Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 19:03
Behavioral task
behavioral1
Sample
191c840a62ceecabe42eafcc77dcaee02bab828fd555dbdd765f0f0395dce063.exe
Resource
win7-20240215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
191c840a62ceecabe42eafcc77dcaee02bab828fd555dbdd765f0f0395dce063.exe
-
Size
120KB
-
MD5
b20ae7ce30f01d9192a62692bc2764f9
-
SHA1
91ee959d596e4a2702783b2041d7f470559d356c
-
SHA256
191c840a62ceecabe42eafcc77dcaee02bab828fd555dbdd765f0f0395dce063
-
SHA512
5447baa04fd61d35cad0e90c48b79fb7179e2b6a69020e76bd46cb413579fb666f14615ab258aa60846cee03b70e99bc05d7fa5d2e0a5fd038b2ef1618605860
-
SSDEEP
3072:/hOmTsF93UYfwC6GIoutKzdbr9XcMRwk6mNb5TcPeJipUe:/cm4FmowdHoSKZf5cX5m7TNe
Malware Config
Signatures
-
Detect Blackmoon payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1772-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2552-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2664-20-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2908-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3016-47-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2604-56-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2488-78-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2508-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1952-157-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/676-219-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1612-311-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2520-368-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1276-443-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2328-469-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2600-580-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2452-587-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1040-500-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1968-430-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1864-406-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2500-361-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2740-354-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2812-280-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/568-265-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1528-247-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1544-239-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2064-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1528-174-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1672-147-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2840-122-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3048-89-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2544-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2244-847-0x00000000002B0000-0x00000000002D7000-memory.dmp family_blackmoon behavioral1/memory/2660-860-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2664-861-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2128-1374-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/1772-0-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1772-7-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\bnbthb.exe UPX behavioral1/memory/2552-10-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2552-17-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2664-20-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\5dddv.exe UPX C:\9ddjp.exe UPX behavioral1/memory/2664-23-0x0000000000250000-0x0000000000277000-memory.dmp UPX