Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 03:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5cf59e9e2a3ad9d19f4e6725813c15a4_JaffaCakes118.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
5cf59e9e2a3ad9d19f4e6725813c15a4_JaffaCakes118.exe
-
Size
215KB
-
MD5
5cf59e9e2a3ad9d19f4e6725813c15a4
-
SHA1
510b0a1bbc76471c24e4db7da4a823c8eb29ab39
-
SHA256
73959f3da99bac493c1d13f516881deb9ed39afcaea18379b51760a4033103c3
-
SHA512
eb2c6983f3028760324c30242f805fb65d99a25f12be09efda2718761e87443eedab5bb51ca004bba89b289b9d805151d57ae740f88bc90da4dfb732c7dd3875
-
SSDEEP
1536:evQBeOGtrYSSsrc93UBIfdC67m6AJiqzgLrTKBk3IU39TeYmKl:ehOm2sI93UufdC67ciRLPvx3teYmw
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/3652-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3964-13-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3124-14-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2948-20-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1884-30-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4940-45-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1712-86-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3936-126-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2412-153-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/552-159-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/764-169-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/396-171-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3692-191-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3716-198-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3652-205-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2592-215-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4948-219-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3684-227-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/552-164-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/852-130-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2448-230-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1588-115-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4464-107-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/960-234-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2656-99-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4532-97-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1476-75-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3216-69-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4228-63-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4460-62-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2148-54-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3000-39-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3004-32-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1480-247-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4928-264-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2188-269-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4920-279-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5032-292-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4800-298-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/884-305-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2436-328-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4584-332-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2424-339-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2696-352-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