Analysis
-
max time kernel
17s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 23:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0230d789b924c8467e76058f2baff7f0_JaffaCakes118.exe
Resource
win7-20240729-en
6 signatures
150 seconds
General
-
Target
0230d789b924c8467e76058f2baff7f0_JaffaCakes118.exe
-
Size
117KB
-
MD5
0230d789b924c8467e76058f2baff7f0
-
SHA1
c65b4ee86c022c1213ceeacee04ade433edd4339
-
SHA256
1b38713a9aa5fcd6c2798d87bdebded8e0e3810d2fbccedbc4b477ecd7bd6d08
-
SHA512
328419ccccc0e376ebf724db4917207f19326ba16b918f03a9edf2edb92bcb60c10b534ae892c3eb7dc433e8b43114e8fcffcc298af3bc354f3ccd4d0e8b6d6c
-
SSDEEP
3072:ymb3NkkiQ3mdBjFWXkj7afoHvmQ+EZMYX93s7:n3C9BRW0j/uVEZFFs7
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/1732-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-302-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/868-292-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/996-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3004-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2896-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2384-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2188-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1308-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2856-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2856-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2224-31-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2224-30-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2448-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1712-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2448 9pjpp.exe 2224 1vpvd.exe 2828 xrlxfrx.exe 2856 xflffxr.exe 2780 7nbhth.exe 1732 dvjjp.exe 2676 xxxlfxr.exe 2204 xxffxrr.exe 1308 thbnbh.exe 2188 9hbbhn.exe 2384 pjjdv.exe 2948 fffxlrr.exe 2332 xxlxlrx.exe 1408 7bthnn.exe 2896 nnnnbh.exe 3004 jpjjd.exe 996 pvjvv.exe 2520 flxrfrr.exe 3048 hhhnnt.exe 2012 bbhnnh.exe 2296 9ppdv.exe 2220 ddvdv.exe 632 ffxfrxl.exe 2492 llffrxl.exe 552 bbtbtb.exe 1488 bbnhtb.exe 2196 pppvp.exe 1684 3xfrxrx.exe 3028 ttttnt.exe 868 ttnbnt.exe 2700 jppdv.exe 2448 3llrxfx.exe 2748 bhthtn.exe 2772 9bhhth.exe 2436 jjjjd.exe 2960 dddvv.exe 2612 9ffrlxr.exe 2696 7xxlxfr.exe 2168 tnhhtb.exe 880 tnbbnh.exe 2760 1hhbtb.exe 2376 5jpvd.exe 1628 vdvdp.exe 2964 3fxlxlx.exe 2948 3lxlrfx.exe 2180 1lrflxx.exe 2956 bnbtbn.exe 572 bhhtnh.exe 276 nnbtnh.exe 448 vdpvj.exe 1036 1jppv.exe 2148 5lxrlff.exe 2212 xxxlffr.exe 1212 1bhtnh.exe 264 ntbbnt.exe 2880 nhbbnt.exe 2108 ddvdv.exe 1856 jjdpv.exe 672 9dpdj.exe 3036 7fxxflf.exe 920 xxrfrxx.exe 1740 fxxfxrl.exe 2196 bbhtnb.exe 860 tnbnbh.exe -
resource yara_rule behavioral1/memory/2780-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1732-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-302-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/868-292-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/996-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3004-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2384-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2188-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1308-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2224-30-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2448-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