Analysis
-
max time kernel
11s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 17:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0a403cb92e794a12a759175b438d917a2a98c99337ed7a2482b050cc7ef37c69.exe
Resource
win7-20240221-en
6 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
0a403cb92e794a12a759175b438d917a2a98c99337ed7a2482b050cc7ef37c69.exe
-
Size
306KB
-
MD5
c975d31c62eca4b4f02a8b8b7b80af86
-
SHA1
969d03d2c5e4d248814487036ff8dcafb8776437
-
SHA256
0a403cb92e794a12a759175b438d917a2a98c99337ed7a2482b050cc7ef37c69
-
SHA512
c3836e7cbb307762f07419220d802f4dbf6903027f3653d08440f16f6ac9f1668ea1a36718213d1be430cf7402ad5439f2c65afa386d530f1ded03f1c2ffafbe
-
SSDEEP
6144:n3C9BRo/AIuuOthLmH403Pyr6UWO6jUl7sPgvwD:n3C9uDVOXLmHBKWyn+Pgvc
Malware Config
Signatures
-
Detect Blackmoon payload 32 IoCs
resource yara_rule behavioral1/memory/2924-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2944-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2040-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2544-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2428-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2848-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3024-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1144-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1748-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2820-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1524-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1972-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/536-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/472-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1084-230-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1132-239-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1324-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2036-270-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2112-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1920-289-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2880-325-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-348-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1784-372-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2428-402-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2992-411-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2996-420-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1400-466-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1996-502-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1908-602-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1512-766-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 61 IoCs
resource yara_rule behavioral1/memory/2924-2-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2924-3-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2944-14-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2872-24-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2040-34-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2552-52-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2544-63-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2428-82-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2848-110-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3024-121-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3024-118-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1144-131-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1748-142-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1748-139-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2820-151-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1524-160-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1524-162-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1972-173-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/536-200-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/472-219-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1084-230-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1132-239-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1324-259-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1324-257-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2036-270-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2112-280-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1920-289-