Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 05:07
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
046fc26f2169be366197014c68ff6467_JaffaCakes118.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
046fc26f2169be366197014c68ff6467_JaffaCakes118.exe
-
Size
324KB
-
MD5
046fc26f2169be366197014c68ff6467
-
SHA1
d895b366f0148e7b759666b1d39940dd267858a0
-
SHA256
095b73623df5fc795b1976d4d304b24fd03c6f973cf736f437fec75ca87021db
-
SHA512
5d787e6e100c89d484b6174abea03b6e97735456dba2a2240d1574c776e97bd40606098f7b2cf50bf2d0088e6e414aaf693745ac301fad03a453bd7b26e22fbf
-
SSDEEP
3072:PhOm2sI93UufdC67cihfmCiiiXAsACF486jL:Pcm7ImGddXtWrXD486jL
Malware Config
Signatures
-
Detect Blackmoon payload 63 IoCs
Processes:
resource yara_rule behavioral2/memory/2356-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4784-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4688-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/928-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/376-29-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2164-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3612-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1768-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2152-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3268-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3372-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3224-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4868-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/440-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3748-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1420-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4900-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2300-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4668-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4636-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/8-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3128-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2920-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2280-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4320-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1008-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4592-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4472-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-213-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2164-216-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2596-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1916-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1440-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4568-252-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3924-267-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4076-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4668-279-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3688-283-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3108-292-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3932-299-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4140-310-