Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
bbcbc89c52699aa7a6841287619ffec0N.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
120 seconds
General
-
Target
bbcbc89c52699aa7a6841287619ffec0N.exe
-
Size
70KB
-
MD5
bbcbc89c52699aa7a6841287619ffec0
-
SHA1
c78f0ffe144e9094968fa283cf28a348fc25d18f
-
SHA256
35175234c8e6192338a30c4b955daad9e403656167eda8d40d385bc75d216ecd
-
SHA512
8f777e0e4904e27c317e4620d93d11799d995ee5ba5774d18e537172abfce3ded57255d7a6325ee9dae8b1756ea86ea4a3a4e47721f658b5562a85e1e194589f
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIJ/RWPqBr3:ymb3NkkiQ3mdBjFIqsr3
Malware Config
Signatures
-
Detect Blackmoon payload 17 IoCs
resource yara_rule behavioral1/memory/1292-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2060-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1136-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1136-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2308-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1952-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2636-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1296-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2032-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1520-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1504-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1512-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1944-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1704-267-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2060 3nhntb.exe 1136 jvpvd.exe 2308 rlxfrrx.exe 1952 lfrxrlr.exe 2828 bbthth.exe 2636 ppppv.exe 2664 xrxfrxf.exe 2908 hbhbht.exe 1296 ttnhht.exe 2012 7dvpj.exe 2032 dvdpp.exe 1788 9xllrfl.exe 1520 rlrxlrx.exe 2952 tthnbb.exe 1504 vvvjv.exe 1100 ppdpd.exe 1512 lrffrfr.exe 2272 tntbhn.exe 2168 bhtbhn.exe 1944 jpvpp.exe 1636 pjvvd.exe 1096 fllxxll.exe 2608 rllrffr.exe 1356 tnhnbh.exe 2356 btnntt.exe 2516 jdvvj.exe 1704 pvddd.exe 1968 lfrfffl.exe 896 tnhnbt.exe 852 nhbhtb.exe 2708 jvpvd.exe 2712 jvppd.exe 3044 xlxrxxf.exe 2260 7fxfllx.exe 2824 ttntbb.exe 2768 bnnbhn.exe 3068 dvdjd.exe 2752 dpddp.exe 2788 7vpjv.exe 2656 xlrrxxf.exe 2444 xrxflxl.exe 2584 nhnthh.exe 2680 ttbbhn.exe 1296 3xfflfl.exe 2868 rrfxflr.exe 992 9hbbtb.exe 2972 nhnttb.exe 2880 jdppj.exe 1520 frllrff.exe 2716 xfrrfff.exe 1316 nbhtbt.exe 2804 bnntnt.exe 3028 jdvvj.exe 3040 5dpvv.exe 2140 rlxxxfl.exe 840 fxlrxrx.exe 2496 nhtbhn.exe 2348 nhtbtt.exe 2192 1pdvd.exe 844 dddjj.exe 1916 9rlrxxl.exe 1356 frfrffr.exe 1696 nhntbt.exe 2464 thnhbn.exe -
