Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 19:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1b1898c9325068726246f127417a8790e8d56bd230949a4eb028831e33f3f1af.exe
Resource
win7-20240611-en
6 signatures
150 seconds
General
-
Target
1b1898c9325068726246f127417a8790e8d56bd230949a4eb028831e33f3f1af.exe
-
Size
288KB
-
MD5
c8298be3b8db3beb5c4d5547cb0ba17e
-
SHA1
5a19ed647c7705e07fa508e2c56130b492881862
-
SHA256
1b1898c9325068726246f127417a8790e8d56bd230949a4eb028831e33f3f1af
-
SHA512
a2ec463f56bbb38a42326fcc971ce70bf5d1f508a9aaf1ffb0f171e9571e00379e793ec38388eae608c61b5d2ccf7eeb6d6fe884959812dbfa4d00a78a5c1be2
-
SSDEEP
3072:ThOm2sI93UufdC67cipfmCiiiXAQ5lpBoGYwNNhu0CzhKPJFt:Tcm7ImGddXlWrXF5lpKGYV0wh6Jr
Malware Config
Signatures
-
Detect Blackmoon payload 42 IoCs
Processes:
resource yara_rule behavioral1/memory/2248-11-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2620-24-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2644-33-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/796-20-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/1760-48-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2668-57-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2664-68-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/3040-78-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/1012-97-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2848-120-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2932-129-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2396-134-0x00000000003A0000-0x00000000003CB000-memory.dmp family_blackmoon behavioral1/memory/1660-147-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/824-166-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2820-176-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2588-180-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2588-187-0x00000000001B0000-0x00000000001DB000-memory.dmp family_blackmoon behavioral1/memory/2460-195-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2020-205-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/1828-265-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2188-293-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2028-315-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2620-340-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2772-355-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2120-354-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2760-369-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2368-376-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2224-389-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/764-398-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/768-411-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/764-430-0x00000000003C0000-0x00000000003EB000-memory.dmp family_blackmoon behavioral1/memory/2288-524-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/1640-544-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/1256-543-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/1700-596-0x0000000000220000-0x000000000024B000-memory.dmp family_blackmoon behavioral1/memory/2956-655-0x0000000000220000-0x000000000024B000-memory.dmp family_blackmoon behavioral1/memory/2776-674-0x0000000000220000-0x000000000024B000-memory.dmp family_blackmoon behavioral1/memory/2660-693-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/1668-731-0x0000000000220000-0x000000000024B000-memory.dmp family_blackmoon behavioral1/memory/1124-759-0x0000000000400000-0x000000000042B000-memory.dmp family_blackmoon behavioral1/memory/2672-948-0x00000000001B0000-0x00000000001DB000-memory.dmp family_blackmoon behavioral1/memory/2624-975-0x0000000000220000-0x000000000024B000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 48 IoCs
