Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 18:46
Behavioral task
behavioral1
Sample
1141c3c682e58cad2dca9ec2a652e408dde4ea33470b8c3ec06b7b08470ef4b2.exe
Resource
win7-20240221-en
6 signatures
150 seconds
General
-
Target
1141c3c682e58cad2dca9ec2a652e408dde4ea33470b8c3ec06b7b08470ef4b2.exe
-
Size
233KB
-
MD5
1529132f6cf1b8be43bf3f71abc48f28
-
SHA1
a79e83fbb8bd34965b70189c15d639827a057cc8
-
SHA256
1141c3c682e58cad2dca9ec2a652e408dde4ea33470b8c3ec06b7b08470ef4b2
-
SHA512
bd8f31fdd24e7f3f05cd5f27997778063ce25c86edce8e26698092076f869e624fb2c49564ff423e9a7e1a757c4b818fb6cfc1b028716efc1eed20a2011e5181
-
SSDEEP
6144:kcm4FmowdHoSSGpJw4PqhraHcpOmFTHDGYhEf5X2aY:y4wFHoSSGpJwGeeFmFTNAp29
Malware Config
Signatures
-
Detect Blackmoon payload 43 IoCs
Processes:
resource yara_rule behavioral1/memory/3036-7-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2208-17-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2560-28-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2696-45-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2416-63-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2488-66-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2980-82-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2396-90-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/1300-100-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2860-117-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2056-120-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2588-144-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2764-153-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2188-162-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/1736-179-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2220-205-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2604-208-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2116-224-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/1040-232-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/1044-242-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/1080-258-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/292-276-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2624-340-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2696-365-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2488-385-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/852-483-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/1636-508-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2220-509-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/592-528-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/1056-547-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2660-593-0x00000000003C0000-0x00000000003F7000-memory.dmp family_blackmoon behavioral1/memory/2716-670-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2488-695-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/1312-752-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/804-765-0x0000000000220000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/1840-784-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2184-838-0x0000000000220000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2136-879-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2440-893-0x00000000002B0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/1992-901-0x0000000000400000-0x0000000000437000-memory.dmp