Analysis
-
max time kernel
96s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 21:02
Static task
static1
Behavioral task
behavioral1
Sample
0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe
-
Size
40KB
-
MD5
0101cfbdfc4ba6957dfcf324b1680a88
-
SHA1
f8a35961a7d5e73ca625952c65ed3a4fc0d34e9f
-
SHA256
15352163a10cf8605443b7e1ebd8b488690b85fddf1a63d18591c2a216e5d528
-
SHA512
bb8fb9039f6dcf21e57932787823646b7ebca6bfb4d84377d0a54d63076eb5d88b08fc350ff26963e2840ed8a42bc91fee5b93f349d7266753ad8703d02a17b5
-
SSDEEP
768:KOxZOgIryM1P3oO2y8UN2ivcTTJlu71TFA9nn0OjDDdmo/SK2OURvXZzOmRkoG:nSgy19JSVO1ONn511/tivXZzOmRk1
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2488 hbnttb.exe 2944 hnthhb.exe 2116 ffxrfrf.exe 2708 fxxfxlf.exe 2756 djddj.exe 2828 9lffrfr.exe 2740 dpvjd.exe 2776 9dvdp.exe 2716 5nhnnt.exe 2788 llxxrll.exe 2604 ffxrfff.exe 2692 xfrrxrr.exe 332 vddvp.exe 620 dvvpv.exe 1404 rrlrlrx.exe 2676 9rfrrrx.exe 1664 xlrrrxf.exe 1576 rxlxxlf.exe 1896 jjpjp.exe 1860 jjpjp.exe 1672 nnhthb.exe 1988 fflxfxr.exe 1372 vjppj.exe 2940 dvjvj.exe 2260 jpvvd.exe 1828 htnnnn.exe 2064 dpvpv.exe 908 hntnbb.exe 2272 dpdvj.exe 1680 nbnnbt.exe 804 hthhnt.exe 1748 nnhbhh.exe 296 rlllxxx.exe 1700 thtthb.exe 2236 htnnhb.exe 2164 btbhnn.exe 2524 nbhhtb.exe 2556 9hbhnh.exe 2964 dpddd.exe 1572 5ddvj.exe 864 jpvjv.exe 1636 tbhhbb.exe 1532 lxffxxx.exe 2496 lrlffrx.exe 3048 1fllrlx.exe 2568 hhhbhn.exe 1732 pjdpj.exe 2116 lrxflfl.exe 2960 7jjpd.exe 2720 pjvdd.exe 2860 rrxlfrx.exe 2832 3jddp.exe 2748 1djjv.exe 2636 pdvvj.exe 2836 bntntn.exe 2664 rrrxfrr.exe 2628 pdppd.exe 2620 7jpdv.exe 2672 5tbntt.exe 2012 hnttht.exe 1456 ttthtn.exe 396 9tbbnn.exe 1040 flxxlfx.exe 1716 rrxfffx.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfxlfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnntbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lxflxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7pjvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7lxlffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrrrxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llfrffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbbht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbhnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1djjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfflflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xrxxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xfffxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bbbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhbhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfrxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjppd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrlxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fxxlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflxfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbnbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbnntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dpvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxlrxