Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 00:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d0b04726bd848f15647350e70c773711_JaffaCakes118.exe
Resource
win7-20240903-en
windows7-x64
6 signatures
150 seconds
General
-
Target
d0b04726bd848f15647350e70c773711_JaffaCakes118.exe
-
Size
78KB
-
MD5
d0b04726bd848f15647350e70c773711
-
SHA1
b5af9845eb69ee0ba5d60e48135de251b2e4b1ce
-
SHA256
21adf2c62befe260a9e10365f2ed2a6dfdfec5ca65b4eaefbae01e6766918b08
-
SHA512
837aa48ba9caf744f3cf09868398c3d447ba1036241b4179031c72d089461165c38ea56daea7fbff0b3a2fc194436b9344b752019dfcc1731baf4175752bc97a
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDWiekja1br3GGBxfot3nj:ymb3NkkiQ3mdBjFWXkj7afodnj
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/3032-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2224-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2792-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2820-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1900-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1900-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2136-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2264-297-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/696-288-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1716-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1436-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1960-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2232-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2244-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2900-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1072-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3044-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2576-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2576-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2660-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2224 7vpjp.exe 2792 7xxfllr.exe 2660 hbnnbh.exe 2820 btnnnn.exe 2572 vdjdj.exe 2576 rxfrflf.exe 3044 frlrflx.exe 1900 1nbhtb.exe 2136 7bnbtb.exe 2976 jppjp.exe 2256 llfrffx.exe 1072 nhhbhn.exe 2752 jdvjv.exe 2900 vvvvj.exe 2064 llxxlxf.exe 2244 rrrxrxx.exe 1768 rrllxrr.exe 2348 tbtthn.exe 2232 hbnnhh.exe 1960 9pdjd.exe 2360 7jvpv.exe 2356 5xxlxff.exe 1436 nnhtbn.exe 680 tthnbh.exe 1716 3nntnn.exe 2420 jpvpv.exe 2396 9vjdp.exe 1872 1lflrlx.exe 696 rrxrfxr.exe 2264 hhbtbt.exe 2188 hhnbtb.exe 2464 pppjv.exe 2644 dvvpd.exe 2700 lfffxrr.exe 1508 rflffxl.exe 1736 ntnhth.exe 2572 nnhthn.exe 2652 bbnntt.exe 1916 vvjpp.exe 2084 dpdvd.exe 2984 3lfxrxr.exe 1924 llxlrfr.exe 2180 xxxlfxl.exe 2596 hhbbhn.exe 2736 btttbn.exe 1224 pjvvj.exe 2512 1vppd.exe 2588 jpddp.exe 2064 lxfxffl.exe 2244 llrrfxr.exe 2116 rxrfxrl.exe 1776 hhnhht.exe 2208 thntbh.exe 912 jvjjv.exe 1960 pjjpv.exe 2360 jjjvd.exe 688 3xllrrl.exe 2696 lxlxllr.exe 1968 7rlrxfr.exe 2032 5btntb.exe 2324 nhtbhh.exe 1672 vpjjp.exe 2144 vdpvd.exe 2276 5jdpj.exe -
