Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2024, 10:36 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b93ed3db386dc4c80abd7848470eccc_JaffaCakes118.exe
Resource
win7-20240220-en
5 signatures
150 seconds
General
-
Target
0b93ed3db386dc4c80abd7848470eccc_JaffaCakes118.exe
-
Size
375KB
-
MD5
0b93ed3db386dc4c80abd7848470eccc
-
SHA1
bcd9b96ea3b7e56f23e9a2796d4dd9f9b3df072f
-
SHA256
c8b665a23514bc5142d09154b5e25b670ec1b1042b9c19d7a85b1c7f6d9a3aa2
-
SHA512
bcd8eec141ed3cfb1d3b89edf535ee7627f920dcecd2ef62fa07e739c0ad0e0baba797825c7550cfd792a969c3066ed19fcfce8840d8a52cd2e8a73c0604d3be
-
SSDEEP
3072:8hOm2sI93UufdC67cimD5t251UrRE9TTFwCFz7:8cm7ImGddXmNt251UriZFwCFz7
Malware Config
Signatures
-
Detect Blackmoon payload 63 IoCs
resource yara_rule behavioral2/memory/4720-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2208-13-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4716-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1596-24-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3052-30-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/668-32-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3956-43-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4000-50-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2756-51-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1876-62-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3732-66-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4144-74-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1148-79-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2456-97-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3796-92-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1720-119-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2872-124-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5116-143-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/968-149-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3800-160-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4052-162-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3284-172-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4168-185-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5052-193-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3424-194-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4540-201-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4580-208-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4720-212-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4568-220-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4528-224-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4824-231-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1260-235-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1684-241-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1396-243-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1492-261-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3036-265-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2176-272-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3048-278-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1824-282-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2960-329-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4488-343-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1916-347-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3420-351-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2404-356-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2980-376-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4068-383-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4952-384-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5052-394-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1956-411-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/924-443-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1192-454-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3048-477-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4636-503-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2560-574-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2544-618-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5084-652-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4840-665-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1920-678-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/708-745-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2612-816-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2632-919-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3044-948-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/432-1107-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4716 