Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 19:57
Behavioral task
behavioral1
Sample
24d33f26b845130bfe2acef96de5d7a03dc9c0e96a97dde222f32e6483948f3b.exe
Resource
win7-20240221-en
General
-
Target
24d33f26b845130bfe2acef96de5d7a03dc9c0e96a97dde222f32e6483948f3b.exe
-
Size
464KB
-
MD5
02ea9ad902d1da3c5556a1436c884ca4
-
SHA1
5e1bb5bb74868e46112ac9d55bca1532fba1bab0
-
SHA256
24d33f26b845130bfe2acef96de5d7a03dc9c0e96a97dde222f32e6483948f3b
-
SHA512
f257c9083a7826223fc138e22b5d749ebb2c838921f6f2c768d2b93de6742079685fc3ada34bb4f2391029e4e55c54609dddb2481244d89fd9dba815eb4309da
-
SSDEEP
12288:J4wFHoSTeR0oQRkay+eFp3IDvSbh5nPVP+OKaf1VV:VeR0oykayRFp3lztP+OKaf1VV
Malware Config
Signatures
-
Detect Blackmoon payload 37 IoCs
Processes:
resource yara_rule behavioral1/memory/2208-10-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2304-8-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2580-35-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2816-52-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2528-62-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2800-71-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2420-80-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2452-88-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2116-100-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2712-116-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2908-136-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2876-134-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1208-152-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1492-162-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/844-180-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2232-190-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2224-199-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2924-225-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/448-234-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1276-254-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1396-264-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1588-287-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2808-311-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/892-309-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2476-330-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2036-355-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2404-363-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2400-388-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1904-496-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/704-522-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/892-604-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/2932-708-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/860-757-0x0000000000220000-0x000000000025A000-memory.dmp family_blackmoon behavioral1/memory/1132-811-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1808-838-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/1784-852-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon behavioral1/memory/564-878-0x0000000000400000-0x000000000043A000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral1/memory/2304-0-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\jdppv.exe family_berbew behavioral1/memory/2208-10-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2304-8-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\lrlrfrx.exe family_berbew C:\jddjd.exe family_berbew