Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 09:54
Behavioral task
behavioral1
Sample
edee31a45c2e8a8108efd0b8c1989e451dc922766653e3b56802cd8a7d4c2cfa.exe
Resource
win7-20240220-en
windows7-x64
6 signatures
150 seconds
General
-
Target
edee31a45c2e8a8108efd0b8c1989e451dc922766653e3b56802cd8a7d4c2cfa.exe
-
Size
365KB
-
MD5
8dc6421e5a7124835096a61c91146d58
-
SHA1
ad0946b6ad684de7bd4e26e7e2e52a099847a372
-
SHA256
edee31a45c2e8a8108efd0b8c1989e451dc922766653e3b56802cd8a7d4c2cfa
-
SHA512
e8985d3e369008a1c380bd557fb0161ac77edcab135bc18482172e91762ea3efd3b6a952f17696233ad5cb719ebac0bea70ed414682ce14c502b0222ddf27512
-
SSDEEP
6144:Lcm4FmowdHoSHt251UriZFwu1b26X1wjdgyPPB9:R4wFHoSHYHUrAwqzQ7PPj
Malware Config
Signatures
-
Detect Blackmoon payload 40 IoCs
Processes:
resource yara_rule behavioral1/memory/2552-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3040-15-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2576-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2508-33-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2696-45-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2656-42-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2588-58-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2384-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2112-76-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1668-78-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2548-92-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1764-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2080-114-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1472-125-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1472-122-0x00000000001B0000-0x00000000001D7000-memory.dmp family_blackmoon behavioral1/memory/1984-140-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1084-155-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1284-162-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2204-170-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2036-186-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2100-243-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2860-258-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2768-265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1964-276-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1548-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2576-315-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2444-348-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1572-359-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1584-417-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/692-453-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2036-465-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1160-479-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3024-506-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2808-875-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2424-894-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1612-925-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1912-9737-0x0000000077960000-0x0000000077A7F000-memory.dmp family_blackmoon behavioral1/memory/1912-10261-0x0000000077960000-0x0000000077A7F000-memory.dmp family_blackmoon behavioral1/memory/1912-10785-0x0000000077960000-0x0000000077A7F000-memory.dmp family_blackmoon behavioral1/memory/1912-20874-0x0000000077960000-0x0000000077A7F000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/2552-0-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\3rxfrxf.exe