Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 15:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe
Resource
win7-20241010-en
7 signatures
150 seconds
General
-
Target
95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe
-
Size
478KB
-
MD5
95a84f35123fbc4bf54820868d70629d
-
SHA1
b9651fa1f14f3023b8d35628d7b3642ad3e4c8bc
-
SHA256
d6bdf3c7641dd0d1f55ea5b30d76981a4e46aeeefa21b849ced974d8316bb644
-
SHA512
99777c7b335f77051bba095107129b01cea0b14a2fcac56216b8f50cb614934ca8fd6aaf1abc0c9451be4e6177361b5802292d0586d605ba24eec2244e8a527b
-
SSDEEP
6144:n3C9BRo7MlrWKo+lS0Le4xRSAoq78yoyfx93svqTP+E4QJWs:n3C9yMo+S0L9xRnoq7H9QYJxWs
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 24 IoCs
resource yara_rule behavioral2/memory/2084-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4888-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/396-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2968-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3132-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3480-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2388-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/840-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1636-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4644-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4788-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3560-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4328-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1108-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2340-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5100-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2888-68-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4628-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4464-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2372-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4484-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/428-34-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/428-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/688-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4888 dppdv.exe 688 u222620.exe 396 pdvpp.exe 428 20260.exe 4484 xfffxrr.exe 2372 7hnhtt.exe 4464 68426.exe 4628 080404.exe 2888 7vdvd.exe 5100 flrlffr.exe 2340 1jdpj.exe 1108 3hthhb.exe 4328 thhthb.exe 3444 1fxlffx.exe 3208 862666.exe 4820 jdpjv.exe 3560 3bthtn.exe 4788 xflxlff.exe 1588 vpvvj.exe 1252 vpjjj.exe 4376 vvvjd.exe 2880 080066.exe 4644 frrxrfl.exe 1636 dvvjd.exe 1952 vdddv.exe 840 4484204.exe 2388 pdpdp.exe 3480 k02660.exe 3132 dpjdv.exe 2968 c260442.exe 2264 lxrfrlf.exe 1980 802608.exe 2908 1ppjv.exe 4240 000860.exe 3440 204426.exe 3036 66208.exe 936 9nbnbn.exe 932 206048.exe 4836 4468444.exe 1488 w60668.exe 3448 9pdpv.exe 448 hnbbtn.exe 3500 822048.exe 4448 9vjdp.exe 2444 lxfxlff.exe 1704 088264.exe 4840 rlfrlfr.exe 1932 1ddvv.exe 3360 3hbnbb.exe 4636 ddddp.exe 2632 9btbnh.exe 4396 fxxrlfx.exe 4416 dvpdv.exe 2084 6600246.exe 3312 0284824.exe 1752 2442086.exe 4100 fxrfrlx.exe 4580 dpjjd.exe 4768 vpjdd.exe 1896 jvddp.exe 1068 222648.exe 3388 848204.exe 4552 o620046.exe 4744 42442.exe -
resource yara_rule behavioral2/memory/2084-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4888-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/396-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2968-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3132-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3480-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2388-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1636-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4644-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4788-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4328-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1108-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2340-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5100-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4628-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4464-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2372-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/428-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/688-18-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8664626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 266266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44482.