behavioral1/memory/2908-29-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2908-37-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\rlxfrxr.exe UPX behavioral1/memory/3016-38-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/3016-47-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2604-56-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2488-78-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\nbhhhh.exe UPX C:\hbnbnb.exe UPX behavioral1/memory/2508-86-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\3frrrxl.exe UPX behavioral1/memory/2840-113-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\5jpvj.exe UPX \??\c:\bbhnbn.exe UPX \??\c:\fxlrfrf.exe UPX \??\c:\3bttbb.exe UPX behavioral1/memory/1952-157-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\lfxlxfx.exe UPX C:\nnhnth.exe UPX C:\hbbthh.exe UPX C:\jdvjd.exe UPX behavioral1/memory/676-219-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\rlrxffr.exe UPX \??\c:\vvpdp.exe UPX \??\c:\7lrxllr.exe UPX C:\xxrxrrl.exe UPX behavioral1/memory/1612-311-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2520-368-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1276-443-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2328-462-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2328-469-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2600-580-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2452-587-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2776-531-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1040-500-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1968-430-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1864-406-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2500-361-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2740-354-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1612-304-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\jjjvj.exe UPX behavioral1/memory/2872-283-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\hhbhtb.exe UPX behavioral1/memory/2812-280-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\3btbht.exe UPX behavioral1/memory/2812-272-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/568-265-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\vpjpj.exe UPX behavioral1/memory/1544-239-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\1bhbnb.exe UPX behavioral1/memory/580-220-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\1rflfrf.exe UPX behavioral1/memory/676-210-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2064-209-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\1jjpv.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
bnbthb.exe5dddv.exe9ddjp.exerlxfrxr.exetnhnhh.exevvvpv.exe7lfrlxl.exenbhhhh.exehbnbnb.exe9dpdp.exe5jpvj.exe3frrrxl.exefxlrfrf.exebbhnbn.exe3bttbb.exejdjpv.exelfxlxfx.exellllxlf.exennhnth.exehbbthh.exe1jjpv.exejdvjd.exe1rflfrf.exerlrxffr.exe1bhbnb.exevvpdp.exevpjpj.exe7lrxllr.exexxrxrrl.exe3btbht.exehhbhtb.exejjjvj.exejdppd.exellllrrf.exerxxrrll.exebnhthh.exe7tthhn.exejjvdv.exejvddv.exevjddp.exepjjpv.exe9rfrlrf.exefxfrflx.exetnbbnn.exehbhnhh.exebtbbnb.exeppvjd.exedvddv.exe7vvjv.exexrflrrf.exerrlrlrf.exefrfflfr.exethbbhn.exenhbhhh.exe3btnbn.exepjjpp.exejdpjv.exe3vdjv.exellfrxrf.exexxrxlxl.exehhbtbb.exehhbhbh.exenhbhth.exeddjvj.exepid process 2552 bnbthb.exe 2664 5dddv.exe 2908 9ddjp.exe 3016 rlxfrxr.exe 2604 tnhnhh.exe 2544 vvvpv.exe 2488 7lfrlxl.exe 2508 nbhhhh.exe 3048 hbnbnb.exe 2172 9dpdp.exe 2504 5jpvj.exe 2840 3frrrxl.exe 2952 fxlrfrf.exe 332 