Analysis
-
max time kernel
150s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 05:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0474c86f142a45eefedda54e8a164168_JaffaCakes118.exe
Resource
win7-20240419-en
5 signatures
150 seconds
General
-
Target
0474c86f142a45eefedda54e8a164168_JaffaCakes118.exe
-
Size
357KB
-
MD5
0474c86f142a45eefedda54e8a164168
-
SHA1
0d49c1e4c4352f6e3b3f089612f23e4adedcd46f
-
SHA256
45f84300e3ff955259341cf062d65fb18772cfd31c3406d9deabdc5221b7ece6
-
SHA512
2c4c67ba3c41b9b3ee4502bc8f0cf6d955390a9e5964278e0b576f5323205412318f4bf6a0e8b6e1a65be56448eb4c8fb0d78bc9a65a436d9b44ed521b0e2d60
-
SSDEEP
3072:PhOm2sI93UufdC67cihfmCiiiXAsACF486jFX8fkYtB6J6eUTV4aTHDaLq:Pcm7ImGddXtWrXD486jFX88Y/eUBnV
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1516-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3312-1-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/968-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2448-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3320-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3228-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4468-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/708-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1128-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5048-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4140-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2832-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/332-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2732-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4540-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4204-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2648-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1504-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5068-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2136-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4320-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2848-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2320-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4528-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2468-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1376-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3360-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1780-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3028-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1516-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/940-243-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3452-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1936-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3756-264-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2076-270-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1908-287-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4644-294-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1236-301-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4460-311-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2648-316-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1916-326-