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2216-318-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1444-325-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1264-329-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2504-330-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2164-365-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1568-414-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/976-427-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1820-434-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4396-459-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1096-463-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4320-495-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3132-499-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-512-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1296-525-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3076-593-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4944-600-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1048-631-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2104-635-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4364-760-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4052-923-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/412-1117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5080-1447-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
vpvpj.exelxfrlfx.exedppvp.exelffxllf.exe5jddj.exerrrrllf.exettttnn.exe7lfxllx.exejpjdp.exe7frfxrl.exeddjdv.exerrrrlrr.exeppjjv.exefrfllff.exe3ttbth.exedjjvp.exe9tbbhn.exelrxrlfx.exerlfxffx.exebtbbhb.exedvdvj.exe7fffffx.exelrxfxxx.exehbhhbn.exelxfxrrl.exehnbbtt.exedvdpp.exefflfffl.exenbbthb.exedvdvp.exedjjdp.exebttnhb.exevvvvp.exe3ffxffl.exe7rxrxxf.exe9nbttt.exeppppd.exejdjjp.exerllllfx.exelfllllf.exebhtnnn.exedjdvv.exevjpvp.exefxlfllx.exenbtnbb.exevpddd.exejpdjp.exexfxrllf.exehtbttn.exe1bhbtt.exejddvp.exerxrfrrl.exefxxrllf.exe7bhbbb.exettnnnt.exevpjjv.exerrlfffx.exe3lxxrlf.exennnttb.exe1vjdd.exedppjd.exerrxxrrr.exe5rfxrxr.exebntnnh.exepid process 2356 vpvpj.exe 928 lxfrlfx.exe 4688 dppvp.exe 376 lffxllf.exe 2164 5jddj.exe 3612 rrrrllf.exe 1768 ttttnn.exe 2152 7lfxllx.exe 3268 jpjdp.exe 3224 7frfxrl.exe 3372 ddjdv.exe 4868 rrrrlrr.exe 440 ppjjv.exe 3748 frfllff.exe 1420 3ttbth.exe 4900 djjvp.exe 2300 9tbbhn.exe 4668 lrxrlfx.exe 4984 rlfxffx.exe 1092 btbbhb.exe 4272 dvdvj.exe 5080 7fffffx.exe 2692 lrxfxxx.exe 4636 hbhhbn.exe 8 lxfxrrl.exe 2216 hnbbtt.exe 3128 dvdpp.exe 1444 fflfffl.exe 1332 nbbthb.exe 2920 dvdvp.exe 1232 djjdp.exe 2280 bttnhb.exe 4320 vvvvp.exe 1008 3ffxffl.exe 4592 7rxrxxf.exe 2104 9nbttt.exe 4472 ppppd.exe 3096 jdjjp.exe 2164 rllllfx.exe 2596 lfllllf.exe 1768 bhtnnn.exe 1284 djdvv.exe 1916 vjpvp.exe 1440 fxlfllx.exe 4112 nbtnbb.exe 4996 vpddd.exe 3372 jpdjp.exe 3696 xfxrllf.exe 4460 htbttn.exe 4568 1bhbtt.exe 2392 jddvp.exe 912 rxrfrrl.exe 4880 fxxrllf.exe 3924 7bhbbb.exe 3232 ttnnnt.exe 3388 vpjjv.exe 4076 rrlfffx.exe 4668 3lxxrlf.exe 3688 nnnttb.exe 4360 1vjdd.exe 3108 dppjd.exe 4516 rrxxrrr.exe 3932 5rfxrxr.exe 3460 bntnnh.exe -
Processes:
