Analysis
-
max time kernel
151s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2022, 07:28
Static task
static1
Behavioral task
behavioral1
Sample
861f4e889effa9294f17c5b73cf043b2dd4b55806efc1a83e6ac7ca7c2d614ce.exe
Resource
win7-20220812-en
5 signatures
150 seconds
General
-
Target
861f4e889effa9294f17c5b73cf043b2dd4b55806efc1a83e6ac7ca7c2d614ce.exe
-
Size
477KB
-
MD5
2207246e5b0bf668cdd4ce2de2d3f254
-
SHA1
7efb75b527c8427eb76809e7e417e4c62fc0f5b0
-
SHA256
861f4e889effa9294f17c5b73cf043b2dd4b55806efc1a83e6ac7ca7c2d614ce
-
SHA512
bb12449d59d41b7e812028c35c2dcd92e0d45905696922d159659fec427154dee85d46eee2b7aff9f7b283a54af270eaddd4eaa7404799f5331693120b09f099
-
SSDEEP
6144:8cm7ImGddXmNt251UriZFwT+aZKl7pg1xBI:q7Tc2NYHUrAwT+OKLSjI
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/4900-135-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4784-139-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4872-144-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/2948-147-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4192-149-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4192-152-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4656-160-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4328-164-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1140-156-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1280-168-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1056-173-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1000-172-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1056-177-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4772-181-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/5084-185-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/2192-186-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/2192-190-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/3764-199-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/116-203-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/3856-207-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/3060-195-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4492-219-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/788-248-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1948-244-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/5112-240-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4100-236-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4692-233-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1520-229-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/3196-250-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/5092-227-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/3196-254-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1540-257-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/792-261-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1348-265-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/5092-220-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/728-216-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4496-211-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/3060-191-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/2556-267-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4016-269-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/444-271-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/444-272-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4580-274-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1680-276-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/644-280-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/2796-278-