Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 02:03
Behavioral task
behavioral1
Sample
9fa6d23212a6c8089f5c5aa05d2057bd96e5a4800a7eccc9ce82736ae2b920b4.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
9fa6d23212a6c8089f5c5aa05d2057bd96e5a4800a7eccc9ce82736ae2b920b4.exe
-
Size
93KB
-
MD5
8d3e508a0260c485950b61ab87c01e14
-
SHA1
e6670f99c9d997e8538be955355f045e6b7e1cf3
-
SHA256
9fa6d23212a6c8089f5c5aa05d2057bd96e5a4800a7eccc9ce82736ae2b920b4
-
SHA512
d5835cb6fb6af8308ab660492e2e16c86f4f40180d81fbfd087f07e2d075dd337e06ebf8a23e9351b15808af0d850a5853f2aa571905b130ffdc1fde38dc6929
-
SSDEEP
1536:8vQBeOGtrYS3srx93UBWfwC6Ggnouy80fg3Cip8iXAsG5M0u5YoWprC4:8hOmTsF93UYfwC6GIout0fmCiiiXA6mz
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/3248-9-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4080-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2612-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3256-21-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4804-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4820-32-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/812-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4596-41-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2160-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4992-51-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4024-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/848-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/848-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3676-70-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2616-94-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2500-99-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4488-104-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3512-113-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/944-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2508-121-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4684-128-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1584-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4928-143-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4552-62-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3992-152-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/968-157-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4412-161-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4884-164-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1836-173-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3220-182-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4260-186-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4892-195-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4964-198-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4616-201-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2168-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4432-217-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4200-225-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4540-227-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1640-234-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3132-237-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1404-245-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1456-262-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