Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 04:39
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
d6b571bd3e9b40df1750ab716329eb14b18f07785de8afe5ad89092206eacd3f.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
d6b571bd3e9b40df1750ab716329eb14b18f07785de8afe5ad89092206eacd3f.exe
-
Size
190KB
-
MD5
071a998972f802cc838aa2ef9c6b8870
-
SHA1
55c25028dbdf877176b56208be72aeec79dede4d
-
SHA256
d6b571bd3e9b40df1750ab716329eb14b18f07785de8afe5ad89092206eacd3f
-
SHA512
8b72859259eb1d0074ef5989c8553cb2e4853d8415e81dc46f5c82c895fe973d02cba176a2af34a94a39f47ca92f2f7a87faca2f868d7911545e77eb40830bec
-
SSDEEP
3072:YhOmTsF93UYfwC6GIoutLmxHxae5yLpcgDE4JBuItR8pTsgnKbQFe3+9:Ycm4FmowdHoSLEaTBftapTsyFeO9
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/4404-5-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3960-8-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3988-14-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2600-21-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1372-36-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1180-30-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2308-42-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4960-83-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/440-91-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2504-173-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3728-191-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4488-202-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4044-212-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2676-220-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3564-216-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4936-194-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1616-187-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4860-181-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4856-179-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/976-153-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2564-143-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4644-136-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/968-125-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4292-119-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3708-113-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4472-238-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4444-103-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5116-95-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3788-89-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3844-68-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2884-61-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4732-53-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/972-240-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4528-254-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2600-263-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4508-275-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2904-283-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1696-289-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5104-306-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3928-310-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4708-319-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4708-324-