xffxxxx.exe 2208 9hnnht.exe 1596 nhbthh.exe 3052 ppddd.exe 668 rlxrrrx.exe 3956 jjjdj.exe 4000 xxrrxxx.exe 2756 1rxrlll.exe 1876 httnhb.exe 3732 9ffxflf.exe 4144 7llffff.exe 1148 3tbbtb.exe 1824 9xrrllf.exe 4664 hnthbh.exe 3796 ttttnn.exe 2456 jdddv.exe 2536 nthtbb.exe 1464 pjdpd.exe 1720 ffrrrrx.exe 2872 hthbhh.exe 3212 jjjjv.exe 3760 hthbbb.exe 5116 ddpdv.exe 968 xlxxxxx.exe 1400 ppjjp.exe 3800 9xfxllf.exe 4052 jjvpj.exe 3284 rlllfff.exe 316 bhbbtt.exe 2384 ddpjj.exe 4168 hnntnt.exe 5052 bntnnh.exe 3424 rlflrrx.exe 4540 xfrlfff.exe 4368 bbtnbb.exe 4580 vpppp.exe 4720 xlfrlll.exe 3008 pdjjj.exe 4568 vjvpd.exe 4528 1lrlflx.exe 2612 thnnhh.exe 4824 jpppj.exe 1260 9djdd.exe 1900 rlrrlff.exe 1684 1bbbtt.exe 1396 9vjdj.exe 924 dvdvv.exe 1768 xlrlfll.exe 3640 9btnhh.exe 5084 pjpjd.exe 1492 ppvpd.exe 3036 5rxxxxx.exe 4640 hthbhh.exe 2176 7tttnt.exe 4912 9djvp.exe 3048 rflfxxr.exe 1824 hbnhbt.exe 4328 1jppd.exe 2492 ffrfrrx.exe 1468 bbnhbb.exe 3200 jvvpj.exe 3476 ffllxxx.exe 2368 ttbhtn.exe 3192 hnbhtt.exe -
resource yara_rule behavioral2/memory/4720-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2208-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4716-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1596-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1596-24-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3052-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3052-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/668-32-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3956-43-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4000-50-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2756-51-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1876-62-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3732-63-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3732-66-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4144-74-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1148-79-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2456-97-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3796-92-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1720-119-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2872-124-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3760-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5116-137-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5116-143-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/968-144-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/968-149-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3800-160-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4052-162-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3284-172-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4168-185-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5052-193-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3424-194-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4540-201-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4580-208-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4720-212-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4568-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4568-220-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4528-224-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4824-231-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1260-235-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1684-241-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1396-243-