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1932-282-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4376-288-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4368-287-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1512-285-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1612-290-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1612-291-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1728-297-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/536-295-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4684-293-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/1464-299-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/816-301-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/2928-303-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/3936-305-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4904-307-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4768-309-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/4768-310-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/812-312-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon behavioral2/memory/5048-314-0x0000000000400000-0x00000000004C4000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4784 xjfdt.exe 4872 dtpxv.exe 2948 tppdr.exe 4192 bvttx.exe 1140 vvbjr.exe 4656 lbnbv.exe 4328 vtbdldr.exe 1280 jrlxbnt.exe 1000 rvnfdfl.exe 1056 rltnd.exe 4772 xlvxf.exe 5084 pxjnv.exe 2192 bhpfbxt.exe 3060 tvhjr.exe 3764 vnbfvfb.exe 116 jjlfpbr.exe 3856 rfhxf.exe 4496 lhllndr.exe 728 rrthd.exe 4492 vfrbhv.exe 5092 xxhnjn.exe 1520 xfvxpdl.exe 4692 lnbdp.exe 4100 flfxnhx.exe 5112 jfvvj.exe 1948 xfnnvtv.exe 788 fjfnt.exe 3196 vfpnrd.exe 1540 tpvnj.exe 792 rdnnx.exe 1348 npfrrdd.exe 2556 hbphpv.exe 4016 nfhllv.exe 444 htnnldl.exe 4580 xprhrhv.exe 1680 txbxrvf.exe 2796 brdtr.exe 644 rrdrfx.exe 1932 nlrltx.exe 1512 xvbblnb.exe 4368 lblhh.exe 4376 fhltxxl.exe 1612 nnbjb.exe 4684 phjdjl.exe 536 ftxxr.exe 1728 tjvhnv.exe 1464 htbvrbj.exe 816 xbrddf.exe 2928 bdjddl.exe 3936 lplhb.exe 4904 bnjdpv.exe 4768 fnlphv.exe 812 xjtnjfb.exe 5048 jvrnf.exe 1576 jlxlbdn.exe 4872 tfjlv.exe 3004 lvfjpp.exe 4544 brvvdnd.exe 3292 ptjdrv.exe 4656 nhtxf.exe 3736 ftpfh.exe 3428 lbltrbb.exe 1504 jvlnv.exe 2252 pfxhj.exe -
resource yara_rule behavioral2/memory/4900-135-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4784-139-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4872-144-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/2948-147-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4192-149-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4192-152-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4656-160-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4328-164-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1140-156-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1280-168-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1056-173-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1000-172-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1056-177-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4772-181-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/5084-185-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/2192-190-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3764-199-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/116-203-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3856-207-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3060-195-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4492-219-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/788-248-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