4568-356-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3612-367-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4068-380-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4940-400-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4908-413-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4464-446-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4736-453-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3404-561-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4920-600-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1300-617-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4264-645-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1428-673-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1228-680-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4724-691-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2028-750-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/944-829-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3112-872-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/740-876-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1136-1095-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4368-1383-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
1lllffx.exethbhnb.exexxlfrrx.exelxlflff.exe9nttnb.exe1tbnnn.exeppvpp.exejdpjj.exelxlrlfl.exebhnhhh.exepppvj.exevddvd.exerllfffx.exe5htnhn.exenhbhbn.exepjjdd.exexlxfrxx.exenthbtb.exe5tnhbb.exe3vpjd.exefxrrlfl.exe1fxxxxx.exehbbbht.exevpjdv.exexlxrlxr.exe3fllfll.exepdjdj.exeppvvd.exefxrxlfr.exehbhbnb.exejjjdj.exerlrfrrr.exenbbtbt.exejddvj.exexfxlxff.exelfffxxr.exetnhnht.exevvpvp.exelxfxfxr.exennthtn.exejdvpd.exexffxxlf.exe1xfflrx.exenbnnbt.exepdjvv.exefrrfrlx.exebhbbtb.exe5tttnh.exedddvp.exe5ffxxlf.exehntnbt.exedddpv.exe7pvpv.exelrxfrrr.exebtbtnn.exe7dddv.exefxxrlfx.exenttbhh.exebbhbbt.exe7vdvv.exexrrlflf.exehbbtnn.exentbttt.exepppjv.exepid process 3964 1lllffx.exe 3124 thbhnb.exe 2948 xxlfrrx.exe 1884 lxlflff.exe 3004 9nttnb.exe 3000 1tbnnn.exe 4940 ppvpp.exe 2148 jdpjj.exe 4460 lxlrlfl.exe 4228 bhnhhh.exe 3216 pppvj.exe 1476 vddvd.exe 4468 rllfffx.exe 1712 5htnhn.exe 4532 nhbhbn.exe 2656 pjjdd.exe 4464 xlxfrxx.exe 464 nthbtb.exe 1588 5tnhbb.exe 3936 3vpjd.exe 852 fxrrlfl.exe 884 1fxxxxx.exe 4188 hbbbht.exe 2288 vpjdv.exe 2872 xlxrlxr.exe 2412 3fllfll.exe 552 pdjdj.exe 764 ppvvd.exe 396 fxrxlfr.exe 3232 hbhbnb.exe 2992 jjjdj.exe 3692 rlrfrrr.exe 4548 nbbtbt.exe 3716 jddvj.exe 1428 xfxlxff.exe 1228 lfffxxr.exe 3652 tnhnht.exe 3964 vvpvp.exe 2592 lxfxfxr.exe 4948 nnthtn.exe 1132 jdvpd.exe 3684 xffxxlf.exe 2448 1xfflrx.exe 960 nbnnbt.exe 1136 pdjvv.exe 5004 frrfrlx.exe 3328 bhbbtb.exe 1480 5tttnh.exe 768 dddvp.exe 2120 5ffxxlf.exe 424 hntnbt.exe 3784 dddpv.exe 4928 7pvpv.exe 4592 lrxfrrr.exe 2188 btbtnn.exe 3408 7dddv.exe 4392 fxxrlfx.exe 4920 nttbhh.exe 1724 bbhbbt.exe 3496 7vdvv.exe 3892 xrrlflf.exe 5032 hbbtnn.exe 4800 ntbttt.exe 4516 pppjv.exe -
Processes:
