Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 23:20
Behavioral task
behavioral1
Sample
747b80deca45767fa87c99276663c4463063c8a77b79b029ce32e40a6306cca7.exe
Resource
win7-20240508-en
windows7-x64
6 signatures
150 seconds
General
-
Target
747b80deca45767fa87c99276663c4463063c8a77b79b029ce32e40a6306cca7.exe
-
Size
334KB
-
MD5
574856122a15d14c8e093700944bb541
-
SHA1
552f154f05b7d11d7fb474c5b9a8dfd4a4a25699
-
SHA256
747b80deca45767fa87c99276663c4463063c8a77b79b029ce32e40a6306cca7
-
SHA512
159a9813a684b1195a68e81c1cd45c582105a8cc0ed61dfbb6b94462c8feba81339b8f5624dda02869e33afa4c68b689f016d25972c36819b14e466cce016f07
-
SSDEEP
6144:rcm4FmowdHoSphraHcpOaKHpXfRo0V8JcgE+ezpg1i/0:x4wFHoS3eFaKHpv/VycgE8o0
Malware Config
Signatures
-
Detect Blackmoon payload 49 IoCs
Processes:
resource yara_rule behavioral1/memory/1792-9-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2392-18-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2260-36-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2292-45-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2608-53-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1992-71-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2412-88-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1584-97-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2576-106-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2464-114-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1108-134-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1560-142-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2736-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/808-170-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/868-179-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1644-213-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/836-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2296-233-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2956-241-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1364-259-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2320-284-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1628-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1656-296-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2932-308-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2932-310-0x0000000077B60000-0x0000000077C7F000-memory.dmp family_blackmoon behavioral1/memory/2212-318-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1792-325-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1660-340-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2876-348-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1732-418-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2356-424-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2356-426-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1596-440-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1932-447-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/868-484-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1616-552-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2016-627-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2260-640-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/2260-669-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/2892-678-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2748-747-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1696-797-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2896-816-0x00000000002C0000-0x00000000002E7000-memory.dmp family_blackmoon