Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 22:59
Static task
static1
Behavioral task
behavioral1
Sample
9125b71d52991210dc862711780a8977_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
9125b71d52991210dc862711780a8977_JaffaCakes118.exe
-
Size
91KB
-
MD5
9125b71d52991210dc862711780a8977
-
SHA1
7d71e7d26468b55d77a8481f059747024c89d302
-
SHA256
ddb01e0102c74582d816bba45a2ad8bc9b7556535d7f6a4f5535c85cdf0a0477
-
SHA512
5eda14585174deef761b0b6e31f85fe612e57fc6bac8aea04a79055b60e60adc8027d3341ac5b9af413d76b2c3ea85894f27284720671817733a84ccf330f82b
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo7xCkTsIRwnoh2UzSNuNR85/jn:ymb3NkkiQ3mdBjFo7LAIRUohT2Ny85/L
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/1620-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4436-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2192-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2852-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3036-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1484-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3164-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3140-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5020-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2696-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3636-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3432-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2928-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/632-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1744-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1612-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2620-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2628-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1064-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2156-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4660-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1812-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4840-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2364-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2968-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
dvjvv.exe440406.exe64486.exe0288260.exe5dpjd.exe28468.exexflxrfr.exejjjvd.exenbhbhb.exepddpj.exe8626824.exe466604.exe02068.exevvjjd.exe3frxffx.exe66260.exe488826.exe600246.exe80664.exehnnbbn.exejddvd.exe8282264.exe406046.exefxfxfxl.exe1bthbt.exetbbthh.exelflffff.exe02046.exenhnntt.exe88088.exevvjpj.exe42484.exefrrfrlx.exejjdvj.exe02026.exejjpdv.exe2882048.exe08826.exebbtnbb.exejpvpj.exedpjdj.exentnntb.exeppjpj.exexlfxlfx.exe64260.exepdvpd.exejdjdv.exe484404.exe868266.exe688266.exentnhnt.exellxlfxl.exe4826842.exe280804.exepvvpj.exe00466.exe84008.exefxxxxrf.exexrxxrlr.exedddvj.exe44466.exe9ffxrll.exew46004.exe06204.exepid process 4436 dvjvv.exe 2192 440406.exe 5040 64486.exe 2852 0288260.exe 3036 5dpjd.exe 1484 28468.exe 3164 xflxrfr.exe 3140 jjjvd.exe 5020 nbhbhb.exe 2324 pddpj.exe 2696 8626824.exe 3916 466604.exe 3636 02068.exe 3432 vvjjd.exe 2928 3frxffx.exe 632 66260.exe 1744 488826.exe 2824 600246.exe 3656 80664.exe 1612 hnnbbn.exe 2620 jddvd.exe 3116 8282264.exe 2628 406046.exe 1064 fxfxfxl.exe 3472 1bthbt.exe 2156 tbbthh.exe 4660 lflffff.exe 1812 02046.exe 4840 nhnntt.exe 2364 88088.exe 2968 vvjpj.exe 4316 42484.exe 740 frrfrlx.exe 3288 jjdvj.exe 4592 02026.exe 696 jjpdv.exe 4556 2882048.exe 4732 08826.exe 4604 bbtnbb.exe 1472 jpvpj.exe 4772 dpjdj.exe 4056 ntnntb.exe 4968 ppjpj.exe 4312 xlfxlfx.exe 2988 64260.exe 1316 pdvpd.exe 4836 jdjdv.exe 1044 484404.exe 1448 868266.exe 772 688266.exe 4268 ntnhnt.exe 3952 llxlfxl.exe 5112 4826842.exe 3096 280804.exe 2312 pvvpj.exe 2328 00466.exe 3292 84008.exe 1796 fxxxxrf.exe 964 xrxxrlr.exe 428 dddvj.exe 2572 44466.exe 1628 9ffxrll.exe 4804 w46004.exe 3636 06204.exe -