resource yara_rule behavioral2/memory/3652-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3652-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3964-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3964-13-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3124-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2948-20-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1884-30-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-45-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1712-86-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/464-109-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3936-126-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2412-153-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/552-159-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/764-169-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/396-171-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3232-177-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3692-191-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3716-198-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3652-205-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2592-215-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1132-220-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4948-219-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3684-227-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/552-164-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/852-130-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2448-230-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1588-115-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4464-107-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/960-234-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2656-99-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4532-97-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1476-75-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3216-69-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4228-63-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4460-62-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2148-54-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2148-50-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3000-39-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3004-32-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1480-247-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3784-257-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4928-264-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2188-269-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4920-279-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5032-292-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4800-298-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/884-305-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2872-319-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2436-328-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4584-332-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2424-339-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2696-352-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4568-356-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3644-361-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3612-367-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4068-380-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1964-390-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4940-400-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4908-413-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2120-420-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1160-424-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/372-437-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4464-442-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4464-446-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5cf59e9e2a3ad9d19f4e6725813c15a4_JaffaCakes118.exe1lllffx.exethbhnb.exexxlfrrx.exelxlflff.exe9nttnb.exe1tbnnn.exeppvpp.exejdpjj.exelxlrlfl.exebhnhhh.exepppvj.exevddvd.exerllfffx.exe5htnhn.exenhbhbn.exepjjdd.exexlxfrxx.exenthbtb.exe5tnhbb.exe3vpjd.exefxrrlfl.exedescription