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2068-331-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3228-340-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2192-342-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1900-346-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2768-352-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/64-360-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2336-375-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2680-379-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3440-381-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2628-399-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1644-436-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4408-443-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1596-504-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/976-517-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2552-558-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2544-562-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4732-627-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2804-649-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1596-662-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2536-761-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4688-774-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/916-825-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral2/memory/4404-0-0x0000000000400000-0x0000000000430000-memory.dmp UPX C:\bttttn.exe UPX behavioral2/memory/4404-5-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/3960-8-0x0000000000400000-0x0000000000430000-memory.dmp UPX C:\lffffll.exe UPX behavioral2/memory/3988-14-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/2600-21-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\fxfrrll.exe UPX C:\nbnhhh.exe UPX behavioral2/memory/1372-36-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\nnnnnn.exe UPX behavioral2/memory/1180-30-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\jjvdd.exe UPX C:\jdvpd.exe UPX \??\c:\lxlrrlf.exe UPX behavioral2/memory/2308-42-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\lxrrrll.exe UPX \??\c:\hhnnnn.exe UPX \??\c:\pjvpv.exe UPX \??\c:\pdjdd.exe UPX \??\c:\3xflxxr.exe UPX behavioral2/memory/4960-83-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/440-91-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\jjjdd.exe UPX \??\c:\lxlrrxx.exe UPX \??\c:\xrfxxxx.exe UPX \??\c:\fxxrlll.exe UPX \??\c:\thhnnn.exe UPX behavioral2/memory/2504-173-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/3728-191-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/4488-202-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/4044-212-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/2676-220-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/4472-234-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/3564-216-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/4936-194-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/1616-187-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\9vvvp.exe UPX behavioral2/memory/4860-181-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/4856-179-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\ppppj.exe UPX \??\c:\7dvvp.exe UPX \??\c:\btnnnh.exe UPX \??