Analysis
-
max time kernel
150s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 23:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe
-
Size
374KB
-
MD5
61391507ef42fee71c6d0b7e336bf22a
-
SHA1
7eea423a162e57449d1df0726a2fff3c60f52249
-
SHA256
ff74659f38626027cf7c1db434e718f506fedb2ffd22ca4203a5bc2e1a52609f
-
SHA512
c6794d7e1c9af598cd235b49b03f37363427a96812b20f14407be591478db9c1d08a7e7d73ffe88523bb88b40a9f1387372030b0d12d8fe5fe75378deb0cae33
-
SSDEEP
3072:8hOm2sI93UufdC67cimD5t251UrRE9TTFwCFtI:8cm7ImGddXmNt251UriZFwCFW
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2856-0-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1564-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2096-18-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3780-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3292-27-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1748-32-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3032-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1584-50-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1016-97-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2376-95-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1552-89-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4796-86-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4000-79-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/60-74-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4584-60-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3772-57-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3436-119-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4860-124-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1924-141-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4936-150-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1340-156-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4252-165-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/980-171-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4900-175-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/636-182-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3568-190-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4564-196-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5112-206-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4708-210-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4340-214-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2160-225-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1608-229-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2120-231-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1052-237-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1572-245-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2168-258-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3456-265-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2920-270-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3432-279-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5004-286-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1404-294-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2868-317-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/664-338-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2304-342-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3100-353-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/372-366-