Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b27a48000c8c3ad06fac132bbb7bde0bf4a3122febd02c06ca6294a4242de09.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1b27a48000c8c3ad06fac132bbb7bde0bf4a3122febd02c06ca6294a4242de09.exe
-
Size
87KB
-
MD5
4f029c375c57297aec881602e90f9b1e
-
SHA1
7981340658d76d823ad1ff126605018ce44c6ce4
-
SHA256
1b27a48000c8c3ad06fac132bbb7bde0bf4a3122febd02c06ca6294a4242de09
-
SHA512
bf94778da6f7606e0e371cb142e2ddbfdb2205e0d3f3682d9918902ed708c4c72d48fdae2a0ead3f88338c822ea6b30aeaaab0eab72cf9720c39ea397dfd1db8
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+C2wV3jaCJ5jH3eS:ymb3NkkiQ3mdBjF+3TU2K3bJZXJ
Malware Config
Signatures
-
Detect Blackmoon payload 30 IoCs
Processes:
resource yara_rule behavioral2/memory/4192-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5048-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2328-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2328-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4008-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3484-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4636-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1984-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3284-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4952-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2324-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/856-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/856-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4916-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1312-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4036-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1180-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/564-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5116-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3568-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3948-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1908-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/408-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3120-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4148-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4768-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1936-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4136-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3444-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4552-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 33 IoCs
Processes:
resource yara_rule behavioral2/memory/4192-6-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5048-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2328-19-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4008-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3484-32-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4636-39-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1984-45-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3284-54-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3284-53-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3284-58-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