Processes:
resource yara_rule behavioral1/memory/2248-0-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2248-11-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2620-24-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2644-33-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/796-20-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1760-48-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2668-49-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2668-57-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2664-68-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/3040-78-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1012-97-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2848-120-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2932-129-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1660-147-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/824-166-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2820-176-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2588-180-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2460-195-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2020-205-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1828-257-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1828-265-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2188-293-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2028-315-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2620-340-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1164-341-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2772-355-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2120-354-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2760-362-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2760-369-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2368-376-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2224-389-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/764-390-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/764-398-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/768-411-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2900-431-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2288-524-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1640-544-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1256-543-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1448-604-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2204-623-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2660-693-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/516-706-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2892-732-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1124-759-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2892-766-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1836-851-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/1636-889-0x0000000000400000-0x000000000042B000-memory.dmp UPX behavioral1/memory/2080-1108-0x0000000000400000-0x000000000042B000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
rdlrrl.exepvdjb.exehdpjbp.exedbdljrn.exexdppd.exerbvrx.exernlxdxt.exebvbxhdd.exepxrtv.exetdppdfh.exehnfxltr.exefhbfv.exejdlrnb.exenxfdxrv.exevrvjhjn.exejlftdn.exerttxd.exertvfrj.exetrrthd.exepvfvll.exerppdfvr.exebpvlbnj.exetxxdjvn.exehrbfb.exelpxpff.exetltvvxt.exehrnrhdx.exebfxnpnl.exejpbtb.exeplhlx.exefjplj.exejptpnf.exexpntbjf.exepbxfxhp.exervtdj.exedjjxb.exenrtrdx.exepljfdhv.exehhdvl.exertfjxrt.exefrbfjx.exelfjjpp.exentppndx.exellfbdn.exerhfpd.exejlbbhv.exejrrrx.exedjprj.exetpxplv.exenjrbtrp.exephvlrbf.exetpddh.exelfvtpj.exextltt.exebjlrh.exeptbll.exebnvdrnb.exenxrrr.exexfftdjt.exenlnxfdd.exettltv.exenpfljrp.exebdnjr.exejdnppl.exepid process 796 rdlrrl.exe 2620 pvdjb.exe 2644 hdpjbp.exe 1760 dbdljrn.exe 2668 xdppd.exe 2664 rbvrx.exe 3036 rnlxdxt.exe 3040 bvbxhdd.exe 588 pxrtv.exe 1012 tdppdfh.exe 1204 hnfxltr.exe 2848 fhbfv.exe 2932 jdlrnb.exe 2396 nxfdxrv.exe 1660 vrvjhjn.exe 1916 jlftdn.exe 824 rttxd.exe 2820 rtvfrj.exe 2588 trrthd.exe 2460 pvfvll.exe 2020 rppdfvr.exe 2928 bpvlbnj.exe 2916 txxdjvn.exe 1988 hrbfb.exe 2960 lpxpff.exe 1056 tltvvxt.exe 1556 hrnrhdx.exe 1828 bfxnpnl.exe 2408 jpbtb.exe 1048 plhlx.exe 2188 fjplj.exe 2988 jptpnf.exe 2212 xpntbjf.exe 2028 pbxfxhp.exe 2444 rvtdj.exe 2248 djjxb.exe 2700 nrtrdx.exe 2620 pljfdhv.exe 1164 hhdvl.exe 2120 rtfjxrt.exe 2772 frbfjx.exe 2760 lfjjpp.exe 2368 ntppndx.exe 2604 llfbdn.exe 2224 rhfpd.exe 764 jlbbhv.exe 1604 jrrrx.exe 768 djprj.exe 1228 tpxplv.exe 572 njrbtrp.exe 2876 phvlrbf.exe 2900 tpddh.exe 1996 lfvtpj.exe 2464 xtltt.exe 924 bjlrh.exe 1652 ptbll.exe 2796 bnvdrnb.exe 1916 nxrrr.exe 2864 xfftdjt.exe 1928 nlnxfdd.exe 1456 ttltv.exe 2588 npfljrp.exe 2112 bdnjr.exe 2680 jdnppl.exe -
Processes:
resource yara_rule behavioral1/memory/2248-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2248-11-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2620-24-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2644-33-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/796-20-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1760-48-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2668-49-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2668-57-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2664-68-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/3040-78-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1012-97-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2848-120-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2932-129-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1660-147-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/824-166-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2820-176-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2588-180-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2460-195-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2020-205-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1828-257-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1828-265-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2188-293-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2028-315-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2620-340-