family_blackmoon behavioral1/memory/2936-900-0x0000000000220000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/652-921-0x0000000000220000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2476-999-0x00000000002C0000-0x00000000002F7000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/3036-1-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\dhhfj.exe UPX behavioral1/memory/2208-9-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/3036-7-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/2208-17-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\lddxb.exe UPX C:\xpjvf.exe UPX behavioral1/memory/2560-28-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/2564-29-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\htdrxr.exe UPX \??\c:\xnxrn.exe UPX behavioral1/memory/2696-45-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\xnfxt.exe UPX C:\nxptn.exe UPX behavioral1/memory/2416-63-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/2488-66-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/2980-73-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\lfrfj.exe UPX C:\xrrtvtb.exe UPX behavioral1/memory/2980-82-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\rvldj.exe UPX behavioral1/memory/2396-90-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\pppdfbn.exe UPX behavioral1/memory/564-102-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/1300-100-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\hvhjfpl.exe UPX C:\xlvxhff.exe UPX behavioral1/memory/2860-117-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/2056-120-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\phrvvnf.exe UPX C:\npbphjp.exe UPX C:\xpdbd.exe UPX behavioral1/memory/2588-144-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/2764-153-0x0000000000400000-0x0000000000437000-memory.dmp UPX \??\c:\tjdbld.exe UPX C:\lftfvf.exe UPX behavioral1/memory/2188-162-0x0000000000400000-0x0000000000437000-memory.dmp UPX \??\c:\lhhxv.exe UPX behavioral1/memory/1736-179-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\lvdtn.exe UPX behavioral1/memory/2296-189-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\lflpf.exe UPX C:\xpvvr.exe UPX behavioral1/memory/2220-205-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\jxnbn.exe UPX behavioral1/memory/2604-208-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\rlvdvr.exe UPX behavioral1/memory/2116-224-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\hrtnd.exe UPX C:\rrxvv.exe UPX behavioral1/memory/1040-232-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/1044-242-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\hbfphfd.exe UPX C:\txdrl.exe UPX C:\vbvbdb.exe UPX behavioral1/memory/1080-258-0x0000000000400000-0x0000000000437000-memory.dmp UPX C:\hfbxrt.exe UPX C:\jnvjp.exe UPX \??\c:\jphlj.exe UPX behavioral1/memory/292-276-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/2624-340-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/2696-365-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/1216-372-0x0000000000400000-0x0000000000437000-memory.dmp UPX behavioral1/memory/2488-385-0x0000000000400000-0x0000000000437000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