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3108-340-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2404-348-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1208-356-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4160-367-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4480-403-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2380-407-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1020-417-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4148-431-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4536-430-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2124-441-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4140-464-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2732-486-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5016-502-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4880-559-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3344-575-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1780-587-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2436-599-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3056-642-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2332-736-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1712-801-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4396-969-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4136-1315-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3336-1588-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
djjvv.exefllxfxl.exevddjd.exelflxlfx.exerflxlxl.exe3nbnbt.exerlfxrlf.exelffxlfx.exerxxrlfx.exebbbbnn.exexrfrfxf.exentnbnb.exevvjvd.exebnbhtb.exevvdvj.exepdvjv.exe7pdvd.exelrxlrxl.exe9vdvd.exe7btnbn.exenhnhth.exe3jvvj.exefflflfr.exe1xfxrlx.exetnnhbn.exenttnbt.exentbnnt.exe3ppdj.exehthbhh.exe9bnbnh.exevjvpv.exeflrlxrf.exehhnhbb.exevjjvj.exehhhbtn.exerlfxrrl.exennhbnh.exebtthht.exevdjpj.exedppdp.exexfllflf.exehtnhbt.exejpvpj.exe1jjvd.exerfrrrrx.exetttnnh.exejvdpj.exelxxxlfr.exerrrfxrl.exenbhthb.exe9vpjd.exeppvjj.exefxfrlff.exenbhbnn.exejppdp.exe1ffxxxr.exellrffxx.exenbbbtt.exe3ddpd.exepvdpj.exeflxflxr.exe7httnh.exe1jdvj.exelrlxxrf.exepid process 1516 djjvv.exe 968 fllxfxl.exe 2448 vddjd.exe 3320 lflxlfx.exe 708 rflxlxl.exe 4468 3nbnbt.exe 3228 rlfxrlf.exe 1128 lffxlfx.exe 5048 rxxrlfx.exe 4140 bbbbnn.exe 2832 xrfrfxf.exe 332 ntnbnb.exe 2732 vvjvd.exe 4540 bnbhtb.exe 4204 vvdvj.exe 2856 pdvjv.exe 2648 7pdvd.exe 1504 lrxlrxl.exe 4836 9vdvd.exe 2136 7btnbn.exe 5068 nhnhth.exe 4320 3jvvj.exe 4220 fflflfr.exe 740 1xfxrlx.exe 2848 tnnhbn.exe 1920 nttnbt.exe 2320 ntbnnt.exe 4528 3ppdj.exe 4896 hthbhh.exe 4880 9bnbnh.exe 3456 vjvpv.exe 952 flrlxrf.exe 4328 hhnhbb.exe 4236 vjjvj.exe 2468 hhhbtn.exe 1376 rlfxrrl.exe 3360 nnhbnh.exe 4664 btthht.exe 1780 vdjpj.exe 2016 dppdp.exe 4336 xfllflf.exe 4296 htnhbt.exe 2436 jpvpj.exe 3028 1jjvd.exe 1516 rfrrrrx.exe 912 tttnnh.exe 772 jvdpj.exe 940 lxxxlfr.exe 1540 rrrfxrl.exe 3452 nbhthb.exe 1436 9vpjd.exe 2992 ppvjj.exe 1936 fxfrlff.exe 3756 nbhbnn.exe 2076 jppdp.exe 1892 1ffxxxr.exe 1740 llrffxx.exe 3276 nbbbtt.exe 2832 3ddpd.exe 1636 pvdpj.exe 1908 flxflxr.exe 2732 7httnh.exe 4644 1jdvj.exe 1236 lrlxxrf.exe -