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflfxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9lrxfxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbbnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pppjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrfxlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnthn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrfflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrlfxxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flffxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htttnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrflrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrlffrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnnhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfxfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxffxxx.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2488 2460 0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe 30 PID 2460 wrote to memory of 2488 2460 0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe 30 PID 2460 wrote to memory of 2488 2460 0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe 30 PID 2460 wrote to memory of 2488 2460 0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2944 2488 hbnttb.exe 31 PID 2488 wrote to memory of 2944 2488 hbnttb.exe 31 PID 2488 wrote to memory of 2944 2488 hbnttb.exe 31 PID 2488 wrote to memory of 2944 2488 hbnttb.exe 31 PID 2944 wrote to memory of 2116 2944 hnthhb.exe 32 PID 2944 wrote to memory of 2116 2944 hnthhb.exe 32 PID 2944 wrote to memory of 2116 2944 hnthhb.exe 32 PID 2944 wrote to memory of 2116 2944 hnthhb.exe 32 PID 2116 wrote to memory of 2708 2116 ffxrfrf.exe 33 PID 2116 wrote to memory of 2708 2116 ffxrfrf.exe 33 PID 2116 wrote to memory of 2708 2116 ffxrfrf.exe 33 PID 2116 wrote to memory of 2708 2116 ffxrfrf.exe 33 PID 2708 wrote to memory of 2756 2708 fxxfxlf.exe 34 PID 2708 wrote to memory of 2756 2708 fxxfxlf.exe 34 PID 2708 wrote to memory of 2756 2708 fxxfxlf.exe 34 PID 2708 wrote to memory of 2756 2708 fxxfxlf.exe 34 PID 2756 wrote to memory of 2828 2756 djddj.exe 35 PID 2756 wrote to memory of 2828 2756 djddj.exe 35 PID 2756 wrote to memory of 2828 2756 djddj.exe 35 PID 2756 wrote to memory of 2828 2756 djddj.exe 35 PID 2828 wrote to memory of 2740 2828 9lffrfr.exe 36 PID 2828 wrote to memory of 2740 2828 9lffrfr.exe 36 PID 2828 wrote to memory of 2740 2828 9lffrfr.exe 36 PID 2828 wrote to memory of 2740 2828 9lffrfr.exe 36 PID 2740 wrote to memory of 2776 2740 dpvjd.exe 37 PID 2740 wrote to memory of 2776 2740 dpvjd.exe 37 PID 2740 wrote to memory of 2776 2740 dpvjd.exe 37 PID 2740 wrote to memory of 2776 2740 dpvjd.exe 37 PID 2776 wrote to memory of 2716 2776 9dvdp.exe 38 PID 2776 wrote to memory of 2716 2776 9dvdp.exe 38 PID 2776 wrote to memory of 2716 2776 9dvdp.exe 38 PID 2776 wrote to memory of 2716 2776 9dvdp.exe 38 PID 2716 wrote to memory of 2788 2716 5nhnnt.exe 39 PID 2716 wrote to memory of 2788 2716 5nhnnt.exe 39 PID 2716 wrote to memory of 2788 2716 5nhnnt.exe 39 PID 2716 wrote