behavioral1/memory/2784-1003-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2732-1045-0x0000000000230000-0x0000000000257000-memory.dmp family_blackmoon behavioral1/memory/2200-1188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1920-1310-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1764-1356-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1128-1408-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/1792-0-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1792-2-0x0000000000220000-0x0000000000247000-memory.dmp UPX C:\nttbtb.exe UPX behavioral1/memory/1792-9-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2392-10-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2392-18-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\ttttbh.exe UPX C:\vvpjv.exe UPX C:\tttbnb.exe UPX behavioral1/memory/2260-36-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\pjvdd.exe UPX behavioral1/memory/2292-45-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\ntnntb.exe UPX behavioral1/memory/2608-53-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\7vpdv.exe UPX behavioral1/memory/1992-71-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\xxlxffl.exe UPX C:\btntbh.exe UPX behavioral1/memory/2412-88-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\vpvdj.exe UPX C:\3httbn.exe UPX behavioral1/memory/1584-97-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\vvvdd.exe UPX behavioral1/memory/2576-106-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2464-114-0x0000000000220000-0x0000000000247000-memory.dmp UPX C:\7frxrfx.exe UPX C:\vvdpj.exe UPX C:\rxfffxr.exe UPX behavioral1/memory/1108-134-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1560-142-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\nhtbnb.exe UPX C:\vdpjv.exe UPX C:\7llffrl.exe UPX behavioral1/memory/2736-160-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\7vddj.exe UPX behavioral1/memory/808-170-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\3frxffl.exe UPX behavioral1/memory/868-179-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\bthtbh.exe UPX C:\fffrflf.exe UPX C:\3bbtbh.exe UPX C:\dvpvp.exe UPX behavioral1/memory/1644-213-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\tthnbh.exe UPX behavioral1/memory/836-222-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\7jpvd.exe UPX behavioral1/memory/2296-233-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\llrffrr.exe UPX behavioral1/memory/2956-241-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\nhbhtt.exe UPX behavioral1/memory/1364-251-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1364-259-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\pjpvd.exe UPX C:\rlxllrf.exe UPX C:\jdvdp.exe UPX behavioral1/memory/2320-284-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\rllxrxl.exe UPX behavioral1/memory/1628-293-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2416-301-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2932-308-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2932-310-0x0000000077B60000-0x0000000077C7F000-memory.dmp UPX behavioral1/memory/2212-318-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1792-325-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2004-326-0x0000000000400000-0x0000000000427000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