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2880-325-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/312-332-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2872-347-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2872-348-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2436-363-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1784-372-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2592-379-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1916-394-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2428-402-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2992-410-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2992-411-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2996-420-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2468-427-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1444-442-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2828-457-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1400-466-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1996-501-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1996-502-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/536-517-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1852-532-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1084-547-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1032-562-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/568-577-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2112-593-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1908-602-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2032-609-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2948-624-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2640-667-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1916-704-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2856-712-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2940-727-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2772-742-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1628-757-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1512-766-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
pid Process 2944 jjpdj.exe 2872 tbtntb.exe 2040 jpddp.exe 2684 nbttbb.exe 2552 5ppdp.exe 2544 jvjpd.exe 1916 5xfflrf.exe 2428 jjjpd.exe 1912 xrlfrff.exe 1660 ddvpj.exe 2848 1htbhn.exe 3024 1jjvv.exe 1144 bhtttb.exe 1748 fxrrxxl.exe 2820 dvpjd.exe 1524 hthbnt.exe 1972 xffrxrr.exe 2740 ffxrrrx.exe 2912 vvpjd.exe 536 flrfxxx.exe 596 vjjjd.exe 472 nhnthn.exe 1084 pjdjd.exe 1132 tbthnh.exe 1536 fxxflfl.exe 1324 jdpvd.exe 2036 nbbbnn.exe 2112 fxrxffr.exe 1920 vpdvd.exe 1676 xrfxflr.exe 880 tnbhnt.exe 1812 rxlxrlf.exe 2880 3htnnn.exe 312 xxfrxlr.exe 1752 htbthh.exe 2872 3llfrlx.exe 2040 hbntbt.exe 2436 9rrxflx.exe 1784 hhnhbn.exe 2592 lrfxfrl.exe 2728 5nbhnt.exe 1916 xlrrflr.exe 2428 bbnbhn.exe 2992 vpjvj.exe 2996 ttntbn.exe 2468 lffxxxx.exe 2768 pjppv.exe 1444 lfrrxfr.exe 1952 7vddd.exe 2828 3lffllx.exe 1400 jdpdj.exe 1732 lflrxlx.exe 1524 nhntnh.exe 2524 pdpjp.exe 2904 rlrlfxf.exe 1996 nthbhn.exe 2912 xrfllrf.exe 536 hhthbh.exe 288 rlflxxl.exe 1852 7nbhnb.exe 1040 vjdpv.exe 1084 bththh.exe 1768 xrfrffl.exe 1032 tnbhnn.exe -
resource yara_rule behavioral1/memory/2924-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2944-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2040-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3024-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3024-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1144-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1748-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1748-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1524-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1524-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1972-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/536-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/472-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1084-230-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1132-239-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1324-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1324-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2036-270-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2112-280-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