resource yara_rule behavioral1/memory/1292-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2060-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1136-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1136-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2308-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2308-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1952-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2636-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1296-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2032-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1520-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1504-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1512-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1944-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1704-267-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnbhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfrlxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rrlxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fxlflr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7tthtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxfxff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2060 1292 bbcbc89c52699aa7a6841287619ffec0N.exe 30 PID 1292 wrote to memory of 2060 1292 bbcbc89c52699aa7a6841287619ffec0N.exe 30 PID 1292 wrote to memory of 2060 1292 bbcbc89c52699aa7a6841287619ffec0N.exe 30 PID 1292 wrote to memory of 2060 1292 bbcbc89c52699aa7a6841287619ffec0N.exe 30 PID 2060 wrote to memory of 1136 2060 3nhntb.exe 31 PID 2060 wrote to memory of 1136 2060 3nhntb.exe 31 PID 2060 wrote to memory of 1136 2060 3nhntb.exe 31 PID 2060 wrote to memory of 1136 2060 3nhntb.exe 31 PID 1136 wrote to memory of 2308 1136 jvpvd.exe 32 PID 1136 wrote to memory of 2308 1136 jvpvd.exe 32 PID 1136 wrote to memory of 2308 1136 jvpvd.exe 32 PID 1136 wrote to memory of 2308 1136 jvpvd.exe 32 PID 2308 wrote to memory of 1952 2308 rlxfrrx.exe 33 PID 2308 wrote to memory of 1952 2308 rlxfrrx.exe 33 PID 2308 wrote to memory of 1952 2308 rlxfrrx.exe 33 PID 2308 wrote to memory of 1952 2308 rlxfrrx.exe 33 PID 1952 wrote to memory of 2828 1952 lfrxrlr.exe 34 PID 1952 wrote to memory of 2828 1952 lfrxrlr.exe 34 PID 1952 wrote to memory of 2828 1952 lfrxrlr.exe 34 PID 1952 wrote to memory of 2828 1952 lfrxrlr.exe 34 PID 2828 wrote to memory of 2636 2828 bbthth.exe 35 PID 2828 wrote to memory of 2636 2828 bbthth.exe 35 PID 2828 wrote to memory of 2636 2828 bbthth.exe 35 PID 2828 wrote to memory of 2636 2828 bbthth.exe 35 PID 2636 wrote to memory of 2664 2636 ppppv.exe 36 PID 2636 wrote to memory of 2664 2636 ppppv.exe 36 PID 2636 wrote to memory of 2664 2636 ppppv.exe 36 PID 2636 wrote to memory of 2664 2636 ppppv.exe 36 PID 2664 wrote to memory of 2908 2664 xrxfrxf.exe 37 PID 2664 wrote to memory of 2908 2664 xrxfrxf.exe 37 PID 2664 wrote to memory of 2908 2664 xrxfrxf.exe 37 PID 2664 wrote to memory of 2908 2664 xrxfrxf.exe 37 PID 2908 wrote to memory of 1296 2908 hbhbht.exe 38 PID 2908 wrote to memory of 1296 2908 hbhbht.exe 38 PID 2908 wrote to memory of 1296 2908 hbhbht.exe 38 PID 2908 wrote to memory of 1296 2908 hbhbht.exe 38 PID 1296 wrote to memory of 2012 1296 ttnhht.exe 39 PID 1296 wrote to