Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/10/2024, 04:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ebb0d8005614d15ef3f627014effba8582f92df6afd8977101f22c2d09f4606bN.exe
Resource
win7-20240903-en
6 signatures
120 seconds
General
-
Target
ebb0d8005614d15ef3f627014effba8582f92df6afd8977101f22c2d09f4606bN.exe
-
Size
63KB
-
MD5
823cf65a5c4d3666a0750d26e898f020
-
SHA1
c144db1b3e688985e5c2fc171a1870f7707e83b9
-
SHA256
ebb0d8005614d15ef3f627014effba8582f92df6afd8977101f22c2d09f4606b
-
SHA512
41c53fab7cfc4e86efceb973251092fad01befb3edddd1a870d9983ea196599805599752a644a5d86aaf20b151e326f402f9cb58bd8ad64b8c59230fc945fed6
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yU+kbxiT:ymb3NkkiQ3mdBjF0y7kb6
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/2736-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2796-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/536-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3060-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2084-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2060-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2876-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2924-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1564-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2412-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2508-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1716-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/444-229-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2160-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1936-264-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1688-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1632-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2684 xxrrrrx.exe 2964 1fllrrx.exe 2796 7nnhtb.exe 2540 pjjjp.exe 3060 xlxrxxx.exe 536 rlrllrf.exe 576 tnbnth.exe 2084 7vvvv.exe 2368 xllxfff.exe 2060 7bnnnn.exe 1696 bttbhh.exe 2876 3vvdj.exe 2784 rffllrr.exe 2924 fxffrrr.exe 1564 bnnbbt.exe 1720 pjpjd.exe 1940 1pvdd.exe 2984 5llxrfl.exe 2412 htbtbb.exe 2508 bnhhtb.exe 1716 pddvp.exe 1012 xrfflrx.exe 444 1rrxlll.exe 2160 1bttbb.exe 968 bnhtbn.exe 2468 jdddp.exe 1936 xlrffxx.exe 316 nhntbb.exe 1688 7bhnnh.exe 1632 vpddv.exe 2564 3lrrfxr.exe 2980 5rllrrx.exe 2836 hbbbhh.exe 1648 bntbhb.exe 2240 jvjdd.exe 1928 9frrfff.exe 264 9frxxrr.exe 1268 rlrrrrr.exe 2136 bnbbhb.exe 1136 hbnthh.exe 2084 dpddd.exe 2124 dvjjp.exe 1756 ddppd.exe 1160 xlllrxx.exe 2868 thhhhh.exe 1580 bhhttt.exe 2832 5pjvv.exe 2896 jdppd.exe 2936 xrlrlxx.exe 1912 xlxrflx.exe 1724 btttnn.exe 2116 tnnthn.exe 2308 pjppp.exe 2488 djppp.exe 2396 vjjjd.exe 2632 9rffffl.exe 1556 9fxlrxl.exe 1544 hbnthh.exe 1112 nbttbt.exe 2260 dvjpd.exe 1692 vjppp.exe 3040 jdddp.exe 2268 5rfxfff.exe 2440 rlxrffr.exe -