1948-244-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/5112-240-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4100-236-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4692-233-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1520-229-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3196-250-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/5092-227-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3196-254-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1540-257-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/792-261-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1348-265-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/5092-220-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/728-216-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4496-211-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3060-191-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/2556-267-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4016-269-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/444-271-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/444-272-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4580-274-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1680-276-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/644-280-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/2796-278-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1932-282-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4376-288-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4368-287-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1512-285-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1612-290-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1612-291-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1728-297-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/536-295-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4684-293-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/1464-299-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/816-301-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/2928-303-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/3936-305-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4904-307-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4768-309-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/4768-310-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/812-312-0x0000000000400000-0x00000000004C4000-memory.dmp upx behavioral2/memory/5048-314-0x0000000000400000-0x00000000004C4000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4784 4900 861f4e889effa9294f17c5b73cf043b2dd4b55806efc1a83e6ac7ca7c2d614ce.exe 83 PID 4900 wrote to memory of 4784 4900 861f4e889effa9294f17c5b73cf043b2dd4b55806efc1a83e6ac7ca7c2d614ce.exe 83 PID 4900 wrote to memory of 4784 4900 861f4e889effa9294f17c5b73cf043b2dd4b55806efc1a83e6ac7ca7c2d614ce.exe 83 PID 4784 wrote to memory of 4872 4784 xjfdt.exe 84 PID 4784 wrote to memory of 4872 4784 xjfdt.exe 84 PID 4784 wrote to memory of 4872 4784 xjfdt.exe 84 PID 4872 wrote to memory of 2948 4872 dtpxv.exe 85 PID 4872 wrote to memory of 2948 4872 dtpxv.exe 85 PID 4872 wrote to memory of 2948 4872 dtpxv.exe 85 PID 2948 wrote to memory of 4192 2948 tppdr.exe 86 PID 2948 wrote to memory of 4192 2948 tppdr.exe 86 PID 2948 wrote to memory of 4192 2948 tppdr.exe 86 PID 4192 wrote to memory of 1140 4192 bvttx.exe 87 PID 4192 wrote to memory of 1140 4192 bvttx.exe 87 PID 4192 wrote to memory of 1140 4192 bvttx.exe 87 PID 1140 wrote to memory of 4656 1140 vvbjr.exe 88 PID 1140 wrote to memory of 4656 1140 