Processes:
resource yara_rule behavioral2/memory/1620-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4436-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4436-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4436-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2192-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2852-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3036-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3036-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1484-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3164-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3140-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3140-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3140-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5020-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2696-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3636-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3432-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2928-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/632-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1744-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1612-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2620-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2628-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1064-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2156-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4660-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1812-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4840-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2364-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2968-208-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
jpdpv.exenhhhbb.exe28404.exejdpjd.exe86484.exefxxxrrl.exe88028.exejjpjj.exe862686.exe6626448.exe084444.exe000006.exe84422.exe06204.exe0684848.exepjvjp.exerrfxfll.exedvpdv.exe3bthbt.exebtbnnh.exe46868.exettbtnb.exe264844.exe0600404.exebtnnnt.exe06862.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpdpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhhhbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxxxrrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjpjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 862686.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6626448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 084444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 000006.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0684848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrfxfll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bthbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ttbtnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 264844.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0600404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btnnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06862.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9125b71d52991210dc862711780a8977_JaffaCakes118.exedvjvv.exe440406.exe64486.exe0288260.exe5dpjd.exe28468.exexflxrfr.exejjjvd.exenbhbhb.exepddpj.exe8626824.exe466604.exe02068.exevvjjd.exe3frxffx.exe66260.exe488826.exe600246.exe80664.exehnnbbn.exejddvd.exedescription pid process target process PID 1620 wrote to memory of 4436 1620 9125b71d52991210dc862711780a8977_JaffaCakes118.exe dvjvv.exe PID 1620 wrote to memory of 4436 1620 9125b71d52991210dc862711780a8977_JaffaCakes118.exe dvjvv.exe PID 1620 wrote to memory of 4436 1620 9125b71d52991210dc862711780a8977_JaffaCakes118.exe