UPX behavioral1/memory/2552-7-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/3040-8-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\tnttbt.exe UPX behavioral1/memory/3040-15-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2576-25-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\9rfxrll.exe UPX C:\nbnttb.exe UPX behavioral1/memory/2508-33-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2508-32-0x0000000000220000-0x0000000000247000-memory.dmp UPX C:\dddjv.exe UPX behavioral1/memory/2696-45-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2656-42-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\ffrrrxf.exe UPX behavioral1/memory/2588-58-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\1nbhhn.exe UPX C:\vpjpj.exe UPX behavioral1/memory/2384-67-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\xlfxxfx.exe UPX behavioral1/memory/2112-76-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1668-78-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\htbthb.exe UPX C:\lxlrxll.exe UPX behavioral1/memory/2548-92-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\lflflrx.exe UPX behavioral1/memory/1764-107-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\5djjp.exe UPX behavioral1/memory/2080-114-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\3pjdv.exe UPX behavioral1/memory/1472-125-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\tnbnbn.exe UPX C:\pppjp.exe UPX behavioral1/memory/1984-140-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\1xlrrrf.exe UPX C:\btttnt.exe UPX C:\pjvdj.exe UPX behavioral1/memory/1084-155-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\9llfxff.exe UPX behavioral1/memory/1284-162-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\5thbtb.exe UPX behavioral1/memory/2204-170-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\vvvjd.exe UPX behavioral1/memory/2036-186-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\rrlxffl.exe UPX C:\vpdjj.exe UPX \??\c:\lxlxxxf.exe UPX C:\lxrflxf.exe UPX C:\jdpjp.exe UPX C:\3jvdj.exe UPX behavioral1/memory/2956-222-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\nbnhnn.exe UPX C:\vjvvp.exe UPX behavioral1/memory/2100-243-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\pdvpv.exe UPX C:\7hnttb.exe UPX behavioral1/memory/2860-258-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1636-259-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2768-265-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1964-276-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1676-282-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1548-293-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2576-315-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2116-342-0x0000000000400000-0x0000000000427000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
3rxfrxf.exetnttbt.exe9rfxrll.exenbnttb.exedddjv.exeffrrrxf.exe1nbhhn.exevpjpj.exexlfxxfx.exehtbthb.exelxlrxll.exelflflrx.exe5djjp.exe3pjdv.exetnbnbn.exepppjp.exe1xlrrrf.exebtttnt.exepjvdj.exe9llfxff.exe5thbtb.exevvvjd.exerrlxffl.exevpdjj.exelxlxxxf.exelxrflxf.exejdpjp.exe3jvdj.exenbnhnn.exevjvvp.exepdvpv.exe7hnttb.exedvdpd.exe1dppv.exexlxfrxf.exe1nhtbh.exedvjjj.exe1jpvv.exe1rlxxfl.exe7bntbt.exe3httnn.exedpjvv.exerfrllfl.exe3xlrrrr.exenttbtt.exejdpjd.exe7jjpj.exeflxrrfx.exe5hbhtb.exevppvj.exerxfffxx.exenhtbbt.exe9hbbnn.exe9jvvv.exelxllrrr.exefrffxrx.exe5thbbb.exevjvvj.exe9dpvd.exexrxfllx.exe7nnhbb.exedppjj.exe9dvdd.exe1lfxffl.exepid