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1164-341-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2772-355-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2120-354-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2760-362-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2760-369-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2368-376-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2224-389-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/764-390-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/764-398-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/768-411-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2900-431-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2288-524-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1640-544-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1256-543-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1448-604-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2204-623-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2660-693-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/516-706-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2892-732-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1124-759-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2892-766-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1836-851-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/1636-889-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral1/memory/2904-1077-0x00000000002B0000-0x00000000002DB000-memory.dmp upx behavioral1/memory/2080-1108-0x0000000000400000-0x000000000042B000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1b1898c9325068726246f127417a8790e8d56bd230949a4eb028831e33f3f1af.exerdlrrl.exepvdjb.exehdpjbp.exedbdljrn.exexdppd.exerbvrx.exernlxdxt.exebvbxhdd.exepxrtv.exetdppdfh.exehnfxltr.exefhbfv.exejdlrnb.exenxfdxrv.exevrvjhjn.exedescription pid process target process PID 2248 wrote to memory of 796 2248 1b1898c9325068726246f127417a8790e8d56bd230949a4eb028831e33f3f1af.exe rdlrrl.exe PID 2248 wrote to memory of 796 2248 1b1898c9325068726246f127417a8790e8d56bd230949a4eb028831e33f3f1af.exe rdlrrl.exe PID 2248 wrote to memory of 796 2248 1b1898c9325068726246f127417a8790e8d56bd230949a4eb028831e33f3f1af.exe rdlrrl.exe PID 2248 wrote to memory of 796 2248 1b1898c9325068726246f127417a8790e8d56bd230949a4eb028831e33f3f1af.exe rdlrrl.exe PID 796 wrote to memory of 2620 796 rdlrrl.exe pvdjb.exe PID 796 wrote to memory of 2620 796 rdlrrl.exe pvdjb.exe PID 796 wrote to memory of 2620 796 rdlrrl.exe pvdjb.exe PID 796 wrote to memory of 2620 796 rdlrrl.exe pvdjb.exe PID 2620 wrote to memory of 2644 2620 pvdjb.exe hdpjbp.exe PID 2620 wrote to memory of 2644 2620 pvdjb.exe hdpjbp.exe PID 2620 wrote to memory of 2644 2620 pvdjb.exe hdpjbp.exe PID 2620 wrote to memory of 2644 2620 pvdjb.exe hdpjbp.exe PID 2644 wrote to memory of 1760 2644 hdpjbp.exe dbdljrn.exe PID 2644 wrote to memory of 1760 2644 hdpjbp.exe dbdljrn.exe PID 2644 wrote to memory of 1760 2644 hdpjbp.exe dbdljrn.exe PID 2644 wrote to memory of 1760 2644 hdpjbp.exe dbdljrn.exe PID 1760 wrote to memory of 2668 1760 dbdljrn.exe xdppd.exe PID 1760 wrote to memory of 2668 1760 dbdljrn.exe xdppd.exe PID 1760 wrote to memory of 2668 1760 dbdljrn.exe xdppd.exe PID 1760 wrote to memory of 2668 1760 dbdljrn.exe xdppd.exe PID 2668 wrote