resource yara_rule behavioral2/memory/2356-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4688-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/928-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/376-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2164-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3612-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1768-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2152-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2152-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3268-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3372-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4868-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3224-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4868-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/440-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3748-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1420-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4900-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2300-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4668-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4636-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/8-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3128-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2920-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2280-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4320-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1008-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4592-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4472-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-213-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2164-216-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2596-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1916-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1440-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4568-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3924-267-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4076-277-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4668-279-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3688-283-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3108-292-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3932-299-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4588-303-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4140-310-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2216-314-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2216-318-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1444-325-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1264-329-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2504-330-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2164-365-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4704-392-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1568-414-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/976-427-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1820-434-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4396-459-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1096-463-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4320-495-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3132-499-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-512-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1296-525-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3308-558-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2016-580-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3076-593-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4944-600-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
046fc26f2169be366197014c68ff6467_JaffaCakes118.exevpvpj.exelxfrlfx.exedppvp.exelffxllf.exe5jddj.exerrrrllf.exettttnn.exe7lfxllx.exejpjdp.exe7frfxrl.exeddjdv.exerrrrlrr.exeppjjv.exefrfllff.exe3ttbth.exedjjvp.exe9tbbhn.exelrxrlfx.exerlfxffx.exebtbbhb.exedvdvj.exedescription pid process target process PID 4784 wrote to memory of 2356 4784 046fc26f2169be366197014c68ff6467_JaffaCakes118.exe vpvpj.exe PID 4784 wrote to memory of 2356 4784 046fc26f2169be366197014c68ff6467_JaffaCakes118.exe vpvpj.exe PID 4784 wrote to memory of 2356 4784 046fc26f2169be366197014c68ff6467_JaffaCakes118.exe vpvpj.exe PID 2356 wrote to memory of 928 2356 vpvpj.exe lxfrlfx.exe PID 2356 wrote to memory of 928 2356 vpvpj.exe lxfrlfx.exe PID 2356 wrote to memory of 928 2356 vpvpj.exe lxfrlfx.exe PID 928 wrote to memory of 4688 928 lxfrlfx.exe dppvp.exe PID 928 wrote to memory of 4688 928 lxfrlfx.exe dppvp.exe PID 928 wrote to memory of 4688 928 lxfrlfx.exe dppvp.exe PID 4688 wrote to memory of 376 4688 dppvp.exe lffxllf.exe PID 4688 wrote to memory of 376 4688 dppvp.exe lffxllf.exe PID 4688 wrote to memory of 376 4688 dppvp.exe lffxllf.exe PID 376 wrote to memory of 2164 376 lffxllf.exe 5jddj.exe PID 376 wrote to memory of 2164 376 lffxllf.exe 5jddj.exe PID 376 wrote to memory of 2164 376 lffxllf.exe 5jddj.exe PID 2164 wrote to memory of 3612 2164 5jddj.exe rrrrllf.exe PID 2164 wrote to memory of 3612 2164 5jddj.exe rrrrllf.exe PID 2164 wrote to memory of 3612 2164 5jddj.exe rrrrllf.exe PID 3612 wrote to memory of 1768 3612 rrrrllf.exe ttttnn.exe PID 3612 wrote to memory of 1768 3612 rrrrllf.exe ttttnn.exe PID 3612 wrote to memory of 1768 3612 rrrrllf.exe ttttnn.exe PID 1768 wrote to memory of 2152 1768 ttttnn.exe 7lfxllx.exe PID 1768 wrote to memory of 2152 1768 ttttnn.exe 7lfxllx.exe PID 1768 wrote to memory of 2152 1768 ttttnn.exe 7lfxllx.exe PID 2152 wrote to memory of 3268 2152 7lfxllx.exe jpjdp.exe PID 2152 wrote to memory of 3268 2152 7lfxllx.exe jpjdp.exe PID 2152 wrote to memory of 3268 2152 7lfxllx.exe jpjdp.exe PID 3268 wrote to memory of 3224 3268 jpjdp.exe 7frfxrl.exe PID 3268 wrote to memory of 3224 3268 jpjdp.exe 7frfxrl.exe PID 3268 wrote to memory of 3224 3268 jpjdp.exe 7frfxrl.exe PID 3224 wrote to memory of 3372 3224 7frfxrl.exe ddjdv.exe PID 3224 wrote to memory of 3372 3224 7frfxrl.exe ddjdv.exe PID 3224 wrote to memory of 3372 3224 7frfxrl.exe ddjdv.exe PID 3372 wrote to memory of 4868 3372 ddjdv.exe rrrrlrr.exe PID 3372 wrote to memory of 4868 3372 ddjdv.exe