Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 20:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
245f959ede23fdc8258b4962a55966c14afcdde003b1b04b44db86c4d91093c5.exe
Resource
win7-20240215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
245f959ede23fdc8258b4962a55966c14afcdde003b1b04b44db86c4d91093c5.exe
-
Size
76KB
-
MD5
2a005dc436bc29e40151ce9b177a179c
-
SHA1
f1de51e491cdc79c22c5c7f76071fce821035025
-
SHA256
245f959ede23fdc8258b4962a55966c14afcdde003b1b04b44db86c4d91093c5
-
SHA512
3e4f5ac13a834a3fee5469c4b985d41e8864e06d35f3e1f3ea8ff5e7eeb45158e2c1b1a53c7b87a2baa827eca656ec20dfa79ae84fadd06a3fa66a88bdbfb3dc
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoAX8gu3Gno9yvrjKl2:ymb3NkkiQ3mdBjFo68t3Gno9IW2
Malware Config
Signatures
-
Detect Blackmoon payload 32 IoCs
Processes:
resource yara_rule behavioral2/memory/740-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5596-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1804-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2340-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/800-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3776-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5748-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2176-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5640-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3276-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1892-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5288-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5836-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4460-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3640-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5332-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3924-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4688-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3748-86-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3748-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5452-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5452-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5432-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1284-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4068-55-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4068-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1972-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1524-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4556-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1384-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4732-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4524-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 38 IoCs
Processes:
resource yara_rule behavioral2/memory/740-104-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5596-146-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1804-211-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2340-199-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/800-194-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3776-187-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5748-181-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2176-176-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