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3824-378-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4340-383-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4960-387-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/588-394-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3808-406-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/892-417-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1444-427-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3068-437-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3628-442-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3208-525-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3636-575-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1128-684-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2656-747-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4264-763-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1564-794-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4652-813-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3908-907-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1308-1028-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ddddv.exerlxrxxl.exexlxxrrl.exepvdvv.exe5xfxrrl.exelrffxxr.exehbbbbb.exejdvpd.exevvvpj.exelxllfrl.exebnbttn.exejdppp.exexflffxx.exehbhtnn.exepppvv.exelrfxrll.exedvjjj.exexxrflxr.exedvjjj.exetthbbb.exe5flxxxx.exedjpdd.exefrlffff.exebtbbtt.exe1rrrrrl.exentnhtt.exexfllffx.exe1djdv.exebbtnhh.exeppdjv.exejdpjj.exerrfffff.exetnttnt.exe3vddv.exe1lrrrrr.exebhnbbn.exeddvpp.exefxrfrll.exe3hnhhh.exepvddd.exe5rfxxff.exethtnhn.exeppvjd.exe9lxrlll.exenhbttt.exeppvvp.exerflllfx.exevpjvp.exerxlfrrr.exennbnnn.exepdvvj.exepdvpp.exethtnnt.exerfxxxfr.exenthbbb.exepjpjd.exe3vdvv.exeffrlfff.exe9nbbhn.exejvjdv.exeflxrrlf.exe9htttt.exevpddv.exexlxxrrr.exepid process 1564 ddddv.exe 2096 rlxrxxl.exe 3780 xlxxrrl.exe 3292 pvdvv.exe 1748 5xfxrrl.exe 3032 lrffxxr.exe 1584 hbbbbb.exe 3772 jdvpd.exe 4584 vvvpj.exe 3688 lxllfrl.exe 60 bnbttn.exe 4000 jdppp.exe 4796 xflffxx.exe 1552 hbhtnn.exe 1016 pppvv.exe 2376 lrfxrll.exe 5052 dvjjj.exe 4916 xxrflxr.exe 3436 dvjjj.exe 4860 tthbbb.exe 1844 5flxxxx.exe 1384 djpdd.exe 4488 frlffff.exe 1924 btbbtt.exe 4936 1rrrrrl.exe 1340 ntnhtt.exe 4252 xfllffx.exe 980 1djdv.exe 4900 bbtnhh.exe 636 ppdjv.exe 2964 jdpjj.exe 3568 rrfffff.exe 4564 tnttnt.exe 4072 3vddv.exe 1680 1lrrrrr.exe 5112 bhnbbn.exe 4708 ddvpp.exe 3824 fxrfrll.exe 4340 3hnhhh.exe 4960 pvddd.exe 2160 5rfxxff.exe 1608 thtnhn.exe 2120 ppvjd.exe 1052 9lxrlll.exe 3292 nhbttt.exe 1572 ppvvp.exe 1128 rflllfx.exe 3772 vpjvp.exe 1584 rxlfrrr.exe 4004 nnbnnn.exe 2168 pdvvj.exe 3456 pdvpp.exe 2924 thtnnt.exe 2920 rfxxxfr.exe 908 nthbbb.exe 3432 pjpjd.exe 3268 3vdvv.exe 5004 ffrlfff.exe 3352 9nbbhn.exe 1404 jvjdv.exe 4356 flxrrlf.exe 1240 9htttt.exe 1252 vpddv.exe 1520 xlxxrrr.exe -
Processes:
resource yara_rule behavioral2/memory/2856-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1564-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2096-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2096-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3780-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3780-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3292-27-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1748-32-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3032-