Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 10:15
Static task
static1
Behavioral task
behavioral1
Sample
9404d70062e3e25fb6f1201b65cb0404_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
9404d70062e3e25fb6f1201b65cb0404_JaffaCakes118.exe
-
Size
68KB
-
MD5
9404d70062e3e25fb6f1201b65cb0404
-
SHA1
7a87dde66bde49d296e10d8e2088a898d61e3fa5
-
SHA256
7f0815208ed42232932fdafccf6ddce999b7e4e669e5f206144f2dd7b369f3ec
-
SHA512
f0befac56464d4d4f6ad9c6a27f2441689cc8ae435faffd88e558eefa8159cab9249038d3552c26bb6f2a58c013fb95bf9c045d45cd73d4a5f724036612fe9a8
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qmPz:ymb3NkkiQ3mdBjFIj+qmr
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 28 IoCs
Processes:
resource yara_rule behavioral2/memory/4436-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3168-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2396-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4364-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1012-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4084-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2028-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1232-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3352-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2028-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1856-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4476-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1656-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3756-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4852-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4592-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2212-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3532-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4996-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4196-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3812-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1472-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5004-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3592-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2088-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4092-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1456-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
pjvvv.exexlxrrrx.exeq24444.exelffrflr.exefxxxllx.exe9pddd.exefrrlxxf.exew28800.exebhhbtt.exe0428628.exexrffllr.exerrrxrxr.exerfllrrr.exelllxrxx.exexrxlrlr.exe3vddv.exepdjdv.exerlxrxxx.exe806466.exe06264.exes0604.exew66826.exedppjv.exew26266.exe48444.exellfxrlf.exefxllffx.exexllxxrr.exe44080.exe1xlfrrl.exehnhbtt.exe242266.exebntthh.exexxfxffr.exe60604.exe628822.exenbhbbb.exe44004.exelrlfrlf.exe6066600.exei822888.exe602826.exennthbn.exettbthh.exepdvvv.exe664428.exe4828440.exe7lxrxxf.exefrfxrxx.exe8688046.exek80488.exe006066.exehhnhhh.exelrrllff.exe1dddp.exe440082.exejdjpd.exe5ffxrrr.exe82266.exerxfffrr.exe4804860.exe64820.exenbbthb.exe66822.exepid Process 3168 pjvvv.exe 2396 xlxrrrx.exe 4364 q24444.exe 1012 lffrflr.exe 4084 fxxxllx.exe 4172 9pddd.exe 2028 frrlxxf.exe 1232 w28800.exe 3352 bhhbtt.exe 2080 0428628.exe 1856 xrffllr.exe 3796 rrrxrxr.exe 1656 rfllrrr.exe 4476 lllxrxx.exe 3756 xrxlrlr.exe 4852 3vddv.exe 4592 pdjdv.exe 2212 rlxrxxx.exe 3532 806466.exe 3724 06264.exe 4996 s0604.exe 4196 w66826.exe 1364 dppjv.exe 3812 w26266.exe 1472 48444.exe 5004 llfxrlf.exe 3592 fxllffx.exe 2088 xllxxrr.exe 4092 44080.exe 1456 1xlfrrl.exe 4272 hnhbtt.exe 2672 242266.exe 3468 bntthh.exe 4076 xxfxffr.exe 888 60604.exe 968 628822.exe 4944 nbhbbb.exe 1088 44004.exe 2188 lrlfrlf.exe 2968 6066600.exe 3160 i822888.exe 980 602826.exe 208 nnthbn.exe 3028 ttbthh.exe 2396 pdvvv.exe 2944 664428.exe 1352 4828440.exe 1132 7lxrxxf.exe 3300 frfxrxx.exe 3780 8688046.exe 3732 k80488.exe 1128 006066.exe 4584 hhnhhh.exe 2392 lrrllff.exe 4260 1dddp.exe 2080 440082.exe 2060 jdjpd.exe 1636 5ffxrrr.exe 3476 82266.exe 4476 rxfffrr.exe 3236 4804860.exe 2960 64820.exe 2972 nbbthb.exe 1676 66822.exe -
