Analysis
-
max time kernel
150s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 04:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
aa0c454113290f64a7faab811d8e27f98fd7d58b08d22e208c984aa1d6ce7ebb.exe
Resource
win7-20240419-en
windows7-x64
5 signatures
150 seconds
General
-
Target
aa0c454113290f64a7faab811d8e27f98fd7d58b08d22e208c984aa1d6ce7ebb.exe
-
Size
483KB
-
MD5
29ab3c436993c7f0c3a55f9c4c729850
-
SHA1
77cbaeea5edab68d8dfba5a463df648a8c588181
-
SHA256
aa0c454113290f64a7faab811d8e27f98fd7d58b08d22e208c984aa1d6ce7ebb
-
SHA512
da80a146f729c9274b0186491f1b558518f75ab3d7912237b71c4b8708a45072ccaee46ee6099bdb2cce80401f4a6419ca9f08c930d9ca9266016d36a9e29df0
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwu1b26X1wjhtSizjZ:q7Tc2NYHUrAwqzcX
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/4920-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4324-7-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/872-14-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1040-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3720-26-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3716-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1548-43-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1964-49-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/804-51-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5028-62-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1940-68-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5108-74-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3652-86-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5104-87-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2040-94-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/220-99-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4692-111-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4856-131-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3208-136-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2032-157-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3084-178-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4592-186-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4192-181-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4616-190-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3048-202-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1612-209-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3580-216-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/372-223-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/544-227-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3928-232-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2652-238-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1792-242-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3432-243-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1696-257-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5104-264-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1700-283-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2940-300-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4372-304-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4092-309-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4856-318-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2784-322-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3640-350-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1140-373-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