behavioral1/memory/2580-26-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2580-35-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\fxlrxrf.exe family_berbew behavioral1/memory/2536-36-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\1nhntt.exe family_berbew behavioral1/memory/2816-52-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\vddjd.exe family_berbew C:\fxfxrlx.exe family_berbew behavioral1/memory/2528-62-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\nbhhnh.exe family_berbew behavioral1/memory/2800-71-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2420-80-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\rllrxxl.exe family_berbew C:\tttbnn.exe family_berbew behavioral1/memory/2452-88-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2468-90-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\3rlrxfl.exe family_berbew behavioral1/memory/2116-100-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\nnhtbb.exe family_berbew behavioral1/memory/2712-116-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\jjdjv.exe family_berbew C:\tnbbbb.exe family_berbew C:\dvpdp.exe family_berbew behavioral1/memory/2908-136-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2876-134-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\xlllrrx.exe family_berbew behavioral1/memory/1208-152-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/1492-154-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\pjddj.exe family_berbew C:\xrlrxxx.exe family_berbew behavioral1/memory/1492-162-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\jjdvp.exe family_berbew behavioral1/memory/844-172-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/844-180-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\thbhnb.exe family_berbew behavioral1/memory/2232-190-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\pvpvd.exe family_berbew behavioral1/memory/2224-199-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\lfflxfx.exe family_berbew \??\c:\3ddjp.exe family_berbew C:\1frflrf.exe family_berbew C:\5pjpv.exe family_berbew behavioral1/memory/2924-225-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/448-234-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\1xrlrxl.exe family_berbew behavioral1/memory/2984-236-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\ttnhtn.exe family_berbew C:\1dpvv.exe family_berbew behavioral1/memory/1276-254-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew \??\c:\hhntbb.exe family_berbew behavioral1/memory/1396-264-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\vvvjp.exe family_berbew \??\c:\5bnnnt.exe family_berbew behavioral1/memory/1888-289-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew C:\btnthh.exe family_berbew behavioral1/memory/1588-287-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/2808-311-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew behavioral1/memory/892-309-0x0000000000400000-0x000000000043A000-memory.dmp family_berbew -
Executes dropped EXE 64 IoCs
Processes:
jdppv.exelrlrfrx.exejddjd.exefxlrxrf.exe1nhntt.exevddjd.exefxfxrlx.exenbhhnh.exerllrxxl.exetttbnn.exe3rlrxfl.exennhtbb.exejjdjv.exetnbbbb.exedvpdp.exexlllrrx.exepjddj.exexrlrxxx.exejjdvp.exethbhnb.exepvpvd.exelfflxfx.exe3ddjp.exe1frflrf.exe5pjpv.exe1xrlrxl.exettnhtn.exe1dpvv.exehhntbb.exevvvjp.exe5bnnnt.exebtnthh.exerlxfxfl.exehtttbh.exedvvdv.exelxllrrl.exe7nhhnn.exedvppp.exepjvjv.exexlrfxrx.exehbnbhh.exe9dvvv.exeffrlxxl.exe5nnnbh.exebthtth.exevjdjj.exerrfxffl.exebttbnt.exetnhnbb.exedjvjv.exelxlrxrf.exethbbnn.exevpppv.exe1xlrrxf.exettnthn.exevpddp.exejjpvj.exefxlrxfr.exe7hhnbh.exepjvvj.exejdddv.exerrlxflx.exethhtbb.exepjdpv.exepid