memory of 2012 1296 ttnhht.exe 39 PID 1296 wrote to memory of 2012 1296 ttnhht.exe 39 PID 1296 wrote to memory of 2012 1296 ttnhht.exe 39 PID 2012 wrote to memory of 2032 2012 7dvpj.exe 40 PID 2012 wrote to memory of 2032 2012 7dvpj.exe 40 PID 2012 wrote to memory of 2032 2012 7dvpj.exe 40 PID 2012 wrote to memory of 2032 2012 7dvpj.exe 40 PID 2032 wrote to memory of 1788 2032 dvdpp.exe 41 PID 2032 wrote to memory of 1788 2032 dvdpp.exe 41 PID 2032 wrote to memory of 1788 2032 dvdpp.exe 41 PID 2032 wrote to memory of 1788 2032 dvdpp.exe 41 PID 1788 wrote to memory of 1520 1788 9xllrfl.exe 42 PID 1788 wrote to memory of 1520 1788 9xllrfl.exe 42 PID 1788 wrote to memory of 1520 1788 9xllrfl.exe 42 PID 1788 wrote to memory of 1520 1788 9xllrfl.exe 42 PID 1520 wrote to memory of 2952 1520 rlrxlrx.exe 43 PID 1520 wrote to memory of 2952 1520 rlrxlrx.exe 43 PID 1520 wrote to memory of 2952 1520 rlrxlrx.exe 43 PID 1520 wrote to memory of 2952 1520 rlrxlrx.exe 43 PID 2952 wrote to memory of 1504 2952 tthnbb.exe 44 PID 2952 wrote to memory of 1504 2952 tthnbb.exe 44 PID 2952 wrote to memory of 1504 2952 tthnbb.exe 44 PID 2952 wrote to memory of 1504 2952 tthnbb.exe 44 PID 1504 wrote to memory of 1100 1504 vvvjv.exe 45 PID 1504 wrote to memory of 1100 1504 vvvjv.exe 45 PID 1504 wrote to memory of 1100 1504 vvvjv.exe 45 PID 1504 wrote to memory of 1100 1504 vvvjv.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbcbc89c52699aa7a6841287619ffec0N.exe"C:\Users\Admin\AppData\Local\Temp\bbcbc89c52699aa7a6841287619ffec0N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
\??\c:\3nhntb.exec:\3nhntb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
\??\c:\jvpvd.exec:\jvpvd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
\??\c:\rlxfrrx.exec:\rlxfrrx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\lfrxrlr.exec:\lfrxrlr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\bbthth.exec:\bbthth.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\ppppv.exec:\ppppv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
\??\c:\xrxfrxf.exec:\xrxfrxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\hbhbht.exec:\hbhbht.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\ttnhht.exec:\ttnhht.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1296 -
\??\c:\7dvpj.exec:\7dvpj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\dvdpp.exec:\dvdpp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2032 -
\??\c:\9xllrfl.exec:\9xllrfl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\rlrxlrx.exec:\rlrxlrx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\tthnbb.exec:\tthnbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\vvvjv.exec:\vvvjv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\ppdpd.exec:\ppdpd.exe17⤵
- Executes dropped EXE
PID:1100 -
\??\c:\lrffrfr.exec:\lrffrfr.exe18⤵
- Executes dropped EXE
PID:1512 -
\??\c:\tntbhn.exec:\tntbhn.exe19⤵
- Executes dropped EXE