1940-411-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5104-425-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4364-432-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2908-443-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2584-446-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1064-450-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4708-460-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5088-476-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2816-486-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4164-521-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4592-610-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3736-627-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3944-652-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3004-672-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/432-683-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3808-735-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/372-754-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2860-761-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/404-794-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3060-843-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4616-853-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
9vpjd.exennnhht.exevjdpd.exethbtnh.exeddppj.exehtbntt.exejdpjd.exe5bhnth.exevddvp.exefxxxffx.exe5nnhbt.exe7ddvj.exelffxrrl.exedvjdp.exefrlfrlf.exelxrlxrf.exevpvjd.exerrlfffx.exe1dvpd.exeflfrlrl.exe9bhbtt.exepppdv.exexrfxrlx.exe5nhbbb.exetnhbnn.exerflfrlf.exehnthbt.exeppjdp.exehhtnnn.exenhbthh.exejdvjd.exelxlrxxf.exebhntth.exerxfxllx.exe1hbnhb.exevvpjv.exejpdpj.exerlfffxl.exennntnn.exedjjdp.exe7jvpd.exexllxxrr.exenhbnhb.exerfxrfxr.exehbhbbt.exennhbnh.exepdjvj.exexxrxrrx.exehhhtnh.exe7jjdv.exelflflfr.exebnnbnh.exedppjv.exelxrlllf.exentbthb.exe7ntttb.exefrflxrr.exelxfrfxr.exennbbbt.exejddvj.exefffxllf.exe7hthbt.exejjpjd.exerrlfxrr.exepid process 4324 9vpjd.exe 872 nnnhht.exe 1040 vjdpd.exe 3720 thbtnh.exe 3716 ddppj.exe 1548 htbntt.exe 1964 jdpjd.exe 804 5bhnth.exe 1460 vddvp.exe 5028 fxxxffx.exe 1940 5nnhbt.exe 5108 7ddvj.exe 3652 lffxrrl.exe 5104 dvjdp.exe 2040 frlfrlf.exe 220 lxrlxrf.exe 448 vpvjd.exe 4692 rrlfffx.exe 3604 1dvpd.exe 4092 flfrlrl.exe 2404 9bhbtt.exe 4856 pppdv.exe 3208 xrfxrlx.exe 1044 5nhbbb.exe 1268 tnhbnn.exe 2832 rflfrlf.exe 2032 hnthbt.exe 4796 ppjdp.exe 2024 hhtnnn.exe 3084 nhbthh.exe 4192 jdvjd.exe 4592 lxlrxxf.exe 4616 bhntth.exe 4352 rxfxllx.exe 1280 1hbnhb.exe 3048 vvpjv.exe 2684 jpdpj.exe 1612 rlfffxl.exe 3580 nnntnn.exe 3720 djjdp.exe 372 7jvpd.exe 544 xllxxrr.exe 3928 nhbnhb.exe 2724 rfxrfxr.exe 2652 hbhbbt.exe 1792 nnhbnh.exe 3432 pdjvj.exe 4908 xxrxrrx.exe 1504 hhhtnh.exe 1696 7jjdv.exe 2388 lflflfr.exe 3652 bnnbnh.exe 5104 dppjv.exe 4928 lxrlllf.exe 5024 ntbthb.exe 3360 7ntttb.exe 4028 frflxrr.exe 1700 lxfrfxr.exe 116 nnbbbt.exe 4468 jddvj.exe 3160 fffxllf.exe 2940 7hthbt.exe 4372 jjpjd.exe 1652 rrlfxrr.exe -
Processes:
resource yara_rule behavioral2/memory/4920-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4324-7-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/872-14-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1040-19-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1040-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3720-26-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3716-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1548-38-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1548-43-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1964-49-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/804-51-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5028-62-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1940-68-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5108-74-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3652-79-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3652-86-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5104-87-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2040-94-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/220-99-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4692-111-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4856-131-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3208-136-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2032-157-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3084-178-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4592-186-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4192-181-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4616-190-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1280-198-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4352-194-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3048-202-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1612-209-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3580-216-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/372-223-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/544-227-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3928-232-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2652-238-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1792-242-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3432-243-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1696-257-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5104-264-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4928-268-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3360-275-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4028-279-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1700-283-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3160-293-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2940-300-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4372-304-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4092-309-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4856-318-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2784-322-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3640-350-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3132-366-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1140-373-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5008-374-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1940-411-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3308-414-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5104-425-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4364-432-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2908-443-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2584-446-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1064-450-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4708-460-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/5088-476-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2816-486-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aa0c454113290f64a7faab811d8e27f98fd7d58b08d22e208c984aa1d6ce7ebb.exe9vpjd.exennnhht.exevjdpd.exethbtnh.exeddppj.exehtbntt.exejdpjd.exe5bhnth.exevddvp.exefxxxffx.exe5nnhbt.exe7ddvj.exelffxrrl.exedvjdp.exefrlfrlf.exelxrlxrf.exevpvjd.exerrlfffx.exe1dvpd.exeflfrlrl.exe9bhbtt.exedescription