Processes:
resource yara_rule behavioral2/memory/1516-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3312-1-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/968-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2448-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3320-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4468-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3228-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4468-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/708-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1128-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5048-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4140-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2832-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/332-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2732-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2732-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4540-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4204-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2648-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1504-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5068-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2136-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4320-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2848-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2320-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4528-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2468-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1376-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3360-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1780-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3028-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1516-231-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1516-235-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/940-243-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3452-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1936-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3756-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2076-270-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1908-287-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4644-294-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1236-301-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4460-311-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2648-316-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1916-322-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1916-326-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3108-340-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2404-344-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2404-348-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1208-352-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1208-356-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1308-357-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4160-367-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4636-383-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4480-403-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2380-407-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1020-417-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4148-431-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-430-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4032-442-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2124-441-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4140-464-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2732-486-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5016-502-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4892-503-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0474c86f142a45eefedda54e8a164168_JaffaCakes118.exedjjvv.exefllxfxl.exevddjd.exelflxlfx.exerflxlxl.exe3nbnbt.exerlfxrlf.exelffxlfx.exerxxrlfx.exebbbbnn.exexrfrfxf.exentnbnb.exevvjvd.exebnbhtb.exevvdvj.exepdvjv.exe7pdvd.exelrxlrxl.exe9vdvd.exe7btnbn.exenhnhth.exedescription pid process target process PID 3312 wrote to memory of 1516 3312 0474c86f142a45eefedda54e8a164168_JaffaCakes118.exe djjvv.exe PID 3312 wrote to memory of 1516 3312 0474c86f142a45eefedda54e8a164168_JaffaCakes118.exe djjvv.exe PID 3312 wrote to memory of 1516 3312 0474c86f142a45eefedda54e8a164168_JaffaCakes118.exe djjvv.exe PID 1516 wrote to memory of 968 1516 djjvv.exe fllxfxl.exe PID 1516 wrote to memory of 968 1516 djjvv.exe fllxfxl.exe PID 1516 wrote to memory of 968 1516 djjvv.exe fllxfxl.exe PID 968 wrote to memory of 2448 968 fllxfxl.exe vddjd.exe PID 968 wrote to memory of 2448 968 fllxfxl.exe vddjd.exe PID 968 wrote to memory of 2448 968 fllxfxl.exe vddjd.exe PID 2448 wrote to memory of 3320 2448 vddjd.exe lflxlfx.exe PID 2448 wrote to memory of 3320 2448 vddjd.exe lflxlfx.exe PID 2448 wrote to memory of 3320 2448 vddjd.exe lflxlfx.exe PID 3320 wrote to memory of 708 3320 lflxlfx.exe rflxlxl.exe PID 3320 wrote to memory of 708 3320 lflxlfx.exe rflxlxl.exe PID 3320 wrote to memory of 708 3320 lflxlfx.exe rflxlxl.exe PID 708 wrote to memory of 4468 708 rflxlxl.exe 3nbnbt.exe PID 708 wrote to memory of 4468 708 rflxlxl.exe 3nbnbt.exe PID 708 wrote to memory of 4468 708 rflxlxl.exe 3nbnbt.exe PID 4468 wrote to memory of 3228 4468 3nbnbt.exe rlfxrlf.exe PID 4468 wrote to memory of 3228 4468 3nbnbt.exe rlfxrlf.exe PID 4468 wrote to memory of 3228 4468 3nbnbt.exe rlfxrlf.exe PID 3228 wrote to memory of 1128 3228 rlfxrlf.exe lffxlfx.exe PID 3228 wrote to memory of 1128 3228 rlfxrlf.exe lffxlfx.exe PID 3228 wrote to memory of 1128 3228 rlfxrlf.exe lffxlfx.exe PID 1128 wrote to memory of 5048 1128 lffxlfx.exe rxxrlfx.exe PID 1128 wrote to memory of 5048 1128 lffxlfx.exe rxxrlfx.exe PID 1128 wrote to memory of 5048 1128 lffxlfx.exe rxxrlfx.exe PID 5048 wrote to memory of 4140 5048 rxxrlfx.exe bbbbnn.exe PID 5048 wrote to memory of 4140 5048 rxxrlfx.exe bbbbnn.exe PID 5048 wrote to memory of 4140 5048 rxxrlfx.exe bbbbnn.exe PID 4140 wrote to memory of 2832 4140 bbbbnn.exe xrfrfxf.exe PID 4140 wrote to memory of 2832 4140 bbbbnn.exe xrfrfxf.exe PID 4140 wrote to memory of 2832 4140 bbbbnn.exe