2424-265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5040-268-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2304-270-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1008-277-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3008-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3220-317-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/644-324-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2776-343-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1784-345-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3528-359-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4584-368-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2500-377-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1428-383-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2036-410-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2396-420-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2340-454-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/912-461-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4320-483-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1008-499-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1692-528-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3736-555-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1716-596-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
bnttnh.exejjpjv.exerfrrlrr.exehtbbbn.exe1rrfxxr.exebhhttb.exebttbbh.exepvppj.exeffrxxxf.exerffffff.exebtbnht.exepvjdp.exedppjj.exe9lxlffx.exexrrffrx.exetbbthb.exeddjjj.exepjdvp.exelflfrxl.exe7tnbth.exeddvjp.exellxxxfl.exettnhnh.exe1pppp.exevpjvv.exefrlllxx.exebthhbt.exedpvvv.exe5vjpd.exelxlffff.exehnbhnh.exevvdvj.exexlfxffx.exethnhnt.exejvddd.exejjvvd.exelfrxfrl.exelfrxlxr.exehhnntt.exedddvv.exevdjdd.exerrxfflf.exehttntn.exenbhbhn.exejvdjj.exerflfflf.exelxlfxff.exehtnhtn.exejvvdj.exepdjdp.exexxffxfl.exelxffxxx.exe9hnhtt.exepjdvp.exevjpjv.exexfrxxxf.exethbtbb.exevpjvj.exevvjjp.exeflrxfff.exelrxxflr.exetbnntt.exejppjj.exe1dppd.exepid process 3248 bnttnh.exe 2612 jjpjv.exe 3256 rfrrlrr.exe 4804 htbbbn.exe 4820 1rrfxxr.exe 812 bhhttb.exe 4596 bttbbh.exe 2160 pvppj.exe 4992 ffrxxxf.exe 4024 rffffff.exe 4552 btbnht.exe 848 pvjdp.exe 3676 dppjj.exe 2816 9lxlffx.exe 4812 xrrffrx.exe 3720 tbbthb.exe 1584 ddjjj.exe 2616 pjdvp.exe 2500 lflfrxl.exe 4488 7tnbth.exe 2352 ddvjp.exe 3512 llxxxfl.exe 944 ttnhnh.exe 2508 1pppp.exe 4684 vpjvv.exe 396 frlllxx.exe 2000 bthhbt.exe 4928 dpvvv.exe 2676 5vjpd.exe 3992 lxlffff.exe 968 hnbhnh.exe 4412 vvdvj.exe 4884 xlfxffx.exe 2280 thnhnt.exe 3572 jvddd.exe 232 jjvvd.exe 1836 lfrxfrl.exe 936 lfrxlxr.exe 4616 hhnntt.exe 1900 dddvv.exe 3220 vdjdd.exe 4260 rrxfflf.exe 3116 httntn.exe 3956 nbhbhn.exe 2612 jvdjj.exe 4892 rflfflf.exe 4964 lxlfxff.exe 2456 htnhtn.exe 4204 jvvdj.exe 1960 pdjdp.exe 2168 xxffxfl.exe 4424 lxffxxx.exe 2160 9hnhtt.exe 4432 pjdvp.exe 3624 vjpjv.exe 3504 xfrxxxf.exe 4200 thbtbb.exe 4540 vpjvj.exe 3552 vvjjp.exe 1640 flrxfff.exe 3132 lrxxflr.exe 2804 tbnntt.exe 1424 jppjj.exe 1200 1dppd.exe -
Processes:
resource yara_rule behavioral2/memory/4080-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bnttnh.exe upx behavioral2/memory/3248-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3248-9-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4080-6-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jjpjv.exe upx C:\rfrrlrr.exe upx behavioral2/memory/2612-16-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3256-17-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\htbbbn.exe upx behavioral2/memory/3256-21-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4804-25-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1rrfxxr.exe upx C:\bhhttb.exe upx behavioral2/memory/4820-32-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\bttbbh.exe upx behavioral2/memory/812-36-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4596-41-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pvppj.exe upx \??\c:\ffrxxxf.exe upx behavioral2/memory/2160-47-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rffffff.exe upx behavioral2/memory/4992-51-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\btbnht.exe upx behavioral2/memory/4024-54-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pvjdp.exe upx behavioral2/memory/848-63-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/848-68-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\dppjj.exe upx \??\c:\9lxlffx.exe upx \??\c:\xrrffrx.exe upx \??\c:\tbbthb.exe upx behavioral2/memory/3676-70-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\ddjjj.exe upx C:\lflfrxl.exe upx behavioral2/memory/2616-94-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\pjdvp.exe upx behavioral2/memory/2500-99-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\7tnbth.exe upx \??\c:\ddvjp.exe upx behavioral2/memory/4488-104-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\llxxxfl.exe upx C:\ttnhnh.exe upx behavioral2/memory/3512-113-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1pppp.exe upx behavioral2/memory/944-119-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2508-121-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\vpjvv.exe upx \??\c:\frlllxx.exe upx behavioral2/memory/4684-128-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bthhbt.exe upx behavioral2/memory/2000-134-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dpvvv.exe upx behavioral2/memory/1584-86-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5vjpd.exe upx behavioral2/memory/4928-143-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4552-62-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lxlffff.exe upx C:\hnbhnh.exe upx behavioral2/memory/3992-152-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/968-153-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vvdvj.exe upx behavioral2/memory/968-157-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4412-161-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9fa6d23212a6c8089f5c5aa05d2057bd96e5a4800a7eccc9ce82736ae2b920b4.exebnttnh.exejjpjv.exerfrrlrr.exehtbbbn.exe1rrfxxr.exebhhttb.exebttbbh.exepvppj.exeffrxxxf.exerffffff.exebtbnht.exepvjdp.exedppjj.exe9lxlffx.exexrrffrx.exetbbthb.exeddjjj.exepjdvp.exelflfrxl.exe7tnbth.exeddvjp.exedescription pid process target process PID 4080 wrote to memory of 3248 4080 9fa6d23212a6c8089f5c5aa05d2057bd96e5a4800a7eccc9ce82736ae2b920b4.exe bnttnh.exe PID 4080 wrote to memory of 3248 4080 9fa6d23212a6c8089f5c5aa05d2057bd96e5a4800a7eccc9ce82736ae2b920b4.exe bnttnh.exe PID 4080 wrote to memory of 3248 4080 