nttbtb.exettttbh.exevvpjv.exetttbnb.exepjvdd.exentnntb.exe7vpdv.exexxlxffl.exebtntbh.exevpvdj.exe3httbn.exevvvdd.exe7frxrfx.exevvdpj.exerxfffxr.exenhtbnb.exevdpjv.exe7llffrl.exe7vddj.exe3frxffl.exebthtbh.exefffrflf.exe3bbtbh.exedvpvp.exetthnbh.exe7jpvd.exellrffrr.exenhbhtt.exepjpvd.exerlxllrf.exejdvdp.exerllxrxl.exe3btttn.exe3jpdp.exelfxxlrx.exeflxxflr.exebtnthh.exe5bhhhh.exejjdjj.exellxrlxr.exe5nnbtn.exejdjjp.exepjvjd.exe3lrrxxl.exe9hbtht.exebbthth.exevpjpv.exelfffllr.exehbbtnt.exethbhtb.exeddddp.exerlxlxxl.exexlxxxlr.exe7ttbtb.exerllrfrf.exebhhbbn.exehhthbb.exedvvdv.exellrflxl.exentnhth.exe7bhbbn.exepvjjv.exexlrxrxf.exehhthbn.exepid process 2392 nttbtb.exe 2872 ttttbh.exe 2260 vvpjv.exe 2292 tttbnb.exe 2608 pjvdd.exe 2796 ntnntb.exe 1992 7vpdv.exe 2776 xxlxffl.exe 2412 btntbh.exe 1584 vpvdj.exe 2576 3httbn.exe 2464 vvvdd.exe 2824 7frxrfx.exe 1108 vvdpj.exe 1560 rxfffxr.exe 2752 nhtbnb.exe 2736 vdpjv.exe 808 7llffrl.exe 868 7vddj.exe 2920 3frxffl.exe 2148 bthtbh.exe 1180 fffrflf.exe 1644 3bbtbh.exe 836 dvpvp.exe 2296 tthnbh.exe 2956 7jpvd.exe 1548 llrffrr.exe 1364 nhbhtt.exe 1304 pjpvd.exe 2328 rlxllrf.exe 2320 jdvdp.exe 1628 rllxrxl.exe 1656 3btttn.exe 2416 3jpdp.exe 2932 lfxxlrx.exe 1792 flxxflr.exe 2004 btnthh.exe 1660 5bhhhh.exe 2876 jjdjj.exe 1916 llxrlxr.exe 2716 5nnbtn.exe 2948 jdjjp.exe 2860 pjvjd.exe 2800 3lrrxxl.exe 2892 9hbtht.exe 2788 bbthth.exe 2496 vpjpv.exe 2772 lfffllr.exe 2556 hbbtnt.exe 1732 thbhtb.exe 2356 ddddp.exe 2824 rlxlxxl.exe 1596 xlxxxlr.exe 2160 7ttbtb.exe 1932 rllrfrf.exe 2308 bhhbbn.exe 2736 hhthbb.exe 856 dvvdv.exe 860 llrflxl.exe 868 ntnhth.exe 2544 7bhbbn.exe 2064 pvjjv.exe 1076 xlrxrxf.exe 1180 hhthbn.exe -
Processes:
resource yara_rule behavioral1/memory/1792-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1792-2-0x0000000000220000-0x0000000000247000-memory.dmp upx C:\nttbtb.exe upx behavioral1/memory/1792-9-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2392-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2392-18-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ttttbh.exe upx C:\vvpjv.exe upx C:\tttbnb.exe upx behavioral1/memory/2260-36-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjvdd.exe upx behavioral1/memory/2292-45-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ntnntb.exe upx behavioral1/memory/2608-53-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7vpdv.exe upx behavioral1/memory/1992-71-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xxlxffl.exe upx C:\btntbh.exe upx behavioral1/memory/2412-88-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpvdj.exe upx C:\3httbn.exe upx behavioral1/memory/1584-97-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vvvdd.exe upx behavioral1/memory/2576-106-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2464-114-0x0000000000220000-0x0000000000247000-memory.dmp upx C:\7frxrfx.exe upx C:\vvdpj.exe upx C:\rxfffxr.exe upx behavioral1/memory/1108-134-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1560-142-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhtbnb.exe upx C:\vdpjv.exe upx C:\7llffrl.exe upx behavioral1/memory/2736-160-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7vddj.exe upx behavioral1/memory/808-170-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3frxffl.exe upx behavioral1/memory/868-179-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bthtbh.exe upx C:\fffrflf.exe upx C:\3bbtbh.exe upx C:\dvpvp.exe upx behavioral1/memory/1644-213-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tthnbh.exe upx behavioral1/memory/836-222-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7jpvd.exe upx behavioral1/memory/2296-233-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\llrffrr.exe upx behavioral1/memory/2956-241-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhbhtt.exe