dhhfj.exelddxb.exexpjvf.exehtdrxr.exexnxrn.exexnfxt.exenxptn.exelfrfj.exexrrtvtb.exervldj.exepppdfbn.exehvhjfpl.exexlvxhff.exephrvvnf.exenpbphjp.exexpdbd.exetjdbld.exelftfvf.exelhhxv.exelvdtn.exelflpf.exexpvvr.exejxnbn.exerlvdvr.exehrtnd.exerrxvv.exehbfphfd.exetxdrl.exevbvbdb.exehfbxrt.exejphlj.exejnvjp.exevpdfn.exexvvhr.exelrtflj.exetllhh.exednlflr.exejxxjdb.exetdbnjx.exerrdrb.exejrblh.exehjjpr.exebhnvtfr.exerjhxdl.exenxthxh.exetjrtvp.exejhhxrbd.exexdhjbpv.exebfflrtr.exeflhhrx.exehrdvblp.exeptfbfx.exehhvhv.exehllbfvp.exefvhfh.exebvjpttp.exednddnvf.exexhvfpv.exexrbbbd.exendjtv.exedbjtrl.exedlhbbvl.exedxllhfv.exephnbnr.exepid process 2208 dhhfj.exe 2560 lddxb.exe 2564 xpjvf.exe 2696 htdrxr.exe 2548 xnxrn.exe 2416 xnfxt.exe 2488 nxptn.exe 2980 lfrfj.exe 2396 xrrtvtb.exe 1300 rvldj.exe 564 pppdfbn.exe 2860 hvhjfpl.exe 2056 xlvxhff.exe 2788 phrvvnf.exe 2588 npbphjp.exe 2764 xpdbd.exe 2188 tjdbld.exe 2792 lftfvf.exe 1736 lhhxv.exe 1284 lvdtn.exe 2296 lflpf.exe 2220 xpvvr.exe 2604 jxnbn.exe 2116 rlvdvr.exe 1040 hrtnd.exe 1044 rrxvv.exe 2328 hbfphfd.exe 1080 txdrl.exe 1440 vbvbdb.exe 292 hfbxrt.exe 964 jphlj.exe 2880 jnvjp.exe 1932 vpdfn.exe 860 xvvhr.exe 872 lrtflj.exe 2000 tllhh.exe 3036 dnlflr.exe 1600 jxxjdb.exe 1988 tdbnjx.exe 2624 rrdrb.exe 2896 jrblh.exe 2528 hjjpr.exe 2500 bhnvtfr.exe 2696 rjhxdl.exe 2432 nxthxh.exe 1216 tjrtvp.exe 2488 jhhxrbd.exe 2732 xdhjbpv.exe 2480 bfflrtr.exe 880 flhhrx.exe 568 hrdvblp.exe 1356 ptfbfx.exe 2972 hhvhv.exe 1656 hllbfvp.exe 2512 fvhfh.exe 2796 bvjpttp.exe 2788 dnddnvf.exe 2588 xhvfpv.exe 1480 xrbbbd.exe 2800 ndjtv.exe 2776 dbjtrl.exe 852 dlhbbvl.exe 840 dxllhfv.exe 2304 phnbnr.exe -
Processes:
resource yara_rule behavioral1/memory/3036-1-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\dhhfj.exe upx behavioral1/memory/2208-9-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/3036-7-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2208-17-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\lddxb.exe upx C:\xpjvf.exe upx behavioral1/memory/2560-28-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2564-29-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\htdrxr.exe upx \??\c:\xnxrn.exe upx behavioral1/memory/2696-45-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\xnfxt.exe upx C:\nxptn.exe upx behavioral1/memory/2416-63-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2488-66-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2980-73-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\lfrfj.exe upx C:\xrrtvtb.exe upx behavioral1/memory/2980-82-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\rvldj.exe upx behavioral1/memory/2396-90-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\pppdfbn.exe upx behavioral1/memory/564-102-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/1300-100-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\hvhjfpl.exe upx C:\xlvxhff.exe upx behavioral1/memory/2860-117-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2056-120-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\phrvvnf.exe upx C:\npbphjp.exe upx C:\xpdbd.exe upx behavioral1/memory/2588-144-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2764-153-0x0000000000400000-0x0000000000437000-memory.dmp upx \??