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1584-50-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1016-97-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2376-95-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1552-89-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4796-86-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4000-79-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/60-74-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4584-60-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3772-57-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3436-113-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3436-119-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4860-124-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1924-141-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4936-150-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1340-156-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4252-165-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/980-166-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/980-171-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4900-175-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/636-182-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3568-190-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4564-196-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5112-206-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4708-210-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4340-214-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4960-218-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2160-225-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1608-229-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2120-231-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1052-237-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1572-241-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1572-245-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2168-258-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3456-265-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2920-270-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3432-279-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5004-286-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1404-294-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2868-317-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/664-338-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2304-342-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3100-353-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/372-366-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3824-378-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4340-383-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4960-387-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/588-394-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3808-406-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/892-413-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/892-417-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1444-427-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3068-437-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3628-442-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2896-500-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3208-525-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exeddddv.exerlxrxxl.exexlxxrrl.exepvdvv.exe5xfxrrl.exelrffxxr.exehbbbbb.exejdvpd.exevvvpj.exelxllfrl.exebnbttn.exejdppp.exexflffxx.exehbhtnn.exepppvv.exelrfxrll.exedvjjj.exexxrflxr.exedvjjj.exetthbbb.exe5flxxxx.exedescription pid process target process PID 2856 wrote to memory of 1564 2856 61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe ddddv.exe PID 2856 wrote to memory of 1564 2856 61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe ddddv.exe PID 2856 wrote to memory of 1564 2856 61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe ddddv.exe PID 1564 wrote to memory of 2096 1564 ddddv.exe rlxrxxl.exe PID 1564 wrote to memory of 2096 1564 ddddv.exe rlxrxxl.exe PID 1564 wrote to memory of 2096 1564 ddddv.exe rlxrxxl.exe PID 2096 wrote to memory of 3780 2096 rlxrxxl.exe xlxxrrl.exe PID 2096 wrote to memory of 3780 2096 rlxrxxl.exe xlxxrrl.exe PID 2096 wrote to memory of 3780 2096 rlxrxxl.exe xlxxrrl.exe PID 3780 wrote to memory of 3292 3780 xlxxrrl.exe pvdvv.exe PID 3780 wrote to memory of 3292 3780 xlxxrrl.exe pvdvv.exe PID 3780 wrote to memory of 3292 3780 xlxxrrl.exe pvdvv.exe PID 3292 wrote to memory of 1748 3292 pvdvv.exe 5xfxrrl.exe PID 3292 wrote to memory of 1748 3292 pvdvv.exe 5xfxrrl.exe PID 3292 wrote to memory of 1748 3292 pvdvv.exe 5xfxrrl.exe PID 1748 wrote to memory of 3032 1748 5xfxrrl.exe lrffxxr.exe PID 1748 wrote to memory of 3032 1748 5xfxrrl.exe lrffxxr.exe PID 1748 wrote to memory of 3032 1748 5xfxrrl.exe lrffxxr.exe PID 3032 wrote to memory of 1584 3032 lrffxxr.exe hbbbbb.exe PID 3032 wrote to memory of 1584 3032 lrffxxr.exe hbbbbb.exe PID 3032 wrote to memory of 1584 3032 lrffxxr.exe hbbbbb.exe PID 1584 wrote to memory of 3772 1584 hbbbbb.exe jdvpd.exe PID 1584 wrote to memory of 3772 1584 hbbbbb.exe jdvpd.exe PID 1584 wrote to memory of 3772 1584 hbbbbb.exe jdvpd.exe PID 3772 wrote to memory of 4584 3772 jdvpd.exe vvvpj.exe PID 3772 wrote to memory of 4584 3772 jdvpd.exe vvvpj.exe PID 3772 wrote to memory of 4584 3772 jdvpd.exe vvvpj.exe PID 4584 wrote to memory of 3688 4584 vvvpj.exe lxllfrl.exe PID 4584 wrote to memory of 3688 4584 vvvpj.exe lxllfrl.exe PID 4584 wrote to memory of 3688 4584 vvvpj.exe lxllfrl.exe PID 3688 wrote to memory of 60 3688 lxllfrl.exe bnbttn.exe PID 3688 wrote to memory of 60 3688 lxllfrl.exe bnbttn.exe PID 3688 wrote to memory of 60 3688 lxllfrl.exe bnbttn.exe PID 60 wrote to memory of 4000 60 bnbttn.exe jdppp.exe PID 60 wrote to memory of 4000 60 bnbttn.exe jdppp.exe PID 60 wrote to memory of 4000 60 bnbttn.exe jdppp.exe PID 4000 wrote to memory of 4796 4000 jdppp.exe xflffxx.exe PID 4000 wrote to memory of 4796 4000 jdppp.exe xflffxx.exe PID 4000 wrote to memory of 4796 4000 jdppp.exe xflffxx.exe PID 4796 wrote to memory of 1552 4796 xflffxx.exe hbhtnn.exe PID 4796 wrote to memory of 1552 4796 xflffxx.exe hbhtnn.exe PID 4796 wrote to memory of 1552 4796 xflffxx.exe hbhtnn.exe PID 1552 wrote to memory of 1016 1552 hbhtnn.exe pppvv.exe PID 1552 wrote to memory of 1016 1552 hbhtnn.exe pppvv.exe PID 1552 wrote to memory of 1016 1552 hbhtnn.exe pppvv.exe PID 1016 wrote to memory of 2376 1016 pppvv.exe lrfxrll.exe PID 1016 wrote to memory of 2376 1016 pppvv.exe lrfxrll.exe PID 1016 wrote to memory of 2376 1016 pppvv.exe lrfxrll.exe PID 2376 wrote to memory of 5052 2376 lrfxrll.exe dvjjj.exe PID 