Analysis
-
max time kernel
135s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 00:33
Behavioral task
behavioral1
Sample
905b3babc5ce18022589a176b755cebf38703ec2e6806152b7067b81035827b7.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
905b3babc5ce18022589a176b755cebf38703ec2e6806152b7067b81035827b7.exe
-
Size
91KB
-
MD5
13234d9994d622604bae29d25d27606d
-
SHA1
f0d83241ee2f15cb47d4497ca7e43e7cb7dc615f
-
SHA256
905b3babc5ce18022589a176b755cebf38703ec2e6806152b7067b81035827b7
-
SHA512
bc37e4915f2febc512e2aa5d3282929e6269387529002a5481182a7020cd4937e816d7086db0dfe884ad640cc08ac2e6699aeb0b125832f8d254c4beb75d322d
-
SSDEEP
1536:xvQBeOGtrYS3srx93UBWfwC6Ggnouy82F13w801ouAsG9ZoPEudJGdXRKXR5Z/2K:xhOmTsF93UYfwC6GIout03Fv9KdJoQ3H
Malware Config
Signatures
-
Detect Blackmoon payload 51 IoCs
Processes:
resource yara_rule behavioral1/memory/1548-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2560-21-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2924-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2752-29-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2972-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2772-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2416-72-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2044-81-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2948-92-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/896-110-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/896-107-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1640-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2800-121-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2020-131-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2480-149-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2256-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2888-220-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1108-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/700-239-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2900-258-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2844-274-0x00000000003C0000-0x00000000003E7000-memory.dmp family_blackmoon behavioral1/memory/1560-320-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2564-329-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2564-334-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3056-335-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2580-354-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1976-367-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1772-417-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2028-449-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2684-448-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2028-456-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2028-457-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2872-471-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1780-538-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/940-551-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/3036-599-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2472-656-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1996-694-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1588-726-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/1588-753-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2032-764-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1648-789-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2092-796-0x00000000003C0000-0x00000000003E7000-memory.dmp