\c:\tjdbld.exe upx C:\lftfvf.exe upx behavioral1/memory/2188-162-0x0000000000400000-0x0000000000437000-memory.dmp upx \??\c:\lhhxv.exe upx behavioral1/memory/1736-179-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\lvdtn.exe upx behavioral1/memory/2296-189-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\lflpf.exe upx C:\xpvvr.exe upx behavioral1/memory/2220-205-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\jxnbn.exe upx behavioral1/memory/2604-208-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\rlvdvr.exe upx behavioral1/memory/2116-224-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\hrtnd.exe upx C:\rrxvv.exe upx behavioral1/memory/1040-232-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/1044-242-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\hbfphfd.exe upx C:\txdrl.exe upx C:\vbvbdb.exe upx behavioral1/memory/1080-258-0x0000000000400000-0x0000000000437000-memory.dmp upx C:\hfbxrt.exe upx C:\jnvjp.exe upx \??\c:\jphlj.exe upx behavioral1/memory/292-276-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2624-340-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2696-365-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/1216-372-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral1/memory/2488-385-0x0000000000400000-0x0000000000437000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1141c3c682e58cad2dca9ec2a652e408dde4ea33470b8c3ec06b7b08470ef4b2.exedhhfj.exelddxb.exexpjvf.exehtdrxr.exexnxrn.exexnfxt.exenxptn.exelfrfj.exexrrtvtb.exervldj.exepppdfbn.exehvhjfpl.exexlvxhff.exephrvvnf.exenpbphjp.exedescription pid process target process PID 3036 wrote to memory of 2208 3036 1141c3c682e58cad2dca9ec2a652e408dde4ea33470b8c3ec06b7b08470ef4b2.exe dhhfj.exe PID 3036 wrote to memory of 2208 3036 1141c3c682e58cad2dca9ec2a652e408dde4ea33470b8c3ec06b7b08470ef4b2.exe dhhfj.exe PID 3036 wrote to memory of 2208 3036 1141c3c682e58cad2dca9ec2a652e408dde4ea33470b8c3ec06b7b08470ef4b2.exe dhhfj.exe PID 3036 wrote to memory of 2208 3036 1141c3c682e58cad2dca9ec2a652e408dde4ea33470b8c3ec06b7b08470ef4b2.exe dhhfj.exe PID 2208 wrote to memory of 2560 2208 dhhfj.exe lddxb.exe PID 2208 wrote to memory of 2560 2208 dhhfj.exe lddxb.exe PID 2208 wrote to memory of 2560 2208 dhhfj.exe lddxb.exe PID 2208 wrote to memory of 2560 2208 dhhfj.exe lddxb.exe PID 2560 wrote to memory of 2564 2560 lddxb.exe xpjvf.exe PID 2560 wrote to memory of 2564 2560 lddxb.exe xpjvf.exe PID 2560 wrote to memory of 2564 2560 lddxb.exe xpjvf.exe PID 2560 wrote to memory of 2564 2560 lddxb.exe xpjvf.exe PID 2564 wrote to memory of 2696 2564 xpjvf.exe htdrxr.exe PID 2564 wrote to memory of 2696 2564 xpjvf.exe htdrxr.exe PID 2564 wrote to memory of 2696 2564 xpjvf.exe htdrxr.exe PID 2564 wrote to memory of 2696 2564 xpjvf.exe htdrxr.exe PID 2696 wrote to memory of 2548 2696 htdrxr.exe xnxrn.exe PID 2696 wrote to memory of 2548 2696 htdrxr.exe xnxrn.exe PID 2696 wrote to memory of 2548 2696 htdrxr.exe xnxrn.exe PID 2696 wrote to memory of 2548 2696 htdrxr.exe xnxrn.exe PID 2548 wrote to memory of 2416 2548 xnxrn.exe xnfxt.exe PID 2548 wrote to memory of 2416 2548 xnxrn.exe xnfxt.exe PID 2548 wrote to memory of 2416 2548 xnxrn.exe xnfxt.exe PID 2548 wrote to memory of 2416 2548 xnxrn.exe