2376 wrote to memory of 5052 2376 lrfxrll.exe dvjjj.exe PID 2376 wrote to memory of 5052 2376 lrfxrll.exe dvjjj.exe PID 5052 wrote to memory of 4916 5052 dvjjj.exe xxrflxr.exe PID 5052 wrote to memory of 4916 5052 dvjjj.exe xxrflxr.exe PID 5052 wrote to memory of 4916 5052 dvjjj.exe xxrflxr.exe PID 4916 wrote to memory of 3436 4916 xxrflxr.exe dvjjj.exe PID 4916 wrote to memory of 3436 4916 xxrflxr.exe dvjjj.exe PID 4916 wrote to memory of 3436 4916 xxrflxr.exe dvjjj.exe PID 3436 wrote to memory of 4860 3436 dvjjj.exe tthbbb.exe PID 3436 wrote to memory of 4860 3436 dvjjj.exe tthbbb.exe PID 3436 wrote to memory of 4860 3436 dvjjj.exe tthbbb.exe PID 4860 wrote to memory of 1844 4860 tthbbb.exe 5flxxxx.exe PID 4860 wrote to memory of 1844 4860 tthbbb.exe 5flxxxx.exe PID 4860 wrote to memory of 1844 4860 tthbbb.exe 5flxxxx.exe PID 1844 wrote to memory of 1384 1844 5flxxxx.exe djpdd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\61391507ef42fee71c6d0b7e336bf22a_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\ddddv.exec:\ddddv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
\??\c:\rlxrxxl.exec:\rlxrxxl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\xlxxrrl.exec:\xlxxrrl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
\??\c:\pvdvv.exec:\pvdvv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3292 -
\??\c:\5xfxrrl.exec:\5xfxrrl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
\??\c:\lrffxxr.exec:\lrffxxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\hbbbbb.exec:\hbbbbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\jdvpd.exec:\jdvpd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
\??\c:\vvvpj.exec:\vvvpj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
\??\c:\lxllfrl.exec:\lxllfrl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
\??\c:\bnbttn.exec:\bnbttn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
\??\c:\jdppp.exec:\jdppp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\xflffxx.exec:\xflffxx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\hbhtnn.exec:\hbhtnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1552 -
\??\c:\pppvv.exec:\pppvv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
\??\c:\lrfxrll.exec:\lrfxrll.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\dvjjj.exec:\dvjjj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
\??\c:\xxrflxr.exec:\xxrflxr.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
\??\c:\dvjjj.exec:\dvjjj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3436 -
\??\c:\tthbbb.exec:\tthbbb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
\??\c:\5flxxxx.exec:\5flxxxx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
\??\c:\djpdd.exec:\djpdd.exe23⤵
- Executes dropped EXE
PID:1384 -
\??\c:\frlffff.exec:\frlffff.exe24⤵
- Executes dropped EXE
PID:4488 -
\??\c:\btbbtt.exec:\btbbtt.exe25⤵
- Executes dropped EXE
PID:1924 -
\??\c:\1rrrrrl.exec:\1rrrrrl.exe26⤵
- Executes dropped EXE
PID:4936 -
\??\c:\ntnhtt.exec:\ntnhtt.exe27⤵
- Executes dropped EXE
PID:1340 -
\??\c:\xfllffx.exec:\xfllffx.exe28⤵
- Executes dropped EXE
PID:4252 -
\??\c:\1djdv.exec:\1djdv.exe29⤵
- Executes dropped EXE
PID:980 -
\??\c:\bbtnhh.exec:\bbtnhh.exe30⤵
- Executes dropped EXE
PID:4900 -
\??\c:\ppdjv.exec:\ppdjv.exe31⤵
- Executes dropped EXE
PID:636 -
\??\c:\jdpjj.exec:\jdpjj.exe32⤵
- Executes dropped EXE
PID:2964 -