4952-64-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2324-71-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4952-63-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4952-62-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/856-78-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/856-79-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4916-89-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1312-94-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4036-101-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1180-107-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/564-119-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5116-125-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3568-131-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3948-137-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1908-150-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/408-155-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3120-161-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4148-167-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4768-173-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1936-185-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4136-191-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3444-202-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4552-196-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
jddvv.exe7xrlffx.exettnhbn.exe7vppj.exe1rxrllf.exerrrrflx.exe1thhhh.exe3jjdv.exe9pppj.exefrxrlfx.exebhhbhh.exedjjjd.exexxrflxl.exebbhhbb.exejddvd.exedjdpp.exexfrlffx.exeffrrrll.exehbbbhn.exebntttt.exejdvvp.exerfxrfxl.exe3lrrlll.exehntttt.exepjdpv.exevppjd.exexrxlllf.exethbtnb.exebnhtnh.exelxxrlll.exetbbbtn.exe5djjp.exerflxlfx.exerxrxrlr.exehhnhtt.exetbhthb.exedvpdv.exexrrxlrl.exerlrrxxf.exethttnh.exeddjpd.exe3xffrlf.exe9llfllx.exenhnhnb.exejjpdp.exejvjvj.exe9xxrrrf.exelrrrlfr.exehnnhtn.exe9bhtbt.exedjjvj.exelfrfrlf.exellfxlfr.exe1rllfxr.exetnnbnb.exehhhbhh.exejvppp.exejdvpd.exelrxlfxx.exerfxllxl.exehhhbth.exethnhnh.exepdvvp.exe5jpjv.exepid process 5048 jddvv.exe 2328 7xrlffx.exe 4008 ttnhbn.exe 3484 7vppj.exe 4636 1rxrllf.exe 1984 rrrrflx.exe 3284 1thhhh.exe 4952 3jjdv.exe 2324 9pppj.exe 856 frxrlfx.exe 4916 bhhbhh.exe 1312 djjjd.exe 4036 xxrflxl.exe 1180 bbhhbb.exe 4444 jddvd.exe 564 djdpp.exe 5116 xfrlffx.exe 3568 ffrrrll.exe 3948 hbbbhn.exe 3396 bntttt.exe 1908 jdvvp.exe 408 rfxrfxl.exe 3120 3lrrlll.exe 4148 hntttt.exe 4768 pjdpv.exe 3216 vppjd.exe 1936 xrxlllf.exe 4136 thbtnb.exe 4552 bnhtnh.exe 3444 lxxrlll.exe 3740 tbbbtn.exe 3076 5djjp.exe 4652 rflxlfx.exe 2548 rxrxrlr.exe 2216 hhnhtt.exe 4280 tbhthb.exe 3748 dvpdv.exe 3020 xrrxlrl.exe 2328 rlrrxxf.exe 5048 thttnh.exe 1652 ddjpd.exe 4636 3xffrlf.exe 64 9llfllx.exe 60 nhnhnb.exe 4276 jjpdp.exe 1356 jvjvj.exe 1040 9xxrrrf.exe 1724 lrrrlfr.exe 4840 hnnhtn.exe 832 9bhtbt.exe 3228 djjvj.exe 4352 lfrfrlf.exe 1548 llfxlfr.exe 4628 1rllfxr.exe 2448 tnnbnb.exe 1532 hhhbhh.exe 2924 jvppp.exe 2904 jdvpd.exe 1784 lrxlfxx.exe 3704 rfxllxl.exe 3948 hhhbth.exe 1952 thnhnh.exe 1404 pdvvp.exe 2984 5jpjv.exe -
Processes:
resource yara_rule behavioral2/memory/4192-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5048-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2328-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4008-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3484-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4636-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1984-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3284-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3284-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3284-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4952-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2324-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4952-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4952-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/856-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/856-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4916-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1312-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4036-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1180-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/564-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5116-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3568-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3948-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1908-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/408-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3120-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4148-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4768-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1936-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4136-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3444-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4552-196-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1b27a48000c8c3ad06fac132bbb7bde0bf4a3122febd02c06ca6294a4242de09.exejddvv.exe7xrlffx.exettnhbn.exe7vppj.exe1rxrllf.exerrrrflx.exe1thhhh.exe3jjdv.exe9pppj.exefrxrlfx.exebhhbhh.exedjjjd.exexxrflxl.exebbhhbb.exejddvd.exedjdpp.exexfrlffx.exeffrrrll.exehbbbhn.exebntttt.exejdvvp.exedescription pid process target process PID 4192 wrote to memory of 5048 4192 1b27a48000c8c3ad06fac132bbb7bde0bf4a3122febd02c06ca6294a4242de09.exe jddvv.exe PID 4192 wrote to memory of 5048 4192 1b27a48000c8c3ad06fac132bbb7bde0bf4a3122febd02c06ca6294a4242de09.exe jddvv.exe PID 4192 wrote to memory of 5048 4192 1b27a48000c8c3ad06fac132bbb7bde0bf4a3122febd02c06ca6294a4242de09.exe jddvv.exe PID 5048 wrote to memory of 2328 5048 jddvv.exe 7xrlffx.exe PID 5048 wrote to memory of 2328 5048 jddvv.exe 7xrlffx.exe PID 5048 wrote to memory of 2328 5048 jddvv.exe 7xrlffx.exe PID 2328 wrote to memory of 4008 2328 7xrlffx.exe ttnhbn.exe PID 2328 wrote to memory of 4008 2328 7xrlffx.exe ttnhbn.exe PID 2328 wrote to memory of 4008 2328 7xrlffx.exe ttnhbn.exe PID 4008 wrote to memory of 3484 4008 ttnhbn.exe 7vppj.exe PID 4008 wrote to memory of 3484 4008 ttnhbn.exe 7vppj.exe PID 4008 wrote to memory of 3484 4008 ttnhbn.exe 7vppj.exe PID 3484 wrote to memory of 4636 3484 7vppj.exe 