5640-169-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3276-163-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1892-139-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5288-133-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5836-127-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4460-121-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3640-115-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5332-109-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3924-97-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4688-91-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3748-84-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5452-74-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5452-73-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5452-72-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5432-65-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1284-62-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1284-57-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4068-53-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1972-44-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1524-41-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1524-35-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1524-34-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1524-33-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4556-26-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1384-23-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1384-19-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1384-18-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1384-17-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4732-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4524-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
btbtbt.exe7dvpp.exe3djvj.exefxllxrl.exellfxfxr.exenbthbt.exehththb.exetttnhb.exejvdvv.exevdvpd.exefllrxxr.exelrrlfxl.exetnnnhb.exedjvvj.exe9pjjv.exejvvjd.exexlrlflf.exe7hhbtt.exehhhtbt.exevjppd.exevvppv.exe1frfrxl.exehtnhbn.exenhbntt.exetbbthh.exe7jvpv.exejpvjv.exerrlfxxf.exe3rrlxrl.exettntbn.exebhhhbt.exejddpp.exepppjv.exelrrxxrl.exe1fffrlf.exelxlfxrl.exennhbhh.exetbbnbb.exevpvvp.exejdvpd.exexfxrllf.exexrrflfl.exexxxlxxl.exebhhnhn.exebtnhhb.exepppjj.exe3dpjp.exepdvvp.exelfrlffx.exeflllfxr.exethbtnb.exebbtnnh.exe5hbthb.exepdpjd.exe5vvpj.exejpjdv.exexlfxrll.exelfxxlff.exenbhbnh.exenthbhb.exe9hnbhh.exe5vjvj.exejvjvp.exelfxrlfx.exepid process 4732 btbtbt.exe 1384 7dvpp.exe 4556 3djvj.exe 1524 fxllxrl.exe 1972 llfxfxr.exe 4068 nbthbt.exe 1284 hththb.exe 5432 tttnhb.exe 5452 jvdvv.exe 3748 vdvpd.exe 4688 fllrxxr.exe 3924 lrrlfxl.exe 740 tnnnhb.exe 5332 djvvj.exe 3640 9pjjv.exe 4460 jvvjd.exe 5836 xlrlflf.exe 5288 7hhbtt.exe 1892 hhhtbt.exe 5596 vjppd.exe 3296 vvppv.exe 5788 1frfrxl.exe 3276 htnhbn.exe 5640 nhbntt.exe 2176 tbbthh.exe 5748 7jvpv.exe 3776 jpvjv.exe 800 rrlfxxf.exe 2340 3rrlxrl.exe 1836 ttntbn.exe 1804 bhhhbt.exe 2460 jddpp.exe 2796 pppjv.exe 1028 lrrxxrl.exe 2820 1fffrlf.exe 4048 lxlfxrl.exe 5372 nnhbhh.exe 2996 tbbnbb.exe 5712 vpvvp.exe 8 jdvpd.exe 5816 xfxrllf.exe 4016 xrrflfl.exe 4616 xxxlxxl.exe 976 bhhnhn.exe 2620 btnhhb.exe 5932 pppjj.exe 5944 3dpjp.exe 2044 pdvvp.exe 2008 lfrlffx.exe 2468 flllfxr.exe 2716 thbtnb.exe 4676 bbtnnh.exe 2496 5hbthb.exe 5852 pdpjd.exe 5324 5vvpj.exe 3212 jpjdv.exe 1668 xlfxrll.exe 2408 lfxxlff.exe 4520 nbhbnh.exe 1956 nthbhb.exe 4532 9hnbhh.exe 5188 5vjvj.exe 5528 jvjvp.exe 2964 lfxrlfx.exe -
