe29⤵
- Executes dropped EXE
PID:2108 -
\??\c:\ppvpd.exec:\ppvpd.exe30⤵
- Executes dropped EXE
PID:1752 -
\??\c:\ddppd.exec:\ddppd.exe31⤵
- Executes dropped EXE
PID:1076 -
\??\c:\xxlllrf.exec:\xxlllrf.exe32⤵
- Executes dropped EXE
PID:2644 -
\??\c:\nbtbhh.exec:\nbtbhh.exe33⤵
- Executes dropped EXE
PID:1228 -
\??\c:\btnnht.exec:\btnnht.exe34⤵
- Executes dropped EXE
PID:1932 -
\??\c:\jjvpv.exec:\jjvpv.exe35⤵
- Executes dropped EXE
PID:2792 -
\??\c:\frxxlrx.exec:\frxxlrx.exe36⤵
- Executes dropped EXE
PID:2620 -
\??\c:\lfllfll.exec:\lfllfll.exe37⤵
- Executes dropped EXE
PID:2664 -
\??\c:\nbttbt.exec:\nbttbt.exe38⤵
- Executes dropped EXE
PID:2780 -
\??\c:\nbhhbt.exec:\nbhhbt.exe39⤵
- Executes dropped EXE
PID:2516 -
\??\c:\9vppv.exec:\9vppv.exe40⤵
- Executes dropped EXE
PID:3000 -
\??\c:\9pvvp.exec:\9pvvp.exe41⤵
- Executes dropped EXE
PID:2580 -
\??\c:\9frlrrf.exec:\9frlrrf.exe42⤵
- Executes dropped EXE
PID:1456 -
\??\c:\frfffxr.exec:\frfffxr.exe43⤵
- Executes dropped EXE
PID:1820 -
\??\c:\ttbhnt.exec:\ttbhnt.exe44⤵
- Executes dropped EXE
PID:864 -
\??\c:\bhnhbh.exec:\bhnhbh.exe45⤵
- Executes dropped EXE
PID:2152 -
\??\c:\5jddj.exec:\5jddj.exe46⤵
- Executes dropped EXE
PID:2724 -
\??\c:\vjddj.exec:\vjddj.exe47⤵
- Executes dropped EXE
PID:2740 -
\??\c:\1rrxrrr.exec:\1rrxrrr.exe48⤵
- Executes dropped EXE
PID:2700 -
\??\c:\nhhhnn.exec:\nhhhnn.exe49⤵
- Executes dropped EXE
PID:2268 -
\??\c:\btbthb.exec:\btbthb.exe50⤵
- Executes dropped EXE
PID:828 -
\??\c:\9jvjd.exec:\9jvjd.exe51⤵
- Executes dropped EXE
PID:2604 -
\??\c:\dvvdv.exec:\dvvdv.exe52⤵
- Executes dropped EXE
PID:2832 -
\??\c:\vjvpj.exec:\vjvpj.exe53⤵
- Executes dropped EXE
PID:1960 -
\??\c:\1xlfllx.exec:\1xlfllx.exe54⤵
- Executes dropped EXE
PID:1964 -
\??\c:\lfffxfx.exec:\lfffxfx.exe55⤵
- Executes dropped EXE
PID:1956 -
\??\c:\bbbbhn.exec:\bbbbhn.exe56⤵
- Executes dropped EXE
PID:2364 -
\??\c:\5dvdj.exec:\5dvdj.exe57⤵
- Executes dropped EXE
PID:2148 -
\??\c:\pdjpd.exec:\pdjpd.exe58⤵
- Executes dropped EXE
PID:2400 -
\??\c:\fxxlxrx.exec:\fxxlxrx.exe59⤵
- Executes dropped EXE
PID:3056 -
\??\c:\frxlxrr.exec:\frxlxrr.exe60⤵
- Executes dropped EXE
PID:1496 -
\??\c:\htbthn.exec:\htbthn.exe61⤵
- Executes dropped EXE
PID:2280 -
\??\c:\tnnnnb.exec:\tnnnnb.exe62⤵
- Executes dropped EXE
PID:1124 -
\??\c:\pvjjd.exec:\pvjjd.exe63⤵
- Executes dropped EXE
PID:1048 -
\??\c:\pdjpp.exec:\pdjpp.exe64⤵
- Executes dropped EXE
PID:1772 -
\??\c:\rfrrffl.exec:\rfrrffl.exe65⤵
- Executes dropped EXE
PID:3036 -
\??\c:\5llrffr.exec:\5llrffr.exe66⤵PID:1544
-