rrrrlrr.exe PID 3372 wrote to memory of 4868 3372 ddjdv.exe rrrrlrr.exe PID 4868 wrote to memory of 440 4868 rrrrlrr.exe ppjjv.exe PID 4868 wrote to memory of 440 4868 rrrrlrr.exe ppjjv.exe PID 4868 wrote to memory of 440 4868 rrrrlrr.exe ppjjv.exe PID 440 wrote to memory of 3748 440 ppjjv.exe frfllff.exe PID 440 wrote to memory of 3748 440 ppjjv.exe frfllff.exe PID 440 wrote to memory of 3748 440 ppjjv.exe frfllff.exe PID 3748 wrote to memory of 1420 3748 frfllff.exe 3ttbth.exe PID 3748 wrote to memory of 1420 3748 frfllff.exe 3ttbth.exe PID 3748 wrote to memory of 1420 3748 frfllff.exe 3ttbth.exe PID 1420 wrote to memory of 4900 1420 3ttbth.exe djjvp.exe PID 1420 wrote to memory of 4900 1420 3ttbth.exe djjvp.exe PID 1420 wrote to memory of 4900 1420 3ttbth.exe djjvp.exe PID 4900 wrote to memory of 2300 4900 djjvp.exe 9tbbhn.exe PID 4900 wrote to memory of 2300 4900 djjvp.exe 9tbbhn.exe PID 4900 wrote to memory of 2300 4900 djjvp.exe 9tbbhn.exe PID 2300 wrote to memory of 4668 2300 9tbbhn.exe lrxrlfx.exe PID 2300 wrote to memory of 4668 2300 9tbbhn.exe lrxrlfx.exe PID 2300 wrote to memory of 4668 2300 9tbbhn.exe lrxrlfx.exe PID 4668 wrote to memory of 4984 4668 lrxrlfx.exe rlfxffx.exe PID 4668 wrote to memory of 4984 4668 lrxrlfx.exe rlfxffx.exe PID 4668 wrote to memory of 4984 4668 lrxrlfx.exe rlfxffx.exe PID 4984 wrote to memory of 1092 4984 rlfxffx.exe btbbhb.exe PID 4984 wrote to memory of 1092 4984 rlfxffx.exe btbbhb.exe PID 4984 wrote to memory of 1092 4984 rlfxffx.exe btbbhb.exe PID 1092 wrote to memory of 4272 1092 btbbhb.exe dvdvj.exe PID 1092 wrote to memory of 4272 1092 btbbhb.exe dvdvj.exe PID 1092 wrote to memory of 4272 1092 btbbhb.exe dvdvj.exe PID 4272 wrote to memory of 5080 4272 dvdvj.exe 7fffffx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\046fc26f2169be366197014c68ff6467_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\046fc26f2169be366197014c68ff6467_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\vpvpj.exec:\vpvpj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxfrlfx.exec:\lxfrlfx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dppvp.exec:\dppvp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lffxllf.exec:\lffxllf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5jddj.exec:\5jddj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrrrllf.exec:\rrrrllf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttttnn.exec:\ttttnn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7lfxllx.exec:\7lfxllx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpjdp.exec:\jpjdp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7frfxrl.exec:\7frfxrl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddjdv.exec:\ddjdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrrrlrr.exec:\rrrrlrr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ppjjv.exec:\ppjjv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frfllff.exec:\frfllff.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3ttbth.exec:\3ttbth.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djjvp.exec:\djjvp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9tbbhn.exec:\9tbbhn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrxrlfx.exec:\lrxrlfx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlfxffx.exec:\rlfxffx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btbbhb.exec:\btbbhb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvdvj.exec:\dvdvj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7fffffx.exec:\7fffffx.exe23⤵