resource yara_rule behavioral1/memory/3032-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2224-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2792-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1900-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1900-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2136-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2264-297-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/696-288-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1716-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1436-235-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1960-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2244-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1072-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1900-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1900-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3044-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3044-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3044-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-33-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlllrfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbnbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhttnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9vpvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfxfxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbbnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2224 3032 d0b04726bd848f15647350e70c773711_JaffaCakes118.exe 97 PID 3032 wrote to memory of 2224 3032 d0b04726bd848f15647350e70c773711_JaffaCakes118.exe 97 PID 3032 wrote to memory of 2224 3032 d0b04726bd848f15647350e70c773711_JaffaCakes118.exe 97 PID 3032 wrote to memory of 2224 3032 d0b04726bd848f15647350e70c773711_JaffaCakes118.exe 97 PID 2224 wrote to memory of 2792 2224 7vpjp.exe 297 PID 2224 wrote to memory of 2792 2224 7vpjp.exe 297 PID 2224 wrote to memory of 2792 2224 7vpjp.exe 297 PID 2224 wrote to memory of 2792 2224 7vpjp.exe 297 PID 2792 wrote to memory of 2660 2792 7xxfllr.exe 32 PID 2792 wrote to memory of 2660 2792 7xxfllr.exe 32 PID 2792 wrote to memory of 2660 2792 7xxfllr.exe 32 PID 2792 wrote to memory of 2660 2792 7xxfllr.exe 32 PID 2660 wrote to memory of 2820 2660 hbnnbh.exe 100 PID 2660 wrote to memory of 2820 2660 hbnnbh.exe 100 PID 2660 wrote to memory of 2820 2660 hbnnbh.exe 100 PID 2660 wrote to memory of 2820 2660 hbnnbh.exe 100 PID 2820 wrote to memory of 2572 2820 btnnnn.exe 34 PID 2820 wrote to memory of 2572 2820 btnnnn.exe 34 PID 2820 wrote to memory of 2572 2820 btnnnn.exe 34 PID 2820 wrote to memory of 2572 2820 btnnnn.exe 34 PID 2572 wrote to memory of 2576 2572 vdjdj.exe 35 PID 2572 wrote to memory of 2576 2572 vdjdj.exe 35 PID 2572 wrote to memory of 2576 2572 vdjdj.exe 35 PID 2572 wrote to memory of 2576 2572 vdjdj.exe 35 PID 2576 wrote to memory of 3044 2576 rxfrflf.exe 36 PID 2576 wrote to memory of 3044 2576 rxfrflf.exe 36 PID 2576 wrote to memory of 3044 2576 rxfrflf.exe 36 PID 2576 wrote to memory of 3044 2576 rxfrflf.exe 36 PID 3044 wrote to memory of 