Analysis
-
max time kernel
75s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 20:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4247edb401cb2d5fa0fd9832784cda702626504c3e68ce6bfa94f6fca8260e2b.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
4247edb401cb2d5fa0fd9832784cda702626504c3e68ce6bfa94f6fca8260e2b.exe
-
Size
78KB
-
MD5
4b38251f4528474910892feef0564596
-
SHA1
af30c91d504948daef711b0cf058285eb8e02d61
-
SHA256
4247edb401cb2d5fa0fd9832784cda702626504c3e68ce6bfa94f6fca8260e2b
-
SHA512
245426544e55fbe51e26245d9825db8f290ad116a5d5ce64da6707e1c36601be05b3bb6b73fd7370db8ef97fe408b19c2fc316424c9549ec1d2a51eedcfbde5a
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIYgC/KSLJEd2arzlI:ymb3NkkiQ3mdBjFI3eFC/rzW
Malware Config
Signatures
-
Detect Blackmoon payload 30 IoCs
Processes:
resource yara_rule behavioral2/memory/2508-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2176-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3560-22-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5080-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5080-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1524-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1524-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1584-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4672-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4672-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2332-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3096-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1008-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4044-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/816-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/752-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4156-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4488-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4340-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3768-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1076-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2452-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2944-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/876-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3832-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1652-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4628-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4568-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1968-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3444-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 36 IoCs
Processes:
resource yara_rule behavioral2/memory/2508-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2176-10-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3560-19-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3560-18-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3560-17-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3560-22-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5080-28-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5080-26-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1524-36-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