pid process target process PID 4920 wrote to memory of 4324 4920 aa0c454113290f64a7faab811d8e27f98fd7d58b08d22e208c984aa1d6ce7ebb.exe 9vpjd.exe PID 4920 wrote to memory of 4324 4920 aa0c454113290f64a7faab811d8e27f98fd7d58b08d22e208c984aa1d6ce7ebb.exe 9vpjd.exe PID 4920 wrote to memory of 4324 4920 aa0c454113290f64a7faab811d8e27f98fd7d58b08d22e208c984aa1d6ce7ebb.exe 9vpjd.exe PID 4324 wrote to memory of 872 4324 9vpjd.exe nnnhht.exe PID 4324 wrote to memory of 872 4324 9vpjd.exe nnnhht.exe PID 4324 wrote to memory of 872 4324 9vpjd.exe nnnhht.exe PID 872 wrote to memory of 1040 872 nnnhht.exe vjdpd.exe PID 872 wrote to memory of 1040 872 nnnhht.exe vjdpd.exe PID 872 wrote to memory of 1040 872 nnnhht.exe vjdpd.exe PID 1040 wrote to memory of 3720 1040 vjdpd.exe djjdp.exe PID 1040 wrote to memory of 3720 1040 vjdpd.exe djjdp.exe PID 1040 wrote to memory of 3720 1040 vjdpd.exe djjdp.exe PID 3720 wrote to memory of 3716 3720 thbtnh.exe ddppj.exe PID 3720 wrote to memory of 3716 3720 thbtnh.exe ddppj.exe PID 3720 wrote to memory of 3716 3720 thbtnh.exe ddppj.exe PID 3716 wrote to memory of 1548 3716 ddppj.exe htbntt.exe PID 3716 wrote to memory of 1548 3716 ddppj.exe htbntt.exe PID 3716 wrote to memory of 1548 3716 ddppj.exe htbntt.exe PID 1548 wrote to memory of 1964 1548 htbntt.exe jdpjd.exe PID 1548 wrote to memory of 1964 1548 htbntt.exe jdpjd.exe PID 1548 wrote to memory of 1964 1548 htbntt.exe jdpjd.exe PID 1964 wrote to memory of 804 1964 jdpjd.exe 5bhnth.exe PID 1964 wrote to memory of 804 1964 jdpjd.exe 5bhnth.exe PID 1964 wrote to memory of 804 1964 jdpjd.exe 5bhnth.exe PID 804 wrote to memory of 1460 804 5bhnth.exe vddvp.exe PID 804 wrote to memory of 1460 804 5bhnth.exe vddvp.exe PID 804 wrote to memory of 1460 804 5bhnth.exe vddvp.exe PID 1460 wrote to memory of 5028 1460 vddvp.exe fxxxffx.exe PID 1460 wrote to memory of 5028 1460 vddvp.exe fxxxffx.exe PID 1460 wrote to memory of 5028 1460 vddvp.exe fxxxffx.exe PID 5028 wrote to memory of 1940 5028 fxxxffx.exe 5nnhbt.exe PID 5028 wrote to memory of 1940 5028 fxxxffx.exe 5nnhbt.exe PID 5028 wrote to memory of 1940 5028 fxxxffx.exe 5nnhbt.exe PID 1940 wrote to memory of 5108 1940 5nnhbt.exe 7ddvj.exe PID 1940 wrote to memory of 5108 1940 5nnhbt.exe 7ddvj.exe PID 1940 wrote to memory of 5108 1940 5nnhbt.exe 7ddvj.exe PID 5108 wrote to memory of 3652 5108 7ddvj.exe lffxrrl.exe PID 5108 wrote to memory of 3652 5108 7ddvj.exe lffxrrl.exe PID 5108 wrote to memory of 3652 5108 7ddvj.exe lffxrrl.exe PID 3652 wrote to memory of 5104 3652 lffxrrl.exe dvjdp.exe PID 3652 wrote to memory of 5104 3652 lffxrrl.exe dvjdp.exe PID 3652 wrote to memory of 5104 3652 lffxrrl.exe dvjdp.exe PID 5104 wrote to memory of 2040 5104 dvjdp.exe frlfrlf.exe PID 5104 wrote to memory of 2040 5104 dvjdp.exe frlfrlf.exe PID 5104 wrote to memory of 2040 5104 dvjdp.exe frlfrlf.exe PID 2040 wrote to memory of 220 2040 frlfrlf.exe lxrlxrf.exe PID 2040 wrote to memory of 220 2040 frlfrlf.exe lxrlxrf.exe PID 2040 wrote to memory of 220 2040 