Processes:
resource yara_rule behavioral2/memory/4436-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3168-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2396-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1012-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4084-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2028-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1232-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3352-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2028-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2028-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2028-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1856-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4476-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1656-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3756-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4852-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4592-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2212-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3532-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4996-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4196-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3812-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1472-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5004-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3592-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2088-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4092-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1456-198-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3nnhnn.exehthhbt.exes4004.exevdvdj.exepvpjv.exe8688046.exe3fllrxl.exelfxlfff.exexrlfxxr.exe826604.exe6064882.exeq06688.exe82040.exerlxrrll.exe864480.exetbhbtt.exehbbthh.exe8844888.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3nnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hthhbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s4004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8688046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3fllrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxlfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlfxxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 826604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6064882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q06688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82040.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlxrrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 864480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbbthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8844888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9404d70062e3e25fb6f1201b65cb0404_JaffaCakes118.exepjvvv.exexlxrrrx.exeq24444.exelffrflr.exefxxxllx.exe9pddd.exefrrlxxf.exew28800.exebhhbtt.exe0428628.exexrffllr.exerrrxrxr.exerfllrrr.exelllxrxx.exexrxlrlr.exe3vddv.exepdjdv.exerlxrxxx.exe806466.exe06264.exes0604.exedescription pid Process procid_target PID 4436 wrote to memory of 3168 4436 9404d70062e3e25fb6f1201b65cb0404_JaffaCakes118.exe 82 PID 4436 wrote to memory of 3168 