xrfrfxf.exe PID 2832 wrote to memory of 332 2832 xrfrfxf.exe ntnbnb.exe PID 2832 wrote to memory of 332 2832 xrfrfxf.exe ntnbnb.exe PID 2832 wrote to memory of 332 2832 xrfrfxf.exe ntnbnb.exe PID 332 wrote to memory of 2732 332 ntnbnb.exe vvjvd.exe PID 332 wrote to memory of 2732 332 ntnbnb.exe vvjvd.exe PID 332 wrote to memory of 2732 332 ntnbnb.exe vvjvd.exe PID 2732 wrote to memory of 4540 2732 vvjvd.exe bnbhtb.exe PID 2732 wrote to memory of 4540 2732 vvjvd.exe bnbhtb.exe PID 2732 wrote to memory of 4540 2732 vvjvd.exe bnbhtb.exe PID 4540 wrote to memory of 4204 4540 bnbhtb.exe vvdvj.exe PID 4540 wrote to memory of 4204 4540 bnbhtb.exe vvdvj.exe PID 4540 wrote to memory of 4204 4540 bnbhtb.exe vvdvj.exe PID 4204 wrote to memory of 2856 4204 vvdvj.exe pdvjv.exe PID 4204 wrote to memory of 2856 4204 vvdvj.exe pdvjv.exe PID 4204 wrote to memory of 2856 4204 vvdvj.exe pdvjv.exe PID 2856 wrote to memory of 2648 2856 pdvjv.exe 7pdvd.exe PID 2856 wrote to memory of 2648 2856 pdvjv.exe 7pdvd.exe PID 2856 wrote to memory of 2648 2856 pdvjv.exe 7pdvd.exe PID 2648 wrote to memory of 1504 2648 7pdvd.exe lrxlrxl.exe PID 2648 wrote to memory of 1504 2648 7pdvd.exe lrxlrxl.exe PID 2648 wrote to memory of 1504 2648 7pdvd.exe lrxlrxl.exe PID 1504 wrote to memory of 4836 1504 lrxlrxl.exe 9vdvd.exe PID 1504 wrote to memory of 4836 1504 lrxlrxl.exe 9vdvd.exe PID 1504 wrote to memory of 4836 1504 lrxlrxl.exe 9vdvd.exe PID 4836 wrote to memory of 2136 4836 9vdvd.exe 7btnbn.exe PID 4836 wrote to memory of 2136 4836 9vdvd.exe 7btnbn.exe PID 4836 wrote to memory of 2136 4836 9vdvd.exe 7btnbn.exe PID 2136 wrote to memory of 5068 2136 7btnbn.exe nhnhth.exe PID 2136 wrote to memory of 5068 2136 7btnbn.exe nhnhth.exe PID 2136 wrote to memory of 5068 2136 7btnbn.exe nhnhth.exe PID 5068 wrote to memory of 4320 5068 nhnhth.exe 3jvvj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0474c86f142a45eefedda54e8a164168_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0474c86f142a45eefedda54e8a164168_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\djjvv.exec:\djjvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fllxfxl.exec:\fllxfxl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vddjd.exec:\vddjd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lflxlfx.exec:\lflxlfx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rflxlxl.exec:\rflxlxl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3nbnbt.exec:\3nbnbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlfxrlf.exec:\rlfxrlf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lffxlfx.exec:\lffxlfx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxxrlfx.exec:\rxxrlfx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbbbnn.exec:\bbbbnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrfrfxf.exec:\xrfrfxf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ntnbnb.exec:\ntnbnb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvjvd.exec:\vvjvd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnbhtb.exec:\bnbhtb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvdvj.exec:\vvdvj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdvjv.exec:\pdvjv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7pdvd.exec:\7pdvd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrxlrxl.exec:\lrxlrxl.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9vdvd.exec:\9vdvd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7btnbn.exec:\7btnbn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhnhth.exec:\nhnhth.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3jvvj.exec:\3jvvj.exe23⤵