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1492-261-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3036-265-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2176-272-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4912-273-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3048-278-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1824-282-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2960-325-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2960-329-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/992-330-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4488-343-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1916-347-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3420-351-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2912-352-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2404-356-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2476-363-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2980-376-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4068-383-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4952-384-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5052-394-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4464-401-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1956-411-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2764-421-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/924-443-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4720 wrote to memory of 4716 4720 0b93ed3db386dc4c80abd7848470eccc_JaffaCakes118.exe 82 PID 4720 wrote to memory of 4716 4720 0b93ed3db386dc4c80abd7848470eccc_JaffaCakes118.exe 82 PID 4720 wrote to memory of 4716 4720 0b93ed3db386dc4c80abd7848470eccc_JaffaCakes118.exe 82 PID 4716 wrote to memory of 2208 4716 xffxxxx.exe 83 PID 4716 wrote to memory of 2208 4716 xffxxxx.exe 83 PID 4716 wrote to memory of 2208 4716 xffxxxx.exe 83 PID 2208 wrote to memory of 1596 2208 9hnnht.exe 84 PID 2208 wrote to memory of 1596 2208 9hnnht.exe 84 PID 2208 wrote to memory of 1596 2208 9hnnht.exe 84 PID 1596 wrote to memory of 3052 1596 nhbthh.exe 85 PID 1596 wrote to memory of 3052 1596 nhbthh.exe 85 PID 1596 wrote to memory of 3052 1596 nhbthh.exe 85 PID 3052 wrote to memory of 668 3052 ppddd.exe 87 PID 3052 wrote to memory of 668 3052 ppddd.exe 87 PID 3052 wrote to memory of 668 3052 ppddd.exe 87 PID 668 wrote to memory of 3956 668 rlxrrrx.exe 88 PID 668 wrote to memory of 3956 668 rlxrrrx.exe 88 PID 668 wrote to memory of 3956 668 rlxrrrx.exe 88 PID 3956 wrote to memory of 4000 3956 jjjdj.exe 89 PID 3956 wrote to memory of 4000 3956 jjjdj.exe 89 PID 3956 wrote to memory of 4000 3956 jjjdj.exe 89 PID 4000 wrote to memory of 2756 4000 xxrrxxx.exe 90 PID 4000 wrote to memory of 2756 4000 xxrrxxx.exe 90 PID 4000 wrote to memory of 2756 4000 xxrrxxx.exe 90 PID 2756 wrote to memory of 1876 2756 1rxrlll.exe 91 PID 2756 wrote to memory of 1876 2756 1rxrlll.exe 91 PID 2756 wrote to memory of 1876 2756 1rxrlll.exe 91 PID 1876 wrote to memory of 3732 1876 httnhb.exe 93 PID 1876 wrote to memory of 3732 1876 httnhb.exe 93 PID 1876 wrote to memory of 3732 1876 httnhb.exe 93 PID 3732 wrote to memory of 4144 3732 9ffxflf.exe 94 PID 3732 wrote to memory of 4144 3732 9ffxflf.exe 94 PID 3732 wrote to memory of 4144 3732 9ffxflf.exe 94 PID 4144 wrote to memory of 1148 4144 7llffff.exe 95 PID 4144 wrote to memory of 1148 4144 7llffff.exe 95 PID 4144 wrote to memory of 1148 4144 7llffff.exe 95 PID 1148 wrote to memory of 1824 1148 3tbbtb.exe 96 PID 1148 wrote to memory of 1824 1148 3tbbtb.exe 96 PID 1148 wrote to memory of 1824 1148 3tbbtb.exe 96 PID 1824 wrote to memory of 4664 1824 9xrrllf.exe 97 PID 1824 wrote to memory of 4664 1824 9xrrllf.exe 97 PID 1824 wrote to memory of 4664 1824 9xrrllf.exe 97 PID 4664 wrote to memory of 3796 4664 hnthbh.exe 98 PID 4664 wrote to memory of 3796 4664 hnthbh.exe 98 PID 4664 wrote to memory of 3796 4664 hnthbh.exe 98 PID 3796 wrote to memory of 2456 3796 ttttnn.exe 99 PID 3796 wrote to memory of 2456 3796 ttttnn.exe 99 PID 3796 wrote to memory of 2456 3796 ttttnn.exe 99 PID 2456 wrote to