bbhnbn.exe 1672 3bttbb.exe 1952 jdjpv.exe 320 lfxlxfx.exe 1528 llllxlf.exe 1764 nnhnth.exe 1156 hbbthh.exe 2632 1jjpv.exe 2064 jdvjd.exe 676 1rflfrf.exe 580 rlrxffr.exe 816 1bhbnb.exe 1544 vvpdp.exe 2772 vpjpj.exe 2788 7lrxllr.exe 568 xxrxrrl.exe 2812 3btbht.exe 2872 hhbhtb.exe 1512 jjjvj.exe 2244 jdppd.exe 1612 llllrrf.exe 1736 rxxrrll.exe 2932 bnhthh.exe 2656 7tthhn.exe 3028 jjvdv.exe 2940 jvddv.exe 2696 vjddp.exe 2740 pjjpv.exe 2500 9rfrlrf.exe 2520 fxfrflx.exe 3012 tnbbnn.exe 2404 hbhnhh.exe 3048 btbbnb.exe 2724 ppvjd.exe 2432 dvddv.exe 3036 7vvjv.exe 1864 xrflrrf.exe 2952 rrlrlrf.exe 808 frfflfr.exe 1968 thbbhn.exe 1648 nhbhhh.exe 1276 3btnbn.exe 1596 pjjpp.exe 1536 jdpjv.exe 1764 3vdjv.exe 2328 llfrxrf.exe 360 xxrxlxl.exe 1272 hhbtbb.exe 996 hhbhbh.exe 336 nhbhth.exe 1796 ddjvj.exe -
Processes:
resource yara_rule behavioral1/memory/1772-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1772-7-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bnbthb.exe upx behavioral1/memory/2552-10-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2552-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2664-20-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5dddv.exe upx C:\9ddjp.exe upx behavioral1/memory/2664-23-0x0000000000250000-0x0000000000277000-memory.dmp upx behavioral1/memory/2908-29-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2908-37-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlxfrxr.exe upx behavioral1/memory/3016-38-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3016-47-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2604-56-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2488-78-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\nbhhhh.exe upx C:\hbnbnb.exe upx behavioral1/memory/2508-86-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3frrrxl.exe upx behavioral1/memory/2840-113-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\5jpvj.exe upx \??\c:\bbhnbn.exe upx \??\c:\fxlrfrf.exe upx \??\c:\3bttbb.exe upx behavioral1/memory/1952-157-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\lfxlxfx.exe upx C:\nnhnth.exe upx C:\hbbthh.exe upx C:\jdvjd.exe upx behavioral1/memory/676-219-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlrxffr.exe upx \??\c:\vvpdp.exe upx \??\c:\7lrxllr.exe upx C:\xxrxrrl.exe upx behavioral1/memory/1612-311-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2520-368-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1276-443-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2328-462-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2328-469-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2600-580-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2452-587-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2776-531-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1040-500-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1968-430-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1864-406-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2500-361-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2740-354-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1612-304-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jjjvj.exe upx behavioral1/memory/2872-283-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\hhbhtb.exe upx behavioral1/memory/2812-280-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\3btbht.exe upx behavioral1/memory/2812-272-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/568-265-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\vpjpj.exe upx behavioral1/memory/1544-239-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\1bhbnb.exe upx behavioral1/memory/580-220-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\1rflfrf.exe upx behavioral1/memory/676-210-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2064-209-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\1jjpv.exe upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