\??\c:\nhttbb.exec:\nhttbb.exe67⤵PID:1056
-
\??\c:\9hbbnb.exec:\9hbbnb.exe68⤵PID:1064
-
\??\c:\9vdpp.exec:\9vdpp.exe69⤵PID:872
-
\??\c:\9dvdj.exec:\9dvdj.exe70⤵PID:2912
-
\??\c:\7lflffx.exec:\7lflffx.exe71⤵PID:2632
-
\??\c:\rfxfxrl.exec:\rfxfxrl.exe72⤵PID:1560
-
\??\c:\bthnbh.exec:\bthnbh.exe73⤵PID:2768
-
\??\c:\3hbhtb.exec:\3hbhtb.exe74⤵PID:2788
-
\??\c:\9jdpp.exec:\9jdpp.exe75⤵PID:2684
-
\??\c:\vvvjp.exec:\vvvjp.exe76⤵PID:2528
-
\??\c:\5flrffl.exec:\5flrffl.exe77⤵PID:2668
-
\??\c:\xlfllrl.exec:\xlfllrl.exe78⤵PID:2664
-
\??\c:\ttbtnb.exec:\ttbtnb.exe79⤵PID:1220
-
\??\c:\jdpvj.exec:\jdpvj.exe80⤵PID:2196
-
\??\c:\1pjpv.exec:\1pjpv.exe81⤵PID:2520
-
\??\c:\lfxxflx.exec:\lfxxflx.exe82⤵PID:1016
-
\??\c:\rffflll.exec:\rffflll.exe83⤵PID:572
-
\??\c:\bhhnnt.exec:\bhhnnt.exe84⤵PID:2212
-
\??\c:\hbnnnn.exec:\hbnnnn.exe85⤵PID:2124
-
\??\c:\3vjpv.exec:\3vjpv.exe86⤵PID:2136
-
\??\c:\vddvv.exec:\vddvv.exe87⤵PID:1368
-
\??\c:\xrfrxrx.exec:\xrfrxrx.exe88⤵PID:2712
-
\??\c:\7flllff.exec:\7flllff.exe89⤵PID:1252
-
\??\c:\nbtbhn.exec:\nbtbhn.exe90⤵PID:2868
-
\??\c:\nbntht.exec:\nbntht.exe91⤵PID:2900
-
\??\c:\jjdpv.exec:\jjdpv.exe92⤵PID:1996
-
\??\c:\jdpvj.exec:\jdpvj.exe93⤵PID:1948
-
\??\c:\xrfllrr.exec:\xrfllrr.exe94⤵PID:2952
-
\??\c:\bntbnh.exec:\bntbnh.exe95⤵PID:2300
-
\??\c:\5hbtbb.exec:\5hbtbb.exe96⤵PID:780
-
\??\c:\bbnnhh.exec:\bbnnhh.exe97⤵PID:2380
-
\??\c:\3dvjp.exec:\3dvjp.exe98⤵PID:656
-
\??\c:\frflrrl.exec:\frflrrl.exe99⤵PID:1768
-
\??\c:\7xrfrxr.exec:\7xrfrxr.exe100⤵PID:880
-
\??\c:\hbthth.exec:\hbthth.exe101⤵PID:404
-
\??\c:\btbbbb.exec:\btbbbb.exe102⤵PID:1508
-
\??\c:\dvjjv.exec:\dvjjv.exe103⤵PID:1332
-
\??\c:\jdjpj.exec:\jdjpj.exe104⤵PID:1700
-
\??\c:\frrrrxx.exec:\frrrrxx.exe105⤵PID:1656
-
\??\c:\xfflrrl.exec:\xfflrrl.exe106⤵PID:1988
-
\??\c:\1rxfrlr.exec:\1rxfrlr.exe107⤵PID:2444
-
\??\c:\tnbhhh.exec:\tnbhhh.exe108⤵PID:1148
-
\??\c:\tnnnhh.exec:\tnnnhh.exe109⤵PID:2276
-
\??\c:\vpvdd.exec:\vpvdd.exe110⤵PID:2596
-
\??\c:\pddvv.exec:\pddvv.exe111⤵PID:2756
-
\??\c:\7rxfllr.exec:\7rxfllr.exe112⤵PID:2796
-
\??\c:\rfffrrf.exec:\rfffrrf.exe113⤵PID:1676
-
\??\c:\rlxfrrx.exec:\rlxfrrx.exe114⤵PID:2656
-
\??\c:\tntnnn.exec:\tntnnn.exe115⤵PID:1072
-
\??\c:\jvpvj.exec:\jvpvj.exe116⤵PID:2540
-
\??\c:\3pddj.exec:\3pddj.exe117⤵PID:2500
-
\??\c:\fxxxflr.exec:\fxxxflr.exe118⤵PID:2780
-
\??\c:\1llrfxf.exec:\1llrfxf.exe119⤵PID:2204
-
\??\c:\bbnntt.exec:\bbnntt.exe120⤵PID:3000
-
\??\c:\llrfflr.exec:\llrfflr.exe121⤵PID:1632
-
\??\c:\9lrxlfr.exec:\9lrxlfr.exe122⤵PID:620
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-