to memory of 2664 2668 xdppd.exe rbvrx.exe PID 2668 wrote to memory of 2664 2668 xdppd.exe rbvrx.exe PID 2668 wrote to memory of 2664 2668 xdppd.exe rbvrx.exe PID 2668 wrote to memory of 2664 2668 xdppd.exe rbvrx.exe PID 2664 wrote to memory of 3036 2664 rbvrx.exe rnlxdxt.exe PID 2664 wrote to memory of 3036 2664 rbvrx.exe rnlxdxt.exe PID 2664 wrote to memory of 3036 2664 rbvrx.exe rnlxdxt.exe PID 2664 wrote to memory of 3036 2664 rbvrx.exe rnlxdxt.exe PID 3036 wrote to memory of 3040 3036 rnlxdxt.exe bvbxhdd.exe PID 3036 wrote to memory of 3040 3036 rnlxdxt.exe bvbxhdd.exe PID 3036 wrote to memory of 3040 3036 rnlxdxt.exe bvbxhdd.exe PID 3036 wrote to memory of 3040 3036 rnlxdxt.exe bvbxhdd.exe PID 3040 wrote to memory of 588 3040 bvbxhdd.exe pxrtv.exe PID 3040 wrote to memory of 588 3040 bvbxhdd.exe pxrtv.exe PID 3040 wrote to memory of 588 3040 bvbxhdd.exe pxrtv.exe PID 3040 wrote to memory of 588 3040 bvbxhdd.exe pxrtv.exe PID 588 wrote to memory of 1012 588 pxrtv.exe tdppdfh.exe PID 588 wrote to memory of 1012 588 pxrtv.exe tdppdfh.exe PID 588 wrote to memory of 1012 588 pxrtv.exe tdppdfh.exe PID 588 wrote to memory of 1012 588 pxrtv.exe tdppdfh.exe PID 1012 wrote to memory of 1204 1012 tdppdfh.exe hnfxltr.exe PID 1012 wrote to memory of 1204 1012 tdppdfh.exe hnfxltr.exe PID 1012 wrote to memory of 1204 1012 tdppdfh.exe hnfxltr.exe PID 1012 wrote to memory of 1204 1012 tdppdfh.exe hnfxltr.exe PID 1204 wrote to memory of 2848 1204 hnfxltr.exe fhbfv.exe PID 1204 wrote to memory of 2848 1204 hnfxltr.exe fhbfv.exe PID 1204 wrote to memory of 2848 1204 hnfxltr.exe fhbfv.exe PID 1204 wrote to memory of 2848 1204 hnfxltr.exe fhbfv.exe PID 2848 wrote to memory of 2932 2848 fhbfv.exe jdlrnb.exe PID 2848 wrote to memory of 2932 2848 fhbfv.exe jdlrnb.exe PID 2848 wrote to memory of 2932 2848 fhbfv.exe jdlrnb.exe PID 2848 wrote to memory of 2932 2848 fhbfv.exe jdlrnb.exe PID 2932 wrote to memory of 2396 2932 jdlrnb.exe nxfdxrv.exe PID 2932 wrote to memory of 2396 2932 jdlrnb.exe nxfdxrv.exe PID 2932 wrote to memory of 2396 2932 jdlrnb.exe nxfdxrv.exe PID 2932 wrote to memory of 2396 2932 jdlrnb.exe nxfdxrv.exe PID 2396 wrote to memory of 1660 2396 nxfdxrv.exe vrvjhjn.exe PID 2396 wrote to memory of 1660 2396 nxfdxrv.exe vrvjhjn.exe PID 2396 wrote to memory of 1660 2396 nxfdxrv.exe vrvjhjn.exe PID 2396 wrote to memory of 1660 2396 nxfdxrv.exe vrvjhjn.exe PID 1660 wrote to memory of 1916 1660 vrvjhjn.exe jlftdn.exe PID 1660 wrote to memory of 1916 1660 vrvjhjn.exe jlftdn.exe PID 1660 wrote to memory of 1916 1660 vrvjhjn.exe jlftdn.exe PID 1660 wrote to memory of 1916 1660 vrvjhjn.exe jlftdn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b1898c9325068726246f127417a8790e8d56bd230949a4eb028831e33f3f1af.exe"C:\Users\Admin\AppData\Local\Temp\1b1898c9325068726246f127417a8790e8d56bd230949a4eb028831e33f3f1af.