memory of 2536 2456 jdddv.exe 100 PID 2456 wrote to memory of 2536 2456 jdddv.exe 100 PID 2456 wrote to memory of 2536 2456 jdddv.exe 100 PID 2536 wrote to memory of 1464 2536 nthtbb.exe 101 PID 2536 wrote to memory of 1464 2536 nthtbb.exe 101 PID 2536 wrote to memory of 1464 2536 nthtbb.exe 101 PID 1464 wrote to memory of 1720 1464 pjdpd.exe 102 PID 1464 wrote to memory of 1720 1464 pjdpd.exe 102 PID 1464 wrote to memory of 1720 1464 pjdpd.exe 102 PID 1720 wrote to memory of 2872 1720 ffrrrrx.exe 103 PID 1720 wrote to memory of 2872 1720 ffrrrrx.exe 103 PID 1720 wrote to memory of 2872 1720 ffrrrrx.exe 103 PID 2872 wrote to memory of 3212 2872 hthbhh.exe 104 PID 2872 wrote to memory of 3212 2872 hthbhh.exe 104 PID 2872 wrote to memory of 3212 2872 hthbhh.exe 104 PID 3212 wrote to memory of 3760 3212 jjjjv.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b93ed3db386dc4c80abd7848470eccc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0b93ed3db386dc4c80abd7848470eccc_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
\??\c:\xffxxxx.exec:\xffxxxx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
\??\c:\9hnnht.exec:\9hnnht.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\nhbthh.exec:\nhbthh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\ppddd.exec:\ppddd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\rlxrrrx.exec:\rlxrrrx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
\??\c:\jjjdj.exec:\jjjdj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
\??\c:\xxrrxxx.exec:\xxrrxxx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\1rxrlll.exec:\1rxrlll.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\httnhb.exec:\httnhb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
\??\c:\9ffxflf.exec:\9ffxflf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3732 -
\??\c:\7llffff.exec:\7llffff.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4144 -
\??\c:\3tbbtb.exec:\3tbbtb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
\??\c:\9xrrllf.exec:\9xrrllf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1824 -
\??\c:\hnthbh.exec:\hnthbh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
\??\c:\ttttnn.exec:\ttttnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3796 -
\??\c:\jdddv.exec:\jdddv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\nthtbb.exec:\nthtbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\pjdpd.exec:\pjdpd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
\??\c:\ffrrrrx.exec:\ffrrrrx.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\hthbhh.exec:\hthbhh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\jjjjv.exec:\jjjjv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3212 -
\??\c:\hthbbb.exec:\hthbbb.exe23⤵
- Executes dropped EXE
PID:3760 -
\??\c:\ddpdv.exec:\ddpdv.exe24⤵
- Executes dropped EXE
PID:5116 -
\??\c:\xlxxxxx.exec:\xlxxxxx.exe25⤵
- Executes dropped EXE
PID:968 -
\??\c:\ppjjp.exec:\ppjjp.exe26⤵
- Executes dropped EXE
PID:1400 -
\??\c:\9xfxllf.exec:\9xfxllf.exe27⤵
- Executes dropped EXE
PID:3800 -
\??\c:\jjvpj.exec:\jjvpj.exe28⤵
- Executes dropped EXE
PID:4052 -
\??\c:\rlllfff.exec:\rlllfff.exe29⤵
- Executes dropped EXE
PID:3284 -
\??\c:\bhbbtt.exec:\bhbbtt.exe30⤵
- Executes dropped EXE
PID:316 -
\??\c:\ddpjj.exec:\ddpjj.exe31⤵
- Executes dropped EXE
PID:2384 -
\??\c:\hnntnt.exec:\hnntnt.exe32⤵
- Executes dropped EXE
PID:4168 -
\??\c:\bntnnh.exec:\bntnnh.exe33⤵
- Executes dropped EXE
PID:5052 -
\??\c:\rlflrrx.exec:\rlflrrx.exe34⤵
- Executes dropped EXE
PID:3424 -
\??\c:\xfrlfff.exec:\xfrlfff.exe35⤵
- Executes dropped EXE
PID:4540 -
\??\c:\bbtnbb.exec:\bbtnbb.exe36⤵
- Executes dropped EXE
PID:4368 -
\??\c:\vpppp.exec:\vpppp.exe37⤵
- Executes dropped EXE
PID:4580 -
\??\c:\xlfrlll.exec:\xlfrlll.exe38⤵
- Executes dropped EXE
PID:4720 -
\??\c:\pdjjj.exec:\pdjjj.exe39⤵
- Executes dropped EXE
PID:3008 -
\??\c:\vjvpd.exec:\vjvpd.exe40⤵
- Executes dropped EXE
PID:4568 -
\??\c:\1lrlflx.exec:\1lrlflx.exe41⤵
- Executes dropped EXE
PID:4528 -
\??\c:\thnnhh.exec:\thnnhh.exe42⤵
- Executes dropped EXE
PID:2612 -
\??\c:\jpppj.exec:\jpppj.exe43⤵