family_blackmoon behavioral1/memory/2092-797-0x00000000003C0000-0x00000000003E7000-memory.dmp family_blackmoon behavioral1/memory/1384-1011-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1880-1113-0x00000000002D0000-0x00000000002F7000-memory.dmp family_blackmoon behavioral1/memory/1688-1157-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2580-1219-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/2580-1246-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1676-1262-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1312-1404-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/1548-0-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\fjplf.exe UPX behavioral1/memory/1548-7-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\rppht.exe UPX behavioral1/memory/2560-21-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2924-16-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\njxjdj.exe UPX behavioral1/memory/2752-29-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\xnrhd.exe UPX C:\rxxvnn.exe UPX C:\nlrdh.exe UPX behavioral1/memory/2972-63-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\fhtjx.exe UPX behavioral1/memory/2972-55-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2772-54-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2416-72-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\jxxpfnx.exe UPX C:\bnjhvll.exe UPX behavioral1/memory/2948-83-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2044-81-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\hnxfvtj.exe UPX behavioral1/memory/2948-92-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\xpjrv.exe UPX behavioral1/memory/896-110-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\fjdrdxd.exe UPX behavioral1/memory/1640-118-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\jjfddjn.exe UPX behavioral1/memory/2800-121-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2020-131-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\dxddh.exe UPX C:\vhxjnv.exe UPX behavioral1/memory/2480-139-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\rfdrbt.exe UPX behavioral1/memory/2676-150-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2480-149-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\frptvj.exe UPX C:\dbhfv.exe UPX behavioral1/memory/1812-167-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\lpxpxfd.exe UPX \??\c:\nlbprnf.exe UPX behavioral1/memory/2168-185-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2256-184-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\nhnhd.exe UPX \??\c:\pjfnb.exe UPX behavioral1/memory/2292-202-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\rlxjl.exe UPX behavioral1/memory/2888-211-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\hjxljv.exe UPX behavioral1/memory/2888-220-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/700-230-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\tphnfhb.exe UPX behavioral1/memory/1108-229-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1604-241-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\dttxj.exe UPX behavioral1/memory/700-239-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\tvdvpvr.exe UPX behavioral1/memory/2900-250-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2900-258-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\hbrpl.exe UPX C:\rdvnrf.exe UPX \??\c:\phlxjf.exe UPX behavioral1/memory/1736-286-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\trblp.exe UPX \??\c:\hrvbxh.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