Processes:
resource yara_rule behavioral2/memory/740-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5596-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1804-211-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2340-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/800-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3776-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5748-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2176-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5640-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3276-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1892-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5288-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5836-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4460-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3640-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5332-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3924-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4688-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3748-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5452-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5452-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5452-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5432-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1284-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1284-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4068-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1972-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4556-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1384-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1384-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1384-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1384-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4732-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4524-4-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
245f959ede23fdc8258b4962a55966c14afcdde003b1b04b44db86c4d91093c5.exebtbtbt.exe7dvpp.exe3djvj.exefxllxrl.exellfxfxr.exenbthbt.exehththb.exetttnhb.exejvdvv.exevdvpd.exefllrxxr.exelrrlfxl.exetnnnhb.exedjvvj.exe9pjjv.exejvvjd.exexlrlflf.exe7hhbtt.exehhhtbt.exevjppd.exevvppv.exedescription pid process target process PID 4524 wrote to memory of 4732 4524 245f959ede23fdc8258b4962a55966c14afcdde003b1b04b44db86c4d91093c5.exe btbtbt.exe PID 4524 wrote to memory of 4732 4524 245f959ede23fdc8258b4962a55966c14afcdde003b1b04b44db86c4d91093c5.exe btbtbt.exe PID 4524 wrote to memory of 4732 4524 245f959ede23fdc8258b4962a55966c14afcdde003b1b04b44db86c4d91093c5.exe btbtbt.exe PID 4732 wrote to memory of 1384 4732 btbtbt.exe 7dvpp.exe PID 4732 wrote to memory of 1384 4732 btbtbt.exe 7dvpp.exe PID 4732 wrote to memory of 1384 4732 btbtbt.exe 7dvpp.exe PID 1384 wrote to memory of 4556 1384 7dvpp.exe 3djvj.exe PID 1384 wrote to memory of 4556 