frlfrlf.exe lxrlxrf.exe PID 220 wrote to memory of 448 220 lxrlxrf.exe vpvjd.exe PID 220 wrote to memory of 448 220 lxrlxrf.exe vpvjd.exe PID 220 wrote to memory of 448 220 lxrlxrf.exe vpvjd.exe PID 448 wrote to memory of 4692 448 vpvjd.exe rrlfffx.exe PID 448 wrote to memory of 4692 448 vpvjd.exe rrlfffx.exe PID 448 wrote to memory of 4692 448 vpvjd.exe rrlfffx.exe PID 4692 wrote to memory of 3604 4692 rrlfffx.exe 1dvpd.exe PID 4692 wrote to memory of 3604 4692 rrlfffx.exe 1dvpd.exe PID 4692 wrote to memory of 3604 4692 rrlfffx.exe 1dvpd.exe PID 3604 wrote to memory of 4092 3604 1dvpd.exe flfrlrl.exe PID 3604 wrote to memory of 4092 3604 1dvpd.exe flfrlrl.exe PID 3604 wrote to memory of 4092 3604 1dvpd.exe flfrlrl.exe PID 4092 wrote to memory of 2404 4092 flfrlrl.exe 9bhbtt.exe PID 4092 wrote to memory of 2404 4092 flfrlrl.exe 9bhbtt.exe PID 4092 wrote to memory of 2404 4092 flfrlrl.exe 9bhbtt.exe PID 2404 wrote to memory of 4856 2404 9bhbtt.exe pppdv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa0c454113290f64a7faab811d8e27f98fd7d58b08d22e208c984aa1d6ce7ebb.exe"C:\Users\Admin\AppData\Local\Temp\aa0c454113290f64a7faab811d8e27f98fd7d58b08d22e208c984aa1d6ce7ebb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
\??\c:\9vpjd.exec:\9vpjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4324 -
\??\c:\nnnhht.exec:\nnnhht.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
\??\c:\vjdpd.exec:\vjdpd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1040 -
\??\c:\thbtnh.exec:\thbtnh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\ddppj.exec:\ddppj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3716 -
\??\c:\htbntt.exec:\htbntt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
\??\c:\jdpjd.exec:\jdpjd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
\??\c:\5bhnth.exec:\5bhnth.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:804 -
\??\c:\vddvp.exec:\vddvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1460 -
\??\c:\fxxxffx.exec:\fxxxffx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\5nnhbt.exec:\5nnhbt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1940 -
\??\c:\7ddvj.exec:\7ddvj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
\??\c:\lffxrrl.exec:\lffxrrl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3652 -
\??\c:\dvjdp.exec:\dvjdp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
\??\c:\frlfrlf.exec:\frlfrlf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\lxrlxrf.exec:\lxrlxrf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:220 -
\??\c:\vpvjd.exec:\vpvjd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:448 -
\??\c:\rrlfffx.exec:\rrlfffx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
\??\c:\1dvpd.exec:\1dvpd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
\??\c:\flfrlrl.exec:\flfrlrl.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
\??\c:\9bhbtt.exec:\9bhbtt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\pppdv.exec:\pppdv.exe23⤵
- Executes dropped EXE
PID:4856 -
\??\c:\xrfxrlx.exec:\xrfxrlx.exe24⤵
- Executes dropped EXE
PID:3208 -
\??\c:\5nhbbb.exec:\5nhbbb.exe25⤵
- Executes dropped EXE
PID:1044 -
\??\c:\tnhbnn.exec:\tnhbnn.exe26⤵
- Executes dropped EXE
PID:1268 -
\??\c:\rflfrlf.exec:\rflfrlf.exe27⤵
- Executes dropped EXE
PID:2832 -
\??\c:\hnthbt.exec:\hnthbt.exe28⤵
- Executes dropped EXE
PID:2032 -
\??\c:\ppjdp.exec:\ppjdp.exe29⤵
- Executes dropped EXE
PID:4796 -