4436 9404d70062e3e25fb6f1201b65cb0404_JaffaCakes118.exe 82 PID 4436 wrote to memory of 3168 4436 9404d70062e3e25fb6f1201b65cb0404_JaffaCakes118.exe 82 PID 3168 wrote to memory of 2396 3168 pjvvv.exe 83 PID 3168 wrote to memory of 2396 3168 pjvvv.exe 83 PID 3168 wrote to memory of 2396 3168 pjvvv.exe 83 PID 2396 wrote to memory of 4364 2396 xlxrrrx.exe 84 PID 2396 wrote to memory of 4364 2396 xlxrrrx.exe 84 PID 2396 wrote to memory of 4364 2396 xlxrrrx.exe 84 PID 4364 wrote to memory of 1012 4364 q24444.exe 85 PID 4364 wrote to memory of 1012 4364 q24444.exe 85 PID 4364 wrote to memory of 1012 4364 q24444.exe 85 PID 1012 wrote to memory of 4084 1012 lffrflr.exe 86 PID 1012 wrote to memory of 4084 1012 lffrflr.exe 86 PID 1012 wrote to memory of 4084 1012 lffrflr.exe 86 PID 4084 wrote to memory of 4172 4084 fxxxllx.exe 87 PID 4084 wrote to memory of 4172 4084 fxxxllx.exe 87 PID 4084 wrote to memory of 4172 4084 fxxxllx.exe 87 PID 4172 wrote to memory of 2028 4172 9pddd.exe 88 PID 4172 wrote to memory of 2028 4172 9pddd.exe 88 PID 4172 wrote to memory of 2028 4172 9pddd.exe 88 PID 2028 wrote to memory of 1232 2028 frrlxxf.exe 89 PID 2028 wrote to memory of 1232 2028 frrlxxf.exe 89 PID 2028 wrote to memory of 1232 2028 frrlxxf.exe 89 PID 1232 wrote to memory of 3352 1232 w28800.exe 90 PID 1232 wrote to memory of 3352 1232 w28800.exe 90 PID 1232 wrote to memory of 3352 1232 w28800.exe 90 PID 3352 wrote to memory of 2080 3352 bhhbtt.exe 91 PID 3352 wrote to memory of 2080 3352 bhhbtt.exe 91 PID 3352 wrote to memory of 2080 3352 bhhbtt.exe 91 PID 2080 wrote to memory of 1856 2080 0428628.exe 92 PID 2080 wrote to memory of 1856 2080 0428628.exe 92 PID 2080 wrote to memory of 1856 2080 0428628.exe 92 PID 1856 wrote to memory of 3796 1856 xrffllr.exe 93 PID 1856 wrote to memory of 3796 1856 xrffllr.exe 93 PID 1856 wrote to memory of 3796 1856 xrffllr.exe 93 PID 3796 wrote to memory of 1656 3796 rrrxrxr.exe 94 PID 3796 wrote to memory of 1656 3796 rrrxrxr.exe 94 PID 3796 wrote to memory of 1656 3796 rrrxrxr.exe 94 PID 1656 wrote to memory of 4476 1656 rfllrrr.exe 95 PID 1656 wrote to memory of 4476 1656 rfllrrr.exe 95 PID 1656 wrote to memory of 4476 1656 rfllrrr.exe 95 PID 4476 wrote to memory of 3756 4476 lllxrxx.exe 96 PID 4476 wrote to memory of 3756 4476 lllxrxx.exe 96 PID 4476 wrote to memory of 3756 4476 lllxrxx.exe 96 PID 3756 wrote to memory of 4852 3756 xrxlrlr.exe 97 PID 3756 wrote to memory of 4852 3756 xrxlrlr.exe 97 PID 3756 wrote to memory of 4852 3756 xrxlrlr.exe 97 PID 4852 wrote to memory of 4592 4852 3vddv.exe 98 PID 4852 wrote to memory of 4592 4852 3vddv.exe 98 PID 4852 wrote to memory of 4592 4852 3vddv.exe 98 PID 4592 wrote to memory of 2212 4592 pdjdv.exe 99 PID 4592 wrote to memory of 2212 4592 pdjdv.exe 99 PID 4592 wrote to memory of 2212 4592 pdjdv.exe 99 PID 2212 wrote to memory of 3532 2212 rlxrxxx.exe 100 PID 2212 wrote to memory of 3532 2212 rlxrxxx.exe 100 PID 2212 wrote to memory of 3532 2212 rlxrxxx.exe 100 PID 3532 wrote to memory of 3724 3532 806466.exe 101 PID 3532 wrote to memory of 3724 3532 806466.exe 101 PID 3532 wrote to memory of 3724 3532 806466.exe 101 PID 3724 wrote to memory of 4996 3724 06264.exe 102 PID 3724 wrote to memory of 4996 3724 06264.exe 102 PID 3724 wrote to memory of 4996 3724 06264.exe 102 PID 4996 wrote to memory of 4196 4996 s0604.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\9404d70062e3e25fb6f1201b65cb0404_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9404d70062e3e25fb6f1201b65cb0404_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
\??\c:\pjvvv.exec:\pjvvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