1rxrllf.exe PID 3484 wrote to memory of 4636 3484 7vppj.exe 1rxrllf.exe PID 3484 wrote to memory of 4636 3484 7vppj.exe 1rxrllf.exe PID 4636 wrote to memory of 1984 4636 1rxrllf.exe rrrrflx.exe PID 4636 wrote to memory of 1984 4636 1rxrllf.exe rrrrflx.exe PID 4636 wrote to memory of 1984 4636 1rxrllf.exe rrrrflx.exe PID 1984 wrote to memory of 3284 1984 rrrrflx.exe 1thhhh.exe PID 1984 wrote to memory of 3284 1984 rrrrflx.exe 1thhhh.exe PID 1984 wrote to memory of 3284 1984 rrrrflx.exe 1thhhh.exe PID 3284 wrote to memory of 4952 3284 1thhhh.exe 3jjdv.exe PID 3284 wrote to memory of 4952 3284 1thhhh.exe 3jjdv.exe PID 3284 wrote to memory of 4952 3284 1thhhh.exe 3jjdv.exe PID 4952 wrote to memory of 2324 4952 3jjdv.exe 9pppj.exe PID 4952 wrote to memory of 2324 4952 3jjdv.exe 9pppj.exe PID 4952 wrote to memory of 2324 4952 3jjdv.exe 9pppj.exe PID 2324 wrote to memory of 856 2324 9pppj.exe frxrlfx.exe PID 2324 wrote to memory of 856 2324 9pppj.exe frxrlfx.exe PID 2324 wrote to memory of 856 2324 9pppj.exe frxrlfx.exe PID 856 wrote to memory of 4916 856 frxrlfx.exe bhhbhh.exe PID 856 wrote to memory of 4916 856 frxrlfx.exe bhhbhh.exe PID 856 wrote to memory of 4916 856 frxrlfx.exe bhhbhh.exe PID 4916 wrote to memory of 1312 4916 bhhbhh.exe djjjd.exe PID 4916 wrote to memory of 1312 4916 bhhbhh.exe djjjd.exe PID 4916 wrote to memory of 1312 4916 bhhbhh.exe djjjd.exe PID 1312 wrote to memory of 4036 1312 djjjd.exe xxrflxl.exe PID 1312 wrote to memory of 4036 1312 djjjd.exe xxrflxl.exe PID 1312 wrote to memory of 4036 1312 djjjd.exe xxrflxl.exe PID 4036 wrote to memory of 1180 4036 xxrflxl.exe bbhhbb.exe PID 4036 wrote to memory of 1180 4036 xxrflxl.exe bbhhbb.exe PID 4036 wrote to memory of 1180 4036 xxrflxl.exe bbhhbb.exe PID 1180 wrote to memory of 4444 1180 bbhhbb.exe jddvd.exe PID 1180 wrote to memory of 4444 1180 bbhhbb.exe jddvd.exe PID 1180 wrote to memory of 4444 1180 bbhhbb.exe jddvd.exe PID 4444 wrote to memory of 564 4444 jddvd.exe djdpp.exe PID 4444 wrote to memory of 564 4444 jddvd.exe djdpp.exe PID 4444 wrote to memory of 564 4444 jddvd.exe djdpp.exe PID 564 wrote to memory of 5116 564 djdpp.exe xfrlffx.exe PID 564 wrote to memory of 5116 564 djdpp.exe xfrlffx.exe PID 564 wrote to memory of 5116 564 djdpp.exe xfrlffx.exe PID 5116 wrote to memory of 3568 5116 xfrlffx.exe ffrrrll.exe PID 5116 wrote to memory of 3568 5116 xfrlffx.exe ffrrrll.exe PID 5116 wrote to memory of 3568 5116 xfrlffx.exe ffrrrll.exe PID 3568 wrote to memory of 3948 3568 ffrrrll.exe hbbbhn.exe PID 3568 wrote to memory of 3948 3568 ffrrrll.exe hbbbhn.exe PID 3568 wrote to memory of 3948 3568 ffrrrll.exe hbbbhn.exe PID 3948 wrote to memory of 3396 3948 hbbbhn.exe bntttt.exe PID 3948 wrote to memory of 3396 3948 hbbbhn.exe bntttt.exe PID 3948 wrote to memory of 3396 3948 hbbbhn.exe bntttt.exe PID 3396 wrote to memory of 1908 3396 bntttt.exe jdvvp.exe PID 3396 wrote to memory of 1908 3396 bntttt.exe jdvvp.exe PID 3396 wrote to memory of 1908 3396 bntttt.exe jdvvp.exe PID 1908 wrote to memory of 408 1908 jdvvp.exe rfxrfxl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b27a48000c8c3ad06fac132bbb7bde0bf4a3122febd02c06ca6294a4242de09.exe"C:\Users\Admin\AppData\Local\Temp\1b27a48000c8c3ad06fac132bbb7bde0bf4a3122febd02c06ca6294a4242de09.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