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjppv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q28206.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44408.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9pdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4688844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9btbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrllll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxxrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfffxrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnbnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 4888 2084 95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe 83 PID 2084 wrote to memory of 4888 2084 95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe 83 PID 2084 wrote to memory of 4888 2084 95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe 83 PID 4888 wrote to memory of 688 4888 dppdv.exe 84 PID 4888 wrote to memory of 688 4888 dppdv.exe 84 PID 4888 wrote to memory of 688 4888 dppdv.exe 84 PID 688 wrote to memory of 396 688 u222620.exe 85 PID 688 wrote to memory of 396 688 u222620.exe 85 PID 688 wrote to memory of 396 688 u222620.exe 85 PID 396 wrote to memory of 428 396 pdvpp.exe 86 PID 396 wrote to memory of 428 396 pdvpp.exe 86 PID 396 wrote to memory of 428 396 pdvpp.exe 86 PID 428 wrote to memory of 4484 428 20260.exe 87 PID 428 wrote to memory of 4484 428 20260.exe 87 PID 428 wrote to memory of 4484 428 20260.exe 87 PID 4484 wrote to memory of 2372 4484 xfffxrr.exe 88 PID 4484 wrote to memory of 2372 4484 xfffxrr.exe 88 PID 4484 wrote to memory of 2372 4484 xfffxrr.exe 88 PID 2372 wrote to memory of 4464 2372 7hnhtt.exe 89 PID 2372 wrote to memory of 4464 2372 7hnhtt.exe 89 PID 2372 wrote to memory of 4464 2372 7hnhtt.exe 89 PID 4464 wrote to memory of 4628 4464 68426.exe 90 PID 4464 wrote to memory of 4628 4464 68426.exe 90 PID 4464 wrote to memory of 4628 4464 68426.exe 90 PID 4628 wrote to memory of 2888 4628 080404.exe 91 PID 4628 wrote to memory of 2888 4628 080404.exe 91 PID 4628 wrote to memory of 2888 4628 080404.exe 91 PID 2888 wrote to memory of 5100 2888 7vdvd.exe 92 PID 2888 wrote to memory of 5100 2888 7vdvd.exe 92 PID 2888 wrote to memory of 5100 2888 7vdvd.exe 92 PID 5100 wrote to memory of 2340 5100 flrlffr.exe 93 PID 5100 wrote to memory of 2340 5100 flrlffr.exe 93 PID 5100 wrote to memory of 2340 5100 flrlffr.exe 93 PID 2340 wrote to memory of 1108 2340 1jdpj.exe 94 PID 2340 wrote to memory of 1108 2340 1jdpj.exe 94 PID 2340 wrote to memory of 1108 2340 1jdpj.exe 94 PID 1108 wrote to memory of 4328 1108 3hthhb.exe 95 PID 1108 wrote to memory of 4328 1108 3hthhb.exe 95 PID 1108 wrote to memory of 4328 1108 3hthhb.exe 95 PID 4328 wrote to memory of 3444 4328 thhthb.exe 96 PID 4328 wrote to memory of 3444 4328 thhthb.exe 96 PID 4328 wrote to memory of 3444 4328 thhthb.exe 96 PID 3444 wrote to memory of 3208 3444 1fxlffx.exe 97 PID 3444 wrote to memory of 3208 3444 1fxlffx.exe 97 PID 3444 wrote to memory of 3208 3444 1fxlffx.exe 97 PID 3208 wrote to memory of 4820 3208 862666.exe 98 PID 3208 wrote to memory of 4820 3208 862666.exe 98 PID 3208 wrote to memory of 4820 3208 862666.exe 98 PID 4820 wrote to memory of 3560 4820 jdpjv.exe 99 PID 4820 wrote to memory of 3560 4820 jdpjv.exe 99 PID 4820 wrote to memory of 3560 4820 jdpjv.exe 99 PID 3560 wrote to memory of 4788 3560 3bthtn.exe 100 PID 3560 wrote to memory of 4788 3560 3bthtn.exe 100 PID 3560 wrote