- Executes dropped EXE
-
\??\c:\lrxfxxx.exec:\lrxfxxx.exe24⤵
- Executes dropped EXE
-
\??\c:\hbhhbn.exec:\hbhhbn.exe25⤵
- Executes dropped EXE
-
\??\c:\lxfxrrl.exec:\lxfxrrl.exe26⤵
- Executes dropped EXE
-
\??\c:\hnbbtt.exec:\hnbbtt.exe27⤵
- Executes dropped EXE
-
\??\c:\dvdpp.exec:\dvdpp.exe28⤵
- Executes dropped EXE
-
\??\c:\fflfffl.exec:\fflfffl.exe29⤵
- Executes dropped EXE
-
\??\c:\nbbthb.exec:\nbbthb.exe30⤵
- Executes dropped EXE
-
\??\c:\dvdvp.exec:\dvdvp.exe31⤵
- Executes dropped EXE
-
\??\c:\djjdp.exec:\djjdp.exe32⤵
- Executes dropped EXE
-
\??\c:\bttnhb.exec:\bttnhb.exe33⤵
- Executes dropped EXE
-
\??\c:\vvvvp.exec:\vvvvp.exe34⤵
- Executes dropped EXE
-
\??\c:\3ffxffl.exec:\3ffxffl.exe35⤵
- Executes dropped EXE
-
\??\c:\7rxrxxf.exec:\7rxrxxf.exe36⤵
- Executes dropped EXE
-
\??\c:\9nbttt.exec:\9nbttt.exe37⤵
- Executes dropped EXE
-
\??\c:\ppppd.exec:\ppppd.exe38⤵
- Executes dropped EXE
-
\??\c:\jdjjp.exec:\jdjjp.exe39⤵
- Executes dropped EXE
-
\??\c:\rllllfx.exec:\rllllfx.exe40⤵
- Executes dropped EXE
-
\??\c:\lfllllf.exec:\lfllllf.exe41⤵
- Executes dropped EXE
-
\??\c:\bhtnnn.exec:\bhtnnn.exe42⤵
- Executes dropped EXE
-
\??\c:\djdvv.exec:\djdvv.exe43⤵
- Executes dropped EXE
-
\??\c:\vjpvp.exec:\vjpvp.exe44⤵
- Executes dropped EXE
-
\??\c:\fxlfllx.exec:\fxlfllx.exe45⤵
- Executes dropped EXE
-
\??\c:\nbtnbb.exec:\nbtnbb.exe46⤵
- Executes dropped EXE
-
\??\c:\vpddd.exec:\vpddd.exe47⤵
- Executes dropped EXE
-
\??\c:\jpdjp.exec:\jpdjp.exe48⤵
- Executes dropped EXE
-
\??\c:\xfxrllf.exec:\xfxrllf.exe49⤵
- Executes dropped EXE
-
\??\c:\htbttn.exec:\htbttn.exe50⤵
- Executes dropped EXE
-
\??\c:\1bhbtt.exec:\1bhbtt.exe51⤵
- Executes dropped EXE
-
\??\c:\jddvp.exec:\jddvp.exe52⤵
- Executes dropped EXE
-
\??\c:\rxrfrrl.exec:\rxrfrrl.exe53⤵
- Executes dropped EXE
-
\??\c:\fxxrllf.exec:\fxxrllf.exe54⤵
- Executes dropped EXE
-
\??\c:\7bhbbb.exec:\7bhbbb.exe55⤵
- Executes dropped EXE
-
\??\c:\ttnnnt.exec:\ttnnnt.exe56⤵
- Executes dropped EXE
-
\??\c:\vpjjv.exec:\vpjjv.exe57⤵
- Executes dropped EXE
-
\??\c:\rrlfffx.exec:\rrlfffx.exe58⤵
- Executes dropped EXE
-
\??\c:\3lxxrlf.exec:\3lxxrlf.exe59⤵
- Executes dropped EXE
-
\??\c:\nnnttb.exec:\nnnttb.exe60⤵
- Executes dropped EXE
-
\??\c:\1vjdd.exec:\1vjdd.exe61⤵
- Executes dropped EXE
-
\??\c:\dppjd.exec:\dppjd.exe62⤵
- Executes dropped EXE
-
\??\c:\rrxxrrr.exec:\rrxxrrr.exe63⤵
- Executes dropped EXE
-
\??\c:\5rfxrxr.exec:\5rfxrxr.exe64⤵
- Executes dropped EXE
-
\??\c:\bntnnh.exec:\bntnnh.exe65⤵
- Executes dropped EXE
-
\??\c:\ddjdv.exec:\ddjdv.exe66⤵
-
\??\c:\vvddv.exec:\vvddv.exe67⤵
-
\??\c:\9frllll.exec:\9frllll.exe68⤵
-
\??\c:\xlffxlf.exec:\xlffxlf.exe69⤵
-
\??\c:\hbthtn.exec:\hbthtn.exe70⤵
-
\??\c:\7jddv.exec:\7jddv.exe71⤵
-
\??\c:\1llxlfx.exec:\1llxlfx.exe72⤵
