Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 00:17
Behavioral task
behavioral1
Sample
9badc0fba0845eab9b260ca0f740aea24797de6d84a59760a53adf55bc65a3d7.exe
Resource
win7-20231129-en
6 signatures
150 seconds
General
-
Target
9badc0fba0845eab9b260ca0f740aea24797de6d84a59760a53adf55bc65a3d7.exe
-
Size
139KB
-
MD5
9412d21ce409ff838e2179a9a87f2d63
-
SHA1
1a2bc322917a03e9b79a29cc8485fda82b66221b
-
SHA256
9badc0fba0845eab9b260ca0f740aea24797de6d84a59760a53adf55bc65a3d7
-
SHA512
972af71008e00d2c8a30cf8b5afb47d86482de834e65e5713eacbfbaf15b0149cc87bd66594a046b725341e11cb3961fce4ab3e29c1f160b36b444be6486fba2
-
SSDEEP
3072:khOmTsF93UYfwC6GIoutpYcvrqrE66kropO6BfDKPeGrRZ:kcm4FmowdHoSphraHcpOaKHj
Malware Config
Signatures
-
Detect Blackmoon payload 36 IoCs
Processes:
resource yara_rule behavioral1/memory/836-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2208-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2044-28-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1468-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2588-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2816-57-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2756-75-0x00000000003C0000-0x00000000003E7000-memory.dmp family_blackmoon behavioral1/memory/2756-74-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2632-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2476-85-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2792-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1060-103-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1588-119-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1084-122-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1716-138-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/764-148-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2876-181-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1104-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/284-224-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/812-226-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1788-241-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/784-244-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1428-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2856-299-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2808-313-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2532-384-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1984-427-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1716-434-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2088-472-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1100-549-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2744-607-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/644-785-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1200-815-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1468-890-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2388-1149-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1632-1233-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral1/memory/836-0-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/836-7-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\dpvvv.exe UPX behavioral1/memory/2208-11-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\1fxlfll.exe UPX behavioral1/memory/2044-19-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\9thnht.exe UPX behavioral1/memory/2044-28-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1468-30-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\pjdjv.exe UPX C:\ppjdv.exe UPX behavioral1/memory/2588-46-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2680-50-0x0000000000220000-0x0000000000247000-memory.dmp UPX C:\5fffrfr.exe UPX behavioral1/memory/2816-57-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\5thbhn.exe UPX behavioral1/memory/2756-65-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2756-74-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\tnhthn.exe UPX C:\vdpjd.exe UPX behavioral1/memory/2632-83-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2476-85-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\vpjpv.exe UPX C:\lffflrf.exe UPX behavioral1/memory/2792-101-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1060-103-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\rlfflfl.exe