1920-289-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2880-325-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/312-332-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-347-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-348-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2436-363-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1784-372-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2592-379-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1916-394-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-402-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-410-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2992-411-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2996-420-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2468-427-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1444-442-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-457-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1400-466-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1996-501-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1996-502-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/536-517-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1852-532-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1084-547-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1032-562-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/568-577-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2112-593-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1908-602-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2032-609-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-624-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-667-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1916-704-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2856-712-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-727-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-742-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1628-757-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1512-766-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2944 2924 0a403cb92e794a12a759175b438d917a2a98c99337ed7a2482b050cc7ef37c69.exe 28 PID 2924 wrote to memory of 2944 2924 0a403cb92e794a12a759175b438d917a2a98c99337ed7a2482b050cc7ef37c69.exe 28 PID 2924 wrote to memory of 2944 2924 0a403cb92e794a12a759175b438d917a2a98c99337ed7a2482b050cc7ef37c69.exe 28 PID 2924 wrote to memory of 2944 2924 0a403cb92e794a12a759175b438d917a2a98c99337ed7a2482b050cc7ef37c69.exe 28 PID 2944 wrote to memory of 2872 2944 jjpdj.exe 29 PID 2944 wrote to memory of 2872 2944 jjpdj.exe 29 PID 2944 wrote to memory of 2872 2944 jjpdj.exe 29 PID 2944 wrote to memory of 2872 2944 jjpdj.exe 29 PID 2872 wrote to memory of 2040 2872 tbtntb.exe 30 PID 2872 wrote to memory of 2040 2872 tbtntb.exe 30 PID 2872 wrote to memory of 2040 2872 tbtntb.exe 30 PID 2872 wrote to memory of 2040 2872 tbtntb.exe 30 PID 2040 wrote to memory of 2684 2040 jpddp.exe 31 PID 2040 wrote to memory of 2684 2040 jpddp.exe 31 PID 2040 wrote to memory of 2684 2040 jpddp.exe 31 PID 2040 wrote to memory of 2684 2040 jpddp.exe 31 PID 2684 wrote to memory of 2552 2684 nbttbb.exe 32 PID 2684 wrote to memory of 2552 2684 nbttbb.exe 32 PID 2684 wrote to memory of 2552 2684 nbttbb.exe 32 PID 2684 wrote to memory of 2552 2684 nbttbb.exe 32 PID 2552 wrote to memory of 2544 2552 5ppdp.exe 33 PID 2552 wrote to memory of 2544 2552 5ppdp.exe 33 PID 2552 wrote to memory of 2544 2552 5ppdp.exe 33 PID 2552 wrote to memory of 2544 2552 5ppdp.exe 33 PID 2544 wrote to memory of 1916 2544 jvjpd.exe 34 PID 2544 wrote to memory of 1916 2544 jvjpd.exe 34 PID 2544 wrote to memory of 1916 2544 jvjpd.exe 34 PID 2544 wrote to memory of 1916 2544 jvjpd.exe 34 PID 1916 wrote to memory of 2428 1916 5xfflrf.exe 35 PID 1916 wrote to memory of 2428 1916 5xfflrf.exe 35 PID 1916 wrote to memory of 2428 1916 5xfflrf.exe 35 PID 1916 wrote to memory of 2428 1916 5xfflrf.exe 35 PID 2428 wrote to memory of 1912 2428 jjjpd.exe 36 PID 2428 wrote to memory of 1912 2428 jjjpd.exe 36 PID 2428 wrote to memory of 1912 2428 jjjpd.exe 36 PID 2428 wrote to memory of 1912 2428 jjjpd.exe 36 PID 1912 wrote to memory of 1660 1912 xrlfrff.exe 37 PID 1912 wrote to memory of 1660 1912 xrlfrff.exe 37 PID 1912 wrote