191c840a62ceecabe42eafcc77dcaee02bab828fd555dbdd765f0f0395dce063.exebnbthb.exe5dddv.exe9ddjp.exerlxfrxr.exetnhnhh.exevvvpv.exe7lfrlxl.exenbhhhh.exehbnbnb.exe9dpdp.exe5jpvj.exe3frrrxl.exefxlrfrf.exebbhnbn.exe3bttbb.exedescription pid process target process PID 1772 wrote to memory of 2552 1772 191c840a62ceecabe42eafcc77dcaee02bab828fd555dbdd765f0f0395dce063.exe bnbthb.exe PID 1772 wrote to memory of 2552 1772 191c840a62ceecabe42eafcc77dcaee02bab828fd555dbdd765f0f0395dce063.exe bnbthb.exe PID 1772 wrote to memory of 2552 1772 191c840a62ceecabe42eafcc77dcaee02bab828fd555dbdd765f0f0395dce063.exe bnbthb.exe PID 1772 wrote to memory of 2552 1772 191c840a62ceecabe42eafcc77dcaee02bab828fd555dbdd765f0f0395dce063.exe bnbthb.exe PID 2552 wrote to memory of 2664 2552 bnbthb.exe 5dddv.exe PID 2552 wrote to memory of 2664 2552 bnbthb.exe 5dddv.exe PID 2552 wrote to memory of 2664 2552 bnbthb.exe 5dddv.exe PID 2552 wrote to memory of 2664 2552 bnbthb.exe 5dddv.exe PID 2664 wrote to memory of 2908 2664 5dddv.exe 9ddjp.exe PID 2664 wrote to memory of 2908 2664 5dddv.exe 9ddjp.exe PID 2664 wrote to memory of 2908 2664 5dddv.exe 9ddjp.exe PID 2664 wrote to memory of 2908 2664 5dddv.exe 9ddjp.exe PID 2908 wrote to memory of 3016 2908 9ddjp.exe rlxfrxr.exe PID 2908 wrote to memory of 3016 2908 9ddjp.exe rlxfrxr.exe PID 2908 wrote to memory of 3016 2908 9ddjp.exe rlxfrxr.exe PID 2908 wrote to memory of 3016 2908 9ddjp.exe rlxfrxr.exe PID 3016 wrote to memory of 2604 3016 rlxfrxr.exe tnhnhh.exe PID 3016 wrote to memory of 2604 3016 rlxfrxr.exe tnhnhh.exe PID 3016 wrote to memory of 2604 3016 rlxfrxr.exe tnhnhh.exe PID 3016 wrote to memory of 2604 3016 rlxfrxr.exe tnhnhh.exe PID 2604 wrote to memory of 2544 2604 tnhnhh.exe vvvpv.exe PID 2604 wrote to memory of 2544 2604 tnhnhh.exe vvvpv.exe PID 2604 wrote to memory of 2544 2604 tnhnhh.exe vvvpv.exe PID 2604 wrote to memory of 2544 2604 tnhnhh.exe vvvpv.exe PID 2544 wrote to memory of 2488 2544 vvvpv.exe 7lfrlxl.exe PID 2544 wrote to memory of 2488 2544 vvvpv.exe 7lfrlxl.exe PID 2544 wrote to memory of 2488 2544 vvvpv.exe 7lfrlxl.exe PID 2544 wrote to memory of 2488 2544 vvvpv.exe 7lfrlxl.exe PID 2488 wrote to memory of 2508 2488 7lfrlxl.exe nbhhhh.exe PID 2488 wrote to memory of 2508 2488 7lfrlxl.exe nbhhhh.exe PID 2488 wrote to memory of 2508 2488 7lfrlxl.exe nbhhhh.exe PID 2488 wrote to memory of 2508 2488 7lfrlxl.exe nbhhhh.exe PID 2508 wrote to memory of 3048 2508 nbhhhh.exe hbnbnb.exe PID 2508 wrote to memory of 3048 2508 nbhhhh.exe hbnbnb.exe PID 2508 wrote to memory of 3048 2508 nbhhhh.exe hbnbnb.exe PID 2508 wrote to memory of 3048 2508 nbhhhh.exe hbnbnb.exe PID 3048 wrote to memory of 2172 3048 hbnbnb.exe 9dpdp.exe PID 3048 wrote to memory of 2172 3048 hbnbnb.exe 9dpdp.exe PID 3048 wrote to memory of 2172 3048 hbnbnb.exe 9dpdp.exe PID 3048 wrote to memory of 2172 3048 hbnbnb.exe 9dpdp.exe PID 2172 wrote to memory of 2504 2172 9dpdp.exe 5jpvj.exe PID 2172 wrote to memory of 2504 2172 9dpdp.exe 5jpvj.exe PID 