resource yara_rule behavioral1/memory/2736-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2796-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/536-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/576-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/576-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2060-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1564-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2412-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2508-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1716-211-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/444-229-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2160-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1936-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1688-282-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1632-291-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3rfffll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7frrrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnbttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxxfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrlrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2684 2736 ebb0d8005614d15ef3f627014effba8582f92df6afd8977101f22c2d09f4606bN.exe 30 PID 2736 wrote to memory of 2684 2736 ebb0d8005614d15ef3f627014effba8582f92df6afd8977101f22c2d09f4606bN.exe 30 PID 2736 wrote to memory of 2684 2736 ebb0d8005614d15ef3f627014effba8582f92df6afd8977101f22c2d09f4606bN.exe 30 PID 2736 wrote to memory of 2684 2736 ebb0d8005614d15ef3f627014effba8582f92df6afd8977101f22c2d09f4606bN.exe 30 PID 2684 wrote to memory of 2964 2684 xxrrrrx.exe 31 PID 2684 wrote to memory of 2964 2684 xxrrrrx.exe 31 PID 2684 wrote to memory of 2964 2684 xxrrrrx.exe 31 PID 2684 wrote to memory of 2964 2684 xxrrrrx.exe 31 PID 2964 wrote to memory of 2796 2964 1fllrrx.exe 32 PID 2964 wrote to memory of 2796 2964 1fllrrx.exe 32 PID 2964 wrote to memory of 2796 2964 1fllrrx.exe 32 PID 2964 wrote to memory of 2796 2964 1fllrrx.exe 32 PID 2796 wrote to memory of 2540 2796 7nnhtb.exe 33 PID 2796 wrote to memory of 2540 2796 7nnhtb.exe 33 PID 2796 wrote to memory of 2540 2796 7nnhtb.exe 33 PID 2796 wrote to memory of 2540 2796 7nnhtb.exe 33 PID 2540 wrote to memory of 3060 2540 pjjjp.exe 34 PID 2540 wrote to memory of 3060 2540 pjjjp.exe 34 PID 2540 wrote to memory of 3060 2540 pjjjp.exe 34 PID 2540 wrote to memory of 3060 2540 pjjjp.exe 34 PID 3060 wrote to memory of 536 3060 xlxrxxx.exe 35 PID 3060 wrote to memory of 536 3060 xlxrxxx.exe 35 PID 3060 wrote to memory of 536 3060 xlxrxxx.exe 35 PID 3060 wrote to memory of 536 3060 xlxrxxx.exe 35 PID 536 wrote to memory of 576 536 rlrllrf.exe 36 PID 536 wrote to memory of 576 536 rlrllrf.exe 36 PID 536 wrote to memory of 576 536 rlrllrf.exe 36 PID 536 wrote to memory of 576 536 rlrllrf.exe 36 PID 576 wrote to memory of 2084 576 tnbnth.exe 37 PID 576 wrote to memory of 2084 576 tnbnth.exe 37 PID 576 wrote to memory of 2084 576 tnbnth.exe 37 PID 576 wrote to memory of 2084 576 tnbnth.exe 37 PID 2084 wrote to memory of 2368 2084 7vvvv.exe 38 PID 2084 wrote to memory of 2368 2084 7vvvv.exe 