xnfxt.exe PID 2416 wrote to memory of 2488 2416 xnfxt.exe nxptn.exe PID 2416 wrote to memory of 2488 2416 xnfxt.exe nxptn.exe PID 2416 wrote to memory of 2488 2416 xnfxt.exe nxptn.exe PID 2416 wrote to memory of 2488 2416 xnfxt.exe nxptn.exe PID 2488 wrote to memory of 2980 2488 nxptn.exe lfrfj.exe PID 2488 wrote to memory of 2980 2488 nxptn.exe lfrfj.exe PID 2488 wrote to memory of 2980 2488 nxptn.exe lfrfj.exe PID 2488 wrote to memory of 2980 2488 nxptn.exe lfrfj.exe PID 2980 wrote to memory of 2396 2980 lfrfj.exe xrrtvtb.exe PID 2980 wrote to memory of 2396 2980 lfrfj.exe xrrtvtb.exe PID 2980 wrote to memory of 2396 2980 lfrfj.exe xrrtvtb.exe PID 2980 wrote to memory of 2396 2980 lfrfj.exe xrrtvtb.exe PID 2396 wrote to memory of 1300 2396 xrrtvtb.exe rvldj.exe PID 2396 wrote to memory of 1300 2396 xrrtvtb.exe rvldj.exe PID 2396 wrote to memory of 1300 2396 xrrtvtb.exe rvldj.exe PID 2396 wrote to memory of 1300 2396 xrrtvtb.exe rvldj.exe PID 1300 wrote to memory of 564 1300 rvldj.exe pppdfbn.exe PID 1300 wrote to memory of 564 1300 rvldj.exe pppdfbn.exe PID 1300 wrote to memory of 564 1300 rvldj.exe pppdfbn.exe PID 1300 wrote to memory of 564 1300 rvldj.exe pppdfbn.exe PID 564 wrote to memory of 2860 564 pppdfbn.exe hvhjfpl.exe PID 564 wrote to memory of 2860 564 pppdfbn.exe hvhjfpl.exe PID 564 wrote to memory of 2860 564 pppdfbn.exe hvhjfpl.exe PID 564 wrote to memory of 2860 564 pppdfbn.exe hvhjfpl.exe PID 2860 wrote to memory of 2056 2860 hvhjfpl.exe xlvxhff.exe PID 2860 wrote to memory of 2056 2860 hvhjfpl.exe xlvxhff.exe PID 2860 wrote to memory of 2056 2860 hvhjfpl.exe xlvxhff.exe PID 2860 wrote to memory of 2056 2860 hvhjfpl.exe xlvxhff.exe PID 2056 wrote to memory of 2788 2056 xlvxhff.exe phrvvnf.exe PID 2056 wrote to memory of 2788 2056 xlvxhff.exe phrvvnf.exe PID 2056 wrote to memory of 2788 2056 xlvxhff.exe phrvvnf.exe PID 2056 wrote to memory of 2788 2056 xlvxhff.exe phrvvnf.exe PID 2788 wrote to memory of 2588 2788 phrvvnf.exe npbphjp.exe PID 2788 wrote to memory of 2588 2788 phrvvnf.exe npbphjp.exe PID 2788 wrote to memory of 2588 2788 phrvvnf.exe npbphjp.exe PID 2788 wrote to memory of 2588 2788 phrvvnf.exe npbphjp.exe PID 2588 wrote to memory of 2764 2588 npbphjp.exe xpdbd.exe PID 2588 wrote to memory of 2764 2588 npbphjp.exe xpdbd.exe PID 2588 wrote to memory of 2764 2588 npbphjp.exe xpdbd.exe PID 2588 wrote to memory of 2764 2588 npbphjp.exe xpdbd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1141c3c682e58cad2dca9ec2a652e408dde4ea33470b8c3ec06b7b08470ef4b2.exe"C:\Users\Admin\AppData\Local\Temp\1141c3c682e58cad2dca9ec2a652e408dde4ea33470b8c3ec06b7b08470ef4b2.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\dhhfj.exec:\dhhfj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lddxb.exec:\lddxb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xpjvf.exec:\xpjvf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\htdrxr.exec:\htdrxr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xnxrn.exec:\xnxrn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xnfxt.exec:\xnfxt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nxptn.exec:\nxptn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfrfj.exec:\lfrfj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrrtvtb.exec:\xrrtvtb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rvldj.exec:\rvldj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pppdfbn.exec:\pppdfbn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hvhjfpl.exec:\hvhjfpl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlvxhff.exec:\xlvxhff.