\??\c:\hhtnnn.exec:\hhtnnn.exe30⤵
- Executes dropped EXE
PID:2024 -
\??\c:\nhbthh.exec:\nhbthh.exe31⤵
- Executes dropped EXE
PID:3084 -
\??\c:\jdvjd.exec:\jdvjd.exe32⤵
- Executes dropped EXE
PID:4192 -
\??\c:\lxlrxxf.exec:\lxlrxxf.exe33⤵
- Executes dropped EXE
PID:4592 -
\??\c:\bhntth.exec:\bhntth.exe34⤵
- Executes dropped EXE
PID:4616 -
\??\c:\rxfxllx.exec:\rxfxllx.exe35⤵
- Executes dropped EXE
PID:4352 -
\??\c:\1hbnhb.exec:\1hbnhb.exe36⤵
- Executes dropped EXE
PID:1280 -
\??\c:\vvpjv.exec:\vvpjv.exe37⤵
- Executes dropped EXE
PID:3048 -
\??\c:\jpdpj.exec:\jpdpj.exe38⤵
- Executes dropped EXE
PID:2684 -
\??\c:\rlfffxl.exec:\rlfffxl.exe39⤵
- Executes dropped EXE
PID:1612 -
\??\c:\nnntnn.exec:\nnntnn.exe40⤵
- Executes dropped EXE
PID:3580 -
\??\c:\djjdp.exec:\djjdp.exe41⤵
- Executes dropped EXE
PID:3720 -
\??\c:\7jvpd.exec:\7jvpd.exe42⤵
- Executes dropped EXE
PID:372 -
\??\c:\xllxxrr.exec:\xllxxrr.exe43⤵
- Executes dropped EXE
PID:544 -
\??\c:\nhbnhb.exec:\nhbnhb.exe44⤵
- Executes dropped EXE
PID:3928 -
\??\c:\rfxrfxr.exec:\rfxrfxr.exe45⤵
- Executes dropped EXE
PID:2724 -
\??\c:\hbhbbt.exec:\hbhbbt.exe46⤵
- Executes dropped EXE
PID:2652 -
\??\c:\nnhbnh.exec:\nnhbnh.exe47⤵
- Executes dropped EXE
PID:1792 -
\??\c:\pdjvj.exec:\pdjvj.exe48⤵
- Executes dropped EXE
PID:3432 -
\??\c:\xxrxrrx.exec:\xxrxrrx.exe49⤵
- Executes dropped EXE
PID:4908 -
\??\c:\hhhtnh.exec:\hhhtnh.exe50⤵
- Executes dropped EXE
PID:1504 -
\??\c:\7jjdv.exec:\7jjdv.exe51⤵
- Executes dropped EXE
PID:1696 -
\??\c:\lflflfr.exec:\lflflfr.exe52⤵
- Executes dropped EXE
PID:2388 -
\??\c:\bnnbnh.exec:\bnnbnh.exe53⤵
- Executes dropped EXE
PID:3652 -
\??\c:\dppjv.exec:\dppjv.exe54⤵
- Executes dropped EXE
PID:5104 -
\??\c:\lxrlllf.exec:\lxrlllf.exe55⤵
- Executes dropped EXE
PID:4928 -
\??\c:\ntbthb.exec:\ntbthb.exe56⤵
- Executes dropped EXE
PID:5024 -
\??\c:\7ntttb.exec:\7ntttb.exe57⤵
- Executes dropped EXE
PID:3360 -
\??\c:\frflxrr.exec:\frflxrr.exe58⤵
- Executes dropped EXE
PID:4028 -
\??\c:\lxfrfxr.exec:\lxfrfxr.exe59⤵
- Executes dropped EXE
PID:1700 -
\??\c:\nnbbbt.exec:\nnbbbt.exe60⤵
- Executes dropped EXE
PID:116 -
\??\c:\jddvj.exec:\jddvj.exe61⤵
- Executes dropped EXE
PID:4468 -
\??\c:\fffxllf.exec:\fffxllf.exe62⤵
- Executes dropped EXE
PID:3160 -
\??\c:\7hthbt.exec:\7hthbt.exe63⤵
- Executes dropped EXE
PID:2940 -
\??\c:\jjpjd.exec:\jjpjd.exe64⤵
- Executes dropped EXE
PID:4372 -
\??\c:\rrlfxrr.exec:\rrlfxrr.exe65⤵
- Executes dropped EXE
PID:1652 -
\??\c:\httnhb.exec:\httnhb.exe66⤵PID:4092
-
\??\c:\jvvpj.exec:\jvvpj.exe67⤵PID:3904
-
\??\c:\vpdvj.exec:\vpdvj.exe68⤵PID:4856
-
\??\c:\xrlrrll.exec:\xrlrrll.exe69⤵PID:2784
-
\??\c:\dpvdp.exec:\dpvdp.exe70⤵PID:1608
-
\??\c:\fxxxfrf.exec:\fxxxfrf.exe71⤵PID:3388
-
\??\c:\httnhb.exec:\httnhb.exe72⤵PID:384
-
\??\c:\vpjjd.exec:\vpjjd.exe73⤵PID:5012
-
\??\c:\vvvvd.exec:\vvvvd.exe74⤵PID:4836
-
\??\c:\5frfxxx.exec:\5frfxxx.exe75⤵PID:2224
-
\??\c:\nttnbn.exec:\nttnbn.exe76⤵PID:4668
-
\??\c:\pdpjp.exec:\pdpjp.exe77⤵PID:4672
-
\??\c:\ffxllxf.exec:\ffxllxf.exe78⤵PID:3640
-
\??\c:\tnbbtt.exec:\tnbbtt.exe79⤵PID:1668
-
\??\c:\5vpjd.exec:\5vpjd.exe80⤵PID:1252
-
\??\c:\ddvpd.exec:\ddvpd.exe81⤵PID:4332
-
\??\c:\xrlxlfr.exec:\xrlxlfr.exe82⤵PID:3452
-
\??\c:\nttnhb.exec:\nttnhb.exe83⤵PID:2936
-
\??\c:\9bhthh.exec:\9bhthh.exe84⤵PID:3132
-
\??\c:\1vdvj.exec:\1vdvj.exe85⤵PID:1140
-
\??\c:\hnthtt.exec:\hnthtt.exe86⤵PID:5008
-
\??\c:\3vpjd.exec:\3vpjd.exe87⤵PID:4932
-
\??\c:\5ddpv.exec:\5ddpv.exe88⤵PID:4400