to memory of 4788 3560 3bthtn.exe 100 PID 4788 wrote to memory of 1588 4788 xflxlff.exe 101 PID 4788 wrote to memory of 1588 4788 xflxlff.exe 101 PID 4788 wrote to memory of 1588 4788 xflxlff.exe 101 PID 1588 wrote to memory of 1252 1588 vpvvj.exe 102 PID 1588 wrote to memory of 1252 1588 vpvvj.exe 102 PID 1588 wrote to memory of 1252 1588 vpvvj.exe 102 PID 1252 wrote to memory of 4376 1252 vpjjj.exe 158 PID 1252 wrote to memory of 4376 1252 vpjjj.exe 158 PID 1252 wrote to memory of 4376 1252 vpjjj.exe 158 PID 4376 wrote to memory of 2880 4376 vvvjd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\95a84f35123fbc4bf54820868d70629d_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\dppdv.exec:\dppdv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
\??\c:\u222620.exec:\u222620.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
\??\c:\pdvpp.exec:\pdvpp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
\??\c:\20260.exec:\20260.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:428 -
\??\c:\xfffxrr.exec:\xfffxrr.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
\??\c:\7hnhtt.exec:\7hnhtt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\68426.exec:\68426.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
\??\c:\080404.exec:\080404.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
\??\c:\7vdvd.exec:\7vdvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
\??\c:\flrlffr.exec:\flrlffr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
\??\c:\1jdpj.exec:\1jdpj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\3hthhb.exec:\3hthhb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
\??\c:\thhthb.exec:\thhthb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
\??\c:\1fxlffx.exec:\1fxlffx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3444 -
\??\c:\862666.exec:\862666.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
\??\c:\jdpjv.exec:\jdpjv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
\??\c:\3bthtn.exec:\3bthtn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3560 -
\??\c:\xflxlff.exec:\xflxlff.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
\??\c:\vpvvj.exec:\vpvvj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\vpjjj.exec:\vpjjj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
\??\c:\vvvjd.exec:\vvvjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4376 -
\??\c:\080066.exec:\080066.exe23⤵
- Executes dropped EXE
PID:2880 -
\??\c:\frrxrfl.exec:\frrxrfl.exe24⤵
- Executes dropped EXE
PID:4644 -
\??\c:\dvvjd.exec:\dvvjd.exe25⤵
- Executes dropped EXE
PID:1636 -
\??\c:\vdddv.exec:\vdddv.exe26⤵
- Executes dropped EXE
PID:1952 -
\??\c:\4484204.exec:\4484204.exe27⤵
- Executes dropped EXE
PID:840 -
\??\c:\pdpdp.exec:\pdpdp.exe28⤵
- Executes dropped EXE
PID:2388 -
\??\c:\k02660.exec:\k02660.exe29⤵
- Executes dropped EXE
PID:3480 -
\??\c:\dpjdv.exec:\dpjdv.exe30⤵
- Executes dropped EXE
PID:3132 -
\??\c:\c260442.exec:\c260442.exe31⤵
- Executes dropped EXE
PID:2968 -
\??\c:\lxrfrlf.exec:\lxrfrlf.exe32⤵
- Executes dropped EXE
PID:2264 -
\??\c:\802608.exec:\802608.exe33⤵
- Executes dropped EXE
PID:1980 -
\??\c:\1ppjv.exec:\1ppjv.exe34⤵
- Executes dropped EXE
PID:2908 -
\??\c:\000860.exec:\000860.exe35⤵
- Executes dropped EXE
PID:4240 -
\??\c:\204426.exec:\204426.exe36⤵
- Executes dropped EXE
PID:3440 -
\??\c:\66208.exec:\66208.exe37⤵
- Executes dropped EXE
PID:3036 -
\??\c:\9nbnbn.exec:\9nbnbn.exe38⤵
- Executes dropped EXE
PID:936 -
\??\c:\206048.exec:\206048.exe39⤵
- Executes dropped EXE
PID:932 -
\??\c:\4468444.exec:\4468444.exe40⤵
- Executes dropped EXE
PID:4836 -
\??\c:\w60668.exec:\w60668.exe41⤵
- Executes dropped EXE
PID:1488 -
\??\c:\9pdpv.exec:\9pdpv.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3448 -
\??\c:\hnbbtn.exec:\hnbbtn.exe43⤵
- Executes dropped EXE
PID:448 -
\??\c:\822048.exec:\822048.exe44⤵
- Executes dropped EXE
PID:3500 -
\??\c:\9vjdp.exec:\9vjdp.exe45⤵
- Executes dropped EXE
PID:4448 -