fjplf.exerppht.exenjxjdj.exexnrhd.exerxxvnn.exefhtjx.exenlrdh.exejxxpfnx.exebnjhvll.exehnxfvtj.exexpjrv.exefjdrdxd.exejjfddjn.exedxddh.exevhxjnv.exerfdrbt.exefrptvj.exedbhfv.exelpxpxfd.exenlbprnf.exenhnhd.exepjfnb.exerlxjl.exehjxljv.exetphnfhb.exedttxj.exetvdvpvr.exehbrpl.exerdvnrf.exephlxjf.exetrblp.exehrvbxh.exelltbbjl.exejxtbh.exehhlphl.exebblbx.exelfdtd.exehbjhbjn.exepdbjhr.exedvtxxn.exebnptl.exebnfpnxj.exebnbhdnl.exexlhnn.exefvrblh.exeblpvb.exexdfblnj.exehvndrr.exehrlrrj.exerhxhrfj.exefbhbrf.exeltdnjbd.exejhrvrj.exebjrlvnl.exefjhlh.exedbjdjbd.exevfntxjr.exehpfpxb.exerddpd.exervbvrrf.exetthrhth.exexjfhjnn.exefrbnhnv.exevhtdr.exepid process 2924 fjplf.exe 2560 rppht.exe 2752 njxjdj.exe 2428 xnrhd.exe 2772 rxxvnn.exe 2972 fhtjx.exe 2416 nlrdh.exe 2044 jxxpfnx.exe 2948 bnjhvll.exe 1944 hnxfvtj.exe 896 xpjrv.exe 1640 fjdrdxd.exe 2800 jjfddjn.exe 2020 dxddh.exe 2480 vhxjnv.exe 2676 rfdrbt.exe 1624 frptvj.exe 1812 dbhfv.exe 2256 lpxpxfd.exe 2168 nlbprnf.exe 1300 nhnhd.exe 2292 pjfnb.exe 2888 rlxjl.exe 1108 hjxljv.exe 700 tphnfhb.exe 1604 dttxj.exe 2900 tvdvpvr.exe 636 hbrpl.exe 2844 rdvnrf.exe 588 phlxjf.exe 1736 trblp.exe 3032 hrvbxh.exe 1676 lltbbjl.exe 1548 jxtbh.exe 1560 hhlphl.exe 2692 bblbx.exe 2564 lfdtd.exe 3056 hbjhbjn.exe 2600 pdbjhr.exe 2580 dvtxxn.exe 2444 bnptl.exe 1976 bnfpnxj.exe 2476 bnbhdnl.exe 2932 xlhnn.exe 2976 fvrblh.exe 672 blpvb.exe 2404 xdfblnj.exe 1996 hvndrr.exe 3000 hrlrrj.exe 1772 rhxhrfj.exe 1640 fbhbrf.exe 1336 ltdnjbd.exe 1816 jhrvrj.exe 2656 bjrlvnl.exe 2684 fjhlh.exe 2028 dbjdjbd.exe 1036 vfntxjr.exe 2872 hpfpxb.exe 1768 rddpd.exe 2312 rvbvrrf.exe 2128 tthrhth.exe 1648 xjfhjnn.exe 2060 frbnhnv.exe 992 vhtdr.exe -
Processes:
resource yara_rule behavioral1/memory/1548-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\fjplf.exe upx behavioral1/memory/1548-7-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rppht.exe upx behavioral1/memory/2560-21-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2924-16-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\njxjdj.exe upx behavioral1/memory/2752-29-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xnrhd.exe upx C:\rxxvnn.exe upx C:\nlrdh.exe upx behavioral1/memory/2972-63-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\fhtjx.exe upx behavioral1/memory/2972-55-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2772-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2416-72-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jxxpfnx.exe upx C:\bnjhvll.exe upx behavioral1/memory/2948-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2044-81-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\hnxfvtj.exe upx behavioral1/memory/2948-92-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xpjrv.exe upx behavioral1/memory/896-110-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\fjdrdxd.exe upx behavioral1/memory/1640-118-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jjfddjn.exe upx