- Executes dropped EXE
-
\??\c:\fflflfr.exec:\fflflfr.exe24⤵
- Executes dropped EXE
-
\??\c:\1xfxrlx.exec:\1xfxrlx.exe25⤵
- Executes dropped EXE
-
\??\c:\tnnhbn.exec:\tnnhbn.exe26⤵
- Executes dropped EXE
-
\??\c:\nttnbt.exec:\nttnbt.exe27⤵
- Executes dropped EXE
-
\??\c:\ntbnnt.exec:\ntbnnt.exe28⤵
- Executes dropped EXE
-
\??\c:\3ppdj.exec:\3ppdj.exe29⤵
- Executes dropped EXE
-
\??\c:\hthbhh.exec:\hthbhh.exe30⤵
- Executes dropped EXE
-
\??\c:\9bnbnh.exec:\9bnbnh.exe31⤵
- Executes dropped EXE
-
\??\c:\vjvpv.exec:\vjvpv.exe32⤵
- Executes dropped EXE
-
\??\c:\flrlxrf.exec:\flrlxrf.exe33⤵
- Executes dropped EXE
-
\??\c:\hhnhbb.exec:\hhnhbb.exe34⤵
- Executes dropped EXE
-
\??\c:\vjjvj.exec:\vjjvj.exe35⤵
- Executes dropped EXE
-
\??\c:\hhhbtn.exec:\hhhbtn.exe36⤵
- Executes dropped EXE
-
\??\c:\rlfxrrl.exec:\rlfxrrl.exe37⤵
- Executes dropped EXE
-
\??\c:\nnhbnh.exec:\nnhbnh.exe38⤵
- Executes dropped EXE
-
\??\c:\btthht.exec:\btthht.exe39⤵
- Executes dropped EXE
-
\??\c:\vdjpj.exec:\vdjpj.exe40⤵
- Executes dropped EXE
-
\??\c:\dppdp.exec:\dppdp.exe41⤵
- Executes dropped EXE
-
\??\c:\xfllflf.exec:\xfllflf.exe42⤵
- Executes dropped EXE
-
\??\c:\htnhbt.exec:\htnhbt.exe43⤵
- Executes dropped EXE
-
\??\c:\jpvpj.exec:\jpvpj.exe44⤵
- Executes dropped EXE
-
\??\c:\1jjvd.exec:\1jjvd.exe45⤵
- Executes dropped EXE
-
\??\c:\rfrrrrx.exec:\rfrrrrx.exe46⤵
- Executes dropped EXE
-
\??\c:\tttnnh.exec:\tttnnh.exe47⤵
- Executes dropped EXE
-
\??\c:\jvdpj.exec:\jvdpj.exe48⤵
- Executes dropped EXE
-
\??\c:\lxxxlfr.exec:\lxxxlfr.exe49⤵
- Executes dropped EXE
-
\??\c:\rrrfxrl.exec:\rrrfxrl.exe50⤵
- Executes dropped EXE
-
\??\c:\nbhthb.exec:\nbhthb.exe51⤵
- Executes dropped EXE
-
\??\c:\9vpjd.exec:\9vpjd.exe52⤵
- Executes dropped EXE
-
\??\c:\ppvjj.exec:\ppvjj.exe53⤵
- Executes dropped EXE
-
\??\c:\fxfrlff.exec:\fxfrlff.exe54⤵
- Executes dropped EXE
-
\??\c:\nbhbnn.exec:\nbhbnn.exe55⤵
- Executes dropped EXE
-
\??\c:\jppdp.exec:\jppdp.exe56⤵
- Executes dropped EXE
-
\??\c:\1ffxxxr.exec:\1ffxxxr.exe57⤵
- Executes dropped EXE
-
\??\c:\llrffxx.exec:\llrffxx.exe58⤵
- Executes dropped EXE
-
\??\c:\nbbbtt.exec:\nbbbtt.exe59⤵
- Executes dropped EXE
-
\??\c:\3ddpd.exec:\3ddpd.exe60⤵
- Executes dropped EXE
-
\??\c:\pvdpj.exec:\pvdpj.exe61⤵
- Executes dropped EXE
-
\??\c:\flxflxr.exec:\flxflxr.exe62⤵
- Executes dropped EXE
-
\??\c:\7httnh.exec:\7httnh.exe63⤵
- Executes dropped EXE
-
\??\c:\1jdvj.exec:\1jdvj.exe64⤵
- Executes dropped EXE
-
\??\c:\lrlxxrf.exec:\lrlxxrf.exe65⤵
- Executes dropped EXE
-
\??\c:\5xxxrlr.exec:\5xxxrlr.exe66⤵
-
\??\c:\tnthtn.exec:\tnthtn.exe67⤵
-
\??\c:\9ppjv.exec:\9ppjv.exe68⤵
-
\??\c:\flfrfxx.exec:\flfrfxx.exe69⤵
-
\??\c:\rrxrllf.exec:\rrxrllf.exe70⤵
-
\??\c:\bnnnnh.exec:\bnnnnh.exe71⤵