pid process target process PID 3652 wrote to memory of 3964 3652 5cf59e9e2a3ad9d19f4e6725813c15a4_JaffaCakes118.exe 1lllffx.exe PID 3652 wrote to memory of 3964 3652 5cf59e9e2a3ad9d19f4e6725813c15a4_JaffaCakes118.exe 1lllffx.exe PID 3652 wrote to memory of 3964 3652 5cf59e9e2a3ad9d19f4e6725813c15a4_JaffaCakes118.exe 1lllffx.exe PID 3964 wrote to memory of 3124 3964 1lllffx.exe thbhnb.exe PID 3964 wrote to memory of 3124 3964 1lllffx.exe thbhnb.exe PID 3964 wrote to memory of 3124 3964 1lllffx.exe thbhnb.exe PID 3124 wrote to memory of 2948 3124 thbhnb.exe xxlfrrx.exe PID 3124 wrote to memory of 2948 3124 thbhnb.exe xxlfrrx.exe PID 3124 wrote to memory of 2948 3124 thbhnb.exe xxlfrrx.exe PID 2948 wrote to memory of 1884 2948 xxlfrrx.exe lxlflff.exe PID 2948 wrote to memory of 1884 2948 xxlfrrx.exe lxlflff.exe PID 2948 wrote to memory of 1884 2948 xxlfrrx.exe lxlflff.exe PID 1884 wrote to memory of 3004 1884 lxlflff.exe 9nttnb.exe PID 1884 wrote to memory of 3004 1884 lxlflff.exe 9nttnb.exe PID 1884 wrote to memory of 3004 1884 lxlflff.exe 9nttnb.exe PID 3004 wrote to memory of 3000 3004 9nttnb.exe 1tbnnn.exe PID 3004 wrote to memory of 3000 3004 9nttnb.exe 1tbnnn.exe PID 3004 wrote to memory of 3000 3004 9nttnb.exe 1tbnnn.exe PID 3000 wrote to memory of 4940 3000 1tbnnn.exe ppvpp.exe PID 3000 wrote to memory of 4940 3000 1tbnnn.exe ppvpp.exe PID 3000 wrote to memory of 4940 3000 1tbnnn.exe ppvpp.exe PID 4940 wrote to memory of 2148 4940 ppvpp.exe jdpjj.exe PID 4940 wrote to memory of 2148 4940 ppvpp.exe jdpjj.exe PID 4940 wrote to memory of 2148 4940 ppvpp.exe jdpjj.exe PID 2148 wrote to memory of 4460 2148 jdpjj.exe lxlrlfl.exe PID 2148 wrote to memory of 4460 2148 jdpjj.exe lxlrlfl.exe PID 2148 wrote to memory of 4460 2148 jdpjj.exe lxlrlfl.exe PID 4460 wrote to memory of 4228 4460 lxlrlfl.exe bhnhhh.exe PID 4460 wrote to memory of 4228 4460 lxlrlfl.exe bhnhhh.exe PID 4460 wrote to memory of 4228 4460 lxlrlfl.exe bhnhhh.exe PID 4228 wrote to memory of 3216 4228 bhnhhh.exe pppvj.exe PID 4228 wrote to memory of 3216 4228 bhnhhh.exe pppvj.exe PID 4228 wrote to memory of 3216 4228 bhnhhh.exe pppvj.exe PID 3216 wrote to memory of 1476 3216 pppvj.exe vddvd.exe PID 3216 wrote to memory of 1476 3216 pppvj.exe vddvd.exe PID 3216 wrote to memory of 1476 3216 pppvj.exe vddvd.exe PID 1476 wrote to memory of 4468 1476 vddvd.exe rllfffx.exe PID 1476 wrote to memory of 4468 1476 vddvd.exe rllfffx.exe PID 1476 wrote to memory of 4468 1476 vddvd.exe rllfffx.exe PID 4468 wrote to memory of 1712 4468 rllfffx.exe 5htnhn.exe PID 4468 wrote to memory of 1712 4468 rllfffx.exe 5htnhn.exe PID 4468 wrote to memory of 1712 4468 rllfffx.exe 5htnhn.exe PID 1712 wrote to memory of 4532 1712 5htnhn.exe nhbhbn.exe PID 1712 wrote to memory of 4532 1712 5htnhn.exe nhbhbn.exe PID 1712 wrote to memory of 4532 1712 5htnhn.exe nhbhbn.exe PID 4532 wrote to memory of 2656 4532 nhbhbn.exe pjjdd.exe PID 4532 wrote to memory of 2656 4532 nhbhbn.exe pjjdd.exe PID 4532 wrote to memory of 2656 4532 nhbhbn.exe pjjdd.exe