9fa6d23212a6c8089f5c5aa05d2057bd96e5a4800a7eccc9ce82736ae2b920b4.exe bnttnh.exe PID 3248 wrote to memory of 2612 3248 bnttnh.exe jjpjv.exe PID 3248 wrote to memory of 2612 3248 bnttnh.exe jjpjv.exe PID 3248 wrote to memory of 2612 3248 bnttnh.exe jjpjv.exe PID 2612 wrote to memory of 3256 2612 jjpjv.exe rfrrlrr.exe PID 2612 wrote to memory of 3256 2612 jjpjv.exe rfrrlrr.exe PID 2612 wrote to memory of 3256 2612 jjpjv.exe rfrrlrr.exe PID 3256 wrote to memory of 4804 3256 rfrrlrr.exe htbbbn.exe PID 3256 wrote to memory of 4804 3256 rfrrlrr.exe htbbbn.exe PID 3256 wrote to memory of 4804 3256 rfrrlrr.exe htbbbn.exe PID 4804 wrote to memory of 4820 4804 htbbbn.exe 1rrfxxr.exe PID 4804 wrote to memory of 4820 4804 htbbbn.exe 1rrfxxr.exe PID 4804 wrote to memory of 4820 4804 htbbbn.exe 1rrfxxr.exe PID 4820 wrote to memory of 812 4820 1rrfxxr.exe bhhttb.exe PID 4820 wrote to memory of 812 4820 1rrfxxr.exe bhhttb.exe PID 4820 wrote to memory of 812 4820 1rrfxxr.exe bhhttb.exe PID 812 wrote to memory of 4596 812 bhhttb.exe bttbbh.exe PID 812 wrote to memory of 4596 812 bhhttb.exe bttbbh.exe PID 812 wrote to memory of 4596 812 bhhttb.exe bttbbh.exe PID 4596 wrote to memory of 2160 4596 bttbbh.exe 9hnhtt.exe PID 4596 wrote to memory of 2160 4596 bttbbh.exe 9hnhtt.exe PID 4596 wrote to memory of 2160 4596 bttbbh.exe 9hnhtt.exe PID 2160 wrote to memory of 4992 2160 pvppj.exe ffrxxxf.exe PID 2160 wrote to memory of 4992 2160 pvppj.exe ffrxxxf.exe PID 2160 wrote to memory of 4992 2160 pvppj.exe ffrxxxf.exe PID 4992 wrote to memory of 4024 4992 ffrxxxf.exe rffffff.exe PID 4992 wrote to memory of 4024 4992 ffrxxxf.exe rffffff.exe PID 4992 wrote to memory of 4024 4992 ffrxxxf.exe rffffff.exe PID 4024 wrote to memory of 4552 4024 rffffff.exe btbnht.exe PID 4024 wrote to memory of 4552 4024 rffffff.exe btbnht.exe PID 4024 wrote to memory of 4552 4024 rffffff.exe btbnht.exe PID 4552 wrote to memory of 848 4552 btbnht.exe pvjdp.exe PID 4552 wrote to memory of 848 4552 btbnht.exe pvjdp.exe PID 4552 wrote to memory of 848 4552 btbnht.exe pvjdp.exe PID 848 wrote to memory of 3676 848 pvjdp.exe dppjj.exe PID 848 wrote to memory of 3676 848 pvjdp.exe dppjj.exe PID 848 wrote to memory of 3676 848 pvjdp.exe dppjj.exe PID 3676 wrote to memory of 2816 3676 dppjj.exe 9lxlffx.exe PID 3676 wrote to memory of 2816 3676 dppjj.exe 9lxlffx.exe PID 3676 wrote to memory of 2816 3676 dppjj.exe 9lxlffx.exe PID 2816 wrote to memory of 4812 2816 9lxlffx.exe xrrffrx.exe PID 2816 wrote to memory of 4812 2816 9lxlffx.exe xrrffrx.exe PID 2816 wrote to memory of 4812 2816 9lxlffx.exe xrrffrx.exe PID 4812 wrote to memory of 3720 4812 xrrffrx.exe tbbthb.exe PID 4812 wrote to memory of 3720 4812 xrrffrx.exe tbbthb.exe PID 4812 wrote to memory of 3720 4812 xrrffrx.exe tbbthb.exe PID 3720 wrote to memory of 1584 3720 tbbthb.exe ddjjj.exe PID 3720 wrote to memory of 1584 3720 tbbthb.exe ddjjj.exe PID 3720 wrote to memory of 1584 3720 tbbthb.exe ddjjj.exe PID 1584 wrote to memory of 2616 1584 ddjjj.exe pjdvp.exe PID 1584 wrote to memory of 2616 1584 ddjjj.exe pjdvp.exe PID 1584 wrote to memory of 2616 1584 ddjjj.exe pjdvp.exe PID 2616 wrote to memory of 2500 2616 pjdvp.exe lflfrxl.exe PID 2616 wrote to memory of 2500 2616 pjdvp.exe lflfrxl.exe PID 2616 wrote to memory of 2500 2616 pjdvp.exe