process 3040 3rxfrxf.exe 2576 tnttbt.exe 2508 9rfxrll.exe 2656 nbnttb.exe 2696 dddjv.exe 2588 ffrrrxf.exe 2384 1nbhhn.exe 2112 vpjpj.exe 1668 xlfxxfx.exe 2548 htbthb.exe 2456 lxlrxll.exe 1764 lflflrx.exe 2080 5djjp.exe 1472 3pjdv.exe 1592 tnbnbn.exe 1984 pppjp.exe 1288 1xlrrrf.exe 1084 btttnt.exe 1284 pjvdj.exe 2204 9llfxff.exe 604 5thbtb.exe 2036 vvvjd.exe 1436 rrlxffl.exe 860 vpdjj.exe 1152 lxlxxxf.exe 2920 lxrflxf.exe 1684 jdpjp.exe 2956 3jvdj.exe 1608 nbnhnn.exe 2100 vjvvp.exe 292 pdvpv.exe 2860 7hnttb.exe 1636 dvdpd.exe 2768 1dppv.exe 2124 xlxfrxf.exe 1964 1nhtbh.exe 1676 dvjjj.exe 2300 1jpvv.exe 1548 1rlxxfl.exe 2020 7bntbt.exe 2568 3httnn.exe 2724 dpjvv.exe 2576 rfrllfl.exe 2508 3xlrrrr.exe 1720 nttbtt.exe 2628 jdpjd.exe 2696 7jjpj.exe 2116 flxrrfx.exe 2444 5hbhtb.exe 2488 vppvj.exe 1572 rxfffxx.exe 2120 nhtbbt.exe 1280 9hbbnn.exe 2672 9jvvv.exe 2244 lxllrrr.exe 2128 frffxrx.exe 2080 5thbbb.exe 1568 vjvvj.exe 1864 9dpvd.exe 1584 xrxfllx.exe 868 7nnhbb.exe 2268 dppjj.exe 2276 9dvdd.exe 2032 1lfxffl.exe -
Processes:
resource yara_rule behavioral1/memory/2552-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3rxfrxf.exe upx behavioral1/memory/2552-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3040-8-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnttbt.exe upx behavioral1/memory/3040-15-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2576-25-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9rfxrll.exe upx C:\nbnttb.exe upx behavioral1/memory/2508-33-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2508-32-0x0000000000220000-0x0000000000247000-memory.dmp upx C:\dddjv.exe upx behavioral1/memory/2696-45-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2656-42-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ffrrrxf.exe upx behavioral1/memory/2588-58-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1nbhhn.exe upx behavioral1/memory/2384-64-0x00000000002A0000-0x00000000002C7000-memory.dmp upx C:\vpjpj.exe upx behavioral1/memory/2384-67-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xlfxxfx.exe upx behavioral1/memory/2112-76-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1668-78-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\htbthb.exe upx C:\lxlrxll.exe upx behavioral1/memory/2548-92-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lflflrx.exe upx behavioral1/memory/1764-107-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5djjp.exe upx behavioral1/memory/2080-114-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3pjdv.exe upx behavioral1/memory/1472-125-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnbnbn.exe upx C:\pppjp.exe upx behavioral1/memory/1984-140-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1xlrrrf.exe upx C:\btttnt.exe upx C:\pjvdj.exe upx behavioral1/memory/1084-155-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9llfxff.exe upx behavioral1/memory/1284-162-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5thbtb.exe upx behavioral1/memory/2204-170-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vvvjd.exe upx behavioral1/memory/2036-186-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rrlxffl.exe upx C:\vpdjj.exe upx \??\c:\lxlxxxf.exe upx C:\lxrflxf.exe upx C:\jdpjp.exe upx C:\3jvdj.exe upx behavioral1/memory/2956-222-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nbnhnn.exe upx C:\vjvvp.exe upx behavioral1/memory/2100-243-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pdvpv.exe upx C:\7hnttb.exe upx behavioral1/memory/2860-258-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1636-259-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2768-265-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1964-276-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1676-282-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1548-293-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2576-315-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