2172 wrote to memory of 2504 2172 9dpdp.exe 5jpvj.exe PID 2172 wrote to memory of 2504 2172 9dpdp.exe 5jpvj.exe PID 2504 wrote to memory of 2840 2504 5jpvj.exe 3frrrxl.exe PID 2504 wrote to memory of 2840 2504 5jpvj.exe 3frrrxl.exe PID 2504 wrote to memory of 2840 2504 5jpvj.exe 3frrrxl.exe PID 2504 wrote to memory of 2840 2504 5jpvj.exe 3frrrxl.exe PID 2840 wrote to memory of 2952 2840 3frrrxl.exe fxlrfrf.exe PID 2840 wrote to memory of 2952 2840 3frrrxl.exe fxlrfrf.exe PID 2840 wrote to memory of 2952 2840 3frrrxl.exe fxlrfrf.exe PID 2840 wrote to memory of 2952 2840 3frrrxl.exe fxlrfrf.exe PID 2952 wrote to memory of 332 2952 fxlrfrf.exe bbhnbn.exe PID 2952 wrote to memory of 332 2952 fxlrfrf.exe bbhnbn.exe PID 2952 wrote to memory of 332 2952 fxlrfrf.exe bbhnbn.exe PID 2952 wrote to memory of 332 2952 fxlrfrf.exe bbhnbn.exe PID 332 wrote to memory of 1672 332 bbhnbn.exe 3bttbb.exe PID 332 wrote to memory of 1672 332 bbhnbn.exe 3bttbb.exe PID 332 wrote to memory of 1672 332 bbhnbn.exe 3bttbb.exe PID 332 wrote to memory of 1672 332 bbhnbn.exe 3bttbb.exe PID 1672 wrote to memory of 1952 1672 3bttbb.exe jdjpv.exe PID 1672 wrote to memory of 1952 1672 3bttbb.exe jdjpv.exe PID 1672 wrote to memory of 1952 1672 3bttbb.exe jdjpv.exe PID 1672 wrote to memory of 1952 1672 3bttbb.exe jdjpv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\191c840a62ceecabe42eafcc77dcaee02bab828fd555dbdd765f0f0395dce063.exe"C:\Users\Admin\AppData\Local\Temp\191c840a62ceecabe42eafcc77dcaee02bab828fd555dbdd765f0f0395dce063.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
\??\c:\bnbthb.exec:\bnbthb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\5dddv.exec:\5dddv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\9ddjp.exec:\9ddjp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\rlxfrxr.exec:\rlxfrxr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\tnhnhh.exec:\tnhnhh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\vvvpv.exec:\vvvpv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\7lfrlxl.exec:\7lfrlxl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2488 -
\??\c:\nbhhhh.exec:\nbhhhh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\hbnbnb.exec:\hbnbnb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\9dpdp.exec:\9dpdp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
\??\c:\5jpvj.exec:\5jpvj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\3frrrxl.exec:\3frrrxl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\fxlrfrf.exec:\fxlrfrf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\bbhnbn.exec:\bbhnbn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:332 -
\??\c:\3bttbb.exec:\3bttbb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\jdjpv.exec:\jdjpv.exe17⤵
- Executes dropped EXE
PID:1952 -
\??\c:\lfxlxfx.exec:\lfxlxfx.exe18⤵
- Executes dropped EXE
PID:320 -
\??\c:\llllxlf.exec:\llllxlf.exe19⤵
- Executes dropped EXE
PID:1528 -
\??\c:\nnhnth.exec:\nnhnth.exe20⤵
- Executes dropped EXE
PID:1764 -
\??\c:\hbbthh.exec:\hbbthh.exe21⤵
- Executes dropped EXE
PID:1156 -
\??\c:\1jjpv.exec:\1jjpv.exe22⤵
- Executes dropped EXE
PID:2632 -
\??\c:\jdvjd.exec:\jdvjd.exe23⤵
- Executes dropped EXE
PID:2064 -
\??\c:\1rflfrf.exec:\1rflfrf.exe24⤵
- Executes dropped EXE
PID:676 -
\??\c:\rlrxffr.exec:\rlrxffr.exe25⤵
- Executes dropped EXE
PID:580 -
\??\c:\1bhbnb.exec:\1bhbnb.exe26⤵
- Executes dropped EXE
PID:816 -
\??\c:\vvpdp.exec:\vvpdp.exe27⤵
- Executes dropped EXE
PID:1544 -
\??\c:\vpjpj.exec:\vpjpj.exe28⤵