PID 2656 wrote to memory of 4464 2656 pjjdd.exe xlxfrxx.exe PID 2656 wrote to memory of 4464 2656 pjjdd.exe xlxfrxx.exe PID 2656 wrote to memory of 4464 2656 pjjdd.exe xlxfrxx.exe PID 4464 wrote to memory of 464 4464 xlxfrxx.exe nthbtb.exe PID 4464 wrote to memory of 464 4464 xlxfrxx.exe nthbtb.exe PID 4464 wrote to memory of 464 4464 xlxfrxx.exe nthbtb.exe PID 464 wrote to memory of 1588 464 nthbtb.exe 5tnhbb.exe PID 464 wrote to memory of 1588 464 nthbtb.exe 5tnhbb.exe PID 464 wrote to memory of 1588 464 nthbtb.exe 5tnhbb.exe PID 1588 wrote to memory of 3936 1588 5tnhbb.exe 3vpjd.exe PID 1588 wrote to memory of 3936 1588 5tnhbb.exe 3vpjd.exe PID 1588 wrote to memory of 3936 1588 5tnhbb.exe 3vpjd.exe PID 3936 wrote to memory of 852 3936 3vpjd.exe fxrrlfl.exe PID 3936 wrote to memory of 852 3936 3vpjd.exe fxrrlfl.exe PID 3936 wrote to memory of 852 3936 3vpjd.exe fxrrlfl.exe PID 852 wrote to memory of 884 852 fxrrlfl.exe tntnht.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cf59e9e2a3ad9d19f4e6725813c15a4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5cf59e9e2a3ad9d19f4e6725813c15a4_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
\??\c:\1lllffx.exec:\1lllffx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\thbhnb.exec:\thbhnb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
\??\c:\xxlfrrx.exec:\xxlfrrx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\lxlflff.exec:\lxlflff.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
\??\c:\9nttnb.exec:\9nttnb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
\??\c:\1tbnnn.exec:\1tbnnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\ppvpp.exec:\ppvpp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
\??\c:\jdpjj.exec:\jdpjj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\lxlrlfl.exec:\lxlrlfl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
\??\c:\bhnhhh.exec:\bhnhhh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
\??\c:\pppvj.exec:\pppvj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
\??\c:\vddvd.exec:\vddvd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
\??\c:\rllfffx.exec:\rllfffx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
\??\c:\5htnhn.exec:\5htnhn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
\??\c:\nhbhbn.exec:\nhbhbn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
\??\c:\pjjdd.exec:\pjjdd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\xlxfrxx.exec:\xlxfrxx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
\??\c:\nthbtb.exec:\nthbtb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
\??\c:\5tnhbb.exec:\5tnhbb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\3vpjd.exec:\3vpjd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
\??\c:\fxrrlfl.exec:\fxrrlfl.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
\??\c:\1fxxxxx.exec:\1fxxxxx.exe23⤵
- Executes dropped EXE
PID:884 -
\??\c:\hbbbht.exec:\hbbbht.exe24⤵
- Executes dropped EXE
PID:4188 -
\??\c:\vpjdv.exec:\vpjdv.exe25⤵
- Executes dropped EXE
PID:2288 -
\??\c:\xlxrlxr.exec:\xlxrlxr.exe26⤵
- Executes dropped EXE
PID:2872 -
\??\c:\3fllfll.exec:\3fllfll.exe27⤵
- Executes dropped EXE
PID:2412 -
\??\c:\pdjdj.exec:\pdjdj.exe28⤵
- Executes dropped EXE
PID:552 -
\??\c:\ppvvd.exec:\ppvvd.exe29⤵
- Executes dropped EXE
PID:764 -
\??\c:\fxrxlfr.exec:\fxrxlfr.exe30⤵
- Executes dropped EXE
PID:396 -
\??\c:\hbhbnb.exec:\hbhbnb.exe31⤵
- Executes dropped EXE