38 PID 2084 wrote to memory of 2368 2084 7vvvv.exe 38 PID 2084 wrote to memory of 2368 2084 7vvvv.exe 38 PID 2368 wrote to memory of 2060 2368 xllxfff.exe 39 PID 2368 wrote to memory of 2060 2368 xllxfff.exe 39 PID 2368 wrote to memory of 2060 2368 xllxfff.exe 39 PID 2368 wrote to memory of 2060 2368 xllxfff.exe 39 PID 2060 wrote to memory of 1696 2060 7bnnnn.exe 40 PID 2060 wrote to memory of 1696 2060 7bnnnn.exe 40 PID 2060 wrote to memory of 1696 2060 7bnnnn.exe 40 PID 2060 wrote to memory of 1696 2060 7bnnnn.exe 40 PID 1696 wrote to memory of 2876 1696 bttbhh.exe 41 PID 1696 wrote to memory of 2876 1696 bttbhh.exe 41 PID 1696 wrote to memory of 2876 1696 bttbhh.exe 41 PID 1696 wrote to memory of 2876 1696 bttbhh.exe 41 PID 2876 wrote to memory of 2784 2876 3vvdj.exe 42 PID 2876 wrote to memory of 2784 2876 3vvdj.exe 42 PID 2876 wrote to memory of 2784 2876 3vvdj.exe 42 PID 2876 wrote to memory of 2784 2876 3vvdj.exe 42 PID 2784 wrote to memory of 2924 2784 rffllrr.exe 43 PID 2784 wrote to memory of 2924 2784 rffllrr.exe 43 PID 2784 wrote to memory of 2924 2784 rffllrr.exe 43 PID 2784 wrote to memory of 2924 2784 rffllrr.exe 43 PID 2924 wrote to memory of 1564 2924 fxffrrr.exe 44 PID 2924 wrote to memory of 1564 2924 fxffrrr.exe 44 PID 2924 wrote to memory of 1564 2924 fxffrrr.exe 44 PID 2924 wrote to memory of 1564 2924 fxffrrr.exe 44 PID 1564 wrote to memory of 1720 1564 bnnbbt.exe 45 PID 1564 wrote to memory of 1720 1564 bnnbbt.exe 45 PID 1564 wrote to memory of 1720 1564 bnnbbt.exe 45 PID 1564 wrote to memory of 1720 1564 bnnbbt.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebb0d8005614d15ef3f627014effba8582f92df6afd8977101f22c2d09f4606bN.exe"C:\Users\Admin\AppData\Local\Temp\ebb0d8005614d15ef3f627014effba8582f92df6afd8977101f22c2d09f4606bN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\xxrrrrx.exec:\xxrrrrx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\1fllrrx.exec:\1fllrrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
\??\c:\7nnhtb.exec:\7nnhtb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\pjjjp.exec:\pjjjp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\xlxrxxx.exec:\xlxrxxx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\rlrllrf.exec:\rlrllrf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\tnbnth.exec:\tnbnth.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:576 -
\??\c:\7vvvv.exec:\7vvvv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\xllxfff.exec:\xllxfff.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\7bnnnn.exec:\7bnnnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
\??\c:\bttbhh.exec:\bttbhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
\??\c:\3vvdj.exec:\3vvdj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\rffllrr.exec:\rffllrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\fxffrrr.exec:\fxffrrr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\bnnbbt.exec:\bnnbbt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