process 2208 jdppv.exe 2180 lrlrfrx.exe 2580 jddjd.exe 2536 fxlrxrf.exe 2816 1nhntt.exe 2528 vddjd.exe 2800 fxfxrlx.exe 2420 nbhhnh.exe 2452 rllrxxl.exe 2468 tttbnn.exe 2116 3rlrxfl.exe 2712 nnhtbb.exe 2652 jjdjv.exe 2876 tnbbbb.exe 2908 dvpdp.exe 1208 xlllrrx.exe 1492 pjddj.exe 1120 xrlrxxx.exe 844 jjdvp.exe 2232 thbhnb.exe 2224 pvpvd.exe 1988 lfflxfx.exe 584 3ddjp.exe 2924 1frflrf.exe 448 5pjpv.exe 2984 1xrlrxl.exe 1524 ttnhtn.exe 1276 1dpvv.exe 1396 hhntbb.exe 876 vvvjp.exe 1588 5bnnnt.exe 1888 btnthh.exe 1476 rlxfxfl.exe 892 htttbh.exe 2808 dvvdv.exe 2164 lxllrrl.exe 2852 7nhhnn.exe 2476 dvppp.exe 2728 pjvjv.exe 2076 xlrfxrx.exe 2036 hbnbhh.exe 1952 9dvvv.exe 2404 ffrlxxl.exe 2528 5nnnbh.exe 2732 bthtth.exe 2564 vjdjj.exe 2400 rrfxffl.exe 2372 bttbnt.exe 1964 tnhnbb.exe 1684 djvjv.exe 2748 lxlrxrf.exe 2780 thbbnn.exe 2880 vpppv.exe 2892 1xlrrxf.exe 1596 ttnthn.exe 2212 vpddp.exe 860 jjpvj.exe 2612 fxlrxfr.exe 1400 7hhnbh.exe 1360 pjvvj.exe 1732 jdddv.exe 2100 rrlxflx.exe 1904 thhtbb.exe 2008 pjdpv.exe -
Processes:
resource yara_rule behavioral1/memory/2304-0-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\jdppv.exe upx behavioral1/memory/2208-10-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2304-8-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\lrlrfrx.exe upx C:\jddjd.exe upx behavioral1/memory/2580-26-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2580-35-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\fxlrxrf.exe upx behavioral1/memory/2536-36-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\1nhntt.exe upx behavioral1/memory/2816-52-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\vddjd.exe upx C:\fxfxrlx.exe upx behavioral1/memory/2528-62-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\nbhhnh.exe upx behavioral1/memory/2800-71-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2420-80-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\rllrxxl.exe upx C:\tttbnn.exe upx behavioral1/memory/2452-88-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2468-90-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\3rlrxfl.exe upx behavioral1/memory/2116-100-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\nnhtbb.exe upx behavioral1/memory/2712-116-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\jjdjv.exe upx C:\tnbbbb.exe upx C:\dvpdp.exe upx behavioral1/memory/2908-136-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2876-134-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\xlllrrx.exe upx behavioral1/memory/1208-152-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/1492-154-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\pjddj.exe upx C:\xrlrxxx.exe upx behavioral1/memory/1492-162-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\jjdvp.exe upx behavioral1/memory/844-172-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/844-180-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\thbhnb.exe upx behavioral1/memory/2232-190-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\pvpvd.exe upx behavioral1/memory/2224-199-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\lfflxfx.exe upx \??\c:\3ddjp.exe upx C:\1frflrf.exe upx C:\5pjpv.exe upx behavioral1/memory/2924-225-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/448-234-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\1xrlrxl.exe upx behavioral1/memory/2984-236-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\ttnhtn.exe upx C:\1dpvv.exe upx behavioral1/memory/1276-254-0x0000000000400000-0x000000000043A000-memory.dmp upx \??