vvbjr.exe 88 PID 1140 wrote to memory of 4656 1140 vvbjr.exe 88 PID 4656 wrote to memory of 4328 4656 lbnbv.exe 89 PID 4656 wrote to memory of 4328 4656 lbnbv.exe 89 PID 4656 wrote to memory of 4328 4656 lbnbv.exe 89 PID 4328 wrote to memory of 1280 4328 vtbdldr.exe 90 PID 4328 wrote to memory of 1280 4328 vtbdldr.exe 90 PID 4328 wrote to memory of 1280 4328 vtbdldr.exe 90 PID 1280 wrote to memory of 1000 1280 jrlxbnt.exe 91 PID 1280 wrote to memory of 1000 1280 jrlxbnt.exe 91 PID 1280 wrote to memory of 1000 1280 jrlxbnt.exe 91 PID 1000 wrote to memory of 1056 1000 rvnfdfl.exe 94 PID 1000 wrote to memory of 1056 1000 rvnfdfl.exe 94 PID 1000 wrote to memory of 1056 1000 rvnfdfl.exe 94 PID 1056 wrote to memory of 4772 1056 rltnd.exe 92 PID 1056 wrote to memory of 4772 1056 rltnd.exe 92 PID 1056 wrote to memory of 4772 1056 rltnd.exe 92 PID 4772 wrote to memory of 5084 4772 xlvxf.exe 93 PID 4772 wrote to memory of 5084 4772 xlvxf.exe 93 PID 4772 wrote to memory of 5084 4772 xlvxf.exe 93 PID 5084 wrote to memory of 2192 5084 pxjnv.exe 95 PID 5084 wrote to memory of 2192 5084 pxjnv.exe 95 PID 5084 wrote to memory of 2192 5084 pxjnv.exe 95 PID 2192 wrote to memory of 3060 2192 bhpfbxt.exe 96 PID 2192 wrote to memory of 3060 2192 bhpfbxt.exe 96 PID 2192 wrote to memory of 3060 2192 bhpfbxt.exe 96 PID 3060 wrote to memory of 3764 3060 tvhjr.exe 97 PID 3060 wrote to memory of 3764 3060 tvhjr.exe 97 PID 3060 wrote to memory of 3764 3060 tvhjr.exe 97 PID 3764 wrote to memory of 116 3764 vnbfvfb.exe 98 PID 3764 wrote to memory of 116 3764 vnbfvfb.exe 98 PID 3764 wrote to memory of 116 3764 vnbfvfb.exe 98 PID 116 wrote to memory of 3856 116 jjlfpbr.exe 99 PID 116 wrote to memory of 3856 116 jjlfpbr.exe 99 PID 116 wrote to memory of 3856 116 jjlfpbr.exe 99 PID 3856 wrote to memory of 4496 3856 rfhxf.exe 100 PID 3856 wrote to memory of 4496 3856 rfhxf.exe 100 PID 3856 wrote to memory of 4496 3856 rfhxf.exe 100 PID 4496 wrote to memory of 728 4496 lhllndr.exe 101 PID 4496 wrote to memory of 728 4496 lhllndr.exe 101 PID 4496 wrote to memory of 728 4496 lhllndr.exe 101 PID 728 wrote to memory of 4492 728 rrthd.exe 104 PID 728 wrote to memory of 4492 728 rrthd.exe 104 PID 728 wrote to memory of 4492 728 rrthd.exe 104 PID 4492 wrote to memory of 5092 4492 vfrbhv.exe 118 PID 4492 wrote to memory of 5092 4492 vfrbhv.exe 118 PID 4492 wrote to memory of 5092 4492 vfrbhv.exe 118 PID 5092 wrote to memory of 1520 5092 xxhnjn.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\861f4e889effa9294f17c5b73cf043b2dd4b55806efc1a83e6ac7ca7c2d614ce.exe"C:\Users\Admin\AppData\Local\Temp\861f4e889effa9294f17c5b73cf043b2dd4b55806efc1a83e6ac7ca7c2d614ce.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
\??\c:\xjfdt.exec:\xjfdt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
\??\c:\dtpxv.exec:\dtpxv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
\??\c:\tppdr.exec:\tppdr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\bvttx.exec:\bvttx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
\??\c:\vvbjr.exec:\vvbjr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
\??\c:\lbnbv.exec:\lbnbv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
\??\c:\vtbdldr.exec:\vtbdldr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4328 -
\??\c:\jrlxbnt.exec:\jrlxbnt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
\??\c:\rvnfdfl.exec:\rvnfdfl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1000 -
\??\c:\rltnd.exec:\rltnd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056
-
-
-
-
-
-
-
-
-
-
-
\??\c:\xlvxf.exec:\xlvxf.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4772 -