PID:3232 -
\??\c:\jjjdj.exec:\jjjdj.exe32⤵
- Executes dropped EXE
PID:2992 -
\??\c:\rlrfrrr.exec:\rlrfrrr.exe33⤵
- Executes dropped EXE
PID:3692 -
\??\c:\nbbtbt.exec:\nbbtbt.exe34⤵
- Executes dropped EXE
PID:4548 -
\??\c:\jddvj.exec:\jddvj.exe35⤵
- Executes dropped EXE
PID:3716 -
\??\c:\xfxlxff.exec:\xfxlxff.exe36⤵
- Executes dropped EXE
PID:1428 -
\??\c:\lfffxxr.exec:\lfffxxr.exe37⤵
- Executes dropped EXE
PID:1228 -
\??\c:\tnhnht.exec:\tnhnht.exe38⤵
- Executes dropped EXE
PID:3652 -
\??\c:\vvpvp.exec:\vvpvp.exe39⤵
- Executes dropped EXE
PID:3964 -
\??\c:\lxfxfxr.exec:\lxfxfxr.exe40⤵
- Executes dropped EXE
PID:2592 -
\??\c:\nnthtn.exec:\nnthtn.exe41⤵
- Executes dropped EXE
PID:4948 -
\??\c:\jdvpd.exec:\jdvpd.exe42⤵
- Executes dropped EXE
PID:1132 -
\??\c:\xffxxlf.exec:\xffxxlf.exe43⤵
- Executes dropped EXE
PID:3684 -
\??\c:\1xfflrx.exec:\1xfflrx.exe44⤵
- Executes dropped EXE
PID:2448 -
\??\c:\nbnnbt.exec:\nbnnbt.exe45⤵
- Executes dropped EXE
PID:960 -
\??\c:\pdjvv.exec:\pdjvv.exe46⤵
- Executes dropped EXE
PID:1136 -
\??\c:\frrfrlx.exec:\frrfrlx.exe47⤵
- Executes dropped EXE
PID:5004 -
\??\c:\bhbbtb.exec:\bhbbtb.exe48⤵
- Executes dropped EXE
PID:3328 -
\??\c:\5tttnh.exec:\5tttnh.exe49⤵
- Executes dropped EXE
PID:1480 -
\??\c:\dddvp.exec:\dddvp.exe50⤵
- Executes dropped EXE
PID:768 -
\??\c:\5ffxxlf.exec:\5ffxxlf.exe51⤵
- Executes dropped EXE
PID:2120 -
\??\c:\hntnbt.exec:\hntnbt.exe52⤵
- Executes dropped EXE
PID:424 -
\??\c:\dddpv.exec:\dddpv.exe53⤵
- Executes dropped EXE
PID:3784 -
\??\c:\7pvpv.exec:\7pvpv.exe54⤵
- Executes dropped EXE
PID:4928 -
\??\c:\lrxfrrr.exec:\lrxfrrr.exe55⤵
- Executes dropped EXE
PID:4592 -
\??\c:\btbtnn.exec:\btbtnn.exe56⤵
- Executes dropped EXE
PID:2188 -
\??\c:\7dddv.exec:\7dddv.exe57⤵
- Executes dropped EXE
PID:3408 -
\??\c:\fxxrlfx.exec:\fxxrlfx.exe58⤵
- Executes dropped EXE
PID:4392 -
\??\c:\nttbhh.exec:\nttbhh.exe59⤵
- Executes dropped EXE
PID:4920 -
\??\c:\bbhbbt.exec:\bbhbbt.exe60⤵
- Executes dropped EXE
PID:1724 -
\??\c:\7vdvv.exec:\7vdvv.exe61⤵
- Executes dropped EXE
PID:3496 -
\??\c:\xrrlflf.exec:\xrrlflf.exe62⤵
- Executes dropped EXE
PID:3892 -
\??\c:\hbbtnn.exec:\hbbtnn.exe63⤵
- Executes dropped EXE
PID:5032 -
\??\c:\ntbttt.exec:\ntbttt.exe64⤵
- Executes dropped EXE
PID:4800 -
\??\c:\pppjv.exec:\pppjv.exe65⤵
- Executes dropped EXE
PID:4516 -
\??\c:\nhbbhn.exec:\nhbbhn.exe66⤵PID:4168
-
\??\c:\tntnht.exec:\tntnht.exe67⤵PID:884
-
\??\c:\jjddj.exec:\jjddj.exe68⤵PID:4188
-
\??\c:\rxfxllx.exec:\rxfxllx.exe69⤵PID:1188
-
\??\c:\nthtnh.exec:\nthtnh.exe70⤵PID:4876
-
\??\c:\1jdpj.exec:\1jdpj.exe71⤵PID:2872
-
\??\c:\flxrxxr.exec:\flxrxxr.exe72⤵PID:4000
-
\??\c:\lxfrllx.exec:\lxfrllx.exe73⤵PID:2436
-
\??\c:\ttnbtt.exec:\ttnbtt.exe74⤵PID:4584
-
\??\c:\ppjdv.exec:\ppjdv.exe75⤵PID:1972
-
\??\c:\xxflrxx.exec:\xxflrxx.exe76⤵PID:2424
-
\??\c:\lxfxxrf.exec:\lxfxxrf.exe77⤵PID:3264
-
\??\c:\hbnhtn.exec:\hbnhtn.exe78⤵PID:3848
-
\??\c:\pddpj.exec:\pddpj.exe79⤵PID:2992
-
\??\c:\pddvj.exec:\pddvj.exe80⤵PID:2696
-
\??\c:\rrrxlrl.exec:\rrrxlrl.exe81⤵PID:4568
-
\??\c:\hbtnnn.exec:\hbtnnn.exe82⤵PID:4416
-
\??\c:\vpvpj.exec:\vpvpj.exe83⤵PID:3644
-
\??\c:\vpvjd.exec:\vpvjd.exe84⤵PID:3612
-
\??\c:\rlfxrxr.exec:\rlfxrxr.exe85⤵PID:528
-
\??\c:\3tnbth.exec:\3tnbth.exe86⤵PID:3076
-
\??\c:\1dddv.exec:\1dddv.exe87⤵PID:2684
-
\??\c:\jvpdv.exec:\jvpdv.exe88⤵PID:4068
-
\??\c:\7frrxfl.exec:\7frrxfl.exe89⤵PID:732
-
\??\c:\nhhthb.exec:\nhhthb.exe90⤵PID:4988