1524-34-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1524-33-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1584-44-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4672-52-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4672-51-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4672-50-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2332-59-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3096-66-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1008-72-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1008-75-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4044-82-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/816-91-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/752-98-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4156-105-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4488-110-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4340-115-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3768-121-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1076-127-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2452-132-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2944-139-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/876-151-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3832-163-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1652-169-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4628-175-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4568-181-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1968-187-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3444-208-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
pdjdv.exelrlfrrf.exerxfxlrx.exelxxfffr.exeddddd.exe3ntttb.exenthtth.exe1xxxxxx.exeppjdv.exerxfxlll.exe9hbbbb.exerlrrrff.exebhbthn.exedpvdj.exellxrflx.exedpvjj.exethnbnn.exepvddv.exelrxxflr.exerxlrfrx.exenhtnhn.exepvdjd.exexfxrffl.exetbhnhh.exefxlfrxr.exethhbbt.exexrxffll.exebnhtnn.exeddvjj.exebntthb.exejpjdd.exehbtnhb.exeppjpv.exerlrlxfr.exetbtnhh.exepjppv.exerxfrxrr.exehbhhtn.exevppvp.exefllllfx.exebhnntt.exehtnbtn.exedjjjd.exerllrrfr.exenbhbbt.exedvddv.exedpvjd.exexlxrrfx.exenhbtnb.exettthtb.exevjjvd.exe7xflxrr.exeflxlxfl.exetnnhhb.exeddddd.exepdpjv.exerffxrrl.exetbbtth.exedjppj.exexxlflxl.exehnttbt.exepjpjj.exeffflxlx.exexfrlffx.exepid process 2176 pdjdv.exe 3560 lrlfrrf.exe 5080 rxfxlrx.exe 1524 lxxfffr.exe 1584 ddddd.exe 4672 3ntttb.exe 2332 nthtth.exe 3096 1xxxxxx.exe 1008 ppjdv.exe 4044 rxfxlll.exe 816 9hbbbb.exe 752 rlrrrff.exe 4156 bhbthn.exe 4488 dpvdj.exe 4340 llxrflx.exe 3768 dpvjj.exe 1076 thnbnn.exe 2452 pvddv.exe 2944 lrxxflr.exe 4996 rxlrfrx.exe 876 nhtnhn.exe 5064 pvdjd.exe 3832 xfxrffl.exe 1652 tbhnhh.exe 4628 fxlfrxr.exe 4568 thhbbt.exe 1968 xrxffll.exe 3704 bnhtnn.exe 448 ddvjj.exe 3444 bntthb.exe 2080 jpjdd.exe 1132 hbtnhb.exe 1572 ppjpv.exe 4076 rlrlxfr.exe 2924 tbtnhh.exe 372 pjppv.exe 1988 rxfrxrr.exe 700 hbhhtn.exe 2176 vppvp.exe 4028 fllllfx.exe 2600 bhnntt.exe 5088 htnbtn.exe 2448 djjjd.exe 848 rllrrfr.exe 1064 nbhbbt.exe 2208 dvddv.exe 4084 dpvjd.exe 2776 xlxrrfx.exe 3640 nhbtnb.exe 2028 ttthtb.exe 3184 vjjvd.exe 3656 7xflxrr.exe 4348 flxlxfl.exe 3320 tnnhhb.exe 852 ddddd.exe 1060 pdpjv.exe 4880 rffxrrl.exe 4616 tbbtth.exe 1820 djppj.exe 1712 xxlflxl.exe 2452 hnttbt.exe 4904 pjpjj.exe 2056 ffflxlx.exe 4040 xfrlffx.exe -