\??\c:\pjpjd.exec:\pjpjd.exe17⤵
- Executes dropped EXE
PID:1720 -
\??\c:\1pvdd.exec:\1pvdd.exe18⤵
- Executes dropped EXE
PID:1940 -
\??\c:\5llxrfl.exec:\5llxrfl.exe19⤵
- Executes dropped EXE
PID:2984 -
\??\c:\htbtbb.exec:\htbtbb.exe20⤵
- Executes dropped EXE
PID:2412 -
\??\c:\bnhhtb.exec:\bnhhtb.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2508 -
\??\c:\pddvp.exec:\pddvp.exe22⤵
- Executes dropped EXE
PID:1716 -
\??\c:\xrfflrx.exec:\xrfflrx.exe23⤵
- Executes dropped EXE
PID:1012 -
\??\c:\1rrxlll.exec:\1rrxlll.exe24⤵
- Executes dropped EXE
PID:444 -
\??\c:\1bttbb.exec:\1bttbb.exe25⤵
- Executes dropped EXE
PID:2160 -
\??\c:\bnhtbn.exec:\bnhtbn.exe26⤵
- Executes dropped EXE
PID:968 -
\??\c:\jdddp.exec:\jdddp.exe27⤵
- Executes dropped EXE
PID:2468 -
\??\c:\xlrffxx.exec:\xlrffxx.exe28⤵
- Executes dropped EXE
PID:1936 -
\??\c:\nhntbb.exec:\nhntbb.exe29⤵
- Executes dropped EXE
PID:316 -
\??\c:\7bhnnh.exec:\7bhnnh.exe30⤵
- Executes dropped EXE
PID:1688 -
\??\c:\vpddv.exec:\vpddv.exe31⤵
- Executes dropped EXE
PID:1632 -
\??\c:\3lrrfxr.exec:\3lrrfxr.exe32⤵
- Executes dropped EXE
PID:2564 -
\??\c:\5rllrrx.exec:\5rllrrx.exe33⤵
- Executes dropped EXE
PID:2980 -
\??\c:\hbbbhh.exec:\hbbbhh.exe34⤵
- Executes dropped EXE
PID:2836 -
\??\c:\bntbhb.exec:\bntbhb.exe35⤵
- Executes dropped EXE
PID:1648 -
\??\c:\jvjdd.exec:\jvjdd.exe36⤵
- Executes dropped EXE
PID:2240 -
\??\c:\9frrfff.exec:\9frrfff.exe37⤵
- Executes dropped EXE
PID:1928 -
\??\c:\9frxxrr.exec:\9frxxrr.exe38⤵
- Executes dropped EXE
PID:264 -
\??\c:\rlrrrrr.exec:\rlrrrrr.exe39⤵
- Executes dropped EXE
PID:1268 -
\??\c:\bnbbhb.exec:\bnbbhb.exe40⤵
- Executes dropped EXE
PID:2136 -
\??\c:\hbnthh.exec:\hbnthh.exe41⤵
- Executes dropped EXE
PID:1136 -
\??\c:\dpddd.exec:\dpddd.exe42⤵
- Executes dropped EXE
PID:2084 -
\??\c:\dvjjp.exec:\dvjjp.exe43⤵
- Executes dropped EXE
PID:2124 -
\??\c:\ddppd.exec:\ddppd.exe44⤵
- Executes dropped EXE
PID:1756 -
\??\c:\xlllrxx.exec:\xlllrxx.exe45⤵
- Executes dropped EXE
PID:1160 -
\??\c:\thhhhh.exec:\thhhhh.exe46⤵
- Executes dropped EXE
PID:2868 -
\??\c:\bhhttt.exec:\bhhttt.exe47⤵
- Executes dropped EXE
PID:1580 -
\??\c:\5pjvv.exec:\5pjvv.exe48⤵
- Executes dropped EXE
PID:2832 -
\??\c:\jdppd.exec:\jdppd.exe49⤵
- Executes dropped EXE
PID:2896 -
\??\c:\xrlrlxx.exec:\xrlrlxx.exe50⤵
- Executes dropped EXE
PID:2936 -
\??\c:\xlxrflx.exec:\xlxrflx.exe51⤵
- Executes dropped EXE
PID:1912 -
\??\c:\btttnn.exec:\btttnn.exe52⤵
- Executes dropped EXE
PID:1724 -
\??\c:\tnnthn.exec:\tnnthn.exe53⤵
- Executes dropped EXE
PID:2116 -
\??\c:\pjppp.exec:\pjppp.exe54⤵
- Executes dropped EXE
PID:2308 -
\??\c:\djppp.exec:\djppp.exe55⤵
- Executes dropped EXE
PID:2488 -
\??\c:\vjjjd.exec:\vjjjd.exe56⤵
- Executes dropped EXE
PID:2396 -
\??\c:\9rffffl.exec:\9rffffl.exe57⤵
- Executes dropped EXE
PID:2632 -
\??\c:\9fxlrxl.exec:\9fxlrxl.exe58⤵
- Executes dropped EXE
PID:1556 -
\??\c:\hbnthh.exec:\hbnthh.exe59⤵
- Executes dropped EXE
PID:1544 -
\??\c:\nbttbt.exec:\nbttbt.exe60⤵
- Executes dropped EXE