- Executes dropped EXE
PID:4824 -
\??\c:\9djdd.exec:\9djdd.exe44⤵
- Executes dropped EXE
PID:1260 -
\??\c:\rlrrlff.exec:\rlrrlff.exe45⤵
- Executes dropped EXE
PID:1900 -
\??\c:\1bbbtt.exec:\1bbbtt.exe46⤵
- Executes dropped EXE
PID:1684 -
\??\c:\9vjdj.exec:\9vjdj.exe47⤵
- Executes dropped EXE
PID:1396 -
\??\c:\dvdvv.exec:\dvdvv.exe48⤵
- Executes dropped EXE
PID:924 -
\??\c:\xlrlfll.exec:\xlrlfll.exe49⤵
- Executes dropped EXE
PID:1768 -
\??\c:\9btnhh.exec:\9btnhh.exe50⤵
- Executes dropped EXE
PID:3640 -
\??\c:\pjpjd.exec:\pjpjd.exe51⤵
- Executes dropped EXE
PID:5084 -
\??\c:\ppvpd.exec:\ppvpd.exe52⤵
- Executes dropped EXE
PID:1492 -
\??\c:\5rxxxxx.exec:\5rxxxxx.exe53⤵
- Executes dropped EXE
PID:3036 -
\??\c:\hthbhh.exec:\hthbhh.exe54⤵
- Executes dropped EXE
PID:4640 -
\??\c:\7tttnt.exec:\7tttnt.exe55⤵
- Executes dropped EXE
PID:2176 -
\??\c:\9djvp.exec:\9djvp.exe56⤵
- Executes dropped EXE
PID:4912 -
\??\c:\rflfxxr.exec:\rflfxxr.exe57⤵
- Executes dropped EXE
PID:3048 -
\??\c:\hbnhbt.exec:\hbnhbt.exe58⤵
- Executes dropped EXE
PID:1824 -
\??\c:\1jppd.exec:\1jppd.exe59⤵
- Executes dropped EXE
PID:4328 -
\??\c:\ffrfrrx.exec:\ffrfrrx.exe60⤵
- Executes dropped EXE
PID:2492 -
\??\c:\bbnhbb.exec:\bbnhbb.exe61⤵
- Executes dropped EXE
PID:1468 -
\??\c:\jvvpj.exec:\jvvpj.exe62⤵
- Executes dropped EXE
PID:3200 -
\??\c:\ffllxxx.exec:\ffllxxx.exe63⤵
- Executes dropped EXE
PID:3476 -
\??\c:\ttbhtn.exec:\ttbhtn.exe64⤵
- Executes dropped EXE
PID:2368 -
\??\c:\hnbhtt.exec:\hnbhtt.exe65⤵
- Executes dropped EXE
PID:3192 -
\??\c:\jdpjd.exec:\jdpjd.exe66⤵PID:3208
-
\??\c:\vvvpp.exec:\vvvpp.exe67⤵PID:4348
-
\??\c:\llllrrx.exec:\llllrrx.exe68⤵PID:4708
-
\??\c:\5ntttt.exec:\5ntttt.exe69⤵PID:1340
-
\??\c:\ppvjv.exec:\ppvjv.exe70⤵PID:4192
-
\??\c:\fxxrrrl.exec:\fxxrrrl.exe71⤵PID:4704
-
\??\c:\1lxrlfl.exec:\1lxrlfl.exe72⤵PID:2960
-
\??\c:\nhhbbb.exec:\nhhbbb.exe73⤵PID:992
-
\??\c:\1pvvd.exec:\1pvvd.exe74⤵PID:4336
-
\??\c:\5lllffx.exec:\5lllffx.exe75⤵PID:3608
-
\??\c:\tnnhtn.exec:\tnnhtn.exe76⤵PID:4488
-
\??\c:\7tnbnh.exec:\7tnbnh.exe77⤵PID:1916
-
\??\c:\pjpjv.exec:\pjpjv.exe78⤵PID:3420
-
\??\c:\lxxxrff.exec:\lxxxrff.exe79⤵PID:2912
-
\??\c:\btnbhh.exec:\btnbhh.exe80⤵PID:2404
-
\??\c:\tbhbbh.exec:\tbhbbh.exe81⤵PID:2096
-
\??\c:\5jvdd.exec:\5jvdd.exe82⤵PID:2476
-
\??\c:\hbbttt.exec:\hbbttt.exe83⤵PID:2468
-
\??\c:\7nnhbb.exec:\7nnhbb.exe84⤵PID:2108
-
\??\c:\vjjjd.exec:\vjjjd.exe85⤵PID:2980
-
\??\c:\flrfllx.exec:\flrfllx.exe86⤵PID:3972
-
\??\c:\hbtttt.exec:\hbtttt.exe87⤵PID:4068
-
\??\c:\htbttt.exec:\htbttt.exe88⤵PID:4952
-
\??\c:\vdddj.exec:\vdddj.exe89⤵PID:5068
-
\??\c:\xlrlfxx.exec:\xlrlfxx.exe90⤵PID:5052
-
\??\c:\hhhhbb.exec:\hhhhbb.exe91⤵PID:4352
-
\??\c:\dvjvp.exec:\dvjvp.exe92⤵PID:4456
-
\??\c:\jvvpj.exec:\jvvpj.exe93⤵PID:4464
-
\??\c:\rrrxxll.exec:\rrrxxll.exe94⤵PID:3368
-
\??\c:\btbtbh.exec:\btbtbh.exe95⤵PID:1956
-
\??\c:\5pvpp.exec:\5pvpp.exe96⤵PID:3496
-
\??\c:\1llllrr.exec:\1llllrr.exe97⤵PID:528
-
\??\c:\rxfxrlf.exec:\rxfxrlf.exe98⤵PID:1596
-
\??\c:\thtntt.exec:\thtntt.exe99⤵PID:2764
-
\??\c:\ppdvp.exec:\ppdvp.exe100⤵PID:3988
-
\??\c:\ffffrrr.exec:\ffffrrr.exe101⤵PID:3524
-
\??\c:\bbnhnn.exec:\bbnhnn.exe102⤵PID:3292
-
\??\c:\nthbtt.exec:\nthbtt.exe103⤵PID:4572
-
\??\c:\dpdvp.exec:\dpdvp.exe104⤵PID:1772
-
\??\c:\flxfxxr.exec:\flxfxxr.exe105⤵PID:4164
-
\??\c:\nhbtnn.exec:\nhbtnn.exe106⤵PID:924
-
\??\c:\nhttnb.exec:\nhttnb.exe107⤵PID:532
-
\??\c:\vvjdj.exec:\vvjdj.exe108⤵PID:1192
-
\??\c:\vpdvp.exec:\vpdvp.exe109⤵PID:1876
-
\??\c:\xrfrffx.exec:\xrfrffx.exe110⤵PID:2936
-
\??\c:\xlrrlll.exec:\xlrrlll.exe111⤵PID:3660
-
\??\c:\btttnt.exec:\btttnt.exe112⤵PID:1484
-
\??\c:\tnttnn.exec:\tnttnn.exe113⤵PID:1148
-
\??\c:\vdjdd.exec:\vdjdd.exe114⤵PID:2976
-
\??\c:\xlrlllf.exec:\xlrlllf.exe115⤵PID:3048
-
\??\c:\hbbbbb.exec:\hbbbbb.exe116⤵PID:4788
-
\??\c:\9ttnhh.exec:\9ttnhh.exe117⤵PID:2244
-
\??\c:\pjjdv.exec:\pjjdv.exe118⤵PID:2492
-
\??\c:\ppddd.exec:\ppddd.exe119⤵PID:1468
-
\??\c:\flfrlxx.exec:\flfrlxx.exe120⤵PID:3200
-
\??\c:\hbnhbb.exec:\hbnhbb.exe121⤵PID:3476
-
\??\c:\hbnnbb.exec:\hbnnbb.exe122⤵PID:2368
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-