\??\c:\rrfffff.exec:\rrfffff.exe33⤵
- Executes dropped EXE
PID:3568 -
\??\c:\tnttnt.exec:\tnttnt.exe34⤵
- Executes dropped EXE
PID:4564 -
\??\c:\3vddv.exec:\3vddv.exe35⤵
- Executes dropped EXE
PID:4072 -
\??\c:\1lrrrrr.exec:\1lrrrrr.exe36⤵
- Executes dropped EXE
PID:1680 -
\??\c:\bhnbbn.exec:\bhnbbn.exe37⤵
- Executes dropped EXE
PID:5112 -
\??\c:\ddvpp.exec:\ddvpp.exe38⤵
- Executes dropped EXE
PID:4708 -
\??\c:\fxrfrll.exec:\fxrfrll.exe39⤵
- Executes dropped EXE
PID:3824 -
\??\c:\3hnhhh.exec:\3hnhhh.exe40⤵
- Executes dropped EXE
PID:4340 -
\??\c:\pvddd.exec:\pvddd.exe41⤵
- Executes dropped EXE
PID:4960 -
\??\c:\5rfxxff.exec:\5rfxxff.exe42⤵
- Executes dropped EXE
PID:2160 -
\??\c:\thtnhn.exec:\thtnhn.exe43⤵
- Executes dropped EXE
PID:1608 -
\??\c:\ppvjd.exec:\ppvjd.exe44⤵
- Executes dropped EXE
PID:2120 -
\??\c:\9lxrlll.exec:\9lxrlll.exe45⤵
- Executes dropped EXE
PID:1052 -
\??\c:\nhbttt.exec:\nhbttt.exe46⤵
- Executes dropped EXE
PID:3292 -
\??\c:\ppvvp.exec:\ppvvp.exe47⤵
- Executes dropped EXE
PID:1572 -
\??\c:\rflllfx.exec:\rflllfx.exe48⤵
- Executes dropped EXE
PID:1128 -
\??\c:\vpjvp.exec:\vpjvp.exe49⤵
- Executes dropped EXE
PID:3772 -
\??\c:\rxlfrrr.exec:\rxlfrrr.exe50⤵
- Executes dropped EXE
PID:1584 -
\??\c:\nnbnnn.exec:\nnbnnn.exe51⤵
- Executes dropped EXE
PID:4004 -
\??\c:\pdvvj.exec:\pdvvj.exe52⤵
- Executes dropped EXE
PID:2168 -
\??\c:\pdvpp.exec:\pdvpp.exe53⤵
- Executes dropped EXE
PID:3456 -
\??\c:\thtnnt.exec:\thtnnt.exe54⤵
- Executes dropped EXE
PID:2924 -
\??\c:\rfxxxfr.exec:\rfxxxfr.exe55⤵
- Executes dropped EXE
PID:2920 -
\??\c:\nthbbb.exec:\nthbbb.exe56⤵
- Executes dropped EXE
PID:908 -
\??\c:\pjpjd.exec:\pjpjd.exe57⤵
- Executes dropped EXE
PID:3432 -
\??\c:\3vdvv.exec:\3vdvv.exe58⤵
- Executes dropped EXE
PID:3268 -
\??\c:\ffrlfff.exec:\ffrlfff.exe59⤵
- Executes dropped EXE
PID:5004 -
\??\c:\9nbbhn.exec:\9nbbhn.exe60⤵
- Executes dropped EXE
PID:3352 -
\??\c:\jvjdv.exec:\jvjdv.exe61⤵
- Executes dropped EXE
PID:1404 -
\??\c:\flxrrlf.exec:\flxrrlf.exe62⤵
- Executes dropped EXE
PID:4356 -
\??\c:\9htttt.exec:\9htttt.exe63⤵
- Executes dropped EXE
PID:1240 -
\??\c:\vpddv.exec:\vpddv.exe64⤵
- Executes dropped EXE
PID:1252 -
\??\c:\xlxxrrr.exec:\xlxxrrr.exe65⤵
- Executes dropped EXE
PID:1520 -
\??\c:\pvdvp.exec:\pvdvp.exe66⤵PID:4476
-
\??\c:\rffxlfx.exec:\rffxlfx.exe67⤵PID:3020
-
\??\c:\htbbbb.exec:\htbbbb.exe68⤵PID:4880
-
\??\c:\ppvpj.exec:\ppvpj.exe69⤵PID:2868
-
\??\c:\ffrrllr.exec:\ffrrllr.exe70⤵PID:4932
-
\??\c:\xlxrrll.exec:\xlxrrll.exe71⤵PID:4488
-
\??\c:\9bbttt.exec:\9bbttt.exe72⤵PID:4468
-
\??\c:\vdjpp.exec:\vdjpp.exe73⤵PID:1168
-
\??\c:\jddjd.exec:\jddjd.exe74⤵PID:1624
-
\??\c:\lffxlrl.exec:\lffxlrl.exe75⤵PID:664
-
\??\c:\ffllflf.exec:\ffllflf.exe76⤵PID:2304
-
\??\c:\nhhnbb.exec:\nhhnbb.exe77⤵PID:768
-
\??\c:\jjpjd.exec:\jjpjd.exe78⤵PID:4876
-
\??\c:\lxlfrxx.exec:\lxlfrxx.exe79⤵PID:1256
-
\??\c:\hbhbnn.exec:\hbhbnn.exe80⤵PID:3100
-
\??\c:\1hhbbb.exec:\1hhbbb.exe81⤵PID:3556
-
\??\c:\jpjdp.exec:\jpjdp.exe82⤵PID:4888
-
\??\c:\vvdjj.exec:\vvdjj.exe83⤵PID:448
-
\??\c:\lrfxrrl.exec:\lrfxrrl.exe84⤵PID:372
-
\??\c:\xrxxrrr.exec:\xrxxrrr.exe85⤵PID:216
-
\??\c:\bnttth.exec:\bnttth.exe86⤵PID:1484
-
\??\c:\thtttt.exec:\thtttt.exe87⤵PID:4316
-
\??\c:\vjddv.exec:\vjddv.exe88⤵PID:3824
-
\??\c:\llxxffr.exec:\llxxffr.exe89⤵PID:4340
-
\??\c:\rrxxxxr.exec:\rrxxxxr.exe90⤵PID:4960
-
\??\c:\nhttnn.exec:\nhttnn.exe91⤵PID:2160
-