edee31a45c2e8a8108efd0b8c1989e451dc922766653e3b56802cd8a7d4c2cfa.exe3rxfrxf.exetnttbt.exe9rfxrll.exenbnttb.exedddjv.exeffrrrxf.exe1nbhhn.exevpjpj.exexlfxxfx.exehtbthb.exelxlrxll.exelflflrx.exe5djjp.exe3pjdv.exetnbnbn.exedescription pid process target process PID 2552 wrote to memory of 3040 2552 edee31a45c2e8a8108efd0b8c1989e451dc922766653e3b56802cd8a7d4c2cfa.exe 3rxfrxf.exe PID 2552 wrote to memory of 3040 2552 edee31a45c2e8a8108efd0b8c1989e451dc922766653e3b56802cd8a7d4c2cfa.exe 3rxfrxf.exe PID 2552 wrote to memory of 3040 2552 edee31a45c2e8a8108efd0b8c1989e451dc922766653e3b56802cd8a7d4c2cfa.exe 3rxfrxf.exe PID 2552 wrote to memory of 3040 2552 edee31a45c2e8a8108efd0b8c1989e451dc922766653e3b56802cd8a7d4c2cfa.exe 3rxfrxf.exe PID 3040 wrote to memory of 2576 3040 3rxfrxf.exe tnttbt.exe PID 3040 wrote to memory of 2576 3040 3rxfrxf.exe tnttbt.exe PID 3040 wrote to memory of 2576 3040 3rxfrxf.exe tnttbt.exe PID 3040 wrote to memory of 2576 3040 3rxfrxf.exe tnttbt.exe PID 2576 wrote to memory of 2508 2576 tnttbt.exe 9rfxrll.exe PID 2576 wrote to memory of 2508 2576 tnttbt.exe 9rfxrll.exe PID 2576 wrote to memory of 2508 2576 tnttbt.exe 9rfxrll.exe PID 2576 wrote to memory of 2508 2576 tnttbt.exe 9rfxrll.exe PID 2508 wrote to memory of 2656 2508 9rfxrll.exe nbnttb.exe PID 2508 wrote to memory of 2656 2508 9rfxrll.exe nbnttb.exe PID 2508 wrote to memory of 2656 2508 9rfxrll.exe nbnttb.exe PID 2508 wrote to memory of 2656 2508 9rfxrll.exe nbnttb.exe PID 2656 wrote to memory of 2696 2656 nbnttb.exe dddjv.exe PID 2656 wrote to memory of 2696 2656 nbnttb.exe dddjv.exe PID 2656 wrote to memory of 2696 2656 nbnttb.exe dddjv.exe PID 2656 wrote to memory of 2696 2656 nbnttb.exe dddjv.exe PID 2696 wrote to memory of 2588 2696 dddjv.exe ffrrrxf.exe PID 2696 wrote to memory of 2588 2696 dddjv.exe ffrrrxf.exe PID 2696 wrote to memory of 2588 2696 dddjv.exe ffrrrxf.exe PID 2696 wrote to memory of 2588 2696 dddjv.exe ffrrrxf.exe PID 2588 wrote to memory of 2384 2588 ffrrrxf.exe 1nbhhn.exe PID 2588 wrote to memory of 2384 2588 ffrrrxf.exe 1nbhhn.exe PID 2588 wrote to memory of 2384 2588 ffrrrxf.exe 1nbhhn.exe PID 2588 wrote to memory of 2384 2588 ffrrrxf.exe 1nbhhn.exe PID 2384 wrote to memory of 2112 2384 1nbhhn.exe vpjpj.exe PID 2384 wrote to memory of 2112 2384 1nbhhn.exe vpjpj.exe PID 2384 wrote to memory of 2112 2384 1nbhhn.exe vpjpj.exe PID 2384 wrote to memory of 2112 2384 1nbhhn.exe vpjpj.exe PID 2112 wrote to memory of 1668 2112 vpjpj.exe xlfxxfx.exe PID 2112 wrote to memory of 1668 2112 vpjpj.exe xlfxxfx.exe PID 2112 wrote to memory of 1668 2112 vpjpj.exe xlfxxfx.exe PID 2112 wrote to memory of 1668 2112 vpjpj.exe xlfxxfx.exe PID 1668 wrote to memory of 2548 1668 xlfxxfx.exe htbthb.exe PID 1668 wrote to memory of 2548 1668 xlfxxfx.exe htbthb.exe PID 1668 wrote to memory of 2548 1668 xlfxxfx.exe htbthb.exe PID 1668 wrote to memory of 2548 1668 xlfxxfx.exe htbthb.exe PID 2548 wrote to memory of 2456 2548 htbthb.exe lxlrxll.exe PID 2548 wrote to memory of 2456 