1712-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1712-3-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3lfrlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1flfffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hnbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxffxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrfxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llxfxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1hhbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrxrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxlfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5frxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ffffrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fllxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5pppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jddjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ppvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnnthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7btbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppvpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhhbnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lllfrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffxlrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pppp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxllxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ppjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrxlfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhtnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1pjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xfxfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlflxlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlrxlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9thhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfrxxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9thhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tthhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttnntb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttthbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5xxfrfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxlrlrr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2448 1712 0230d789b924c8467e76058f2baff7f0_JaffaCakes118.exe 29 PID 1712 wrote to memory of 2448 1712 0230d789b924c8467e76058f2baff7f0_JaffaCakes118.exe 29 PID 1712 wrote to memory of 2448 1712 0230d789b924c8467e76058f2baff7f0_JaffaCakes118.exe 29 PID 1712 wrote to memory of 2448 1712 0230d789b924c8467e76058f2baff7f0_JaffaCakes118.exe 29 PID 2448 wrote to memory of 2224 2448 9pjpp.exe 30 PID 2448 wrote to memory of 2224 2448 9pjpp.exe 30 PID 2448 wrote to memory of 2224 2448 9pjpp.exe 30 PID 2448 wrote to memory of 2224 2448 9pjpp.exe 30 PID 2224 wrote to memory of 2828 2224 1vpvd.exe 31 PID 2224 wrote to memory of 2828 2224 1vpvd.exe 31 PID 2224 wrote to memory of 2828 2224 1vpvd.exe 31 PID 2224 wrote to memory of 2828 2224 1vpvd.exe 31 PID 2828 wrote to memory of 2856 2828 xrlxfrx.exe 32 PID 2828 wrote to memory of 2856 2828 xrlxfrx.exe 32 PID 2828 wrote to memory of 2856 2828 xrlxfrx.exe 32 PID 2828 wrote to memory of 2856 2828 xrlxfrx.exe 32 PID 2856 wrote to memory of 2780 2856 xflffxr.exe 33 PID 2856 