\??\c:\pxjnv.exec:\pxjnv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5084 -
\??\c:\bhpfbxt.exec:\bhpfbxt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\tvhjr.exec:\tvhjr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\vnbfvfb.exec:\vnbfvfb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
\??\c:\jjlfpbr.exec:\jjlfpbr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
\??\c:\rfhxf.exec:\rfhxf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3856 -
\??\c:\lhllndr.exec:\lhllndr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
\??\c:\rrthd.exec:\rrthd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:728 -
\??\c:\vfrbhv.exec:\vfrbhv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
\??\c:\xxhnjn.exec:\xxhnjn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092
-
-
-
-
-
-
-
-
-
-
-
\??\c:\xfvxpdl.exec:\xfvxpdl.exe1⤵
- Executes dropped EXE
PID:1520 -
\??\c:\lnbdp.exec:\lnbdp.exe2⤵
- Executes dropped EXE
PID:4692
-
-
\??\c:\tpvnj.exec:\tpvnj.exe1⤵
- Executes dropped EXE
PID:1540 -
\??\c:\rdnnx.exec:\rdnnx.exe2⤵
- Executes dropped EXE
PID:792 -
\??\c:\npfrrdd.exec:\npfrrdd.exe3⤵
- Executes dropped EXE
PID:1348 -
\??\c:\hbphpv.exec:\hbphpv.exe4⤵
- Executes dropped EXE
PID:2556 -
\??\c:\nfhllv.exec:\nfhllv.exe5⤵
- Executes dropped EXE
PID:4016 -
\??\c:\htnnldl.exec:\htnnldl.exe6⤵
- Executes dropped EXE
PID:444 -
\??\c:\xprhrhv.exec:\xprhrhv.exe7⤵
- Executes dropped EXE
PID:4580 -
\??\c:\txbxrvf.exec:\txbxrvf.exe8⤵
- Executes dropped EXE
PID:1680 -
\??\c:\brdtr.exec:\brdtr.exe9⤵
- Executes dropped EXE
PID:2796 -
\??\c:\rrdrfx.exec:\rrdrfx.exe10⤵
- Executes dropped EXE
PID:644 -
\??\c:\nlrltx.exec:\nlrltx.exe11⤵
- Executes dropped EXE
PID:1932 -
\??\c:\xvbblnb.exec:\xvbblnb.exe12⤵
- Executes dropped EXE
PID:1512 -
\??\c:\lblhh.exec:\lblhh.exe13⤵
- Executes dropped EXE
PID:4368 -
\??\c:\fhltxxl.exec:\fhltxxl.exe14⤵
- Executes dropped EXE
PID:4376 -
\??\c:\nnbjb.exec:\nnbjb.exe15⤵
- Executes dropped EXE
PID:1612 -
\??\c:\phjdjl.exec:\phjdjl.exe16⤵
- Executes dropped EXE
PID:4684 -
\??\c:\ftxxr.exec:\ftxxr.exe17⤵
- Executes dropped EXE
PID:536 -
\??\c:\tjvhnv.exec:\tjvhnv.exe18⤵
- Executes dropped EXE
PID:1728 -
\??\c:\htbvrbj.exec:\htbvrbj.exe19⤵
- Executes dropped EXE
PID:1464 -
\??\c:\xbrddf.exec:\xbrddf.exe20⤵
- Executes dropped EXE
PID:816 -
\??\c:\bdjddl.exec:\bdjddl.exe21⤵
- Executes dropped EXE
PID:2928 -
\??\c:\lplhb.exec:\lplhb.exe22⤵
- Executes dropped EXE
PID:3936 -
\??\c:\bnjdpv.exec:\bnjdpv.exe23⤵
- Executes dropped EXE
PID:4904 -
\??\c:\fnlphv.exec:\fnlphv.exe24⤵
- Executes dropped EXE
PID:4768 -
\??\c:\xjtnjfb.exec:\xjtnjfb.exe25⤵
- Executes dropped EXE
PID:812 -
\??\c:\jvrnf.exec:\jvrnf.exe26⤵
- Executes dropped EXE
PID:5048 -
\??\c:\jlxlbdn.exec:\jlxlbdn.exe27⤵
- Executes dropped EXE
PID:1576 -
\??\c:\tfjlv.exec:\tfjlv.exe28⤵
- Executes dropped EXE
PID:4872 -
\??\c:\lvfjpp.exec:\lvfjpp.exe29⤵
- Executes dropped EXE
PID:3004 -
\??\c:\brvvdnd.exec:\brvvdnd.exe30⤵
- Executes dropped EXE
PID:4544 -
\??\c:\ptjdrv.exec:\ptjdrv.exe31⤵
- Executes dropped EXE
PID:3292 -
\??\c:\nhtxf.exec:\nhtxf.exe32⤵
- Executes dropped EXE
PID:4656 -
\??\c:\ftpfh.exec:\ftpfh.exe33⤵
- Executes dropped EXE
PID:3736 -
\??\c:\lbltrbb.exec:\lbltrbb.exe34⤵
- Executes dropped EXE
PID:3428 -
\??\c:\jvlnv.exec:\jvlnv.exe35⤵
- Executes dropped EXE
PID:1504 -
\??\c:\pfxhj.exec:\pfxhj.exe36⤵
- Executes dropped EXE
PID:2252 -
\??\c:\jhtrxdt.exec:\jhtrxdt.exe37⤵PID:1012
-
\??\c:\jhhnfl.exec:\jhhnfl.exe38⤵PID:884
-
\??\c:\vndjr.exec:\vndjr.exe39⤵PID:8
-
\??\c:\fbtvxl.exec:\fbtvxl.exe40⤵PID:2296
-
\??\c:\fhrrvlv.exec:\fhrrvlv.exe41⤵PID:4556
-