to memory of 1660 1912 xrlfrff.exe 37 PID 1912 wrote to memory of 1660 1912 xrlfrff.exe 37 PID 1660 wrote to memory of 2848 1660 ddvpj.exe 38 PID 1660 wrote to memory of 2848 1660 ddvpj.exe 38 PID 1660 wrote to memory of 2848 1660 ddvpj.exe 38 PID 1660 wrote to memory of 2848 1660 ddvpj.exe 38 PID 2848 wrote to memory of 3024 2848 1htbhn.exe 39 PID 2848 wrote to memory of 3024 2848 1htbhn.exe 39 PID 2848 wrote to memory of 3024 2848 1htbhn.exe 39 PID 2848 wrote to memory of 3024 2848 1htbhn.exe 39 PID 3024 wrote to memory of 1144 3024 1jjvv.exe 40 PID 3024 wrote to memory of 1144 3024 1jjvv.exe 40 PID 3024 wrote to memory of 1144 3024 1jjvv.exe 40 PID 3024 wrote to memory of 1144 3024 1jjvv.exe 40 PID 1144 wrote to memory of 1748 1144 bhtttb.exe 41 PID 1144 wrote to memory of 1748 1144 bhtttb.exe 41 PID 1144 wrote to memory of 1748 1144 bhtttb.exe 41 PID 1144 wrote to memory of 1748 1144 bhtttb.exe 41 PID 1748 wrote to memory of 2820 1748 fxrrxxl.exe 42 PID 1748 wrote to memory of 2820 1748 fxrrxxl.exe 42 PID 1748 wrote to memory of 2820 1748 fxrrxxl.exe 42 PID 1748 wrote to memory of 2820 1748 fxrrxxl.exe 42 PID 2820 wrote to memory of 1524 2820 dvpjd.exe 43 PID 2820 wrote to memory of 1524 2820 dvpjd.exe 43 PID 2820 wrote to memory of 1524 2820 dvpjd.exe 43 PID 2820 wrote to memory of 1524 2820 dvpjd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a403cb92e794a12a759175b438d917a2a98c99337ed7a2482b050cc7ef37c69.exe"C:\Users\Admin\AppData\Local\Temp\0a403cb92e794a12a759175b438d917a2a98c99337ed7a2482b050cc7ef37c69.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\jjpdj.exec:\jjpdj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\tbtntb.exec:\tbtntb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\jpddp.exec:\jpddp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\nbttbb.exec:\nbttbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\5ppdp.exec:\5ppdp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\jvjpd.exec:\jvjpd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\5xfflrf.exec:\5xfflrf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1916 -
\??\c:\jjjpd.exec:\jjjpd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\xrlfrff.exec:\xrlfrff.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1912 -
\??\c:\ddvpj.exec:\ddvpj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
\??\c:\1htbhn.exec:\1htbhn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\1jjvv.exec:\1jjvv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\bhtttb.exec:\bhtttb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
\??\c:\fxrrxxl.exec:\fxrrxxl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1748 -
\??\c:\dvpjd.exec:\dvpjd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\hthbnt.exec:\hthbnt.exe17⤵
- Executes dropped EXE
PID:1524 -
\??\c:\xffrxrr.exec:\xffrxrr.exe18⤵
- Executes dropped EXE
PID:1972 -
\??\c:\ffxrrrx.exec:\ffxrrrx.exe19⤵
- Executes dropped EXE
PID:2740 -
\??\c:\vvpjd.exec:\vvpjd.exe20⤵
- Executes dropped EXE
PID:2912 -
\??\c:\flrfxxx.exec:\flrfxxx.exe21⤵
- Executes dropped EXE
PID:536 -
\??\c:\vjjjd.exec:\vjjjd.exe22⤵
- Executes dropped EXE
PID:596 -
\??\c:\nhnthn.exec:\nhnthn.exe23⤵
- Executes dropped EXE
PID:472 -
\??\c:\pjdjd.exec:\pjdjd.exe24⤵
- Executes dropped EXE
PID:1084 -
\??\c:\tbthnh.exec:\tbthnh.exe25⤵
- Executes dropped EXE
PID:1132 -
\??\c:\fxxflfl.exec:\fxxflfl.exe26⤵
- Executes dropped EXE
PID:1536 -
\??\c:\jdpvd.exec:\jdpvd.exe27⤵
- Executes dropped EXE
PID:1324 -
\??\c:\nbbbnn.exec:\nbbbnn.exe28⤵
- Executes dropped EXE
PID:2036 -
\??\c:\fxrxffr.exec:\fxrxffr.exe29⤵
- Executes dropped EXE
PID:2112 -
\??\c:\vpdvd.exec:\vpdvd.exe30⤵
- Executes dropped EXE
PID:1920 -
\??\c:\xrfxflr.exec:\xrfxflr.exe31⤵
- Executes dropped EXE
PID:1676 -
\??\c:\tnbhnt.exec:\tnbhnt.exe32⤵
- Executes dropped EXE
PID:880 -
\??\c:\rxlxrlf.exec:\rxlxrlf.exe33⤵
- Executes dropped EXE
PID:1812 -
\??\c:\3htnnn.exec:\3htnnn.exe34⤵
- Executes dropped EXE
PID:2880 -
\??\c:\xxfrxlr.exec:\xxfrxlr.exe35⤵
- Executes dropped EXE
PID:312 -
\??\c:\htbthh.exec:\htbthh.exe36⤵
- Executes dropped EXE
PID:1752 -
\??\c:\3llfrlx.exec:\3llfrlx.exe37⤵
- Executes dropped EXE
PID:2872 -
\??\c:\hbntbt.exec:\hbntbt.exe38⤵
- Executes dropped EXE
PID:2040 -
\??\c:\9rrxflx.exec:\9rrxflx.exe39⤵
- Executes dropped EXE
PID:2436 -
\??\c:\hhnhbn.exec:\hhnhbn.exe40⤵