\c:\hhntbb.exe upx behavioral1/memory/1396-264-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\vvvjp.exe upx \??\c:\5bnnnt.exe upx behavioral1/memory/1888-289-0x0000000000400000-0x000000000043A000-memory.dmp upx C:\btnthh.exe upx behavioral1/memory/1588-287-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/2808-311-0x0000000000400000-0x000000000043A000-memory.dmp upx behavioral1/memory/892-309-0x0000000000400000-0x000000000043A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
24d33f26b845130bfe2acef96de5d7a03dc9c0e96a97dde222f32e6483948f3b.exejdppv.exelrlrfrx.exejddjd.exefxlrxrf.exe1nhntt.exevddjd.exefxfxrlx.exenbhhnh.exerllrxxl.exetttbnn.exe3rlrxfl.exennhtbb.exejjdjv.exetnbbbb.exedvpdp.exedescription pid process target process PID 2304 wrote to memory of 2208 2304 24d33f26b845130bfe2acef96de5d7a03dc9c0e96a97dde222f32e6483948f3b.exe jdppv.exe PID 2304 wrote to memory of 2208 2304 24d33f26b845130bfe2acef96de5d7a03dc9c0e96a97dde222f32e6483948f3b.exe jdppv.exe PID 2304 wrote to memory of 2208 2304 24d33f26b845130bfe2acef96de5d7a03dc9c0e96a97dde222f32e6483948f3b.exe jdppv.exe PID 2304 wrote to memory of 2208 2304 24d33f26b845130bfe2acef96de5d7a03dc9c0e96a97dde222f32e6483948f3b.exe jdppv.exe PID 2208 wrote to memory of 2180 2208 jdppv.exe lrlrfrx.exe PID 2208 wrote to memory of 2180 2208 jdppv.exe lrlrfrx.exe PID 2208 wrote to memory of 2180 2208 jdppv.exe lrlrfrx.exe PID 2208 wrote to memory of 2180 2208 jdppv.exe lrlrfrx.exe PID 2180 wrote to memory of 2580 2180 lrlrfrx.exe jddjd.exe PID 2180 wrote to memory of 2580 2180 lrlrfrx.exe jddjd.exe PID 2180 wrote to memory of 2580 2180 lrlrfrx.exe jddjd.exe PID 2180 wrote to memory of 2580 2180 lrlrfrx.exe jddjd.exe PID 2580 wrote to memory of 2536 2580 jddjd.exe fxlrxrf.exe PID 2580 wrote to memory of 2536 2580 jddjd.exe fxlrxrf.exe PID 2580 wrote to memory of 2536 2580 jddjd.exe fxlrxrf.exe PID 2580 wrote to memory of 2536 2580 jddjd.exe fxlrxrf.exe PID 2536 wrote to memory of 2816 2536 fxlrxrf.exe 1nhntt.exe PID 2536 wrote to memory of 2816 2536 fxlrxrf.exe 1nhntt.exe PID 2536 wrote to memory of 2816 2536 fxlrxrf.exe 1nhntt.exe PID 2536 wrote to memory of 2816 2536 fxlrxrf.exe 1nhntt.exe PID 2816 wrote to memory of 2528 2816 1nhntt.exe vddjd.exe PID 2816 wrote to memory of 2528 2816 1nhntt.exe vddjd.exe PID 2816 wrote to memory of 2528 2816 1nhntt.exe vddjd.exe PID 2816 wrote to memory of 2528 2816 1nhntt.exe vddjd.exe PID 2528 wrote to memory of 2800 2528 vddjd.exe fxfxrlx.exe PID 2528 wrote to memory of 2800 2528 vddjd.exe fxfxrlx.exe PID 2528 wrote to memory of 2800 2528 vddjd.exe fxfxrlx.exe PID 2528 wrote to memory of 2800 2528 vddjd.exe fxfxrlx.exe PID 2800 wrote to memory of 2420 2800 fxfxrlx.exe nbhhnh.exe PID 2800 wrote to memory of 2420 2800 fxfxrlx.exe nbhhnh.exe PID 2800 wrote to memory of 2420 2800 fxfxrlx.exe nbhhnh.exe PID 2800 wrote to memory of 2420 2800 fxfxrlx.exe nbhhnh.exe PID 2420 wrote to memory of 2452 2420 nbhhnh.exe rllrxxl.exe PID 2420 wrote to memory of 2452 2420 nbhhnh.exe rllrxxl.exe PID 2420 wrote to memory of 2452 2420 nbhhnh.exe rllrxxl.exe PID 2420 wrote to memory of 2452 2420 nbhhnh.exe rllrxxl.exe PID 2452 wrote to memory of 2468 2452 rllrxxl.exe tttbnn.exe PID 2452 wrote to memory of 2468 2452 rllrxxl.exe tttbnn.exe PID 2452 wrote to memory of 2468 2452 rllrxxl.exe tttbnn.exe PID 2452 wrote to memory of 2468 2452 rllrxxl.exe tttbnn.exe