behavioral1/memory/2800-121-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2020-131-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\dxddh.exe upx C:\vhxjnv.exe upx behavioral1/memory/2480-139-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\rfdrbt.exe upx behavioral1/memory/2676-150-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2480-149-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\frptvj.exe upx C:\dbhfv.exe upx behavioral1/memory/1812-167-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lpxpxfd.exe upx \??\c:\nlbprnf.exe upx behavioral1/memory/2168-185-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2256-184-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhnhd.exe upx \??\c:\pjfnb.exe upx behavioral1/memory/2292-202-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlxjl.exe upx behavioral1/memory/2888-211-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hjxljv.exe upx behavioral1/memory/2888-220-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/700-230-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\tphnfhb.exe upx behavioral1/memory/1108-229-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1604-241-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\dttxj.exe upx behavioral1/memory/700-239-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tvdvpvr.exe upx behavioral1/memory/2900-250-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2900-258-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hbrpl.exe upx C:\rdvnrf.exe upx \??\c:\phlxjf.exe upx behavioral1/memory/2844-276-0x00000000003C0000-0x00000000003E7000-memory.dmp upx behavioral1/memory/1736-286-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\trblp.exe upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
905b3babc5ce18022589a176b755cebf38703ec2e6806152b7067b81035827b7.exefjplf.exerppht.exenjxjdj.exexnrhd.exerxxvnn.exefhtjx.exenlrdh.exejxxpfnx.exebnjhvll.exehnxfvtj.exexpjrv.exefjdrdxd.exejjfddjn.exedxddh.exevhxjnv.exedescription pid process target process PID 1548 wrote to memory of 2924 1548 905b3babc5ce18022589a176b755cebf38703ec2e6806152b7067b81035827b7.exe fjplf.exe PID 1548 wrote to memory of 2924 1548 905b3babc5ce18022589a176b755cebf38703ec2e6806152b7067b81035827b7.exe fjplf.exe PID 1548 wrote to memory of 2924 1548 905b3babc5ce18022589a176b755cebf38703ec2e6806152b7067b81035827b7.exe fjplf.exe PID 1548 wrote to memory of 2924 1548 905b3babc5ce18022589a176b755cebf38703ec2e6806152b7067b81035827b7.exe fjplf.exe PID 2924 wrote to memory of 2560 2924 fjplf.exe rppht.exe PID 2924 wrote to memory of 2560 2924 fjplf.exe rppht.exe PID 2924 wrote to memory of 2560 2924 fjplf.exe rppht.exe PID 2924 wrote to memory of 2560 2924 fjplf.exe rppht.exe PID 2560 wrote to memory of 2752 2560 rppht.exe njxjdj.exe PID 2560 wrote to memory of 2752 2560 rppht.exe njxjdj.exe PID 2560 wrote to memory of 2752 2560 rppht.exe njxjdj.exe PID 2560 wrote to memory of 2752 2560 rppht.exe njxjdj.exe PID 2752 wrote to memory of 2428 2752 njxjdj.exe xnrhd.exe PID 2752 wrote to memory of 2428 2752 njxjdj.exe xnrhd.exe PID 2752 wrote to memory of 2428 2752 njxjdj.exe xnrhd.exe PID 2752 wrote to memory of 2428 2752 njxjdj.exe xnrhd.exe PID 2428 wrote to memory of 2772 2428 xnrhd.exe rxxvnn.exe PID 2428 wrote to memory of 2772 2428 xnrhd.exe rxxvnn.exe PID 2428 wrote to memory of 2772 2428 xnrhd.exe rxxvnn.exe PID 2428 wrote to