-
\??\c:\bhnhtt.exec:\bhnhtt.exe91⤵PID:3432
-
\??\c:\vpppj.exec:\vpppj.exe92⤵PID:1964
-
\??\c:\rllxxff.exec:\rllxxff.exe93⤵PID:452
-
\??\c:\tnnhhb.exec:\tnnhhb.exe94⤵PID:3004
-
\??\c:\nnhtnb.exec:\nnhtnb.exe95⤵PID:4940
-
\??\c:\vvdvj.exec:\vvdvj.exe96⤵PID:2148
-
\??\c:\xrlxfxr.exec:\xrlxfxr.exe97⤵PID:3592
-
\??\c:\flxlfxr.exec:\flxlfxr.exe98⤵PID:4908
-
\??\c:\nhhntn.exec:\nhhntn.exe99⤵PID:1480
-
\??\c:\jvvpj.exec:\jvvpj.exe100⤵PID:4572
-
\??\c:\tbtbnn.exec:\tbtbnn.exe101⤵PID:2120
-
\??\c:\thttth.exec:\thttth.exe102⤵PID:1160
-
\??\c:\jvvjj.exec:\jvvjj.exe103⤵PID:424
-
\??\c:\xxxxlll.exec:\xxxxlll.exe104⤵PID:1872
-
\??\c:\hnbhnn.exec:\hnbhnn.exe105⤵PID:2656
-
\??\c:\7bttbt.exec:\7bttbt.exe106⤵PID:372
-
\??\c:\ppppp.exec:\ppppp.exe107⤵PID:4464
-
\??\c:\5xlfxfx.exec:\5xlfxfx.exe108⤵PID:3256
-
\??\c:\frfffxr.exec:\frfffxr.exe109⤵PID:1364
-
\??\c:\5hnhtt.exec:\5hnhtt.exe110⤵PID:4736
-
\??\c:\3vvvp.exec:\3vvvp.exe111⤵PID:3892
-
\??\c:\7lrlfff.exec:\7lrlfff.exe112⤵PID:2504
-
\??\c:\hbhbbn.exec:\hbhbbn.exe113⤵PID:3756
-
\??\c:\hbbtbt.exec:\hbbtbt.exe114⤵PID:5116
-
\??\c:\dvdvj.exec:\dvdvj.exe115⤵PID:2428
-
\??\c:\dvpdj.exec:\dvpdj.exe116⤵PID:1176
-
\??\c:\xflfffr.exec:\xflfffr.exe117⤵PID:900
-
\??\c:\3tnhbb.exec:\3tnhbb.exe118⤵PID:2964
-
\??\c:\thttth.exec:\thttth.exe119⤵PID:3968
-
\??\c:\ppdvj.exec:\ppdvj.exe120⤵PID:1012
-
\??\c:\dvdvv.exec:\dvdvv.exe121⤵PID:4264
-
\??\c:\rflfrfx.exec:\rflfrfx.exe122⤵PID:2336
-
\??\c:\htbhth.exec:\htbhth.exe123⤵PID:3836
-
\??\c:\jvdvv.exec:\jvdvv.exe124⤵PID:2212
-
\??\c:\dppvv.exec:\dppvv.exe125⤵PID:1516
-
\??\c:\lxfxxxx.exec:\lxfxxxx.exe126⤵PID:4768
-
\??\c:\lrfffxr.exec:\lrfffxr.exe127⤵PID:1640
-
\??\c:\bnhbtn.exec:\bnhbtn.exe128⤵PID:1564
-
\??\c:\ddpjj.exec:\ddpjj.exe129⤵PID:2992
-
\??\c:\jvvdv.exec:\jvvdv.exe130⤵PID:3832
-
\??\c:\lxlxxrl.exec:\lxlxxrl.exe131⤵PID:4568
-
\??\c:\lxfxlrl.exec:\lxfxlrl.exe132⤵PID:4452
-
\??\c:\nbnbbn.exec:\nbnbbn.exe133⤵PID:3644
-
\??\c:\jpvpj.exec:\jpvpj.exe134⤵PID:2452
-
\??\c:\9vvjd.exec:\9vvjd.exe135⤵PID:528
-
\??\c:\9lxrxxf.exec:\9lxrxxf.exe136⤵PID:3628
-
\??\c:\rrrrlrl.exec:\rrrrlrl.exe137⤵PID:888
-
\??\c:\1httnh.exec:\1httnh.exe138⤵PID:996
-
\??\c:\dpvvv.exec:\dpvvv.exe139⤵PID:4396
-
\??\c:\pjpjd.exec:\pjpjd.exe140⤵PID:1884
-
\??\c:\rrxrlll.exec:\rrxrlll.exe141⤵PID:3432
-
\??\c:\lflfffx.exec:\lflfffx.exe142⤵PID:4716
-
\??\c:\nnntbh.exec:\nnntbh.exe143⤵PID:3684
-
\??\c:\bttntn.exec:\bttntn.exe144⤵PID:944
-
\??\c:\djvvp.exec:\djvvp.exe145⤵PID:972
-
\??\c:\1llfffx.exec:\1llfffx.exe146⤵PID:3404
-
\??\c:\xrrllll.exec:\xrrllll.exe147⤵PID:3412
-
\??\c:\btbntt.exec:\btbntt.exe148⤵PID:4772
-
\??\c:\djpjd.exec:\djpjd.exe149⤵PID:4456
-
\??\c:\dpddj.exec:\dpddj.exe150⤵PID:1680
-
\??\c:\5xrxrxr.exec:\5xrxrxr.exe151⤵PID:3908
-
\??\c:\lflfxrr.exec:\lflfxrr.exe152⤵PID:4964
-
\??\c:\nbnhtt.exec:\nbnhtt.exe153⤵PID:4276
-
\??\c:\pppjd.exec:\pppjd.exe154⤵PID:5064
-
\??\c:\ddpjv.exec:\ddpjv.exe155⤵PID:4136
-
\??\c:\xrrlfff.exec:\xrrlfff.exe156⤵PID:444
-
\??\c:\llllfxr.exec:\llllfxr.exe157⤵PID:1148
-
\??\c:\bhthhn.exec:\bhthhn.exe158⤵PID:4920
-
\??\c:\bbhtnt.exec:\bbhtnt.exe159⤵PID:3256
-
\??\c:\pvddd.exec:\pvddd.exe160⤵PID:1364
-
\??\c:\vdpdp.exec:\vdpdp.exe161⤵PID:4736
-
\??\c:\lffffxr.exec:\lffffxr.exe162⤵PID:2144
-
\??\c:\btbbnt.exec:\btbbnt.exe163⤵PID:4800
-
\??\c:\dvvdp.exec:\dvvdp.exe164⤵PID:1300
-
\??\c:\llfrfll.exec:\llfrfll.exe165⤵PID:2580
-
\??\c:\frfrrlf.exec:\frfrrlf.exe166⤵PID:1352