upx behavioral1/memory/1364-251-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1364-259-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\pjpvd.exe upx C:\rlxllrf.exe upx C:\jdvdp.exe upx behavioral1/memory/2320-284-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rllxrxl.exe upx behavioral1/memory/1628-293-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2416-301-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2932-308-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2932-310-0x0000000077B60000-0x0000000077C7F000-memory.dmp upx behavioral1/memory/2212-318-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1792-325-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2004-326-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
747b80deca45767fa87c99276663c4463063c8a77b79b029ce32e40a6306cca7.exenttbtb.exettttbh.exevvpjv.exetttbnb.exepjvdd.exentnntb.exe7vpdv.exexxlxffl.exebtntbh.exevpvdj.exe3httbn.exevvvdd.exe7frxrfx.exevvdpj.exerxfffxr.exedescription pid process target process PID 1792 wrote to memory of 2392 1792 747b80deca45767fa87c99276663c4463063c8a77b79b029ce32e40a6306cca7.exe nttbtb.exe PID 1792 wrote to memory of 2392 1792 747b80deca45767fa87c99276663c4463063c8a77b79b029ce32e40a6306cca7.exe nttbtb.exe PID 1792 wrote to memory of 2392 1792 747b80deca45767fa87c99276663c4463063c8a77b79b029ce32e40a6306cca7.exe nttbtb.exe PID 1792 wrote to memory of 2392 1792 747b80deca45767fa87c99276663c4463063c8a77b79b029ce32e40a6306cca7.exe nttbtb.exe PID 2392 wrote to memory of 2872 2392 nttbtb.exe ttttbh.exe PID 2392 wrote to memory of 2872 2392 nttbtb.exe ttttbh.exe PID 2392 wrote to memory of 2872 2392 nttbtb.exe ttttbh.exe PID 2392 wrote to memory of 2872 2392 nttbtb.exe ttttbh.exe PID 2872 wrote to memory of 2260 2872 ttttbh.exe vvpjv.exe PID 2872 wrote to memory of 2260 2872 ttttbh.exe vvpjv.exe PID 2872 wrote to memory of 2260 2872 ttttbh.exe vvpjv.exe PID 2872 wrote to memory of 2260 2872 ttttbh.exe vvpjv.exe PID 2260 wrote to memory of 2292 2260 vvpjv.exe tttbnb.exe PID 2260 wrote to memory of 2292 2260 vvpjv.exe tttbnb.exe PID 2260 wrote to memory of 2292 2260 vvpjv.exe tttbnb.exe PID 2260 wrote to memory of 2292 2260 vvpjv.exe tttbnb.exe PID 2292 wrote to memory of 2608 2292 tttbnb.exe pjvdd.exe PID 2292 wrote to memory of 2608 2292 tttbnb.exe pjvdd.exe PID 2292 wrote to memory of 2608 2292 tttbnb.exe pjvdd.exe PID 2292 wrote to memory of 2608 2292 tttbnb.exe pjvdd.exe PID 2608 wrote to memory of 2796 2608 pjvdd.exe ntnntb.exe PID 2608 wrote to memory of 2796 2608 pjvdd.exe ntnntb.exe PID 2608 wrote to memory of 2796 2608 pjvdd.exe ntnntb.exe PID 2608 wrote to memory of 2796 2608 pjvdd.exe ntnntb.exe PID 2796 wrote to memory of 1992 2796 ntnntb.exe 7vpdv.exe PID 2796 wrote to memory of 1992 2796 ntnntb.exe 7vpdv.exe PID 2796 wrote to memory of 1992 2796 ntnntb.exe 7vpdv.exe PID 2796 wrote to memory of 1992 2796 ntnntb.exe 7vpdv.exe PID 1992 wrote to memory of 2776 1992 7vpdv.exe xxlxffl.exe PID 1992 wrote to memory of 2776 1992 7vpdv.exe xxlxffl.exe PID 1992 wrote to memory of 2776 1992 7vpdv.exe xxlxffl.exe PID 1992 wrote to memory of 2776 1992 7vpdv.exe xxlxffl.exe PID 2776 wrote to memory of 2412 2776 xxlxffl.exe btntbh.exe PID 2776 wrote to memory of 2412 2776 xxlxffl.exe btntbh.exe PID 2776 wrote to memory of 2412 2776 xxlxffl.exe btntbh.exe PID 2776 wrote to memory of 2412 2776 xxlxffl.exe btntbh.exe PID 2412 wrote to memory of 1584 2412 btntbh.exe vpvdj.exe PID 2412 wrote to memory of 1584 2412 btntbh.exe vpvdj.exe