-
\??\c:\7xrfxxl.exec:\7xrfxxl.exe89⤵PID:4728
-
\??\c:\btbthb.exec:\btbthb.exe90⤵PID:2896
-
\??\c:\vpdvp.exec:\vpdvp.exe91⤵PID:4956
-
\??\c:\ddvpd.exec:\ddvpd.exe92⤵PID:3944
-
\??\c:\3xfxllx.exec:\3xfxllx.exe93⤵PID:2904
-
\??\c:\hbbtnh.exec:\hbbtnh.exe94⤵PID:1460
-
\??\c:\3pvpv.exec:\3pvpv.exe95⤵PID:5040
-
\??\c:\pdpjd.exec:\pdpjd.exe96⤵PID:4140
-
\??\c:\xxlfrfx.exec:\xxlfrfx.exe97⤵PID:1940
-
\??\c:\7bhbtt.exec:\7bhbtt.exe98⤵PID:1504
-
\??\c:\ntbbnh.exec:\ntbbnh.exe99⤵PID:3308
-
\??\c:\7djvv.exec:\7djvv.exe100⤵PID:2328
-
\??\c:\rxxrlff.exec:\rxxrlff.exe101⤵PID:5104
-
\??\c:\llfxrrl.exec:\llfxrrl.exe102⤵PID:736
-
\??\c:\tnhthb.exec:\tnhthb.exe103⤵PID:4996
-
\??\c:\dppvv.exec:\dppvv.exe104⤵PID:4364
-
\??\c:\3lfxflf.exec:\3lfxflf.exe105⤵PID:448
-
\??\c:\fxrlfxx.exec:\fxrlfxx.exe106⤵PID:4260
-
\??\c:\nhnttt.exec:\nhnttt.exe107⤵PID:2908
-
\??\c:\vjvpd.exec:\vjvpd.exe108⤵PID:2584
-
\??\c:\fxlfxrl.exec:\fxlfxrl.exe109⤵PID:1064
-
\??\c:\xfxrflf.exec:\xfxrflf.exe110⤵PID:4052
-
\??\c:\hhbthh.exec:\hhbthh.exe111⤵PID:4708
-
\??\c:\frfxrrf.exec:\frfxrrf.exe112⤵PID:2324
-
\??\c:\rxxrllf.exec:\rxxrllf.exe113⤵PID:3940
-
\??\c:\bttnnn.exec:\bttnnn.exe114⤵PID:1720
-
\??\c:\jvpjd.exec:\jvpjd.exe115⤵PID:3184
-
\??\c:\fllfxxx.exec:\fllfxxx.exe116⤵PID:5088
-
\??\c:\ntnhbb.exec:\ntnhbb.exe117⤵PID:2852
-
\??\c:\dvddd.exec:\dvddd.exe118⤵PID:3368
-
\??\c:\5lllfxx.exec:\5lllfxx.exe119⤵PID:2816
-
\??\c:\bbtnnb.exec:\bbtnnb.exe120⤵PID:552
-
\??\c:\pvvpj.exec:\pvvpj.exe121⤵PID:4736
-
\??\c:\xxxlfxx.exec:\xxxlfxx.exe122⤵PID:3968
-
\??\c:\hbnnhb.exec:\hbnnhb.exe123⤵PID:3648
-
\??\c:\vjvpp.exec:\vjvpp.exe124⤵PID:376
-
\??\c:\fxlxxrf.exec:\fxlxxrf.exe125⤵PID:1508
-
\??\c:\nhtnht.exec:\nhtnht.exe126⤵PID:1612
-
\??\c:\bnnnnn.exec:\bnnnnn.exe127⤵PID:1456
-
\??\c:\3jpjd.exec:\3jpjd.exe128⤵PID:3124
-
\??\c:\lflfxxr.exec:\lflfxxr.exe129⤵PID:1488
-
\??\c:\1tnhtn.exec:\1tnhtn.exe130⤵PID:1932
-
\??\c:\9vvpd.exec:\9vvpd.exe131⤵PID:4164
-
\??\c:\rxxrlfx.exec:\rxxrlfx.exe132⤵PID:3484
-
\??\c:\rfxlfxr.exec:\rfxlfxr.exe133⤵PID:804
-
\??\c:\nbtnhb.exec:\nbtnhb.exe134⤵PID:4716
-
\??\c:\pjjpj.exec:\pjjpj.exe135⤵PID:4064
-
\??\c:\xrxfrrf.exec:\xrxfrrf.exe136⤵PID:5040
-
\??\c:\fxrxxxf.exec:\fxrxxxf.exe137⤵PID:4876
-
\??\c:\9bbtnh.exec:\9bbtnh.exe138⤵PID:1940
-
\??\c:\9djdv.exec:\9djdv.exe139⤵PID:1504
-
\??\c:\dvdpd.exec:\dvdpd.exe140⤵PID:3652
-
\??\c:\lflfrlf.exec:\lflfrlf.exe141⤵PID:1368
-
\??\c:\5bbnhb.exec:\5bbnhb.exe142⤵PID:4244
-
\??\c:\djjdj.exec:\djjdj.exe143⤵PID:2376
-
\??\c:\7dvdp.exec:\7dvdp.exe144⤵PID:828
-
\??\c:\flfxllx.exec:\flfxllx.exe145⤵PID:4048
-
\??\c:\xxlxlff.exec:\xxlxlff.exe146⤵PID:1384
-
\??\c:\jdvjd.exec:\jdvjd.exe147⤵PID:4804
-
\??\c:\dddjv.exec:\dddjv.exe148⤵PID:1156
-
\??\c:\xrfxrfx.exec:\xrfxrfx.exe149⤵PID:2536
-
\??\c:\nnttnb.exec:\nnttnb.exe150⤵PID:2416
-
\??\c:\pdjdv.exec:\pdjdv.exe151⤵PID:3372
-
\??\c:\frfxrlf.exec:\frfxrlf.exe152⤵PID:1604
-
\??\c:\thbnnt.exec:\thbnnt.exe153⤵PID:2832
-
\??\c:\5vdpp.exec:\5vdpp.exe154⤵PID:2324
-
\??\c:\jvjdp.exec:\jvjdp.exe155⤵PID:3940
-
\??\c:\fffxxll.exec:\fffxxll.exe156⤵PID:908
-
\??\c:\nhhbnn.exec:\nhhbnn.exe157⤵PID:3184
-
\??\c:\ddpjd.exec:\ddpjd.exe158⤵PID:1636
-
\??\c:\flxrfff.exec:\flxrfff.exe159⤵PID:4592
-
\??\c:\lflflfr.exec:\lflflfr.exe160⤵PID:3368
-
\??\c:\ttbbtb.exec:\ttbbtb.exe161⤵PID:1756
-
\??\c:\vjjvj.exec:\vjjvj.exe162⤵PID:3008
-
\??\c:\jvvvv.exec:\jvvvv.exe163⤵PID:1644
-
\??\c:\fxxlfxl.exec:\fxxlfxl.exe164⤵PID:3736
-