lflfrxl.exe PID 2500 wrote to memory of 4488 2500 lflfrxl.exe 7tnbth.exe PID 2500 wrote to memory of 4488 2500 lflfrxl.exe 7tnbth.exe PID 2500 wrote to memory of 4488 2500 lflfrxl.exe 7tnbth.exe PID 4488 wrote to memory of 2352 4488 7tnbth.exe ddvjp.exe PID 4488 wrote to memory of 2352 4488 7tnbth.exe ddvjp.exe PID 4488 wrote to memory of 2352 4488 7tnbth.exe ddvjp.exe PID 2352 wrote to memory of 3512 2352 ddvjp.exe llxxxfl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fa6d23212a6c8089f5c5aa05d2057bd96e5a4800a7eccc9ce82736ae2b920b4.exe"C:\Users\Admin\AppData\Local\Temp\9fa6d23212a6c8089f5c5aa05d2057bd96e5a4800a7eccc9ce82736ae2b920b4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
\??\c:\bnttnh.exec:\bnttnh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
\??\c:\jjpjv.exec:\jjpjv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\rfrrlrr.exec:\rfrrlrr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3256 -
\??\c:\htbbbn.exec:\htbbbn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
\??\c:\1rrfxxr.exec:\1rrfxxr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
\??\c:\bhhttb.exec:\bhhttb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:812 -
\??\c:\bttbbh.exec:\bttbbh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4596 -
\??\c:\pvppj.exec:\pvppj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
\??\c:\ffrxxxf.exec:\ffrxxxf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
\??\c:\rffffff.exec:\rffffff.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
\??\c:\btbnht.exec:\btbnht.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
\??\c:\pvjdp.exec:\pvjdp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:848 -
\??\c:\dppjj.exec:\dppjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
\??\c:\9lxlffx.exec:\9lxlffx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\xrrffrx.exec:\xrrffrx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
\??\c:\tbbthb.exec:\tbbthb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\ddjjj.exec:\ddjjj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\pjdvp.exec:\pjdvp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\lflfrxl.exec:\lflfrxl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\7tnbth.exec:\7tnbth.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\ddvjp.exec:\ddvjp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\llxxxfl.exec:\llxxxfl.exe23⤵
- Executes dropped EXE
PID:3512 -
\??\c:\ttnhnh.exec:\ttnhnh.exe24⤵
- Executes dropped EXE
PID:944 -
\??\c:\1pppp.exec:\1pppp.exe25⤵
- Executes dropped EXE
PID:2508 -
\??\c:\vpjvv.exec:\vpjvv.exe26⤵
- Executes dropped EXE
PID:4684 -
\??\c:\frlllxx.exec:\frlllxx.exe27⤵
- Executes dropped EXE
PID:396 -
\??\c:\bthhbt.exec:\bthhbt.exe28⤵
- Executes dropped EXE
PID:2000 -
\??\c:\dpvvv.exec:\dpvvv.exe29⤵
- Executes dropped EXE
PID:4928 -
\??\c:\5vjpd.exec:\5vjpd.exe30⤵
- Executes dropped EXE
PID:2676 -
\??\c:\lxlffff.exec:\lxlffff.exe31⤵
- Executes dropped EXE
PID:3992 -
\??\c:\hnbhnh.exec:\hnbhnh.exe32⤵
- Executes dropped EXE
PID:968 -
\??\c:\vvdvj.exec:\vvdvj.exe33⤵
- Executes dropped EXE
PID:4412 -
\??\c:\xlfxffx.exec:\xlfxffx.exe34⤵
- Executes dropped EXE
PID:4884 -
\??\c:\thnhnt.exec:\thnhnt.exe35⤵
- Executes dropped EXE
PID:2280 -
\??\c:\jvddd.exec:\jvddd.exe36⤵
- Executes dropped EXE
PID:3572 -