PID 2412 wrote to memory of 1584 2412 btntbh.exe vpvdj.exe PID 2412 wrote to memory of 1584 2412 btntbh.exe vpvdj.exe PID 1584 wrote to memory of 2576 1584 vpvdj.exe 3httbn.exe PID 1584 wrote to memory of 2576 1584 vpvdj.exe 3httbn.exe PID 1584 wrote to memory of 2576 1584 vpvdj.exe 3httbn.exe PID 1584 wrote to memory of 2576 1584 vpvdj.exe 3httbn.exe PID 2576 wrote to memory of 2464 2576 3httbn.exe vvvdd.exe PID 2576 wrote to memory of 2464 2576 3httbn.exe vvvdd.exe PID 2576 wrote to memory of 2464 2576 3httbn.exe vvvdd.exe PID 2576 wrote to memory of 2464 2576 3httbn.exe vvvdd.exe PID 2464 wrote to memory of 2824 2464 vvvdd.exe 7frxrfx.exe PID 2464 wrote to memory of 2824 2464 vvvdd.exe 7frxrfx.exe PID 2464 wrote to memory of 2824 2464 vvvdd.exe 7frxrfx.exe PID 2464 wrote to memory of 2824 2464 vvvdd.exe 7frxrfx.exe PID 2824 wrote to memory of 1108 2824 7frxrfx.exe vvdpj.exe PID 2824 wrote to memory of 1108 2824 7frxrfx.exe vvdpj.exe PID 2824 wrote to memory of 1108 2824 7frxrfx.exe vvdpj.exe PID 2824 wrote to memory of 1108 2824 7frxrfx.exe vvdpj.exe PID 1108 wrote to memory of 1560 1108 vvdpj.exe rxfffxr.exe PID 1108 wrote to memory of 1560 1108 vvdpj.exe rxfffxr.exe PID 1108 wrote to memory of 1560 1108 vvdpj.exe rxfffxr.exe PID 1108 wrote to memory of 1560 1108 vvdpj.exe rxfffxr.exe PID 1560 wrote to memory of 2752 1560 rxfffxr.exe nhtbnb.exe PID 1560 wrote to memory of 2752 1560 rxfffxr.exe nhtbnb.exe PID 1560 wrote to memory of 2752 1560 rxfffxr.exe nhtbnb.exe PID 1560 wrote to memory of 2752 1560 rxfffxr.exe nhtbnb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\747b80deca45767fa87c99276663c4463063c8a77b79b029ce32e40a6306cca7.exe"C:\Users\Admin\AppData\Local\Temp\747b80deca45767fa87c99276663c4463063c8a77b79b029ce32e40a6306cca7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
\??\c:\nttbtb.exec:\nttbtb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\ttttbh.exec:\ttttbh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\vvpjv.exec:\vvpjv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
\??\c:\tttbnb.exec:\tttbnb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
\??\c:\pjvdd.exec:\pjvdd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\ntnntb.exec:\ntnntb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\7vpdv.exec:\7vpdv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\xxlxffl.exec:\xxlxffl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\btntbh.exec:\btntbh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
\??\c:\vpvdj.exec:\vpvdj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\3httbn.exec:\3httbn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\vvvdd.exec:\vvvdd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\7frxrfx.exec:\7frxrfx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\vvdpj.exec:\vvdpj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
\??\c:\rxfffxr.exec:\rxfffxr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1560 -
\??\c:\nhtbnb.exec:\nhtbnb.exe17⤵
- Executes dropped EXE
PID:2752 -
\??\c:\vdpjv.exec:\vdpjv.exe18⤵
- Executes dropped EXE
PID:2736 -
\??\c:\7llffrl.exec:\7llffrl.exe19⤵
- Executes dropped EXE
PID:808 -
\??\c:\7vddj.exec:\7vddj.exe20⤵
- Executes dropped EXE
PID:868 -
\??\c:\3frxffl.exec:\3frxffl.exe21⤵
- Executes dropped EXE
PID:2920 -
\??\c:\bthtbh.exec:\bthtbh.exe22⤵
- Executes dropped EXE
PID:2148 -
\??\c:\fffrflf.exec:\fffrflf.exe23⤵
- Executes dropped EXE
PID:1180 -
\??\c:\3bbtbh.exec:\3bbtbh.exe24⤵
- Executes dropped EXE
PID:1644 -
\??\c:\dvpvp.exec:\dvpvp.exe25⤵
- Executes dropped EXE
