Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 15:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe
-
Size
478KB
-
MD5
95a84f35123fbc4bf54820868d70629d
-
SHA1
b9651fa1f14f3023b8d35628d7b3642ad3e4c8bc
-
SHA256
d6bdf3c7641dd0d1f55ea5b30d76981a4e46aeeefa21b849ced974d8316bb644
-
SHA512
99777c7b335f77051bba095107129b01cea0b14a2fcac56216b8f50cb614934ca8fd6aaf1abc0c9451be4e6177361b5802292d0586d605ba24eec2244e8a527b
-
SSDEEP
6144:n3C9BRo7MlrWKo+lS0Le4xRSAoq78yoyfx93svqTP+E4QJWs:n3C9yMo+S0L9xRnoq7H9QYJxWs
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2616-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2496-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1148-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1148-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2936-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2764-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2860-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2848-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/112-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2228-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1500-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/592-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1812-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2344-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2920-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2484-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2460-231-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1576-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1172-278-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-285-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2616 bxphdd.exe 1148 ntdtd.exe 2936 bnvlppf.exe 2848 fdtxvh.exe 2860 hlnjjn.exe 2764 jfvxrbb.exe 2864 drblb.exe 112 npllbbv.exe 2228 tfvnfp.exe 1500 vrxrp.exe 2216 drbrp.exe 592 ffrnbx.exe 2840 fbhndtl.exe 1832 tndxrb.exe 1812 jlbntdj.exe 956 pbjdlnf.exe 2344 ndrfnb.exe 2920 vvlvjf.exe 2484 vnjtb.exe 2392 pdnnv.exe 1544 ljfvvjx.exe 2460 vrbvxbr.exe 1576 nndnd.exe 1340 bbndn.exe 916 tljpvnv.exe 1060 bfjxnld.exe 1172 rthnbn.exe 1676 dlltpvx.exe 2180 trtjv.exe 888 bltxxb.exe 928 bdxlrr.exe 2496 bffpxn.exe 1720 hxpxp.exe 2320 xjxlh.exe 2268 fhxhxf.exe 2892 fvnflrb.exe 704 fltld.exe 3020 rxddfd.exe 2060 fvdpntn.exe 2904 pjlpnll.exe 2976 pdfnxpb.exe 2564 tfnpv.exe 2704 vhbhntf.exe 2644 nflrjl.exe 1036 vnjbpp.exe 2332 phptvln.exe 2728 fxhtv.exe 3064 bvdrx.exe 2216 dvvfj.exe 592 rnnbfr.exe 2492 hrlhhvv.exe 1900 hjndpl.exe 1380 ndnbv.exe 1760 bfdhr.exe 2068 xtjbbvn.exe 2256 fbdhtf.exe 2264 tftnl.exe 272 drljvxp.exe 2484 vtxxrn.exe 2392 rntdvp.exe 1064 hhtxtp.exe 1104 rtlnpp.exe 2248 vpjfr.exe 1328 nvjftv.exe -
resource yara_rule behavioral1/memory/2496-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2616-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1148-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1148-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1148-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1148-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2936-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2936-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2936-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2860-