Processes:
resource yara_rule behavioral2/memory/2508-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2176-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3560-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5080-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5080-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1524-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1584-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4672-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4672-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4672-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2332-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3096-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1008-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1008-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4044-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/816-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/752-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4156-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4488-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4340-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3768-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1076-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2452-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2944-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/876-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3832-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1652-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4628-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4568-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1968-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3444-208-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4247edb401cb2d5fa0fd9832784cda702626504c3e68ce6bfa94f6fca8260e2b.exepdjdv.exelrlfrrf.exerxfxlrx.exelxxfffr.exeddddd.exe3ntttb.exenthtth.exe1xxxxxx.exeppjdv.exerxfxlll.exe9hbbbb.exerlrrrff.exebhbthn.exedpvdj.exellxrflx.exedpvjj.exethnbnn.exepvddv.exelrxxflr.exerxlrfrx.exenhtnhn.exedescription pid process target process PID 2508 wrote to memory of 2176 2508 4247edb401cb2d5fa0fd9832784cda702626504c3e68ce6bfa94f6fca8260e2b.exe pdjdv.exe PID 2508 wrote to memory of 2176 2508 4247edb401cb2d5fa0fd9832784cda702626504c3e68ce6bfa94f6fca8260e2b.exe pdjdv.exe PID 2508 wrote to memory of 2176 2508 4247edb401cb2d5fa0fd9832784cda702626504c3e68ce6bfa94f6fca8260e2b.exe pdjdv.exe PID 2176 wrote to memory of 3560 2176 pdjdv.exe lrlfrrf.exe PID 2176 wrote to memory of 3560 2176 pdjdv.exe lrlfrrf.exe PID 2176 wrote to memory of 3560 2176 pdjdv.exe lrlfrrf.exe PID 3560 wrote to memory of 5080 3560 lrlfrrf.exe rxfxlrx.exe PID 3560 wrote to memory of 5080 3560 lrlfrrf.exe rxfxlrx.exe PID 3560 wrote to memory of 5080 3560 lrlfrrf.exe rxfxlrx.exe PID 5080 wrote to memory of 1524 5080 rxfxlrx.exe lxxfffr.exe PID 5080 wrote to memory of 1524 5080 rxfxlrx.exe lxxfffr.exe PID 5080 wrote