1384 7dvpp.exe 3djvj.exe PID 1384 wrote to memory of 4556 1384 7dvpp.exe 3djvj.exe PID 4556 wrote to memory of 1524 4556 3djvj.exe fxllxrl.exe PID 4556 wrote to memory of 1524 4556 3djvj.exe fxllxrl.exe PID 4556 wrote to memory of 1524 4556 3djvj.exe fxllxrl.exe PID 1524 wrote to memory of 1972 1524 fxllxrl.exe llfxfxr.exe PID 1524 wrote to memory of 1972 1524 fxllxrl.exe llfxfxr.exe PID 1524 wrote to memory of 1972 1524 fxllxrl.exe llfxfxr.exe PID 1972 wrote to memory of 4068 1972 llfxfxr.exe nbthbt.exe PID 1972 wrote to memory of 4068 1972 llfxfxr.exe nbthbt.exe PID 1972 wrote to memory of 4068 1972 llfxfxr.exe nbthbt.exe PID 4068 wrote to memory of 1284 4068 nbthbt.exe hththb.exe PID 4068 wrote to memory of 1284 4068 nbthbt.exe hththb.exe PID 4068 wrote to memory of 1284 4068 nbthbt.exe hththb.exe PID 1284 wrote to memory of 5432 1284 hththb.exe tttnhb.exe PID 1284 wrote to memory of 5432 1284 hththb.exe tttnhb.exe PID 1284 wrote to memory of 5432 1284 hththb.exe tttnhb.exe PID 5432 wrote to memory of 5452 5432 tttnhb.exe jvdvv.exe PID 5432 wrote to memory of 5452 5432 tttnhb.exe jvdvv.exe PID 5432 wrote to memory of 5452 5432 tttnhb.exe jvdvv.exe PID 5452 wrote to memory of 3748 5452 jvdvv.exe vdvpd.exe PID 5452 wrote to memory of 3748 5452 jvdvv.exe vdvpd.exe PID 5452 wrote to memory of 3748 5452 jvdvv.exe vdvpd.exe PID 3748 wrote to memory of 4688 3748 vdvpd.exe fllrxxr.exe PID 3748 wrote to memory of 4688 3748 vdvpd.exe fllrxxr.exe PID 3748 wrote to memory of 4688 3748 vdvpd.exe fllrxxr.exe PID 4688 wrote to memory of 3924 4688 fllrxxr.exe lrrlfxl.exe PID 4688 wrote to memory of 3924 4688 fllrxxr.exe lrrlfxl.exe PID 4688 wrote to memory of 3924 4688 fllrxxr.exe lrrlfxl.exe PID 3924 wrote to memory of 740 3924 lrrlfxl.exe tnnnhb.exe PID 3924 wrote to memory of 740 3924 lrrlfxl.exe tnnnhb.exe PID 3924 wrote to memory of 740 3924 lrrlfxl.exe tnnnhb.exe PID 740 wrote to memory of 5332 740 tnnnhb.exe djvvj.exe PID 740 wrote to memory of 5332 740 tnnnhb.exe djvvj.exe PID 740 wrote to memory of 5332 740 tnnnhb.exe djvvj.exe PID 5332 wrote to memory of 3640 5332 djvvj.exe 9pjjv.exe PID 5332 wrote to memory of 3640 5332 djvvj.exe 9pjjv.exe PID 5332 wrote to memory of 3640 5332 djvvj.exe 9pjjv.exe PID 3640 wrote to memory of 4460 3640 9pjjv.exe jvvjd.exe PID 3640 wrote to memory of 4460 3640 9pjjv.exe jvvjd.exe PID 3640 wrote to memory of 4460 3640 9pjjv.exe jvvjd.exe PID 4460 wrote to memory of 5836 4460 jvvjd.exe xlrlflf.exe PID 4460 wrote to memory of 5836 4460 jvvjd.exe xlrlflf.exe PID 4460 wrote to memory of 5836 4460 jvvjd.exe xlrlflf.exe PID 5836 wrote to memory of 5288 5836 xlrlflf.exe 7hhbtt.exe PID 5836 wrote to memory of 5288 5836 xlrlflf.exe 7hhbtt.exe PID 5836 wrote to memory of 5288 5836 xlrlflf.exe 7hhbtt.exe PID 5288 wrote to memory of 1892 5288 7hhbtt.exe hhhtbt.exe PID 5288 wrote to memory of 1892 5288 7hhbtt.exe hhhtbt.exe PID 5288 wrote to memory of 1892 5288 7hhbtt.exe hhhtbt.exe PID 1892 wrote to memory of 5596 1892 hhhtbt.exe vjppd.exe PID 1892 wrote to memory of 5596 1892 hhhtbt.exe vjppd.exe PID 1892 wrote to memory of 5596 1892 hhhtbt.exe vjppd.exe PID 5596 wrote to memory of 3296 5596 vjppd.exe vvppv.exe PID 5596 wrote to memory of 3296 5596 vjppd.exe vvppv.exe PID 5596 wrote to memory of 3296 5596 vjppd.exe vvppv.exe PID 3296 wrote to memory of 5788 3296 vvppv.exe rffxrrl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\245f959ede23fdc8258b4962a55966c14afcdde003b1b04b44db86c4d91093c5.exe"C:\Users\Admin\AppData\Local\Temp\245f959ede23fdc8258b4962a55966c14afcdde003b1b04b44db86c4d91093c5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4524 -