PID:836 -
\??\c:\tthnbh.exec:\tthnbh.exe26⤵
- Executes dropped EXE
PID:2296 -
\??\c:\7jpvd.exec:\7jpvd.exe27⤵
- Executes dropped EXE
PID:2956 -
\??\c:\llrffrr.exec:\llrffrr.exe28⤵
- Executes dropped EXE
PID:1548 -
\??\c:\nhbhtt.exec:\nhbhtt.exe29⤵
- Executes dropped EXE
PID:1364 -
\??\c:\pjpvd.exec:\pjpvd.exe30⤵
- Executes dropped EXE
PID:1304 -
\??\c:\rlxllrf.exec:\rlxllrf.exe31⤵
- Executes dropped EXE
PID:2328 -
\??\c:\jdvdp.exec:\jdvdp.exe32⤵
- Executes dropped EXE
PID:2320 -
\??\c:\rllxrxl.exec:\rllxrxl.exe33⤵
- Executes dropped EXE
PID:1628 -
\??\c:\3btttn.exec:\3btttn.exe34⤵
- Executes dropped EXE
PID:1656 -
\??\c:\3jpdp.exec:\3jpdp.exe35⤵
- Executes dropped EXE
PID:2416 -
\??\c:\lfxxlrx.exec:\lfxxlrx.exe36⤵
- Executes dropped EXE
PID:2932 -
\??\c:\9rxxxrr.exec:\9rxxxrr.exe37⤵PID:2212
-
\??\c:\flxxflr.exec:\flxxflr.exe38⤵
- Executes dropped EXE
PID:1792 -
\??\c:\btnthh.exec:\btnthh.exe39⤵
- Executes dropped EXE
PID:2004 -
\??\c:\5bhhhh.exec:\5bhhhh.exe40⤵
- Executes dropped EXE
PID:1660 -
\??\c:\jjdjj.exec:\jjdjj.exe41⤵
- Executes dropped EXE
PID:2876 -
\??\c:\llxrlxr.exec:\llxrlxr.exe42⤵
- Executes dropped EXE
PID:1916 -
\??\c:\5nnbtn.exec:\5nnbtn.exe43⤵
- Executes dropped EXE
PID:2716 -
\??\c:\jdjjp.exec:\jdjjp.exe44⤵
- Executes dropped EXE
PID:2948 -
\??\c:\pjvjd.exec:\pjvjd.exe45⤵
- Executes dropped EXE
PID:2860 -
\??\c:\3lrrxxl.exec:\3lrrxxl.exe46⤵
- Executes dropped EXE
PID:2800 -
\??\c:\9hbtht.exec:\9hbtht.exe47⤵
- Executes dropped EXE
PID:2892 -
\??\c:\bbthth.exec:\bbthth.exe48⤵
- Executes dropped EXE
PID:2788 -
\??\c:\vpjpv.exec:\vpjpv.exe49⤵
- Executes dropped EXE
PID:2496 -
\??\c:\lfffllr.exec:\lfffllr.exe50⤵
- Executes dropped EXE
PID:2772 -
\??\c:\hbbtnt.exec:\hbbtnt.exe51⤵
- Executes dropped EXE
PID:2556 -
\??\c:\thbhtb.exec:\thbhtb.exe52⤵
- Executes dropped EXE
PID:1732 -
\??\c:\ddddp.exec:\ddddp.exe53⤵
- Executes dropped EXE
PID:2356 -
\??\c:\rlxlxxl.exec:\rlxlxxl.exe54⤵
- Executes dropped EXE
PID:2824 -
\??\c:\xlxxxlr.exec:\xlxxxlr.exe55⤵
- Executes dropped EXE
PID:1596 -
\??\c:\7ttbtb.exec:\7ttbtb.exe56⤵
- Executes dropped EXE
PID:2160 -
\??\c:\rllrfrf.exec:\rllrfrf.exe57⤵
- Executes dropped EXE
PID:1932 -
\??\c:\bhhbbn.exec:\bhhbbn.exe58⤵
- Executes dropped EXE
PID:2308 -
\??\c:\hhthbb.exec:\hhthbb.exe59⤵
- Executes dropped EXE
PID:2736 -
\??\c:\dvvdv.exec:\dvvdv.exe60⤵
- Executes dropped EXE
PID:856 -
\??\c:\llrflxl.exec:\llrflxl.exe61⤵
- Executes dropped EXE
PID:860 -
\??\c:\ntnhth.exec:\ntnhth.exe62⤵
- Executes dropped EXE
PID:868 -
\??\c:\7bhbbn.exec:\7bhbbn.exe63⤵
- Executes dropped EXE
PID:2544 -
\??\c:\pvjjv.exec:\pvjjv.exe64⤵
- Executes dropped EXE
PID:2064 -
\??\c:\xlrxrxf.exec:\xlrxrxf.exe65⤵
- Executes dropped EXE
PID:1076 -
\??\c:\hhthbn.exec:\hhthbn.exe66⤵
- Executes dropped EXE
PID:1180 -
\??\c:\7hbbbn.exec:\7hbbbn.exe67⤵PID:328
-
\??\c:\3vvdv.exec:\3vvdv.exe68⤵PID:908
-
\??\c:\xxrxllf.exec:\xxrxllf.exe69⤵PID:448
-
\??\c:\rlfflll.exec:\rlfflll.exe70⤵PID:2088
-
\??\c:\hbbbhh.exec:\hbbbhh.exe71⤵PID:1536
-
\??\c:\7vjjp.exec:\7vjjp.exe72⤵PID:1552
-
\??\c:\xxlrflx.exec:\xxlrflx.exe73⤵PID:772
-
\??\c:\rrffrrf.exec:\rrffrrf.exe74⤵PID:1616
-
\??\c:\tnbhbn.exec:\tnbhbn.exe75⤵PID:1304
-
\??\c:\jjdjv.exec:\jjdjv.exe76⤵PID:800
-
\??\c:\pjjjp.exec:\pjjjp.exe77⤵PID:3052
-
\??\c:\xxxfrrx.exec:\xxxfrrx.exe78⤵PID:3004
-
\??\c:\bhttbh.exec:\bhttbh.exe79⤵PID:2132
-
\??\c:\hhbhbh.exec:\hhbhbh.exe80⤵PID:1508
-
\??\c:\1pjjp.exec:\1pjjp.exe81⤵PID:1428
-
\??\c:\xrxfrrx.exec:\xrxfrrx.exe82⤵PID:1604
-
\??\c:\ttbntb.exec:\ttbntb.exe83⤵PID:1244
-
\??\c:\9hhhhh.exec:\9hhhhh.exe84⤵PID:2924