to memory of 1524 5080 rxfxlrx.exe lxxfffr.exe PID 1524 wrote to memory of 1584 1524 lxxfffr.exe ddddd.exe PID 1524 wrote to memory of 1584 1524 lxxfffr.exe ddddd.exe PID 1524 wrote to memory of 1584 1524 lxxfffr.exe ddddd.exe PID 1584 wrote to memory of 4672 1584 ddddd.exe 3ntttb.exe PID 1584 wrote to memory of 4672 1584 ddddd.exe 3ntttb.exe PID 1584 wrote to memory of 4672 1584 ddddd.exe 3ntttb.exe PID 4672 wrote to memory of 2332 4672 3ntttb.exe nthtth.exe PID 4672 wrote to memory of 2332 4672 3ntttb.exe nthtth.exe PID 4672 wrote to memory of 2332 4672 3ntttb.exe nthtth.exe PID 2332 wrote to memory of 3096 2332 nthtth.exe 1xxxxxx.exe PID 2332 wrote to memory of 3096 2332 nthtth.exe 1xxxxxx.exe PID 2332 wrote to memory of 3096 2332 nthtth.exe 1xxxxxx.exe PID 3096 wrote to memory of 1008 3096 1xxxxxx.exe ppjdv.exe PID 3096 wrote to memory of 1008 3096 1xxxxxx.exe ppjdv.exe PID 3096 wrote to memory of 1008 3096 1xxxxxx.exe ppjdv.exe PID 1008 wrote to memory of 4044 1008 ppjdv.exe rxfxlll.exe PID 1008 wrote to memory of 4044 1008 ppjdv.exe rxfxlll.exe PID 1008 wrote to memory of 4044 1008 ppjdv.exe rxfxlll.exe PID 4044 wrote to memory of 816 4044 rxfxlll.exe 9hbbbb.exe PID 4044 wrote to memory of 816 4044 rxfxlll.exe 9hbbbb.exe PID 4044 wrote to memory of 816 4044 rxfxlll.exe 9hbbbb.exe PID 816 wrote to memory of 752 816 9hbbbb.exe rlrrrff.exe PID 816 wrote to memory of 752 816 9hbbbb.exe rlrrrff.exe PID 816 wrote to memory of 752 816 9hbbbb.exe rlrrrff.exe PID 752 wrote to memory of 4156 752 rlrrrff.exe bhbthn.exe PID 752 wrote to memory of 4156 752 rlrrrff.exe bhbthn.exe PID 752 wrote to memory of 4156 752 rlrrrff.exe bhbthn.exe PID 4156 wrote to memory of 4488 4156 bhbthn.exe dpvdj.exe PID 4156 wrote to memory of 4488 4156 bhbthn.exe dpvdj.exe PID 4156 wrote to memory of 4488 4156 bhbthn.exe dpvdj.exe PID 4488 wrote to memory of 4340 4488 dpvdj.exe llxrflx.exe PID 4488 wrote to memory of 4340 4488 dpvdj.exe llxrflx.exe PID 4488 wrote to memory of 4340 4488 dpvdj.exe llxrflx.exe PID 4340 wrote to memory of 3768 4340 llxrflx.exe dpvjj.exe PID 4340 wrote to memory of 3768 4340 llxrflx.exe dpvjj.exe PID 4340 wrote to memory of 3768 4340 llxrflx.exe dpvjj.exe PID 3768 wrote to memory of 1076 3768 dpvjj.exe rfllrrr.exe PID 3768 wrote to memory of 1076 3768 dpvjj.exe rfllrrr.exe PID 3768 wrote to memory of 1076 3768 dpvjj.exe rfllrrr.exe PID 1076 wrote to memory of 2452 1076 thnbnn.exe hnttbt.exe PID 1076 wrote to memory of 2452 1076 thnbnn.exe hnttbt.exe PID 1076 wrote to memory of 2452 1076 thnbnn.exe hnttbt.exe PID 2452 wrote to memory of 2944 2452 pvddv.exe lrxxflr.exe PID 2452 wrote to memory of 2944 2452 pvddv.exe lrxxflr.exe PID 2452 wrote to memory of 2944 2452 pvddv.exe lrxxflr.exe PID 2944 wrote to memory of 4996 2944 lrxxflr.exe rxlrfrx.exe PID 2944 wrote to memory of 4996 2944 lrxxflr.exe rxlrfrx.exe PID 2944 wrote to memory of 4996 2944 lrxxflr.exe rxlrfrx.exe PID 4996 wrote to memory of 876 4996 rxlrfrx.exe nhtnhn.exe PID 4996 wrote to memory of 876 4996 rxlrfrx.exe nhtnhn.exe PID 4996 wrote to memory of 876 4996 rxlrfrx.exe nhtnhn.exe PID 876 wrote to memory of 5064 876 nhtnhn.exe fxflllx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4247edb401cb2d5fa0fd9832784cda702626504c3e68ce6bfa94f6fca8260e2b.exe"C:\Users\Admin\AppData\Local\Temp\4247edb401cb2d5fa0fd9832784cda702626504c3e68ce6bfa94f6fca8260e2b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\pdjdv.exec:\pdjdv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\lrlfrrf.exec:\lrlfrrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3560 -