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/112-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/112-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/112-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/112-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2228-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1500-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1812-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2344-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2920-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2460-231-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1576-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1172-278-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-285-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxtjdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vndvn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xdpfn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htrvrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhvhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xjbhj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttdphdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lhddrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fpfrvb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpdfrn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhprp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pbnpltr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrdjrjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhlrdtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language txnrfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flhbxjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xbpvpb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hvhrnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flnltr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlfjxrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxfvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhxrj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbpvfbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bblxb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fftvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jtfvfh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhfrhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jptbx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nvvnjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nxpvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vrbvxbr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fhvhvjn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2616 2496 95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe 29 PID 2496 wrote to memory of 2616 2496 95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe 29 PID 2496 wrote to memory of 2616 2496 95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe 29 PID 2496 wrote to memory of 2616 2496 95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe 29 PID 2616 wrote to memory of 1148 2616 bxphdd.exe 30 PID 2616 wrote to memory of 1148 2616 bxphdd.exe 30 PID 2616 wrote to memory of 1148 2616 bxphdd.exe 30 PID 2616 wrote to memory of 1148 2616 bxphdd.exe 30 PID 1148 wrote to memory of 2936 1148 ntdtd.exe 31 PID 1148 wrote to memory of 2936 1148 ntdtd.exe 31 PID 1148 wrote to memory of 2936 1148 ntdtd.exe 31 PID 1148 wrote to memory of 2936 1148 ntdtd.exe 31 PID 2936 wrote to memory of 2848 2936 bnvlppf.exe 32 PID 2936 wrote to memory of 2848 2936 bnvlppf.exe 32 PID 2936 wrote to memory of 2848 2936 bnvlppf.exe 32 PID 2936 wrote to memory of 2848 2936 bnvlppf.exe 32 PID 2848 wrote to memory of 2860 2848 fdtxvh.exe 33 PID 2848 wrote to memory of 2860 2848 fdtxvh.exe 33 PID 2848 wrote to memory of 2860 2848 fdtxvh.exe 33 PID 2848 wrote to memory of 2860 2848 fdtxvh.exe 33 PID 2860 wrote to memory of 2764 2860 hlnjjn.exe 34 PID 2860 wrote to memory of 2764 2860 hlnjjn.exe 34 PID 2860 wrote to memory of 2764 2860 hlnjjn.exe 34 PID 2860 wrote to memory of 2764 2860 hlnjjn.exe 34 PID 2764 wrote to memory of 2864 2764 jfvxrbb.exe 35 PID 2764 wrote to memory of 2864 2764 jfvxrbb.exe 35 PID 2764 wrote to memory of 2864 2764 jfvxrbb.exe 35 PID 2764 wrote to memory of 2864 2764 jfvxrbb.exe 35 PID 2864 wrote to memory of 112 2864 drblb.exe 36 PID 2864 wrote to memory of 112 2864 drblb.exe 36 PID 2864 wrote to memory of 112 2864 drblb.exe 36 PID 2864 wrote to memory of 112 2864 drblb.exe 36 PID 112 wrote to memory of 2228 112 npllbbv.exe 37 PID 112 wrote to memory of 2228 112 npllbbv.exe 37 PID 112 wrote to memory of 2228 112 npllbbv.exe 37 PID 112 wrote to memory of 2228 112 npllbbv.exe 37 PID 2228 wrote to memory of 1500 2228 tfvnfp.exe 38 PID 2228 wrote to memory of 1500 2228 tfvnfp.exe 38 PID 2228 wrote to memory of 1500 2228 tfvnfp.exe 38 PID 2228 wrote to memory of 1500 2228 tfvnfp.exe 38 PID 1500 wrote to memory of 2216 1500 vrxrp.exe 39 PID 1500 wrote to memory of 2216 1500 vrxrp.exe 39 PID 1500 wrote to memory of 2216 1500 vrxrp.exe 39 PID 1500 wrote to memory of 2216 1500 vrxrp.exe 39 PID 2216 wrote to memory of 592 2216 drbrp.exe 40 PID 2216 wrote to memory of 592 2216 drbrp.exe 40 PID 2216 wrote to memory of 592 2216 drbrp.exe 40 PID 2216 wrote to memory of 592 2216 drbrp.exe 40 PID 592 wrote to memory of 2840 592 ffrnbx.exe 41 PID 592 wrote to memory of 2840 592 ffrnbx.exe 41 PID 592 wrote to memory of 2840 592 ffrnbx.exe 41 PID 592 wrote to memory of 2840 592 ffrnbx.exe 41 PID 2840 wrote to memory of 1832 2840 fbhndtl.exe 42 PID 2840 wrote to memory of 1832 2840 fbhndtl.exe 42 PID 2840 wrote to memory of 1832 2840 fbhndtl.exe 42 PID 2840 wrote to memory of 1832 2840 fbhndtl.exe 42 PID 1832 wrote to memory of 1812 1832 tndxrb.exe 43 PID 1832 wrote to memory of 1812 1832 tndxrb.exe 43 PID 1832 wrote to memory of 1812 1832 tndxrb.exe 43 PID 1832 wrote to memory of 1812 1832 tndxrb.exe 43 PID 1812 wrote to memory of 956 1812 jlbntdj.exe 44 PID 1812 wrote to memory of 956 1812 jlbntdj.exe 44 PID 1812 wrote to memory of 956 1812 jlbntdj.exe 44 PID 1812 wrote to memory of 956 1812 jlbntdj.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
\??\c:\bxphdd.exec:\bxphdd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\ntdtd.exec:\ntdtd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
\??\c:\bnvlppf.exec:\bnvlppf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\fdtxvh.exec:\fdtxvh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\hlnjjn.exec:\hlnjjn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\jfvxrbb.exec:\jfvxrbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\drblb.exec:\drblb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\npllbbv.exec:\npllbbv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:112 -