- Executes dropped EXE
PID:1784 -
\??\c:\lrfxfrl.exec:\lrfxfrl.exe41⤵
- Executes dropped EXE
PID:2592 -
\??\c:\5nbhnt.exec:\5nbhnt.exe42⤵
- Executes dropped EXE
PID:2728 -
\??\c:\xlrrflr.exec:\xlrrflr.exe43⤵
- Executes dropped EXE
PID:1916 -
\??\c:\bbnbhn.exec:\bbnbhn.exe44⤵
- Executes dropped EXE
PID:2428 -
\??\c:\vpjvj.exec:\vpjvj.exe45⤵
- Executes dropped EXE
PID:2992 -
\??\c:\ttntbn.exec:\ttntbn.exe46⤵
- Executes dropped EXE
PID:2996 -
\??\c:\lffxxxx.exec:\lffxxxx.exe47⤵
- Executes dropped EXE
PID:2468 -
\??\c:\pjppv.exec:\pjppv.exe48⤵
- Executes dropped EXE
PID:2768 -
\??\c:\lfrrxfr.exec:\lfrrxfr.exe49⤵
- Executes dropped EXE
PID:1444 -
\??\c:\7vddd.exec:\7vddd.exe50⤵
- Executes dropped EXE
PID:1952 -
\??\c:\3lffllx.exec:\3lffllx.exe51⤵
- Executes dropped EXE
PID:2828 -
\??\c:\jdpdj.exec:\jdpdj.exe52⤵
- Executes dropped EXE
PID:1400 -
\??\c:\lflrxlx.exec:\lflrxlx.exe53⤵
- Executes dropped EXE
PID:1732 -
\??\c:\nhntnh.exec:\nhntnh.exe54⤵
- Executes dropped EXE
PID:1524 -
\??\c:\pdpjp.exec:\pdpjp.exe55⤵
- Executes dropped EXE
PID:2524 -
\??\c:\rlrlfxf.exec:\rlrlfxf.exe56⤵
- Executes dropped EXE
PID:2904 -
\??\c:\nthbhn.exec:\nthbhn.exe57⤵
- Executes dropped EXE
PID:1996 -
\??\c:\xrfllrf.exec:\xrfllrf.exe58⤵
- Executes dropped EXE
PID:2912 -
\??\c:\hhthbh.exec:\hhthbh.exe59⤵
- Executes dropped EXE
PID:536 -
\??\c:\rlflxxl.exec:\rlflxxl.exe60⤵
- Executes dropped EXE
PID:288 -
\??\c:\7nbhnb.exec:\7nbhnb.exe61⤵
- Executes dropped EXE
PID:1852 -
\??\c:\vjdpv.exec:\vjdpv.exe62⤵
- Executes dropped EXE
PID:1040 -
\??\c:\bththh.exec:\bththh.exe63⤵
- Executes dropped EXE
PID:1084 -
\??\c:\xrfrffl.exec:\xrfrffl.exe64⤵
- Executes dropped EXE
PID:1768 -
\??\c:\tnbhnn.exec:\tnbhnn.exe65⤵
- Executes dropped EXE
PID:1032 -
\??\c:\jjvpv.exec:\jjvpv.exe66⤵PID:1648
-
\??\c:\lfllrxl.exec:\lfllrxl.exe67⤵PID:568
-
\??\c:\vvddv.exec:\vvddv.exe68⤵PID:2036
-
\??\c:\frrfflf.exec:\frrfflf.exe69⤵PID:2112
-
\??\c:\nntbth.exec:\nntbth.exe70⤵PID:1908
-
\??\c:\7xrxlrx.exec:\7xrxlrx.exe71⤵PID:2032
-
\??\c:\jdjvj.exec:\jdjvj.exe72⤵PID:1572
-
\??\c:\nhbbhh.exec:\nhbbhh.exe73⤵PID:2948
-
\??\c:\pvjdd.exec:\pvjdd.exe74⤵PID:2876
-
\??\c:\bbtbnb.exec:\bbtbnb.exe75⤵PID:2168
-
\??\c:\vjvjp.exec:\vjvjp.exe76⤵PID:2572
-
\??\c:\hbtbnn.exec:\hbtbnn.exe77⤵PID:2688
-
\??\c:\vpvvd.exec:\vpvvd.exe78⤵PID:2576
-
\??\c:\frrrlrl.exec:\frrrlrl.exe79⤵PID:2640
-
\??\c:\pjvjp.exec:\pjvjp.exe80⤵PID:2712
-
\??\c:\nhtbhn.exec:\nhtbhn.exe81⤵PID:2148
-
\??\c:\dvdjp.exec:\dvdjp.exe82⤵PID:2440
-
\??\c:\9btntb.exec:\9btntb.exe83⤵PID:2500
-
\??\c:\vvpjd.exec:\vvpjd.exe84⤵PID:1916
-
\??\c:\vjjpv.exec:\vjjpv.exe85⤵PID:2856
-
\??\c:\3btttn.exec:\3btttn.exe86⤵PID:2992
-
\??\c:\5flrxfl.exec:\5flrxfl.exe87⤵PID:2940
-
\??\c:\5bhhtt.exec:\5bhhtt.exe88⤵PID:2468
-
\??\c:\fxfxllf.exec:\fxfxllf.exe89⤵PID:2772
-
\??\c:\3tntbh.exec:\3tntbh.exe90⤵PID:2164
-
\??\c:\fxffrrf.exec:\fxffrrf.exe91⤵PID:1628
-
\??\c:\1ntbbb.exec:\1ntbbb.exe92⤵PID:1512
-
\??\c:\pjpdp.exec:\pjpdp.exe93⤵PID:832
-
\??\c:\hhtbht.exec:\hhtbht.exe94⤵PID:1868
-
\??\c:\tnhhnn.exec:\tnhhnn.exe95⤵PID:2356
-
\??\c:\djpjv.exec:\djpjv.exe96⤵PID:1684
-
\??\c:\tnhhnn.exec:\tnhhnn.exe97⤵PID:324
-
\??\c:\5jddj.exec:\5jddj.exe98⤵PID:576
-
\??\c:\3nbtbn.exec:\3nbtbn.exe99⤵PID:1856
-
\??\c:\vjjjv.exec:\vjjjv.exe100⤵PID:596
-
\??\c:\xrflrxl.exec:\xrflrxl.exe101⤵PID:612
-
\??\c:\hnhnbh.exec:\hnhnbh.exe102⤵PID:2276
-
\??\c:\3xxlxfr.exec:\3xxlxfr.exe103⤵PID:956
-
\??\c:\hbtbnt.exec:\hbtbnt.exe104⤵PID:1612
-
\??\c:\7lfrxrx.exec:\7lfrxrx.exe105⤵PID:1536
-
\??\c:\hbhthh.exec:\hbhthh.exe106⤵PID:1060
-
\??\c:\ppvjv.exec:\ppvjv.exe107⤵PID:1092
-
\??\c:\5httbb.exec:\5httbb.exe108⤵PID:568
-
\??\c:\ntbhnt.exec:\ntbhnt.exe109⤵PID:1500
-
\??\c:\rrrrffr.exec:\rrrrffr.exe110⤵PID:2212
-
\??\c:\bhhtbn.exec:\bhhtbn.exe111⤵PID:1908
-
\??\c:\1rrllrx.exec:\1rrllrx.exe112⤵PID:1640
-
\??\c:\bbbntb.exec:\bbbntb.exe113⤵PID:2032
-
\??\c:\rxllxfr.exec:\rxllxfr.exe114⤵PID:1812
-
\??\c:\ffxrrll.exec:\ffxrrll.exe115⤵PID:2948
-
\??\c:\jdvjp.exec:\jdvjp.exe116⤵PID:2124
-
\??\c:\xffflxf.exec:\xffflxf.exe117⤵PID:2620
-
\??\c:\pjvjv.exec:\pjvjv.exe118⤵PID:2580
-
\??\c:\xrfllrf.exec:\xrfllrf.exe119⤵PID:2120
-
\??\c:\dpdpv.exec:\dpdpv.exe120⤵PID:2436
-
\??\c:\lrlxxll.exec:\lrlxxll.exe121⤵PID:2452
-
\??\c:\vpjjj.exec:\vpjjj.exe122⤵PID:2424
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-