wrote to memory of 2780 2856 xflffxr.exe 33 PID 2856 wrote to memory of 2780 2856 xflffxr.exe 33 PID 2856 wrote to memory of 2780 2856 xflffxr.exe 33 PID 2780 wrote to memory of 1732 2780 7nbhth.exe 34 PID 2780 wrote to memory of 1732 2780 7nbhth.exe 34 PID 2780 wrote to memory of 1732 2780 7nbhth.exe 34 PID 2780 wrote to memory of 1732 2780 7nbhth.exe 34 PID 1732 wrote to memory of 2676 1732 dvjjp.exe 35 PID 1732 wrote to memory of 2676 1732 dvjjp.exe 35 PID 1732 wrote to memory of 2676 1732 dvjjp.exe 35 PID 1732 wrote to memory of 2676 1732 dvjjp.exe 35 PID 2676 wrote to memory of 2204 2676 xxxlfxr.exe 36 PID 2676 wrote to memory of 2204 2676 xxxlfxr.exe 36 PID 2676 wrote to memory of 2204 2676 xxxlfxr.exe 36 PID 2676 wrote to memory of 2204 2676 xxxlfxr.exe 36 PID 2204 wrote to memory of 1308 2204 xxffxrr.exe 37 PID 2204 wrote to memory of 1308 2204 xxffxrr.exe 37 PID 2204 wrote to memory of 1308 2204 xxffxrr.exe 37 PID 2204 wrote to memory of 1308 2204 xxffxrr.exe 37 PID 1308 wrote to memory of 2188 1308 thbnbh.exe 38 PID 1308 wrote to memory of 2188 1308 thbnbh.exe 38 PID 1308 wrote to memory of 2188 1308 thbnbh.exe 38 PID 1308 wrote to memory of 2188 1308 thbnbh.exe 38 PID 2188 wrote to memory of 2384 2188 9hbbhn.exe 39 PID 2188 wrote to memory of 2384 2188 9hbbhn.exe 39 PID 2188 wrote to memory of 2384 2188 9hbbhn.exe 39 PID 2188 wrote to memory of 2384 2188 9hbbhn.exe 39 PID 2384 wrote to memory of 2948 2384 pjjdv.exe 73 PID 2384 wrote to memory of 2948 2384 pjjdv.exe 73 PID 2384 wrote to memory of 2948 2384 pjjdv.exe 73 PID 2384 wrote to memory of 2948 2384 pjjdv.exe 73 PID 2948 wrote to memory of 2332 2948 fffxlrr.exe 41 PID 2948 wrote to memory of 2332 2948 fffxlrr.exe 41 PID 2948 wrote to memory of 2332 2948 fffxlrr.exe 41 PID 2948 wrote to memory of 2332 2948 fffxlrr.exe 41 PID 2332 wrote to memory of 1408 2332 xxlxlrx.exe 42 PID 2332 wrote to memory of 1408 2332 xxlxlrx.exe 42 PID 2332 wrote to memory of 1408 2332 xxlxlrx.exe 42 PID 2332 wrote to memory of 1408 2332 xxlxlrx.exe 42 PID 1408 wrote to memory of 2896 1408 7bthnn.exe 43 PID 1408 wrote to memory of 2896 1408 7bthnn.exe 43 PID 1408 wrote to memory of 2896 1408 7bthnn.exe 43 PID 1408 wrote to memory of 2896 1408 7bthnn.exe 43 PID 2896 wrote to memory of 3004 2896 nnnnbh.exe 44 PID 2896 wrote to memory of 3004 2896 nnnnbh.exe 44 PID 2896 wrote to memory of 3004 2896 nnnnbh.exe 44 PID 2896 wrote to memory of 3004 2896 nnnnbh.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\0230d789b924c8467e76058f2baff7f0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0230d789b924c8467e76058f2baff7f0_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
\??\c:\9pjpp.exec:\9pjpp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
\??\c:\1vpvd.exec:\1vpvd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\xrlxfrx.exec:\xrlxfrx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\xflffxr.exec:\xflffxr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\7nbhth.exec:\7nbhth.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\dvjjp.exec:\dvjjp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
\??\c:\xxxlfxr.exec:\xxxlfxr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\xxffxrr.exec:\xxffxrr.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
\??\c:\thbnbh.exec:\thbnbh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