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\phrvvnf.exec:\phrvvnf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\npbphjp.exec:\npbphjp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xpdbd.exec:\xpdbd.exe17⤵
- Executes dropped EXE
-
\??\c:\tjdbld.exec:\tjdbld.exe18⤵
- Executes dropped EXE
-
\??\c:\lftfvf.exec:\lftfvf.exe19⤵
- Executes dropped EXE
-
\??\c:\lhhxv.exec:\lhhxv.exe20⤵
- Executes dropped EXE
-
\??\c:\lvdtn.exec:\lvdtn.exe21⤵
- Executes dropped EXE
-
\??\c:\lflpf.exec:\lflpf.exe22⤵
- Executes dropped EXE
-
\??\c:\xpvvr.exec:\xpvvr.exe23⤵
- Executes dropped EXE
-
\??\c:\jxnbn.exec:\jxnbn.exe24⤵
- Executes dropped EXE
-
\??\c:\rlvdvr.exec:\rlvdvr.exe25⤵
- Executes dropped EXE
-
\??\c:\hrtnd.exec:\hrtnd.exe26⤵
- Executes dropped EXE
-
\??\c:\rrxvv.exec:\rrxvv.exe27⤵
- Executes dropped EXE
-
\??\c:\hbfphfd.exec:\hbfphfd.exe28⤵
- Executes dropped EXE
-
\??\c:\txdrl.exec:\txdrl.exe29⤵
- Executes dropped EXE
-
\??\c:\vbvbdb.exec:\vbvbdb.exe30⤵
- Executes dropped EXE
-
\??\c:\hfbxrt.exec:\hfbxrt.exe31⤵
- Executes dropped EXE
-
\??\c:\jphlj.exec:\jphlj.exe32⤵
- Executes dropped EXE
-
\??\c:\jnvjp.exec:\jnvjp.exe33⤵
- Executes dropped EXE
-
\??\c:\vpdfn.exec:\vpdfn.exe34⤵
- Executes dropped EXE
-
\??\c:\xvvhr.exec:\xvvhr.exe35⤵
- Executes dropped EXE
-
\??\c:\lrtflj.exec:\lrtflj.exe36⤵
- Executes dropped EXE
-
\??\c:\tllhh.exec:\tllhh.exe37⤵
- Executes dropped EXE
-
\??\c:\dnlflr.exec:\dnlflr.exe38⤵
- Executes dropped EXE
-
\??\c:\jxxjdb.exec:\jxxjdb.exe39⤵
- Executes dropped EXE
-
\??\c:\tdbnjx.exec:\tdbnjx.exe40⤵
- Executes dropped EXE
-
\??\c:\rrdrb.exec:\rrdrb.exe41⤵
- Executes dropped EXE
-
\??\c:\jrblh.exec:\jrblh.exe42⤵
- Executes dropped EXE
-
\??\c:\hjjpr.exec:\hjjpr.exe43⤵
- Executes dropped EXE
-
\??\c:\bhnvtfr.exec:\bhnvtfr.exe44⤵
- Executes dropped EXE
-
\??\c:\rjhxdl.exec:\rjhxdl.exe45⤵
- Executes dropped EXE
-
\??\c:\nxthxh.exec:\nxthxh.exe46⤵
- Executes dropped EXE
-
\??\c:\tjrtvp.exec:\tjrtvp.exe47⤵
- Executes dropped EXE
-
\??\c:\jhhxrbd.exec:\jhhxrbd.exe48⤵
- Executes dropped EXE
-
\??\c:\xdhjbpv.exec:\xdhjbpv.exe49⤵
- Executes dropped EXE
-
\??\c:\bfflrtr.exec:\bfflrtr.exe50⤵
- Executes dropped EXE
-
\??\c:\flhhrx.exec:\flhhrx.exe51⤵
- Executes dropped EXE
-
\??\c:\hrdvblp.exec:\hrdvblp.exe52⤵
- Executes dropped EXE
-
\??\c:\ptfbfx.exec:\ptfbfx.exe53⤵
- Executes dropped EXE
-
\??\c:\hhvhv.exec:\hhvhv.exe54⤵
- Executes dropped EXE
-
\??\c:\hllbfvp.exec:\hllbfvp.exe55⤵
- Executes dropped EXE
-
\??\c:\fvhfh.exec:\fvhfh.exe56⤵
- Executes dropped EXE
-
\??\c:\bvjpttp.exec:\bvjpttp.exe57⤵
- Executes dropped EXE
-
\??\c:\dnddnvf.exec:\dnddnvf.exe58⤵
- Executes dropped EXE
-
\??\c:\xhvfpv.exec:\xhvfpv.exe59⤵
- Executes dropped EXE
-
\??\c:\xrbbbd.exec:\xrbbbd.exe60⤵
- Executes dropped EXE
-
\??\c:\ndjtv.exec:\ndjtv.exe61⤵
- Executes dropped EXE
-
\??\c:\dbjtrl.exec:\dbjtrl.exe62⤵
- Executes dropped EXE
-
\??\c:\dlhbbvl.exec:\dlhbbvl.exe63⤵
- Executes dropped EXE
-
\??\c:\dxllhfv.exec:\dxllhfv.exe64⤵