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\rdlrrl.exec:\rdlrrl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvdjb.exec:\pvdjb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hdpjbp.exec:\hdpjbp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dbdljrn.exec:\dbdljrn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xdppd.exec:\xdppd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rbvrx.exec:\rbvrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rnlxdxt.exec:\rnlxdxt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bvbxhdd.exec:\bvbxhdd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pxrtv.exec:\pxrtv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tdppdfh.exec:\tdppdfh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hnfxltr.exec:\hnfxltr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fhbfv.exec:\fhbfv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdlrnb.exec:\jdlrnb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nxfdxrv.exec:\nxfdxrv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vrvjhjn.exec:\vrvjhjn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jlftdn.exec:\jlftdn.exe17⤵
- Executes dropped EXE
-
\??\c:\rttxd.exec:\rttxd.exe18⤵
- Executes dropped EXE
-
\??\c:\rtvfrj.exec:\rtvfrj.exe19⤵
- Executes dropped EXE
-
\??\c:\trrthd.exec:\trrthd.exe20⤵
- Executes dropped EXE
-
\??\c:\pvfvll.exec:\pvfvll.exe21⤵
- Executes dropped EXE
-
\??\c:\rppdfvr.exec:\rppdfvr.exe22⤵
- Executes dropped EXE
-
\??\c:\bpvlbnj.exec:\bpvlbnj.exe23⤵
- Executes dropped EXE
-
\??\c:\txxdjvn.exec:\txxdjvn.exe24⤵
- Executes dropped EXE
-
\??\c:\hrbfb.exec:\hrbfb.exe25⤵
- Executes dropped EXE
-
\??\c:\lpxpff.exec:\lpxpff.exe26⤵
- Executes dropped EXE
-
\??\c:\tltvvxt.exec:\tltvvxt.exe27⤵
- Executes dropped EXE
-
\??\c:\hrnrhdx.exec:\hrnrhdx.exe28⤵
- Executes dropped EXE
-
\??\c:\bfxnpnl.exec:\bfxnpnl.exe29⤵
- Executes dropped EXE
-
\??\c:\jpbtb.exec:\jpbtb.exe30⤵
- Executes dropped EXE
-
\??\c:\plhlx.exec:\plhlx.exe31⤵
- Executes dropped EXE
-
\??\c:\fjplj.exec:\fjplj.exe32⤵
- Executes dropped EXE
-
\??\c:\jptpnf.exec:\jptpnf.exe33⤵
- Executes dropped EXE
-
\??\c:\xpntbjf.exec:\xpntbjf.exe34⤵
- Executes dropped EXE
-
\??\c:\pbxfxhp.exec:\pbxfxhp.exe35⤵
- Executes dropped EXE
-
\??\c:\rvtdj.exec:\rvtdj.exe36⤵
- Executes dropped EXE
-
\??\c:\djjxb.exec:\djjxb.exe37⤵
- Executes dropped EXE
-
\??\c:\nrtrdx.exec:\nrtrdx.exe38⤵
- Executes dropped EXE
-
\??\c:\pljfdhv.exec:\pljfdhv.exe39⤵
- Executes dropped EXE
-
\??\c:\hhdvl.exec:\hhdvl.exe40⤵
- Executes dropped EXE
-
\??\c:\rtfjxrt.exec:\rtfjxrt.exe41⤵
- Executes dropped EXE
-
\??\c:\frbfjx.exec:\frbfjx.exe42⤵
- Executes dropped EXE
-
\??\c:\lfjjpp.exec:\lfjjpp.exe43⤵
- Executes dropped EXE
-
\??\c:\ntppndx.exec:\ntppndx.exe44⤵
- Executes dropped EXE
-
\??\c:\llfbdn.exec:\llfbdn.exe45⤵
- Executes dropped EXE
-
\??\c:\rhfpd.exec:\rhfpd.exe46⤵
- Executes dropped EXE
-
\??\c:\jlbbhv.exec:\jlbbhv.exe47⤵
- Executes dropped EXE
-
\??\c:\jrrrx.exec:\jrrrx.exe48⤵
- Executes dropped EXE
-
\??\c:\djprj.exec:\djprj.exe49⤵
- Executes dropped EXE
-
\??\c:\tpxplv.exec:\tpxplv.exe50⤵
- Executes dropped EXE
-
\??\c:\njrbtrp.exec:\njrbtrp.exe51⤵
- Executes dropped EXE
-
\??\c:\phvlrbf.exec:\phvlrbf.exe52⤵
- Executes dropped EXE
-
\??\c:\tpddh.exec:\tpddh.exe53⤵
- Executes dropped EXE
-
\??\c:\lfvtpj.exec:\lfvtpj.exe54⤵
- Executes dropped EXE
-
\??\c:\xtltt.exec:\xtltt.exe55⤵
- Executes dropped EXE
-
\??\c:\bjlrh.exec:\bjlrh.exe56⤵
- Executes dropped EXE
-
\??\c:\ptbll.exec:\ptbll.exe57⤵
- Executes dropped EXE
-
\??\c:\bnvdrnb.exec:\bnvdrnb.exe58⤵
- Executes dropped EXE
-
\??\c:\nxrrr.exec:\nxrrr.exe59⤵
- Executes dropped EXE
-
\??\c:\xfftdjt.exec:\xfftdjt.exe60⤵
- Executes dropped EXE
-
\??\c:\nlnxfdd.exec:\nlnxfdd.exe61⤵
- Executes dropped EXE
-
\??\c:\ttltv.exec:\ttltv.exe62⤵