-
\??\c:\tnnhbt.exec:\tnnhbt.exe73⤵
-
\??\c:\1pvpj.exec:\1pvpj.exe74⤵
-
\??\c:\xlrlxrx.exec:\xlrlxrx.exe75⤵
-
\??\c:\5xflffx.exec:\5xflffx.exe76⤵
-
\??\c:\vpppd.exec:\vpppd.exe77⤵
-
\??\c:\7htnhh.exec:\7htnhh.exe78⤵
-
\??\c:\jjpdv.exec:\jjpdv.exe79⤵
-
\??\c:\xrlfrrl.exec:\xrlfrrl.exe80⤵
-
\??\c:\9jvpd.exec:\9jvpd.exe81⤵
-
\??\c:\3vpvp.exec:\3vpvp.exe82⤵
-
\??\c:\bnnbnh.exec:\bnnbnh.exe83⤵
-
\??\c:\ddjdp.exec:\ddjdp.exe84⤵
-
\??\c:\rflfrrr.exec:\rflfrrr.exe85⤵
-
\??\c:\thhhtt.exec:\thhhtt.exe86⤵
-
\??\c:\ppvpv.exec:\ppvpv.exe87⤵
-
\??\c:\tntnnh.exec:\tntnnh.exe88⤵
-
\??\c:\lxrlrlf.exec:\lxrlrlf.exe89⤵
-
\??\c:\frlfrlf.exec:\frlfrlf.exe90⤵
-
\??\c:\hnnhbt.exec:\hnnhbt.exe91⤵
-
\??\c:\bttnbh.exec:\bttnbh.exe92⤵
-
\??\c:\pdpjv.exec:\pdpjv.exe93⤵
-
\??\c:\7lfrffx.exec:\7lfrffx.exe94⤵
-
\??\c:\rxflxxx.exec:\rxflxxx.exe95⤵
-
\??\c:\tnnnhh.exec:\tnnnhh.exe96⤵
-
\??\c:\vjjvj.exec:\vjjvj.exe97⤵
-
\??\c:\1rlflrl.exec:\1rlflrl.exe98⤵
-
\??\c:\3rrlfxx.exec:\3rrlfxx.exe99⤵
-
\??\c:\1hnbbh.exec:\1hnbbh.exe100⤵
-
\??\c:\vjvvv.exec:\vjvvv.exe101⤵
-
\??\c:\5dpdp.exec:\5dpdp.exe102⤵
-
\??\c:\1llxxrr.exec:\1llxxrr.exe103⤵
-
\??\c:\tbnhhb.exec:\tbnhhb.exe104⤵
-
\??\c:\pddpd.exec:\pddpd.exe105⤵
-
\??\c:\rflxrlf.exec:\rflxrlf.exe106⤵
-
\??\c:\rrffffl.exec:\rrffffl.exe107⤵
-
\??\c:\bbhhtt.exec:\bbhhtt.exe108⤵
-
\??\c:\dpvpd.exec:\dpvpd.exe109⤵
-
\??\c:\vpdvj.exec:\vpdvj.exe110⤵
-
\??\c:\rlxrflr.exec:\rlxrflr.exe111⤵
-
\??\c:\xlrlffx.exec:\xlrlffx.exe112⤵
-
\??\c:\hhnhtn.exec:\hhnhtn.exe113⤵
-
\??\c:\1djdd.exec:\1djdd.exe114⤵
-
\??\c:\fxrlrrf.exec:\fxrlrrf.exe115⤵
-
\??\c:\thnhtt.exec:\thnhtt.exe116⤵
-
\??\c:\nhnbtt.exec:\nhnbtt.exe117⤵
-
\??\c:\vdpdp.exec:\vdpdp.exe118⤵
-
\??\c:\5xxrfff.exec:\5xxrfff.exe119⤵
-
\??\c:\7tnbnn.exec:\7tnbnn.exe120⤵
-
\??\c:\bnnnbt.exec:\bnnnbt.exe121⤵
-
\??\c:\jppjv.exec:\jppjv.exe122⤵
-
\??\c:\lflfrrl.exec:\lflfrrl.exe123⤵
-
\??\c:\nbbtnh.exec:\nbbtnh.exe124⤵
-
\??\c:\nhhbtb.exec:\nhhbtb.exe125⤵
-
\??\c:\jvjvp.exec:\jvjvp.exe126⤵
-
\??\c:\jpdvj.exec:\jpdvj.exe127⤵
-
\??\c:\lllfrxr.exec:\lllfrxr.exe128⤵
-
\??\c:\7tbtbh.exec:\7tbtbh.exe129⤵
-
\??\c:\7hnbbb.exec:\7hnbbb.exe130⤵
-
\??\c:\vdpdp.exec:\vdpdp.exe131⤵
-
\??\c:\ffxfrlx.exec:\ffxfrlx.exe132⤵
-
\??\c:\3fxrlfx.exec:\3fxrlfx.exe133⤵
-
\??\c:\nhttnn.exec:\nhttnn.exe134⤵
-
\??\c:\dddvj.exec:\dddvj.exe135⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe136⤵
-
\??\c:\3lllflf.exec:\3lllflf.exe137⤵
-
\??\c:\nnhbnh.exec:\nnhbnh.exe138⤵
-
\??\c:\pvdvj.exec:\pvdvj.exe139⤵
-
\??\c:\lxfrfxr.exec:\lxfrfxr.exe140⤵
-
\??\c:\tnthnh.exec:\tnthnh.exe141⤵
-
\??\c:\nbbbnn.exec:\nbbbnn.exe142⤵
-
\??\c:\5pdpv.exec:\5pdpv.exe143⤵
-
\??\c:\rllfxrr.exec:\rllfxrr.exe144⤵
-
\??\c:\tbhbtn.exec:\tbhbtn.exe145⤵
-
\??\c:\jvpjp.exec:\jvpjp.exe146⤵
-
\??\c:\vpjdp.exec:\vpjdp.exe147⤵
-
\??\c:\rllfrrr.exec:\rllfrrr.exe148⤵
-
\??\c:\7htnth.exec:\7htnth.exe149⤵
-
\??\c:\htbtnh.exec:\htbtnh.exe150⤵
-
\??\c:\jdvjp.exec:\jdvjp.exe151⤵
-
\??\c:\9frlrrf.exec:\9frlrrf.exe152⤵
-
\??\c:\1nttbt.exec:\1nttbt.exe153⤵
-
\??\c:\hthbnh.exec:\hthbnh.exe154⤵
-
\??\c:\pjvjj.exec:\pjvjj.exe155⤵
-
\??\c:\lffxxrx.exec:\lffxxrx.exe156⤵
-