memory of 2772 2428 xnrhd.exe rxxvnn.exe PID 2772 wrote to memory of 2972 2772 rxxvnn.exe fhtjx.exe PID 2772 wrote to memory of 2972 2772 rxxvnn.exe fhtjx.exe PID 2772 wrote to memory of 2972 2772 rxxvnn.exe fhtjx.exe PID 2772 wrote to memory of 2972 2772 rxxvnn.exe fhtjx.exe PID 2972 wrote to memory of 2416 2972 fhtjx.exe nlrdh.exe PID 2972 wrote to memory of 2416 2972 fhtjx.exe nlrdh.exe PID 2972 wrote to memory of 2416 2972 fhtjx.exe nlrdh.exe PID 2972 wrote to memory of 2416 2972 fhtjx.exe nlrdh.exe PID 2416 wrote to memory of 2044 2416 nlrdh.exe jxxpfnx.exe PID 2416 wrote to memory of 2044 2416 nlrdh.exe jxxpfnx.exe PID 2416 wrote to memory of 2044 2416 nlrdh.exe jxxpfnx.exe PID 2416 wrote to memory of 2044 2416 nlrdh.exe jxxpfnx.exe PID 2044 wrote to memory of 2948 2044 jxxpfnx.exe bnjhvll.exe PID 2044 wrote to memory of 2948 2044 jxxpfnx.exe bnjhvll.exe PID 2044 wrote to memory of 2948 2044 jxxpfnx.exe bnjhvll.exe PID 2044 wrote to memory of 2948 2044 jxxpfnx.exe bnjhvll.exe PID 2948 wrote to memory of 1944 2948 bnjhvll.exe hnxfvtj.exe PID 2948 wrote to memory of 1944 2948 bnjhvll.exe hnxfvtj.exe PID 2948 wrote to memory of 1944 2948 bnjhvll.exe hnxfvtj.exe PID 2948 wrote to memory of 1944 2948 bnjhvll.exe hnxfvtj.exe PID 1944 wrote to memory of 896 1944 hnxfvtj.exe xpjrv.exe PID 1944 wrote to memory of 896 1944 hnxfvtj.exe xpjrv.exe PID 1944 wrote to memory of 896 1944 hnxfvtj.exe xpjrv.exe PID 1944 wrote to memory of 896 1944 hnxfvtj.exe xpjrv.exe PID 896 wrote to memory of 1640 896 xpjrv.exe fjdrdxd.exe PID 896 wrote to memory of 1640 896 xpjrv.exe fjdrdxd.exe PID 896 wrote to memory of 1640 896 xpjrv.exe fjdrdxd.exe PID 896 wrote to memory of 1640 896 xpjrv.exe fjdrdxd.exe PID 1640 wrote to memory of 2800 1640 fjdrdxd.exe jjfddjn.exe PID 1640 wrote to memory of 2800 1640 fjdrdxd.exe jjfddjn.exe PID 1640 wrote to memory of 2800 1640 fjdrdxd.exe jjfddjn.exe PID 1640 wrote to memory of 2800 1640 fjdrdxd.exe jjfddjn.exe PID 2800 wrote to memory of 2020 2800 jjfddjn.exe dxddh.exe PID 2800 wrote to memory of 2020 2800 jjfddjn.exe dxddh.exe PID 2800 wrote to memory of 2020 2800 jjfddjn.exe dxddh.exe PID 2800 wrote to memory of 2020 2800 jjfddjn.exe dxddh.exe PID 2020 wrote to memory of 2480 2020 dxddh.exe vhxjnv.exe PID 2020 wrote to memory of 2480 2020 dxddh.exe vhxjnv.exe PID 2020 wrote to memory of 2480 2020 dxddh.exe vhxjnv.exe PID 2020 wrote to memory of 2480 2020 dxddh.exe vhxjnv.exe PID 2480 wrote to memory of 2676 2480 vhxjnv.exe rfdrbt.exe PID 2480 wrote to memory of 2676 2480 vhxjnv.exe rfdrbt.exe PID 2480 wrote to memory of 2676 2480 vhxjnv.exe rfdrbt.exe PID 2480 wrote to memory of 2676 2480 vhxjnv.exe rfdrbt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\905b3babc5ce18022589a176b755cebf38703ec2e6806152b7067b81035827b7.exe"C:\Users\Admin\AppData\Local\Temp\905b3babc5ce18022589a176b755cebf38703ec2e6806152b7067b81035827b7.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\fjplf.exec:\fjplf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rppht.exec:\rppht.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\njxjdj.exec:\njxjdj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xnrhd.exec:\xnrhd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxxvnn.exec:\rxxvnn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fhtjx.exec:\fhtjx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nlrdh.exec:\nlrdh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jxxpfnx.exec:\jxxpfnx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnjhvll.exec:\bnjhvll.