\??\c:\btbtbt.exec:\btbtbt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
\??\c:\7dvpp.exec:\7dvpp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
\??\c:\3djvj.exec:\3djvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
\??\c:\fxllxrl.exec:\fxllxrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
\??\c:\llfxfxr.exec:\llfxfxr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
\??\c:\nbthbt.exec:\nbthbt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
\??\c:\hththb.exec:\hththb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1284 -
\??\c:\tttnhb.exec:\tttnhb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5432 -
\??\c:\jvdvv.exec:\jvdvv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5452 -
\??\c:\vdvpd.exec:\vdvpd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
\??\c:\fllrxxr.exec:\fllrxxr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
\??\c:\lrrlfxl.exec:\lrrlfxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
\??\c:\tnnnhb.exec:\tnnnhb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
\??\c:\djvvj.exec:\djvvj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5332 -
\??\c:\9pjjv.exec:\9pjjv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
\??\c:\jvvjd.exec:\jvvjd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
\??\c:\xlrlflf.exec:\xlrlflf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5836 -
\??\c:\7hhbtt.exec:\7hhbtt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5288 -
\??\c:\hhhtbt.exec:\hhhtbt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1892 -
\??\c:\vjppd.exec:\vjppd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5596 -
\??\c:\vvppv.exec:\vvppv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3296 -
\??\c:\1frfrxl.exec:\1frfrxl.exe23⤵
- Executes dropped EXE
PID:5788 -
\??\c:\htnhbn.exec:\htnhbn.exe24⤵
- Executes dropped EXE
PID:3276 -
\??\c:\nhbntt.exec:\nhbntt.exe25⤵
- Executes dropped EXE
PID:5640 -
\??\c:\tbbthh.exec:\tbbthh.exe26⤵
- Executes dropped EXE
PID:2176 -
\??\c:\7jvpv.exec:\7jvpv.exe27⤵
- Executes dropped EXE
PID:5748 -
\??\c:\jpvjv.exec:\jpvjv.exe28⤵
- Executes dropped EXE
PID:3776 -
\??\c:\rrlfxxf.exec:\rrlfxxf.exe29⤵
- Executes dropped EXE
PID:800 -
\??\c:\3rrlxrl.exec:\3rrlxrl.exe30⤵
- Executes dropped EXE
PID:2340 -
\??\c:\ttntbn.exec:\ttntbn.exe31⤵
- Executes dropped EXE
PID:1836 -
\??\c:\bhhhbt.exec:\bhhhbt.exe32⤵
- Executes dropped EXE
PID:1804 -
\??\c:\jddpp.exec:\jddpp.exe33⤵
- Executes dropped EXE
PID:2460 -
\??\c:\pppjv.exec:\pppjv.exe34⤵
- Executes dropped EXE
PID:2796 -
\??\c:\lrrxxrl.exec:\lrrxxrl.exe35⤵
- Executes dropped EXE
PID:1028 -
\??\c:\1fffrlf.exec:\1fffrlf.exe36⤵
- Executes dropped EXE
PID:2820 -
\??\c:\lxlfxrl.exec:\lxlfxrl.exe37⤵
- Executes dropped EXE
PID:4048 -
\??\c:\nnhbhh.exec:\nnhbhh.exe38⤵
- Executes dropped EXE
PID:5372 -
\??\c:\tbbnbb.exec:\tbbnbb.exe39⤵