\c:\flffffl.exe UPX behavioral2/memory/976-153-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\ddjdv.exe UPX behavioral2/memory/2564-143-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\jddvd.exe UPX behavioral2/memory/4644-136-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\tbbhbb.exe UPX \??\c:\nhnnhh.exe UPX behavioral2/memory/968-125-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/4292-119-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/3708-113-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\jjvpd.exe UPX behavioral2/memory/4472-238-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/4444-103-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\tthbtt.exe UPX behavioral2/memory/5116-95-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\bbhbhn.exe UPX behavioral2/memory/3788-89-0x0000000000400000-0x0000000000430000-memory.dmp UPX \??\c:\xllrfff.exe UPX behavioral2/memory/3844-68-0x0000000000400000-0x0000000000430000-memory.dmp UPX behavioral2/memory/2884-61-0x0000000000400000-0x0000000000430000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
bttttn.exejjvdd.exelffffll.exefxfrrll.exenbnhhh.exennnnnn.exejdvpd.exelxlrrlf.exelxrrrll.exettttth.exehhnnnn.exepjvpv.exepdjdd.exe3xflxxr.exexllrfff.exebbhbhn.exetthbtt.exejjvpd.exejjjdd.exelxlrrxx.exexrfxxxx.exenhnnhh.exetbbhbb.exejddvd.exeddjdv.exefxxrlll.exeflffffl.exethhnnn.exebtnnnh.exe7dvvp.exeppppj.exe9vvvp.exeffllfff.exetnhtnn.exetbbbhh.exedpvvv.exejpppp.exefffllff.exerxlrrrr.exelflrrxl.exe9tbbbh.exe3bbbnn.exepjdjd.exejvvvp.exefxxrrxx.exe9thbbh.exebttnnn.exedpddd.exeflffffx.exenhnhhn.exetthnnn.exedpvpp.exefflffxr.exerrrllrl.exe3bhhhh.exehttttt.exevpddd.exepjdvv.exeflrffll.exelfrrlrf.exebbnhhh.exejvvvv.exepjjjj.exeflfllrr.exepid process 3960 bttttn.exe 3988 jjvdd.exe 2600 lffffll.exe 3712 fxfrrll.exe 1180 nbnhhh.exe 1372 nnnnnn.exe 2308 jdvpd.exe 1524 lxlrrlf.exe 4732 lxrrrll.exe 2884 ttttth.exe 3844 hhnnnn.exe 2700 pjvpv.exe 4960 pdjdd.exe 3788 3xflxxr.exe 440 xllrfff.exe 5116 bbhbhn.exe 4444 tthbtt.exe 3708 jjvpd.exe 4292 jjjdd.exe 968 lxlrrxx.exe 1444 xrfxxxx.exe 4644 nhnnhh.exe 4980 tbbhbb.exe 2564 jddvd.exe 976 ddjdv.exe 600 fxxrlll.exe 2208 flffffl.exe 2504 thhnnn.exe 4856 btnnnh.exe 4860 7dvvp.exe 1616 ppppj.exe 3728 9vvvp.exe 4936 ffllfff.exe 2108 tnhtnn.exe 4488 tbbbhh.exe 916 dpvvv.exe 4232 jpppp.exe 4044 fffllff.exe 3564 rxlrrrr.exe 2676 lflrrxl.exe 3248 9tbbbh.exe 2736 3bbbnn.exe 2340 pjdjd.exe 1720 jvvvp.exe 3756 fxxrrxx.exe 4472 9thbbh.exe 972 bttnnn.exe 4212 dpddd.exe 4556 flffffx.exe 4528 nhnhhn.exe 4656 tthnnn.exe 1664 dpvpp.exe 2600 fflffxr.exe 2560 rrrllrl.exe 100 3bhhhh.exe 4508 httttt.exe 1512 vpddd.exe 4384 pjdvv.exe 2904 flrffll.exe 1696 lfrrlrf.exe 2900 bbnhhh.exe 2980 jvvvv.exe 4692 pjjjj.exe 3844 flfllrr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d6b571bd3e9b40df1750ab716329eb14b18f07785de8afe5ad89092206eacd3f.exebttttn.exejjvdd.exelffffll.exefxfrrll.exenbnhhh.exennnnnn.exejdvpd.exelxlrrlf.exelxrrrll.exettttth.exehhnnnn.exepjvpv.exepdjdd.exe3xflxxr.exexllrfff.exebbhbhn.exetthbtt.exejjvpd.exejjjdd.exelxlrrxx.exexrfxxxx.exedescription pid process target process PID 4404 wrote to memory of 3960 4404 d6b571bd3e9b40df1750ab716329eb14b18f07785de8afe5ad89092206eacd3f.exe bttttn.exe PID 4404 wrote to memory of 3960 4404 