-
\??\c:\jvpjp.exec:\jvpjp.exe72⤵
-
\??\c:\flfrllf.exec:\flfrllf.exe73⤵
-
\??\c:\xlrlxrl.exec:\xlrlxrl.exe74⤵
-
\??\c:\hnnbtn.exec:\hnnbtn.exe75⤵
-
\??\c:\5jvjv.exec:\5jvjv.exe76⤵
-
\??\c:\1vdvj.exec:\1vdvj.exe77⤵
-
\??\c:\llrlxrl.exec:\llrlxrl.exe78⤵
-
\??\c:\rxfxlff.exec:\rxfxlff.exe79⤵
-
\??\c:\tnnhtn.exec:\tnnhtn.exe80⤵
-
\??\c:\vvdvj.exec:\vvdvj.exe81⤵
-
\??\c:\fxfrfxr.exec:\fxfrfxr.exe82⤵
-
\??\c:\tbnbhh.exec:\tbnbhh.exe83⤵
-
\??\c:\9pppd.exec:\9pppd.exe84⤵
-
\??\c:\1lxlxxl.exec:\1lxlxxl.exe85⤵
-
\??\c:\5fxrlll.exec:\5fxrlll.exe86⤵
-
\??\c:\1tnnhh.exec:\1tnnhh.exe87⤵
-
\??\c:\pjjdp.exec:\pjjdp.exe88⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe89⤵
-
\??\c:\rrxfxxx.exec:\rrxfxxx.exe90⤵
-
\??\c:\nhhhbb.exec:\nhhhbb.exe91⤵
-
\??\c:\tnbttt.exec:\tnbttt.exe92⤵
-
\??\c:\1ppjd.exec:\1ppjd.exe93⤵
-
\??\c:\ffxfxxx.exec:\ffxfxxx.exe94⤵
-
\??\c:\lffxrrl.exec:\lffxrrl.exe95⤵
-
\??\c:\7bhtbt.exec:\7bhtbt.exe96⤵
-
\??\c:\hnnbnh.exec:\hnnbnh.exe97⤵
-
\??\c:\jvvjj.exec:\jvvjj.exe98⤵
-
\??\c:\rllxlfx.exec:\rllxlfx.exe99⤵
-
\??\c:\llxrlfr.exec:\llxrlfr.exe100⤵
-
\??\c:\bhnbtn.exec:\bhnbtn.exe101⤵
-
\??\c:\vdvjv.exec:\vdvjv.exe102⤵
-
\??\c:\dpvjv.exec:\dpvjv.exe103⤵
-
\??\c:\xlxrrlr.exec:\xlxrrlr.exe104⤵
-
\??\c:\tntnhh.exec:\tntnhh.exe105⤵
-
\??\c:\vjjdv.exec:\vjjdv.exe106⤵
-
\??\c:\7dddp.exec:\7dddp.exe107⤵
-
\??\c:\lfrflff.exec:\lfrflff.exe108⤵
-
\??\c:\hhnhhb.exec:\hhnhhb.exe109⤵
-
\??\c:\vjjdp.exec:\vjjdp.exe110⤵
-
\??\c:\jvdpj.exec:\jvdpj.exe111⤵
-
\??\c:\xrrrlfx.exec:\xrrrlfx.exe112⤵
-
\??\c:\tnbbnh.exec:\tnbbnh.exe113⤵
-
\??\c:\9jjdp.exec:\9jjdp.exe114⤵
-
\??\c:\rrxrrll.exec:\rrxrrll.exe115⤵
-
\??\c:\5rfxrlx.exec:\5rfxrlx.exe116⤵
-
\??\c:\5bnbnn.exec:\5bnbnn.exe117⤵
-
\??\c:\vpvpv.exec:\vpvpv.exe118⤵
-
\??\c:\fflxfxr.exec:\fflxfxr.exe119⤵
-
\??\c:\hnthbn.exec:\hnthbn.exe120⤵
-
\??\c:\jvvjj.exec:\jvvjj.exe121⤵
-
\??\c:\vpppv.exec:\vpppv.exe122⤵
-
\??\c:\1lfrfxr.exec:\1lfrfxr.exe123⤵
-
\??\c:\3tbbtt.exec:\3tbbtt.exe124⤵
-
\??\c:\9jdvp.exec:\9jdvp.exe125⤵
-
\??\c:\7jpdd.exec:\7jpdd.exe126⤵
-
\??\c:\5xxllff.exec:\5xxllff.exe127⤵
-
\??\c:\bbhthb.exec:\bbhthb.exe128⤵
-
\??\c:\1ddpv.exec:\1ddpv.exe129⤵
-
\??\c:\7jdpd.exec:\7jdpd.exe130⤵
-
\??\c:\lxfrllx.exec:\lxfrllx.exe131⤵
-
\??\c:\nhbhtb.exec:\nhbhtb.exe132⤵
-
\??\c:\vvpjp.exec:\vvpjp.exe133⤵
-
\??\c:\dppdd.exec:\dppdd.exe134⤵
-
\??\c:\lxxrfxr.exec:\lxxrfxr.exe135⤵
-
\??\c:\btttnh.exec:\btttnh.exe136⤵
-
\??\c:\jvpdp.exec:\jvpdp.exe137⤵
-
\??\c:\jdvpd.exec:\jdvpd.exe138⤵
-
\??\c:\flrrxxr.exec:\flrrxxr.exe139⤵
-
\??\c:\bbtttt.exec:\bbtttt.exe140⤵
-
\??\c:\ddjdp.exec:\ddjdp.exe141⤵
-
\??\c:\jvvjj.exec:\jvvjj.exe142⤵
-
\??\c:\ffrrlll.exec:\ffrrlll.exe143⤵
-
\??\c:\3btnbb.exec:\3btnbb.exe144⤵
-
\??\c:\bbthtn.exec:\bbthtn.exe145⤵
-
\??\c:\dddpv.exec:\dddpv.exe146⤵
-
\??\c:\jddpd.exec:\jddpd.exe147⤵
-
\??\c:\xllfrfx.exec:\xllfrfx.exe148⤵
-
\??\c:\1bhbtt.exec:\1bhbtt.exe149⤵
-
\??\c:\7jpjj.exec:\7jpjj.exe150⤵
-
\??\c:\lxfrlfx.exec:\lxfrlfx.exe151⤵
-
\??\c:\xlrfllf.exec:\xlrfllf.exe152⤵
-
\??\c:\tnnhnb.exec:\tnnhnb.exe153⤵
-
\??\c:\pddpv.exec:\pddpv.exe154⤵
-
\??\c:\jpvpd.exec:\jpvpd.exe155⤵
-
\??\c:\flrrfxr.exec:\flrrfxr.exe156⤵