1900 3044 frlrflx.exe 37 PID 3044 wrote to memory of 1900 3044 frlrflx.exe 37 PID 3044 wrote to memory of 1900 3044 frlrflx.exe 37 PID 3044 wrote to memory of 1900 3044 frlrflx.exe 37 PID 1900 wrote to memory of 2136 1900 1nbhtb.exe 38 PID 1900 wrote to memory of 2136 1900 1nbhtb.exe 38 PID 1900 wrote to memory of 2136 1900 1nbhtb.exe 38 PID 1900 wrote to memory of 2136 1900 1nbhtb.exe 38 PID 2136 wrote to memory of 2976 2136 7bnbtb.exe 39 PID 2136 wrote to memory of 2976 2136 7bnbtb.exe 39 PID 2136 wrote to memory of 2976 2136 7bnbtb.exe 39 PID 2136 wrote to memory of 2976 2136 7bnbtb.exe 39 PID 2976 wrote to memory of 2256 2976 jppjp.exe 40 PID 2976 wrote to memory of 2256 2976 jppjp.exe 40 PID 2976 wrote to memory of 2256 2976 jppjp.exe 40 PID 2976 wrote to memory of 2256 2976 jppjp.exe 40 PID 2256 wrote to memory of 1072 2256 llfrffx.exe 41 PID 2256 wrote to memory of 1072 2256 llfrffx.exe 41 PID 2256 wrote to memory of 1072 2256 llfrffx.exe 41 PID 2256 wrote to memory of 1072 2256 llfrffx.exe 41 PID 1072 wrote to memory of 2752 1072 nhhbhn.exe 42 PID 1072 wrote to memory of 2752 1072 nhhbhn.exe 42 PID 1072 wrote to memory of 2752 1072 nhhbhn.exe 42 PID 1072 wrote to memory of 2752 1072 nhhbhn.exe 42 PID 2752 wrote to memory of 2900 2752 jdvjv.exe 43 PID 2752 wrote to memory of 2900 2752 jdvjv.exe 43 PID 2752 wrote to memory of 2900 2752 jdvjv.exe 43 PID 2752 wrote to memory of 2900 2752 jdvjv.exe 43 PID 2900 wrote to memory of 2064 2900 vvvvj.exe 44 PID 2900 wrote to memory of 2064 2900 vvvvj.exe 44 PID 2900 wrote to memory of 2064 2900 vvvvj.exe 44 PID 2900 wrote to memory of 2064 2900 vvvvj.exe 44 PID 2064 wrote to memory of 2244 2064 llxxlxf.exe 45 PID 2064 wrote to memory of 2244 2064 llxxlxf.exe 45 PID 2064 wrote to memory of 2244 2064 llxxlxf.exe 45 PID 2064 wrote to memory of 2244 2064 llxxlxf.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0b04726bd848f15647350e70c773711_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d0b04726bd848f15647350e70c773711_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\7vpjp.exec:\7vpjp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\7xxfllr.exec:\7xxfllr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\hbnnbh.exec:\hbnnbh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\btnnnn.exec:\btnnnn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\vdjdj.exec:\vdjdj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\rxfrflf.exec:\rxfrflf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\frlrflx.exec:\frlrflx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
\??\c:\1nbhtb.exec:\1nbhtb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1900 -
\??\c:\7bnbtb.exec:\7bnbtb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\jppjp.exec:\jppjp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\llfrffx.exec:\llfrffx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\nhhbhn.exec:\nhhbhn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