PID:1112 -
\??\c:\dvjpd.exec:\dvjpd.exe61⤵
- Executes dropped EXE
PID:2260 -
\??\c:\vjppp.exec:\vjppp.exe62⤵
- Executes dropped EXE
PID:1692 -
\??\c:\jdddp.exec:\jdddp.exe63⤵
- Executes dropped EXE
PID:3040 -
\??\c:\5rfxfff.exec:\5rfxfff.exe64⤵
- Executes dropped EXE
PID:2268 -
\??\c:\rlxrffr.exec:\rlxrffr.exe65⤵
- Executes dropped EXE
PID:2440 -
\??\c:\bthbbt.exec:\bthbbt.exe66⤵PID:2432
-
\??\c:\nhhhnt.exec:\nhhhnt.exe67⤵PID:3012
-
\??\c:\jpvjd.exec:\jpvjd.exe68⤵PID:3024
-
\??\c:\lrxxrlr.exec:\lrxxrlr.exe69⤵PID:2684
-
\??\c:\bhtttn.exec:\bhtttn.exe70⤵PID:2664
-
\??\c:\tbhttt.exec:\tbhttt.exe71⤵PID:2668
-
\??\c:\nbhbnt.exec:\nbhbnt.exe72⤵PID:2848
-
\??\c:\jdvjj.exec:\jdvjj.exe73⤵PID:1536
-
\??\c:\jvjvv.exec:\jvjvv.exe74⤵PID:2572
-
\??\c:\5llfxfl.exec:\5llfxfl.exe75⤵PID:2404
-
\??\c:\7rfffff.exec:\7rfffff.exe76⤵PID:2524
-
\??\c:\5rlffrx.exec:\5rlffrx.exe77⤵PID:2252
-
\??\c:\thnhht.exec:\thnhht.exe78⤵PID:592
-
\??\c:\bnnhhh.exec:\bnnhhh.exe79⤵PID:624
-
\??\c:\jvppj.exec:\jvppj.exe80⤵PID:576
-
\??\c:\jvjdd.exec:\jvjdd.exe81⤵PID:2072
-
\??\c:\3vvpj.exec:\3vvpj.exe82⤵PID:2148
-
\??\c:\5xflrxr.exec:\5xflrxr.exe83⤵PID:2368
-
\??\c:\fxffrlr.exec:\fxffrlr.exe84⤵PID:1252
-
\??\c:\7bnnnh.exec:\7bnnnh.exe85⤵PID:2912
-
\??\c:\nbhbhh.exec:\nbhbhh.exe86⤵PID:2828
-
\??\c:\1hbbnt.exec:\1hbbnt.exe87⤵PID:2820
-
\??\c:\jvvpp.exec:\jvvpp.exe88⤵PID:2944
-
\??\c:\1ddjj.exec:\1ddjj.exe89⤵PID:2872
-
\??\c:\lffllfl.exec:\lffllfl.exe90⤵PID:2936
-
\??\c:\frrrfxx.exec:\frrrfxx.exe91⤵PID:1452
-
\??\c:\fllffff.exec:\fllffff.exe92⤵PID:2092
-
\??\c:\nbbhnn.exec:\nbbhnn.exe93⤵PID:2976
-
\??\c:\3ntntn.exec:\3ntntn.exe94⤵PID:2984
-
\??\c:\1dpjp.exec:\1dpjp.exe95⤵PID:2192
-
\??\c:\jpvpj.exec:\jpvpj.exe96⤵PID:2408
-
\??\c:\7xlrlff.exec:\7xlrlff.exe97⤵PID:840
-
\??\c:\lxxxfxf.exec:\lxxxfxf.exe98⤵
- System Location Discovery: System Language Discovery
PID:1608 -
\??\c:\5htttt.exec:\5htttt.exe99⤵PID:2200
-
\??\c:\9nhbbt.exec:\9nhbbt.exe100⤵PID:2364
-
\??\c:\jdpvv.exec:\jdpvv.exe101⤵PID:2128
-
\??\c:\7jdvv.exec:\7jdvv.exe102⤵PID:272
-
\??\c:\5lllrrr.exec:\5lllrrr.exe103⤵PID:948
-
\??\c:\frfxxff.exec:\frfxxff.exe104⤵PID:2328
-
\??\c:\ntttbh.exec:\ntttbh.exe105⤵PID:1936
-
\??\c:\bhnntn.exec:\bhnntn.exe106⤵PID:2676
-
\??\c:\3nhnnh.exec:\3nhnnh.exe107⤵PID:2244
-
\??\c:\jdjdd.exec:\jdjdd.exe108⤵PID:2684
-
\??\c:\jdvpv.exec:\jdvpv.exe109⤵PID:2780
-
\??\c:\1xlrfff.exec:\1xlrfff.exe110⤵PID:2576
-
\??\c:\rfflrll.exec:\rfflrll.exe111⤵PID:1592
-
\??\c:\htbbtn.exec:\htbbtn.exe112⤵PID:2672
-
\??\c:\thnnhh.exec:\thnnhh.exe113⤵PID:2528
-
\??\c:\jddvd.exec:\jddvd.exe114⤵PID:2016
-
\??\c:\3dpvd.exec:\3dpvd.exe115⤵PID:596
-
\??\c:\rffxrlx.exec:\rffxrlx.exe116⤵PID:484
-
\??\c:\xlrrlfx.exec:\xlrrlfx.exe117⤵PID:2532
-
\??\c:\thhnhb.exec:\thhnhb.exe118⤵PID:792
-
\??\c:\tbbnht.exec:\tbbnht.exe119⤵PID:2108
-
\??\c:\nbhbbb.exec:\nbhbbb.exe120⤵PID:2072
-
\??\c:\jddjd.exec:\jddjd.exe121⤵PID:2928
-
\??\c:\dvpvd.exec:\dvpvd.exe122⤵PID:1248
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-