dvjvv.exe PID 4436 wrote to memory of 2192 4436 dvjvv.exe 440406.exe PID 4436 wrote to memory of 2192 4436 dvjvv.exe 440406.exe PID 4436 wrote to memory of 2192 4436 dvjvv.exe 440406.exe PID 2192 wrote to memory of 5040 2192 440406.exe 64486.exe PID 2192 wrote to memory of 5040 2192 440406.exe 64486.exe PID 2192 wrote to memory of 5040 2192 440406.exe 64486.exe PID 5040 wrote to memory of 2852 5040 64486.exe 0288260.exe PID 5040 wrote to memory of 2852 5040 64486.exe 0288260.exe PID 5040 wrote to memory of 2852 5040 64486.exe 0288260.exe PID 2852 wrote to memory of 3036 2852 0288260.exe 5dpjd.exe PID 2852 wrote to memory of 3036 2852 0288260.exe 5dpjd.exe PID 2852 wrote to memory of 3036 2852 0288260.exe 5dpjd.exe PID 3036 wrote to memory of 1484 3036 5dpjd.exe 28468.exe PID 3036 wrote to memory of 1484 3036 5dpjd.exe 28468.exe PID 3036 wrote to memory of 1484 3036 5dpjd.exe 28468.exe PID 1484 wrote to memory of 3164 1484 28468.exe xflxrfr.exe PID 1484 wrote to memory of 3164 1484 28468.exe xflxrfr.exe PID 1484 wrote to memory of 3164 1484 28468.exe xflxrfr.exe PID 3164 wrote to memory of 3140 3164 xflxrfr.exe jjjvd.exe PID 3164 wrote to memory of 3140 3164 xflxrfr.exe jjjvd.exe PID 3164 wrote to memory of 3140 3164 xflxrfr.exe jjjvd.exe PID 3140 wrote to memory of 5020 3140 jjjvd.exe nbhbhb.exe PID 3140 wrote to memory of 5020 3140 jjjvd.exe nbhbhb.exe PID 3140 wrote to memory of 5020 3140 jjjvd.exe nbhbhb.exe PID 5020 wrote to memory of 2324 5020 nbhbhb.exe pddpj.exe PID 5020 wrote to memory of 2324 5020 nbhbhb.exe pddpj.exe PID 5020 wrote to memory of 2324 5020 nbhbhb.exe pddpj.exe PID 2324 wrote to memory of 2696 2324 pddpj.exe 8626824.exe PID 2324 wrote to memory of 2696 2324 pddpj.exe 8626824.exe PID 2324 wrote to memory of 2696 2324 pddpj.exe 8626824.exe PID 2696 wrote to memory of 3916 2696 8626824.exe 466604.exe PID 2696 wrote to memory of 3916 2696 8626824.exe 466604.exe PID 2696 wrote to memory of 3916 2696 8626824.exe 466604.exe PID 3916 wrote to memory of 3636 3916 466604.exe 02068.exe PID 3916 wrote to memory of 3636 3916 466604.exe 02068.exe PID 3916 wrote to memory of 3636 3916 466604.exe 02068.exe PID 3636 wrote to memory of 3432 3636 02068.exe vvjjd.exe PID 3636 wrote to memory of 3432 3636 02068.exe vvjjd.exe PID 3636 wrote to memory of 3432 3636 02068.exe vvjjd.exe PID 3432 wrote to memory of 2928 3432 vvjjd.exe 3frxffx.exe PID 3432 wrote to memory of 2928 3432 vvjjd.exe 3frxffx.exe PID 3432 wrote to memory of 2928 3432 vvjjd.exe 3frxffx.exe PID 2928 wrote to memory of 632 2928 3frxffx.exe 66260.exe PID 2928 wrote to memory of 632 2928 3frxffx.exe 66260.exe PID 2928 wrote to memory of 632 2928 3frxffx.exe 66260.exe PID 632 wrote to memory of 1744 632 66260.exe 488826.exe PID 632 wrote to memory of 1744 632 66260.exe 488826.exe PID 632 wrote to memory of 1744 632 66260.exe 488826.exe PID 1744 wrote to memory of 2824 1744 488826.exe 600246.exe PID 1744 wrote to memory of 2824 1744 488826.exe 600246.exe PID 1744 wrote to memory of 2824 1744 488826.exe 600246.exe PID 2824 wrote to memory of 3656 2824 600246.exe 80664.exe PID 2824 wrote to memory of 3656 2824 600246.exe 80664.exe PID 2824 wrote to memory of 3656 2824 600246.exe 80664.exe PID 3656 wrote to memory of 1612 3656 80664.exe hnnbbn.exe PID 3656 wrote to memory of 1612 3656 80664.exe hnnbbn.exe PID 3656 wrote to memory of 1612 3656 80664.exe hnnbbn.exe PID 1612 wrote to memory of 2620 1612 hnnbbn.exe jddvd.exe PID 1612 wrote to memory of 2620 1612 hnnbbn.exe jddvd.exe PID 1612 wrote to memory of 2620 1612 hnnbbn.exe jddvd.exe PID 2620 wrote to memory of 3116 2620 jddvd.exe 8282264.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9125b71d52991210dc862711780a8977_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9125b71d52991210dc862711780a8977_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