- Executes dropped EXE
PID:2996 -
\??\c:\vpvvp.exec:\vpvvp.exe40⤵
- Executes dropped EXE
PID:5712 -
\??\c:\jdvpd.exec:\jdvpd.exe41⤵
- Executes dropped EXE
PID:8 -
\??\c:\xfxrllf.exec:\xfxrllf.exe42⤵
- Executes dropped EXE
PID:5816 -
\??\c:\xrrflfl.exec:\xrrflfl.exe43⤵
- Executes dropped EXE
PID:4016 -
\??\c:\xxxlxxl.exec:\xxxlxxl.exe44⤵
- Executes dropped EXE
PID:4616 -
\??\c:\bhhnhn.exec:\bhhnhn.exe45⤵
- Executes dropped EXE
PID:976 -
\??\c:\btnhhb.exec:\btnhhb.exe46⤵
- Executes dropped EXE
PID:2620 -
\??\c:\pppjj.exec:\pppjj.exe47⤵
- Executes dropped EXE
PID:5932 -
\??\c:\3dpjp.exec:\3dpjp.exe48⤵
- Executes dropped EXE
PID:5944 -
\??\c:\pdvvp.exec:\pdvvp.exe49⤵
- Executes dropped EXE
PID:2044 -
\??\c:\lfrlffx.exec:\lfrlffx.exe50⤵
- Executes dropped EXE
PID:2008 -
\??\c:\flllfxr.exec:\flllfxr.exe51⤵
- Executes dropped EXE
PID:2468 -
\??\c:\thbtnb.exec:\thbtnb.exe52⤵
- Executes dropped EXE
PID:2716 -
\??\c:\bbtnnh.exec:\bbtnnh.exe53⤵
- Executes dropped EXE
PID:4676 -
\??\c:\5hbthb.exec:\5hbthb.exe54⤵
- Executes dropped EXE
PID:2496 -
\??\c:\pdpjd.exec:\pdpjd.exe55⤵
- Executes dropped EXE
PID:5852 -
\??\c:\5vvpj.exec:\5vvpj.exe56⤵
- Executes dropped EXE
PID:5324 -
\??\c:\jpjdv.exec:\jpjdv.exe57⤵
- Executes dropped EXE
PID:3212 -
\??\c:\xlfxrll.exec:\xlfxrll.exe58⤵
- Executes dropped EXE
PID:1668 -
\??\c:\lfxxlff.exec:\lfxxlff.exe59⤵
- Executes dropped EXE
PID:2408 -
\??\c:\nbhbnh.exec:\nbhbnh.exe60⤵
- Executes dropped EXE
PID:4520 -
\??\c:\nthbhb.exec:\nthbhb.exe61⤵
- Executes dropped EXE
PID:1956 -
\??\c:\9hnbhh.exec:\9hnbhh.exe62⤵
- Executes dropped EXE
PID:4532 -
\??\c:\5vjvj.exec:\5vjvj.exe63⤵
- Executes dropped EXE
PID:5188 -
\??\c:\jvjvp.exec:\jvjvp.exe64⤵
- Executes dropped EXE
PID:5528 -
\??\c:\lfxrlfx.exec:\lfxrlfx.exe65⤵
- Executes dropped EXE
PID:2964 -
\??\c:\flllxrl.exec:\flllxrl.exe66⤵PID:5964
-
\??\c:\lflxrrl.exec:\lflxrrl.exe67⤵PID:4512
-
\??\c:\tnhbtb.exec:\tnhbtb.exe68⤵PID:2000
-
\??\c:\tththn.exec:\tththn.exe69⤵PID:2840
-
\??\c:\vjddp.exec:\vjddp.exe70⤵PID:660
-
\??\c:\jpdvp.exec:\jpdvp.exe71⤵PID:4952
-
\??\c:\vvvpj.exec:\vvvpj.exe72⤵PID:60
-
\??\c:\5frlfxl.exec:\5frlfxl.exe73⤵PID:5608
-
\??\c:\lfrlffx.exec:\lfrlffx.exe74⤵PID:6136
-
\??\c:\frxfrlf.exec:\frxfrlf.exe75⤵PID:2864
-
\??\c:\nhthbh.exec:\nhthbh.exe76⤵PID:4756
-
\??\c:\5hthtn.exec:\5hthtn.exe77⤵PID:1996
-
\??\c:\bnnthh.exec:\bnnthh.exe78⤵PID:5316
-
\??\c:\5dpdd.exec:\5dpdd.exe79⤵PID:3860
-
\??\c:\dvjvd.exec:\dvjvd.exe80⤵PID:4924
-
\??\c:\fxxrxrl.exec:\fxxrxrl.exe81⤵PID:3568
-
\??\c:\lfxxlfx.exec:\lfxxlfx.exe82⤵PID:3640
-
\??\c:\1xlfxrf.exec:\1xlfxrf.exe83⤵PID:3916
-
\??\c:\nhbntt.exec:\nhbntt.exe84⤵PID:3652
-
\??\c:\bbthnh.exec:\bbthnh.exe85⤵PID:4848
-
\??\c:\hnhbbn.exec:\hnhbbn.exe86⤵PID:4604
-
\??\c:\jdpjp.exec:\jdpjp.exe87⤵PID:2020
-
\??\c:\vpdpp.exec:\vpdpp.exe88⤵PID:4772
-
\??\c:\rlfrrlf.exec:\rlfrrlf.exe89⤵PID:5220
-
\??\c:\rllfrlf.exec:\rllfrlf.exe90⤵PID:1212
-
\??\c:\7lffxxf.exec:\7lffxxf.exe91⤵PID:5648
-
\??\c:\nhhbbt.exec:\nhhbbt.exe92⤵PID:5336
-
\??\c:\hnhbtn.exec:\hnhbtn.exe93⤵PID:5676
-
\??\c:\nbthtn.exec:\nbthtn.exe94⤵PID:5800
-
\??\c:\ddppv.exec:\ddppv.exe95⤵PID:2572
-
\??\c:\jvdvv.exec:\jvdvv.exe96⤵PID:432
-
\??\c:\fxlxlfx.exec:\fxlxlfx.exe97⤵PID:4080
-
\??\c:\xxfrxxl.exec:\xxfrxxl.exe98⤵PID:532