\??\c:\jddvv.exec:\jddvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
\??\c:\7xrlffx.exec:\7xrlffx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2328 -
\??\c:\ttnhbn.exec:\ttnhbn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
\??\c:\7vppj.exec:\7vppj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
\??\c:\1rxrllf.exec:\1rxrllf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\rrrrflx.exec:\rrrrflx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
\??\c:\1thhhh.exec:\1thhhh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3284 -
\??\c:\3jjdv.exec:\3jjdv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4952 -
\??\c:\9pppj.exec:\9pppj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\frxrlfx.exec:\frxrlfx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\bhhbhh.exec:\bhhbhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
\??\c:\djjjd.exec:\djjjd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
\??\c:\xxrflxl.exec:\xxrflxl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
\??\c:\bbhhbb.exec:\bbhhbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1180 -
\??\c:\jddvd.exec:\jddvd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
\??\c:\djdpp.exec:\djdpp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:564 -
\??\c:\xfrlffx.exec:\xfrlffx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
\??\c:\ffrrrll.exec:\ffrrrll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
\??\c:\hbbbhn.exec:\hbbbhn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
\??\c:\bntttt.exec:\bntttt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3396 -
\??\c:\jdvvp.exec:\jdvvp.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
\??\c:\rfxrfxl.exec:\rfxrfxl.exe23⤵
- Executes dropped EXE
PID:408 -
\??\c:\3lrrlll.exec:\3lrrlll.exe24⤵
- Executes dropped EXE
PID:3120 -
\??\c:\hntttt.exec:\hntttt.exe25⤵
- Executes dropped EXE
PID:4148 -
\??\c:\pjdpv.exec:\pjdpv.exe26⤵
- Executes dropped EXE
PID:4768 -
\??\c:\vppjd.exec:\vppjd.exe27⤵
- Executes dropped EXE
PID:3216 -
\??\c:\xrxlllf.exec:\xrxlllf.exe28⤵
- Executes dropped EXE
PID:1936 -
\??\c:\thbtnb.exec:\thbtnb.exe29⤵
- Executes dropped EXE
PID:4136 -
\??\c:\bnhtnh.exec:\bnhtnh.exe30⤵
- Executes dropped EXE
PID:4552 -
\??\c:\lxxrlll.exec:\lxxrlll.exe31⤵
- Executes dropped EXE
PID:3444 -
\??\c:\tbbbtn.exec:\tbbbtn.exe32⤵
- Executes dropped EXE
PID:3740 -
\??\c:\5djjp.exec:\5djjp.exe33⤵
- Executes dropped EXE
PID:3076 -
\??\c:\rflxlfx.exec:\rflxlfx.exe34⤵
- Executes dropped EXE
PID:4652 -
\??\c:\rxrxrlr.exec:\rxrxrlr.exe35⤵
- Executes dropped EXE
PID:2548 -
\??\c:\hhnhtt.exec:\hhnhtt.exe36⤵
- Executes dropped EXE
PID:2216 -
\??\c:\tbhthb.exec:\tbhthb.exe37⤵
- Executes dropped EXE
PID:4280 -
\??\c:\dvpdv.exec:\dvpdv.exe38⤵
- Executes dropped EXE
PID:3748 -
\??\c:\xrrxlrl.exec:\xrrxlrl.exe39⤵
- Executes dropped EXE
PID:3020 -
\??\c:\rlrrxxf.exec:\rlrrxxf.exe40⤵
- Executes dropped EXE
PID:2328 -
\??\c:\thttnh.exec:\thttnh.exe41⤵
- Executes dropped EXE
PID:5048 -