\??\c:\xlxrrrx.exec:\xlxrrrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
\??\c:\q24444.exec:\q24444.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
\??\c:\lffrflr.exec:\lffrflr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1012 -
\??\c:\fxxxllx.exec:\fxxxllx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\9pddd.exec:\9pddd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
\??\c:\frrlxxf.exec:\frrlxxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\w28800.exec:\w28800.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
\??\c:\bhhbtt.exec:\bhhbtt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
\??\c:\0428628.exec:\0428628.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\xrffllr.exec:\xrffllr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\rrrxrxr.exec:\rrrxrxr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
\??\c:\rfllrrr.exec:\rfllrrr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\lllxrxx.exec:\lllxrxx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
\??\c:\xrxlrlr.exec:\xrxlrlr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3756 -
\??\c:\3vddv.exec:\3vddv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
\??\c:\pdjdv.exec:\pdjdv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
\??\c:\rlxrxxx.exec:\rlxrxxx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
\??\c:\806466.exec:\806466.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3532 -
\??\c:\06264.exec:\06264.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
\??\c:\s0604.exec:\s0604.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
\??\c:\w66826.exec:\w66826.exe23⤵
- Executes dropped EXE
PID:4196 -
\??\c:\dppjv.exec:\dppjv.exe24⤵
- Executes dropped EXE
PID:1364 -
\??\c:\w26266.exec:\w26266.exe25⤵
- Executes dropped EXE
PID:3812 -
\??\c:\48444.exec:\48444.exe26⤵
- Executes dropped EXE
PID:1472 -
\??\c:\llfxrlf.exec:\llfxrlf.exe27⤵
- Executes dropped EXE
PID:5004 -
\??\c:\fxllffx.exec:\fxllffx.exe28⤵
- Executes dropped EXE
PID:3592 -
\??\c:\xllxxrr.exec:\xllxxrr.exe29⤵
- Executes dropped EXE
PID:2088 -
\??\c:\44080.exec:\44080.exe30⤵
- Executes dropped EXE
PID:4092 -
\??\c:\1xlfrrl.exec:\1xlfrrl.exe31⤵
- Executes dropped EXE
PID:1456 -
\??\c:\hnhbtt.exec:\hnhbtt.exe32⤵
- Executes dropped EXE
PID:4272 -
\??\c:\242266.exec:\242266.exe33⤵
- Executes dropped EXE
PID:2672 -
\??\c:\bntthh.exec:\bntthh.exe34⤵
- Executes dropped EXE
PID:3468 -
\??\c:\xxfxffr.exec:\xxfxffr.exe35⤵
- Executes dropped EXE
PID:4076 -
\??\c:\60604.exec:\60604.exe36⤵
- Executes dropped EXE
PID:888 -
\??\c:\628822.exec:\628822.exe37⤵
- Executes dropped EXE
PID:968 -
\??\c:\nbhbbb.exec:\nbhbbb.exe38⤵
- Executes dropped EXE
PID:4944 -
\??\c:\44004.exec:\44004.exe39⤵
- Executes dropped EXE
PID:1088 -
\??\c:\lrlfrlf.exec:\lrlfrlf.exe40⤵
- Executes dropped EXE
PID:2188 -
\??\c:\6066600.exec:\6066600.exe41⤵
- Executes dropped EXE
PID:2968 -
\??\c:\i822888.exec:\i822888.exe42⤵
- Executes dropped EXE
PID:3160 -
\??\c:\602826.exec:\602826.exe43⤵
- Executes dropped EXE
PID:980 -
\??\c:\xrllrxr.exec:\xrllrxr.exe44⤵PID:4480
-
\??\c:\nnthbn.exec:\nnthbn.exe45⤵
- Executes dropped EXE
PID:208 -
\??\c:\ttbthh.exec:\ttbthh.exe46⤵
- Executes dropped EXE
PID:3028 -
\??\c:\pdvvv.exec:\pdvvv.exe47⤵
- Executes dropped EXE
PID:2396 -
\??\c:\664428.exec:\664428.exe48⤵
- Executes dropped EXE
PID:2944 -
\??\c:\4828440.exec:\4828440.exe49⤵
- Executes dropped EXE
PID:1352 -
\??\c:\7lxrxxf.exec:\7lxrxxf.exe50⤵
- Executes dropped EXE
PID:1132 -
\??\c:\frfxrxx.exec:\frfxrxx.exe51⤵
- Executes dropped EXE
PID:3300 -