d6b571bd3e9b40df1750ab716329eb14b18f07785de8afe5ad89092206eacd3f.exe bttttn.exe PID 4404 wrote to memory of 3960 4404 d6b571bd3e9b40df1750ab716329eb14b18f07785de8afe5ad89092206eacd3f.exe bttttn.exe PID 3960 wrote to memory of 3988 3960 bttttn.exe jjvdd.exe PID 3960 wrote to memory of 3988 3960 bttttn.exe jjvdd.exe PID 3960 wrote to memory of 3988 3960 bttttn.exe jjvdd.exe PID 3988 wrote to memory of 2600 3988 jjvdd.exe lffffll.exe PID 3988 wrote to memory of 2600 3988 jjvdd.exe lffffll.exe PID 3988 wrote to memory of 2600 3988 jjvdd.exe lffffll.exe PID 2600 wrote to memory of 3712 2600 lffffll.exe fxfrrll.exe PID 2600 wrote to memory of 3712 2600 lffffll.exe fxfrrll.exe PID 2600 wrote to memory of 3712 2600 lffffll.exe fxfrrll.exe PID 3712 wrote to memory of 1180 3712 fxfrrll.exe nbnhhh.exe PID 3712 wrote to memory of 1180 3712 fxfrrll.exe nbnhhh.exe PID 3712 wrote to memory of 1180 3712 fxfrrll.exe nbnhhh.exe PID 1180 wrote to memory of 1372 1180 nbnhhh.exe nnnnnn.exe PID 1180 wrote to memory of 1372 1180 nbnhhh.exe nnnnnn.exe PID 1180 wrote to memory of 1372 1180 nbnhhh.exe nnnnnn.exe PID 1372 wrote to memory of 2308 1372 nnnnnn.exe jdvpd.exe PID 1372 wrote to memory of 2308 1372 nnnnnn.exe jdvpd.exe PID 1372 wrote to memory of 2308 1372 nnnnnn.exe jdvpd.exe PID 2308 wrote to memory of 1524 2308 jdvpd.exe lxlrrlf.exe PID 2308 wrote to memory of 1524 2308 jdvpd.exe lxlrrlf.exe PID 2308 wrote to memory of 1524 2308 jdvpd.exe lxlrrlf.exe PID 1524 wrote to memory of 4732 1524 lxlrrlf.exe lxrrrll.exe PID 1524 wrote to memory of 4732 1524 lxlrrlf.exe lxrrrll.exe PID 1524 wrote to memory of 4732 1524 lxlrrlf.exe lxrrrll.exe PID 4732 wrote to memory of 2884 4732 lxrrrll.exe ttttth.exe PID 4732 wrote to memory of 2884 4732 lxrrrll.exe ttttth.exe PID 4732 wrote to memory of 2884 4732 lxrrrll.exe ttttth.exe PID 2884 wrote to memory of 3844 2884 ttttth.exe flfllrr.exe PID 2884 wrote to memory of 3844 2884 ttttth.exe flfllrr.exe PID 2884 wrote to memory of 3844 2884 ttttth.exe flfllrr.exe PID 3844 wrote to memory of 2700 3844 hhnnnn.exe pjvpv.exe PID 3844 wrote to memory of 2700 3844 hhnnnn.exe pjvpv.exe PID 3844 wrote to memory of 2700 3844 hhnnnn.exe pjvpv.exe PID 2700 wrote to memory of 4960 2700 pjvpv.exe pdjdd.exe PID 2700 wrote to memory of 4960 2700 pjvpv.exe pdjdd.exe PID 2700 wrote to memory of 4960 2700 pjvpv.exe pdjdd.exe PID 4960 wrote to memory of 3788 4960 pdjdd.exe 3xflxxr.exe PID 4960 wrote to memory of 3788 4960 pdjdd.exe 3xflxxr.exe PID 4960 wrote to memory of 3788 4960 pdjdd.exe 3xflxxr.exe PID 3788 wrote to memory of 440 3788 3xflxxr.exe xllrfff.exe PID 3788 wrote to memory of 440 3788 3xflxxr.exe xllrfff.exe PID 3788 wrote to memory of 440 3788 3xflxxr.exe xllrfff.exe PID 440 wrote to memory of 5116 440 xllrfff.exe bbhbhn.exe PID 440 wrote to memory of 5116 440 xllrfff.exe bbhbhn.exe PID 440 wrote to memory of 5116 440 xllrfff.exe bbhbhn.exe PID 5116 wrote to memory of 4444 5116 bbhbhn.exe tthbtt.exe PID 5116 wrote to memory of 4444 5116 bbhbhn.exe tthbtt.exe PID 5116 wrote to memory of 4444 5116 bbhbhn.exe tthbtt.exe PID 4444 wrote to memory of 3708 4444 tthbtt.exe jjvpd.exe PID 4444 wrote to memory of 3708 4444 tthbtt.exe jjvpd.exe PID 4444 wrote to memory of 3708 4444 tthbtt.exe jjvpd.exe PID 3708 wrote to memory of 4292 3708 jjvpd.exe jjjdd.exe PID 3708 wrote to memory of 