\??\c:\9hbbhn.exec:\9hbbhn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
\??\c:\pjjdv.exec:\pjjdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
\??\c:\fffxlrr.exec:\fffxlrr.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\xxlxlrx.exec:\xxlxlrx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\7bthnn.exec:\7bthnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
\??\c:\nnnnbh.exec:\nnnnbh.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\jpjjd.exec:\jpjjd.exe17⤵
- Executes dropped EXE
PID:3004 -
\??\c:\pvjvv.exec:\pvjvv.exe18⤵
- Executes dropped EXE
PID:996 -
\??\c:\flxrfrr.exec:\flxrfrr.exe19⤵
- Executes dropped EXE
PID:2520 -
\??\c:\hhhnnt.exec:\hhhnnt.exe20⤵
- Executes dropped EXE
PID:3048 -
\??\c:\bbhnnh.exec:\bbhnnh.exe21⤵
- Executes dropped EXE
PID:2012 -
\??\c:\9ppdv.exec:\9ppdv.exe22⤵
- Executes dropped EXE
PID:2296 -
\??\c:\ddvdv.exec:\ddvdv.exe23⤵
- Executes dropped EXE
PID:2220 -
\??\c:\ffxfrxl.exec:\ffxfrxl.exe24⤵
- Executes dropped EXE
PID:632 -
\??\c:\llffrxl.exec:\llffrxl.exe25⤵
- Executes dropped EXE
PID:2492 -
\??\c:\bbtbtb.exec:\bbtbtb.exe26⤵
- Executes dropped EXE
PID:552 -
\??\c:\bbnhtb.exec:\bbnhtb.exe27⤵
- Executes dropped EXE
PID:1488 -
\??\c:\pppvp.exec:\pppvp.exe28⤵
- Executes dropped EXE
PID:2196 -
\??\c:\3xfrxrx.exec:\3xfrxrx.exe29⤵
- Executes dropped EXE
PID:1684 -
\??\c:\ttttnt.exec:\ttttnt.exe30⤵
- Executes dropped EXE
PID:3028 -
\??\c:\ttnbnt.exec:\ttnbnt.exe31⤵
- Executes dropped EXE
PID:868 -
\??\c:\jppdv.exec:\jppdv.exe32⤵
- Executes dropped EXE
PID:2700 -
\??\c:\3llrxfx.exec:\3llrxfx.exe33⤵
- Executes dropped EXE
PID:2448 -
\??\c:\bhthtn.exec:\bhthtn.exe34⤵
- Executes dropped EXE
PID:2748 -
\??\c:\9bhhth.exec:\9bhhth.exe35⤵
- Executes dropped EXE
PID:2772 -
\??\c:\jjjjd.exec:\jjjjd.exe36⤵
- Executes dropped EXE
PID:2436 -
\??\c:\dddvv.exec:\dddvv.exe37⤵
- Executes dropped EXE
PID:2960 -
\??\c:\9ffrlxr.exec:\9ffrlxr.exe38⤵
- Executes dropped EXE
PID:2612 -
\??\c:\7xxlxfr.exec:\7xxlxfr.exe39⤵
- Executes dropped EXE
PID:2696 -
\??\c:\tnhhtb.exec:\tnhhtb.exe40⤵
- Executes dropped EXE
PID:2168 -
\??\c:\tnbbnh.exec:\tnbbnh.exe41⤵
- Executes dropped EXE
PID:880 -
\??\c:\1hhbtb.exec:\1hhbtb.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2760 -
\??\c:\5jpvd.exec:\5jpvd.exe43⤵
- Executes dropped EXE
PID:2376 -
\??\c:\vdvdp.exec:\vdvdp.exe44⤵
- Executes dropped EXE
PID:1628 -
\??\c:\3fxlxlx.exec:\3fxlxlx.exe45⤵
- Executes dropped EXE
PID:2964 -
\??\c:\3lxlrfx.exec:\3lxlrfx.exe46⤵
- Executes dropped EXE
PID:2948 -
\??\c:\1lrflxx.exec:\1lrflxx.exe47⤵
- Executes dropped EXE
PID:2180 -
\??\c:\bnbtbn.exec:\bnbtbn.exe48⤵
- Executes dropped EXE
PID:2956 -
\??\c:\bhhtnh.exec:\bhhtnh.exe49⤵
- Executes dropped EXE
PID:572 -
\??\c:\nnbtnh.exec:\nnbtnh.exe50⤵
- Executes dropped EXE
PID:276 -
\??\c:\vdpvj.exec:\vdpvj.exe51⤵
- Executes dropped EXE
PID:448 -
\??\c:\1jppv.exec:\1jppv.exe52⤵
- Executes dropped EXE
PID:1036 -
\??\c:\5lxrlff.exec:\5lxrlff.exe53⤵
- Executes dropped EXE
PID:2148 -
\??\c:\xxxlffr.exec:\xxxlffr.exe54⤵
- Executes dropped EXE
PID:2212 -
\??\c:\1bhtnh.exec:\1bhtnh.exe55⤵
- Executes dropped EXE
PID:1212 -
\??\c:\ntbbnt.exec:\ntbbnt.exe56⤵
- Executes dropped EXE
PID:264 -
\??\c:\nhbbnt.exec:\nhbbnt.exe57⤵
- Executes dropped EXE
PID:2880 -
\??\c:\ddvdv.exec:\ddvdv.exe58⤵