- Executes dropped EXE
-
\??\c:\phnbnr.exec:\phnbnr.exe65⤵
- Executes dropped EXE
-
\??\c:\rdbfb.exec:\rdbfb.exe66⤵
-
\??\c:\jfddthl.exec:\jfddthl.exe67⤵
-
\??\c:\hrxpvh.exec:\hrxpvh.exe68⤵
-
\??\c:\nplfdbx.exec:\nplfdbx.exe69⤵
-
\??\c:\nlpdtf.exec:\nlpdtf.exe70⤵
-
\??\c:\fdjtxvx.exec:\fdjtxvx.exe71⤵
-
\??\c:\thfjpx.exec:\thfjpx.exe72⤵
-
\??\c:\bvhphd.exec:\bvhphd.exe73⤵
-
\??\c:\hnvfttt.exec:\hnvfttt.exe74⤵
-
\??\c:\tppvl.exec:\tppvl.exe75⤵
-
\??\c:\vvnlxj.exec:\vvnlxj.exe76⤵
-
\??\c:\fnrdn.exec:\fnrdn.exe77⤵
-
\??\c:\lrlrh.exec:\lrlrh.exe78⤵
-
\??\c:\njtjt.exec:\njtjt.exe79⤵
-
\??\c:\fnjfvj.exec:\fnjfvj.exe80⤵
-
\??\c:\htdrftd.exec:\htdrftd.exe81⤵
-
\??\c:\nppfd.exec:\nppfd.exe82⤵
-
\??\c:\jpphlrt.exec:\jpphlrt.exe83⤵
-
\??\c:\njtrn.exec:\njtrn.exe84⤵
-
\??\c:\nbpjvxl.exec:\nbpjvxl.exe85⤵
-
\??\c:\jbvrh.exec:\jbvrh.exe86⤵
-
\??\c:\hnnhvx.exec:\hnnhvx.exe87⤵
-
\??\c:\bdljpnn.exec:\bdljpnn.exe88⤵
-
\??\c:\nlhthf.exec:\nlhthf.exe89⤵
-
\??\c:\hnnhhpf.exec:\hnnhhpf.exe90⤵
-
\??\c:\lrxxtd.exec:\lrxxtd.exe91⤵
-
\??\c:\dxlpdd.exec:\dxlpdd.exe92⤵
-
\??\c:\rdxlj.exec:\rdxlj.exe93⤵
-
\??\c:\pfxbh.exec:\pfxbh.exe94⤵
-
\??\c:\dpvhxn.exec:\dpvhxn.exe95⤵
-
\??\c:\fnxllvr.exec:\fnxllvr.exe96⤵
-
\??\c:\ldndb.exec:\ldndb.exe97⤵
-
\??\c:\vllbf.exec:\vllbf.exe98⤵
-
\??\c:\jtvxxf.exec:\jtvxxf.exe99⤵
-
\??\c:\xhhtxlj.exec:\xhhtxlj.exe100⤵
-
\??\c:\hvppf.exec:\hvppf.exe101⤵
-
\??\c:\dllfx.exec:\dllfx.exe102⤵
-
\??\c:\bldfx.exec:\bldfx.exe103⤵
-
\??\c:\tvvrdfr.exec:\tvvrdfr.exe104⤵
-
\??\c:\hvvrdbr.exec:\hvvrdbr.exe105⤵
-
\??\c:\rvjtjt.exec:\rvjtjt.exe106⤵
-
\??\c:\thfttdf.exec:\thfttdf.exe107⤵
-
\??\c:\dxlhpp.exec:\dxlhpp.exe108⤵
-
\??\c:\jrvnn.exec:\jrvnn.exe109⤵
-
\??\c:\btpdt.exec:\btpdt.exe110⤵
-
\??\c:\htvdl.exec:\htvdl.exe111⤵
-
\??\c:\lvdlxnb.exec:\lvdlxnb.exe112⤵
-
\??\c:\dvpjltb.exec:\dvpjltb.exe113⤵
-
\??\c:\ljxrp.exec:\ljxrp.exe114⤵
-
\??\c:\xdnrhfl.exec:\xdnrhfl.exe115⤵
-
\??\c:\djfhbr.exec:\djfhbr.exe116⤵
-
\??\c:\pxtvh.exec:\pxtvh.exe117⤵
-
\??\c:\jpxrtbn.exec:\jpxrtbn.exe118⤵
-
\??\c:\nnjbtlv.exec:\nnjbtlv.exe119⤵
-
\??\c:\ndxlb.exec:\ndxlb.exe120⤵
-
\??\c:\fjnjt.exec:\fjnjt.exe121⤵
-
\??\c:\lbvhbf.exec:\lbvhbf.exe122⤵
-
\??\c:\rrlhr.exec:\rrlhr.exe123⤵
-
\??\c:\rfhvn.exec:\rfhvn.exe124⤵
-
\??\c:\rbpnd.exec:\rbpnd.exe125⤵
-
\??\c:\vxdlp.exec:\vxdlp.exe126⤵
-
\??\c:\lhbblr.exec:\lhbblr.exe127⤵
-
\??\c:\xndtl.exec:\xndtl.exe128⤵
-
\??\c:\nvdjxlt.exec:\nvdjxlt.exe129⤵
-
\??\c:\nrxfxhp.exec:\nrxfxhp.exe130⤵
-
\??\c:\ltlrppf.exec:\ltlrppf.exe131⤵
-
\??\c:\dltdxv.exec:\dltdxv.exe132⤵
-
\??\c:\fxvjvvp.exec:\fxvjvvp.exe133⤵
-
\??\c:\fvxfj.exec:\fvxfj.exe134⤵
-
\??\c:\hrdhbpj.exec:\hrdhbpj.exe135⤵
-
\??\c:\bntvjnx.exec:\bntvjnx.exe136⤵
-
\??\c:\vpjhjf.exec:\vpjhjf.exe137⤵
-
\??\c:\jfjhbx.exec:\jfjhbx.exe138⤵
-
\??\c:\rpjbh.exec:\rpjbh.exe139⤵
-
\??\c:\rvbtv.exec:\rvbtv.exe140⤵
-
\??\c:\nrvfdfj.exec:\nrvfdfj.exe141⤵
-
\??\c:\xvrth.exec:\xvrth.exe142⤵
-
\??\c:\hvhfnhj.exec:\hvhfnhj.exe143⤵
-
\??\c:\rnhvrhn.exec:\rnhvrhn.exe144⤵
-
\??\c:\dvxxdhf.exec:\dvxxdhf.exe145⤵
-
\??\c:\vtrtx.exec:\vtrtx.exe146⤵
-
\??\c:\fvrnjdb.exec:\fvrnjdb.exe147⤵
-
\??\c:\lxvtt.exec:\lxvtt.exe148⤵
-
\??\c:\ppttnlj.exec:\ppttnlj.exe149⤵
-
\??\c:\fnpdbvl.exec:\fnpdbvl.exe150⤵
-
\??\c:\tjnlpft.exec:\tjnlpft.exe151⤵
-
\??\c:\pjjddpf.exec:\pjjddpf.exe152⤵