- Executes dropped EXE
PID:2772 -
\??\c:\7lrxllr.exec:\7lrxllr.exe29⤵
- Executes dropped EXE
PID:2788 -
\??\c:\xxrxrrl.exec:\xxrxrrl.exe30⤵
- Executes dropped EXE
PID:568 -
\??\c:\3btbht.exec:\3btbht.exe31⤵
- Executes dropped EXE
PID:2812 -
\??\c:\hhbhtb.exec:\hhbhtb.exe32⤵
- Executes dropped EXE
PID:2872 -
\??\c:\jjjvj.exec:\jjjvj.exe33⤵
- Executes dropped EXE
PID:1512 -
\??\c:\jdppd.exec:\jdppd.exe34⤵
- Executes dropped EXE
PID:2244 -
\??\c:\llllrrf.exec:\llllrrf.exe35⤵
- Executes dropped EXE
PID:1612 -
\??\c:\rxxrrll.exec:\rxxrrll.exe36⤵
- Executes dropped EXE
PID:1736 -
\??\c:\bnhthh.exec:\bnhthh.exe37⤵
- Executes dropped EXE
PID:2932 -
\??\c:\7tthhn.exec:\7tthhn.exe38⤵
- Executes dropped EXE
PID:2656 -
\??\c:\jjvdv.exec:\jjvdv.exe39⤵
- Executes dropped EXE
PID:3028 -
\??\c:\jvddv.exec:\jvddv.exe40⤵
- Executes dropped EXE
PID:2940 -
\??\c:\vjddp.exec:\vjddp.exe41⤵
- Executes dropped EXE
PID:2696 -
\??\c:\pjjpv.exec:\pjjpv.exe42⤵
- Executes dropped EXE
PID:2740 -
\??\c:\9rfrlrf.exec:\9rfrlrf.exe43⤵
- Executes dropped EXE
PID:2500 -
\??\c:\fxfrflx.exec:\fxfrflx.exe44⤵
- Executes dropped EXE
PID:2520 -
\??\c:\tnbbnn.exec:\tnbbnn.exe45⤵
- Executes dropped EXE
PID:3012 -
\??\c:\hbhnhh.exec:\hbhnhh.exe46⤵
- Executes dropped EXE
PID:2404 -
\??\c:\btbbnb.exec:\btbbnb.exe47⤵
- Executes dropped EXE
PID:3048 -
\??\c:\ppvjd.exec:\ppvjd.exe48⤵
- Executes dropped EXE
PID:2724 -
\??\c:\dvddv.exec:\dvddv.exe49⤵
- Executes dropped EXE
PID:2432 -
\??\c:\7vvjv.exec:\7vvjv.exe50⤵
- Executes dropped EXE
PID:3036 -
\??\c:\xrflrrf.exec:\xrflrrf.exe51⤵
- Executes dropped EXE
PID:1864 -
\??\c:\rrlrlrf.exec:\rrlrlrf.exe52⤵
- Executes dropped EXE
PID:2952 -
\??\c:\frfflfr.exec:\frfflfr.exe53⤵
- Executes dropped EXE
PID:808 -
\??\c:\thbbhn.exec:\thbbhn.exe54⤵
- Executes dropped EXE
PID:1968 -
\??\c:\nhbhhh.exec:\nhbhhh.exe55⤵
- Executes dropped EXE
PID:1648 -
\??\c:\3btnbn.exec:\3btnbn.exe56⤵
- Executes dropped EXE
PID:1276 -
\??\c:\pjjpp.exec:\pjjpp.exe57⤵
- Executes dropped EXE
PID:1596 -
\??\c:\jdpjv.exec:\jdpjv.exe58⤵
- Executes dropped EXE
PID:1536 -
\??\c:\3vdjv.exec:\3vdjv.exe59⤵
- Executes dropped EXE
PID:1764 -
\??\c:\llfrxrf.exec:\llfrxrf.exe60⤵
- Executes dropped EXE
PID:2328 -
\??\c:\xxrxlxl.exec:\xxrxlxl.exe61⤵
- Executes dropped EXE
PID:360 -
\??\c:\hhbtbb.exec:\hhbtbb.exe62⤵
- Executes dropped EXE
PID:1272 -
\??\c:\hhbhbh.exec:\hhbhbh.exe63⤵
- Executes dropped EXE
PID:996 -
\??\c:\nhbhth.exec:\nhbhth.exe64⤵
- Executes dropped EXE
PID:336 -
\??\c:\ddjvj.exec:\ddjvj.exe65⤵
- Executes dropped EXE
PID:1796 -
\??\c:\3jjvd.exec:\3jjvd.exe66⤵PID:1040
-
\??\c:\rrlxrfl.exec:\rrlxrfl.exe67⤵PID:348
-
\??\c:\llxlrfr.exec:\llxlrfr.exe68⤵PID:1976
-
\??\c:\nhnbnn.exec:\nhnbnn.exe69⤵PID:1820
-
\??\c:\nhbhnb.exec:\nhbhnb.exe70⤵PID:2128
-
\??\c:\9nbhnb.exec:\9nbhnb.exe71⤵PID:2776
-
\??\c:\jdpvd.exec:\jdpvd.exe72⤵PID:1748
-
\??\c:\pjppv.exec:\pjppv.exe73⤵PID:2992
-
\??\c:\jjjpp.exec:\jjjpp.exe74⤵PID:2872
-
\??\c:\rxlxfff.exec:\rxlxfff.exe75⤵PID:1044
-
\??\c:\xxrxffl.exec:\xxrxffl.exe76⤵PID:1604
-
\??\c:\xrffrxl.exec:\xrffrxl.exe77⤵PID:1616
-
\??\c:\9nhthn.exec:\9nhthn.exe78⤵PID:2600
-
\??\c:\tnbnbb.exec:\tnbnbb.exe79⤵PID:2668
-
\??\c:\vpddj.exec:\vpddj.exe80⤵PID:2452
-
\??\c:\ffxfrlx.exec:\ffxfrlx.exe81⤵PID:2236
-
\??\c:\xxlflfr.exec:\xxlflfr.exe82⤵PID:2568
-
\??\c:\1fxxlrf.exec:\1fxxlrf.exe83⤵PID:1152
-
\??\c:\bbnhhh.exec:\bbnhhh.exe84⤵PID:2716
-
\??\c:\5hthbt.exec:\5hthbt.exe85⤵PID:2764
-
\??\c:\jdpjp.exec:\jdpjp.exe86⤵PID:2700
-
\??\c:\7dvdp.exec:\7dvdp.exe87⤵PID:2448