PID 2468 wrote to memory of 2116 2468 tttbnn.exe 3rlrxfl.exe PID 2468 wrote to memory of 2116 2468 tttbnn.exe 3rlrxfl.exe PID 2468 wrote to memory of 2116 2468 tttbnn.exe 3rlrxfl.exe PID 2468 wrote to memory of 2116 2468 tttbnn.exe 3rlrxfl.exe PID 2116 wrote to memory of 2712 2116 3rlrxfl.exe nnhtbb.exe PID 2116 wrote to memory of 2712 2116 3rlrxfl.exe nnhtbb.exe PID 2116 wrote to memory of 2712 2116 3rlrxfl.exe nnhtbb.exe PID 2116 wrote to memory of 2712 2116 3rlrxfl.exe nnhtbb.exe PID 2712 wrote to memory of 2652 2712 nnhtbb.exe jjdjv.exe PID 2712 wrote to memory of 2652 2712 nnhtbb.exe jjdjv.exe PID 2712 wrote to memory of 2652 2712 nnhtbb.exe jjdjv.exe PID 2712 wrote to memory of 2652 2712 nnhtbb.exe jjdjv.exe PID 2652 wrote to memory of 2876 2652 jjdjv.exe tnbbbb.exe PID 2652 wrote to memory of 2876 2652 jjdjv.exe tnbbbb.exe PID 2652 wrote to memory of 2876 2652 jjdjv.exe tnbbbb.exe PID 2652 wrote to memory of 2876 2652 jjdjv.exe tnbbbb.exe PID 2876 wrote to memory of 2908 2876 tnbbbb.exe dvpdp.exe PID 2876 wrote to memory of 2908 2876 tnbbbb.exe dvpdp.exe PID 2876 wrote to memory of 2908 2876 tnbbbb.exe dvpdp.exe PID 2876 wrote to memory of 2908 2876 tnbbbb.exe dvpdp.exe PID 2908 wrote to memory of 1208 2908 dvpdp.exe xlllrrx.exe PID 2908 wrote to memory of 1208 2908 dvpdp.exe xlllrrx.exe PID 2908 wrote to memory of 1208 2908 dvpdp.exe xlllrrx.exe PID 2908 wrote to memory of 1208 2908 dvpdp.exe xlllrrx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24d33f26b845130bfe2acef96de5d7a03dc9c0e96a97dde222f32e6483948f3b.exe"C:\Users\Admin\AppData\Local\Temp\24d33f26b845130bfe2acef96de5d7a03dc9c0e96a97dde222f32e6483948f3b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
\??\c:\jdppv.exec:\jdppv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\lrlrfrx.exec:\lrlrfrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2180 -
\??\c:\jddjd.exec:\jddjd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\fxlrxrf.exec:\fxlrxrf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
\??\c:\1nhntt.exec:\1nhntt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\vddjd.exec:\vddjd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\fxfxrlx.exec:\fxfxrlx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\nbhhnh.exec:\nbhhnh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\rllrxxl.exec:\rllrxxl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
\??\c:\tttbnn.exec:\tttbnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\3rlrxfl.exec:\3rlrxfl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2116 -
\??\c:\nnhtbb.exec:\nnhtbb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\jjdjv.exec:\jjdjv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\tnbbbb.exec:\tnbbbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\dvpdp.exec:\dvpdp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\xlllrrx.exec:\xlllrrx.exe17⤵
- Executes dropped EXE
PID:1208 -
\??\c:\pjddj.exec:\pjddj.exe18⤵
- Executes dropped EXE
PID:1492 -
\??\c:\xrlrxxx.exec:\xrlrxxx.exe19⤵
- Executes dropped EXE
PID:1120 -
\??\c:\jjdvp.exec:\jjdvp.exe20⤵
- Executes dropped EXE
PID:844 -
\??\c:\thbhnb.exec:\thbhnb.exe21⤵
- Executes dropped EXE
PID:2232 -
\??\c:\pvpvd.exec:\pvpvd.exe22⤵
- Executes dropped EXE
PID:2224 -
\??\c:\lfflxfx.exec:\lfflxfx.exe23⤵
- Executes dropped EXE
PID:1988 -
\??\c:\3ddjp.exec:\3ddjp.exe24⤵
- Executes dropped EXE
PID:584 -
\??\c:\1frflrf.exec:\1frflrf.exe25⤵
- Executes dropped EXE
PID:2924 -
\??\c:\5pjpv.exec:\5pjpv.exe26⤵
- Executes dropped EXE
PID:448 -