\??\c:\tfvnfp.exec:\tfvnfp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
\??\c:\vrxrp.exec:\vrxrp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
\??\c:\drbrp.exec:\drbrp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
\??\c:\ffrnbx.exec:\ffrnbx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:592 -
\??\c:\fbhndtl.exec:\fbhndtl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\tndxrb.exec:\tndxrb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
\??\c:\jlbntdj.exec:\jlbntdj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1812 -
\??\c:\pbjdlnf.exec:\pbjdlnf.exe17⤵
- Executes dropped EXE
PID:956 -
\??\c:\ndrfnb.exec:\ndrfnb.exe18⤵
- Executes dropped EXE
PID:2344 -
\??\c:\vvlvjf.exec:\vvlvjf.exe19⤵
- Executes dropped EXE
PID:2920 -
\??\c:\vnjtb.exec:\vnjtb.exe20⤵
- Executes dropped EXE
PID:2484 -
\??\c:\pdnnv.exec:\pdnnv.exe21⤵
- Executes dropped EXE
PID:2392 -
\??\c:\ljfvvjx.exec:\ljfvvjx.exe22⤵
- Executes dropped EXE
PID:1544 -
\??\c:\vrbvxbr.exec:\vrbvxbr.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2460 -
\??\c:\nndnd.exec:\nndnd.exe24⤵
- Executes dropped EXE
PID:1576 -
\??\c:\bbndn.exec:\bbndn.exe25⤵
- Executes dropped EXE
PID:1340 -
\??\c:\tljpvnv.exec:\tljpvnv.exe26⤵
- Executes dropped EXE
PID:916 -
\??\c:\bfjxnld.exec:\bfjxnld.exe27⤵
- Executes dropped EXE
PID:1060 -
\??\c:\rthnbn.exec:\rthnbn.exe28⤵
- Executes dropped EXE
PID:1172 -
\??\c:\dlltpvx.exec:\dlltpvx.exe29⤵
- Executes dropped EXE
PID:1676 -
\??\c:\trtjv.exec:\trtjv.exe30⤵
- Executes dropped EXE
PID:2180 -
\??\c:\bltxxb.exec:\bltxxb.exe31⤵
- Executes dropped EXE
PID:888 -
\??\c:\bdxlrr.exec:\bdxlrr.exe32⤵
- Executes dropped EXE
PID:928 -
\??\c:\bffpxn.exec:\bffpxn.exe33⤵
- Executes dropped EXE
PID:2496 -
\??\c:\hxpxp.exec:\hxpxp.exe34⤵
- Executes dropped EXE
PID:1720 -
\??\c:\xjxlh.exec:\xjxlh.exe35⤵
- Executes dropped EXE
PID:2320 -
\??\c:\fhxhxf.exec:\fhxhxf.exe36⤵
- Executes dropped EXE
PID:2268 -
\??\c:\fvnflrb.exec:\fvnflrb.exe37⤵
- Executes dropped EXE
PID:2892 -
\??\c:\fltld.exec:\fltld.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:704 -
\??\c:\rxddfd.exec:\rxddfd.exe39⤵
- Executes dropped EXE
PID:3020 -
\??\c:\fvdpntn.exec:\fvdpntn.exe40⤵
- Executes dropped EXE
PID:2060 -
\??\c:\pjlpnll.exec:\pjlpnll.exe41⤵
- Executes dropped EXE
PID:2904 -
\??\c:\pdfnxpb.exec:\pdfnxpb.exe42⤵
- Executes dropped EXE
PID:2976 -
\??\c:\tfnpv.exec:\tfnpv.exe43⤵
- Executes dropped EXE
PID:2564 -
\??\c:\vhbhntf.exec:\vhbhntf.exe44⤵
- Executes dropped EXE
PID:2704 -
\??\c:\nflrjl.exec:\nflrjl.exe45⤵
- Executes dropped EXE
PID:2644 -
\??\c:\vnjbpp.exec:\vnjbpp.exe46⤵
- Executes dropped EXE
PID:1036 -
\??\c:\phptvln.exec:\phptvln.exe47⤵
- Executes dropped EXE
PID:2332 -
\??\c:\fxhtv.exec:\fxhtv.exe48⤵
- Executes dropped EXE
PID:2728 -
\??\c:\bvdrx.exec:\bvdrx.exe49⤵
- Executes dropped EXE
PID:3064 -
\??\c:\dvvfj.exec:\dvvfj.exe50⤵
- Executes dropped EXE
PID:2216 -
\??\c:\rnnbfr.exec:\rnnbfr.exe51⤵
- Executes dropped EXE
PID:592 -
\??\c:\hrlhhvv.exec:\hrlhhvv.exe52⤵
- Executes dropped EXE
PID:2492 -
\??\c:\hjndpl.exec:\hjndpl.exe53⤵
- Executes dropped EXE
PID:1900 -
\??\c:\ndnbv.exec:\ndnbv.exe54⤵
- Executes dropped EXE
PID:1380 -
\??\c:\bfdhr.exec:\bfdhr.exe55⤵