UPX C:\nhnthh.exe UPX behavioral1/memory/1588-119-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1084-122-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\9bnnbb.exe UPX behavioral1/memory/1716-129-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\flxrflx.exe UPX behavioral1/memory/1716-138-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2756-139-0x00000000003C0000-0x00000000003E7000-memory.dmp UPX behavioral1/memory/764-148-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\ttbnnt.exe UPX C:\7vjjj.exe UPX C:\rrxllrf.exe UPX C:\xxrfrrl.exe UPX C:\ntnntb.exe UPX behavioral1/memory/2876-181-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\1dpvv.exe UPX behavioral1/memory/1960-190-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\lfxxlfx.exe UPX C:\fxrrxfr.exe UPX behavioral1/memory/1104-207-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\ttthtb.exe UPX behavioral1/memory/284-224-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\ddjpp.exe UPX behavioral1/memory/812-226-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/1788-241-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\llffllr.exe UPX behavioral1/memory/784-244-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\jvvdd.exe UPX C:\llfxxll.exe UPX C:\ppdjj.exe UPX C:\jvvvj.exe UPX C:\lfflflx.exe UPX C:\nhntnt.exe UPX behavioral1/memory/1428-285-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2856-292-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2856-299-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral1/memory/2808-306-0x0000000000400000-0x0000000000427000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
dpvvv.exe1fxlfll.exe9thnht.exepjdjv.exeppjdv.exe5fffrfr.exe5thbhn.exetnhthn.exevdpjd.exevpjpv.exelffflrf.exerlfflfl.exenhnthh.exe9bnnbb.exeflxrflx.exettbnnt.exe7vjjj.exerrxllrf.exexxrfrrl.exentnntb.exe1dpvv.exelfxxlfx.exefxrrxfr.exettthtb.exeddjpp.exejvvdd.exellffllr.exellfxxll.exeppdjj.exejvvvj.exelfflflx.exenhntnt.exeddddd.exe5jddd.exexlxxflr.exexxfflxf.exenhbhbh.exepjvvj.exevppjp.exe3rlllrr.exe9lllrfr.exenbbhnn.exebbbbnt.exejjdjj.exejddjp.exellflxfr.exexfxrxrf.exetnttbh.exe9btbtn.exevpjpp.exedpdvd.exelffflll.exexlffrrr.exe3bnnnh.exehhbhhn.exe7jppp.exeflxrxrr.exeflxfffl.exebttntt.exenhhnnh.exexxfrffr.exerlflxll.exe3thhnh.exe3nnbbb.exepid process 2208 dpvvv.exe 2044 1fxlfll.exe 1468 9thnht.exe 2588 pjdjv.exe 2680 ppjdv.exe 2816 5fffrfr.exe 2756 5thbhn.exe 2632 tnhthn.exe 2476 vdpjd.exe 2792 vpjpv.exe 1060 lffflrf.exe 1588 rlfflfl.exe 1084 nhnthh.exe 1716 9bnnbb.exe 764 flxrflx.exe 2648 ttbnnt.exe 2108 7vjjj.exe 1532 rrxllrf.exe 2876 xxrfrrl.exe 2996 ntnntb.exe 1960 1dpvv.exe 1104 lfxxlfx.exe 324 fxrrxfr.exe 284 ttthtb.exe 812 ddjpp.exe 1788 jvvdd.exe 784 llffllr.exe 2960 llfxxll.exe 328 ppdjj.exe 2096 jvvvj.exe 2848 lfflflx.exe 1428 nhntnt.exe 2856 ddddd.exe 836 5jddd.exe 2808 xlxxflr.exe 1296 xxfflxf.exe 2644 nhbhbh.exe 2608 pjvvj.exe 2664 vppjp.exe 2612 3rlllrr.exe 2496 9lllrfr.exe 2784 nbbhnn.exe 2732 bbbbnt.exe 2488 jjdjj.exe 2492 jddjp.exe 2532 llflxfr.exe 2900 xfxrxrf.exe 2580 tnttbh.exe 2448 9btbtn.exe 1864 vpjpp.exe 1640 dpdvd.exe 1084 lffflll.exe 1984 xlffrrr.exe 1716 3bnnnh.exe 764 hhbhhn.exe 2112 7jppp.exe 1592 flxrxrr.exe 1472 flxfffl.exe 2800 bttntt.exe 856 nhhnnh.exe 2088 xxfrffr.exe 2124 rlflxll.exe 540 3thhnh.exe 1104 3nnbbb.exe -
Processes:
resource yara_rule behavioral1/memory/836-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/836-7-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\dpvvv.exe upx behavioral1/memory/2208-11-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1fxlfll.exe upx behavioral1/memory/2044-19-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9thnht.exe upx behavioral1/memory/2044-28-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1468-30-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjdjv.exe upx C:\ppjdv.exe upx behavioral1/memory/2588-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2680-50-0x0000000000220000-0x0000000000247000-memory.dmp upx C:\5fffrfr.exe upx behavioral1/memory/2816-57-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5thbhn.exe upx behavioral1/memory/2756-65-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2756-74-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnhthn.exe