4292 3708 jjvpd.exe jjjdd.exe PID 3708 wrote to memory of 4292 3708 jjvpd.exe jjjdd.exe PID 4292 wrote to memory of 968 4292 jjjdd.exe lxlrrxx.exe PID 4292 wrote to memory of 968 4292 jjjdd.exe lxlrrxx.exe PID 4292 wrote to memory of 968 4292 jjjdd.exe lxlrrxx.exe PID 968 wrote to memory of 1444 968 lxlrrxx.exe xrfxxxx.exe PID 968 wrote to memory of 1444 968 lxlrrxx.exe xrfxxxx.exe PID 968 wrote to memory of 1444 968 lxlrrxx.exe xrfxxxx.exe PID 1444 wrote to memory of 4644 1444 xrfxxxx.exe nhnnhh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6b571bd3e9b40df1750ab716329eb14b18f07785de8afe5ad89092206eacd3f.exe"C:\Users\Admin\AppData\Local\Temp\d6b571bd3e9b40df1750ab716329eb14b18f07785de8afe5ad89092206eacd3f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
\??\c:\bttttn.exec:\bttttn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
\??\c:\jjvdd.exec:\jjvdd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
\??\c:\lffffll.exec:\lffffll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\fxfrrll.exec:\fxfrrll.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
\??\c:\nbnhhh.exec:\nbnhhh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
\??\c:\nnnnnn.exec:\nnnnnn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\jdvpd.exec:\jdvpd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\lxlrrlf.exec:\lxlrrlf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
\??\c:\lxrrrll.exec:\lxrrrll.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
\??\c:\ttttth.exec:\ttttth.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\hhnnnn.exec:\hhnnnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3844 -
\??\c:\pjvpv.exec:\pjvpv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\pdjdd.exec:\pdjdd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
\??\c:\3xflxxr.exec:\3xflxxr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
\??\c:\xllrfff.exec:\xllrfff.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
\??\c:\bbhbhn.exec:\bbhbhn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
\??\c:\tthbtt.exec:\tthbtt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
\??\c:\jjvpd.exec:\jjvpd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
\??\c:\jjjdd.exec:\jjjdd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
\??\c:\lxlrrxx.exec:\lxlrrxx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
\??\c:\xrfxxxx.exec:\xrfxxxx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1444 -
\??\c:\nhnnhh.exec:\nhnnhh.exe23⤵
- Executes dropped EXE
PID:4644 -
\??\c:\tbbhbb.exec:\tbbhbb.exe24⤵
- Executes dropped EXE
PID:4980 -
\??\c:\jddvd.exec:\jddvd.exe25⤵
- Executes dropped EXE
PID:2564 -
\??\c:\ddjdv.exec:\ddjdv.exe26⤵
- Executes dropped EXE
PID:976 -
\??\c:\fxxrlll.exec:\fxxrlll.exe27⤵
- Executes dropped EXE
PID:600 -
\??\c:\flffffl.exec:\flffffl.exe28⤵
- Executes dropped EXE
PID:2208 -
\??\c:\thhnnn.exec:\thhnnn.exe29⤵
- Executes dropped EXE
PID:2504 -
\??\c:\btnnnh.exec:\btnnnh.exe30⤵
- Executes dropped EXE
PID:4856 -
\??\c:\7dvvp.exec:\7dvvp.exe31⤵
- Executes dropped EXE
PID:4860 -
\??\c:\ppppj.exec:\ppppj.exe32⤵
- Executes dropped EXE
PID:1616 -
\??\c:\9vvvp.exec:\9vvvp.exe33⤵
- Executes dropped EXE
PID:3728 -
\??\c:\ffllfff.exec:\ffllfff.exe34⤵
- Executes dropped EXE
PID:4936 -
\??\c:\tnhtnn.exec:\tnhtnn.exe35⤵
- Executes dropped EXE
PID:2108 -