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hnxfvtj.exec:\hnxfvtj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xpjrv.exec:\xpjrv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fjdrdxd.exec:\fjdrdxd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjfddjn.exec:\jjfddjn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dxddh.exec:\dxddh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vhxjnv.exec:\vhxjnv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rfdrbt.exec:\rfdrbt.exe17⤵
- Executes dropped EXE
-
\??\c:\frptvj.exec:\frptvj.exe18⤵
- Executes dropped EXE
-
\??\c:\dbhfv.exec:\dbhfv.exe19⤵
- Executes dropped EXE
-
\??\c:\lpxpxfd.exec:\lpxpxfd.exe20⤵
- Executes dropped EXE
-
\??\c:\nlbprnf.exec:\nlbprnf.exe21⤵
- Executes dropped EXE
-
\??\c:\nhnhd.exec:\nhnhd.exe22⤵
- Executes dropped EXE
-
\??\c:\pjfnb.exec:\pjfnb.exe23⤵
- Executes dropped EXE
-
\??\c:\rlxjl.exec:\rlxjl.exe24⤵
- Executes dropped EXE
-
\??\c:\hjxljv.exec:\hjxljv.exe25⤵
- Executes dropped EXE
-
\??\c:\tphnfhb.exec:\tphnfhb.exe26⤵
- Executes dropped EXE
-
\??\c:\dttxj.exec:\dttxj.exe27⤵
- Executes dropped EXE
-
\??\c:\tvdvpvr.exec:\tvdvpvr.exe28⤵
- Executes dropped EXE
-
\??\c:\hbrpl.exec:\hbrpl.exe29⤵
- Executes dropped EXE
-
\??\c:\rdvnrf.exec:\rdvnrf.exe30⤵
- Executes dropped EXE
-
\??\c:\phlxjf.exec:\phlxjf.exe31⤵
- Executes dropped EXE
-
\??\c:\trblp.exec:\trblp.exe32⤵
- Executes dropped EXE
-
\??\c:\hrvbxh.exec:\hrvbxh.exe33⤵
- Executes dropped EXE
-
\??\c:\lltbbjl.exec:\lltbbjl.exe34⤵
- Executes dropped EXE
-
\??\c:\jxtbh.exec:\jxtbh.exe35⤵
- Executes dropped EXE
-
\??\c:\hhlphl.exec:\hhlphl.exe36⤵
- Executes dropped EXE
-
\??\c:\bblbx.exec:\bblbx.exe37⤵
- Executes dropped EXE
-
\??\c:\lfdtd.exec:\lfdtd.exe38⤵
- Executes dropped EXE
-
\??\c:\hbjhbjn.exec:\hbjhbjn.exe39⤵
- Executes dropped EXE
-
\??\c:\pdbjhr.exec:\pdbjhr.exe40⤵
- Executes dropped EXE
-
\??\c:\dvtxxn.exec:\dvtxxn.exe41⤵
- Executes dropped EXE
-
\??\c:\bnptl.exec:\bnptl.exe42⤵
- Executes dropped EXE
-
\??\c:\bnfpnxj.exec:\bnfpnxj.exe43⤵
- Executes dropped EXE
-
\??\c:\bnbhdnl.exec:\bnbhdnl.exe44⤵
- Executes dropped EXE
-
\??\c:\xlhnn.exec:\xlhnn.exe45⤵
- Executes dropped EXE
-
\??\c:\fvrblh.exec:\fvrblh.exe46⤵
- Executes dropped EXE
-
\??\c:\blpvb.exec:\blpvb.exe47⤵
- Executes dropped EXE
-
\??\c:\xdfblnj.exec:\xdfblnj.exe48⤵
- Executes dropped EXE
-
\??\c:\hvndrr.exec:\hvndrr.exe49⤵
- Executes dropped EXE
-
\??\c:\hrlrrj.exec:\hrlrrj.exe50⤵
- Executes dropped EXE
-
\??\c:\rhxhrfj.exec:\rhxhrfj.exe51⤵
- Executes dropped EXE
-
\??\c:\fbhbrf.exec:\fbhbrf.exe52⤵
- Executes dropped EXE
-
\??\c:\ltdnjbd.exec:\ltdnjbd.exe53⤵
- Executes dropped EXE
-
\??\c:\jhrvrj.exec:\jhrvrj.exe54⤵
- Executes dropped EXE
-
\??\c:\bjrlvnl.exec:\bjrlvnl.exe55⤵
- Executes dropped EXE
-
\??\c:\fjhlh.exec:\fjhlh.exe56⤵
- Executes dropped EXE
-
\??\c:\dbjdjbd.exec:\dbjdjbd.exe57⤵
- Executes dropped EXE
-
\??\c:\vfntxjr.exec:\vfntxjr.exe58⤵
- Executes dropped EXE
-
\??\c:\hpfpxb.exec:\hpfpxb.exe59⤵
- Executes dropped EXE
-
\??\c:\rddpd.exec:\rddpd.exe60⤵
- Executes dropped EXE
-
\??\c:\rvbvrrf.exec:\rvbvrrf.exe61⤵
- Executes dropped EXE
-
\??\c:\tthrhth.exec:\tthrhth.exe62⤵