\??\c:\1xrlrxl.exec:\1xrlrxl.exe27⤵
- Executes dropped EXE
PID:2984 -
\??\c:\ttnhtn.exec:\ttnhtn.exe28⤵
- Executes dropped EXE
PID:1524 -
\??\c:\1dpvv.exec:\1dpvv.exe29⤵
- Executes dropped EXE
PID:1276 -
\??\c:\hhntbb.exec:\hhntbb.exe30⤵
- Executes dropped EXE
PID:1396 -
\??\c:\vvvjp.exec:\vvvjp.exe31⤵
- Executes dropped EXE
PID:876 -
\??\c:\5bnnnt.exec:\5bnnnt.exe32⤵
- Executes dropped EXE
PID:1588 -
\??\c:\btnthh.exec:\btnthh.exe33⤵
- Executes dropped EXE
PID:1888 -
\??\c:\rlxfxfl.exec:\rlxfxfl.exe34⤵
- Executes dropped EXE
PID:1476 -
\??\c:\htttbh.exec:\htttbh.exe35⤵
- Executes dropped EXE
PID:892 -
\??\c:\dvvdv.exec:\dvvdv.exe36⤵
- Executes dropped EXE
PID:2808 -
\??\c:\lxllrrl.exec:\lxllrrl.exe37⤵
- Executes dropped EXE
PID:2164 -
\??\c:\7nhhnn.exec:\7nhhnn.exe38⤵
- Executes dropped EXE
PID:2852 -
\??\c:\dvppp.exec:\dvppp.exe39⤵
- Executes dropped EXE
PID:2476 -
\??\c:\pjvjv.exec:\pjvjv.exe40⤵
- Executes dropped EXE
PID:2728 -
\??\c:\xlrfxrx.exec:\xlrfxrx.exe41⤵
- Executes dropped EXE
PID:2076 -
\??\c:\hbnbhh.exec:\hbnbhh.exe42⤵
- Executes dropped EXE
PID:2036 -
\??\c:\9dvvv.exec:\9dvvv.exe43⤵
- Executes dropped EXE
PID:1952 -
\??\c:\ffrlxxl.exec:\ffrlxxl.exe44⤵
- Executes dropped EXE
PID:2404 -
\??\c:\5nnnbh.exec:\5nnnbh.exe45⤵
- Executes dropped EXE
PID:2528 -
\??\c:\bthtth.exec:\bthtth.exe46⤵
- Executes dropped EXE
PID:2732 -
\??\c:\vjdjj.exec:\vjdjj.exe47⤵
- Executes dropped EXE
PID:2564 -
\??\c:\rrfxffl.exec:\rrfxffl.exe48⤵
- Executes dropped EXE
PID:2400 -
\??\c:\bttbnt.exec:\bttbnt.exe49⤵
- Executes dropped EXE
PID:2372 -
\??\c:\tnhnbb.exec:\tnhnbb.exe50⤵
- Executes dropped EXE
PID:1964 -
\??\c:\djvjv.exec:\djvjv.exe51⤵
- Executes dropped EXE
PID:1684 -
\??\c:\lxlrxrf.exec:\lxlrxrf.exe52⤵
- Executes dropped EXE
PID:2748 -
\??\c:\thbbnn.exec:\thbbnn.exe53⤵
- Executes dropped EXE
PID:2780 -
\??\c:\vpppv.exec:\vpppv.exe54⤵
- Executes dropped EXE
PID:2880 -
\??\c:\1xlrrxf.exec:\1xlrrxf.exe55⤵
- Executes dropped EXE
PID:2892 -
\??\c:\ttnthn.exec:\ttnthn.exe56⤵
- Executes dropped EXE
PID:1596 -
\??\c:\vpddp.exec:\vpddp.exe57⤵
- Executes dropped EXE
PID:2212 -
\??\c:\jjpvj.exec:\jjpvj.exe58⤵
- Executes dropped EXE
PID:860 -
\??\c:\fxlrxfr.exec:\fxlrxfr.exe59⤵
- Executes dropped EXE
PID:2612 -
\??\c:\7hhnbh.exec:\7hhnbh.exe60⤵
- Executes dropped EXE
PID:1400 -
\??\c:\pjvvj.exec:\pjvvj.exe61⤵
- Executes dropped EXE
PID:1360 -
\??\c:\jdddv.exec:\jdddv.exe62⤵
- Executes dropped EXE
PID:1732 -
\??\c:\rrlxflx.exec:\rrlxflx.exe63⤵
- Executes dropped EXE
PID:2100 -
\??\c:\thhtbb.exec:\thhtbb.exe64⤵
- Executes dropped EXE
PID:1904 -
\??\c:\pjdpv.exec:\pjdpv.exe65⤵
- Executes dropped EXE
PID:2008 -
\??\c:\xrrrlfl.exec:\xrrrlfl.exe66⤵PID:1936
-
\??\c:\rllrxfr.exec:\rllrxfr.exe67⤵PID:1472
-
\??\c:\thtbbh.exec:\thtbbh.exe68⤵PID:1104
-
\??\c:\jpvpd.exec:\jpvpd.exe69⤵PID:704
-
\??\c:\rfxrxxl.exec:\rfxrxxl.exe70⤵PID:2092
-
\??\c:\5htnth.exec:\5htnth.exe71⤵PID:1696
-
\??\c:\jdvdd.exec:\jdvdd.exe72⤵PID:2984
-
\??\c:\lxflfrf.exec:\lxflfrf.exe73⤵PID:1592
-
\??\c:\9hhhhh.exec:\9hhhhh.exe74⤵PID:1336
-
\??\c:\ntnhbt.exec:\ntnhbt.exe75⤵PID:768
-
\??\c:\5jpjp.exec:\5jpjp.exe76⤵PID:2068
-
\??\c:\frfxrrx.exec:\frfxrrx.exe77⤵PID:3032
-
\??\c:\5nnhnh.exec:\5nnhnh.exe78⤵PID:1856
-
\??\c:\dvvvj.exec:\dvvvj.exe79⤵PID:344
-
\??\c:\9pdjj.exec:\9pdjj.exe80⤵PID:1888
-
\??\c:\fffrflx.exec:\fffrflx.exe81⤵PID:1764
-
\??\c:\nbbbbh.exec:\nbbbbh.exe82⤵PID:892
-
\??\c:\5jpvp.exec:\5jpvp.exe83⤵PID:1564
-
\??\c:\rlrrxfr.exec:\rlrrxfr.exe84⤵PID:2208
-
\??\c:\rlflxxr.exec:\rlflxxr.exe85⤵PID:2852
-