\??\c:\ddjpd.exec:\ddjpd.exe42⤵
- Executes dropped EXE
PID:1652 -
\??\c:\3xffrlf.exec:\3xffrlf.exe43⤵
- Executes dropped EXE
PID:4636 -
\??\c:\9llfllx.exec:\9llfllx.exe44⤵
- Executes dropped EXE
PID:64 -
\??\c:\nhnhnb.exec:\nhnhnb.exe45⤵
- Executes dropped EXE
PID:60 -
\??\c:\jjpdp.exec:\jjpdp.exe46⤵
- Executes dropped EXE
PID:4276 -
\??\c:\jvjvj.exec:\jvjvj.exe47⤵
- Executes dropped EXE
PID:1356 -
\??\c:\9xxrrrf.exec:\9xxrrrf.exe48⤵
- Executes dropped EXE
PID:1040 -
\??\c:\lrrrlfr.exec:\lrrrlfr.exe49⤵
- Executes dropped EXE
PID:1724 -
\??\c:\hnnhtn.exec:\hnnhtn.exe50⤵
- Executes dropped EXE
PID:4840 -
\??\c:\9bhtbt.exec:\9bhtbt.exe51⤵
- Executes dropped EXE
PID:832 -
\??\c:\djjvj.exec:\djjvj.exe52⤵
- Executes dropped EXE
PID:3228 -
\??\c:\lfrfrlf.exec:\lfrfrlf.exe53⤵
- Executes dropped EXE
PID:4352 -
\??\c:\llfxlfr.exec:\llfxlfr.exe54⤵
- Executes dropped EXE
PID:1548 -
\??\c:\1rllfxr.exec:\1rllfxr.exe55⤵
- Executes dropped EXE
PID:4628 -
\??\c:\tnnbnb.exec:\tnnbnb.exe56⤵
- Executes dropped EXE
PID:2448 -
\??\c:\hhhbhh.exec:\hhhbhh.exe57⤵
- Executes dropped EXE
PID:1532 -
\??\c:\jvppp.exec:\jvppp.exe58⤵
- Executes dropped EXE
PID:2924 -
\??\c:\jdvpd.exec:\jdvpd.exe59⤵
- Executes dropped EXE
PID:2904 -
\??\c:\lrxlfxx.exec:\lrxlfxx.exe60⤵
- Executes dropped EXE
PID:1784 -
\??\c:\rfxllxl.exec:\rfxllxl.exe61⤵
- Executes dropped EXE
PID:3704 -
\??\c:\hhhbth.exec:\hhhbth.exe62⤵
- Executes dropped EXE
PID:3948 -
\??\c:\thnhnh.exec:\thnhnh.exe63⤵
- Executes dropped EXE
PID:1952 -
\??\c:\pdvvp.exec:\pdvvp.exe64⤵
- Executes dropped EXE
PID:1404 -
\??\c:\5jpjv.exec:\5jpjv.exe65⤵
- Executes dropped EXE
PID:2984 -
\??\c:\llfrfxl.exec:\llfrfxl.exe66⤵PID:4084
-
\??\c:\xxrlfxl.exec:\xxrlfxl.exe67⤵PID:3272
-
\??\c:\btthbt.exec:\btthbt.exe68⤵PID:3152
-
\??\c:\5hhthn.exec:\5hhthn.exe69⤵PID:3028
-
\??\c:\pppdv.exec:\pppdv.exe70⤵PID:3180
-
\??\c:\vppdp.exec:\vppdp.exe71⤵PID:3196
-
\??\c:\9lfxlfr.exec:\9lfxlfr.exe72⤵PID:2292
-
\??\c:\xlxrfxl.exec:\xlxrfxl.exe73⤵PID:2900
-
\??\c:\nbtntn.exec:\nbtntn.exe74⤵PID:1044
-
\??\c:\jjpvp.exec:\jjpvp.exe75⤵PID:2728
-
\??\c:\1jdpd.exec:\1jdpd.exe76⤵PID:2724
-
\??\c:\frlxlfx.exec:\frlxlfx.exe77⤵PID:2340
-
\??\c:\xllfrlf.exec:\xllfrlf.exe78⤵PID:4748
-
\??\c:\thbtnh.exec:\thbtnh.exe79⤵PID:1452
-
\??\c:\tnbnbt.exec:\tnbnbt.exe80⤵PID:2548
-
\??\c:\vjpvj.exec:\vjpvj.exe81⤵PID:4260
-
\??\c:\xfrrrxf.exec:\xfrrrxf.exe82⤵PID:1248
-
\??\c:\flflfxr.exec:\flflfxr.exe83⤵PID:4832
-
\??\c:\nhbtnh.exec:\nhbtnh.exe84⤵PID:2700
-
\??\c:\nbbtnn.exec:\nbbtnn.exe85⤵PID:2020
-
\??\c:\vjjvj.exec:\vjjvj.exe86⤵PID:1852
-
\??\c:\1jdpj.exec:\1jdpj.exe87⤵PID:4024
-
\??\c:\9frfrlx.exec:\9frfrlx.exe88⤵PID:4872
-
\??\c:\htnnnn.exec:\htnnnn.exe89⤵PID:3756
-
\??\c:\7djvp.exec:\7djvp.exe90⤵PID:1388
-
\??\c:\fflllxx.exec:\fflllxx.exe91⤵PID:1172
-
\??\c:\1hbnnh.exec:\1hbnnh.exe92⤵PID:3596
-
\??\c:\5jjvj.exec:\5jjvj.exe93⤵PID:4784
-
\??\c:\9vpdp.exec:\9vpdp.exe94⤵PID:3424
-
\??\c:\frlfxrf.exec:\frlfxrf.exe95⤵PID:2344
-
\??\c:\tnbtnn.exec:\tnbtnn.exe96⤵PID:856
-
\??\c:\9nhtbt.exec:\9nhtbt.exe97⤵PID:4940
-
\??\c:\djjdv.exec:\djjdv.exe98⤵PID:2140
-
\??\c:\pdjdv.exec:\pdjdv.exe99⤵PID:4020
-
\??\c:\xxxrlff.exec:\xxxrlff.exe100⤵PID:944