\??\c:\ddjdd.exec:\ddjdd.exe92⤵PID:588
-
\??\c:\pdjjp.exec:\pdjjp.exe93⤵PID:996
-
\??\c:\lrlxxxf.exec:\lrlxxxf.exe94⤵PID:2128
-
\??\c:\hntnnt.exec:\hntnnt.exe95⤵PID:3808
-
\??\c:\9bhhhn.exec:\9bhhhn.exe96⤵PID:3032
-
\??\c:\7ppjj.exec:\7ppjj.exe97⤵PID:2180
-
\??\c:\jjpjv.exec:\jjpjv.exe98⤵PID:892
-
\??\c:\frxrlfx.exec:\frxrlfx.exe99⤵PID:3256
-
\??\c:\nnbhhh.exec:\nnbhhh.exe100⤵PID:60
-
\??\c:\vpjjj.exec:\vpjjj.exe101⤵PID:1444
-
\??\c:\rxllllx.exec:\rxllllx.exe102⤵PID:560
-
\??\c:\thttbb.exec:\thttbb.exe103⤵PID:2924
-
\??\c:\tttttt.exec:\tttttt.exe104⤵PID:3068
-
\??\c:\jjjvd.exec:\jjjvd.exe105⤵PID:4420
-
\??\c:\ffrrfff.exec:\ffrrfff.exe106⤵PID:3628
-
\??\c:\bthbtb.exec:\bthbtb.exe107⤵PID:4276
-
\??\c:\djdpp.exec:\djdpp.exe108⤵PID:3996
-
\??\c:\9pppd.exec:\9pppd.exe109⤵PID:4916
-
\??\c:\3lxrlrl.exec:\3lxrlrl.exe110⤵PID:4984
-
\??\c:\rlrrlrx.exec:\rlrrlrx.exe111⤵PID:4256
-
\??\c:\3httnt.exec:\3httnt.exe112⤵PID:3788
-
\??\c:\thnnhh.exec:\thnnhh.exe113⤵PID:4288
-
\??\c:\vpvpj.exec:\vpvpj.exe114⤵PID:4416
-
\??\c:\5xllllr.exec:\5xllllr.exe115⤵PID:4932
-
\??\c:\fxffrrx.exec:\fxffrrx.exe116⤵PID:2884
-
\??\c:\hbhnhh.exec:\hbhnhh.exe117⤵PID:4468
-
\??\c:\vdppd.exec:\vdppd.exe118⤵PID:2572
-
\??\c:\xxllrxf.exec:\xxllrxf.exe119⤵PID:1496
-
\??\c:\rlflfrx.exec:\rlflfrx.exe120⤵PID:3740
-
\??\c:\9nthbb.exec:\9nthbb.exe121⤵PID:4900
-
\??\c:\djddj.exec:\djddj.exe122⤵PID:3928
-
\??\c:\lfxxxxx.exec:\lfxxxxx.exe123⤵PID:2800
-
\??\c:\ffffxfx.exec:\ffffxfx.exe124⤵PID:1256
-
\??\c:\7hnhhh.exec:\7hnhhh.exe125⤵PID:2896
-
\??\c:\vjddd.exec:\vjddd.exe126⤵PID:2952
-
\??\c:\3rffffx.exec:\3rffffx.exe127⤵PID:4072
-
\??\c:\xxllflf.exec:\xxllflf.exe128⤵PID:2256
-
\??\c:\jvpjj.exec:\jvpjj.exe129⤵PID:2472
-
\??\c:\vjvvd.exec:\vjvvd.exe130⤵PID:2028
-
\??\c:\lxlxllx.exec:\lxlxllx.exe131⤵PID:4708
-
\??\c:\9hbtnn.exec:\9hbtnn.exe132⤵PID:3208
-
\??\c:\9bhbtn.exec:\9bhbtn.exe133⤵PID:4940
-
\??\c:\vdpjj.exec:\vdpjj.exe134⤵PID:4528
-
\??\c:\lrxrllf.exec:\lrxrllf.exe135⤵PID:1608
-
\??\c:\bbtnhn.exec:\bbtnhn.exe136⤵PID:1184
-
\??\c:\jvvpp.exec:\jvvpp.exe137⤵PID:1640
-
\??\c:\xlrlxfx.exec:\xlrlxfx.exe138⤵PID:2324
-
\??\c:\ntbbbh.exec:\ntbbbh.exe139⤵PID:3292
-
\??\c:\htthhn.exec:\htthhn.exe140⤵PID:3160
-
\??\c:\pdpvj.exec:\pdpvj.exe141⤵PID:4868
-
\??\c:\3lfxxxr.exec:\3lfxxxr.exe142⤵PID:2180
-
\??\c:\hbtnhb.exec:\hbtnhb.exe143⤵PID:3688
-
\??\c:\pdppj.exec:\pdppj.exe144⤵PID:4000
-
\??\c:\ddvpv.exec:\ddvpv.exe145⤵PID:3868
-
\??\c:\xxffrxx.exec:\xxffrxx.exe146⤵PID:1444
-
\??\c:\5htbbt.exec:\5htbbt.exe147⤵PID:2652
-
\??\c:\hbbhtt.exec:\hbbhtt.exe148⤵PID:3752
-
\??\c:\pdddd.exec:\pdddd.exe149⤵PID:3636
-
\??\c:\xxrrlxx.exec:\xxrrlxx.exe150⤵PID:4420
-
\??\c:\lfffffl.exec:\lfffffl.exe151⤵PID:2376
-
\??\c:\hthbbh.exec:\hthbbh.exe152⤵PID:4276
-
\??\c:\ppvpj.exec:\ppvpj.exe153⤵PID:2328
-
\??\c:\jjppp.exec:\jjppp.exe154⤵PID:4916
-
\??\c:\rxfxlfl.exec:\rxfxlfl.exe155⤵PID:4984
-
\??\c:\ttbbnn.exec:\ttbbnn.exe156⤵PID:4256
-
\??\c:\dvddv.exec:\dvddv.exe157⤵PID:4364
-
\??\c:\1pdvp.exec:\1pdvp.exe158⤵PID:4452
-
\??\c:\xxxrlrl.exec:\xxxrlrl.exe159⤵PID:1160
-
\??\c:\hbbbth.exec:\hbbbth.exe160⤵PID:3508
-
\??\c:\hbnhnb.exec:\hbnhnb.exe161⤵PID:2036
-
\??\c:\ddjdp.exec:\ddjdp.exe162⤵PID:2572
-
\??\c:\thtnhb.exec:\thtnhb.exe163⤵PID:3548
-
\??\c:\nhhbtt.exec:\nhhbtt.exe164⤵PID:3416
-
\??\c:\ppvpj.exec:\ppvpj.exe165⤵PID:2840
-
\??\c:\xlfxrlx.exec:\xlfxrlx.exe166⤵PID:636
-
\??\c:\fxxrrrl.exec:\fxxrrrl.exe167⤵PID:2964