\??\c:\rxfxlrx.exec:\rxfxlrx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\lxxfffr.exec:\lxxfffr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
\??\c:\ddddd.exec:\ddddd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\3ntttb.exec:\3ntttb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
\??\c:\nthtth.exec:\nthtth.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2332 -
\??\c:\1xxxxxx.exec:\1xxxxxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
\??\c:\ppjdv.exec:\ppjdv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
\??\c:\rxfxlll.exec:\rxfxlll.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
\??\c:\9hbbbb.exec:\9hbbbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:816 -
\??\c:\rlrrrff.exec:\rlrrrff.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
\??\c:\bhbthn.exec:\bhbthn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
\??\c:\dpvdj.exec:\dpvdj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\llxrflx.exec:\llxrflx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4340 -
\??\c:\dpvjj.exec:\dpvjj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
\??\c:\thnbnn.exec:\thnbnn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
\??\c:\pvddv.exec:\pvddv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
\??\c:\lrxxflr.exec:\lrxxflr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\rxlrfrx.exec:\rxlrfrx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
\??\c:\nhtnhn.exec:\nhtnhn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\pvdjd.exec:\pvdjd.exe23⤵
- Executes dropped EXE
PID:5064 -
\??\c:\xfxrffl.exec:\xfxrffl.exe24⤵
- Executes dropped EXE
PID:3832 -
\??\c:\tbhnhh.exec:\tbhnhh.exe25⤵
- Executes dropped EXE
PID:1652 -
\??\c:\fxlfrxr.exec:\fxlfrxr.exe26⤵
- Executes dropped EXE
PID:4628 -
\??\c:\thhbbt.exec:\thhbbt.exe27⤵
- Executes dropped EXE
PID:4568 -
\??\c:\xrxffll.exec:\xrxffll.exe28⤵
- Executes dropped EXE
PID:1968 -
\??\c:\bnhtnn.exec:\bnhtnn.exe29⤵
- Executes dropped EXE
PID:3704 -
\??\c:\ddvjj.exec:\ddvjj.exe30⤵
- Executes dropped EXE
PID:448 -
\??\c:\bntthb.exec:\bntthb.exe31⤵
- Executes dropped EXE
PID:3444 -
\??\c:\jpjdd.exec:\jpjdd.exe32⤵
- Executes dropped EXE
PID:2080 -
\??\c:\hbtnhb.exec:\hbtnhb.exe33⤵
- Executes dropped EXE
PID:1132 -
\??\c:\ppjpv.exec:\ppjpv.exe34⤵
- Executes dropped EXE
PID:1572 -
\??\c:\rlrlxfr.exec:\rlrlxfr.exe35⤵
- Executes dropped EXE
PID:4076 -
\??\c:\tbtnhh.exec:\tbtnhh.exe36⤵
- Executes dropped EXE
PID:2924 -
\??\c:\pjppv.exec:\pjppv.exe37⤵
- Executes dropped EXE
PID:372 -
\??\c:\rxfrxrr.exec:\rxfrxrr.exe38⤵
- Executes dropped EXE
PID:1988 -
\??\c:\hbhhtn.exec:\hbhhtn.exe39⤵
- Executes dropped EXE
PID:700 -
\??\c:\vppvp.exec:\vppvp.exe40⤵
- Executes dropped EXE
PID:2176 -
\??\c:\fllllfx.exec:\fllllfx.exe41⤵
- Executes dropped EXE