\??\c:\8688046.exec:\8688046.exe52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3780 -
\??\c:\k80488.exec:\k80488.exe53⤵
- Executes dropped EXE
PID:3732 -
\??\c:\006066.exec:\006066.exe54⤵
- Executes dropped EXE
PID:1128 -
\??\c:\hhnhhh.exec:\hhnhhh.exe55⤵
- Executes dropped EXE
PID:4584 -
\??\c:\lrrllff.exec:\lrrllff.exe56⤵
- Executes dropped EXE
PID:2392 -
\??\c:\1dddp.exec:\1dddp.exe57⤵
- Executes dropped EXE
PID:4260 -
\??\c:\440082.exec:\440082.exe58⤵
- Executes dropped EXE
PID:2080 -
\??\c:\jdjpd.exec:\jdjpd.exe59⤵
- Executes dropped EXE
PID:2060 -
\??\c:\5ffxrrr.exec:\5ffxrrr.exe60⤵
- Executes dropped EXE
PID:1636 -
\??\c:\82266.exec:\82266.exe61⤵
- Executes dropped EXE
PID:3476 -
\??\c:\rxfffrr.exec:\rxfffrr.exe62⤵
- Executes dropped EXE
PID:4476 -
\??\c:\4804860.exec:\4804860.exe63⤵
- Executes dropped EXE
PID:3236 -
\??\c:\64820.exec:\64820.exe64⤵
- Executes dropped EXE
PID:2960 -
\??\c:\nbbthb.exec:\nbbthb.exe65⤵
- Executes dropped EXE
PID:2972 -
\??\c:\66822.exec:\66822.exe66⤵
- Executes dropped EXE
PID:1676 -
\??\c:\c484646.exec:\c484646.exe67⤵PID:2100
-
\??\c:\hhbbtt.exec:\hhbbtt.exe68⤵PID:1564
-
\??\c:\pjpjj.exec:\pjpjj.exe69⤵PID:4124
-
\??\c:\0244826.exec:\0244826.exe70⤵PID:2036
-
\??\c:\e86600.exec:\e86600.exe71⤵PID:1172
-
\??\c:\0060004.exec:\0060004.exe72⤵PID:4008
-
\??\c:\nbhbnb.exec:\nbhbnb.exe73⤵PID:5080
-
\??\c:\btbbbn.exec:\btbbbn.exe74⤵PID:5084
-
\??\c:\a6664.exec:\a6664.exe75⤵PID:2184
-
\??\c:\frlfrlx.exec:\frlfrlx.exe76⤵PID:4896
-
\??\c:\28888.exec:\28888.exe77⤵PID:5072
-
\??\c:\64486.exec:\64486.exe78⤵PID:4060
-
\??\c:\nnbbnn.exec:\nnbbnn.exe79⤵PID:5092
-
\??\c:\4402660.exec:\4402660.exe80⤵PID:3240
-
\??\c:\46444.exec:\46444.exe81⤵PID:4272
-
\??\c:\206846.exec:\206846.exe82⤵PID:412
-
\??\c:\60264.exec:\60264.exe83⤵PID:1524
-
\??\c:\lxflxrf.exec:\lxflxrf.exe84⤵PID:2364
-
\??\c:\88844.exec:\88844.exe85⤵PID:888
-
\??\c:\482888.exec:\482888.exe86⤵PID:2820
-
\??\c:\040488.exec:\040488.exe87⤵PID:4944
-
\??\c:\hhhbhn.exec:\hhhbhn.exe88⤵PID:2992
-
\??\c:\nbhbnh.exec:\nbhbnh.exe89⤵PID:3764
-
\??\c:\3lfxllf.exec:\3lfxllf.exe90⤵PID:4380
-
\??\c:\dvvpp.exec:\dvvpp.exe91⤵PID:764
-
\??\c:\0406448.exec:\0406448.exe92⤵PID:736
-
\??\c:\8060442.exec:\8060442.exe93⤵PID:1760
-
\??\c:\6806042.exec:\6806042.exe94⤵PID:1200
-
\??\c:\rllfxrf.exec:\rllfxrf.exe95⤵PID:3420
-
\??\c:\80802.exec:\80802.exe96⤵PID:4208
-
\??\c:\4060882.exec:\4060882.exe97⤵PID:5096
-
\??\c:\s0048.exec:\s0048.exe98⤵PID:4084
-
\??\c:\jdpjp.exec:\jdpjp.exe99⤵PID:2368
-
\??\c:\428264.exec:\428264.exe100⤵PID:3684
-
\??\c:\7frlfxx.exec:\7frlfxx.exe101⤵PID:4292
-
\??\c:\7hhhtt.exec:\7hhhtt.exe102⤵PID:3732
-
\??\c:\3lrllfl.exec:\3lrllfl.exe103⤵PID:1788
-
\??\c:\42482.exec:\42482.exe104⤵PID:4584
-
\??\c:\26008.exec:\26008.exe105⤵PID:1860
-
\??\c:\vppjv.exec:\vppjv.exe106⤵PID:4260
-
\??\c:\fffxlfx.exec:\fffxlfx.exe107⤵PID:2544
-
\??\c:\nhhtnh.exec:\nhhtnh.exe108⤵PID:2060
-
\??\c:\dvvpd.exec:\dvvpd.exe109⤵PID:2720
-
\??\c:\7xxlfxr.exec:\7xxlfxr.exe110⤵PID:1952
-
\??\c:\9rrrlxx.exec:\9rrrlxx.exe111⤵PID:4476
-
\??\c:\i604482.exec:\i604482.exe112⤵PID:3336
-
\??\c:\86648.exec:\86648.exe113⤵PID:232
-
\??\c:\u066482.exec:\u066482.exe114⤵PID:3292
-
\??\c:\hthhbt.exec:\hthhbt.exe115⤵
- System Location Discovery: System Language Discovery
PID:1676 -
\??\c:\62482.exec:\62482.exe116⤵PID:2100
-
\??\c:\bnhbnn.exec:\bnhbnn.exe117⤵PID:4112
-
\??\c:\bthnbt.exec:\bthnbt.exe118⤵PID:1300
-
\??\c:\440422.exec:\440422.exe119⤵PID:3368
-
\??\c:\5nnnbt.exec:\5nnnbt.exe120⤵PID:4452
-
\??\c:\08442.exec:\08442.exe121⤵PID:4008
-
\??\c:\frfxrrl.exec:\frfxrrl.exe122⤵PID:5080
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-