\??\c:\bthbnt.exec:\bthbnt.exe86⤵PID:2488
-
\??\c:\3vppp.exec:\3vppp.exe87⤵PID:1404
-
\??\c:\xrlrflf.exec:\xrlrflf.exe88⤵PID:2696
-
\??\c:\thbbht.exec:\thbbht.exe89⤵PID:2596
-
\??\c:\vjvdj.exec:\vjvdj.exe90⤵PID:1952
-
\??\c:\djdpv.exec:\djdpv.exe91⤵PID:2720
-
\??\c:\xfxflrf.exec:\xfxflrf.exe92⤵PID:2188
-
\??\c:\nnbbbn.exec:\nnbbbn.exe93⤵PID:2732
-
\??\c:\dppdp.exec:\dppdp.exe94⤵PID:2760
-
\??\c:\1vppp.exec:\1vppp.exe95⤵PID:2400
-
\??\c:\rlflflf.exec:\rlflflf.exe96⤵PID:3004
-
\??\c:\nhhtnt.exec:\nhhtnt.exe97⤵PID:2932
-
\??\c:\pdppj.exec:\pdppj.exe98⤵PID:2288
-
\??\c:\1xrxxxf.exec:\1xrxxxf.exe99⤵PID:2712
-
\??\c:\lxllllx.exec:\lxllllx.exe100⤵PID:2780
-
\??\c:\nbthtb.exec:\nbthtb.exe101⤵PID:1480
-
\??\c:\pjjpp.exec:\pjjpp.exe102⤵PID:1688
-
\??\c:\xrlrflr.exec:\xrlrflr.exe103⤵PID:2028
-
\??\c:\rlxlrfr.exec:\rlxlrfr.exe104⤵PID:1640
-
\??\c:\1nhttb.exec:\1nhttb.exe105⤵PID:860
-
\??\c:\jdpdj.exec:\jdpdj.exe106⤵PID:2616
-
\??\c:\rrlrrxf.exec:\rrlrrxf.exe107⤵PID:1400
-
\??\c:\rflfxrx.exec:\rflfxrx.exe108⤵PID:1360
-
\??\c:\9nnthn.exec:\9nnthn.exe109⤵PID:1984
-
\??\c:\jvppd.exec:\jvppd.exe110⤵PID:2820
-
\??\c:\lfrrxxf.exec:\lfrrxxf.exe111⤵PID:1672
-
\??\c:\hbttnh.exec:\hbttnh.exe112⤵PID:1896
-
\??\c:\5ttbht.exec:\5ttbht.exe113⤵PID:296
-
\??\c:\vpjpj.exec:\vpjpj.exe114⤵PID:1132
-
\??\c:\llfflxf.exec:\llfflxf.exe115⤵PID:2356
-
\??\c:\nhbtht.exec:\nhbtht.exe116⤵PID:988
-
\??\c:\jddpj.exec:\jddpj.exe117⤵PID:1808
-
\??\c:\rllrflf.exec:\rllrflf.exe118⤵PID:1776
-
\??\c:\7rxlxfr.exec:\7rxlxfr.exe119⤵PID:1784
-
\??\c:\tthtnb.exec:\tthtnb.exe120⤵PID:1276
-
\??\c:\7httbb.exec:\7httbb.exe121⤵PID:692
-
\??\c:\9pjdd.exec:\9pjdd.exe122⤵PID:1940
-
\??\c:\xrxxfxl.exec:\xrxxfxl.exe123⤵PID:2124
-
\??\c:\bntbhb.exec:\bntbhb.exe124⤵PID:564
-
\??\c:\ttthnt.exec:\ttthnt.exe125⤵PID:3048
-
\??\c:\1xxfrxl.exec:\1xxfrxl.exe126⤵PID:1476
-
\??\c:\xxrxxfr.exec:\xxrxxfr.exe127⤵PID:884
-
\??\c:\tnhntt.exec:\tnhntt.exe128⤵PID:2320
-
\??\c:\5jddj.exec:\5jddj.exe129⤵PID:2848
-
\??\c:\dpdjj.exec:\dpdjj.exe130⤵PID:2940
-
\??\c:\frflxxl.exec:\frflxxl.exe131⤵PID:2476
-
\??\c:\btnnhh.exec:\btnnhh.exe132⤵PID:2604
-
\??\c:\jdppp.exec:\jdppp.exe133⤵PID:2988
-
\??\c:\vvvpd.exec:\vvvpd.exe134⤵PID:2036
-
\??\c:\5xrlrfx.exec:\5xrlrfx.exe135⤵PID:2552
-
\??\c:\bthnnn.exec:\bthnnn.exe136⤵PID:2692
-
\??\c:\1bbhnh.exec:\1bbhnh.exe137⤵PID:2424
-
\??\c:\1jdjv.exec:\1jdjv.exe138⤵PID:2800
-
\??\c:\llrffxl.exec:\llrffxl.exe139⤵PID:2420
-
\??\c:\hbtnbb.exec:\hbtnbb.exe140⤵PID:2428
-
\??\c:\pvjvv.exec:\pvjvv.exe141⤵PID:2904
-
\??\c:\jvddp.exec:\jvddp.exe142⤵PID:2468
-
\??\c:\rrlxffr.exec:\rrlxffr.exe143⤵PID:2116
-
\??\c:\hnbhnh.exec:\hnbhnh.exe144⤵PID:2932
-
\??\c:\hnhthn.exec:\hnhthn.exe145⤵PID:2888
-
\??\c:\jdvvj.exec:\jdvvj.exe146⤵PID:2712
-
\??\c:\9xlxflf.exec:\9xlxflf.exe147⤵PID:2780
-
\??\c:\7nhntt.exec:\7nhntt.exe148⤵PID:1020
-
\??\c:\tnhtbb.exec:\tnhtbb.exe149⤵PID:2908
-
\??\c:\5dvjv.exec:\5dvjv.exe150⤵PID:2132
-
\??\c:\3xrfllr.exec:\3xrfllr.exe151⤵PID:1640
-
\??\c:\tbnbtt.exec:\tbnbtt.exe152⤵PID:860
-
\??\c:\bnhbbh.exec:\bnhbbh.exe153⤵PID:2616
-
\??\c:\jdpjp.exec:\jdpjp.exe154⤵PID:844
-
\??\c:\7rlxxxx.exec:\7rlxxxx.exe155⤵PID:1172
-
\??\c:\lxrllfx.exec:\lxrllfx.exe156⤵PID:2244
-
\??\c:\7bbbbh.exec:\7bbbbh.exe157⤵PID:1904
-
\??\c:\3jvpp.exec:\3jvpp.exe158⤵PID:592
-
\??\c:\vdvdj.exec:\vdvdj.exe159⤵PID:780
-
\??\c:\3xrxxxf.exec:\3xrxxxf.exe160⤵PID:1864
-
\??\c:\7bbnnh.exec:\7bbnnh.exe161⤵PID:584
-
\??\c:\3hnhht.exec:\3hnhht.exe162⤵PID:2352
-
\??\c:\jjjdj.exec:\jjjdj.exe163⤵PID:704
-
\??\c:\fxlrxxx.exec:\fxlrxxx.exe164⤵PID:2184