-
\??\c:\btnhtb.exec:\btnhtb.exe101⤵PID:4644
-
\??\c:\dvvjv.exec:\dvvjv.exe102⤵PID:4156
-
\??\c:\dvvjv.exec:\dvvjv.exe103⤵PID:1096
-
\??\c:\rllxrlf.exec:\rllxrlf.exe104⤵PID:3568
-
\??\c:\bbbthh.exec:\bbbthh.exe105⤵PID:1896
-
\??\c:\ntbtnh.exec:\ntbtnh.exe106⤵PID:2776
-
\??\c:\jjvjv.exec:\jjvjv.exe107⤵PID:1260
-
\??\c:\jdpjp.exec:\jdpjp.exe108⤵PID:3728
-
\??\c:\xrrfxrx.exec:\xrrfxrx.exe109⤵PID:3200
-
\??\c:\rrlfxrf.exec:\rrlfxrf.exe110⤵PID:408
-
\??\c:\htthbn.exec:\htthbn.exe111⤵PID:2896
-
\??\c:\1tttbb.exec:\1tttbb.exe112⤵PID:2132
-
\??\c:\vpjjp.exec:\vpjjp.exe113⤵PID:1904
-
\??\c:\3dpdj.exec:\3dpdj.exe114⤵PID:3804
-
\??\c:\rfxlxrl.exec:\rfxlxrl.exe115⤵PID:4240
-
\??\c:\rxrxlfr.exec:\rxrxlfr.exe116⤵PID:4724
-
\??\c:\bhhthb.exec:\bhhthb.exe117⤵PID:2256
-
\??\c:\9nhbhh.exec:\9nhbhh.exe118⤵PID:3856
-
\??\c:\9vpdv.exec:\9vpdv.exe119⤵PID:1272
-
\??\c:\dpjdp.exec:\dpjdp.exe120⤵PID:2768
-
\??\c:\xlrlfff.exec:\xlrlfff.exe121⤵PID:5108
-
\??\c:\1tnhtt.exec:\1tnhtt.exe122⤵PID:5032
-
\??\c:\5ntnbt.exec:\5ntnbt.exe123⤵PID:1488
-
\??\c:\bntbhb.exec:\bntbhb.exe124⤵PID:1976
-
\??\c:\1ppdp.exec:\1ppdp.exe125⤵PID:4828
-
\??\c:\frfllxl.exec:\frfllxl.exe126⤵PID:4472
-
\??\c:\frrxrxr.exec:\frrxrxr.exe127⤵PID:4248
-
\??\c:\nhbtnh.exec:\nhbtnh.exe128⤵PID:5040
-
\??\c:\jdjdd.exec:\jdjdd.exe129⤵PID:3004
-
\??\c:\7jddd.exec:\7jddd.exe130⤵PID:2328
-
\??\c:\9llxffr.exec:\9llxffr.exe131⤵PID:4008
-
\??\c:\rrxrfxr.exec:\rrxrfxr.exe132⤵PID:2988
-
\??\c:\hbbtbt.exec:\hbbtbt.exe133⤵PID:1876
-
\??\c:\thhbnh.exec:\thhbnh.exe134⤵PID:1520
-
\??\c:\jvvjd.exec:\jvvjd.exe135⤵PID:428
-
\??\c:\dddpd.exec:\dddpd.exe136⤵PID:1072
-
\??\c:\rxxrfxl.exec:\rxxrfxl.exe137⤵PID:1796
-
\??\c:\vppjj.exec:\vppjj.exe138⤵PID:3952
-
\??\c:\jddpd.exec:\jddpd.exe139⤵PID:2276
-
\??\c:\rllffxf.exec:\rllffxf.exe140⤵PID:4140
-
\??\c:\fxlfrlf.exec:\fxlfrlf.exe141⤵PID:1548
-
\??\c:\hnnnhb.exec:\hnnnhb.exe142⤵PID:944
-
\??\c:\hbttht.exec:\hbttht.exe143⤵PID:1532
-
\??\c:\9ddvj.exec:\9ddvj.exe144⤵PID:2592
-
\??\c:\pdjjd.exec:\pdjjd.exe145⤵PID:2136
-
\??\c:\dvpdj.exec:\dvpdj.exe146⤵PID:1988
-
\??\c:\llfrxxl.exec:\llfrxxl.exe147⤵PID:4144
-
\??\c:\hbhtnt.exec:\hbhtnt.exe148⤵PID:436
-
\??\c:\ththtn.exec:\ththtn.exe149⤵PID:408
-
\??\c:\vjvjv.exec:\vjvjv.exe150⤵PID:4148
-
\??\c:\pdvpd.exec:\pdvpd.exe151⤵PID:3152
-
\??\c:\rrllfxf.exec:\rrllfxf.exe152⤵PID:4004
-
\??\c:\rrrlxrf.exec:\rrrlxrf.exe153⤵PID:860
-
\??\c:\1nthbt.exec:\1nthbt.exe154⤵PID:1936
-
\??\c:\pvpvp.exec:\pvpvp.exe155⤵PID:440
-
\??\c:\llllfll.exec:\llllfll.exe156⤵PID:3108
-
\??\c:\nhnbnh.exec:\nhnbnh.exe157⤵PID:3560
-
\??\c:\tntntn.exec:\tntntn.exe158⤵PID:5008
-
\??\c:\jjjvd.exec:\jjjvd.exe159⤵PID:2152
-
\??\c:\rllfxrl.exec:\rllfxrl.exe160⤵PID:592
-
\??\c:\7xrrlfx.exec:\7xrrlfx.exe161⤵PID:4532
-
\??\c:\hhnhhb.exec:\hhnhhb.exe162⤵PID:4284
-
\??\c:\bhhbtn.exec:\bhhbtn.exe163⤵PID:3124
-
\??\c:\jdjjj.exec:\jdjjj.exe164⤵PID:4260
-
\??\c:\jddpd.exec:\jddpd.exe165⤵PID:4616
-
\??\c:\jvpdp.exec:\jvpdp.exe166⤵PID:5012
-
\??\c:\xrfxrlf.exec:\xrfxrlf.exe167⤵PID:2700
-
\??\c:\3flfxfx.exec:\3flfxfx.exe168⤵PID:2020
-
\??\c:\hbbnhb.exec:\hbbnhb.exe169⤵PID:1268
-
\??\c:\pdvjp.exec:\pdvjp.exe170⤵PID:3732
-