\??\c:\7bttnn.exec:\7bttnn.exe157⤵
-
\??\c:\nntnbb.exec:\nntnbb.exe158⤵
-
\??\c:\3jpdv.exec:\3jpdv.exe159⤵
-
\??\c:\fflxlfx.exec:\fflxlfx.exe160⤵
-
\??\c:\7xlxlfr.exec:\7xlxlfr.exe161⤵
-
\??\c:\ttthbb.exec:\ttthbb.exe162⤵
-
\??\c:\djpjd.exec:\djpjd.exe163⤵
-
\??\c:\xrfrrlr.exec:\xrfrrlr.exe164⤵
-
\??\c:\xfrlxrf.exec:\xfrlxrf.exe165⤵
-
\??\c:\nhtntt.exec:\nhtntt.exe166⤵
-
\??\c:\hnbnbb.exec:\hnbnbb.exe167⤵
-
\??\c:\dvjjp.exec:\dvjjp.exe168⤵
-
\??\c:\rllfrrl.exec:\rllfrrl.exe169⤵
-
\??\c:\flllxxr.exec:\flllxxr.exe170⤵
-
\??\c:\bthbnn.exec:\bthbnn.exe171⤵
-
\??\c:\pdddp.exec:\pdddp.exe172⤵
-
\??\c:\dvdvj.exec:\dvdvj.exe173⤵
-
\??\c:\rlxrxlx.exec:\rlxrxlx.exe174⤵
-
\??\c:\nbnhbt.exec:\nbnhbt.exe175⤵
-
\??\c:\pdddv.exec:\pdddv.exe176⤵
-
\??\c:\jddpd.exec:\jddpd.exe177⤵
-
\??\c:\1xxlxxr.exec:\1xxlxxr.exe178⤵
-
\??\c:\htbthb.exec:\htbthb.exe179⤵
-
\??\c:\7tnbnb.exec:\7tnbnb.exe180⤵
-
\??\c:\9jjdv.exec:\9jjdv.exe181⤵
-
\??\c:\5rlfffx.exec:\5rlfffx.exe182⤵
-
\??\c:\htntht.exec:\htntht.exe183⤵
-
\??\c:\bhnbnb.exec:\bhnbnb.exe184⤵
-
\??\c:\djvpd.exec:\djvpd.exe185⤵
-
\??\c:\1dvvp.exec:\1dvvp.exe186⤵
-
\??\c:\xxxrffx.exec:\xxxrffx.exe187⤵
-
\??\c:\nbbttn.exec:\nbbttn.exe188⤵
-
\??\c:\tnnbhh.exec:\tnnbhh.exe189⤵
-
\??\c:\vppdv.exec:\vppdv.exe190⤵
-
\??\c:\xrfxrlr.exec:\xrfxrlr.exe191⤵
-
\??\c:\thhthh.exec:\thhthh.exe192⤵
-
\??\c:\htbthh.exec:\htbthh.exe193⤵
-
\??\c:\1djvp.exec:\1djvp.exe194⤵
-
\??\c:\jpdvp.exec:\jpdvp.exe195⤵
-
\??\c:\fflfxxr.exec:\fflfxxr.exe196⤵
-
\??\c:\hnnbbt.exec:\hnnbbt.exe197⤵
-
\??\c:\hhtnbb.exec:\hhtnbb.exe198⤵
-
\??\c:\vjpdp.exec:\vjpdp.exe199⤵
-
\??\c:\rllxlfr.exec:\rllxlfr.exe200⤵
-
\??\c:\3tnbtn.exec:\3tnbtn.exe201⤵
-
\??\c:\thnhhh.exec:\thnhhh.exe202⤵
-
\??\c:\vjddv.exec:\vjddv.exe203⤵
-
\??\c:\lxfrlfx.exec:\lxfrlfx.exe204⤵
-
\??\c:\1llfrrf.exec:\1llfrrf.exe205⤵
-
\??\c:\nthbtt.exec:\nthbtt.exe206⤵
-
\??\c:\dvvpd.exec:\dvvpd.exe207⤵
-
\??\c:\jdpjd.exec:\jdpjd.exe208⤵
-
\??\c:\3lllxfx.exec:\3lllxfx.exe209⤵
-
\??\c:\fflffxx.exec:\fflffxx.exe210⤵
-
\??\c:\nhnnhh.exec:\nhnnhh.exe211⤵
-
\??\c:\pjpdv.exec:\pjpdv.exe212⤵
-
\??\c:\xrxlllr.exec:\xrxlllr.exe213⤵
-
\??\c:\5xlffxx.exec:\5xlffxx.exe214⤵
-
\??\c:\thnnbn.exec:\thnnbn.exe215⤵
-
\??\c:\vjjvd.exec:\vjjvd.exe216⤵
-
\??\c:\7vddp.exec:\7vddp.exe217⤵
-
\??\c:\rxlxrll.exec:\rxlxrll.exe218⤵
-
\??\c:\1hbbtt.exec:\1hbbtt.exe219⤵
-
\??\c:\pdpdp.exec:\pdpdp.exe220⤵
-
\??\c:\dpdvd.exec:\dpdvd.exe221⤵
-
\??\c:\flrfrlx.exec:\flrfrlx.exe222⤵
-
\??\c:\lrxxrrl.exec:\lrxxrrl.exe223⤵
-
\??\c:\nnthbt.exec:\nnthbt.exe224⤵
-
\??\c:\dddpv.exec:\dddpv.exe225⤵
-
\??\c:\rlrxlll.exec:\rlrxlll.exe226⤵
-
\??\c:\7xxxrrl.exec:\7xxxrrl.exe227⤵
-
\??\c:\btnthn.exec:\btnthn.exe228⤵
-
\??\c:\7jvjp.exec:\7jvjp.exe229⤵
-
\??\c:\rfrlffx.exec:\rfrlffx.exe230⤵
-
\??\c:\frxrfxl.exec:\frxrfxl.exe231⤵
-
\??\c:\7bnnhn.exec:\7bnnhn.exe232⤵
-
\??\c:\7ddvj.exec:\7ddvj.exe233⤵
-
\??\c:\pvjvp.exec:\pvjvp.exe234⤵
-
\??\c:\lllfxrl.exec:\lllfxrl.exe235⤵
-
\??\c:\3ttnbt.exec:\3ttnbt.exe236⤵
-
\??\c:\bnnhbt.exec:\bnnhbt.exe237⤵
-
\??\c:\vjdpd.exec:\vjdpd.exe238⤵
-
\??\c:\xrxlrlx.exec:\xrxlrlx.exe239⤵
-
\??\c:\nbbthb.exec:\nbbthb.exe240⤵
-
\??\c:\bbnhhh.exec:\bbnhhh.exe241⤵