\??\c:\lxfxlff.exec:\lxfxlff.exe46⤵
- Executes dropped EXE
PID:2444 -
\??\c:\088264.exec:\088264.exe47⤵
- Executes dropped EXE
PID:1704 -
\??\c:\rlfrlfr.exec:\rlfrlfr.exe48⤵
- Executes dropped EXE
PID:4840 -
\??\c:\1ddvv.exec:\1ddvv.exe49⤵
- Executes dropped EXE
PID:1932 -
\??\c:\3hbnbb.exec:\3hbnbb.exe50⤵
- Executes dropped EXE
PID:3360 -
\??\c:\ddddp.exec:\ddddp.exe51⤵
- Executes dropped EXE
PID:4636 -
\??\c:\9btbnh.exec:\9btbnh.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2632 -
\??\c:\fxxrlfx.exec:\fxxrlfx.exe53⤵
- Executes dropped EXE
PID:4396 -
\??\c:\dvpdv.exec:\dvpdv.exe54⤵
- Executes dropped EXE
PID:4416 -
\??\c:\6600246.exec:\6600246.exe55⤵
- Executes dropped EXE
PID:2084 -
\??\c:\0284824.exec:\0284824.exe56⤵
- Executes dropped EXE
PID:3312 -
\??\c:\2442086.exec:\2442086.exe57⤵
- Executes dropped EXE
PID:1752 -
\??\c:\fxrfrlx.exec:\fxrfrlx.exe58⤵
- Executes dropped EXE
PID:4100 -
\??\c:\dpjjd.exec:\dpjjd.exe59⤵
- Executes dropped EXE
PID:4580 -
\??\c:\vpjdd.exec:\vpjdd.exe60⤵
- Executes dropped EXE
PID:4768 -
\??\c:\jvddp.exec:\jvddp.exe61⤵
- Executes dropped EXE
PID:1896 -
\??\c:\222648.exec:\222648.exe62⤵
- Executes dropped EXE
PID:1068 -
\??\c:\848204.exec:\848204.exe63⤵
- Executes dropped EXE
PID:3388 -
\??\c:\o620046.exec:\o620046.exe64⤵
- Executes dropped EXE
PID:4552 -
\??\c:\42442.exec:\42442.exe65⤵
- Executes dropped EXE
PID:4744 -
\??\c:\4804448.exec:\4804448.exe66⤵PID:8
-
\??\c:\80608.exec:\80608.exe67⤵PID:1476
-
\??\c:\62886.exec:\62886.exe68⤵PID:4084
-
\??\c:\ddjpd.exec:\ddjpd.exe69⤵PID:5060
-
\??\c:\9ddpp.exec:\9ddpp.exe70⤵PID:3852
-
\??\c:\btbttn.exec:\btbttn.exe71⤵PID:3628
-
\??\c:\hthbtn.exec:\hthbtn.exe72⤵PID:4248
-
\??\c:\7flxlfl.exec:\7flxlfl.exe73⤵PID:1396
-
\??\c:\42828.exec:\42828.exe74⤵PID:3580
-
\??\c:\062866.exec:\062866.exe75⤵PID:3416
-
\??\c:\a6200.exec:\a6200.exe76⤵PID:3372
-
\??\c:\nbhhtt.exec:\nbhhtt.exe77⤵PID:4376
-
\??\c:\060482.exec:\060482.exe78⤵PID:3172
-
\??\c:\xxrflfl.exec:\xxrflfl.exe79⤵PID:1696
-
\??\c:\vjvjd.exec:\vjvjd.exe80⤵PID:2016
-
\??\c:\000082.exec:\000082.exe81⤵PID:3384
-
\??\c:\9ttnbt.exec:\9ttnbt.exe82⤵PID:3132
-
\??\c:\fxlxfrr.exec:\fxlxfrr.exe83⤵PID:1216
-
\??\c:\bhbthb.exec:\bhbthb.exe84⤵PID:1832
-
\??\c:\nbthbn.exec:\nbthbn.exe85⤵PID:1480
-
\??\c:\hnnbtn.exec:\hnnbtn.exe86⤵PID:1304
-
\??\c:\220204.exec:\220204.exe87⤵PID:4240
-
\??\c:\k80062.exec:\k80062.exe88⤵PID:1684
-
\??\c:\nbttbb.exec:\nbttbb.exe89⤵PID:936
-
\??\c:\64088.exec:\64088.exe90⤵PID:2496
-
\??\c:\k28664.exec:\k28664.exe91⤵PID:3608
-
\??\c:\08286.exec:\08286.exe92⤵PID:4124
-
\??\c:\4200848.exec:\4200848.exe93⤵PID:1116
-
\??\c:\frrlfxr.exec:\frrlfxr.exe94⤵PID:1740
-
\??\c:\nnhbnh.exec:\nnhbnh.exe95⤵PID:2932
-
\??\c:\s8844.exec:\s8844.exe96⤵PID:3096
-
\??\c:\4048608.exec:\4048608.exe97⤵PID:4808
-
\??\c:\jpjvd.exec:\jpjvd.exe98⤵PID:1020
-
\??\c:\806848.exec:\806848.exe99⤵PID:2120
-
\??\c:\xfrflrx.exec:\xfrflrx.exe100⤵PID:4636
-
\??\c:\pjdvp.exec:\pjdvp.exe101⤵PID:1864
-
\??\c:\tbhbnn.exec:\tbhbnn.exe102⤵PID:2832
-
\??\c:\822682.exec:\822682.exe103⤵PID:312
-
\??\c:\62482.exec:\62482.exe104⤵PID:2084
-
\??\c:\lrxxxxx.exec:\lrxxxxx.exe105⤵PID:436
-
\??\c:\dpvjj.exec:\dpvjj.exe106⤵PID:1752
-
\??\c:\u062262.exec:\u062262.exe107⤵PID:2896
-
\??\c:\4604826.exec:\4604826.exe108⤵PID:4364
-
\??\c:\nhnbnn.exec:\nhnbnn.exe109⤵PID:1580
-
\??\c:\frlfxrl.exec:\frlfxrl.exe110⤵PID:2816
-
\??\c:\frrfxlf.exec:\frrfxlf.exe111⤵PID:1060
-
\??\c:\djvdp.exec:\djvdp.exe112⤵PID:2184
-
\??\c:\644860.exec:\644860.exe113⤵PID:4384
-
\??\c:\666864.exec:\666864.exe114⤵PID:2732
-
\??\c:\04624.exec:\04624.exe115⤵PID:3292
-
\??\c:\nnnbnh.exec:\nnnbnh.exe116⤵PID:4424
-
\??\c:\xxlflfx.exec:\xxlflfx.exe117⤵PID:2104
-
\??\c:\200426.exec:\200426.exe118⤵PID:4968
-
\??\c:\644646.exec:\644646.exe119⤵PID:1400
-
\??\c:\3jdpd.exec:\3jdpd.exe120⤵PID:5060
-
\??\c:\xffxrlr.exec:\xffxrlr.exe121⤵PID:884
-
\??\c:\tbtnhb.exec:\tbtnhb.exe122⤵PID:2868
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-