-
\??\c:\5tttnn.exec:\5tttnn.exe157⤵
-
\??\c:\bnnbtn.exec:\bnnbtn.exe158⤵
-
\??\c:\vjjdv.exec:\vjjdv.exe159⤵
-
\??\c:\vddpd.exec:\vddpd.exe160⤵
-
\??\c:\lrxlxrl.exec:\lrxlxrl.exe161⤵
-
\??\c:\hhnhbb.exec:\hhnhbb.exe162⤵
-
\??\c:\nbtnnh.exec:\nbtnnh.exe163⤵
-
\??\c:\ppdpd.exec:\ppdpd.exe164⤵
-
\??\c:\5lllffx.exec:\5lllffx.exe165⤵
-
\??\c:\rrxllfx.exec:\rrxllfx.exe166⤵
-
\??\c:\bhbnbt.exec:\bhbnbt.exe167⤵
-
\??\c:\bhnbnn.exec:\bhnbnn.exe168⤵
-
\??\c:\1jdvv.exec:\1jdvv.exe169⤵
-
\??\c:\xflxrlf.exec:\xflxrlf.exe170⤵
-
\??\c:\thhbnt.exec:\thhbnt.exe171⤵
-
\??\c:\9nnbtn.exec:\9nnbtn.exe172⤵
-
\??\c:\pdjdv.exec:\pdjdv.exe173⤵
-
\??\c:\fxxrffx.exec:\fxxrffx.exe174⤵
-
\??\c:\lxxrfxr.exec:\lxxrfxr.exe175⤵
-
\??\c:\nhhbtb.exec:\nhhbtb.exe176⤵
-
\??\c:\5dvpv.exec:\5dvpv.exe177⤵
-
\??\c:\frxlxrl.exec:\frxlxrl.exe178⤵
-
\??\c:\rrxrfxr.exec:\rrxrfxr.exe179⤵
-
\??\c:\hntnbt.exec:\hntnbt.exe180⤵
-
\??\c:\nnbthb.exec:\nnbthb.exe181⤵
-
\??\c:\3vvjj.exec:\3vvjj.exe182⤵
-
\??\c:\xlxlfxl.exec:\xlxlfxl.exe183⤵
-
\??\c:\xllffxl.exec:\xllffxl.exe184⤵
-
\??\c:\bhhbtt.exec:\bhhbtt.exe185⤵
-
\??\c:\jpvpd.exec:\jpvpd.exe186⤵
-
\??\c:\pjddv.exec:\pjddv.exe187⤵
-
\??\c:\rxfxllf.exec:\rxfxllf.exe188⤵
-
\??\c:\1hhtnh.exec:\1hhtnh.exe189⤵
-
\??\c:\7vdpv.exec:\7vdpv.exe190⤵
-
\??\c:\dpjvj.exec:\dpjvj.exe191⤵
-
\??\c:\xlflrlf.exec:\xlflrlf.exe192⤵
-
\??\c:\rlllfff.exec:\rlllfff.exe193⤵
-
\??\c:\nbbttt.exec:\nbbttt.exe194⤵
-
\??\c:\vjvpv.exec:\vjvpv.exe195⤵
-
\??\c:\dvvvv.exec:\dvvvv.exe196⤵
-
\??\c:\lxxrxrl.exec:\lxxrxrl.exe197⤵
-
\??\c:\7ntnbt.exec:\7ntnbt.exe198⤵
-
\??\c:\dpjdv.exec:\dpjdv.exe199⤵
-
\??\c:\jvjdv.exec:\jvjdv.exe200⤵
-
\??\c:\xllfxrx.exec:\xllfxrx.exe201⤵
-
\??\c:\9bnbtn.exec:\9bnbtn.exe202⤵
-
\??\c:\dvvpv.exec:\dvvpv.exe203⤵
-
\??\c:\3xxrlrr.exec:\3xxrlrr.exe204⤵
-
\??\c:\rflfrrl.exec:\rflfrrl.exe205⤵
-
\??\c:\bhnhnh.exec:\bhnhnh.exe206⤵
-
\??\c:\vjpjv.exec:\vjpjv.exe207⤵
-
\??\c:\5xrlxrf.exec:\5xrlxrf.exe208⤵
-
\??\c:\xffxrlf.exec:\xffxrlf.exe209⤵
-
\??\c:\bnhnbh.exec:\bnhnbh.exe210⤵
-
\??\c:\pjdpp.exec:\pjdpp.exe211⤵
-
\??\c:\3ppjj.exec:\3ppjj.exe212⤵
-
\??\c:\xrxlrlx.exec:\xrxlrlx.exe213⤵
-
\??\c:\nthbnh.exec:\nthbnh.exe214⤵
-
\??\c:\7vpdj.exec:\7vpdj.exe215⤵
-
\??\c:\pvvpd.exec:\pvvpd.exe216⤵
-
\??\c:\xlrfxrl.exec:\xlrfxrl.exe217⤵
-
\??\c:\nnhhbb.exec:\nnhhbb.exe218⤵
-
\??\c:\7ppdj.exec:\7ppdj.exe219⤵
-
\??\c:\jppdp.exec:\jppdp.exe220⤵
-
\??\c:\xrxrffr.exec:\xrxrffr.exe221⤵
-
\??\c:\rxxrlfx.exec:\rxxrlfx.exe222⤵
-
\??\c:\nhtnhn.exec:\nhtnhn.exe223⤵
-
\??\c:\9nhbnn.exec:\9nhbnn.exe224⤵
-
\??\c:\dddpd.exec:\dddpd.exe225⤵
-
\??\c:\rflxfrx.exec:\rflxfrx.exe226⤵
-
\??\c:\xlxlrlx.exec:\xlxlrlx.exe227⤵
-
\??\c:\bnttnt.exec:\bnttnt.exe228⤵
-
\??\c:\jpdvj.exec:\jpdvj.exe229⤵
-
\??\c:\9pjdp.exec:\9pjdp.exe230⤵
-
\??\c:\xrrfrxx.exec:\xrrfrxx.exe231⤵
-
\??\c:\bnbtbb.exec:\bnbtbb.exe232⤵
-
\??\c:\hntnbt.exec:\hntnbt.exe233⤵
-
\??\c:\vjjdv.exec:\vjjdv.exe234⤵
-
\??\c:\5xxrfxx.exec:\5xxrfxx.exe235⤵
-
\??\c:\xlrlfxl.exec:\xlrlfxl.exe236⤵
-
\??\c:\btnhtn.exec:\btnhtn.exe237⤵
-
\??\c:\3jjvv.exec:\3jjvv.exe238⤵
-
\??\c:\1vdpd.exec:\1vdpd.exe239⤵
-
\??\c:\llrfxrr.exec:\llrfxrr.exe240⤵
-
\??\c:\thtnbb.exec:\thtnbb.exe241⤵