\??\c:\3pdvd.exec:\3pdvd.exe171⤵PID:2092
-
\??\c:\frfxfxr.exec:\frfxfxr.exe172⤵PID:4064
-
\??\c:\1rrfrlf.exec:\1rrfrlf.exe173⤵PID:4040
-
\??\c:\nnnhnn.exec:\nnnhnn.exe174⤵PID:3596
-
\??\c:\bnhthb.exec:\bnhthb.exe175⤵PID:1040
-
\??\c:\jvvjd.exec:\jvvjd.exe176⤵PID:4840
-
\??\c:\pjdpv.exec:\pjdpv.exe177⤵PID:1848
-
\??\c:\xlllrlx.exec:\xlllrlx.exe178⤵PID:4140
-
\??\c:\3hbnbt.exec:\3hbnbt.exe179⤵PID:4480
-
\??\c:\hntnhn.exec:\hntnhn.exe180⤵PID:4444
-
\??\c:\dvdvd.exec:\dvdvd.exe181⤵PID:3644
-
\??\c:\dvjvj.exec:\dvjvj.exe182⤵PID:1836
-
\??\c:\xlfxrlf.exec:\xlfxrlf.exe183⤵PID:548
-
\??\c:\rrllxrl.exec:\rrllxrl.exe184⤵PID:1196
-
\??\c:\nhhnbn.exec:\nhhnbn.exe185⤵PID:3200
-
\??\c:\jddvp.exec:\jddvp.exe186⤵PID:4216
-
\??\c:\dpddp.exec:\dpddp.exe187⤵PID:4968
-
\??\c:\lxxlxlf.exec:\lxxlxlf.exe188⤵PID:4148
-
\??\c:\bhbtnh.exec:\bhbtnh.exe189⤵PID:3028
-
\??\c:\htntbt.exec:\htntbt.exe190⤵PID:4004
-
\??\c:\pdjdd.exec:\pdjdd.exe191⤵PID:3196
-
\??\c:\lrrfxxr.exec:\lrrfxxr.exe192⤵PID:4012
-
\??\c:\7ffxrrl.exec:\7ffxrrl.exe193⤵PID:440
-
\??\c:\tnnnhh.exec:\tnnnhh.exe194⤵PID:3108
-
\??\c:\hhbtbb.exec:\hhbtbb.exe195⤵PID:3560
-
\??\c:\vvpjd.exec:\vvpjd.exe196⤵PID:5108
-
\??\c:\fllllll.exec:\fllllll.exe197⤵PID:4652
-
\??\c:\9frfrlx.exec:\9frfrlx.exe198⤵PID:1488
-
\??\c:\1rlflff.exec:\1rlflff.exe199⤵PID:4532
-
\??\c:\tbthbb.exec:\tbthbb.exe200⤵PID:3652
-
\??\c:\ddjvj.exec:\ddjvj.exe201⤵PID:556
-
\??\c:\5ddpv.exec:\5ddpv.exe202⤵PID:3376
-
\??\c:\dppjp.exec:\dppjp.exe203⤵PID:3092
-
\??\c:\5flfxrf.exec:\5flfxrf.exe204⤵PID:2888
-
\??\c:\thhbtt.exec:\thhbtt.exe205⤵PID:3460
-
\??\c:\7bthbb.exec:\7bthbb.exe206⤵PID:2020
-
\??\c:\5jpjd.exec:\5jpjd.exe207⤵PID:4488
-
\??\c:\jddpj.exec:\jddpj.exe208⤵PID:3280
-
\??\c:\xflfxrl.exec:\xflfxrl.exe209⤵PID:2092
-
\??\c:\7ntntn.exec:\7ntntn.exe210⤵PID:3900
-
\??\c:\tttthb.exec:\tttthb.exe211⤵PID:4040
-
\??\c:\jdjjv.exec:\jdjjv.exe212⤵PID:4172
-
\??\c:\dpjvp.exec:\dpjvp.exe213⤵PID:1040
-
\??\c:\pvvpp.exec:\pvvpp.exe214⤵PID:4840
-
\??\c:\xlrrlfx.exec:\xlrrlfx.exe215⤵PID:1180
-
\??\c:\xxrrfxl.exec:\xxrrfxl.exe216⤵PID:4492
-
\??\c:\tbhhbb.exec:\tbhhbb.exe217⤵PID:3640
-
\??\c:\5vddp.exec:\5vddp.exe218⤵PID:5100
-
\??\c:\7ppdj.exec:\7ppdj.exe219⤵PID:2592
-
\??\c:\rlffrxr.exec:\rlffrxr.exe220⤵PID:4624
-
\??\c:\bnhbtt.exec:\bnhbtt.exe221⤵PID:1988
-
\??\c:\hbbnbt.exec:\hbbnbt.exe222⤵PID:4144
-
\??\c:\9vvpj.exec:\9vvpj.exe223⤵PID:4752
-
\??\c:\vddvp.exec:\vddvp.exe224⤵PID:1048
-
\??\c:\lxlfxff.exec:\lxlfxff.exe225⤵PID:920
-
\??\c:\hnbthb.exec:\hnbthb.exe226⤵PID:3804
-
\??\c:\5bbbtt.exec:\5bbbtt.exe227⤵PID:4240
-
\??\c:\pjvjv.exec:\pjvjv.exe228⤵PID:4136
-
\??\c:\jvvpv.exec:\jvvpv.exe229⤵PID:2256
-
\??\c:\lfxlxxx.exec:\lfxlxxx.exe230⤵PID:4824
-
\??\c:\nbbbth.exec:\nbbbth.exe231⤵PID:2816
-
\??\c:\thhthb.exec:\thhthb.exe232⤵PID:4816
-
\??\c:\vpjdv.exec:\vpjdv.exe233⤵PID:1088
-
\??\c:\5pppd.exec:\5pppd.exe234⤵PID:2152
-
\??\c:\xlfrffx.exec:\xlfrffx.exe235⤵PID:3520
-
\??\c:\llfrlxl.exec:\llfrlxl.exe236⤵PID:1636
-
\??\c:\hnnnhh.exec:\hnnnhh.exe237⤵PID:1104
-
\??\c:\hbtnhh.exec:\hbtnhh.exe238⤵PID:4248
-
\??\c:\3jjjj.exec:\3jjjj.exe239⤵PID:4616
-
\??\c:\jdvpv.exec:\jdvpv.exe240⤵PID:3092
-
\??\c:\rxxrffr.exec:\rxxrffr.exe241⤵PID:968
-