- Executes dropped EXE
-
\??\c:\xjfhjnn.exec:\xjfhjnn.exe63⤵
- Executes dropped EXE
-
\??\c:\frbnhnv.exec:\frbnhnv.exe64⤵
- Executes dropped EXE
-
\??\c:\vhtdr.exec:\vhtdr.exe65⤵
- Executes dropped EXE
-
\??\c:\fhtth.exec:\fhtth.exe66⤵
-
\??\c:\vhxtptj.exec:\vhxtptj.exe67⤵
-
\??\c:\tjdlbv.exec:\tjdlbv.exe68⤵
-
\??\c:\rtpfvf.exec:\rtpfvf.exe69⤵
-
\??\c:\bjtnl.exec:\bjtnl.exe70⤵
-
\??\c:\dvhlv.exec:\dvhlv.exe71⤵
-
\??\c:\rlnnjtf.exec:\rlnnjtf.exe72⤵
-
\??\c:\rhdjt.exec:\rhdjt.exe73⤵
-
\??\c:\rvrfll.exec:\rvrfll.exe74⤵
-
\??\c:\pvnhvv.exec:\pvnhvv.exe75⤵
-
\??\c:\ffhlnhr.exec:\ffhlnhr.exe76⤵
-
\??\c:\rjddjl.exec:\rjddjl.exe77⤵
-
\??\c:\pnddhbb.exec:\pnddhbb.exe78⤵
-
\??\c:\phfdjb.exec:\phfdjb.exe79⤵
-
\??\c:\bbjjfd.exec:\bbjjfd.exe80⤵
-
\??\c:\jpxjr.exec:\jpxjr.exe81⤵
-
\??\c:\tdvtr.exec:\tdvtr.exe82⤵
-
\??\c:\xlddln.exec:\xlddln.exe83⤵
-
\??\c:\jpbrb.exec:\jpbrb.exe84⤵
-
\??\c:\xbxvnp.exec:\xbxvnp.exe85⤵
-
\??\c:\prblvn.exec:\prblvn.exe86⤵
-
\??\c:\fnhhhvb.exec:\fnhhhvb.exe87⤵
-
\??\c:\bllpd.exec:\bllpd.exe88⤵
-
\??\c:\vbvhrrv.exec:\vbvhrrv.exe89⤵
-
\??\c:\nrndnl.exec:\nrndnl.exe90⤵
-
\??\c:\tdnrjpn.exec:\tdnrjpn.exe91⤵
-
\??\c:\jblhd.exec:\jblhd.exe92⤵
-
\??\c:\hfbrx.exec:\hfbrx.exe93⤵
-
\??\c:\vnnfj.exec:\vnnfj.exe94⤵
-
\??\c:\dlnppp.exec:\dlnppp.exe95⤵
-
\??\c:\jbjbfb.exec:\jbjbfb.exe96⤵
-
\??\c:\njvrhbf.exec:\njvrhbf.exe97⤵
-
\??\c:\rxljpj.exec:\rxljpj.exe98⤵
-
\??\c:\fjxhl.exec:\fjxhl.exe99⤵
-
\??\c:\rnndfht.exec:\rnndfht.exe100⤵
-
\??\c:\jhpvlv.exec:\jhpvlv.exe101⤵
-
\??\c:\rbbjlt.exec:\rbbjlt.exe102⤵
-
\??\c:\pbndhvp.exec:\pbndhvp.exe103⤵
-
\??\c:\jjltjf.exec:\jjltjf.exe104⤵
-
\??\c:\bvbjnpd.exec:\bvbjnpd.exe105⤵
-
\??\c:\trfnjlv.exec:\trfnjlv.exe106⤵
-
\??\c:\bhbpxb.exec:\bhbpxb.exe107⤵
-
\??\c:\dffdhh.exec:\dffdhh.exe108⤵
-
\??\c:\dfjdthn.exec:\dfjdthn.exe109⤵
-
\??\c:\brrnfnj.exec:\brrnfnj.exe110⤵
-
\??\c:\ttrnt.exec:\ttrnt.exe111⤵
-
\??\c:\njthfvj.exec:\njthfvj.exe112⤵
-
\??\c:\nphxtrl.exec:\nphxtrl.exe113⤵
-
\??\c:\pjdtttr.exec:\pjdtttr.exe114⤵
-
\??\c:\nphdbfb.exec:\nphdbfb.exe115⤵
-
\??\c:\vblpjtt.exec:\vblpjtt.exe116⤵
-
\??\c:\tdbrd.exec:\tdbrd.exe117⤵
-
\??\c:\rhttjb.exec:\rhttjb.exe118⤵
-
\??\c:\xfnpdx.exec:\xfnpdx.exe119⤵
-
\??\c:\vddvxbp.exec:\vddvxbp.exe120⤵
-
\??\c:\dlhvth.exec:\dlhvth.exe121⤵
-
\??\c:\blhjpn.exec:\blhjpn.exe122⤵
-
\??\c:\drtnl.exec:\drtnl.exe123⤵
-
\??\c:\vjlrlvt.exec:\vjlrlvt.exe124⤵
-
\??\c:\jjlrrfr.exec:\jjlrrfr.exe125⤵
-
\??\c:\jpdxrfp.exec:\jpdxrfp.exe126⤵
-
\??\c:\jlntpb.exec:\jlntpb.exe127⤵
-
\??\c:\npvtbdh.exec:\npvtbdh.exe128⤵
-
\??\c:\nvvvbj.exec:\nvvvbj.exe129⤵
-
\??\c:\ttxxvp.exec:\ttxxvp.exe130⤵
-
\??\c:\bvhpff.exec:\bvhpff.exe131⤵
-
\??\c:\bfdbnrb.exec:\bfdbnrb.exe132⤵
-
\??\c:\vtnrltp.exec:\vtnrltp.exe133⤵
-
\??\c:\jnfrdb.exec:\jnfrdb.exe134⤵
-
\??\c:\hvnrtbp.exec:\hvnrtbp.exe135⤵
-
\??\c:\txprbth.exec:\txprbth.exe136⤵
-
\??\c:\rdxtp.exec:\rdxtp.exe137⤵
-
\??\c:\tfhvfxh.exec:\tfhvfxh.exe138⤵
-
\??\c:\ldbnrnh.exec:\ldbnrnh.exe139⤵
-
\??\c:\hfnlrnl.exec:\hfnlrnl.exe140⤵
-
\??\c:\tpdnp.exec:\tpdnp.exe141⤵
-
\??\c:\vffbvd.exec:\vffbvd.exe142⤵
-
\??\c:\phhln.exec:\phhln.exe143⤵
-
\??\c:\tlljd.exec:\tlljd.exe144⤵
-
\??\c:\vnvlnn.exec:\vnvlnn.exe145⤵
-
\??\c:\bvpplbd.exec:\bvpplbd.exe146⤵
-
\??\c:\vdbvv.exec:\vdbvv.exe147⤵
-
\??\c:\rdxxhln.exec:\rdxxhln.exe148⤵
-
\??\c:\pfjntnf.exec:\pfjntnf.exe149⤵
-
\??\c:\nprprd.exec:\nprprd.exe150⤵
-