\??\c:\5tnbth.exec:\5tnbth.exe165⤵PID:4380
-
\??\c:\hnhbtn.exec:\hnhbtn.exe166⤵PID:1576
-
\??\c:\djpdv.exec:\djpdv.exe167⤵PID:5008
-
\??\c:\lxrlffx.exec:\lxrlffx.exe168⤵PID:636
-
\??\c:\hbthtn.exec:\hbthtn.exe169⤵PID:1224
-
\??\c:\nnhbbh.exec:\nnhbbh.exe170⤵PID:1548
-
\??\c:\pdvpd.exec:\pdvpd.exe171⤵PID:2896
-
\??\c:\lfxlfxr.exec:\lfxlfxr.exe172⤵PID:3944
-
\??\c:\xxffxxr.exec:\xxffxxr.exe173⤵PID:2904
-
\??\c:\5hhbnn.exec:\5hhbnn.exe174⤵PID:4908
-
\??\c:\vddpj.exec:\vddpj.exe175⤵PID:4036
-
\??\c:\flxrlff.exec:\flxrlff.exe176⤵PID:1236
-
\??\c:\bhnhhh.exec:\bhnhhh.exe177⤵PID:1260
-
\??\c:\jpvpp.exec:\jpvpp.exe178⤵PID:3004
-
\??\c:\xxxllfx.exec:\xxxllfx.exe179⤵PID:3440
-
\??\c:\5ttnbt.exec:\5ttnbt.exe180⤵PID:4992
-
\??\c:\nbbbtt.exec:\nbbbtt.exe181⤵PID:1444
-
\??\c:\jjddv.exec:\jjddv.exe182⤵PID:432
-
\??\c:\rxfrlfx.exec:\rxfrlfx.exe183⤵PID:4048
-
\??\c:\5xxrllf.exec:\5xxrllf.exe184⤵PID:4852
-
\??\c:\btbttn.exec:\btbttn.exe185⤵PID:4804
-
\??\c:\pppjd.exec:\pppjd.exe186⤵PID:3904
-
\??\c:\llrllff.exec:\llrllff.exe187⤵PID:2416
-
\??\c:\htnhbt.exec:\htnhbt.exe188⤵PID:1028
-
\??\c:\7vpvp.exec:\7vpvp.exe189⤵PID:3388
-
\??\c:\pvvpd.exec:\pvvpd.exe190⤵PID:2208
-
\??\c:\rflfxrl.exec:\rflfxrl.exe191⤵PID:3800
-
\??\c:\nnntnh.exec:\nnntnh.exe192⤵PID:908
-
\??\c:\dvvpp.exec:\dvvpp.exe193⤵PID:3564
-
\??\c:\fxxrxrx.exec:\fxxrxrx.exe194⤵PID:2556
-
\??\c:\nbnhbb.exec:\nbnhbb.exe195⤵PID:4116
-
\??\c:\vjdvj.exec:\vjdvj.exe196⤵PID:2816
-
\??\c:\7pjdv.exec:\7pjdv.exe197⤵PID:5084
-
\??\c:\frlfrrl.exec:\frlfrrl.exe198⤵PID:3808
-
\??\c:\3nnhbb.exec:\3nnhbb.exe199⤵PID:1140
-
\??\c:\pjjvv.exec:\pjjvv.exe200⤵PID:8
-
\??\c:\dpppv.exec:\dpppv.exe201⤵PID:2460
-
\??\c:\3lxrxfx.exec:\3lxrxfx.exe202⤵PID:1040
-
\??\c:\hnnhbb.exec:\hnnhbb.exe203⤵PID:4360
-
\??\c:\dpvpd.exec:\dpvpd.exe204⤵PID:372
-
\??\c:\pjdvp.exec:\pjdvp.exe205⤵PID:2860
-
\??\c:\lrfrlrr.exec:\lrfrlrr.exe206⤵PID:3052
-
\??\c:\7bhhnn.exec:\7bhhnn.exe207⤵PID:1964
-
\??\c:\jvvjv.exec:\jvvjv.exe208⤵PID:3432
-
\??\c:\xrrllll.exec:\xrrllll.exe209⤵PID:4716
-
\??\c:\lfffxxx.exec:\lfffxxx.exe210⤵PID:2904
-
\??\c:\5bthbt.exec:\5bthbt.exe211⤵PID:4872
-
\??\c:\dvvpd.exec:\dvvpd.exe212⤵PID:5112
-
\??\c:\5llfrrl.exec:\5llfrrl.exe213⤵PID:2040
-
\??\c:\tnnhtt.exec:\tnnhtt.exe214⤵PID:2236
-
\??\c:\vvvpp.exec:\vvvpp.exe215⤵PID:4624
-
\??\c:\lffxrrl.exec:\lffxrrl.exe216⤵PID:404
-
\??\c:\tnnhtn.exec:\tnnhtn.exe217⤵PID:4468
-
\??\c:\1hhbhh.exec:\1hhbhh.exe218⤵PID:1020
-
\??\c:\pddpj.exec:\pddpj.exe219⤵PID:1516
-
\??\c:\llrlfrf.exec:\llrlfrf.exe220⤵PID:5076
-
\??\c:\3tnhbb.exec:\3tnhbb.exe221⤵PID:1136
-
\??\c:\3jdvp.exec:\3jdvp.exe222⤵PID:2336
-
\??\c:\fxlfxfr.exec:\fxlfxfr.exe223⤵PID:1608
-
\??\c:\9tntnh.exec:\9tntnh.exe224⤵PID:2384
-
\??\c:\pvvjp.exec:\pvvjp.exe225⤵PID:1828
-
\??\c:\jvdpj.exec:\jvdpj.exe226⤵PID:3388
-
\??\c:\3frlfxr.exec:\3frlfxr.exe227⤵PID:3940
-
\??\c:\bhnhbb.exec:\bhnhbb.exe228⤵PID:4836
-
\??\c:\vvdvp.exec:\vvdvp.exe229⤵PID:4880
-
\??\c:\jdpvj.exec:\jdpvj.exe230⤵PID:2584
-
\??\c:\xrlffxr.exec:\xrlffxr.exe231⤵PID:3084
-
\??\c:\nnntnh.exec:\nnntnh.exe232⤵PID:3060
-
\??\c:\vdvvp.exec:\vdvvp.exe233⤵PID:664
-
\??\c:\xlrrrrl.exec:\xlrrrrl.exe234⤵PID:4616
-
\??\c:\7xrlffx.exec:\7xrlffx.exe235⤵PID:3628
-
\??\c:\btttnn.exec:\btttnn.exe236⤵PID:4120
-
\??\c:\jjppj.exec:\jjppj.exe237⤵PID:1644
-
\??\c:\xfrlxxr.exec:\xfrlxxr.exe238⤵PID:3352
-
\??\c:\1bhbbt.exec:\1bhbbt.exe239⤵PID:8
-
\??\c:\1jdjd.exec:\1jdjd.exe240⤵PID:3876
-
\??\c:\lrrrrrr.exec:\lrrrrrr.exe241⤵PID:3128
-