- Executes dropped EXE
PID:2108 -
\??\c:\jjdpv.exec:\jjdpv.exe59⤵
- Executes dropped EXE
PID:1856 -
\??\c:\9dpdj.exec:\9dpdj.exe60⤵
- Executes dropped EXE
PID:672 -
\??\c:\7fxxflf.exec:\7fxxflf.exe61⤵
- Executes dropped EXE
PID:3036 -
\??\c:\xxrfrxx.exec:\xxrfrxx.exe62⤵
- Executes dropped EXE
PID:920 -
\??\c:\fxxfxrl.exec:\fxxfxrl.exe63⤵
- Executes dropped EXE
PID:1740 -
\??\c:\bbhtnb.exec:\bbhtnb.exe64⤵
- Executes dropped EXE
PID:2196 -
\??\c:\tnbnbh.exec:\tnbnbh.exe65⤵
- Executes dropped EXE
PID:860 -
\??\c:\9bnthn.exec:\9bnthn.exe66⤵PID:2260
-
\??\c:\dvjjj.exec:\dvjjj.exe67⤵PID:2372
-
\??\c:\rlrxlrx.exec:\rlrxlrx.exe68⤵
- System Location Discovery: System Language Discovery
PID:3068 -
\??\c:\llflflx.exec:\llflflx.exe69⤵PID:980
-
\??\c:\hhhnnt.exec:\hhhnnt.exe70⤵PID:2092
-
\??\c:\hnhnbh.exec:\hnhnbh.exe71⤵PID:1636
-
\??\c:\bbhhhh.exec:\bbhhhh.exe72⤵PID:2832
-
\??\c:\ppppd.exec:\ppppd.exe73⤵PID:2916
-
\??\c:\jppvv.exec:\jppvv.exe74⤵PID:2624
-
\??\c:\lfrxffx.exec:\lfrxffx.exe75⤵PID:2792
-
\??\c:\rfxrffr.exec:\rfxrffr.exe76⤵PID:1852
-
\??\c:\xrfxlxx.exec:\xrfxlxx.exe77⤵PID:2844
-
\??\c:\5bbtbb.exec:\5bbtbb.exe78⤵PID:2684
-
\??\c:\9bbnbb.exec:\9bbnbb.exe79⤵PID:2944
-
\??\c:\hhtnth.exec:\hhtnth.exe80⤵
- System Location Discovery: System Language Discovery
PID:2200 -
\??\c:\ddvjv.exec:\ddvjv.exe81⤵PID:2160
-
\??\c:\vvjpd.exec:\vvjpd.exe82⤵PID:2240
-
\??\c:\7rffffr.exec:\7rffffr.exe83⤵PID:2776
-
\??\c:\llxflrf.exec:\llxflrf.exe84⤵PID:2816
-
\??\c:\3xrfrfx.exec:\3xrfrfx.exe85⤵PID:2328
-
\??\c:\tbthnn.exec:\tbthnn.exe86⤵PID:2680
-
\??\c:\nnnhth.exec:\nnnhth.exe87⤵PID:2708
-
\??\c:\3hbhtt.exec:\3hbhtt.exe88⤵PID:2996
-
\??\c:\vpjpd.exec:\vpjpd.exe89⤵PID:2184
-
\??\c:\dvppd.exec:\dvppd.exe90⤵PID:820
-
\??\c:\fllflff.exec:\fllflff.exe91⤵PID:996
-
\??\c:\ffrfrxx.exec:\ffrfrxx.exe92⤵PID:3040
-
\??\c:\3fxfrxl.exec:\3fxfrxl.exe93⤵PID:2468
-
\??\c:\5bbhtb.exec:\5bbhtb.exe94⤵PID:2136
-
\??\c:\nnhhtb.exec:\nnhhtb.exe95⤵PID:2104
-
\??\c:\pjjpv.exec:\pjjpv.exe96⤵PID:2296
-
\??\c:\1jdvv.exec:\1jdvv.exe97⤵PID:2220
-
\??\c:\djppp.exec:\djppp.exe98⤵PID:2364
-
\??\c:\xxxxrfr.exec:\xxxxrfr.exe99⤵PID:1364
-
\??\c:\lfrrffr.exec:\lfrrffr.exe100⤵PID:316
-
\??\c:\lrfxxrl.exec:\lrfxxrl.exe101⤵PID:1876
-
\??\c:\tbtnht.exec:\tbtnht.exe102⤵PID:1948
-
\??\c:\hhthth.exec:\hhthth.exe103⤵PID:2928
-
\??\c:\9vjdv.exec:\9vjdv.exe104⤵PID:324
-
\??\c:\jjdjv.exec:\jjdjv.exe105⤵
- System Location Discovery: System Language Discovery
PID:2268 -
\??\c:\xxrllrr.exec:\xxrllrr.exe106⤵PID:1884
-
\??\c:\rlxlxfl.exec:\rlxlxfl.exe107⤵PID:2072
-
\??\c:\frffllr.exec:\frffllr.exe108⤵PID:916
-
\??\c:\htnnbh.exec:\htnnbh.exe109⤵PID:1492
-
\??\c:\ntnttb.exec:\ntnttb.exe110⤵PID:1572
-
\??\c:\ddvdv.exec:\ddvdv.exe111⤵PID:2092
-
\??\c:\pjjpv.exec:\pjjpv.exe112⤵PID:2836
-
\??\c:\7fxflrl.exec:\7fxflrl.exe113⤵PID:2748
-
\??\c:\1ffrfrl.exec:\1ffrfrl.exe114⤵PID:2980
-
\??\c:\fxxfxrr.exec:\fxxfxrr.exe115⤵PID:2920
-
\??\c:\tnbnbh.exec:\tnbnbh.exe116⤵PID:2672
-
\??\c:\ttthbn.exec:\ttthbn.exe117⤵
- System Location Discovery: System Language Discovery
PID:1660 -
\??\c:\9vjjp.exec:\9vjjp.exe118⤵PID:668
-
\??\c:\dvjvj.exec:\dvjvj.exe119⤵PID:896
-
\??\c:\ffllffr.exec:\ffllffr.exe120⤵PID:2444
-
\??\c:\ffxlxlf.exec:\ffxlxlf.exe121⤵PID:880
-
\??\c:\7hhnhn.exec:\7hhnhn.exe122⤵PID:2480
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-