\??\c:\jjvvd.exec:\jjvvd.exe37⤵
- Executes dropped EXE
PID:232 -
\??\c:\lfrxfrl.exec:\lfrxfrl.exe38⤵
- Executes dropped EXE
PID:1836 -
\??\c:\lfrxlxr.exec:\lfrxlxr.exe39⤵
- Executes dropped EXE
PID:936 -
\??\c:\hhnntt.exec:\hhnntt.exe40⤵
- Executes dropped EXE
PID:4616 -
\??\c:\dddvv.exec:\dddvv.exe41⤵
- Executes dropped EXE
PID:1900 -
\??\c:\vdjdd.exec:\vdjdd.exe42⤵
- Executes dropped EXE
PID:3220 -
\??\c:\rrxfflf.exec:\rrxfflf.exe43⤵
- Executes dropped EXE
PID:4260 -
\??\c:\httntn.exec:\httntn.exe44⤵
- Executes dropped EXE
PID:3116 -
\??\c:\nbhbhn.exec:\nbhbhn.exe45⤵
- Executes dropped EXE
PID:3956 -
\??\c:\jvdjj.exec:\jvdjj.exe46⤵
- Executes dropped EXE
PID:2612 -
\??\c:\rflfflf.exec:\rflfflf.exe47⤵
- Executes dropped EXE
PID:4892 -
\??\c:\lxlfxff.exec:\lxlfxff.exe48⤵
- Executes dropped EXE
PID:4964 -
\??\c:\htnhtn.exec:\htnhtn.exe49⤵
- Executes dropped EXE
PID:2456 -
\??\c:\jvvdj.exec:\jvvdj.exe50⤵
- Executes dropped EXE
PID:4204 -
\??\c:\pdjdp.exec:\pdjdp.exe51⤵
- Executes dropped EXE
PID:1960 -
\??\c:\xxffxfl.exec:\xxffxfl.exe52⤵
- Executes dropped EXE
PID:2168 -
\??\c:\lxffxxx.exec:\lxffxxx.exe53⤵
- Executes dropped EXE
PID:4424 -
\??\c:\9hnhtt.exec:\9hnhtt.exe54⤵
- Executes dropped EXE
PID:2160 -
\??\c:\pjdvp.exec:\pjdvp.exe55⤵
- Executes dropped EXE
PID:4432 -
\??\c:\vjpjv.exec:\vjpjv.exe56⤵
- Executes dropped EXE
PID:3624 -
\??\c:\xfrxxxf.exec:\xfrxxxf.exe57⤵
- Executes dropped EXE
PID:3504 -
\??\c:\thbtbb.exec:\thbtbb.exe58⤵
- Executes dropped EXE
PID:4200 -
\??\c:\vpjvj.exec:\vpjvj.exe59⤵
- Executes dropped EXE
PID:4540 -
\??\c:\vvjjp.exec:\vvjjp.exe60⤵
- Executes dropped EXE
PID:3552 -
\??\c:\flrxfff.exec:\flrxfff.exe61⤵
- Executes dropped EXE
PID:1640 -
\??\c:\lrxxflr.exec:\lrxxflr.exe62⤵
- Executes dropped EXE
PID:3132 -
\??\c:\tbnntt.exec:\tbnntt.exe63⤵
- Executes dropped EXE
PID:2804 -
\??\c:\jppjj.exec:\jppjj.exe64⤵
- Executes dropped EXE
PID:1424 -
\??\c:\1dppd.exec:\1dppd.exe65⤵
- Executes dropped EXE
PID:1200 -
\??\c:\frrlxxr.exec:\frrlxxr.exe66⤵PID:1404
-
\??\c:\lxlfrrr.exec:\lxlfrrr.exe67⤵PID:4404
-
\??\c:\bhnbnb.exec:\bhnbnb.exe68⤵PID:4348
-
\??\c:\jjpjp.exec:\jjpjp.exe69⤵PID:3728
-
\??\c:\ddddv.exec:\ddddv.exe70⤵PID:4576
-
\??\c:\fllrffr.exec:\fllrffr.exe71⤵PID:3348
-
\??\c:\ntnhhb.exec:\ntnhhb.exe72⤵PID:1408
-
\??\c:\tttnbb.exec:\tttnbb.exe73⤵PID:1456
-
\??\c:\djdpd.exec:\djdpd.exe74⤵PID:2424
-
\??\c:\3rffffx.exec:\3rffffx.exe75⤵PID:5040
-
\??\c:\xxflxlx.exec:\xxflxlx.exe76⤵PID:2304
-
\??\c:\5hbbbb.exec:\5hbbbb.exe77⤵PID:4472
-
\??\c:\jddvj.exec:\jddvj.exe78⤵PID:1008
-
\??\c:\rrxrfff.exec:\rrxrfff.exe79⤵PID:5116
-
\??\c:\xxxfxxf.exec:\xxxfxxf.exe80⤵PID:3076
-
\??\c:\ttbttt.exec:\ttbttt.exe81⤵PID:3640
-
\??\c:\htbttt.exec:\htbttt.exe82⤵PID:3008
-
\??\c:\vvpjd.exec:\vvpjd.exe83⤵PID:4592
-
\??\c:\xfflfrl.exec:\xfflfrl.exe84⤵PID:2140
-
\??\c:\lfxfxfx.exec:\lfxfxfx.exe85⤵PID:4784
-
\??\c:\httnhh.exec:\httnhh.exe86⤵PID:2540
-
\??\c:\vdvpp.exec:\vdvpp.exe87⤵PID:2280
-
\??\c:\jjddd.exec:\jjddd.exe88⤵PID:3152
-
\??\c:\xxffffx.exec:\xxffffx.exe89⤵PID:1656
-
\??\c:\9hbhnt.exec:\9hbhnt.exe90⤵PID:4760
-
\??\c:\nbbtbh.exec:\nbbtbh.exe91⤵PID:1836
-
\??\c:\vvddd.exec:\vvddd.exe92⤵PID:2900
-
\??\c:\lllffxl.exec:\lllffxl.exe93⤵PID:936
-
\??\c:\xlfrrxl.exec:\xlfrrxl.exe94⤵PID:4084
-
\??\c:\nbhbbb.exec:\nbhbbb.exe95⤵PID:4392