2548 htbthb.exe lxlrxll.exe PID 2548 wrote to memory of 2456 2548 htbthb.exe lxlrxll.exe PID 2548 wrote to memory of 2456 2548 htbthb.exe lxlrxll.exe PID 2456 wrote to memory of 1764 2456 lxlrxll.exe lflflrx.exe PID 2456 wrote to memory of 1764 2456 lxlrxll.exe lflflrx.exe PID 2456 wrote to memory of 1764 2456 lxlrxll.exe lflflrx.exe PID 2456 wrote to memory of 1764 2456 lxlrxll.exe lflflrx.exe PID 1764 wrote to memory of 2080 1764 lflflrx.exe 5djjp.exe PID 1764 wrote to memory of 2080 1764 lflflrx.exe 5djjp.exe PID 1764 wrote to memory of 2080 1764 lflflrx.exe 5djjp.exe PID 1764 wrote to memory of 2080 1764 lflflrx.exe 5djjp.exe PID 2080 wrote to memory of 1472 2080 5djjp.exe 3pjdv.exe PID 2080 wrote to memory of 1472 2080 5djjp.exe 3pjdv.exe PID 2080 wrote to memory of 1472 2080 5djjp.exe 3pjdv.exe PID 2080 wrote to memory of 1472 2080 5djjp.exe 3pjdv.exe PID 1472 wrote to memory of 1592 1472 3pjdv.exe tnbnbn.exe PID 1472 wrote to memory of 1592 1472 3pjdv.exe tnbnbn.exe PID 1472 wrote to memory of 1592 1472 3pjdv.exe tnbnbn.exe PID 1472 wrote to memory of 1592 1472 3pjdv.exe tnbnbn.exe PID 1592 wrote to memory of 1984 1592 tnbnbn.exe pppjp.exe PID 1592 wrote to memory of 1984 1592 tnbnbn.exe pppjp.exe PID 1592 wrote to memory of 1984 1592 tnbnbn.exe pppjp.exe PID 1592 wrote to memory of 1984 1592 tnbnbn.exe pppjp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\edee31a45c2e8a8108efd0b8c1989e451dc922766653e3b56802cd8a7d4c2cfa.exe"C:\Users\Admin\AppData\Local\Temp\edee31a45c2e8a8108efd0b8c1989e451dc922766653e3b56802cd8a7d4c2cfa.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\3rxfrxf.exec:\3rxfrxf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\tnttbt.exec:\tnttbt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\9rfxrll.exec:\9rfxrll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\nbnttb.exec:\nbnttb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\dddjv.exec:\dddjv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\ffrrrxf.exec:\ffrrrxf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\1nbhhn.exec:\1nbhhn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
\??\c:\vpjpj.exec:\vpjpj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2112 -
\??\c:\xlfxxfx.exec:\xlfxxfx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
\??\c:\htbthb.exec:\htbthb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\lxlrxll.exec:\lxlrxll.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\lflflrx.exec:\lflflrx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
\??\c:\5djjp.exec:\5djjp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\3pjdv.exec:\3pjdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
\??\c:\tnbnbn.exec:\tnbnbn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1592 -
\??\c:\pppjp.exec:\pppjp.exe17⤵
- Executes dropped EXE
PID:1984 -
\??\c:\1xlrrrf.exec:\1xlrrrf.exe18⤵
- Executes dropped EXE
PID:1288 -
\??\c:\btttnt.exec:\btttnt.exe19⤵
- Executes dropped EXE
PID:1084 -
\??\c:\pjvdj.exec:\pjvdj.exe20⤵
- Executes dropped EXE
PID:1284 -
\??\c:\9llfxff.exec:\9llfxff.exe21⤵
- Executes dropped EXE
PID:2204 -
\??\c:\5thbtb.exec:\5thbtb.exe22⤵
- Executes dropped EXE
PID:604 -
\??\c:\vvvjd.exec:\vvvjd.exe23⤵
- Executes dropped EXE
PID:2036 -
\??\c:\rrlxffl.exec:\rrlxffl.exe24⤵
- Executes dropped EXE
PID:1436 -
\??\c:\vpdjj.exec:\vpdjj.exe25⤵
- Executes dropped EXE
PID:860 -
\??\c:\lxlxxxf.exec:\lxlxxxf.exe26⤵
- Executes dropped EXE
PID:1152 -
\??\c:\lxrflxf.exec:\lxrflxf.exe27⤵