-
\??\c:\bttttt.exec:\bttttt.exe99⤵PID:912
-
\??\c:\nbnbnb.exec:\nbnbnb.exe100⤵PID:5100
-
\??\c:\httnbt.exec:\httnbt.exe101⤵PID:1844
-
\??\c:\pjvdv.exec:\pjvdv.exe102⤵PID:2712
-
\??\c:\pvvjd.exec:\pvvjd.exe103⤵PID:1888
-
\??\c:\7xfrfxl.exec:\7xfrfxl.exe104⤵PID:2316
-
\??\c:\rlrxllx.exec:\rlrxllx.exe105⤵PID:1604
-
\??\c:\7nnhbt.exec:\7nnhbt.exe106⤵PID:1716
-
\??\c:\bbtnhn.exec:\bbtnhn.exe107⤵PID:3512
-
\??\c:\tbnnhb.exec:\tbnnhb.exe108⤵PID:5144
-
\??\c:\pjdvv.exec:\pjdvv.exe109⤵PID:2656
-
\??\c:\vddvv.exec:\vddvv.exe110⤵PID:3016
-
\??\c:\pjjdj.exec:\pjjdj.exe111⤵PID:4908
-
\??\c:\5xrlxrl.exec:\5xrlxrl.exe112⤵PID:5868
-
\??\c:\xxxxrll.exec:\xxxxrll.exe113⤵PID:1856
-
\??\c:\flffflf.exec:\flffflf.exe114⤵PID:2996
-
\??\c:\3thhbh.exec:\3thhbh.exe115⤵PID:5280
-
\??\c:\hhhbhh.exec:\hhhbhh.exe116⤵PID:4528
-
\??\c:\jpjdv.exec:\jpjdv.exe117⤵PID:2952
-
\??\c:\vvpdp.exec:\vvpdp.exe118⤵PID:3520
-
\??\c:\9pvpj.exec:\9pvpj.exe119⤵PID:4608
-
\??\c:\xfllrxx.exec:\xfllrxx.exe120⤵PID:2320
-
\??\c:\lflffxr.exec:\lflffxr.exe121⤵PID:976
-
\??\c:\flfxrrl.exec:\flfxrrl.exe122⤵PID:3240
-
\??\c:\ntnhbt.exec:\ntnhbt.exe123⤵PID:752
-
\??\c:\bthbth.exec:\bthbth.exe124⤵PID:5776
-
\??\c:\7vpjv.exec:\7vpjv.exe125⤵PID:756
-
\??\c:\jddpv.exec:\jddpv.exe126⤵PID:3684
-
\??\c:\vjppj.exec:\vjppj.exe127⤵PID:1404
-
\??\c:\xxrfrxr.exec:\xxrfrxr.exe128⤵PID:5408
-
\??\c:\rffrrll.exec:\rffrrll.exe129⤵PID:2696
-
\??\c:\hnbtnh.exec:\hnbtnh.exe130⤵PID:5416
-
\??\c:\tnbtnh.exec:\tnbtnh.exe131⤵PID:4344
-
\??\c:\5htnbt.exec:\5htnbt.exe132⤵PID:2576
-
\??\c:\jdvjd.exec:\jdvjd.exe133⤵PID:5564
-
\??\c:\dvpjp.exec:\dvpjp.exe134⤵PID:3428
-
\??\c:\jvjvd.exec:\jvjvd.exe135⤵PID:1784
-
\??\c:\7dvjd.exec:\7dvjd.exe136⤵PID:5756
-
\??\c:\xrrlxfx.exec:\xrrlxfx.exe137⤵PID:1576
-
\??\c:\lxfffff.exec:\lxfffff.exe138⤵PID:4516
-
\??\c:\hnbnhb.exec:\hnbnhb.exe139⤵PID:4700
-
\??\c:\nbnnnt.exec:\nbnnnt.exe140⤵PID:4468
-
\??\c:\tbbtnh.exec:\tbbtnh.exe141⤵PID:3828
-
\??\c:\pvddv.exec:\pvddv.exe142⤵PID:4740
-
\??\c:\pjjdd.exec:\pjjdd.exe143⤵PID:4256
-
\??\c:\flfxlfx.exec:\flfxlfx.exe144⤵PID:940
-
\??\c:\xfffffx.exec:\xfffffx.exe145⤵PID:3980
-
\??\c:\xxlffff.exec:\xxlffff.exe146⤵PID:3320
-
\??\c:\hthbtn.exec:\hthbtn.exe147⤵PID:2092
-
\??\c:\hhhtbt.exec:\hhhtbt.exe148⤵PID:1928
-
\??\c:\5vdvj.exec:\5vdvj.exe149⤵PID:5684
-
\??\c:\jjjdd.exec:\jjjdd.exe150⤵PID:1640
-
\??\c:\dvdvv.exec:\dvdvv.exe151⤵PID:5428
-
\??\c:\xrrrxxl.exec:\xrrrxxl.exe152⤵PID:372
-
\??\c:\1fllfxr.exec:\1fllfxr.exe153⤵PID:2248
-
\??\c:\bntnbb.exec:\bntnbb.exe154⤵PID:1992
-
\??\c:\tnhbnh.exec:\tnhbnh.exe155⤵PID:1540
-
\??\c:\vpvdv.exec:\vpvdv.exe156⤵PID:2336
-
\??\c:\pvvpj.exec:\pvvpj.exe157⤵PID:5012
-
\??\c:\llfxrrr.exec:\llfxrrr.exe158⤵PID:4564
-
\??\c:\hbbttt.exec:\hbbttt.exe159⤵PID:5272
-
\??\c:\9bbtht.exec:\9bbtht.exe160⤵PID:2312
-
\??\c:\pjpjd.exec:\pjpjd.exe161⤵PID:4604
-
\??\c:\jvdjd.exec:\jvdjd.exe162⤵PID:5008
-
\??\c:\rffxrrl.exec:\rffxrrl.exe163⤵PID:3760
-
\??\c:\1nhhhh.exec:\1nhhhh.exe164⤵PID:2268
-
\??\c:\bhnbtt.exec:\bhnbtt.exe165⤵PID:5172
-
\??\c:\pppjj.exec:\pppjj.exe166⤵PID:2080
-
\??\c:\jdvpd.exec:\jdvpd.exe167⤵PID:4708
-
\??\c:\vvpjj.exec:\vvpjj.exe168⤵PID:5760
-
\??\c:\rffxrrl.exec:\rffxrrl.exe169⤵PID:5788
-
\??\c:\ffxxxrr.exec:\ffxxxrr.exe170⤵PID:3656