-
\??\c:\pvdvv.exec:\pvdvv.exe96⤵PID:3220
-
\??\c:\pjvpd.exec:\pjvpd.exe97⤵PID:2976
-
\??\c:\fllxlll.exec:\fllxlll.exe98⤵PID:2736
-
\??\c:\fflffff.exec:\fflffff.exe99⤵PID:644
-
\??\c:\nhthnt.exec:\nhthnt.exe100⤵PID:2612
-
\??\c:\djpjp.exec:\djpjp.exe101⤵PID:2384
-
\??\c:\7jjpd.exec:\7jjpd.exe102⤵PID:4828
-
\??\c:\frxrrxx.exec:\frxrrxx.exe103⤵PID:4820
-
\??\c:\llffllx.exec:\llffllx.exe104⤵PID:3496
-
\??\c:\bhhntn.exec:\bhhntn.exe105⤵PID:2068
-
\??\c:\nttbbb.exec:\nttbbb.exe106⤵PID:3208
-
\??\c:\vjddv.exec:\vjddv.exe107⤵PID:3692
-
\??\c:\pdpvp.exec:\pdpvp.exe108⤵PID:2776
-
\??\c:\xxfxxxx.exec:\xxfxxxx.exe109⤵PID:1784
-
\??\c:\7hhbtt.exec:\7hhbtt.exe110⤵PID:4436
-
\??\c:\ttbbnt.exec:\ttbbnt.exe111⤵PID:3504
-
\??\c:\3dpjd.exec:\3dpjd.exe112⤵PID:4200
-
\??\c:\xfxrrrr.exec:\xfxrrrr.exe113⤵PID:4540
-
\??\c:\rlxffff.exec:\rlxffff.exe114⤵PID:1740
-
\??\c:\hhbhbb.exec:\hhbhbb.exe115⤵PID:3528
-
\??\c:\pppjj.exec:\pppjj.exe116⤵PID:2536
-
\??\c:\dvvvp.exec:\dvvvp.exe117⤵PID:3716
-
\??\c:\lfxrxxx.exec:\lfxrxxx.exe118⤵PID:4584
-
\??\c:\7flfxrl.exec:\7flfxrl.exe119⤵PID:4720
-
\??\c:\tnbbtb.exec:\tnbbtb.exe120⤵PID:1204
-
\??\c:\hnbtnh.exec:\hnbtnh.exe121⤵PID:5084
-
\??\c:\jvppv.exec:\jvppv.exe122⤵PID:2500
-
\??\c:\llxrlxf.exec:\llxrlxf.exe123⤵PID:4488
-
\??\c:\xllfffx.exec:\xllfffx.exe124⤵PID:1720
-
\??\c:\9nthbt.exec:\9nthbt.exe125⤵PID:1428
-
\??\c:\nnbbbh.exec:\nnbbbh.exe126⤵PID:1808
-
\??\c:\jdddv.exec:\jdddv.exe127⤵PID:432
-
\??\c:\vvjjj.exec:\vvjjj.exe128⤵PID:2756
-
\??\c:\xflffff.exec:\xflffff.exe129⤵PID:2424
-
\??\c:\tbhhhh.exec:\tbhhhh.exe130⤵PID:1716
-
\??\c:\vvjdj.exec:\vvjdj.exe131⤵PID:2064
-
\??\c:\pdjjd.exec:\pdjjd.exe132⤵PID:756
-
\??\c:\lxfffrr.exec:\lxfffrr.exe133⤵PID:436
-
\??\c:\nhnhbb.exec:\nhnhbb.exe134⤵PID:2348
-
\??\c:\bhnnhh.exec:\bhnnhh.exe135⤵PID:4544
-
\??\c:\vdvdv.exec:\vdvdv.exe136⤵PID:2020
-
\??\c:\flrffxx.exec:\flrffxx.exe137⤵PID:2036
-
\??\c:\rlxlfxl.exec:\rlxlfxl.exe138⤵PID:5000
-
\??\c:\3nhhbh.exec:\3nhhbh.exe139⤵PID:1724
-
\??\c:\nbnhnn.exec:\nbnhnn.exe140⤵PID:1128
-
\??\c:\pvdpp.exec:\pvdpp.exe141⤵PID:4356
-
\??\c:\vdddv.exec:\vdddv.exe142⤵PID:2396
-
\??\c:\rrlffll.exec:\rrlffll.exe143⤵PID:4492
-
\??\c:\fxxxllf.exec:\fxxxllf.exe144⤵PID:1692
-
\??\c:\nnbhtn.exec:\nnbhtn.exe145⤵PID:3508
-
\??\c:\tttnhh.exec:\tttnhh.exe146⤵PID:2872
-
\??\c:\djvvv.exec:\djvvv.exe147⤵PID:1792
-
\??\c:\ddjvp.exec:\ddjvp.exe148⤵PID:4164
-
\??\c:\rxrfrll.exec:\rxrfrll.exe149⤵PID:2268
-
\??\c:\tnnhhh.exec:\tnnhhh.exe150⤵PID:3956
-
\??\c:\1btbnb.exec:\1btbnb.exe151⤵PID:2032
-
\??\c:\1jjvv.exec:\1jjvv.exe152⤵PID:1048
-
\??\c:\fxllfxx.exec:\fxllfxx.exe153⤵PID:3256
-
\??\c:\frxxrfx.exec:\frxxrfx.exe154⤵PID:4700
-
\??\c:\tntbbt.exec:\tntbbt.exe155⤵PID:624
-
\??\c:\tnhhhn.exec:\tnhhhn.exe156⤵PID:5028
-
\??\c:\9ppjd.exec:\9ppjd.exe157⤵PID:3284
-
\??\c:\pvvjj.exec:\pvvjj.exe158⤵PID:2168
-
\??\c:\7fxlrfl.exec:\7fxlrfl.exe159⤵PID:2340
-
\??\c:\bhhbtt.exec:\bhhbtt.exe160⤵PID:844
-
\??\c:\bbtnhh.exec:\bbtnhh.exe161⤵PID:912
-
\??\c:\dddvj.exec:\dddvj.exe162⤵PID:2904
-
\??\c:\ffxlxfx.exec:\ffxlxfx.exe163⤵PID:4316
-
\??\c:\tttbnb.exec:\tttbnb.exe164⤵PID:848
-
\??\c:\ddjdd.exec:\ddjdd.exe165⤵PID:3676
-
\??\c:\5lfxllx.exec:\5lfxllx.exe166⤵PID:2028
-
\??\c:\hnhbnh.exec:\hnhbnh.exe167⤵PID:1740
-
\??\c:\bnhhtt.exec:\bnhhtt.exe168⤵PID:4956
-