- Executes dropped EXE
PID:2920 -
\??\c:\jdpjp.exec:\jdpjp.exe28⤵
- Executes dropped EXE
PID:1684 -
\??\c:\3jvdj.exec:\3jvdj.exe29⤵
- Executes dropped EXE
PID:2956 -
\??\c:\nbnhnn.exec:\nbnhnn.exe30⤵
- Executes dropped EXE
PID:1608 -
\??\c:\vjvvp.exec:\vjvvp.exe31⤵
- Executes dropped EXE
PID:2100 -
\??\c:\pdvpv.exec:\pdvpv.exe32⤵
- Executes dropped EXE
PID:292 -
\??\c:\7hnttb.exec:\7hnttb.exe33⤵
- Executes dropped EXE
PID:2860 -
\??\c:\dvdpd.exec:\dvdpd.exe34⤵
- Executes dropped EXE
PID:1636 -
\??\c:\1dppv.exec:\1dppv.exe35⤵
- Executes dropped EXE
PID:2768 -
\??\c:\xlxfrxf.exec:\xlxfrxf.exe36⤵
- Executes dropped EXE
PID:2124 -
\??\c:\1nhtbh.exec:\1nhtbh.exe37⤵
- Executes dropped EXE
PID:1964 -
\??\c:\dvjjj.exec:\dvjjj.exe38⤵
- Executes dropped EXE
PID:1676 -
\??\c:\1jpvv.exec:\1jpvv.exe39⤵
- Executes dropped EXE
PID:2300 -
\??\c:\1rlxxfl.exec:\1rlxxfl.exe40⤵
- Executes dropped EXE
PID:1548 -
\??\c:\7bntbt.exec:\7bntbt.exe41⤵
- Executes dropped EXE
PID:2020 -
\??\c:\3httnn.exec:\3httnn.exe42⤵
- Executes dropped EXE
PID:2568 -
\??\c:\dpjvv.exec:\dpjvv.exe43⤵
- Executes dropped EXE
PID:2724 -
\??\c:\rfrllfl.exec:\rfrllfl.exe44⤵
- Executes dropped EXE
PID:2576 -
\??\c:\3xlrrrr.exec:\3xlrrrr.exe45⤵
- Executes dropped EXE
PID:2508 -
\??\c:\nttbtt.exec:\nttbtt.exe46⤵
- Executes dropped EXE
PID:1720 -
\??\c:\jdpjd.exec:\jdpjd.exe47⤵
- Executes dropped EXE
PID:2628 -
\??\c:\7jjpj.exec:\7jjpj.exe48⤵
- Executes dropped EXE
PID:2696 -
\??\c:\flxrrfx.exec:\flxrrfx.exe49⤵
- Executes dropped EXE
PID:2116 -
\??\c:\5hbhtb.exec:\5hbhtb.exe50⤵
- Executes dropped EXE
PID:2444 -
\??\c:\vppvj.exec:\vppvj.exe51⤵
- Executes dropped EXE
PID:2488 -
\??\c:\rxfffxx.exec:\rxfffxx.exe52⤵
- Executes dropped EXE
PID:1572 -
\??\c:\nhtbbt.exec:\nhtbbt.exe53⤵
- Executes dropped EXE
PID:2120 -
\??\c:\9hbbnn.exec:\9hbbnn.exe54⤵
- Executes dropped EXE
PID:1280 -
\??\c:\9jvvv.exec:\9jvvv.exe55⤵
- Executes dropped EXE
PID:2672 -
\??\c:\lxllrrr.exec:\lxllrrr.exe56⤵
- Executes dropped EXE
PID:2244 -
\??\c:\frffxrx.exec:\frffxrx.exe57⤵
- Executes dropped EXE
PID:2128 -
\??\c:\5thbbb.exec:\5thbbb.exe58⤵
- Executes dropped EXE
PID:2080 -
\??\c:\vjvvj.exec:\vjvvj.exe59⤵
- Executes dropped EXE
PID:1568 -
\??\c:\9dpvd.exec:\9dpvd.exe60⤵
- Executes dropped EXE
PID:1864 -
\??\c:\xrxfllx.exec:\xrxfllx.exe61⤵
- Executes dropped EXE
PID:1584 -
\??\c:\7nnhbb.exec:\7nnhbb.exe62⤵
- Executes dropped EXE
PID:868 -
\??\c:\dppjj.exec:\dppjj.exe63⤵
- Executes dropped EXE
PID:2268 -
\??\c:\9dvdd.exec:\9dvdd.exe64⤵
- Executes dropped EXE
PID:2276 -
\??\c:\1lfxffl.exec:\1lfxffl.exe65⤵
- Executes dropped EXE
PID:2032 -
\??\c:\rlflxxf.exec:\rlflxxf.exe66⤵PID:1284
-
\??\c:\tntttn.exec:\tntttn.exe67⤵PID:1992
-
\??\c:\5jdvj.exec:\5jdvj.exe68⤵PID:692
-
\??\c:\vvpvj.exec:\vvpvj.exe69⤵PID:532
-
\??\c:\lflrflx.exec:\lflrflx.exe70⤵PID:2036
-
\??\c:\1hnnnn.exec:\1hnnnn.exe71⤵PID:1196
-
\??\c:\tntthn.exec:\tntthn.exe72⤵PID:1160
-
\??\c:\9jdvv.exec:\9jdvv.exe73⤵PID:2884
-
\??\c:\3flxxlr.exec:\3flxxlr.exe74⤵PID:2328
-
\??\c:\fxfxfxx.exec:\fxfxfxx.exe75⤵PID:3016
-
\??\c:\tnbhnt.exec:\tnbhnt.exe76⤵PID:3024
-
\??\c:\dvjvd.exec:\dvjvd.exe77⤵PID:1716
-
\??\c:\jdpdv.exec:\jdpdv.exe78⤵PID:1560
-
\??\c:\fxlxffr.exec:\fxlxffr.exe79⤵PID:816
-
\??\c:\bbnnht.exec:\bbnnht.exe80⤵PID:112
-
\??\c:\ttntbn.exec:\ttntbn.exe81⤵PID:968
-
\??\c:\ppjpv.exec:\ppjpv.exe82⤵PID:1988
-
\??\c:\pjpdv.exec:\pjpdv.exe83⤵PID:2236
-
\??\c:\ffxrfxr.exec:\ffxrfxr.exe84⤵PID:2768
-
\??\c:\bhhthn.exec:\bhhthn.exe85⤵PID:2124
-