- Executes dropped EXE
-
\??\c:\npfljrp.exec:\npfljrp.exe63⤵
- Executes dropped EXE
-
\??\c:\bdnjr.exec:\bdnjr.exe64⤵
- Executes dropped EXE
-
\??\c:\jdnppl.exec:\jdnppl.exe65⤵
- Executes dropped EXE
-
\??\c:\nhnljj.exec:\nhnljj.exe66⤵
-
\??\c:\pjfjxb.exec:\pjfjxb.exe67⤵
-
\??\c:\trxxdj.exec:\trxxdj.exe68⤵
-
\??\c:\njbhnbv.exec:\njbhnbv.exe69⤵
-
\??\c:\vhphx.exec:\vhphx.exe70⤵
-
\??\c:\dthtlrh.exec:\dthtlrh.exe71⤵
-
\??\c:\nnttdp.exec:\nnttdp.exe72⤵
-
\??\c:\tlxvjfj.exec:\tlxvjfj.exe73⤵
-
\??\c:\xnrbn.exec:\xnrbn.exe74⤵
-
\??\c:\tvrbxdj.exec:\tvrbxdj.exe75⤵
-
\??\c:\fnvtv.exec:\fnvtv.exe76⤵
-
\??\c:\bdptb.exec:\bdptb.exe77⤵
-
\??\c:\phxxnf.exec:\phxxnf.exe78⤵
-
\??\c:\xjrnpp.exec:\xjrnpp.exe79⤵
-
\??\c:\tpjll.exec:\tpjll.exe80⤵
-
\??\c:\rpfrnt.exec:\rpfrnt.exe81⤵
-
\??\c:\jrxhdb.exec:\jrxhdb.exe82⤵
-
\??\c:\xpbnxfx.exec:\xpbnxfx.exe83⤵
-
\??\c:\ppdlfbb.exec:\ppdlfbb.exe84⤵
-
\??\c:\dffptjh.exec:\dffptjh.exe85⤵
-
\??\c:\rvfldrd.exec:\rvfldrd.exe86⤵
-
\??\c:\bnnllxv.exec:\bnnllxv.exe87⤵
-
\??\c:\tnhnfbj.exec:\tnhnfbj.exe88⤵
-
\??\c:\dxfppl.exec:\dxfppl.exe89⤵
-
\??\c:\dvjnj.exec:\dvjnj.exe90⤵
-
\??\c:\nrlrr.exec:\nrlrr.exe91⤵
-
\??\c:\vhpfxv.exec:\vhpfxv.exe92⤵
-
\??\c:\hfttlp.exec:\hfttlp.exe93⤵
-
\??\c:\tldhdhf.exec:\tldhdhf.exe94⤵
-
\??\c:\pfrrr.exec:\pfrrr.exe95⤵
-
\??\c:\rxprhpf.exec:\rxprhpf.exe96⤵
-
\??\c:\xllbvb.exec:\xllbvb.exe97⤵
-
\??\c:\jnpllrb.exec:\jnpllrb.exe98⤵
-
\??\c:\lblrhl.exec:\lblrhl.exe99⤵
-
\??\c:\tnnbf.exec:\tnnbf.exe100⤵
-
\??\c:\btlfr.exec:\btlfr.exe101⤵
-
\??\c:\rljlhbj.exec:\rljlhbj.exe102⤵
-
\??\c:\rppnnnt.exec:\rppnnnt.exe103⤵
-
\??\c:\fpxfx.exec:\fpxfx.exe104⤵
-
\??\c:\rrrtp.exec:\rrrtp.exe105⤵
-
\??\c:\jnvjtbn.exec:\jnvjtbn.exe106⤵
-
\??\c:\ljdttrx.exec:\ljdttrx.exe107⤵
-
\??\c:\flplrtd.exec:\flplrtd.exe108⤵
-
\??\c:\pnxljdt.exec:\pnxljdt.exe109⤵
-
\??\c:\ppxdx.exec:\ppxdx.exe110⤵
-
\??\c:\hrxldd.exec:\hrxldd.exe111⤵
-
\??\c:\ndthvjx.exec:\ndthvjx.exe112⤵
-
\??\c:\xrhht.exec:\xrhht.exe113⤵
-
\??\c:\ddbbpd.exec:\ddbbpd.exe114⤵
-
\??\c:\rtprj.exec:\rtprj.exe115⤵
-
\??\c:\vxprrfn.exec:\vxprrfn.exe116⤵
-
\??\c:\vvhjjl.exec:\vvhjjl.exe117⤵
-
\??\c:\hvjtdxt.exec:\hvjtdxt.exe118⤵
-
\??\c:\pldbttr.exec:\pldbttr.exe119⤵
-
\??\c:\vvnxlbh.exec:\vvnxlbh.exe120⤵
-
\??\c:\vjnhtj.exec:\vjnhtj.exe121⤵
-
\??\c:\jlnntp.exec:\jlnntp.exe122⤵
-
\??\c:\htxfxjd.exec:\htxfxjd.exe123⤵
-
\??\c:\pbnbvxt.exec:\pbnbvxt.exe124⤵
-
\??\c:\blvlbnd.exec:\blvlbnd.exe125⤵
-
\??\c:\vhvdfn.exec:\vhvdfn.exe126⤵
-
\??\c:\vhxrrvt.exec:\vhxrrvt.exe127⤵
-
\??\c:\fhvhr.exec:\fhvhr.exe128⤵
-
\??\c:\lrrxff.exec:\lrrxff.exe129⤵
-
\??\c:\pnflhdd.exec:\pnflhdd.exe130⤵
-
\??\c:\hbftt.exec:\hbftt.exe131⤵
-
\??\c:\vdbnnbl.exec:\vdbnnbl.exe132⤵
-
\??\c:\plxldp.exec:\plxldp.exe133⤵
-
\??\c:\nvphh.exec:\nvphh.exe134⤵
-
\??\c:\xbjnpx.exec:\xbjnpx.exe135⤵
-
\??\c:\hldtbpp.exec:\hldtbpp.exe136⤵
-
\??\c:\bjbpfx.exec:\bjbpfx.exe137⤵
-
\??\c:\tlrff.exec:\tlrff.exe138⤵
-
\??\c:\tpptfff.exec:\tpptfff.exe139⤵
-
\??\c:\vpdhxb.exec:\vpdhxb.exe140⤵
-
\??\c:\xnvhptf.exec:\xnvhptf.exe141⤵
-
\??\c:\vdvphf.exec:\vdvphf.exe142⤵
-
\??\c:\rbjtlf.exec:\rbjtlf.exe143⤵
-
\??\c:\bhvdhv.exec:\bhvdhv.exe144⤵
-
\??\c:\jpxblxv.exec:\jpxblxv.exe145⤵
-
\??\c:\jxpfhn.exec:\jxpfhn.exe146⤵
-
\??\c:\rhtdxj.exec:\rhtdxj.exe147⤵
-
\??\c:\tbjnfxh.exec:\tbjnfxh.exe148⤵
-
\??\c:\ltvbttx.exec:\ltvbttx.exe149⤵
-
\??\c:\fplxth.exec:\fplxth.exe150⤵
-