to memory of 2788 2716 5nhnnt.exe 39 PID 2788 wrote to memory of 2604 2788 llxxrll.exe 40 PID 2788 wrote to memory of 2604 2788 llxxrll.exe 40 PID 2788 wrote to memory of 2604 2788 llxxrll.exe 40 PID 2788 wrote to memory of 2604 2788 llxxrll.exe 40 PID 2604 wrote to memory of 2692 2604 ffxrfff.exe 41 PID 2604 wrote to memory of 2692 2604 ffxrfff.exe 41 PID 2604 wrote to memory of 2692 2604 ffxrfff.exe 41 PID 2604 wrote to memory of 2692 2604 ffxrfff.exe 41 PID 2692 wrote to memory of 332 2692 xfrrxrr.exe 42 PID 2692 wrote to memory of 332 2692 xfrrxrr.exe 42 PID 2692 wrote to memory of 332 2692 xfrrxrr.exe 42 PID 2692 wrote to memory of 332 2692 xfrrxrr.exe 42 PID 332 wrote to memory of 620 332 vddvp.exe 43 PID 332 wrote to memory of 620 332 vddvp.exe 43 PID 332 wrote to memory of 620 332 vddvp.exe 43 PID 332 wrote to memory of 620 332 vddvp.exe 43 PID 620 wrote to memory of 1404 620 dvvpv.exe 44 PID 620 wrote to memory of 1404 620 dvvpv.exe 44 PID 620 wrote to memory of 1404 620 dvvpv.exe 44 PID 620 wrote to memory of 1404 620 dvvpv.exe 44 PID 1404 wrote to memory of 2676 1404 rrlrlrx.exe 45 PID 1404 wrote to memory of 2676 1404 rrlrlrx.exe 45 PID 1404 wrote to memory of 2676 1404 rrlrlrx.exe 45 PID 1404 wrote to memory of 2676 1404 rrlrlrx.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0101cfbdfc4ba6957dfcf324b1680a88_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
\??\c:\hbnttb.exec:\hbnttb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
\??\c:\hnthhb.exec:\hnthhb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\ffxrfrf.exec:\ffxrfrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
\??\c:\fxxfxlf.exec:\fxxfxlf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\djddj.exec:\djddj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\9lffrfr.exec:\9lffrfr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\dpvjd.exec:\dpvjd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\9dvdp.exec:\9dvdp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\5nhnnt.exec:\5nhnnt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\llxxrll.exec:\llxxrll.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\ffxrfff.exec:\ffxrfff.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\xfrrxrr.exec:\xfrrxrr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\vddvp.exec:\vddvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
\??\c:\dvvpv.exec:\dvvpv.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:620 -
\??\c:\rrlrlrx.exec:\rrlrlrx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
\??\c:\9rfrrrx.exec:\9rfrrrx.exe17⤵
- Executes dropped EXE
PID:2676 -
\??\c:\xlrrrxf.exec:\xlrrrxf.exe18⤵
- Executes dropped EXE
PID:1664 -
\??\c:\rxlxxlf.exec:\rxlxxlf.exe19⤵
- Executes dropped EXE
PID:1576 -
\??\c:\jjpjp.exec:\jjpjp.exe20⤵
- Executes dropped EXE
PID:1896 -
\??\c:\jjpjp.exec:\jjpjp.exe21⤵
- Executes dropped EXE
PID:1860 -
\??\c:\nnhthb.exec:\nnhthb.exe22⤵
- Executes dropped EXE
PID:1672 -
\??\c:\fflxfxr.exec:\fflxfxr.exe23⤵
- Executes dropped EXE
PID:1988 -
\??\c:\vjppj.exec:\vjppj.exe24⤵