- Executes dropped EXE
PID:1760 -
\??\c:\xtjbbvn.exec:\xtjbbvn.exe56⤵
- Executes dropped EXE
PID:2068 -
\??\c:\fbdhtf.exec:\fbdhtf.exe57⤵
- Executes dropped EXE
PID:2256 -
\??\c:\tftnl.exec:\tftnl.exe58⤵
- Executes dropped EXE
PID:2264 -
\??\c:\drljvxp.exec:\drljvxp.exe59⤵
- Executes dropped EXE
PID:272 -
\??\c:\vtxxrn.exec:\vtxxrn.exe60⤵
- Executes dropped EXE
PID:2484 -
\??\c:\rntdvp.exec:\rntdvp.exe61⤵
- Executes dropped EXE
PID:2392 -
\??\c:\hhtxtp.exec:\hhtxtp.exe62⤵
- Executes dropped EXE
PID:1064 -
\??\c:\rtlnpp.exec:\rtlnpp.exe63⤵
- Executes dropped EXE
PID:1104 -
\??\c:\vpjfr.exec:\vpjfr.exe64⤵
- Executes dropped EXE
PID:2248 -
\??\c:\nvjftv.exec:\nvjftv.exe65⤵
- Executes dropped EXE
PID:1328 -
\??\c:\vfttlx.exec:\vfttlx.exe66⤵PID:1700
-
\??\c:\tbdph.exec:\tbdph.exe67⤵PID:812
-
\??\c:\rpfhx.exec:\rpfhx.exe68⤵PID:936
-
\??\c:\lhvfvx.exec:\lhvfvx.exe69⤵PID:1356
-
\??\c:\vtddxx.exec:\vtddxx.exe70⤵PID:1288
-
\??\c:\xnvhtl.exec:\xnvhtl.exe71⤵PID:2324
-
\??\c:\ftntlv.exec:\ftntlv.exe72⤵PID:2180
-
\??\c:\fvjtrn.exec:\fvjtrn.exe73⤵PID:1696
-
\??\c:\phhffb.exec:\phhffb.exe74⤵PID:2648
-
\??\c:\lrbhh.exec:\lrbhh.exe75⤵PID:1704
-
\??\c:\rdddn.exec:\rdddn.exe76⤵PID:2496
-
\??\c:\jhbxlb.exec:\jhbxlb.exe77⤵PID:1720
-
\??\c:\rdtpp.exec:\rdtpp.exe78⤵PID:2320
-
\??\c:\ltxtpp.exec:\ltxtpp.exe79⤵PID:2948
-
\??\c:\hhfvn.exec:\hhfvn.exe80⤵PID:2892
-
\??\c:\trxxbdv.exec:\trxxbdv.exe81⤵PID:2868
-
\??\c:\hhhhbtb.exec:\hhhhbtb.exe82⤵PID:2968
-
\??\c:\nxnjbd.exec:\nxnjbd.exe83⤵PID:2060
-
\??\c:\vnfdhn.exec:\vnfdhn.exe84⤵PID:2768
-
\??\c:\xdxdntx.exec:\xdxdntx.exe85⤵PID:2792
-
\??\c:\hbtpp.exec:\hbtpp.exe86⤵PID:2408
-
\??\c:\tdbln.exec:\tdbln.exe87⤵PID:940
-
\??\c:\pxhdx.exec:\pxhdx.exe88⤵PID:2232
-
\??\c:\jrxtr.exec:\jrxtr.exe89⤵PID:620
-
\??\c:\jthtnvp.exec:\jthtnvp.exe90⤵PID:3048
-
\??\c:\rdxhnt.exec:\rdxhnt.exe91⤵PID:2148
-
\??\c:\bfbhr.exec:\bfbhr.exe92⤵PID:3056
-
\??\c:\hxflnl.exec:\hxflnl.exe93⤵PID:1180
-
\??\c:\vhjhb.exec:\vhjhb.exe94⤵PID:1728
-
\??\c:\prbrnpb.exec:\prbrnpb.exe95⤵PID:2492
-
\??\c:\xpbxln.exec:\xpbxln.exe96⤵PID:908
-
\??\c:\xnnrh.exec:\xnnrh.exe97⤵PID:1380
-
\??\c:\rdhjxvp.exec:\rdhjxvp.exe98⤵PID:956
-
\??\c:\rvvxb.exec:\rvvxb.exe99⤵PID:2344
-
\??\c:\hltdnnn.exec:\hltdnnn.exe100⤵PID:2092
-
\??\c:\xxndh.exec:\xxndh.exe101⤵PID:2264
-
\??\c:\frvbd.exec:\frvbd.exe102⤵PID:320
-
\??\c:\xpxldxt.exec:\xpxldxt.exe103⤵PID:2536
-
\??\c:\rdlfn.exec:\rdlfn.exe104⤵PID:1532
-
\??\c:\lnvtt.exec:\lnvtt.exe105⤵PID:1064
-
\??\c:\hbhrfbh.exec:\hbhrfbh.exe106⤵PID:2460
-
\??\c:\hxhlnff.exec:\hxhlnff.exe107⤵PID:1692
-
\??\c:\lbppvb.exec:\lbppvb.exe108⤵PID:1820
-
\??\c:\xjxllj.exec:\xjxllj.exe109⤵PID:596
-
\??\c:\phhrvb.exec:\phhrvb.exe110⤵PID:1684
-
\??\c:\ffnvbfn.exec:\ffnvbfn.exe111⤵PID:1724
-
\??\c:\fftvp.exec:\fftvp.exe112⤵
- System Location Discovery: System Language Discovery
PID:2024 -
\??\c:\rhpvtdv.exec:\rhpvtdv.exe113⤵PID:796
-
\??\c:\vndbjpx.exec:\vndbjpx.exe114⤵PID:1984
-
\??\c:\nnfbxh.exec:\nnfbxh.exe115⤵PID:972
-
\??\c:\frxdhv.exec:\frxdhv.exe116⤵PID:1696
-
\??\c:\fpdfdd.exec:\fpdfdd.exe117⤵PID:2828
-
\??\c:\ddtfxv.exec:\ddtfxv.exe118⤵PID:2932
-
\??\c:\pbxxxpx.exec:\pbxxxpx.exe119⤵PID:3032
-
\??\c:\jbxbnh.exec:\jbxbnh.exe120⤵PID:2872
-
\??\c:\thnpvt.exec:\thnpvt.exe121⤵PID:2992
-
\??\c:\htxfdx.exec:\htxfdx.exe122⤵PID:472
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-