-
\??\c:\frrxflf.exec:\frrxflf.exe88⤵PID:2564
-
\??\c:\tbnbht.exec:\tbnbht.exe89⤵PID:2520
-
\??\c:\vvvjp.exec:\vvvjp.exe90⤵PID:3012
-
\??\c:\ntbtbt.exec:\ntbtbt.exe91⤵PID:2512
-
\??\c:\jjjjp.exec:\jjjjp.exe92⤵PID:2628
-
\??\c:\frlrxfr.exec:\frlrxfr.exe93⤵PID:884
-
\??\c:\9ppvd.exec:\9ppvd.exe94⤵PID:1964
-
\??\c:\jdjvj.exec:\jdjvj.exe95⤵PID:2836
-
\??\c:\3rxffxf.exec:\3rxffxf.exe96⤵PID:1756
-
\??\c:\rrlfrxf.exec:\rrlfrxf.exe97⤵PID:332
-
\??\c:\pjvdj.exec:\pjvdj.exe98⤵PID:1552
-
\??\c:\fxlxllf.exec:\fxlxllf.exe99⤵PID:860
-
\??\c:\ppjpd.exec:\ppjpd.exe100⤵PID:1908
-
\??\c:\5xrlxfr.exec:\5xrlxfr.exe101⤵PID:1740
-
\??\c:\dpjvp.exec:\dpjvp.exe102⤵PID:2256
-
\??\c:\rrrlrxf.exec:\rrrlrxf.exe103⤵PID:2792
-
\??\c:\nhtbhn.exec:\nhtbhn.exe104⤵PID:2912
-
\??\c:\ddppv.exec:\ddppv.exe105⤵PID:1156
-
\??\c:\fxxrxxf.exec:\fxxrxxf.exe106⤵PID:1400
-
\??\c:\btnbtt.exec:\btnbtt.exe107⤵PID:840
-
\??\c:\vvjpj.exec:\vvjpj.exe108⤵PID:1096
-
\??\c:\fxrflrx.exec:\fxrflrx.exe109⤵PID:2212
-
\??\c:\rrrrxfl.exec:\rrrrxfl.exe110⤵PID:1484
-
\??\c:\7bhnth.exec:\7bhnth.exe111⤵PID:596
-
\??\c:\1jvdd.exec:\1jvdd.exe112⤵PID:1040
-
\??\c:\5djvv.exec:\5djvv.exe113⤵PID:1828
-
\??\c:\xlxxlrf.exec:\xlxxlrf.exe114⤵PID:2772
-
\??\c:\1fxflrf.exec:\1fxflrf.exe115⤵PID:908
-
\??\c:\btbbnt.exec:\btbbnt.exe116⤵PID:692
-
\??\c:\bbhthn.exec:\bbhthn.exe117⤵PID:2812
-
\??\c:\vjvvd.exec:\vjvvd.exe118⤵PID:1124
-
\??\c:\lllllxl.exec:\lllllxl.exe119⤵PID:2252
-
\??\c:\1fxlrxl.exec:\1fxlrxl.exe120⤵PID:2588
-
\??\c:\nhnhnn.exec:\nhnhnn.exe121⤵PID:2244
-
\??\c:\9htthn.exec:\9htthn.exe122⤵PID:2552
-
\??\c:\pjvdv.exec:\pjvdv.exe123⤵PID:2660
-
\??\c:\jdvpp.exec:\jdvpp.exe124⤵PID:2664
-
\??\c:\dvpvj.exec:\dvpvj.exe125⤵PID:1868
-
\??\c:\3rlxlrf.exec:\3rlxlrf.exe126⤵PID:2656
-
\??\c:\hbhnbb.exec:\hbhnbb.exe127⤵PID:3032
-
\??\c:\1nbbtb.exec:\1nbbtb.exe128⤵PID:2676
-
\??\c:\ppjpj.exec:\ppjpj.exe129⤵PID:2960
-
\??\c:\pppjv.exec:\pppjv.exe130⤵PID:2712
-
\??\c:\lxrxxfr.exec:\lxrxxfr.exe131⤵PID:2740
-
\??\c:\tbhbnb.exec:\tbhbnb.exe132⤵PID:2360
-
\??\c:\1htbbb.exec:\1htbbb.exe133⤵PID:2480
-
\??\c:\1xrflxf.exec:\1xrflxf.exe134⤵PID:2336
-
\??\c:\lrlxrlx.exec:\lrlxrlx.exe135⤵PID:2220
-
\??\c:\tttthn.exec:\tttthn.exe136⤵PID:1692
-
\??\c:\3nhthn.exec:\3nhthn.exe137⤵PID:2864
-
\??\c:\3pdvv.exec:\3pdvv.exe138⤵PID:2724
-
\??\c:\dvjjj.exec:\dvjjj.exe139⤵PID:2612
-
\??\c:\fxrrxxf.exec:\fxrrxxf.exe140⤵PID:3036
-
\??\c:\rrllrfl.exec:\rrllrfl.exe141⤵PID:1864
-
\??\c:\btbnhn.exec:\btbnhn.exe142⤵PID:2320
-
\??\c:\dvdpp.exec:\dvdpp.exe143⤵PID:1672
-
\??\c:\vvdjj.exec:\vvdjj.exe144⤵PID:2372
-
\??\c:\3lfflfl.exec:\3lfflfl.exe145⤵PID:1520
-
\??\c:\lflflxl.exec:\lflflxl.exe146⤵PID:1676
-
\??\c:\thntnh.exec:\thntnh.exe147⤵PID:632
-
\??\c:\tthtbt.exec:\tthtbt.exe148⤵PID:1536
-
\??\c:\jdjdp.exec:\jdjdp.exe149⤵PID:2796
-
\??\c:\vdvvj.exec:\vdvvj.exe150⤵PID:2408
-
\??\c:\3lfxrrf.exec:\3lfxrrf.exe151⤵PID:1328
-
\??\c:\xlxxxff.exec:\xlxxxff.exe152⤵PID:1272
-
\??\c:\9tttbb.exec:\9tttbb.exe153⤵PID:852
-
\??\c:\httthh.exec:\httthh.exe154⤵PID:996
-
\??\c:\jdpvd.exec:\jdpvd.exe155⤵PID:1792
-
\??\c:\dvvjd.exec:\dvvjd.exe156⤵PID:1380
-
\??\c:\frrrxxr.exec:\frrrxxr.exe157⤵PID:2624
-
\??\c:\lfxlxlr.exec:\lfxlxlr.exe158⤵PID:1028
-
\??\c:\thbtbn.exec:\thbtbn.exe159⤵PID:2788
-
\??\c:\btntht.exec:\btntht.exe160⤵PID:2232
-
\??\c:\9dpdj.exec:\9dpdj.exe161⤵PID:2968
-
\??\c:\jdddd.exec:\jdddd.exe162⤵PID:2688
-
\??\c:\rfflrxl.exec:\rfflrxl.exe163⤵PID:2812
-
\??\c:\5lrrxfr.exec:\5lrrxfr.exe164⤵PID:2916
-