\??\c:\dvjvv.exec:\dvjvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
\??\c:\440406.exec:\440406.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\64486.exec:\64486.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
\??\c:\0288260.exec:\0288260.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\5dpjd.exec:\5dpjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\28468.exec:\28468.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1484 -
\??\c:\xflxrfr.exec:\xflxrfr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
\??\c:\jjjvd.exec:\jjjvd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
\??\c:\nbhbhb.exec:\nbhbhb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5020 -
\??\c:\pddpj.exec:\pddpj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\8626824.exec:\8626824.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\466604.exec:\466604.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3916 -
\??\c:\02068.exec:\02068.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
\??\c:\vvjjd.exec:\vvjjd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
\??\c:\3frxffx.exec:\3frxffx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\66260.exec:\66260.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:632 -
\??\c:\488826.exec:\488826.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
\??\c:\600246.exec:\600246.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\80664.exec:\80664.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3656 -
\??\c:\hnnbbn.exec:\hnnbbn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612 -
\??\c:\jddvd.exec:\jddvd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\8282264.exec:\8282264.exe23⤵
- Executes dropped EXE
PID:3116 -
\??\c:\406046.exec:\406046.exe24⤵
- Executes dropped EXE
PID:2628 -
\??\c:\fxfxfxl.exec:\fxfxfxl.exe25⤵
- Executes dropped EXE
PID:1064 -
\??\c:\1bthbt.exec:\1bthbt.exe26⤵
- Executes dropped EXE
PID:3472 -
\??\c:\tbbthh.exec:\tbbthh.exe27⤵
- Executes dropped EXE
PID:2156 -
\??\c:\lflffff.exec:\lflffff.exe28⤵
- Executes dropped EXE
PID:4660 -
\??\c:\02046.exec:\02046.exe29⤵
- Executes dropped EXE
PID:1812 -
\??\c:\nhnntt.exec:\nhnntt.exe30⤵
- Executes dropped EXE
PID:4840 -
\??\c:\88088.exec:\88088.exe31⤵
- Executes dropped EXE
PID:2364 -
\??\c:\vvjpj.exec:\vvjpj.exe32⤵
- Executes dropped EXE
PID:2968 -
\??\c:\42484.exec:\42484.exe33⤵
- Executes dropped EXE
PID:4316 -
\??\c:\frrfrlx.exec:\frrfrlx.exe34⤵
- Executes dropped EXE
PID:740 -
\??\c:\jjdvj.exec:\jjdvj.exe35⤵
- Executes dropped EXE
PID:3288 -
\??\c:\02026.exec:\02026.exe36⤵
- Executes dropped EXE
PID:4592 -
\??\c:\jjpdv.exec:\jjpdv.exe37⤵
- Executes dropped EXE
PID:696 -
\??\c:\2882048.exec:\2882048.exe38⤵
- Executes dropped EXE
PID:4556 -
\??\c:\08826.exec:\08826.exe39⤵
- Executes dropped EXE
PID:4732 -
\??\c:\bbtnbb.exec:\bbtnbb.exe40⤵
- Executes dropped EXE
PID:4604 -
\??\c:\jpvpj.exec:\jpvpj.exe41⤵
- Executes dropped EXE
PID:1472 -
\??\c:\dpjdj.exec:\dpjdj.exe42⤵
- Executes dropped EXE
PID:4772 -
\??\c:\ntnntb.exec:\ntnntb.exe43⤵
- Executes dropped EXE
PID:4056 -
\??\c:\ppjpj.exec:\ppjpj.exe44⤵
- Executes dropped EXE
PID:4968 -
\??\c:\xlfxlfx.exec:\xlfxlfx.exe45⤵
- Executes dropped EXE
PID:4312 -
\??\c:\64260.exec:\64260.exe46⤵
- Executes dropped EXE
PID:2988 -
\??\c:\pdvpd.exec:\pdvpd.exe47⤵
- Executes dropped EXE
PID:1316 -
\??\c:\jdjdv.exec:\jdjdv.exe48⤵
- Executes dropped EXE
PID:4836 -
\??\c:\484404.exec:\484404.exe49⤵
- Executes dropped EXE
PID:1044 -
\??\c:\868266.exec:\868266.exe50⤵
- Executes dropped EXE
PID:1448 -
\??\c:\688266.exec:\688266.exe51⤵