- Executes dropped EXE
PID:1372 -
\??\c:\dvjvj.exec:\dvjvj.exe25⤵
- Executes dropped EXE
PID:2940 -
\??\c:\jpvvd.exec:\jpvvd.exe26⤵
- Executes dropped EXE
PID:2260 -
\??\c:\htnnnn.exec:\htnnnn.exe27⤵
- Executes dropped EXE
PID:1828 -
\??\c:\dpvpv.exec:\dpvpv.exe28⤵
- Executes dropped EXE
PID:2064 -
\??\c:\hntnbb.exec:\hntnbb.exe29⤵
- Executes dropped EXE
PID:908 -
\??\c:\dpdvj.exec:\dpdvj.exe30⤵
- Executes dropped EXE
PID:2272 -
\??\c:\nbnnbt.exec:\nbnnbt.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1680 -
\??\c:\hthhnt.exec:\hthhnt.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:804 -
\??\c:\nnhbhh.exec:\nnhbhh.exe33⤵
- Executes dropped EXE
PID:1748 -
\??\c:\rlllxxx.exec:\rlllxxx.exe34⤵
- Executes dropped EXE
PID:296 -
\??\c:\thtthb.exec:\thtthb.exe35⤵
- Executes dropped EXE
PID:1700 -
\??\c:\htnnhb.exec:\htnnhb.exe36⤵
- Executes dropped EXE
PID:2236 -
\??\c:\btbhnn.exec:\btbhnn.exe37⤵
- Executes dropped EXE
PID:2164 -
\??\c:\nbhhtb.exec:\nbhhtb.exe38⤵
- Executes dropped EXE
PID:2524 -
\??\c:\9hbhnh.exec:\9hbhnh.exe39⤵
- Executes dropped EXE
PID:2556 -
\??\c:\dpddd.exec:\dpddd.exe40⤵
- Executes dropped EXE
PID:2964 -
\??\c:\5ddvj.exec:\5ddvj.exe41⤵
- Executes dropped EXE
PID:1572 -
\??\c:\jpvjv.exec:\jpvjv.exe42⤵
- Executes dropped EXE
PID:864 -
\??\c:\tbhhbb.exec:\tbhhbb.exe43⤵
- Executes dropped EXE
PID:1636 -
\??\c:\lxffxxx.exec:\lxffxxx.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1532 -
\??\c:\lrlffrx.exec:\lrlffrx.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2496 -
\??\c:\1fllrlx.exec:\1fllrlx.exe46⤵
- Executes dropped EXE
PID:3048 -
\??\c:\hhhbhn.exec:\hhhbhn.exe47⤵
- Executes dropped EXE
PID:2568 -
\??\c:\pjdpj.exec:\pjdpj.exe48⤵
- Executes dropped EXE
PID:1732 -
\??\c:\lrxflfl.exec:\lrxflfl.exe49⤵
- Executes dropped EXE
PID:2116 -
\??\c:\7jjpd.exec:\7jjpd.exe50⤵
- Executes dropped EXE
PID:2960 -
\??\c:\pjvdd.exec:\pjvdd.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720 -
\??\c:\rrxlfrx.exec:\rrxlfrx.exe52⤵
- Executes dropped EXE
PID:2860 -
\??\c:\3jddp.exec:\3jddp.exe53⤵
- Executes dropped EXE
PID:2832 -
\??\c:\1djjv.exec:\1djjv.exe54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2748 -
\??\c:\pdvvj.exec:\pdvvj.exe55⤵
- Executes dropped EXE
PID:2636 -
\??\c:\bntntn.exec:\bntntn.exe56⤵
- Executes dropped EXE
PID:2836 -
\??\c:\rrrxfrr.exec:\rrrxfrr.exe57⤵
- Executes dropped EXE
PID:2664 -
\??\c:\pdppd.exec:\pdppd.exe58⤵
- Executes dropped EXE
PID:2628 -
\??\c:\7jpdv.exec:\7jpdv.exe59⤵
- Executes dropped EXE
PID:2620 -
\??\c:\5tbntt.exec:\5tbntt.exe60⤵
- Executes dropped EXE
PID:2672 -
\??\c:\hnttht.exec:\hnttht.exe61⤵
- Executes dropped EXE
PID:2012 -
\??\c:\ttthtn.exec:\ttthtn.exe62⤵
- Executes dropped EXE
PID:1456 -
\??\c:\9tbbnn.exec:\9tbbnn.exe63⤵
- Executes dropped EXE
PID:396 -
\??\c:\flxxlfx.exec:\flxxlfx.exe64⤵
- Executes dropped EXE
PID:1040 -
\??\c:\rrxfffx.exec:\rrxfffx.exe65⤵
- Executes dropped EXE
PID:1716 -
\??\c:\xfrrxrx.exec:\xfrrxrx.exe66⤵PID:1736
-
\??\c:\pvpdp.exec:\pvpdp.exe67⤵PID:1172
-
\??\c:\nthnnb.exec:\nthnnb.exe68⤵PID:2356
-