PID:4028 -
\??\c:\bhnntt.exec:\bhnntt.exe42⤵
- Executes dropped EXE
PID:2600 -
\??\c:\htnbtn.exec:\htnbtn.exe43⤵
- Executes dropped EXE
PID:5088 -
\??\c:\djjjd.exec:\djjjd.exe44⤵
- Executes dropped EXE
PID:2448 -
\??\c:\rllrrfr.exec:\rllrrfr.exe45⤵
- Executes dropped EXE
PID:848 -
\??\c:\nbhbbt.exec:\nbhbbt.exe46⤵
- Executes dropped EXE
PID:1064 -
\??\c:\dvddv.exec:\dvddv.exe47⤵
- Executes dropped EXE
PID:2208 -
\??\c:\dpvjd.exec:\dpvjd.exe48⤵
- Executes dropped EXE
PID:4084 -
\??\c:\xlxrrfx.exec:\xlxrrfx.exe49⤵
- Executes dropped EXE
PID:2776 -
\??\c:\nhbtnb.exec:\nhbtnb.exe50⤵
- Executes dropped EXE
PID:3640 -
\??\c:\ttthtb.exec:\ttthtb.exe51⤵
- Executes dropped EXE
PID:2028 -
\??\c:\vjjvd.exec:\vjjvd.exe52⤵
- Executes dropped EXE
PID:3184 -
\??\c:\7xflxrr.exec:\7xflxrr.exe53⤵
- Executes dropped EXE
PID:3656 -
\??\c:\flxlxfl.exec:\flxlxfl.exe54⤵
- Executes dropped EXE
PID:4348 -
\??\c:\tnnhhb.exec:\tnnhhb.exe55⤵
- Executes dropped EXE
PID:3320 -
\??\c:\ddddd.exec:\ddddd.exe56⤵
- Executes dropped EXE
PID:852 -
\??\c:\pdpjv.exec:\pdpjv.exe57⤵
- Executes dropped EXE
PID:1060 -
\??\c:\rffxrrl.exec:\rffxrrl.exe58⤵
- Executes dropped EXE
PID:4880 -
\??\c:\tbbtth.exec:\tbbtth.exe59⤵
- Executes dropped EXE
PID:4616 -
\??\c:\djppj.exec:\djppj.exe60⤵
- Executes dropped EXE
PID:1820 -
\??\c:\xxlflxl.exec:\xxlflxl.exe61⤵
- Executes dropped EXE
PID:1712 -
\??\c:\hnttbt.exec:\hnttbt.exe62⤵
- Executes dropped EXE
PID:2452 -
\??\c:\pjpjj.exec:\pjpjj.exe63⤵
- Executes dropped EXE
PID:4904 -
\??\c:\ffflxlx.exec:\ffflxlx.exe64⤵
- Executes dropped EXE
PID:2056 -
\??\c:\xfrlffx.exec:\xfrlffx.exe65⤵
- Executes dropped EXE
PID:4040 -
\??\c:\lrllxrl.exec:\lrllxrl.exe66⤵PID:2280
-
\??\c:\fxflllx.exec:\fxflllx.exe67⤵PID:5064
-
\??\c:\hbbnth.exec:\hbbnth.exe68⤵PID:2172
-
\??\c:\ddjdd.exec:\ddjdd.exe69⤵PID:3408
-
\??\c:\fflfrrx.exec:\fflfrrx.exe70⤵PID:2524
-
\??\c:\hnbbbn.exec:\hnbbbn.exe71⤵PID:1468
-
\??\c:\dvpdv.exec:\dvpdv.exe72⤵PID:4524
-
\??\c:\lfllfxl.exec:\lfllfxl.exe73⤵PID:1968
-
\??\c:\lfrfflf.exec:\lfrfflf.exe74⤵PID:4412
-
\??\c:\7btbbh.exec:\7btbbh.exe75⤵PID:1052
-
\??\c:\vddvd.exec:\vddvd.exe76⤵PID:2444
-
\??\c:\rrrlffx.exec:\rrrlffx.exe77⤵PID:2016
-
\??\c:\xfxxrrr.exec:\xfxxrrr.exe78⤵PID:2400
-
\??\c:\hhnttn.exec:\hhnttn.exe79⤵PID:1528
-
\??\c:\dvvpj.exec:\dvvpj.exe80⤵PID:1668
-
\??\c:\fxlfxfl.exec:\fxlfxfl.exe81⤵PID:4428
-
\??\c:\rxxrrxr.exec:\rxxrrxr.exe82⤵PID:2924
-
\??\c:\hntbbh.exec:\hntbbh.exe83⤵PID:8
-
\??\c:\jppjp.exec:\jppjp.exe84⤵PID:372
-
\??\c:\rlrfrrx.exec:\rlrfrrx.exe85⤵PID:4852
-
\??\c:\hbhbht.exec:\hbhbht.exe86⤵PID:640
-
\??\c:\vdvpj.exec:\vdvpj.exe87⤵PID:2552
-
\??\c:\5rxrxfl.exec:\5rxrxfl.exe88⤵PID:1404
-
\??\c:\nnnnbt.exec:\nnnnbt.exe89⤵PID:1928
-
\??\c:\hbbbhn.exec:\hbbbhn.exe90⤵PID:2448
-
\??\c:\flxxrrr.exec:\flxxrrr.exe91⤵PID:4648
-
\??\c:\xxrlxll.exec:\xxrlxll.exe92⤵PID:2100
-
\??\c:\ddppv.exec:\ddppv.exe93⤵PID:3324
-
\??\c:\rlllrxf.exec:\rlllrxf.exe94⤵PID:3396
-
\??\c:\nnbbhb.exec:\nnbbhb.exe95⤵PID:3720
-
\??\c:\pjpjd.exec:\pjpjd.exe96⤵PID:5024
-
\??\c:\fxxrfff.exec:\fxxrfff.exe97⤵PID:1072
-
\??\c:\hbthnb.exec:\hbthnb.exe98⤵PID:4964
-
\??\c:\nbhbtn.exec:\nbhbtn.exe99⤵PID:3716
-
\??\c:\jjddd.exec:\jjddd.exe100⤵PID:4460