\??\c:\jdvjv.exec:\jdvjv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\vvvvj.exec:\vvvvj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\llxxlxf.exec:\llxxlxf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
\??\c:\rrrxrxx.exec:\rrrxrxx.exe17⤵
- Executes dropped EXE
PID:2244 -
\??\c:\rrllxrr.exec:\rrllxrr.exe18⤵
- Executes dropped EXE
PID:1768 -
\??\c:\tbtthn.exec:\tbtthn.exe19⤵
- Executes dropped EXE
PID:2348 -
\??\c:\hbnnhh.exec:\hbnnhh.exe20⤵
- Executes dropped EXE
PID:2232 -
\??\c:\9pdjd.exec:\9pdjd.exe21⤵
- Executes dropped EXE
PID:1960 -
\??\c:\7jvpv.exec:\7jvpv.exe22⤵
- Executes dropped EXE
PID:2360 -
\??\c:\5xxlxff.exec:\5xxlxff.exe23⤵
- Executes dropped EXE
PID:2356 -
\??\c:\nnhtbn.exec:\nnhtbn.exe24⤵
- Executes dropped EXE
PID:1436 -
\??\c:\tthnbh.exec:\tthnbh.exe25⤵
- Executes dropped EXE
PID:680 -
\??\c:\3nntnn.exec:\3nntnn.exe26⤵
- Executes dropped EXE
PID:1716 -
\??\c:\jpvpv.exec:\jpvpv.exe27⤵
- Executes dropped EXE
PID:2420 -
\??\c:\9vjdp.exec:\9vjdp.exe28⤵
- Executes dropped EXE
PID:2396 -
\??\c:\1lflrlx.exec:\1lflrlx.exe29⤵
- Executes dropped EXE
PID:1872 -
\??\c:\rrxrfxr.exec:\rrxrfxr.exe30⤵
- Executes dropped EXE
PID:696 -
\??\c:\hhbtbt.exec:\hhbtbt.exe31⤵
- Executes dropped EXE
PID:2264 -
\??\c:\hhnbtb.exec:\hhnbtb.exe32⤵
- Executes dropped EXE
PID:2188 -
\??\c:\pppjv.exec:\pppjv.exe33⤵
- Executes dropped EXE
PID:2464 -
\??\c:\dvvpd.exec:\dvvpd.exe34⤵
- Executes dropped EXE
PID:2644 -
\??\c:\lfffxrr.exec:\lfffxrr.exe35⤵
- Executes dropped EXE
PID:2700 -
\??\c:\rflffxl.exec:\rflffxl.exe36⤵
- Executes dropped EXE
PID:1508 -
\??\c:\ntnhth.exec:\ntnhth.exe37⤵
- Executes dropped EXE
PID:1736 -
\??\c:\nnhthn.exec:\nnhthn.exe38⤵
- Executes dropped EXE
PID:2572 -
\??\c:\bbnntt.exec:\bbnntt.exe39⤵
- Executes dropped EXE
PID:2652 -
\??\c:\vvjpp.exec:\vvjpp.exe40⤵
- Executes dropped EXE
PID:1916 -
\??\c:\dpdvd.exec:\dpdvd.exe41⤵
- Executes dropped EXE
PID:2084 -
\??\c:\3lfxrxr.exec:\3lfxrxr.exe42⤵
- Executes dropped EXE
PID:2984 -
\??\c:\llxlrfr.exec:\llxlrfr.exe43⤵
- Executes dropped EXE
PID:1924 -
\??\c:\xxxlfxl.exec:\xxxlfxl.exe44⤵
- Executes dropped EXE
PID:2180 -
\??\c:\hhbbhn.exec:\hhbbhn.exe45⤵
- Executes dropped EXE
PID:2596 -
\??\c:\btttbn.exec:\btttbn.exe46⤵
- Executes dropped EXE
PID:2736 -
\??\c:\pjvvj.exec:\pjvvj.exe47⤵
- Executes dropped EXE
PID:1224 -
\??\c:\1vppd.exec:\1vppd.exe48⤵
- Executes dropped EXE
PID:2512 -
\??\c:\jpddp.exec:\jpddp.exe49⤵
- Executes dropped EXE
PID:2588 -
\??\c:\lxfxffl.exec:\lxfxffl.exe50⤵
- Executes dropped EXE
PID:2064 -
\??\c:\llrrfxr.exec:\llrrfxr.exe51⤵
- Executes dropped EXE
PID:2244 -
\??\c:\rxrfxrl.exec:\rxrfxrl.exe52⤵
- Executes dropped EXE
PID:2116 -
\??\c:\hhnhht.exec:\hhnhht.exe53⤵
- Executes dropped EXE
PID:1776 -
\??\c:\thntbh.exec:\thntbh.exe54⤵
- Executes dropped EXE
PID:2208 -
\??\c:\jvjjv.exec:\jvjjv.exe55⤵
- Executes dropped EXE
PID:912 -
\??\c:\pjjpv.exec:\pjjpv.exe56⤵
- Executes dropped EXE
PID:1960 -
\??\c:\jjjvd.exec:\jjjvd.exe57⤵
- Executes dropped EXE
PID:2360 -
\??\c:\3xllrrl.exec:\3xllrrl.exe58⤵
- Executes dropped EXE
PID:688 -
\??\c:\lxlxllr.exec:\lxlxllr.exe59⤵