\??\c:\tfphfr.exec:\tfphfr.exe42⤵PID:2284
-
\??\c:\bnhxhd.exec:\bnhxhd.exe43⤵PID:2492
-
\??\c:\vtxpj.exec:\vtxpj.exe44⤵PID:2220
-
\??\c:\jnhhr.exec:\jnhhr.exe45⤵PID:2264
-
\??\c:\hpxvvj.exec:\hpxvvj.exe46⤵PID:2192
-
\??\c:\hbjdr.exec:\hbjdr.exe47⤵PID:4476
-
\??\c:\hntbx.exec:\hntbx.exe48⤵PID:3924
-
\??\c:\vpljjrp.exec:\vpljjrp.exe49⤵PID:2004
-
\??\c:\lhpvtn.exec:\lhpvtn.exe50⤵PID:4536
-
\??\c:\thjvpxl.exec:\thjvpxl.exe51⤵PID:4624
-
\??\c:\pjdpnn.exec:\pjdpnn.exe52⤵PID:204
-
\??\c:\rvrffhd.exec:\rvrffhd.exe53⤵PID:2364
-
\??\c:\jllntl.exec:\jllntl.exe54⤵PID:3748
-
\??\c:\rvjvrdr.exec:\rvjvrdr.exe55⤵PID:4324
-
\??\c:\fpvppx.exec:\fpvppx.exe56⤵PID:728
-
\??\c:\vrlljn.exec:\vrlljn.exe57⤵PID:2424
-
\??\c:\nxjrd.exec:\nxjrd.exe58⤵PID:1168
-
\??\c:\llrln.exec:\llrln.exe59⤵PID:5092
-
\??\c:\ndvbd.exec:\ndvbd.exe60⤵PID:1352
-
\??\c:\ptjlrt.exec:\ptjlrt.exe61⤵PID:3240
-
\??\c:\vfvbf.exec:\vfvbf.exe62⤵PID:4692
-
\??\c:\frvvf.exec:\frvvf.exe63⤵PID:5096
-
\??\c:\tlrxvxd.exec:\tlrxvxd.exe64⤵PID:1164
-
\??\c:\bvjrb.exec:\bvjrb.exe65⤵PID:2932
-
\??\c:\fdhpnx.exec:\fdhpnx.exe66⤵PID:4736
-
\??\c:\vpndtfv.exec:\vpndtfv.exe67⤵PID:4472
-
\??\c:\njnlt.exec:\njnlt.exe68⤵PID:4300
-
\??\c:\rfxtrr.exec:\rfxtrr.exe69⤵PID:5100
-
\??\c:\fjxbh.exec:\fjxbh.exe70⤵PID:3468
-
\??\c:\tbtvp.exec:\tbtvp.exe71⤵PID:2440
-
\??\c:\drljft.exec:\drljft.exe72⤵PID:1100
-
\??\c:\tvpfj.exec:\tvpfj.exe73⤵PID:1540
-
\??\c:\hfxbhlp.exec:\hfxbhlp.exe74⤵PID:1768
-
\??\c:\lvjphld.exec:\lvjphld.exe75⤵PID:992
-
\??\c:\djdvtjb.exec:\djdvtjb.exe76⤵PID:5032
-
\??\c:\vjbfbl.exec:\vjbfbl.exe77⤵PID:4640
-
\??\c:\ldprf.exec:\ldprf.exe78⤵PID:2840
-
\??\c:\xtbjvnx.exec:\xtbjvnx.exe79⤵PID:4140
-
\??\c:\btbbt.exec:\btbbt.exe80⤵PID:4592
-
\??\c:\vhbdt.exec:\vhbdt.exe81⤵PID:3708
-
\??\c:\ppvbth.exec:\ppvbth.exe82⤵PID:3032
-
\??\c:\btdbxl.exec:\btdbxl.exe83⤵PID:4064
-
\??\c:\bdhxnh.exec:\bdhxnh.exe84⤵PID:5064
-
\??\c:\hvnhnfv.exec:\hvnhnfv.exe85⤵PID:3048
-
\??\c:\lvhbbp.exec:\lvhbbp.exe86⤵PID:4204
-
\??\c:\nxfptd.exec:\nxfptd.exe87⤵PID:3716
-
\??\c:\btddnnr.exec:\btddnnr.exe88⤵PID:4720
-
\??\c:\hxjhp.exec:\hxjhp.exe89⤵PID:1152
-
\??\c:\vhltnjl.exec:\vhltnjl.exe90⤵PID:536
-
\??\c:\rbpbh.exec:\rbpbh.exe91⤵PID:4124
-
\??\c:\fhtbj.exec:\fhtbj.exe92⤵PID:1464
-
\??\c:\brxxd.exec:\brxxd.exe93⤵PID:3968
-
\??\c:\frvhlpt.exec:\frvhlpt.exe94⤵PID:3960
-
\??\c:\fnjfhln.exec:\fnjfhln.exe95⤵PID:776
-
\??\c:\vnpxrtf.exec:\vnpxrtf.exe96⤵PID:4928
-
\??\c:\jthblbf.exec:\jthblbf.exe97⤵PID:4904
-
\??\c:\jblpdl.exec:\jblpdl.exe98⤵PID:2108
-
\??\c:\nllnj.exec:\nllnj.exe99⤵PID:4768
-
\??\c:\rtnvxn.exec:\rtnvxn.exe100⤵PID:4480
-
\??\c:\xhhjt.exec:\xhhjt.exe101⤵PID:2948
-
\??\c:\rbrjh.exec:\rbrjh.exe102⤵PID:1192
-
\??\c:\fjnlbb.exec:\fjnlbb.exe103⤵PID:4976
-
\??\c:\jxnftp.exec:\jxnftp.exe104⤵PID:4880
-
\??\c:\nttvpbf.exec:\nttvpbf.exe105⤵PID:2012
-
\??\c:\npphhx.exec:\npphhx.exe106⤵PID:2860
-
\??\c:\dlpnlx.exec:\dlpnlx.exe107⤵PID:4184
-
\??\c:\rbhxf.exec:\rbhxf.exe108⤵PID:2816
-
\??\c:\fnfdr.exec:\fnfdr.exe109⤵PID:2984
-
\??\c:\dhjjnnn.exec:\dhjjnnn.exe110⤵PID:740
-
\??\c:\fbrrjt.exec:\fbrrjt.exe111⤵PID:896
-
\??\c:\hpfjtn.exec:\hpfjtn.exe112⤵PID:1240
-
\??\c:\nhhvxdx.exec:\nhhvxdx.exe113⤵PID:2344
-
\??\c:\lfdlnx.exec:\lfdlnx.exe114⤵PID:2024
-
\??\c:\dvpxdfj.exec:\dvpxdfj.exe115⤵PID:1012
-
\??\c:\hjbnrbp.exec:\hjbnrbp.exe116⤵PID:884
-
\??\c:\lbbxfdn.exec:\lbbxfdn.exe117⤵PID:8
-
\??\c:\dhbjjdj.exec:\dhbjjdj.exe118⤵PID:4576
-
\??\c:\txrfb.exec:\txrfb.exe119⤵PID:4772
-
\??\c:\xhnvj.exec:\xhnvj.exe120⤵PID:2284
-
\??\c:\fpvjldf.exec:\fpvjldf.exe121⤵PID:2492
-
\??\c:\rrnvllx.exec:\rrnvllx.exe122⤵PID:4232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-