-
\??\c:\lfllrrx.exec:\lfllrrx.exe101⤵PID:4792
-
\??\c:\nntthb.exec:\nntthb.exe102⤵PID:4768
-
\??\c:\3vdjj.exec:\3vdjj.exe103⤵PID:1060
-
\??\c:\fxfxffx.exec:\fxfxffx.exe104⤵PID:4772
-
\??\c:\rfllrrr.exec:\rfllrrr.exe105⤵PID:1076
-
\??\c:\bntnnb.exec:\bntnnb.exe106⤵PID:4644
-
\??\c:\ppdvj.exec:\ppdvj.exe107⤵PID:3892
-
\??\c:\xxllfll.exec:\xxllfll.exe108⤵PID:1400
-
\??\c:\lxrlffx.exec:\lxrlffx.exe109⤵PID:5028
-
\??\c:\bbbnhn.exec:\bbbnhn.exe110⤵PID:972
-
\??\c:\djppv.exec:\djppv.exe111⤵PID:1232
-
\??\c:\xfxxrlf.exec:\xfxxrlf.exe112⤵PID:3996
-
\??\c:\frffllx.exec:\frffllx.exe113⤵PID:3528
-
\??\c:\hnbtbh.exec:\hnbtbh.exe114⤵PID:468
-
\??\c:\7vjdv.exec:\7vjdv.exe115⤵PID:3032
-
\??\c:\ffxxrrf.exec:\ffxxrrf.exe116⤵PID:4744
-
\??\c:\hbbbhh.exec:\hbbbhh.exe117⤵PID:3800
-
\??\c:\5hnnht.exec:\5hnnht.exe118⤵PID:1504
-
\??\c:\vpvpv.exec:\vpvpv.exe119⤵PID:4572
-
\??\c:\5xlxxlr.exec:\5xlxxlr.exe120⤵PID:1528
-
\??\c:\thbtth.exec:\thbtth.exe121⤵PID:2540
-
\??\c:\httnht.exec:\httnht.exe122⤵PID:2616
-
\??\c:\pjddd.exec:\pjddd.exe123⤵PID:4424
-
\??\c:\xxrrflf.exec:\xxrrflf.exe124⤵PID:372
-
\??\c:\nhhnhb.exec:\nhhnhb.exe125⤵PID:440
-
\??\c:\dddvj.exec:\dddvj.exe126⤵PID:4604
-
\??\c:\lflfrfl.exec:\lflfrfl.exe127⤵PID:2992
-
\??\c:\hnntht.exec:\hnntht.exe128⤵PID:4620
-
\??\c:\dvjdj.exec:\dvjdj.exe129⤵PID:3572
-
\??\c:\fxxlllf.exec:\fxxlllf.exe130⤵PID:3780
-
\??\c:\thtnhh.exec:\thtnhh.exe131⤵PID:4672
-
\??\c:\ddjjd.exec:\ddjjd.exe132⤵PID:4624
-
\??\c:\3flfxfx.exec:\3flfxfx.exe133⤵PID:5000
-
\??\c:\1nhnnt.exec:\1nhnnt.exe134⤵PID:2776
-
\??\c:\ddjjp.exec:\ddjjp.exe135⤵PID:4840
-
\??\c:\fllllfl.exec:\fllllfl.exe136⤵PID:2028
-
\??\c:\nhnntt.exec:\nhnntt.exe137⤵PID:2792
-
\??\c:\djjdv.exec:\djjdv.exe138⤵PID:1636
-
\??\c:\lllfrlf.exec:\lllfrlf.exe139⤵PID:3320
-
\??\c:\ntbhtn.exec:\ntbhtn.exe140⤵PID:852
-
\??\c:\jvppv.exec:\jvppv.exe141⤵PID:4476
-
\??\c:\jpppv.exec:\jpppv.exe142⤵PID:4880
-
\??\c:\bbntth.exec:\bbntth.exe143⤵PID:1820
-
\??\c:\pdppj.exec:\pdppj.exe144⤵PID:1076
-
\??\c:\hnbbbt.exec:\hnbbbt.exe145⤵PID:2944
-
\??\c:\rrrxxlr.exec:\rrrxxlr.exe146⤵PID:4904
-
\??\c:\xlxffrx.exec:\xlxffrx.exe147⤵PID:3028
-
\??\c:\hhbbbb.exec:\hhbbbb.exe148⤵PID:5028
-
\??\c:\djdpj.exec:\djdpj.exe149⤵PID:972
-
\??\c:\fllllll.exec:\fllllll.exe150⤵PID:1232
-
\??\c:\bhhhhn.exec:\bhhhhn.exe151⤵PID:3408
-
\??\c:\djpvj.exec:\djpvj.exe152⤵PID:3884
-
\??\c:\pjdpd.exec:\pjdpd.exe153⤵PID:4524
-
\??\c:\flxrlxl.exec:\flxrlxl.exe154⤵PID:4176
-
\??\c:\nnbhhn.exec:\nnbhhn.exe155⤵PID:4492
-
\??\c:\bnbnht.exec:\bnbnht.exe156⤵PID:3424
-
\??\c:\vjvpj.exec:\vjvpj.exe157⤵PID:2188
-
\??\c:\3rfrffr.exec:\3rfrffr.exe158⤵PID:5020
-
\??\c:\lrxllxl.exec:\lrxllxl.exe159⤵PID:4500
-
\??\c:\tbbbtt.exec:\tbbbtt.exe160⤵PID:2616
-
\??\c:\ddvvp.exec:\ddvvp.exe161⤵PID:8
-
\??\c:\vdpjj.exec:\vdpjj.exe162⤵PID:1544
-
\??\c:\9lxrlfx.exec:\9lxrlfx.exe163⤵PID:2176
-
\??\c:\nnbbhb.exec:\nnbbhb.exe164⤵PID:3312
-
\??\c:\dvddd.exec:\dvddd.exe165⤵PID:3276
-
\??\c:\dppvp.exec:\dppvp.exe166⤵PID:848
-
\??\c:\fffxrrx.exec:\fffxrrx.exe167⤵PID:3572
-
\??\c:\tbbbnt.exec:\tbbbnt.exe168⤵PID:2208
-
\??\c:\vjdvv.exec:\vjdvv.exe169⤵PID:4672
-
\??\c:\pjppp.exec:\pjppp.exe170⤵PID:2908
-
\??\c:\5nnnnt.exec:\5nnnnt.exe171⤵PID:5000