\??\c:\5jpdd.exec:\5jpdd.exe86⤵PID:1964
-
\??\c:\jdvvd.exec:\jdvvd.exe87⤵PID:1676
-
\??\c:\lfflfrf.exec:\lfflfrf.exe88⤵PID:1540
-
\??\c:\3fllrlr.exec:\3fllrlr.exe89⤵PID:1656
-
\??\c:\7tthth.exec:\7tthth.exe90⤵PID:2472
-
\??\c:\jdpjp.exec:\jdpjp.exe91⤵PID:2580
-
\??\c:\lfxxrxx.exec:\lfxxrxx.exe92⤵PID:2520
-
\??\c:\ffxfxxl.exec:\ffxfxxl.exe93⤵PID:2636
-
\??\c:\tttnth.exec:\tttnth.exe94⤵PID:2664
-
\??\c:\jpvdv.exec:\jpvdv.exe95⤵PID:2408
-
\??\c:\ffxlrxx.exec:\ffxlrxx.exe96⤵PID:2392
-
\??\c:\5rxfxrr.exec:\5rxfxrr.exe97⤵PID:2380
-
\??\c:\nntbnt.exec:\nntbnt.exe98⤵PID:2536
-
\??\c:\3vjdj.exec:\3vjdj.exe99⤵PID:2384
-
\??\c:\pjjpp.exec:\pjjpp.exe100⤵PID:2444
-
\??\c:\5xlllfl.exec:\5xlllfl.exe101⤵PID:2816
-
\??\c:\tnhthn.exec:\tnhthn.exe102⤵PID:1800
-
\??\c:\vpvdd.exec:\vpvdd.exe103⤵PID:2548
-
\??\c:\rlllllr.exec:\rlllllr.exe104⤵PID:1384
-
\??\c:\nbtthn.exec:\nbtthn.exe105⤵PID:1764
-
\??\c:\pjvjd.exec:\pjvjd.exe106⤵PID:2288
-
\??\c:\dpjpv.exec:\dpjpv.exe107⤵PID:1380
-
\??\c:\fxllrfl.exec:\fxllrfl.exe108⤵PID:2080
-
\??\c:\3xflxff.exec:\3xflxff.exe109⤵PID:2248
-
\??\c:\bttthn.exec:\bttthn.exe110⤵PID:1864
-
\??\c:\nbhttt.exec:\nbhttt.exe111⤵PID:1644
-
\??\c:\vjvvd.exec:\vjvvd.exe112⤵PID:2044
-
\??\c:\frlrxxl.exec:\frlrxxl.exe113⤵PID:936
-
\??\c:\xrfrrll.exec:\xrfrrll.exe114⤵PID:1276
-
\??\c:\hbnbhn.exec:\hbnbhn.exe115⤵PID:2032
-
\??\c:\jpdpp.exec:\jpdpp.exe116⤵PID:1284
-
\??\c:\jvjjv.exec:\jvjjv.exe117⤵PID:792
-
\??\c:\frffrxr.exec:\frffrxr.exe118⤵PID:336
-
\??\c:\lxflrrl.exec:\lxflrrl.exe119⤵PID:488
-
\??\c:\5hbhtt.exec:\5hbhtt.exe120⤵PID:352
-
\??\c:\9jjjv.exec:\9jjjv.exe121⤵PID:1712
-
\??\c:\dvdpp.exec:\dvdpp.exe122⤵PID:1792
-
\??\c:\rrxxxrf.exec:\rrxxxrf.exe123⤵PID:1500
-
\??\c:\nhbnhn.exec:\nhbnhn.exe124⤵PID:1164
-
\??\c:\ddpvd.exec:\ddpvd.exe125⤵PID:3056
-
\??\c:\dpddj.exec:\dpddj.exe126⤵PID:1684
-
\??\c:\lfxffxf.exec:\lfxffxf.exe127⤵PID:784
-
\??\c:\bbthnn.exec:\bbthnn.exe128⤵PID:1228
-
\??\c:\vdvdj.exec:\vdvdj.exe129⤵PID:1804
-
\??\c:\vjjpd.exec:\vjjpd.exe130⤵PID:2100
-
\??\c:\xrfrrxf.exec:\xrfrrxf.exe131⤵PID:2848
-
\??\c:\hnnbnb.exec:\hnnbnb.exe132⤵PID:2860
-
\??\c:\nbttnt.exec:\nbttnt.exe133⤵PID:2180
-
\??\c:\1dpvv.exec:\1dpvv.exe134⤵PID:1892
-
\??\c:\fxrxrfr.exec:\fxrxrfr.exe135⤵PID:2936
-
\??\c:\1lfllfl.exec:\1lfllfl.exe136⤵PID:1016
-
\??\c:\jdvjp.exec:\jdvjp.exe137⤵PID:980
-
\??\c:\dddpd.exec:\dddpd.exe138⤵PID:1552
-
\??\c:\9frrxfr.exec:\9frrxfr.exe139⤵PID:1544
-
\??\c:\vvvpp.exec:\vvvpp.exe140⤵PID:2552
-
\??\c:\fxrllrr.exec:\fxrllrr.exe141⤵PID:2620
-
\??\c:\5frrlrl.exec:\5frrlrl.exe142⤵PID:2712
-
\??\c:\hnhtnb.exec:\hnhtnb.exe143⤵PID:2624
-
\??\c:\7jdjd.exec:\7jdjd.exe144⤵PID:2492
-
\??\c:\djjdp.exec:\djjdp.exe145⤵PID:2608
-
\??\c:\xlxfflx.exec:\xlxfflx.exe146⤵PID:2808
-
\??\c:\nnhtht.exec:\nnhtht.exe147⤵PID:2540
-
\??\c:\7tttth.exec:\7tttth.exe148⤵PID:2696
-
\??\c:\7vjjv.exec:\7vjjv.exe149⤵PID:2368
-
\??\c:\lfrrrxx.exec:\lfrrrxx.exe150⤵PID:2424
-
\??\c:\xrfxffl.exec:\xrfxffl.exe151⤵PID:2880
-
\??\c:\hhthtn.exec:\hhthtn.exe152⤵PID:2812
-
\??\c:\vpdvd.exec:\vpdvd.exe153⤵PID:2816
-
\??\c:\vjddp.exec:\vjddp.exe154⤵PID:1800
-
\??\c:\xrxrlff.exec:\xrxrlff.exe155⤵PID:2456
-
\??\c:\nhbhbb.exec:\nhbhbb.exe156⤵PID:1612
-
\??\c:\dvjdj.exec:\dvjdj.exe157⤵PID:1628
-
\??\c:\dvpdp.exec:\dvpdp.exe158⤵PID:2256
-
\??\c:\5lrxrxf.exec:\5lrxrxf.exe159⤵PID:1736
-
\??\c:\9nbhtb.exec:\9nbhtb.exe160⤵PID:1592
-
\??\c:\hbhbbb.exec:\hbhbbb.exe161⤵PID:1784
-
\??\c:\jdjvp.exec:\jdjvp.exe162⤵PID:1984
-
\??\c:\jvjjp.exec:\jvjjp.exe163⤵PID:1428
-