- Executes dropped EXE
PID:2696 -
\??\c:\7rlrxfr.exec:\7rlrxfr.exe60⤵
- Executes dropped EXE
PID:1968 -
\??\c:\5btntb.exec:\5btntb.exe61⤵
- Executes dropped EXE
PID:2032 -
\??\c:\nhtbhh.exec:\nhtbhh.exe62⤵
- Executes dropped EXE
PID:2324 -
\??\c:\vpjjp.exec:\vpjjp.exe63⤵
- Executes dropped EXE
PID:1672 -
\??\c:\vdpvd.exec:\vdpvd.exe64⤵
- Executes dropped EXE
PID:2144 -
\??\c:\5jdpj.exec:\5jdpj.exe65⤵
- Executes dropped EXE
PID:2276 -
\??\c:\xrrxxfl.exec:\xrrxxfl.exe66⤵PID:828
-
\??\c:\rffrxlx.exec:\rffrxlx.exe67⤵PID:696
-
\??\c:\fxrxllr.exec:\fxrxllr.exe68⤵PID:944
-
\??\c:\3hhhnb.exec:\3hhhnb.exe69⤵PID:2224
-
\??\c:\nhhhtb.exec:\nhhhtb.exe70⤵PID:2068
-
\??\c:\btntbb.exec:\btntbb.exe71⤵PID:2668
-
\??\c:\jjjjp.exec:\jjjjp.exe72⤵PID:2820
-
\??\c:\9jjvp.exec:\9jjvp.exe73⤵PID:2700
-
\??\c:\9jvdp.exec:\9jvdp.exe74⤵PID:1668
-
\??\c:\fxrfrlf.exec:\fxrfrlf.exe75⤵PID:2648
-
\??\c:\lfxxllx.exec:\lfxxllx.exe76⤵PID:1664
-
\??\c:\flrrxrx.exec:\flrrxrx.exe77⤵PID:3048
-
\??\c:\tnhbnb.exec:\tnhbnb.exe78⤵PID:2760
-
\??\c:\tbthht.exec:\tbthht.exe79⤵PID:1176
-
\??\c:\bnhnht.exec:\bnhnht.exe80⤵PID:1868
-
\??\c:\jvpvj.exec:\jvpvj.exe81⤵PID:1300
-
\??\c:\vvpvj.exec:\vvpvj.exe82⤵PID:1824
-
\??\c:\llxfrfx.exec:\llxfrfx.exe83⤵PID:3036
-
\??\c:\rxfxrff.exec:\rxfxrff.exe84⤵PID:2720
-
\??\c:\xxfxxfr.exec:\xxfxxfr.exe85⤵PID:2888
-
\??\c:\3btntt.exec:\3btntt.exe86⤵PID:1604
-
\??\c:\1btbhn.exec:\1btbhn.exe87⤵PID:1224
-
\??\c:\ddpdj.exec:\ddpdj.exe88⤵PID:2332
-
\??\c:\pvpjp.exec:\pvpjp.exe89⤵PID:2588
-
\??\c:\fxlxllx.exec:\fxlxllx.exe90⤵PID:480
-
\??\c:\rrlllrf.exec:\rrlllrf.exe91⤵PID:2176
-
\??\c:\9ffrxlr.exec:\9ffrxlr.exe92⤵PID:2216
-
\??\c:\3bbtbn.exec:\3bbtbn.exe93⤵PID:1776
-
\??\c:\nnnhht.exec:\nnnhht.exe94⤵PID:2208
-
\??\c:\httbnn.exec:\httbnn.exe95⤵PID:912
-
\??\c:\lflllff.exec:\lflllff.exe96⤵PID:2040
-
\??\c:\xfrlrlr.exec:\xfrlrlr.exe97⤵PID:1760
-
\??\c:\tnhhth.exec:\tnhhth.exe98⤵PID:656
-
\??\c:\nnnnth.exec:\nnnnth.exe99⤵PID:636
-
\??\c:\tnbbnt.exec:\tnbbnt.exe100⤵PID:1724
-
\??\c:\dddpv.exec:\dddpv.exe101⤵PID:1464
-
\??\c:\jvdjv.exec:\jvdjv.exe102⤵PID:2320
-
\??\c:\dvppp.exec:\dvppp.exe103⤵PID:2420
-
\??\c:\9fxfxfx.exec:\9fxfxfx.exe104⤵PID:2328
-
\??\c:\xxxrxll.exec:\xxxrxll.exe105⤵PID:1432
-
\??\c:\lxrrflr.exec:\lxrrflr.exe106⤵PID:1692
-
\??\c:\9hhtnt.exec:\9hhtnt.exe107⤵PID:3032
-
\??\c:\bnbntt.exec:\bnbntt.exe108⤵PID:2264
-
\??\c:\dpvpd.exec:\dpvpd.exe109⤵PID:2188
-
\??\c:\djpjv.exec:\djpjv.exe110⤵PID:2536
-
\??\c:\jvdpv.exec:\jvdpv.exe111⤵PID:2556
-
\??\c:\lxlfllx.exec:\lxlfllx.exe112⤵PID:1632
-
\??\c:\lxrrfxx.exec:\lxrrfxx.exe113⤵PID:2796
-
\??\c:\fxrlrxl.exec:\fxrlrxl.exe114⤵PID:1488
-
\??\c:\nhbbnt.exec:\nhbbnt.exe115⤵PID:1828
-
\??\c:\hhthth.exec:\hhthth.exe116⤵PID:2280
-
\??\c:\jjdjp.exec:\jjdjp.exe117⤵PID:1900
-
\??\c:\vpddv.exec:\vpddv.exe118⤵PID:1916
-
\??\c:\1rlrxxf.exec:\1rlrxxf.exe119⤵PID:2532
-
\??\c:\rlflrlf.exec:\rlflrlf.exe120⤵PID:2552
-
\??\c:\thnthn.exec:\thnthn.exe121⤵PID:2976
-
\??\c:\hbnnnt.exec:\hbnnnt.exe122⤵PID:2616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-