-
\??\c:\jpppd.exec:\jpppd.exe172⤵PID:380
-
\??\c:\lllffrl.exec:\lllffrl.exe173⤵PID:3184
-
\??\c:\nhbnhh.exec:\nhbnhh.exe174⤵PID:3656
-
\??\c:\ttbbhn.exec:\ttbbhn.exe175⤵PID:4456
-
\??\c:\ddpdp.exec:\ddpdp.exe176⤵PID:4156
-
\??\c:\xrlxxrl.exec:\xrlxxrl.exe177⤵PID:4488
-
\??\c:\bnttbb.exec:\bnttbb.exe178⤵PID:3912
-
\??\c:\htnhhh.exec:\htnhhh.exe179⤵PID:1496
-
\??\c:\vdvjp.exec:\vdvjp.exe180⤵PID:3252
-
\??\c:\rxlrxrl.exec:\rxlrxrl.exe181⤵PID:3304
-
\??\c:\bhhhhh.exec:\bhhhhh.exe182⤵PID:1076
-
\??\c:\3tnhhh.exec:\3tnhhh.exe183⤵PID:2944
-
\??\c:\jpdjd.exec:\jpdjd.exe184⤵PID:1532
-
\??\c:\bbbhhb.exec:\bbbhhb.exe185⤵PID:3844
-
\??\c:\pvjvv.exec:\pvjvv.exe186⤵PID:3848
-
\??\c:\xxxfllx.exec:\xxxfllx.exe187⤵PID:5008
-
\??\c:\xfrrllr.exec:\xfrrllr.exe188⤵PID:4352
-
\??\c:\9tbttb.exec:\9tbttb.exe189⤵PID:1468
-
\??\c:\pjdvd.exec:\pjdvd.exe190⤵PID:4824
-
\??\c:\vvddp.exec:\vvddp.exe191⤵PID:448
-
\??\c:\llrfrrl.exec:\llrfrrl.exe192⤵PID:1256
-
\??\c:\tnbntn.exec:\tnbntn.exe193⤵PID:1336
-
\??\c:\bhnnnn.exec:\bhnnnn.exe194⤵PID:2188
-
\??\c:\dppjv.exec:\dppjv.exe195⤵PID:3748
-
\??\c:\llrllxr.exec:\llrllxr.exe196⤵PID:716
-
\??\c:\rxrfrlf.exec:\rxrfrlf.exe197⤵PID:656
-
\??\c:\httnbh.exec:\httnbh.exe198⤵PID:1884
-
\??\c:\jdjdj.exec:\jdjdj.exe199⤵PID:1220
-
\??\c:\xfrrxxf.exec:\xfrrxxf.exe200⤵PID:4992
-
\??\c:\7tnnbh.exec:\7tnnbh.exe201⤵PID:3224
-
\??\c:\vpddd.exec:\vpddd.exe202⤵PID:3916
-
\??\c:\7jjdd.exec:\7jjdd.exe203⤵PID:1688
-
\??\c:\xfflffl.exec:\xfflffl.exe204⤵PID:2620
-
\??\c:\nnbbhb.exec:\nnbbhb.exe205⤵PID:1644
-
\??\c:\nhtbbb.exec:\nhtbbb.exe206⤵PID:4796
-
\??\c:\9dpdv.exec:\9dpdv.exe207⤵PID:4044
-
\??\c:\rlfxxfx.exec:\rlfxxfx.exe208⤵PID:1108
-
\??\c:\lxrxxrx.exec:\lxrxxrx.exe209⤵PID:2028
-
\??\c:\vjvvd.exec:\vjvvd.exe210⤵PID:4884
-
\??\c:\djvpp.exec:\djvpp.exe211⤵PID:1364
-
\??\c:\rrfflxl.exec:\rrfflxl.exe212⤵PID:748
-
\??\c:\frlfrlf.exec:\frlfrlf.exe213⤵PID:4768
-
\??\c:\bnnbtb.exec:\bnnbtb.exe214⤵PID:3088
-
\??\c:\hbnhnh.exec:\hbnhnh.exe215⤵PID:3816
-
\??\c:\vpdjp.exec:\vpdjp.exe216⤵PID:1396
-
\??\c:\djjdp.exec:\djjdp.exe217⤵PID:1252
-
\??\c:\flxrfll.exec:\flxrfll.exe218⤵PID:3892
-
\??\c:\bbttnn.exec:\bbttnn.exe219⤵PID:2552
-
\??\c:\ntnttb.exec:\ntnttb.exe220⤵PID:4360
-
\??\c:\vpdvv.exec:\vpdvv.exe221⤵PID:4528
-
\??\c:\xfrlxxr.exec:\xfrlxxr.exe222⤵PID:1388
-
\??\c:\fffrflr.exec:\fffrflr.exe223⤵PID:4464
-
\??\c:\hthbht.exec:\hthbht.exe224⤵PID:1968
-
\??\c:\ddjdv.exec:\ddjdv.exe225⤵PID:4020
-
\??\c:\9pdpv.exec:\9pdpv.exe226⤵PID:4876
-
\??\c:\xrlxllf.exec:\xrlxllf.exe227⤵PID:2836
-
\??\c:\5fxlfff.exec:\5fxlfff.exe228⤵PID:3920
-
\??\c:\lxfrlrl.exec:\lxfrlrl.exe229⤵PID:3456
-
\??\c:\thhttt.exec:\thhttt.exe230⤵PID:2924
-
\??\c:\djjvp.exec:\djjvp.exe231⤵PID:4500
-
\??\c:\vvppp.exec:\vvppp.exe232⤵PID:400
-
\??\c:\7xxfflf.exec:\7xxfflf.exe233⤵PID:3448
-
\??\c:\bbbbtt.exec:\bbbbtt.exe234⤵PID:2176
-
\??\c:\btbbhh.exec:\btbbhh.exe235⤵PID:2992
-
\??\c:\vdpjj.exec:\vdpjj.exe236⤵PID:916
-
\??\c:\pjjdv.exec:\pjjdv.exe237⤵PID:3276
-
\??\c:\xlfxrlf.exec:\xlfxrlf.exe238⤵PID:4752
-
\??\c:\5rrlxxx.exec:\5rrlxxx.exe239⤵PID:2208
-
\??\c:\bbtnbb.exec:\bbtnbb.exe240⤵PID:2712
-
\??\c:\hnbbhb.exec:\hnbbhb.exe241⤵PID:5024
-
\??\c:\vppvp.exec:\vppvp.exe242⤵PID:2908