-
\??\c:\pvdvd.exec:\pvdvd.exe85⤵PID:2016
-
\??\c:\rlxxlfr.exec:\rlxxlfr.exe86⤵PID:2272
-
\??\c:\bbthbh.exec:\bbthbh.exe87⤵PID:2260
-
\??\c:\bbbhtb.exec:\bbbhtb.exe88⤵PID:2128
-
\??\c:\3pdjv.exec:\3pdjv.exe89⤵PID:2712
-
\??\c:\ffxlfrx.exec:\ffxlfrx.exe90⤵PID:2656
-
\??\c:\hbtbtt.exec:\hbtbtt.exe91⤵PID:2704
-
\??\c:\hhhtbh.exec:\hhhtbh.exe92⤵PID:2860
-
\??\c:\5ddpj.exec:\5ddpj.exe93⤵PID:2800
-
\??\c:\ffllxlx.exec:\ffllxlx.exe94⤵PID:2892
-
\??\c:\9bbtbh.exec:\9bbtbh.exe95⤵PID:2520
-
\??\c:\9dddv.exec:\9dddv.exe96⤵PID:344
-
\??\c:\xlrffxr.exec:\xlrffxr.exe97⤵PID:2580
-
\??\c:\7lfrxlr.exec:\7lfrxlr.exe98⤵PID:2556
-
\??\c:\hbtbnn.exec:\hbtbnn.exe99⤵PID:2760
-
\??\c:\vpjvj.exec:\vpjvj.exe100⤵PID:2356
-
\??\c:\xlrxxff.exec:\xlrxxff.exe101⤵PID:888
-
\??\c:\flxfrxr.exec:\flxfrxr.exe102⤵PID:1032
-
\??\c:\nbbhth.exec:\nbbhth.exe103⤵PID:2348
-
\??\c:\ddjvv.exec:\ddjvv.exe104⤵PID:2836
-
\??\c:\lflrfxr.exec:\lflrfxr.exe105⤵PID:2748
-
\??\c:\hhbnbn.exec:\hhbnbn.exe106⤵PID:1396
-
\??\c:\bbtbtt.exec:\bbtbtt.exe107⤵PID:1292
-
\??\c:\dvjpd.exec:\dvjpd.exe108⤵PID:3012
-
\??\c:\fffxlxl.exec:\fffxlxl.exe109⤵PID:2896
-
\??\c:\fffrrfr.exec:\fffrrfr.exe110⤵PID:2448
-
\??\c:\tnbhhh.exec:\tnbhhh.exe111⤵PID:3028
-
\??\c:\jddjp.exec:\jddjp.exe112⤵PID:576
-
\??\c:\xrrfffr.exec:\xrrfffr.exe113⤵PID:1696
-
\??\c:\thhtbh.exec:\thhtbh.exe114⤵PID:1812
-
\??\c:\lrxlxrf.exec:\lrxlxrf.exe115⤵PID:556
-
\??\c:\rrxxlfl.exec:\rrxxlfl.exe116⤵PID:1912
-
\??\c:\bbbnbn.exec:\bbbnbn.exe117⤵PID:1332
-
\??\c:\3vjjp.exec:\3vjjp.exe118⤵PID:1956
-
\??\c:\7rrfrxr.exec:\7rrfrxr.exe119⤵PID:1816
-
\??\c:\9xrrxlx.exec:\9xrrxlx.exe120⤵PID:1288
-
\??\c:\nnnbhn.exec:\nnnbhn.exe121⤵PID:296
-
\??\c:\jpjvp.exec:\jpjvp.exe122⤵PID:884
-
\??\c:\9jvjv.exec:\9jvjv.exe123⤵PID:1648
-
\??\c:\5xflrrl.exec:\5xflrrl.exe124⤵PID:2320
-
\??\c:\bbbhtb.exec:\bbbhtb.exe125⤵PID:1588
-
\??\c:\1bthnb.exec:\1bthnb.exe126⤵PID:1640
-
\??\c:\5pjjv.exec:\5pjjv.exe127⤵PID:2984
-
\??\c:\9rlrflx.exec:\9rlrflx.exe128⤵PID:1760
-
\??\c:\1ttbth.exec:\1ttbth.exe129⤵PID:2184
-
\??\c:\vjvvj.exec:\vjvvj.exe130⤵PID:1744
-
\??\c:\9jdvv.exec:\9jdvv.exe131⤵PID:2360
-
\??\c:\lxlfrrf.exec:\lxlfrrf.exe132⤵PID:2268
-
\??\c:\5nnnbh.exec:\5nnnbh.exe133⤵PID:2872
-
\??\c:\7pjvd.exec:\7pjvd.exe134⤵PID:2596
-
\??\c:\pvppj.exec:\pvppj.exe135⤵PID:2024
-
\??\c:\ffxlxfl.exec:\ffxlxfl.exe136⤵PID:2940
-
\??\c:\nnhnbb.exec:\nnhnbb.exe137⤵PID:1996
-
\??\c:\vpdvd.exec:\vpdvd.exe138⤵PID:2948
-
\??\c:\lllxrrf.exec:\lllxrrf.exe139⤵PID:2528
-
\??\c:\fllffrx.exec:\fllffrx.exe140⤵PID:2500
-
\??\c:\bnttht.exec:\bnttht.exe141⤵PID:2412
-
\??\c:\jddpd.exec:\jddpd.exe142⤵PID:2672
-
\??\c:\5pjvd.exec:\5pjvd.exe143⤵PID:1584
-
\??\c:\xrllxfr.exec:\xrllxfr.exe144⤵PID:3048
-
\??\c:\3tnntb.exec:\3tnntb.exe145⤵PID:2784
-
\??\c:\ppjvd.exec:\ppjvd.exe146⤵PID:2464
-
\??\c:\7jdjp.exec:\7jdjp.exe147⤵PID:1684
-
\??\c:\3rlfflr.exec:\3rlfflr.exe148⤵PID:1108
-
\??\c:\nnthtb.exec:\nnthtb.exe149⤵PID:1032
-
\??\c:\bnhhtb.exec:\bnhhtb.exe150⤵PID:2724
-
\??\c:\vdpdp.exec:\vdpdp.exe151⤵PID:2756
-
\??\c:\rlfxrxl.exec:\rlfxrxl.exe152⤵PID:2732
-
\??\c:\hbtbnn.exec:\hbtbnn.exe153⤵PID:856
-
\??\c:\ddvpv.exec:\ddvpv.exe154⤵PID:1292
-
\??\c:\vvddd.exec:\vvddd.exe155⤵PID:2904
-
\??\c:\7llrflr.exec:\7llrflr.exe156⤵PID:2092
-
\??\c:\bbtthh.exec:\bbtthh.exe157⤵PID:1984
-
\??\c:\dpvvd.exec:\dpvvd.exe158⤵PID:1056
-
\??\c:\3ppvp.exec:\3ppvp.exe159⤵PID:560
-
\??\c:\rlffxxr.exec:\rlffxxr.exe160⤵PID:1852
-
\??\c:\7ttbbn.exec:\7ttbbn.exe161⤵PID:908
-
\??\c:\3jjvv.exec:\3jjvv.exe162⤵PID:760
-
\??\c:\fxrfflx.exec:\fxrfflx.exe163⤵PID:1328