\??\c:\nhbhbb.exec:\nhbhbb.exe165⤵PID:2252
-
\??\c:\tntntb.exec:\tntntb.exe166⤵PID:2636
-
\??\c:\pjdjd.exec:\pjdjd.exe167⤵PID:2244
-
\??\c:\dvvdv.exec:\dvvdv.exe168⤵PID:2552
-
\??\c:\rfrrlrx.exec:\rfrrlrx.exe169⤵PID:1092
-
\??\c:\llrllrf.exec:\llrllrf.exe170⤵PID:2664
-
\??\c:\bbnbhb.exec:\bbnbhb.exe171⤵PID:2908
-
\??\c:\1vjjp.exec:\1vjjp.exe172⤵PID:2768
-
\??\c:\dvjvp.exec:\dvjvp.exe173⤵PID:2620
-
\??\c:\vvpvj.exec:\vvpvj.exe174⤵PID:3008
-
\??\c:\1flxfrx.exec:\1flxfrx.exe175⤵PID:2940
-
\??\c:\3lfrlrx.exec:\3lfrlrx.exe176⤵PID:2764
-
\??\c:\nhtbhn.exec:\nhtbhn.exe177⤵PID:2556
-
\??\c:\hnthhh.exec:\hnthhh.exe178⤵PID:2500
-
\??\c:\7pdjp.exec:\7pdjp.exe179⤵PID:2116
-
\??\c:\ddpjd.exec:\ddpjd.exe180⤵PID:356
-
\??\c:\fxlxxxl.exec:\fxlxxxl.exe181⤵PID:2404
-
\??\c:\3frfrrx.exec:\3frfrrx.exe182⤵PID:2904
-
\??\c:\ttbnth.exec:\ttbnth.exe183⤵PID:2736
-
\??\c:\tntbnt.exec:\tntbnt.exe184⤵PID:2504
-
\??\c:\1vppp.exec:\1vppp.exe185⤵PID:1296
-
\??\c:\9pjjj.exec:\9pjjj.exe186⤵PID:1288
-
\??\c:\rlfrflx.exec:\rlfrflx.exe187⤵PID:1920
-
\??\c:\lfxxlxl.exec:\lfxxlxl.exe188⤵PID:2464
-
\??\c:\tnnbtt.exec:\tnnbtt.exe189⤵PID:1968
-
\??\c:\tthntt.exec:\tthntt.exe190⤵PID:1860
-
\??\c:\xlffrlx.exec:\xlffrlx.exe191⤵PID:1276
-
\??\c:\5xffflr.exec:\5xffflr.exe192⤵PID:2260
-
\??\c:\9hnthn.exec:\9hnthn.exe193⤵PID:1528
-
\??\c:\hbbhnn.exec:\hbbhnn.exe194⤵PID:1536
-
\??\c:\dpjpd.exec:\dpjpd.exe195⤵PID:1764
-
\??\c:\jjjjv.exec:\jjjjv.exe196⤵PID:2408
-
\??\c:\rfrlrfr.exec:\rfrlrfr.exe197⤵PID:360
-
\??\c:\fxrfxlf.exec:\fxrfxlf.exe198⤵PID:1948
-
\??\c:\nnntnt.exec:\nnntnt.exe199⤵PID:2368
-
\??\c:\9tnhnb.exec:\9tnhnb.exe200⤵PID:328
-
\??\c:\jdvdp.exec:\jdvdp.exe201⤵PID:828
-
\??\c:\pjdpj.exec:\pjdpj.exe202⤵PID:2284
-
\??\c:\rlxfflr.exec:\rlxfflr.exe203⤵PID:1544
-
\??\c:\lrfxxxx.exec:\lrfxxxx.exe204⤵PID:1048
-
\??\c:\htnbhn.exec:\htnbhn.exe205⤵PID:2056
-
\??\c:\bbhnth.exec:\bbhnth.exe206⤵PID:2128
-
\??\c:\1vpdp.exec:\1vpdp.exe207⤵PID:568
-
\??\c:\dvdpp.exec:\dvdpp.exe208⤵PID:2688
-
\??\c:\fxxlffl.exec:\fxxlffl.exe209⤵PID:2812
-
\??\c:\rrfrxlx.exec:\rrfrxlx.exe210⤵PID:2916
-
\??\c:\nhbntb.exec:\nhbntb.exe211⤵PID:1500
-
\??\c:\nntthh.exec:\nntthh.exe212⤵PID:700
-
\??\c:\vjppd.exec:\vjppd.exe213⤵PID:2244
-
\??\c:\9ppdd.exec:\9ppdd.exe214⤵PID:2552
-
\??\c:\ffrrxfl.exec:\ffrrxfl.exe215⤵PID:2648
-
\??\c:\xxrfflr.exec:\xxrfflr.exe216⤵PID:2832
-
\??\c:\3hbhnt.exec:\3hbhnt.exe217⤵PID:3016
-
\??\c:\btnbnb.exec:\btnbnb.exe218⤵PID:3032
-
\??\c:\dpjpv.exec:\dpjpv.exe219⤵PID:2280
-
\??\c:\3vpvd.exec:\3vpvd.exe220⤵PID:3008
-
\??\c:\fxfrlrf.exec:\fxfrlrf.exe221⤵PID:2732
-
\??\c:\llrfxxl.exec:\llrfxxl.exe222⤵PID:2272
-
\??\c:\hnbbbb.exec:\hnbbbb.exe223⤵PID:2204
-
\??\c:\hhhbbh.exec:\hhhbbh.exe224⤵PID:2856
-
\??\c:\pjvjv.exec:\pjvjv.exe225⤵PID:2444
-
\??\c:\pjjdv.exec:\pjjdv.exe226⤵PID:2336
-
\??\c:\7xrrxfr.exec:\7xrrxfr.exe227⤵PID:2820
-
\??\c:\rllrflr.exec:\rllrflr.exe228⤵PID:2864
-
\??\c:\hhbtbh.exec:\hhbtbh.exe229⤵PID:2724
-
\??\c:\5dpjj.exec:\5dpjj.exe230⤵PID:2004
-
\??\c:\pjvpd.exec:\pjvpd.exe231⤵PID:1980
-
\??\c:\ffrlfrr.exec:\ffrlfrr.exe232⤵PID:1288
-
\??\c:\rllxflr.exec:\rllxflr.exe233⤵PID:1920
-
\??\c:\5htbnb.exec:\5htbnb.exe234⤵PID:2320
-
\??\c:\hbbhnn.exec:\hbbhnn.exe235⤵PID:1968
-
\??\c:\jjjdj.exec:\jjjdj.exe236⤵PID:1860
-
\??\c:\ddpdv.exec:\ddpdv.exe237⤵PID:2268
-
\??\c:\xrxflxf.exec:\xrxflxf.exe238⤵PID:2260
-
\??\c:\lffxllx.exec:\lffxllx.exe239⤵PID:2424
-
\??\c:\lfffrrx.exec:\lfffrrx.exe240⤵PID:2988
-
\??\c:\tnbnht.exec:\tnbnht.exe241⤵PID:2912
-
\??\c:\5tnnbn.exec:\5tnnbn.exe242⤵PID:2064