-
\??\c:\nnbbbb.exec:\nnbbbb.exe168⤵PID:2956
-
\??\c:\vvvvp.exec:\vvvvp.exe169⤵PID:5088
-
\??\c:\7lrrxll.exec:\7lrrxll.exe170⤵PID:3320
-
\??\c:\lrxxxxx.exec:\lrxxxxx.exe171⤵PID:1680
-
\??\c:\9hnhbh.exec:\9hnhbh.exe172⤵PID:5112
-
\??\c:\hhtnnn.exec:\hhtnnn.exe173⤵PID:216
-
\??\c:\dvjjd.exec:\dvjjd.exe174⤵PID:3060
-
\??\c:\fxfxrrl.exec:\fxfxrrl.exe175⤵PID:4316
-
\??\c:\xrxxxfx.exec:\xrxxxfx.exe176⤵PID:4340
-
\??\c:\hhhntt.exec:\hhhntt.exe177⤵PID:3824
-
\??\c:\pdjpd.exec:\pdjpd.exe178⤵PID:4528
-
\??\c:\pjdvd.exec:\pjdvd.exe179⤵PID:2120
-
\??\c:\9fxrlff.exec:\9fxrlff.exe180⤵PID:4976
-
\??\c:\tttntt.exec:\tttntt.exe181⤵PID:1880
-
\??\c:\tbhbbb.exec:\tbhbbb.exe182⤵PID:2128
-
\??\c:\jjvpd.exec:\jjvpd.exe183⤵PID:856
-
\??\c:\5rxrlxr.exec:\5rxrlxr.exe184⤵PID:1128
-
\??\c:\frffffl.exec:\frffffl.exe185⤵PID:2720
-
\??\c:\bbhbbb.exec:\bbhbbb.exe186⤵PID:1584
-
\??\c:\pjdvv.exec:\pjdvv.exe187⤵PID:4160
-
\??\c:\xfxxffr.exec:\xfxxffr.exe188⤵PID:3424
-
\??\c:\nnbhbh.exec:\nnbhbh.exe189⤵PID:4028
-
\??\c:\vdpvp.exec:\vdpvp.exe190⤵PID:1444
-
\??\c:\3pppj.exec:\3pppj.exe191⤵PID:3432
-
\??\c:\rrflfrr.exec:\rrflfrr.exe192⤵PID:3752
-
\??\c:\3ttthn.exec:\3ttthn.exe193⤵PID:816
-
\??\c:\hntbht.exec:\hntbht.exe194⤵PID:2084
-
\??\c:\dvvvv.exec:\dvvvv.exe195⤵PID:3288
-
\??\c:\7xfffll.exec:\7xfffll.exe196⤵PID:4948
-
\??\c:\9rfxlfr.exec:\9rfxlfr.exe197⤵PID:4484
-
\??\c:\ttbhbt.exec:\ttbhbt.exe198⤵PID:4936
-
\??\c:\pvjjj.exec:\pvjjj.exe199⤵PID:1720
-
\??\c:\xrlfxxx.exec:\xrlfxxx.exe200⤵PID:4880
-
\??\c:\btbbbb.exec:\btbbbb.exe201⤵PID:872
-
\??\c:\tbbbbb.exec:\tbbbbb.exe202⤵PID:2980
-
\??\c:\vpddj.exec:\vpddj.exe203⤵PID:3348
-
\??\c:\5rrlxff.exec:\5rrlxff.exe204⤵PID:4128
-
\??\c:\hnbbtt.exec:\hnbbtt.exe205⤵PID:2656
-
\??\c:\dvpvj.exec:\dvpvj.exe206⤵PID:3052
-
\??\c:\dpdvv.exec:\dpdvv.exe207⤵PID:1040
-
\??\c:\ffllxff.exec:\ffllxff.exe208⤵PID:3908
-
\??\c:\hhnnhh.exec:\hhnnhh.exe209⤵PID:4876
-
\??\c:\hhbbbb.exec:\hhbbbb.exe210⤵PID:4264
-
\??\c:\djpjd.exec:\djpjd.exe211⤵PID:1576
-
\??\c:\fxlfffx.exec:\fxlfffx.exe212⤵PID:4236
-
\??\c:\tthbhh.exec:\tthbhh.exe213⤵PID:3568
-
\??\c:\jdjjd.exec:\jdjjd.exe214⤵PID:2744
-
\??\c:\7vvpd.exec:\7vvpd.exe215⤵PID:2252
-
\??\c:\lfxrlll.exec:\lfxrlll.exe216⤵PID:5044
-
\??\c:\nbnnhh.exec:\nbnnhh.exe217⤵PID:4680
-
\??\c:\vvddv.exec:\vvddv.exe218⤵PID:1484
-
\??\c:\1ddvp.exec:\1ddvp.exe219⤵PID:3244
-
\??\c:\ffrlllf.exec:\ffrlllf.exe220⤵PID:1564
-
\??\c:\hhnbth.exec:\hhnbth.exe221⤵PID:2788
-
\??\c:\djdjj.exec:\djdjj.exe222⤵PID:3536
-
\??\c:\7pppd.exec:\7pppd.exe223⤵PID:2116
-
\??\c:\lfrlfff.exec:\lfrlfff.exe224⤵PID:1184
-
\??\c:\bhhhbt.exec:\bhhhbt.exe225⤵PID:2892
-
\??\c:\vjddv.exec:\vjddv.exe226⤵PID:4652
-
\??\c:\ddppj.exec:\ddppj.exe227⤵PID:1736
-
\??\c:\xxrlfxf.exec:\xxrlfxf.exe228⤵PID:856
-
\??\c:\1ttnhb.exec:\1ttnhb.exe229⤵PID:3736
-
\??\c:\1jjjv.exec:\1jjjv.exe230⤵PID:892
-
\??\c:\ddvpj.exec:\ddvpj.exe231⤵PID:4980
-
\??\c:\rxffxxx.exec:\rxffxxx.exe232⤵PID:4812
-
\??\c:\thhbbt.exec:\thhbbt.exe233⤵PID:3920
-
\??\c:\vvvpj.exec:\vvvpj.exe234⤵PID:5116
-
\??\c:\vpdvp.exec:\vpdvp.exe235⤵PID:4796
-
\??\c:\5rrfrff.exec:\5rrfrff.exe236⤵PID:5080
-
\??\c:\nnnbht.exec:\nnnbht.exe237⤵PID:3664
-
\??\c:\3pppj.exec:\3pppj.exe238⤵PID:2612
-
\??\c:\dvppv.exec:\dvppv.exe239⤵PID:3964
-
\??\c:\lflfxff.exec:\lflfxff.exe240⤵PID:5004
-
\??\c:\htbbtt.exec:\htbbtt.exe241⤵PID:4052
-
\??\c:\dvddj.exec:\dvddj.exe242⤵PID:1404