-
\??\c:\9lxrllx.exec:\9lxrllx.exe164⤵PID:1332
-
\??\c:\hbhntt.exec:\hbhntt.exe165⤵PID:1476
-
\??\c:\vpddd.exec:\vpddd.exe166⤵PID:2428
-
\??\c:\vpvpp.exec:\vpvpp.exe167⤵PID:1816
-
\??\c:\lfxxffr.exec:\lfxxffr.exe168⤵PID:1616
-
\??\c:\1ththb.exec:\1ththb.exe169⤵PID:296
-
\??\c:\1jvvd.exec:\1jvvd.exe170⤵PID:1632
-
\??\c:\vpjjv.exec:\vpjjv.exe171⤵PID:2028
-
\??\c:\xrflxlr.exec:\xrflxlr.exe172⤵PID:996
-
\??\c:\bhbthn.exec:\bhbthn.exe173⤵PID:2992
-
\??\c:\bbhntb.exec:\bbhntb.exe174⤵PID:1508
-
\??\c:\5jddj.exec:\5jddj.exe175⤵PID:2200
-
\??\c:\lfxfrrf.exec:\lfxfrrf.exe176⤵PID:1428
-
\??\c:\llfrffr.exec:\llfrffr.exe177⤵PID:2184
-
\??\c:\hbnnhb.exec:\hbnnhb.exe178⤵PID:2156
-
\??\c:\5pdvv.exec:\5pdvv.exe179⤵PID:2360
-
\??\c:\jdvvp.exec:\jdvvp.exe180⤵PID:2152
-
\??\c:\xlrfllr.exec:\xlrfllr.exe181⤵PID:2652
-
\??\c:\hhbhbh.exec:\hhbhbh.exe182⤵PID:2260
-
\??\c:\jdvvd.exec:\jdvvd.exe183⤵PID:2024
-
\??\c:\rlflxfl.exec:\rlflxfl.exe184⤵PID:2812
-
\??\c:\fffrrxl.exec:\fffrrxl.exe185⤵PID:2916
-
\??\c:\nhbhnt.exec:\nhbhnt.exe186⤵PID:2868
-
\??\c:\pppvj.exec:\pppvj.exe187⤵PID:2676
-
\??\c:\vvjpd.exec:\vvjpd.exe188⤵PID:2804
-
\??\c:\ffrxrfl.exec:\ffrxrfl.exe189⤵PID:2524
-
\??\c:\9tntbh.exec:\9tntbh.exe190⤵PID:2204
-
\??\c:\bhnhtn.exec:\bhnhtn.exe191⤵PID:1528
-
\??\c:\9pjvd.exec:\9pjvd.exe192⤵PID:2808
-
\??\c:\lffxrxl.exec:\lffxrxl.exe193⤵PID:1040
-
\??\c:\hnnhtb.exec:\hnnhtb.exe194⤵PID:1920
-
\??\c:\5nhhbt.exec:\5nhhbt.exe195⤵PID:1684
-
\??\c:\jjvdv.exec:\jjvdv.exe196⤵PID:2476
-
\??\c:\fxlrrfx.exec:\fxlrrfx.exe197⤵PID:1932
-
\??\c:\rlrrrff.exec:\rlrrrff.exe198⤵PID:1316
-
\??\c:\tttthh.exec:\tttthh.exe199⤵PID:2756
-
\??\c:\5jdpv.exec:\5jdpv.exe200⤵PID:2732
-
\??\c:\ppjjv.exec:\ppjjv.exe201⤵PID:1764
-
\??\c:\rlflxfx.exec:\rlflxfx.exe202⤵PID:2920
-
\??\c:\3htthn.exec:\3htthn.exe203⤵PID:264
-
\??\c:\3dvjp.exec:\3dvjp.exe204⤵PID:1488
-
\??\c:\vvdjj.exec:\vvdjj.exe205⤵PID:1480
-
\??\c:\xrflxxf.exec:\xrflxxf.exe206⤵PID:1056
-
\??\c:\ttthbh.exec:\ttthbh.exe207⤵PID:1820
-
\??\c:\hbthbh.exec:\hbthbh.exe208⤵PID:2472
-
\??\c:\5vpvj.exec:\5vpvj.exe209⤵PID:1128
-
\??\c:\7xrxlfl.exec:\7xrxlfl.exe210⤵PID:760
-
\??\c:\tbthnh.exec:\tbthnh.exe211⤵PID:1536
-
\??\c:\btnthn.exec:\btnthn.exe212⤵PID:356
-
\??\c:\9pjjv.exec:\9pjjv.exe213⤵PID:1788
-
\??\c:\3rflrrx.exec:\3rflrrx.exe214⤵PID:2032
-
\??\c:\bhhbbt.exec:\bhhbbt.exe215⤵PID:380
-
\??\c:\bbthnt.exec:\bbthnt.exe216⤵PID:1304
-
\??\c:\7jdjp.exec:\7jdjp.exe217⤵PID:1804
-
\??\c:\fflrlrx.exec:\fflrlrx.exe218⤵PID:800
-
\??\c:\lfxrxxl.exec:\lfxrxxl.exe219⤵PID:2028
-
\??\c:\7bthth.exec:\7bthth.exe220⤵PID:996
-
\??\c:\dvpvp.exec:\dvpvp.exe221⤵PID:1640
-
\??\c:\xxllrrx.exec:\xxllrrx.exe222⤵PID:1228
-
\??\c:\rlflffr.exec:\rlflffr.exe223⤵PID:2456
-
\??\c:\htntbh.exec:\htntbh.exe224⤵PID:1760
-
\??\c:\bthnbb.exec:\bthnbb.exe225⤵PID:1744
-
\??\c:\5vjdd.exec:\5vjdd.exe226⤵PID:2584
-
\??\c:\7xrrxxf.exec:\7xrrxxf.exe227⤵PID:2648
-
\??\c:\xrffrrf.exec:\xrffrrf.exe228⤵PID:2268
-
\??\c:\7thnnn.exec:\7thnnn.exe229⤵PID:2792
-
\??\c:\dvppd.exec:\dvppd.exe230⤵PID:2712
-
\??\c:\rrfxlfl.exec:\rrfxlfl.exe231⤵PID:2940
-
\??\c:\3lfflxf.exec:\3lfflxf.exe232⤵PID:2620
-
\??\c:\9tbtth.exec:\9tbtth.exe233⤵PID:2780
-
\??\c:\ddjjv.exec:\ddjjv.exe234⤵PID:2860
-
\??\c:\5lflrff.exec:\5lflrff.exe235⤵PID:3064
-
\??\c:\xrflxxl.exec:\xrflxxl.exe236⤵PID:2892
-
\??\c:\nnhnbb.exec:\nnhnbb.exe237⤵PID:3016
-
\??\c:\7ppvj.exec:\7ppvj.exe238⤵PID:2044
-
\??\c:\ppdpv.exec:\ppdpv.exe239⤵PID:2556
-
\??\c:\fxllrfl.exec:\fxllrfl.exe240⤵PID:2760
-
\??\c:\tnbnbb.exec:\tnbnbb.exe241⤵PID:2168
-
\??\c:\tnnnbh.exec:\tnnnbh.exe242⤵PID:768