- Executes dropped EXE
PID:772 -
\??\c:\ntnhnt.exec:\ntnhnt.exe52⤵
- Executes dropped EXE
PID:4268 -
\??\c:\llxlfxl.exec:\llxlfxl.exe53⤵
- Executes dropped EXE
PID:3952 -
\??\c:\4826842.exec:\4826842.exe54⤵
- Executes dropped EXE
PID:5112 -
\??\c:\280804.exec:\280804.exe55⤵
- Executes dropped EXE
PID:3096 -
\??\c:\pvvpj.exec:\pvvpj.exe56⤵
- Executes dropped EXE
PID:2312 -
\??\c:\00466.exec:\00466.exe57⤵
- Executes dropped EXE
PID:2328 -
\??\c:\84008.exec:\84008.exe58⤵
- Executes dropped EXE
PID:3292 -
\??\c:\fxxxxrf.exec:\fxxxxrf.exe59⤵
- Executes dropped EXE
PID:1796 -
\??\c:\xrxxrlr.exec:\xrxxrlr.exe60⤵
- Executes dropped EXE
PID:964 -
\??\c:\dddvj.exec:\dddvj.exe61⤵
- Executes dropped EXE
PID:428 -
\??\c:\44466.exec:\44466.exe62⤵
- Executes dropped EXE
PID:2572 -
\??\c:\9ffxrll.exec:\9ffxrll.exe63⤵
- Executes dropped EXE
PID:1628 -
\??\c:\w46004.exec:\w46004.exe64⤵
- Executes dropped EXE
PID:4804 -
\??\c:\06204.exec:\06204.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3636 -
\??\c:\vjdvd.exec:\vjdvd.exe66⤵PID:1148
-
\??\c:\btbnnh.exec:\btbnnh.exe67⤵
- System Location Discovery: System Language Discovery
PID:2928 -
\??\c:\28426.exec:\28426.exe68⤵PID:1404
-
\??\c:\s0266.exec:\s0266.exe69⤵PID:60
-
\??\c:\htnhtn.exec:\htnhtn.exe70⤵PID:1052
-
\??\c:\jjdvp.exec:\jjdvp.exe71⤵PID:1536
-
\??\c:\7bbttt.exec:\7bbttt.exe72⤵PID:1736
-
\??\c:\028488.exec:\028488.exe73⤵PID:2236
-
\??\c:\vppjp.exec:\vppjp.exe74⤵PID:1684
-
\??\c:\6000484.exec:\6000484.exe75⤵PID:4920
-
\??\c:\284606.exec:\284606.exe76⤵PID:1268
-
\??\c:\lrxxrfl.exec:\lrxxrfl.exe77⤵PID:4128
-
\??\c:\m2660.exec:\m2660.exe78⤵PID:4004
-
\??\c:\htbbbb.exec:\htbbbb.exe79⤵PID:3264
-
\??\c:\rrllrlr.exec:\rrllrlr.exe80⤵PID:2156
-
\??\c:\a6864.exec:\a6864.exe81⤵PID:3696
-
\??\c:\86484.exec:\86484.exe82⤵
- System Location Discovery: System Language Discovery
PID:1000 -
\??\c:\btnnhh.exec:\btnnhh.exe83⤵PID:4840
-
\??\c:\hbnbbb.exec:\hbnbbb.exe84⤵PID:2160
-
\??\c:\7nbhnn.exec:\7nbhnn.exe85⤵PID:4692
-
\??\c:\jpvvj.exec:\jpvvj.exe86⤵PID:2488
-
\??\c:\04004.exec:\04004.exe87⤵PID:1180
-
\??\c:\8002608.exec:\8002608.exe88⤵PID:2676
-
\??\c:\dvdpj.exec:\dvdpj.exe89⤵PID:4568
-
\??\c:\082082.exec:\082082.exe90⤵PID:3464
-
\??\c:\6444046.exec:\6444046.exe91⤵PID:5076
-
\??\c:\ffxxxll.exec:\ffxxxll.exe92⤵PID:3508
-
\??\c:\224068.exec:\224068.exe93⤵PID:5048
-
\??\c:\w40000.exec:\w40000.exe94⤵PID:4936
-
\??\c:\htnnhn.exec:\htnnhn.exe95⤵PID:4644
-
\??\c:\nhtnhh.exec:\nhtnhh.exe96⤵PID:3972
-
\??\c:\pvvdj.exec:\pvvdj.exe97⤵PID:4324
-
\??\c:\thtbhh.exec:\thtbhh.exe98⤵PID:4060
-
\??\c:\88028.exec:\88028.exe99⤵
- System Location Discovery: System Language Discovery
PID:368 -
\??\c:\fffrlrf.exec:\fffrlrf.exe100⤵PID:4940
-
\??\c:\5bhttt.exec:\5bhttt.exe101⤵PID:4756
-
\??\c:\jjvjv.exec:\jjvjv.exe102⤵PID:2728
-
\??\c:\a6006.exec:\a6006.exe103⤵PID:5040
-
\??\c:\5tnbth.exec:\5tnbth.exe104⤵PID:3492
-
\??\c:\rllfxxr.exec:\rllfxxr.exe105⤵PID:3036
-
\??\c:\jddjd.exec:\jddjd.exe106⤵PID:2556
-
\??\c:\hnbhnn.exec:\hnbhnn.exe107⤵PID:1844
-
\??\c:\rrlfxxr.exec:\rrlfxxr.exe108⤵PID:1848
-
\??\c:\844884.exec:\844884.exe109⤵PID:4532
-
\??\c:\602040.exec:\602040.exe110⤵PID:4828
-
\??\c:\460040.exec:\460040.exe111⤵PID:2864
-
\??\c:\btnbhn.exec:\btnbhn.exe112⤵PID:3564
-
\??\c:\a2444.exec:\a2444.exe113⤵PID:4560
-
\??\c:\86048.exec:\86048.exe114⤵PID:2568
-
\??\c:\vpvvp.exec:\vpvvp.exe115⤵PID:4400
-
\??\c:\8844882.exec:\8844882.exe116⤵PID:1148
-
\??\c:\hnnbbb.exec:\hnnbbb.exe117⤵PID:3824
-
\??\c:\dddvp.exec:\dddvp.exe118⤵PID:1552
-
\??\c:\46282.exec:\46282.exe119⤵PID:2440
-
\??\c:\448648.exec:\448648.exe120⤵PID:1624
-
\??\c:\0004222.exec:\0004222.exe121⤵PID:1536
-
\??\c:\vvvvd.exec:\vvvvd.exe122⤵PID:1736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-