\??\c:\tbbbhh.exec:\tbbbhh.exe36⤵
- Executes dropped EXE
PID:4488 -
\??\c:\dpvvv.exec:\dpvvv.exe37⤵
- Executes dropped EXE
PID:916 -
\??\c:\jpppp.exec:\jpppp.exe38⤵
- Executes dropped EXE
PID:4232 -
\??\c:\fffllff.exec:\fffllff.exe39⤵
- Executes dropped EXE
PID:4044 -
\??\c:\rxlrrrr.exec:\rxlrrrr.exe40⤵
- Executes dropped EXE
PID:3564 -
\??\c:\lflrrxl.exec:\lflrrxl.exe41⤵
- Executes dropped EXE
PID:2676 -
\??\c:\9tbbbh.exec:\9tbbbh.exe42⤵
- Executes dropped EXE
PID:3248 -
\??\c:\3bbbnn.exec:\3bbbnn.exe43⤵
- Executes dropped EXE
PID:2736 -
\??\c:\pjdjd.exec:\pjdjd.exe44⤵
- Executes dropped EXE
PID:2340 -
\??\c:\jvvvp.exec:\jvvvp.exe45⤵
- Executes dropped EXE
PID:1720 -
\??\c:\fxxrrxx.exec:\fxxrrxx.exe46⤵
- Executes dropped EXE
PID:3756 -
\??\c:\9thbbh.exec:\9thbbh.exe47⤵
- Executes dropped EXE
PID:4472 -
\??\c:\bttnnn.exec:\bttnnn.exe48⤵
- Executes dropped EXE
PID:972 -
\??\c:\dpddd.exec:\dpddd.exe49⤵
- Executes dropped EXE
PID:4212 -
\??\c:\flffffx.exec:\flffffx.exe50⤵
- Executes dropped EXE
PID:4556 -
\??\c:\nhnhhn.exec:\nhnhhn.exe51⤵
- Executes dropped EXE
PID:4528 -
\??\c:\tthnnn.exec:\tthnnn.exe52⤵
- Executes dropped EXE
PID:4656 -
\??\c:\dpvpp.exec:\dpvpp.exe53⤵
- Executes dropped EXE
PID:1664 -
\??\c:\fflffxr.exec:\fflffxr.exe54⤵
- Executes dropped EXE
PID:2600 -
\??\c:\rrrllrl.exec:\rrrllrl.exe55⤵
- Executes dropped EXE
PID:2560 -
\??\c:\3bhhhh.exec:\3bhhhh.exe56⤵
- Executes dropped EXE
PID:100 -
\??\c:\httttt.exec:\httttt.exe57⤵
- Executes dropped EXE
PID:4508 -
\??\c:\vpddd.exec:\vpddd.exe58⤵
- Executes dropped EXE
PID:1512 -
\??\c:\pjdvv.exec:\pjdvv.exe59⤵
- Executes dropped EXE
PID:4384 -
\??\c:\flrffll.exec:\flrffll.exe60⤵
- Executes dropped EXE
PID:2904 -
\??\c:\lfrrlrf.exec:\lfrrlrf.exe61⤵
- Executes dropped EXE
PID:1696 -
\??\c:\bbnhhh.exec:\bbnhhh.exe62⤵
- Executes dropped EXE
PID:2900 -
\??\c:\jvvvv.exec:\jvvvv.exe63⤵
- Executes dropped EXE
PID:2980 -
\??\c:\pjjjj.exec:\pjjjj.exe64⤵
- Executes dropped EXE
PID:4692 -
\??\c:\flfllrr.exec:\flfllrr.exe65⤵
- Executes dropped EXE
PID:3844 -
\??\c:\rlxrlfr.exec:\rlxrlfr.exe66⤵PID:3992
-
\??\c:\hbnntt.exec:\hbnntt.exe67⤵PID:5104
-
\??\c:\vjpvv.exec:\vjpvv.exe68⤵PID:3928
-
\??\c:\vvdpj.exec:\vvdpj.exe69⤵PID:3688
-
\??\c:\5xlffxl.exec:\5xlffxl.exe70⤵PID:4792
-
\??\c:\3hhbtn.exec:\3hhbtn.exe71⤵PID:4708
-
\??\c:\1djpj.exec:\1djpj.exe72⤵PID:4468
-
\??\c:\lflfxxr.exec:\lflfxxr.exe73⤵PID:4496
-
\??\c:\xrfxrrl.exec:\xrfxrrl.exe74⤵PID:2068
-
\??\c:\btbbtt.exec:\btbbtt.exe75⤵PID:5048
-
\??\c:\jdjdv.exec:\jdjdv.exe76⤵PID:3228
-
\??\c:\3dddv.exec:\3dddv.exe77⤵PID:2192
-
\??\c:\llffflf.exec:\llffflf.exe78⤵PID:1900
-
\??\c:\llrfflf.exec:\llrfflf.exe79⤵PID:2768
-
\??\c:\tnnnnn.exec:\tnnnnn.exe80⤵PID:3720
-
\??\c:\ffffxxr.exec:\ffffxxr.exe81⤵PID:4328
-
\??\c:\btthbh.exec:\btthbh.exe82⤵PID:64
-
\??\c:\tnnnnb.exec:\tnnnnb.exe83⤵PID:3172
-
\??\c:\jdpjv.exec:\jdpjv.exe84⤵PID:2108
-
\??\c:\9llllrr.exec:\9llllrr.exe85⤵PID:4424
-
\??\c:\xlrrrrr.exec:\xlrrrrr.exe86⤵PID:2336
-
\??\c:\nnbtnn.exec:\nnbtnn.exe87⤵PID:2680
-
\??\c:\vpjdp.exec:\vpjdp.exe88⤵PID:3440
-
\??\c:\vdppd.exec:\vdppd.exe89⤵PID:3012
-
\??\c:\frfxrrr.exec:\frfxrrr.exe90⤵PID:4756
-
\??\c:\xxffllx.exec:\xxffllx.exe91⤵PID:1020
-
\??\c:\bbnntb.exec:\bbnntb.exe92⤵PID:432
-
\??\c:\vvdvp.exec:\vvdvp.exe93⤵PID:2628
-
\??\c:\ppjpv.exec:\ppjpv.exe94⤵PID:216
-