-
\??\c:\fxxrrrx.exec:\fxxrrrx.exe165⤵PID:988
-
\??\c:\7tnhbt.exec:\7tnhbt.exe166⤵PID:1772
-
\??\c:\vpddd.exec:\vpddd.exe167⤵PID:1100
-
\??\c:\dvpjp.exec:\dvpjp.exe168⤵PID:1508
-
\??\c:\fxlllrr.exec:\fxlllrr.exe169⤵PID:2088
-
\??\c:\nhnbhh.exec:\nhnbhh.exe170⤵PID:636
-
\??\c:\hhtbnn.exec:\hhtbnn.exe171⤵PID:876
-
\??\c:\5vvdp.exec:\5vvdp.exe172⤵PID:1556
-
\??\c:\fxfrfrf.exec:\fxfrfrf.exe173⤵PID:2148
-
\??\c:\5hbnnn.exec:\5hbnnn.exe174⤵PID:320
-
\??\c:\nnnnht.exec:\nnnnht.exe175⤵PID:1852
-
\??\c:\9jdjj.exec:\9jdjj.exe176⤵PID:1568
-
\??\c:\lxxrxxx.exec:\lxxrxxx.exe177⤵PID:2864
-
\??\c:\bhnhbh.exec:\bhnhbh.exe178⤵PID:1564
-
\??\c:\btnnbt.exec:\btnnbt.exe179⤵PID:552
-
\??\c:\jdvjp.exec:\jdvjp.exe180⤵PID:1676
-
\??\c:\rlrlrrx.exec:\rlrlrrx.exe181⤵PID:2476
-
\??\c:\hbthht.exec:\hbthht.exe182⤵PID:2728
-
\??\c:\bnhhnh.exec:\bnhhnh.exe183⤵PID:2076
-
\??\c:\pdpvv.exec:\pdpvv.exe184⤵PID:2704
-
\??\c:\lfrrrxf.exec:\lfrrrxf.exe185⤵PID:2552
-
\??\c:\lrrrxxx.exec:\lrrrxxx.exe186⤵PID:2720
-
\??\c:\3tnhtt.exec:\3tnhtt.exe187⤵PID:2424
-
\??\c:\nbtbnn.exec:\nbtbnn.exe188⤵PID:2416
-
\??\c:\dvpjj.exec:\dvpjj.exe189⤵PID:2420
-
\??\c:\frfflrx.exec:\frfflrx.exe190⤵PID:2428
-
\??\c:\1xlfxxr.exec:\1xlfxxr.exe191⤵PID:2904
-
\??\c:\nbnttt.exec:\nbnttt.exe192⤵PID:2472
-
\??\c:\vdvjv.exec:\vdvjv.exe193⤵PID:2116
-
\??\c:\3jdvv.exec:\3jdvv.exe194⤵PID:2932
-
\??\c:\lrllffr.exec:\lrllffr.exe195⤵PID:2888
-
\??\c:\thtttt.exec:\thtttt.exe196⤵PID:1544
-
\??\c:\jvjjj.exec:\jvjjj.exe197⤵PID:2780
-
\??\c:\5pddj.exec:\5pddj.exe198⤵PID:1020
-
\??\c:\9frrrrf.exec:\9frrrrf.exe199⤵PID:2316
-
\??\c:\xrfllrr.exec:\xrfllrr.exe200⤵PID:2132
-
\??\c:\hbtntt.exec:\hbtntt.exe201⤵PID:3040
-
\??\c:\3jdvv.exec:\3jdvv.exe202⤵PID:2248
-
\??\c:\7djvv.exec:\7djvv.exe203⤵PID:2616
-
\??\c:\xrlxfrl.exec:\xrlxfrl.exe204⤵PID:844
-
\??\c:\ttnhnh.exec:\ttnhnh.exe205⤵PID:1360
-
\??\c:\tbhhbt.exec:\tbhhbt.exe206⤵PID:2100
-
\??\c:\pppdp.exec:\pppdp.exe207⤵PID:2280
-
\??\c:\lfrrxxf.exec:\lfrrxxf.exe208⤵PID:592
-
\??\c:\fxllllr.exec:\fxllllr.exe209⤵PID:1968
-
\??\c:\hbttht.exec:\hbttht.exe210⤵PID:908
-
\??\c:\dpjpp.exec:\dpjpp.exe211⤵PID:2916
-
\??\c:\7rlffff.exec:\7rlffff.exe212⤵PID:2352
-
\??\c:\hbbhnn.exec:\hbbhnn.exe213⤵PID:1620
-
\??\c:\9pjdd.exec:\9pjdd.exe214⤵PID:1624
-
\??\c:\3dvpj.exec:\3dvpj.exe215⤵PID:2260
-
\??\c:\1lrrrlf.exec:\1lrrrlf.exe216⤵PID:1772
-
\??\c:\flxxrxx.exec:\flxxrxx.exe217⤵PID:332
-
\??\c:\nhbhnt.exec:\nhbhnt.exe218⤵PID:1508
-
\??\c:\5vpjj.exec:\5vpjj.exe219⤵PID:2088
-
\??\c:\lfrxxff.exec:\lfrxxff.exe220⤵PID:848
-
\??\c:\xlllrrx.exec:\xlllrrx.exe221⤵PID:1280
-
\??\c:\3hnnnt.exec:\3hnnnt.exe222⤵PID:3032
-
\??\c:\jdpvv.exec:\jdpvv.exe223⤵PID:1888
-
\??\c:\vjvdv.exec:\vjvdv.exe224⤵PID:3064
-
\??\c:\ffxfrll.exec:\ffxfrll.exe225⤵PID:1540
-
\??\c:\7frlfxl.exec:\7frlfxl.exe226⤵PID:1568
-
\??\c:\thnnhh.exec:\thnnhh.exe227⤵PID:1196
-
\??\c:\dpvpv.exec:\dpvpv.exe228⤵PID:1564
-
\??\c:\9lrfxxr.exec:\9lrfxxr.exe229⤵PID:2956
-
\??\c:\3hhbtn.exec:\3hhbtn.exe230⤵PID:2948
-
\??\c:\bnbbhh.exec:\bnbbhh.exe231⤵PID:2604
-
\??\c:\jdjvj.exec:\jdjvj.exe232⤵PID:2728
-
\??\c:\lfxflrf.exec:\lfxflrf.exe233⤵PID:2988
-
\??\c:\3lxlrrx.exec:\3lxlrrx.exe234⤵PID:2704
-
\??\c:\thtttt.exec:\thtttt.exe235⤵PID:2056
-
\??\c:\vppvd.exec:\vppvd.exe236⤵PID:2720
-
\??\c:\dvdjp.exec:\dvdjp.exe237⤵PID:2772
-
\??\c:\lfrxllf.exec:\lfrxllf.exe238⤵PID:2396
-
\??\c:\thnhnh.exec:\thnhnh.exe239⤵PID:2760
-
\??\c:\9nnnnn.exec:\9nnnnn.exe240⤵PID:2448
-
\??\c:\pjdjp.exec:\pjdjp.exe241⤵PID:3008
-
\??\c:\flfffxx.exec:\flfffxx.exe242⤵PID:2472