\??\c:\djjvv.exec:\djjvv.exe169⤵PID:1424
-
\??\c:\llfxllf.exec:\llfxllf.exe170⤵PID:4584
-
\??\c:\lxrxrlx.exec:\lxrxrlx.exe171⤵PID:3560
-
\??\c:\bbhhbb.exec:\bbhhbb.exe172⤵PID:4320
-
\??\c:\tthhbh.exec:\tthhbh.exe173⤵PID:2060
-
\??\c:\dvddd.exec:\dvddd.exe174⤵PID:2352
-
\??\c:\jvpdd.exec:\jvpdd.exe175⤵PID:4520
-
\??\c:\llrlfxr.exec:\llrlfxr.exe176⤵PID:372
-
\??\c:\xlfflrx.exec:\xlfflrx.exe177⤵PID:748
-
\??\c:\bnnhhb.exec:\bnnhhb.exe178⤵PID:1008
-
\??\c:\bbhnbn.exec:\bbhnbn.exe179⤵PID:2328
-
\??\c:\jjvvd.exec:\jjvvd.exe180⤵PID:5036
-
\??\c:\vpjjp.exec:\vpjjp.exe181⤵PID:440
-
\??\c:\xlllxff.exec:\xlllxff.exe182⤵PID:3184
-
\??\c:\tbhbnh.exec:\tbhbnh.exe183⤵PID:3592
-
\??\c:\pdjdp.exec:\pdjdp.exe184⤵PID:684
-
\??\c:\jppjv.exec:\jppjv.exe185⤵PID:2540
-
\??\c:\7xxrllf.exec:\7xxrllf.exe186⤵PID:232
-
\??\c:\fllfxxr.exec:\fllfxxr.exe187⤵PID:3152
-
\??\c:\bbtntt.exec:\bbtntt.exe188⤵PID:736
-
\??\c:\tnnhbb.exec:\tnnhbb.exe189⤵PID:4904
-
\??\c:\3ppjv.exec:\3ppjv.exe190⤵PID:3872
-
\??\c:\pddvv.exec:\pddvv.exe191⤵PID:3868
-
\??\c:\lxlrxxf.exec:\lxlrxxf.exe192⤵PID:1692
-
\??\c:\tnhhbt.exec:\tnhhbt.exe193⤵PID:4228
-
\??\c:\bnbbtn.exec:\bnbbtn.exe194⤵PID:4792
-
\??\c:\jdjdj.exec:\jdjdj.exe195⤵PID:4808
-
\??\c:\9vdpj.exec:\9vdpj.exe196⤵PID:4080
-
\??\c:\xrxrlrl.exec:\xrxrlrl.exe197⤵PID:2800
-
\??\c:\httnnh.exec:\httnnh.exe198⤵PID:1984
-
\??\c:\nhtntt.exec:\nhtntt.exe199⤵PID:644
-
\??\c:\bhnbnn.exec:\bhnbnn.exe200⤵PID:1296
-
\??\c:\pddvj.exec:\pddvj.exe201⤵PID:1664
-
\??\c:\xxxrlff.exec:\xxxrlff.exe202⤵PID:5088
-
\??\c:\bttnnn.exec:\bttnnn.exe203⤵PID:1564
-
\??\c:\htttnn.exec:\htttnn.exe204⤵PID:3736
-
\??\c:\1vvpd.exec:\1vvpd.exe205⤵PID:3212
-
\??\c:\thntnt.exec:\thntnt.exe206⤵PID:2340
-
\??\c:\nhhhtb.exec:\nhhhtb.exe207⤵PID:2596
-
\??\c:\5nhhnb.exec:\5nhhnb.exe208⤵PID:912
-
\??\c:\dvjdd.exec:\dvjdd.exe209⤵PID:2904
-
\??\c:\rffrrlr.exec:\rffrrlr.exe210⤵PID:4316
-
\??\c:\5hhtbn.exec:\5hhtbn.exe211⤵PID:848
-
\??\c:\bnnhbt.exec:\bnnhbt.exe212⤵PID:2052
-
\??\c:\pjpvj.exec:\pjpvj.exe213⤵PID:2028
-
\??\c:\ffxrlrl.exec:\ffxrlrl.exe214⤵PID:2804
-
\??\c:\lrlfxrl.exec:\lrlfxrl.exe215⤵PID:4956
-
\??\c:\nhbnnh.exec:\nhbnnh.exe216⤵PID:1424
-
\??\c:\nttnbh.exec:\nttnbh.exe217⤵PID:1204
-
\??\c:\dpdvp.exec:\dpdvp.exe218⤵PID:3560
-
\??\c:\rrxllxr.exec:\rrxllxr.exe219⤵PID:4320
-
\??\c:\hhbnbn.exec:\hhbnbn.exe220⤵PID:2060
-
\??\c:\bhthhb.exec:\bhthhb.exe221⤵PID:1932
-
\??\c:\jpdjp.exec:\jpdjp.exe222⤵PID:432
-
\??\c:\fffllxx.exec:\fffllxx.exe223⤵PID:1944
-
\??\c:\hbthth.exec:\hbthth.exe224⤵PID:1716
-
\??\c:\nbnbhh.exec:\nbnbhh.exe225⤵PID:768
-
\??\c:\djjvd.exec:\djjvd.exe226⤵PID:4920
-
\??\c:\vjpdv.exec:\vjpdv.exe227⤵PID:2676
-
\??\c:\xrxlxll.exec:\xrxlxll.exe228⤵PID:3536
-
\??\c:\3xflrrr.exec:\3xflrrr.exe229⤵PID:2020
-
\??\c:\7hbthh.exec:\7hbthh.exe230⤵PID:4884
-
\??\c:\9ntnbt.exec:\9ntnbt.exe231⤵PID:3592
-
\??\c:\pjvdp.exec:\pjvdp.exe232⤵PID:2540
-
\??\c:\vvppv.exec:\vvppv.exe233⤵PID:3152
-
\??\c:\xlllxlr.exec:\xlllxlr.exe234⤵PID:908
-
\??\c:\rrxxrlr.exec:\rrxxrlr.exe235⤵PID:2900
-
\??\c:\btnbhh.exec:\btnbhh.exe236⤵PID:2388
-
\??\c:\hhhbbb.exec:\hhhbbb.exe237⤵PID:1692
-
\??\c:\jjdpd.exec:\jjdpd.exe238⤵PID:1792
-
\??\c:\bnttth.exec:\bnttth.exe239⤵PID:3096
-
\??\c:\bhnnbt.exec:\bhnnbt.exe240⤵PID:3248
-
\??\c:\ddvjd.exec:\ddvjd.exe241⤵PID:1984
-
\??\c:\pjpjd.exec:\pjpjd.exe242⤵PID:3584