\??\c:\xllllll.exec:\xllllll.exe95⤵PID:3484
-
\??\c:\xxrrffl.exec:\xxrrffl.exe96⤵PID:2704
-
\??\c:\hhtbbh.exec:\hhtbbh.exe97⤵PID:1928
-
\??\c:\nhhbbb.exec:\nhhbbb.exe98⤵PID:1720
-
\??\c:\vvvpv.exec:\vvvpv.exe99⤵PID:4968
-
\??\c:\9flrlrf.exec:\9flrlrf.exe100⤵PID:3572
-
\??\c:\ffxlrfr.exec:\ffxlrfr.exe101⤵PID:780
-
\??\c:\tnbttt.exec:\tnbttt.exe102⤵PID:4404
-
\??\c:\jjppp.exec:\jjppp.exe103⤵PID:568
-
\??\c:\7jvvp.exec:\7jvvp.exe104⤵PID:4204
-
\??\c:\lfrrrrx.exec:\lfrrrrx.exe105⤵PID:1644
-
\??\c:\xrllffr.exec:\xrllffr.exe106⤵PID:1664
-
\??\c:\thhnbn.exec:\thhnbn.exe107⤵PID:4408
-
\??\c:\7vdpp.exec:\7vdpp.exe108⤵PID:1180
-
\??\c:\pjdvj.exec:\pjdvj.exe109⤵PID:3612
-
\??\c:\ffxxrxx.exec:\ffxxrxx.exe110⤵PID:1336
-
\??\c:\bnnnnt.exec:\bnnnnt.exe111⤵PID:2572
-
\??\c:\hbhhhh.exec:\hbhhhh.exe112⤵PID:2904
-
\??\c:\vdjvp.exec:\vdjvp.exe113⤵PID:3936
-
\??\c:\dvddv.exec:\dvddv.exe114⤵PID:4904
-
\??\c:\xrfrlll.exec:\xrfrlll.exe115⤵PID:3436
-
\??\c:\rlfllll.exec:\rlfllll.exe116⤵PID:3900
-
\??\c:\thnbhn.exec:\thnbhn.exe117⤵PID:2568
-
\??\c:\hbhhhn.exec:\hbhhhn.exe118⤵PID:436
-
\??\c:\pjvvv.exec:\pjvvv.exe119⤵PID:3508
-
\??\c:\9lfxrrl.exec:\9lfxrrl.exe120⤵PID:2692
-
\??\c:\hbhhnn.exec:\hbhhnn.exe121⤵PID:1632
-
\??\c:\btbnbb.exec:\btbnbb.exe122⤵PID:4736
-
\??\c:\pvvvj.exec:\pvvvj.exe123⤵PID:3816
-
\??\c:\lxrrrll.exec:\lxrrrll.exe124⤵PID:3216
-
\??\c:\xflrllr.exec:\xflrllr.exe125⤵PID:4608
-
\??\c:\bbhhhh.exec:\bbhhhh.exe126⤵PID:3764
-
\??\c:\jdjjj.exec:\jdjjj.exe127⤵PID:1596
-
\??\c:\pjddd.exec:\pjddd.exe128⤵PID:1548
-
\??\c:\xxfxxfx.exec:\xxfxxfx.exe129⤵PID:1716
-
\??\c:\nbnthh.exec:\nbnthh.exe130⤵PID:4604
-
\??\c:\hntnbt.exec:\hntnbt.exe131⤵PID:976
-
\??\c:\pjdvp.exec:\pjdvp.exe132⤵PID:1908
-
\??\c:\1xxxxff.exec:\1xxxxff.exe133⤵PID:1808
-
\??\c:\thtnbt.exec:\thtnbt.exe134⤵PID:4896
-
\??\c:\ttbthh.exec:\ttbthh.exe135⤵PID:1616
-
\??\c:\jdjjp.exec:\jdjjp.exe136⤵PID:1748
-
\??\c:\pdvvv.exec:\pdvvv.exe137⤵PID:3524
-
\??\c:\pdppj.exec:\pdppj.exe138⤵PID:2304
-
\??\c:\xrrrrrr.exec:\xrrrrrr.exe139⤵PID:4176
-
\??\c:\7xffxfx.exec:\7xffxfx.exe140⤵PID:2104
-
\??\c:\9tbhbb.exec:\9tbhbb.exe141⤵PID:2188
-
\??\c:\3pppj.exec:\3pppj.exe142⤵PID:4784
-
\??\c:\1lflfrr.exec:\1lflfrr.exe143⤵PID:2552
-
\??\c:\jjvvj.exec:\jjvvj.exe144⤵PID:4648
-
\??\c:\pdjpp.exec:\pdjpp.exe145⤵PID:2544
-
\??\c:\xxrrllr.exec:\xxrrllr.exe146⤵PID:2256
-
\??\c:\hthbbh.exec:\hthbbh.exe147⤵PID:3528
-
\??\c:\hthbbb.exec:\hthbbb.exe148⤵PID:1712
-
\??\c:\dvddd.exec:\dvddd.exe149⤵PID:216
-
\??\c:\fxrrrrr.exec:\fxrrrrr.exe150⤵PID:220
-
\??\c:\rrxrrrr.exec:\rrxrrrr.exe151⤵PID:4128
-
\??\c:\tnbhhn.exec:\tnbhhn.exe152⤵PID:4548
-
\??\c:\dvvpj.exec:\dvvpj.exe153⤵PID:4344
-
\??\c:\rllllff.exec:\rllllff.exe154⤵PID:4484
-
\??\c:\fxlllrl.exec:\fxlllrl.exe155⤵PID:4524
-
\??\c:\bbtttb.exec:\bbtttb.exe156⤵PID:3692
-
\??\c:\ddddd.exec:\ddddd.exe157⤵PID:3988
-
\??\c:\xlflfll.exec:\xlflfll.exe158⤵PID:1156
-
\??\c:\lflrrll.exec:\lflrrll.exe159⤵PID:4260
-
\??\c:\dvdvv.exec:\dvdvv.exe160⤵PID:4520
-
\??\c:\jjpdv.exec:\jjpdv.exe161⤵PID:508
-
\??\c:\1llllll.exec:\1llllll.exe162⤵PID:4508
-
\??\c:\xxlllrl.exec:\xxlllrl.exe163⤵PID:1512
-
\??\c:\bbnnhn.exec:\bbnnhn.exe164⤵PID:3616
-
\??\c:\3pvdv.exec:\3pvdv.exe165⤵PID:4732
-
\??\c:\9djpj.exec:\9djpj.exe166⤵PID:1696
-
\??\c:\frxxxrf.exec:\frxxxrf.exe167⤵PID:3428
-
\??\c:\5xllxxf.exec:\5xllxxf.exe168⤵PID:4692