\??\c:\flrrfxx.exec:\flrrfxx.exe69⤵PID:572
-
\??\c:\xflllfl.exec:\xflllfl.exe70⤵PID:1860
-
\??\c:\ffrxrfr.exec:\ffrxrfr.exe71⤵PID:2900
-
\??\c:\lxflxff.exec:\lxflxff.exe72⤵PID:1692
-
\??\c:\vdjdj.exec:\vdjdj.exe73⤵
- System Location Discovery: System Language Discovery
PID:2844 -
\??\c:\1nnhbb.exec:\1nnhbb.exe74⤵PID:2140
-
\??\c:\thnhtb.exec:\thnhtb.exe75⤵PID:2440
-
\??\c:\lrxfrlr.exec:\lrxfrlr.exe76⤵PID:2296
-
\??\c:\nbbbnn.exec:\nbbbnn.exe77⤵
- System Location Discovery: System Language Discovery
PID:2924 -
\??\c:\xflxfrr.exec:\xflxfrr.exe78⤵
- System Location Discovery: System Language Discovery
PID:2712 -
\??\c:\fxrlfxf.exec:\fxrlfxf.exe79⤵PID:1884
-
\??\c:\nnbhtt.exec:\nnbhtt.exe80⤵PID:908
-
\??\c:\7llflfl.exec:\7llflfl.exe81⤵PID:940
-
\??\c:\7pjvp.exec:\7pjvp.exe82⤵
- System Location Discovery: System Language Discovery
PID:2504 -
\??\c:\jdjvj.exec:\jdjvj.exe83⤵PID:1796
-
\??\c:\bnnhtt.exec:\bnnhtt.exe84⤵
- System Location Discovery: System Language Discovery
PID:3020 -
\??\c:\nthntb.exec:\nthntb.exe85⤵PID:900
-
\??\c:\hnnnbt.exec:\hnnnbt.exe86⤵PID:296
-
\??\c:\hbnbnn.exec:\hbnbnn.exe87⤵
- System Location Discovery: System Language Discovery
PID:3024 -
\??\c:\1nhthh.exec:\1nhthh.exe88⤵PID:2236
-
\??\c:\nbnnhb.exec:\nbnnhb.exe89⤵PID:2316
-
\??\c:\frlrxxl.exec:\frlrxxl.exe90⤵PID:2360
-
\??\c:\nnbbnn.exec:\nnbbnn.exe91⤵PID:2556
-
\??\c:\xfxrfxf.exec:\xfxrfxf.exe92⤵PID:2528
-
\??\c:\frfflll.exec:\frfflll.exe93⤵PID:1572
-
\??\c:\9xxfxfl.exec:\9xxfxfl.exe94⤵PID:2548
-
\??\c:\xlrrxrx.exec:\xlrrxrx.exe95⤵PID:2056
-
\??\c:\xflfflr.exec:\xflfflr.exe96⤵PID:1532
-
\??\c:\fxllxxx.exec:\fxllxxx.exe97⤵PID:2132
-
\??\c:\llxxxlf.exec:\llxxxlf.exe98⤵PID:2324
-
\??\c:\djpvp.exec:\djpvp.exe99⤵PID:2412
-
\??\c:\pdvpv.exec:\pdvpv.exe100⤵PID:1732
-
\??\c:\hnbttb.exec:\hnbttb.exe101⤵PID:2116
-
\??\c:\3btnhh.exec:\3btnhh.exe102⤵PID:2960
-
\??\c:\9jjvv.exec:\9jjvv.exe103⤵PID:2820
-
\??\c:\vjvpv.exec:\vjvpv.exe104⤵PID:2808
-
\??\c:\thtbnn.exec:\thtbnn.exe105⤵PID:2832
-
\??\c:\ntnnhb.exec:\ntnnhb.exe106⤵PID:2748
-
\??\c:\tnnnth.exec:\tnnnth.exe107⤵PID:2632
-
\??\c:\hhbbnt.exec:\hhbbnt.exe108⤵PID:2864
-
\??\c:\ppvpd.exec:\ppvpd.exe109⤵PID:2608
-
\??\c:\jdjdp.exec:\jdjdp.exe110⤵PID:2628
-
\??\c:\dpvpp.exec:\dpvpp.exe111⤵
- System Location Discovery: System Language Discovery
PID:2604 -
\??\c:\djjdd.exec:\djjdd.exe112⤵
- System Location Discovery: System Language Discovery
PID:1608 -
\??\c:\9rrrrlr.exec:\9rrrrlr.exe113⤵PID:1052
-
\??\c:\nthbnb.exec:\nthbnb.exe114⤵PID:1116
-
\??\c:\rxlrffl.exec:\rxlrffl.exe115⤵PID:2008
-
\??\c:\lxlrxxl.exec:\lxlrxxl.exe116⤵
- System Location Discovery: System Language Discovery
PID:1404 -
\??\c:\1bbbth.exec:\1bbbth.exe117⤵
- System Location Discovery: System Language Discovery
PID:1224 -
\??\c:\bbnnhb.exec:\bbnnhb.exe118⤵PID:1484
-
\??\c:\hhttnt.exec:\hhttnt.exe119⤵PID:2428
-
\??\c:\hbnhnh.exec:\hbnhnh.exe120⤵PID:2576
-
\??\c:\vjjvj.exec:\vjjvj.exe121⤵
- System Location Discovery: System Language Discovery
PID:1980 -
\??\c:\dvjvp.exec:\dvjvp.exe122⤵PID:2904
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-