\??\c:\rrbnnd.exec:\rrbnnd.exe151⤵
-
\??\c:\xnthjxb.exec:\xnthjxb.exe152⤵
-
\??\c:\ptfbl.exec:\ptfbl.exe153⤵
-
\??\c:\brxbln.exec:\brxbln.exe154⤵
-
\??\c:\fldpndj.exec:\fldpndj.exe155⤵
-
\??\c:\dbvvvj.exec:\dbvvvj.exe156⤵
-
\??\c:\nnfvrxn.exec:\nnfvrxn.exe157⤵
-
\??\c:\btjdplh.exec:\btjdplh.exe158⤵
-
\??\c:\dpbfxn.exec:\dpbfxn.exe159⤵
-
\??\c:\ptlxlvf.exec:\ptlxlvf.exe160⤵
-
\??\c:\nhxphhp.exec:\nhxphhp.exe161⤵
-
\??\c:\bbttdhx.exec:\bbttdhx.exe162⤵
-
\??\c:\rnjvdfh.exec:\rnjvdfh.exe163⤵
-
\??\c:\ltlfnnj.exec:\ltlfnnj.exe164⤵
-
\??\c:\xdjvxh.exec:\xdjvxh.exe165⤵
-
\??\c:\fbtvp.exec:\fbtvp.exe166⤵
-
\??\c:\jrbvnlr.exec:\jrbvnlr.exe167⤵
-
\??\c:\fvrrpp.exec:\fvrrpp.exe168⤵
-
\??\c:\xbvdlrx.exec:\xbvdlrx.exe169⤵
-
\??\c:\ljtjv.exec:\ljtjv.exe170⤵
-
\??\c:\vbxtrv.exec:\vbxtrv.exe171⤵
-
\??\c:\hxfxn.exec:\hxfxn.exe172⤵
-
\??\c:\blrbfv.exec:\blrbfv.exe173⤵
-
\??\c:\rhrhh.exec:\rhrhh.exe174⤵
-
\??\c:\xdlldf.exec:\xdlldf.exe175⤵
-
\??\c:\vdthftj.exec:\vdthftj.exe176⤵
-
\??\c:\nbjpx.exec:\nbjpx.exe177⤵
-
\??\c:\pnhbhxl.exec:\pnhbhxl.exe178⤵
-
\??\c:\fdtbvdf.exec:\fdtbvdf.exe179⤵
-
\??\c:\thttblb.exec:\thttblb.exe180⤵
-
\??\c:\ddjvd.exec:\ddjvd.exe181⤵
-
\??\c:\hnrnlth.exec:\hnrnlth.exe182⤵
-
\??\c:\fllrf.exec:\fllrf.exe183⤵
-
\??\c:\nptnf.exec:\nptnf.exe184⤵
-
\??\c:\rvxtf.exec:\rvxtf.exe185⤵
-
\??\c:\btdphfb.exec:\btdphfb.exe186⤵
-
\??\c:\pdhrfdl.exec:\pdhrfdl.exe187⤵
-
\??\c:\vnfnhfh.exec:\vnfnhfh.exe188⤵
-
\??\c:\jhfxrj.exec:\jhfxrj.exe189⤵
-
\??\c:\hxnxhd.exec:\hxnxhd.exe190⤵
-
\??\c:\xrdjxt.exec:\xrdjxt.exe191⤵
-
\??\c:\hftvnrr.exec:\hftvnrr.exe192⤵
-
\??\c:\nnprjpp.exec:\nnprjpp.exe193⤵
-
\??\c:\nhlnrp.exec:\nhlnrp.exe194⤵
-
\??\c:\tbxrbrp.exec:\tbxrbrp.exe195⤵
-
\??\c:\ntjpln.exec:\ntjpln.exe196⤵
-
\??\c:\brtrvj.exec:\brtrvj.exe197⤵
-
\??\c:\pdbvj.exec:\pdbvj.exe198⤵
-
\??\c:\blphpl.exec:\blphpl.exe199⤵
-
\??\c:\jdxlhfh.exec:\jdxlhfh.exe200⤵
-
\??\c:\njpphf.exec:\njpphf.exe201⤵
-
\??\c:\rlxrh.exec:\rlxrh.exe202⤵
-
\??\c:\fhtjpt.exec:\fhtjpt.exe203⤵
-
\??\c:\hjbhv.exec:\hjbhv.exe204⤵
-
\??\c:\xnrxdh.exec:\xnrxdh.exe205⤵
-
\??\c:\nxhrtpv.exec:\nxhrtpv.exe206⤵
-
\??\c:\vdhrnj.exec:\vdhrnj.exe207⤵
-
\??\c:\lxphl.exec:\lxphl.exe208⤵
-
\??\c:\xjplnj.exec:\xjplnj.exe209⤵
-
\??\c:\hljrl.exec:\hljrl.exe210⤵
-
\??\c:\bjtnxb.exec:\bjtnxb.exe211⤵
-
\??\c:\xfljt.exec:\xfljt.exe212⤵
-
\??\c:\xjvdn.exec:\xjvdn.exe213⤵
-
\??\c:\vjjpxnt.exec:\vjjpxnt.exe214⤵
-
\??\c:\bnhbf.exec:\bnhbf.exe215⤵
-
\??\c:\dfntv.exec:\dfntv.exe216⤵
-
\??\c:\rflvr.exec:\rflvr.exe217⤵
-
\??\c:\jlvpln.exec:\jlvpln.exe218⤵
-
\??\c:\dbtlx.exec:\dbtlx.exe219⤵
-
\??\c:\hfhpfjf.exec:\hfhpfjf.exe220⤵
-
\??\c:\drntpf.exec:\drntpf.exe221⤵
-
\??\c:\hfltv.exec:\hfltv.exe222⤵
-
\??\c:\drttp.exec:\drttp.exe223⤵
-
\??\c:\drjrpp.exec:\drjrpp.exe224⤵
-
\??\c:\ffbhx.exec:\ffbhx.exe225⤵
-
\??\c:\xbltpj.exec:\xbltpj.exe226⤵
-
\??\c:\xtdjp.exec:\xtdjp.exe227⤵
-
\??\c:\vlfdft.exec:\vlfdft.exe228⤵
-
\??\c:\ttdlfj.exec:\ttdlfj.exe229⤵
-
\??\c:\htpdjdx.exec:\htpdjdx.exe230⤵
-
\??\c:\xtvrt.exec:\xtvrt.exe231⤵
-
\??\c:\vbdfhbx.exec:\vbdfhbx.exe232⤵
-
\??\c:\dhnrbr.exec:\dhnrbr.exe233⤵
-
\??\c:\fjpbvff.exec:\fjpbvff.exe234⤵
-
\??\c:\tnrvd.exec:\tnrvd.exe235⤵
-
\??\c:\vlxjvxn.exec:\vlxjvxn.exe236⤵
-
\??\c:\jhdnv.exec:\jhdnv.exe237⤵
-
\??\c:\vrdvlfp.exec:\vrdvlfp.exe238⤵
-
\??\c:\pxxjlr.exec:\pxxjlr.exe239⤵
-
\??\c:\drtjn.exec:\drtjn.exe240⤵
-
\??\c:\tnnxj.exec:\tnnxj.exe241⤵