\??\c:\rfrrrlx.exec:\rfrrrlx.exe164⤵PID:868
-
\??\c:\hthtnt.exec:\hthtnt.exe165⤵PID:1860
-
\??\c:\3tnbhh.exec:\3tnbhh.exe166⤵PID:2220
-
\??\c:\9pvdd.exec:\9pvdd.exe167⤵PID:2740
-
\??\c:\xlxxxxf.exec:\xlxxxxf.exe168⤵PID:1992
-
\??\c:\1thhtn.exec:\1thhtn.exe169⤵PID:1192
-
\??\c:\dpdvd.exec:\dpdvd.exe170⤵PID:564
-
\??\c:\dpjvj.exec:\dpjvj.exe171⤵PID:488
-
\??\c:\7frffxl.exec:\7frffxl.exe172⤵PID:1796
-
\??\c:\rflffrr.exec:\rflffrr.exe173⤵PID:908
-
\??\c:\htbbhb.exec:\htbbhb.exe174⤵PID:2988
-
\??\c:\ppdjv.exec:\ppdjv.exe175⤵PID:2920
-
\??\c:\3jjpp.exec:\3jjpp.exe176⤵PID:412
-
\??\c:\rlxfllx.exec:\rlxfllx.exe177⤵PID:1484
-
\??\c:\hbtbnt.exec:\hbtbnt.exe178⤵PID:972
-
\??\c:\1btntb.exec:\1btntb.exe179⤵PID:1336
-
\??\c:\ddpjj.exec:\ddpjj.exe180⤵PID:1560
-
\??\c:\rlflrrr.exec:\rlflrrr.exe181⤵PID:920
-
\??\c:\llffrfl.exec:\llffrfl.exe182⤵PID:292
-
\??\c:\tttnht.exec:\tttnht.exe183⤵PID:2952
-
\??\c:\jddvv.exec:\jddvv.exe184⤵PID:2172
-
\??\c:\5jjvd.exec:\5jjvd.exe185⤵PID:856
-
\??\c:\rflllfl.exec:\rflllfl.exe186⤵PID:2932
-
\??\c:\ttnhtt.exec:\ttnhtt.exe187⤵PID:1232
-
\??\c:\bnhbhb.exec:\bnhbhb.exe188⤵PID:1996
-
\??\c:\1vjjv.exec:\1vjjv.exe189⤵PID:2940
-
\??\c:\lfrfflr.exec:\lfrfflr.exe190⤵PID:2864
-
\??\c:\rxrxrfx.exec:\rxrxrfx.exe191⤵PID:2496
-
\??\c:\bhtnbb.exec:\bhtnbb.exe192⤵PID:1548
-
\??\c:\vvpjp.exec:\vvpjp.exe193⤵PID:380
-
\??\c:\frflxrx.exec:\frflxrx.exe194⤵PID:2020
-
\??\c:\rrlxrxf.exec:\rrlxrxf.exe195⤵PID:2568
-
\??\c:\tnbttt.exec:\tnbttt.exe196⤵PID:2604
-
\??\c:\dvjpj.exec:\dvjpj.exe197⤵PID:2656
-
\??\c:\dpdvv.exec:\dpdvv.exe198⤵PID:1720
-
\??\c:\xrfrxxl.exec:\xrfrxxl.exe199⤵PID:2088
-
\??\c:\5htbbb.exec:\5htbbb.exe200⤵PID:2392
-
\??\c:\bntnnh.exec:\bntnnh.exe201⤵PID:2400
-
\??\c:\xllrxxr.exec:\xllrxxr.exe202⤵PID:2420
-
\??\c:\lfrrffx.exec:\lfrrffx.exe203⤵PID:2424
-
\??\c:\nnhtnh.exec:\nnhtnh.exe204⤵PID:2880
-
\??\c:\dvpvp.exec:\dvpvp.exe205⤵PID:2632
-
\??\c:\vjjjj.exec:\vjjjj.exe206⤵PID:2816
-
\??\c:\rllrflf.exec:\rllrflf.exe207⤵PID:2820
-
\??\c:\tnthtt.exec:\tnthtt.exe208⤵PID:2456
-
\??\c:\nbbntb.exec:\nbbntb.exe209⤵PID:1612
-
\??\c:\jdpvv.exec:\jdpvv.exe210⤵PID:1628
-
\??\c:\ffxxlfr.exec:\ffxxlfr.exe211⤵PID:2256
-
\??\c:\fxrxllr.exec:\fxrxllr.exe212⤵PID:1736
-
\??\c:\hhnthn.exec:\hhnthn.exe213⤵PID:1456
-
\??\c:\dvjjd.exec:\dvjjd.exe214⤵PID:1784
-
\??\c:\rxrfflf.exec:\rxrfflf.exe215⤵PID:1644
-
\??\c:\rllxlrl.exec:\rllxlrl.exe216⤵PID:2028
-
\??\c:\tnnhtb.exec:\tnnhtb.exe217⤵PID:2040
-
\??\c:\pdvvd.exec:\pdvvd.exe218⤵PID:1860
-
\??\c:\9jpjp.exec:\9jpjp.exe219⤵PID:2220
-
\??\c:\ffxflfl.exec:\ffxflfl.exe220⤵PID:2740
-
\??\c:\9frxflr.exec:\9frxflr.exe221⤵PID:1992
-
\??\c:\nhbhth.exec:\nhbhth.exe222⤵PID:792
-
\??\c:\ddjpv.exec:\ddjpv.exe223⤵PID:1476
-
\??\c:\pvvvd.exec:\pvvvd.exe224⤵PID:3068
-
\??\c:\1xflrxl.exec:\1xflrxl.exe225⤵PID:1208
-
\??\c:\bbttnt.exec:\bbttnt.exe226⤵PID:284
-
\??\c:\vvdpp.exec:\vvdpp.exe227⤵PID:1500
-
\??\c:\lflflfl.exec:\lflflfl.exe228⤵PID:2332
-
\??\c:\7xrxrxr.exec:\7xrxrxr.exe229⤵PID:1528
-
\??\c:\nbhhnn.exec:\nbhhnn.exe230⤵PID:1684
-
\??\c:\7pdvj.exec:\7pdvj.exe231⤵PID:2944
-
\??\c:\rrlxlrx.exec:\rrlxlrx.exe232⤵PID:972
-
\??\c:\fxrflrf.exec:\fxrflrf.exe233⤵PID:1728
-
\??\c:\nhnhbt.exec:\nhnhbt.exe234⤵PID:632
-
\??\c:\vjdvd.exec:\vjdvd.exe235⤵PID:2848
-
\??\c:\jvddj.exec:\jvddj.exe236⤵PID:2860
-
\??\c:\flrxlrl.exec:\flrxlrl.exe237⤵PID:968
-
\??\c:\tnhntb.exec:\tnhntb.exe238⤵PID:572
-
\??\c:\9thnbh.exec:\9thnbh.exe239⤵PID:896
-
\??\c:\pjpvp.exec:\pjpvp.exe240⤵PID:2124
-
\??\c:\rrllxfx.exec:\rrllxfx.exe241⤵PID:3032
-