PID:2272 -
\??\c:\bhtbhn.exec:\bhtbhn.exe20⤵
- Executes dropped EXE
PID:2168 -
\??\c:\jpvpp.exec:\jpvpp.exe21⤵
- Executes dropped EXE
PID:1944 -
\??\c:\pjvvd.exec:\pjvvd.exe22⤵
- Executes dropped EXE
PID:1636 -
\??\c:\fllxxll.exec:\fllxxll.exe23⤵
- Executes dropped EXE
PID:1096 -
\??\c:\rllrffr.exec:\rllrffr.exe24⤵
- Executes dropped EXE
PID:2608 -
\??\c:\tnhnbh.exec:\tnhnbh.exe25⤵
- Executes dropped EXE
PID:1356 -
\??\c:\btnntt.exec:\btnntt.exe26⤵
- Executes dropped EXE
PID:2356 -
\??\c:\jdvvj.exec:\jdvvj.exe27⤵
- Executes dropped EXE
PID:2516 -
\??\c:\pvddd.exec:\pvddd.exe28⤵
- Executes dropped EXE
PID:1704 -
\??\c:\lfrfffl.exec:\lfrfffl.exe29⤵
- Executes dropped EXE
PID:1968 -
\??\c:\tnhnbt.exec:\tnhnbt.exe30⤵
- Executes dropped EXE
PID:896 -
\??\c:\nhbhtb.exec:\nhbhtb.exe31⤵
- Executes dropped EXE
PID:852 -
\??\c:\jvpvd.exec:\jvpvd.exe32⤵
- Executes dropped EXE
PID:2708 -
\??\c:\jvppd.exec:\jvppd.exe33⤵
- Executes dropped EXE
PID:2712 -
\??\c:\xlxrxxf.exec:\xlxrxxf.exe34⤵
- Executes dropped EXE
PID:3044 -
\??\c:\7fxfllx.exec:\7fxfllx.exe35⤵
- Executes dropped EXE
PID:2260 -
\??\c:\ttntbb.exec:\ttntbb.exe36⤵
- Executes dropped EXE
PID:2824 -
\??\c:\bnnbhn.exec:\bnnbhn.exe37⤵
- Executes dropped EXE
PID:2768 -
\??\c:\dvdjd.exec:\dvdjd.exe38⤵
- Executes dropped EXE
PID:3068 -
\??\c:\dpddp.exec:\dpddp.exe39⤵
- Executes dropped EXE
PID:2752 -
\??\c:\7vpjv.exec:\7vpjv.exe40⤵
- Executes dropped EXE
PID:2788 -
\??\c:\xlrrxxf.exec:\xlrrxxf.exe41⤵
- Executes dropped EXE
PID:2656 -
\??\c:\xrxflxl.exec:\xrxflxl.exe42⤵
- Executes dropped EXE
PID:2444 -
\??\c:\nhnthh.exec:\nhnthh.exe43⤵
- Executes dropped EXE
PID:2584 -
\??\c:\ttbbhn.exec:\ttbbhn.exe44⤵
- Executes dropped EXE
PID:2680 -
\??\c:\3xfflfl.exec:\3xfflfl.exe45⤵
- Executes dropped EXE
PID:1296 -
\??\c:\rrfxflr.exec:\rrfxflr.exe46⤵
- Executes dropped EXE
PID:2868 -
\??\c:\9hbbtb.exec:\9hbbtb.exe47⤵
- Executes dropped EXE
PID:992 -
\??\c:\nhnttb.exec:\nhnttb.exe48⤵
- Executes dropped EXE
PID:2972 -
\??\c:\jdppj.exec:\jdppj.exe49⤵
- Executes dropped EXE
PID:2880 -
\??\c:\frllrff.exec:\frllrff.exe50⤵
- Executes dropped EXE
PID:1520 -
\??\c:\xfrrfff.exec:\xfrrfff.exe51⤵
- Executes dropped EXE
PID:2716 -
\??\c:\nbhtbt.exec:\nbhtbt.exe52⤵
- Executes dropped EXE
PID:1316 -
\??\c:\bnntnt.exec:\bnntnt.exe53⤵
- Executes dropped EXE
PID:2804 -
\??\c:\jdvvj.exec:\jdvvj.exe54⤵
- Executes dropped EXE
PID:3028 -
\??\c:\5dpvv.exec:\5dpvv.exe55⤵
- Executes dropped EXE
PID:3040 -
\??\c:\rlxxxfl.exec:\rlxxxfl.exe56⤵
- Executes dropped EXE
PID:2140 -
\??\c:\fxlrxrx.exec:\fxlrxrx.exe57⤵
- Executes dropped EXE
PID:840 -
\??\c:\nhtbhn.exec:\nhtbhn.exe58⤵
- Executes dropped EXE
PID:2496 -
\??\c:\nhtbtt.exec:\nhtbtt.exe59⤵
- Executes dropped EXE
PID:2348 -
\??\c:\1pdvd.exec:\1pdvd.exe60⤵
- Executes dropped EXE
PID:2192 -
\??\c:\dddjj.exec:\dddjj.exe61⤵
- Executes dropped EXE
PID:844 -
\??\c:\9rlrxxl.exec:\9rlrxxl.exe62⤵
- Executes dropped EXE