-
\??\c:\htbttt.exec:\htbttt.exe169⤵PID:4960
-
\??\c:\bthhtb.exec:\bthhtb.exe170⤵PID:932
-
\??\c:\5vdjp.exec:\5vdjp.exe171⤵PID:3688
-
\??\c:\rrlfxrr.exec:\rrlfxrr.exe172⤵PID:2804
-
\??\c:\xrrlfff.exec:\xrrlfff.exe173⤵PID:3816
-
\??\c:\tbttbh.exec:\tbttbh.exe174⤵PID:3216
-
\??\c:\tntnbh.exec:\tntnbh.exe175⤵PID:3268
-
\??\c:\jpvpd.exec:\jpvpd.exe176⤵PID:1596
-
\??\c:\djjdv.exec:\djjdv.exe177⤵PID:4672
-
\??\c:\3lllfrf.exec:\3lllfrf.exe178⤵PID:976
-
\??\c:\ffrrrxx.exec:\ffrrrxx.exe179⤵PID:4248
-
\??\c:\htbbbh.exec:\htbbbh.exe180⤵PID:1608
-
\??\c:\nbtbbb.exec:\nbtbbb.exe181⤵PID:2504
-
\??\c:\pppvd.exec:\pppvd.exe182⤵PID:2784
-
\??\c:\fxlfflr.exec:\fxlfflr.exe183⤵PID:3172
-
\??\c:\1fxxxxx.exec:\1fxxxxx.exe184⤵PID:4988
-
\??\c:\bthhnn.exec:\bthhnn.exe185⤵PID:4176
-
\??\c:\vjpvp.exec:\vjpvp.exe186⤵PID:412
-
\??\c:\pjjjv.exec:\pjjjv.exe187⤵PID:3440
-
\??\c:\ffrxrxx.exec:\ffrxrxx.exe188⤵PID:4976
-
\??\c:\rlxrrrr.exec:\rlxrrrr.exe189⤵PID:3716
-
\??\c:\bhtttb.exec:\bhtttb.exe190⤵PID:3676
-
\??\c:\nthhbb.exec:\nthhbb.exe191⤵PID:2928
-
\??\c:\1vjjd.exec:\1vjjd.exe192⤵PID:2628
-
\??\c:\1jddd.exec:\1jddd.exe193⤵PID:4376
-
\??\c:\lxxflrr.exec:\lxxflrr.exe194⤵PID:216
-
\??\c:\xrxxrff.exec:\xrxxrff.exe195⤵PID:3652
-
\??\c:\nnnnhn.exec:\nnnnhn.exe196⤵PID:1720
-
\??\c:\bbnbth.exec:\bbnbth.exe197⤵PID:3792
-
\??\c:\pdppd.exec:\pdppd.exe198⤵PID:4364
-
\??\c:\jdddd.exec:\jdddd.exe199⤵PID:4404
-
\??\c:\fxrrfrr.exec:\fxrrfrr.exe200⤵PID:4924
-
\??\c:\fflxxxx.exec:\fflxxxx.exe201⤵PID:1304
-
\??\c:\htbnhh.exec:\htbnhh.exe202⤵PID:4204
-
\??\c:\9bbbtb.exec:\9bbbtb.exe203⤵PID:316
-
\??\c:\jvppp.exec:\jvppp.exe204⤵PID:3008
-
\??\c:\jvvvv.exec:\jvvvv.exe205⤵PID:508
-
\??\c:\ffrlflf.exec:\ffrlflf.exe206⤵PID:1336
-
\??\c:\fxflfll.exec:\fxflfll.exe207⤵PID:3512
-
\??\c:\nhhtnt.exec:\nhhtnt.exe208⤵PID:2536
-
\??\c:\jvddv.exec:\jvddv.exe209⤵PID:2700
-
\??\c:\ppdvj.exec:\ppdvj.exe210⤵PID:4268
-
\??\c:\xxflfff.exec:\xxflfff.exe211⤵PID:5076
-
\??\c:\hhhtnb.exec:\hhhtnb.exe212⤵PID:4688
-
\??\c:\httttb.exec:\httttb.exe213⤵PID:4444
-
\??\c:\5pdpj.exec:\5pdpj.exe214⤵PID:3928
-
\??\c:\lxxxrll.exec:\lxxxrll.exe215⤵PID:4708
-
\??\c:\9llxrlx.exec:\9llxrlx.exe216⤵PID:4744
-
\??\c:\hhbtnt.exec:\hhbtnt.exe217⤵PID:3764
-
\??\c:\hnnttt.exec:\hnnttt.exe218⤵PID:1840
-
\??\c:\jjpjd.exec:\jjpjd.exe219⤵PID:3656
-
\??\c:\lffxrrr.exec:\lffxrrr.exe220⤵PID:1900
-
\??\c:\hbnnhh.exec:\hbnnhh.exe221⤵PID:2208
-
\??\c:\tnnnnn.exec:\tnnnnn.exe222⤵PID:3292
-
\??\c:\vvppj.exec:\vvppj.exe223⤵PID:2224
-
\??\c:\9ppdp.exec:\9ppdp.exe224⤵PID:2504
-
\??\c:\rxfxlfl.exec:\rxfxlfl.exe225⤵PID:2784
-
\??\c:\jddpj.exec:\jddpj.exe226⤵PID:3172
-
\??\c:\rlxfxrr.exec:\rlxfxrr.exe227⤵PID:916
-
\??\c:\bhnnnn.exec:\bhnnnn.exe228⤵PID:600
-
\??\c:\pjdvd.exec:\pjdvd.exe229⤵PID:2188
-
\??\c:\pjvdd.exec:\pjvdd.exe230⤵PID:2320
-
\??\c:\bbhtnn.exec:\bbhtnn.exe231⤵PID:3440
-
\??\c:\jvjjd.exec:\jvjjd.exe232⤵PID:4976
-
\??\c:\ppppj.exec:\ppppj.exe233⤵PID:3716
-
\??\c:\3rrrrxx.exec:\3rrrrxx.exe234⤵PID:3676
-
\??\c:\bntttt.exec:\bntttt.exe235⤵PID:2928
-
\??\c:\nnttth.exec:\nnttth.exe236⤵PID:2760
-
\??\c:\vvddd.exec:\vvddd.exe237⤵PID:1928
-
\??\c:\vdpjd.exec:\vdpjd.exe238⤵PID:4764
-
\??\c:\rrfxrrx.exec:\rrfxrrx.exe239⤵PID:4968
-
\??\c:\thnnhn.exec:\thnnhn.exe240⤵PID:4344
-
\??\c:\djvpj.exec:\djvpj.exe241⤵PID:780
-
\??\c:\flxrfxx.exec:\flxrfxx.exe242⤵PID:4492