-
\??\c:\htbhbb.exec:\htbhbb.exe171⤵PID:2212
-
\??\c:\nbhhhn.exec:\nbhhhn.exe172⤵PID:4996
-
\??\c:\ntbbtt.exec:\ntbbtt.exe173⤵PID:5032
-
\??\c:\pdvjv.exec:\pdvjv.exe174⤵PID:1852
-
\??\c:\dpjpd.exec:\dpjpd.exe175⤵PID:3776
-
\??\c:\lfrrfff.exec:\lfrrfff.exe176⤵PID:2436
-
\??\c:\xfxxrrl.exec:\xfxxrrl.exe177⤵PID:3204
-
\??\c:\bnhnhh.exec:\bnhnhh.exe178⤵PID:3344
-
\??\c:\9tbbnb.exec:\9tbbnb.exe179⤵PID:1840
-
\??\c:\jdvpv.exec:\jdvpv.exe180⤵PID:1724
-
\??\c:\lxlxllr.exec:\lxlxllr.exe181⤵PID:2552
-
\??\c:\xxxxfxl.exec:\xxxxfxl.exe182⤵PID:1856
-
\??\c:\bttnnn.exec:\bttnnn.exe183⤵PID:6068
-
\??\c:\1tbthh.exec:\1tbthh.exe184⤵PID:4812
-
\??\c:\dvpjj.exec:\dvpjj.exe185⤵PID:1884
-
\??\c:\ppjvv.exec:\ppjvv.exe186⤵PID:2120
-
\??\c:\rrllrll.exec:\rrllrll.exe187⤵PID:5060
-
\??\c:\rrfxlff.exec:\rrfxlff.exe188⤵PID:3244
-
\??\c:\rllfxxl.exec:\rllfxxl.exe189⤵PID:3712
-
\??\c:\ttnnht.exec:\ttnnht.exe190⤵PID:744
-
\??\c:\1dpjd.exec:\1dpjd.exe191⤵PID:876
-
\??\c:\rxrlxxr.exec:\rxrlxxr.exe192⤵PID:3588
-
\??\c:\dddvv.exec:\dddvv.exe193⤵PID:1624
-
\??\c:\vpdpd.exec:\vpdpd.exe194⤵PID:1504
-
\??\c:\lflrlrf.exec:\lflrlrf.exe195⤵PID:3744
-
\??\c:\9htttt.exec:\9htttt.exe196⤵PID:3304
-
\??\c:\jpjvj.exec:\jpjvj.exe197⤵PID:4540
-
\??\c:\lrrlxxr.exec:\lrrlxxr.exe198⤵PID:5732
-
\??\c:\xffflll.exec:\xffflll.exe199⤵PID:5852
-
\??\c:\tbbthb.exec:\tbbthb.exe200⤵PID:2236
-
\??\c:\pvdpp.exec:\pvdpp.exe201⤵PID:5632
-
\??\c:\ppppv.exec:\ppppv.exe202⤵PID:1944
-
\??\c:\fffxxxf.exec:\fffxxxf.exe203⤵PID:3272
-
\??\c:\lxfffll.exec:\lxfffll.exe204⤵PID:1576
-
\??\c:\hbbbtt.exec:\hbbbtt.exe205⤵PID:4476
-
\??\c:\hnnhtt.exec:\hnnhtt.exe206⤵PID:4524
-
\??\c:\jdvdd.exec:\jdvdd.exe207⤵PID:4360
-
\??\c:\7jppp.exec:\7jppp.exe208⤵PID:1176
-
\??\c:\vpvpd.exec:\vpvpd.exe209⤵PID:5964
-
\??\c:\lfxlrlr.exec:\lfxlrlr.exe210⤵PID:4256
-
\??\c:\xxrrrrr.exec:\xxrrrrr.exe211⤵PID:940
-
\??\c:\tnhbtt.exec:\tnhbtt.exe212⤵PID:3980
-
\??\c:\tbbthb.exec:\tbbthb.exe213⤵PID:5348
-
\??\c:\hhbbnn.exec:\hhbbnn.exe214⤵PID:2092
-
\??\c:\7jppj.exec:\7jppj.exe215⤵PID:1928
-
\??\c:\dpvjj.exec:\dpvjj.exe216⤵PID:5608
-
\??\c:\7rrlllf.exec:\7rrlllf.exe217⤵PID:2864
-
\??\c:\rrllfff.exec:\rrllfff.exe218⤵PID:3748
-
\??\c:\nthhnn.exec:\nthhnn.exe219⤵PID:5076
-
\??\c:\nhhbtt.exec:\nhhbtt.exe220⤵PID:4300
-
\??\c:\9djvp.exec:\9djvp.exe221⤵PID:4032
-
\??\c:\jppdp.exec:\jppdp.exe222⤵PID:5804
-
\??\c:\5llfxxr.exec:\5llfxxr.exe223⤵PID:3568
-
\??\c:\xrrrrrl.exec:\xrrrrrl.exe224⤵PID:5876
-
\??\c:\xflrrxf.exec:\xflrrxf.exe225⤵PID:1192
-
\??\c:\hhnhnh.exec:\hhnhnh.exe226⤵PID:3720
-
\??\c:\tthhnt.exec:\tthhnt.exe227⤵PID:1980
-
\??\c:\5jdvp.exec:\5jdvp.exe228⤵PID:2020
-
\??\c:\9xxxlll.exec:\9xxxlll.exe229⤵PID:4148
-
\??\c:\fxrllll.exec:\fxrllll.exe230⤵PID:964
-
\??\c:\tnnnbn.exec:\tnnnbn.exe231⤵PID:384
-
\??\c:\hbbbbb.exec:\hbbbbb.exe232⤵PID:5172
-
\??\c:\vjjdp.exec:\vjjdp.exe233⤵PID:5336
-
\??\c:\vdjjj.exec:\vdjjj.exe234⤵PID:2084
-
\??\c:\rrrflll.exec:\rrrflll.exe235⤵PID:2124
-
\??\c:\lxfffll.exec:\lxfffll.exe236⤵PID:5004
-
\??\c:\btnntb.exec:\btnntb.exe237⤵PID:3656
-
\??\c:\tnnhbb.exec:\tnnhbb.exe238⤵PID:3552
-
\??\c:\dpjpv.exec:\dpjpv.exe239⤵PID:4996
-
\??\c:\dvvpv.exec:\dvvpv.exe240⤵PID:5228
-
\??\c:\fflrflr.exec:\fflrflr.exe241⤵PID:1988
-
\??\c:\3hhbbb.exec:\3hhbbb.exe242⤵PID:2340