-
\??\c:\bvdtp.exec:\bvdtp.exe153⤵
-
\??\c:\xrdllv.exec:\xrdllv.exe154⤵
-
\??\c:\bjfffj.exec:\bjfffj.exe155⤵
-
\??\c:\vtxdxx.exec:\vtxdxx.exe156⤵
-
\??\c:\hbdtb.exec:\hbdtb.exe157⤵
-
\??\c:\bbhbd.exec:\bbhbd.exe158⤵
-
\??\c:\dddjrx.exec:\dddjrx.exe159⤵
-
\??\c:\pjbrx.exec:\pjbrx.exe160⤵
-
\??\c:\jnpjr.exec:\jnpjr.exe161⤵
-
\??\c:\hvnpb.exec:\hvnpb.exe162⤵
-
\??\c:\blxfbdr.exec:\blxfbdr.exe163⤵
-
\??\c:\lhvfx.exec:\lhvfx.exe164⤵
-
\??\c:\xpjrj.exec:\xpjrj.exe165⤵
-
\??\c:\njtvjp.exec:\njtvjp.exe166⤵
-
\??\c:\dbvlt.exec:\dbvlt.exe167⤵
-
\??\c:\bjbhndh.exec:\bjbhndh.exe168⤵
-
\??\c:\xpjhdv.exec:\xpjhdv.exe169⤵
-
\??\c:\pnfbppv.exec:\pnfbppv.exe170⤵
-
\??\c:\xxjxl.exec:\xxjxl.exe171⤵
-
\??\c:\hnpvr.exec:\hnpvr.exe172⤵
-
\??\c:\vtvfb.exec:\vtvfb.exe173⤵
-
\??\c:\rrrvj.exec:\rrrvj.exe174⤵
-
\??\c:\rlpbldr.exec:\rlpbldr.exe175⤵
-
\??\c:\ndbbvlx.exec:\ndbbvlx.exe176⤵
-
\??\c:\tlhpr.exec:\tlhpr.exe177⤵
-
\??\c:\vhdnr.exec:\vhdnr.exe178⤵
-
\??\c:\dhdlvn.exec:\dhdlvn.exe179⤵
-
\??\c:\nrhhtvn.exec:\nrhhtvn.exe180⤵
-
\??\c:\lxllr.exec:\lxllr.exe181⤵
-
\??\c:\fnrhtp.exec:\fnrhtp.exe182⤵
-
\??\c:\tfvlx.exec:\tfvlx.exe183⤵
-
\??\c:\ftddbxv.exec:\ftddbxv.exe184⤵
-
\??\c:\fpnrt.exec:\fpnrt.exe185⤵
-
\??\c:\brxhtlx.exec:\brxhtlx.exe186⤵
-
\??\c:\jlltr.exec:\jlltr.exe187⤵
-
\??\c:\hrfvp.exec:\hrfvp.exe188⤵
-
\??\c:\vldhlj.exec:\vldhlj.exe189⤵
-
\??\c:\npdlp.exec:\npdlp.exe190⤵
-
\??\c:\xljfb.exec:\xljfb.exe191⤵
-
\??\c:\ptxhjjh.exec:\ptxhjjh.exe192⤵
-
\??\c:\rxbljpf.exec:\rxbljpf.exe193⤵
-
\??\c:\bbjbnn.exec:\bbjbnn.exe194⤵
-
\??\c:\hhdfx.exec:\hhdfx.exe195⤵
-
\??\c:\rthbvxb.exec:\rthbvxb.exe196⤵
-
\??\c:\xlpttj.exec:\xlpttj.exe197⤵
-
\??\c:\njjdj.exec:\njjdj.exe198⤵
-
\??\c:\dxnbllb.exec:\dxnbllb.exe199⤵
-
\??\c:\hvdjd.exec:\hvdjd.exe200⤵
-
\??\c:\tbxtjd.exec:\tbxtjd.exe201⤵
-
\??\c:\frfvf.exec:\frfvf.exe202⤵
-
\??\c:\rvpfrr.exec:\rvpfrr.exe203⤵
-
\??\c:\jhpjxjt.exec:\jhpjxjt.exe204⤵
-
\??\c:\ltbpr.exec:\ltbpr.exe205⤵
-
\??\c:\bhrbj.exec:\bhrbj.exe206⤵
-
\??\c:\njxdh.exec:\njxdh.exe207⤵
-
\??\c:\ndhhfx.exec:\ndhhfx.exe208⤵
-
\??\c:\fhhbnx.exec:\fhhbnx.exe209⤵
-
\??\c:\nphhv.exec:\nphhv.exe210⤵
-
\??\c:\fdftr.exec:\fdftr.exe211⤵
-
\??\c:\jrhbjtf.exec:\jrhbjtf.exe212⤵
-
\??\c:\tbxhr.exec:\tbxhr.exe213⤵
-
\??\c:\tplpnpf.exec:\tplpnpf.exe214⤵
-
\??\c:\hvvrltl.exec:\hvvrltl.exe215⤵
-
\??\c:\jdrvxfh.exec:\jdrvxfh.exe216⤵
-
\??\c:\jtxlpvl.exec:\jtxlpvl.exe217⤵
-
\??\c:\blxrdl.exec:\blxrdl.exe218⤵
-
\??\c:\bvdll.exec:\bvdll.exe219⤵
-
\??\c:\thldf.exec:\thldf.exe220⤵
-
\??\c:\hlfvl.exec:\hlfvl.exe221⤵
-
\??\c:\bhvhlnv.exec:\bhvhlnv.exe222⤵
-
\??\c:\dtjjnn.exec:\dtjjnn.exe223⤵
-
\??\c:\dppflxx.exec:\dppflxx.exe224⤵
-
\??\c:\pphnplj.exec:\pphnplj.exe225⤵
-
\??\c:\fbhph.exec:\fbhph.exe226⤵
-
\??\c:\rlphp.exec:\rlphp.exe227⤵
-
\??\c:\txplhx.exec:\txplhx.exe228⤵
-
\??\c:\bhhxhvj.exec:\bhhxhvj.exe229⤵
-
\??\c:\vrxlnhx.exec:\vrxlnhx.exe230⤵
-
\??\c:\btnxnvn.exec:\btnxnvn.exe231⤵
-
\??\c:\vjbpjhp.exec:\vjbpjhp.exe232⤵
-
\??\c:\lrnvv.exec:\lrnvv.exe233⤵
-
\??\c:\pdjhp.exec:\pdjhp.exe234⤵
-
\??\c:\ttrrp.exec:\ttrrp.exe235⤵
-
\??\c:\tnfhlp.exec:\tnfhlp.exe236⤵
-
\??\c:\pfftf.exec:\pfftf.exe237⤵
-
\??\c:\xvfhp.exec:\xvfhp.exe238⤵
-
\??\c:\pbjfvv.exec:\pbjfvv.exe239⤵
-
\??\c:\xdjrnjt.exec:\xdjrnjt.exe240⤵
-
\??\c:\tpjrtd.exec:\tpjrtd.exe241⤵