PID:1916 -
\??\c:\frfrffr.exec:\frfrffr.exe63⤵
- Executes dropped EXE
PID:1356 -
\??\c:\nhntbt.exec:\nhntbt.exe64⤵
- Executes dropped EXE
PID:1696 -
\??\c:\thnhbn.exec:\thnhbn.exe65⤵
- Executes dropped EXE
PID:2464 -
\??\c:\tnbnnt.exec:\tnbnnt.exe66⤵PID:2468
-
\??\c:\djdvv.exec:\djdvv.exe67⤵PID:2188
-
\??\c:\dvddd.exec:\dvddd.exe68⤵
- System Location Discovery: System Language Discovery
PID:1876 -
\??\c:\fxrrfxf.exec:\fxrrfxf.exe69⤵PID:2268
-
\??\c:\rlflrlr.exec:\rlflrlr.exe70⤵PID:2064
-
\??\c:\nbnhtn.exec:\nbnhtn.exe71⤵PID:2552
-
\??\c:\bnhnth.exec:\bnhnth.exe72⤵PID:2708
-
\??\c:\tnnnbh.exec:\tnnnbh.exe73⤵PID:2712
-
\??\c:\3vpvv.exec:\3vpvv.exe74⤵PID:780
-
\??\c:\3jpvd.exec:\3jpvd.exe75⤵PID:2324
-
\??\c:\lffrflr.exec:\lffrflr.exe76⤵PID:2772
-
\??\c:\xlxllxx.exec:\xlxllxx.exe77⤵PID:2876
-
\??\c:\nbnbbb.exec:\nbnbbb.exe78⤵PID:2916
-
\??\c:\9thntb.exec:\9thntb.exe79⤵PID:2992
-
\??\c:\pjdvv.exec:\pjdvv.exe80⤵PID:2808
-
\??\c:\dddjd.exec:\dddjd.exe81⤵PID:2740
-
\??\c:\xrlxlfl.exec:\xrlxlfl.exe82⤵PID:2748
-
\??\c:\7lfxlxl.exec:\7lfxlxl.exe83⤵PID:2528
-
\??\c:\nnhntn.exec:\nnhntn.exe84⤵PID:1812
-
\??\c:\hbtbbh.exec:\hbtbbh.exe85⤵PID:1112
-
\??\c:\dvdjj.exec:\dvdjj.exe86⤵PID:1028
-
\??\c:\pdppp.exec:\pdppp.exe87⤵PID:3012
-
\??\c:\9rrlxlx.exec:\9rrlxlx.exe88⤵
- System Location Discovery: System Language Discovery
PID:2696 -
\??\c:\frffllr.exec:\frffllr.exe89⤵PID:580
-
\??\c:\bthbtb.exec:\bthbtb.exe90⤵PID:1616
-
\??\c:\hhbnth.exec:\hhbnth.exe91⤵PID:1272
-
\??\c:\1djdj.exec:\1djdj.exe92⤵PID:1516
-
\??\c:\jdppj.exec:\jdppj.exe93⤵PID:2004
-
\??\c:\xxrxlrx.exec:\xxrxlrx.exe94⤵PID:3036
-
\??\c:\9fxrrrx.exec:\9fxrrrx.exe95⤵PID:2272
-
\??\c:\9tttbb.exec:\9tttbb.exe96⤵PID:2424
-
\??\c:\bnhnth.exec:\bnhnth.exe97⤵PID:2304
-
\??\c:\jvpjp.exec:\jvpjp.exe98⤵PID:760
-
\??\c:\vppjp.exec:\vppjp.exe99⤵PID:2348
-
\??\c:\xrllfrx.exec:\xrllfrx.exe100⤵PID:1096
-
\??\c:\rffllfx.exec:\rffllfx.exe101⤵PID:1612
-
\??\c:\hbntbh.exec:\hbntbh.exe102⤵PID:1408
-
\??\c:\pjjdp.exec:\pjjdp.exe103⤵PID:1652
-
\??\c:\jjjvj.exec:\jjjvj.exe104⤵PID:2220
-
\??\c:\jjvdj.exec:\jjvdj.exe105⤵PID:1756
-
\??\c:\rlrffll.exec:\rlrffll.exe106⤵PID:2116
-
\??\c:\5rrfrxl.exec:\5rrfrxl.exe107⤵PID:1908
-
\??\c:\hhbhnb.exec:\hhbhnb.exe108⤵PID:2124
-
\??\c:\nhtbbn.exec:\nhtbbn.exe109⤵PID:320
-
\??\c:\jvdjj.exec:\jvdjj.exe110⤵PID:3048
-
\??\c:\vvjvj.exec:\vvjvj.exe111⤵PID:2560
-
\??\c:\lxrllxx.exec:\lxrllxx.exe112⤵PID:2060
-
\??\c:\9fxlfrx.exec:\9fxlfrx.exe113⤵PID:2924
-
\??\c:\1bnnbb.exec:\1bnnbb.exe114⤵PID:2736
-
\??\c:\bnbtnt.exec:\bnbtnt.exe115⤵PID:2852
-
\??\c:\dpjdj.exec:\dpjdj.exe116⤵PID:1952
-
\??\c:\jjjvp.exec:\jjjvp.exe117⤵PID:2756
-
\??\c:\fffrxfr.exec:\fffrxfr.exe118⤵PID:3056
-
\??\c:\5lrxrff.exec:\5lrxrff.exe119⤵PID:1172
-
\??\c:\hbntnt.exec:\hbntnt.exe120⤵PID:2672
-
\??\c:\htbnth.exec:\htbnth.exe121⤵PID:2660
-
\??\c:\7vpvv.exec:\7vpvv.exe122⤵PID:2676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-