\??\c:\prdfv.exec:\prdfv.exe151⤵
-
\??\c:\xnprh.exec:\xnprh.exe152⤵
-
\??\c:\tfvpj.exec:\tfvpj.exe153⤵
-
\??\c:\tvhpxl.exec:\tvhpxl.exe154⤵
-
\??\c:\flhll.exec:\flhll.exe155⤵
-
\??\c:\flbfnh.exec:\flbfnh.exe156⤵
-
\??\c:\bhffx.exec:\bhffx.exe157⤵
-
\??\c:\hdbrfj.exec:\hdbrfj.exe158⤵
-
\??\c:\xtlnrx.exec:\xtlnrx.exe159⤵
-
\??\c:\nvrldlb.exec:\nvrldlb.exe160⤵
-
\??\c:\fftvt.exec:\fftvt.exe161⤵
-
\??\c:\jfbpdhj.exec:\jfbpdhj.exe162⤵
-
\??\c:\pblhvhp.exec:\pblhvhp.exe163⤵
-
\??\c:\xjpvf.exec:\xjpvf.exe164⤵
-
\??\c:\bxlbr.exec:\bxlbr.exe165⤵
-
\??\c:\vddhpf.exec:\vddhpf.exe166⤵
-
\??\c:\xxfbllx.exec:\xxfbllx.exe167⤵
-
\??\c:\vbjlhb.exec:\vbjlhb.exe168⤵
-
\??\c:\bbnjhhb.exec:\bbnjhhb.exe169⤵
-
\??\c:\vdrnbp.exec:\vdrnbp.exe170⤵
-
\??\c:\rvllrb.exec:\rvllrb.exe171⤵
-
\??\c:\rhpff.exec:\rhpff.exe172⤵
-
\??\c:\nvdjh.exec:\nvdjh.exe173⤵
-
\??\c:\plnfn.exec:\plnfn.exe174⤵
-
\??\c:\tptdt.exec:\tptdt.exe175⤵
-
\??\c:\vrpvlt.exec:\vrpvlt.exe176⤵
-
\??\c:\bbvhllp.exec:\bbvhllp.exe177⤵
-
\??\c:\jxbjh.exec:\jxbjh.exe178⤵
-
\??\c:\jfprdjr.exec:\jfprdjr.exe179⤵
-
\??\c:\hhtjr.exec:\hhtjr.exe180⤵
-
\??\c:\jhlddrh.exec:\jhlddrh.exe181⤵
-
\??\c:\ptxbr.exec:\ptxbr.exe182⤵
-
\??\c:\tvhlxb.exec:\tvhlxb.exe183⤵
-
\??\c:\vdpvtl.exec:\vdpvtl.exe184⤵
-
\??\c:\xdlbvr.exec:\xdlbvr.exe185⤵
-
\??\c:\lxvhxpx.exec:\lxvhxpx.exe186⤵
-
\??\c:\xdtbdn.exec:\xdtbdn.exe187⤵
-
\??\c:\bdxpdx.exec:\bdxpdx.exe188⤵
-
\??\c:\dplbb.exec:\dplbb.exe189⤵
-
\??\c:\nlfblh.exec:\nlfblh.exe190⤵
-
\??\c:\xvbpt.exec:\xvbpt.exe191⤵
-
\??\c:\ljhnhxn.exec:\ljhnhxn.exe192⤵
-
\??\c:\flfplb.exec:\flfplb.exe193⤵
-
\??\c:\jvjhx.exec:\jvjhx.exe194⤵
-
\??\c:\trfdd.exec:\trfdd.exe195⤵
-
\??\c:\tlhxpb.exec:\tlhxpb.exe196⤵
-
\??\c:\jvvfb.exec:\jvvfb.exe197⤵
-
\??\c:\ttdbn.exec:\ttdbn.exe198⤵
-
\??\c:\dfprnd.exec:\dfprnd.exe199⤵
-
\??\c:\bdjxtpv.exec:\bdjxtpv.exe200⤵
-
\??\c:\vflftlx.exec:\vflftlx.exe201⤵
-
\??\c:\pnbxtl.exec:\pnbxtl.exe202⤵
-
\??\c:\dhxjtx.exec:\dhxjtx.exe203⤵
-
\??\c:\dxhxrl.exec:\dxhxrl.exe204⤵
-
\??\c:\xpdft.exec:\xpdft.exe205⤵
-
\??\c:\tdlhl.exec:\tdlhl.exe206⤵
-
\??\c:\xbnrh.exec:\xbnrh.exe207⤵
-
\??\c:\tpdpp.exec:\tpdpp.exe208⤵
-
\??\c:\bxhxx.exec:\bxhxx.exe209⤵
-
\??\c:\fdpnfnr.exec:\fdpnfnr.exe210⤵
-
\??\c:\nxvxxd.exec:\nxvxxd.exe211⤵
-
\??\c:\rlpblb.exec:\rlpblb.exe212⤵
-
\??\c:\jhvrvj.exec:\jhvrvj.exe213⤵
-
\??\c:\pbbpj.exec:\pbbpj.exe214⤵
-
\??\c:\dprbdb.exec:\dprbdb.exe215⤵
-
\??\c:\dvnxv.exec:\dvnxv.exe216⤵
-
\??\c:\jrbbdvv.exec:\jrbbdvv.exe217⤵
-
\??\c:\lhxtj.exec:\lhxtj.exe218⤵
-
\??\c:\tbrjvvh.exec:\tbrjvvh.exe219⤵
-
\??\c:\hbtfdp.exec:\hbtfdp.exe220⤵
-
\??\c:\bbbhjj.exec:\bbbhjj.exe221⤵
-
\??\c:\dhxnnp.exec:\dhxnnp.exe222⤵
-
\??\c:\jrxrrb.exec:\jrxrrb.exe223⤵
-
\??\c:\jtbpjl.exec:\jtbpjl.exe224⤵
-
\??\c:\dhpbrxn.exec:\dhpbrxn.exe225⤵
-
\??\c:\lhprb.exec:\lhprb.exe226⤵
-
\??\c:\nxvvt.exec:\nxvvt.exe227⤵
-
\??\c:\lfhnrvb.exec:\lfhnrvb.exe228⤵
-
\??\c:\drjrxxd.exec:\drjrxxd.exe229⤵
-
\??\c:\prpvt.exec:\prpvt.exe230⤵
-
\??\c:\lblhr.exec:\lblhr.exe231⤵
-
\??\c:\pbtjnvt.exec:\pbtjnvt.exe232⤵
-
\??\c:\rthjr.exec:\rthjr.exe233⤵
-
\??\c:\xdjdvxl.exec:\xdjdvxl.exe234⤵
-
\??\c:\tfffprt.exec:\tfffprt.exe235⤵
-
\??\c:\vtrxrht.exec:\vtrxrht.exe236⤵
-
\??\c:\nnnlrtl.exec:\nnnlrtl.exe237⤵
-
\??\c:\trntf.exec:\trntf.exe238⤵
-
\??\c:\bdpndd.exec:\bdpndd.exe239⤵
-
\??\c:\xjxxt.exec:\xjxxt.exe240⤵
-
\??\c:\blprpf.exec:\blprpf.exe241⤵