-
\??\c:\3ttttn.exec:\3ttttn.exe167⤵PID:4188
-
\??\c:\jjjdv.exec:\jjjdv.exe168⤵PID:1664
-
\??\c:\rlxxrfx.exec:\rlxxrfx.exe169⤵PID:2964
-
\??\c:\nhhhbh.exec:\nhhhbh.exe170⤵PID:1956
-
\??\c:\nhnnnb.exec:\nhnnnb.exe171⤵PID:1012
-
\??\c:\dvjjd.exec:\dvjjd.exe172⤵PID:4264
-
\??\c:\xfrxxlf.exec:\xfrxxlf.exe173⤵PID:4584
-
\??\c:\7hbttb.exec:\7hbttb.exe174⤵PID:3436
-
\??\c:\dvvpj.exec:\dvvpj.exe175⤵PID:1660
-
\??\c:\ppdvp.exec:\ppdvp.exe176⤵PID:1420
-
\??\c:\vjpvp.exec:\vjpvp.exe177⤵PID:1564
-
\??\c:\7xfxllr.exec:\7xfxllr.exe178⤵PID:2992
-
\??\c:\tnnhhh.exec:\tnnhhh.exe179⤵PID:4784
-
\??\c:\nhnbtt.exec:\nhnbtt.exe180⤵PID:4524
-
\??\c:\tntnbb.exec:\tntnbb.exe181⤵PID:1428
-
\??\c:\dvvvv.exec:\dvvvv.exe182⤵PID:2468
-
\??\c:\vpvpp.exec:\vpvpp.exe183⤵PID:1228
-
\??\c:\xrrlffx.exec:\xrrlffx.exe184⤵PID:4068
-
\??\c:\hntnht.exec:\hntnht.exe185⤵PID:1596
-
\??\c:\bnhthn.exec:\bnhthn.exe186⤵PID:4724
-
\??\c:\jvvvp.exec:\jvvvp.exe187⤵PID:3340
-
\??\c:\vpjvd.exec:\vpjvd.exe188⤵PID:3424
-
\??\c:\lxlfxfx.exec:\lxlfxfx.exe189⤵PID:4512
-
\??\c:\fxxrlrf.exec:\fxxrlrf.exe190⤵PID:4940
-
\??\c:\nntttt.exec:\nntttt.exe191⤵PID:1136
-
\??\c:\1hhbtt.exec:\1hhbtt.exe192⤵PID:3592
-
\??\c:\pdjvp.exec:\pdjvp.exe193⤵PID:1704
-
\??\c:\vjvvj.exec:\vjvvj.exe194⤵PID:1880
-
\??\c:\fflrllx.exec:\fflrllx.exe195⤵PID:4140
-
\??\c:\fxrrrrr.exec:\fxrrrrr.exe196⤵PID:2120
-
\??\c:\7frlfxr.exec:\7frlfxr.exe197⤵PID:3908
-
\??\c:\nhnnnt.exec:\nhnnnt.exe198⤵PID:4964
-
\??\c:\pddvp.exec:\pddvp.exe199⤵PID:2188
-
\??\c:\vpjjd.exec:\vpjjd.exe200⤵PID:3012
-
\??\c:\rxlffxx.exec:\rxlffxx.exe201⤵PID:372
-
\??\c:\xflfxxr.exec:\xflfxxr.exe202⤵PID:2400
-
\??\c:\nthbbt.exec:\nthbbt.exe203⤵PID:3112
-
\??\c:\htttbb.exec:\htttbb.exe204⤵PID:3440
-
\??\c:\pjpjp.exec:\pjpjp.exe205⤵PID:5072
-
\??\c:\vpjjd.exec:\vpjjd.exe206⤵PID:2028
-
\??\c:\xfxrllx.exec:\xfxrllx.exe207⤵PID:2504
-
\??\c:\rllfffx.exec:\rllfffx.exe208⤵PID:4800
-
\??\c:\9hhnhn.exec:\9hhnhn.exe209⤵PID:1300
-
\??\c:\pddjp.exec:\pddjp.exe210⤵PID:2580
-
\??\c:\ffxxrxl.exec:\ffxxrxl.exe211⤵PID:1352
-
\??\c:\hnnnnn.exec:\hnnnnn.exe212⤵PID:4188
-
\??\c:\jvvpp.exec:\jvvpp.exe213⤵PID:3972
-
\??\c:\1vpjp.exec:\1vpjp.exe214⤵PID:4160
-
\??\c:\llfxrrl.exec:\llfxrrl.exe215⤵PID:4828
-
\??\c:\nbtnbh.exec:\nbtnbh.exe216⤵PID:1856
-
\??\c:\bntnnn.exec:\bntnnn.exe217⤵PID:2424
-
\??\c:\jvdpj.exec:\jvdpj.exe218⤵PID:3436
-
\??\c:\pdjjv.exec:\pdjjv.exe219⤵PID:4868
-
\??\c:\pjjdj.exec:\pjjdj.exe220⤵PID:1788
-
\??\c:\lxfrllf.exec:\lxfrllf.exe221⤵PID:3476
-
\??\c:\nhhhhn.exec:\nhhhhn.exe222⤵PID:4784
-
\??\c:\bttbth.exec:\bttbth.exe223⤵PID:2704
-
\??\c:\jjjvp.exec:\jjjvp.exe224⤵PID:744
-
\??\c:\1jpjj.exec:\1jpjj.exe225⤵PID:1560
-
\??\c:\5llfxfx.exec:\5llfxfx.exe226⤵PID:4948
-
\??\c:\thhtbh.exec:\thhtbh.exe227⤵PID:4792
-
\??\c:\hhbbbt.exec:\hhbbbt.exe228⤵PID:2956
-
\??\c:\jjppj.exec:\jjppj.exe229⤵PID:4072
-
\??\c:\jpvdj.exec:\jpvdj.exe230⤵PID:3772
-
\??\c:\llfrlfl.exec:\llfrlfl.exe231⤵PID:944
-
\??\c:\thbhbb.exec:\thbhbb.exe232⤵PID:3080
-
\??\c:\1ntnnn.exec:\1ntnnn.exe233⤵PID:2432
-
\??\c:\httthh.exec:\httthh.exe234⤵PID:3320
-
\??\c:\jdjjp.exec:\jdjjp.exe235⤵PID:1480
-
\??\c:\flxxxxr.exec:\flxxxxr.exe236⤵PID:4572
-
\??\c:\lrxrrrr.exec:\lrxrrrr.exe237⤵PID:2316
-
\??\c:\5rxxfff.exec:\5rxxfff.exe238⤵PID:2660
-
\??\c:\bhhbtt.exec:\bhhbtt.exe239⤵PID:4276
-
\??\c:\vdddv.exec:\vdddv.exe240⤵PID:3168
-
\??\c:\xrlfxxr.exec:\xrlfxxr.exe241⤵PID:4480
-
\??\c:\hntnbh.exec:\hntnbh.exe242⤵PID:1724