upx C:\vdpjd.exe upx behavioral1/memory/2632-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2476-85-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpjpv.exe upx C:\lffflrf.exe upx behavioral1/memory/2792-101-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1060-103-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlfflfl.exe upx C:\nhnthh.exe upx behavioral1/memory/1588-119-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1084-122-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\9bnnbb.exe upx behavioral1/memory/1716-129-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\flxrflx.exe upx behavioral1/memory/1716-138-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2756-139-0x00000000003C0000-0x00000000003E7000-memory.dmp upx behavioral1/memory/764-148-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ttbnnt.exe upx C:\7vjjj.exe upx C:\rrxllrf.exe upx C:\xxrfrrl.exe upx C:\ntnntb.exe upx behavioral1/memory/2876-181-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1dpvv.exe upx behavioral1/memory/1960-190-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lfxxlfx.exe upx C:\fxrrxfr.exe upx behavioral1/memory/1104-207-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ttthtb.exe upx behavioral1/memory/284-224-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ddjpp.exe upx behavioral1/memory/812-226-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1788-241-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\llffllr.exe upx behavioral1/memory/784-244-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\jvvdd.exe upx C:\llfxxll.exe upx C:\ppdjj.exe upx C:\jvvvj.exe upx C:\lfflflx.exe upx C:\nhntnt.exe upx behavioral1/memory/1428-285-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2856-292-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2856-299-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2808-306-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9badc0fba0845eab9b260ca0f740aea24797de6d84a59760a53adf55bc65a3d7.exedpvvv.exe1fxlfll.exe9thnht.exepjdjv.exeppjdv.exe5fffrfr.exe5thbhn.exetnhthn.exevdpjd.exevpjpv.exelffflrf.exerlfflfl.exenhnthh.exe9bnnbb.exeflxrflx.exedescription pid process target process PID 836 wrote to memory of 2208 836 9badc0fba0845eab9b260ca0f740aea24797de6d84a59760a53adf55bc65a3d7.exe dpvvv.exe PID 836 wrote to memory of 2208 836 9badc0fba0845eab9b260ca0f740aea24797de6d84a59760a53adf55bc65a3d7.exe dpvvv.exe PID 836 wrote to memory of 2208 836 9badc0fba0845eab9b260ca0f740aea24797de6d84a59760a53adf55bc65a3d7.exe dpvvv.exe PID 836 wrote to memory of 2208 836 9badc0fba0845eab9b260ca0f740aea24797de6d84a59760a53adf55bc65a3d7.exe dpvvv.exe PID 2208 wrote to memory of 2044 2208 dpvvv.exe 1fxlfll.exe PID 2208 wrote to memory of 2044 2208 dpvvv.exe 1fxlfll.exe PID 2208 wrote to memory of 2044 2208 dpvvv.exe 1fxlfll.exe PID 2208 wrote to memory of 2044 2208 dpvvv.exe 1fxlfll.exe PID 2044 wrote to memory of 1468 2044 1fxlfll.exe 9thnht.exe PID 2044 wrote to memory of 1468 2044 1fxlfll.exe 9thnht.exe PID 2044 wrote to memory of 1468 2044 1fxlfll.exe 9thnht.exe PID 2044 wrote to memory of 1468 2044 1fxlfll.exe 9thnht.exe PID 1468 wrote to memory of 2588 1468 9thnht.exe pjdjv.exe PID 1468 wrote to memory of 2588 1468 9thnht.exe pjdjv.exe PID 1468 wrote to memory of 2588 1468 9thnht.exe pjdjv.exe PID 1468 wrote to memory of 2588 1468 9thnht.exe pjdjv.exe PID 2588 wrote to memory of 2680 2588 pjdjv.exe ppjdv.exe PID 2588 wrote to memory of 2680 2588 pjdjv.exe ppjdv.exe PID 2588 wrote to memory of 2680 2588 pjdjv.exe ppjdv.exe PID 2588 wrote to memory of 2680 2588 pjdjv.exe ppjdv.exe PID 2680 wrote to memory of 2816 2680 ppjdv.exe 5fffrfr.exe PID 2680 wrote to memory of 2816 2680 ppjdv.exe 5fffrfr.exe PID 2680 wrote to memory of 2816 2680 ppjdv.exe 5fffrfr.exe PID 2680 wrote to memory of 2816 2680 ppjdv.exe 5fffrfr.exe PID 2816 wrote to memory of 2756 2816 5fffrfr.exe 5thbhn.exe PID 2816 wrote to memory of 2756 2816 5fffrfr.exe 5thbhn.exe PID 2816 wrote to memory of 2756 2816 5fffrfr.exe 5thbhn.exe PID 2816 wrote to memory of 2756 2816 5fffrfr.exe 5thbhn.exe PID 2756 wrote to memory of 2632 2756 5thbhn.exe tnhthn.exe PID 2756 wrote to memory of 2632 2756 5thbhn.exe tnhthn.exe PID 2756 wrote to memory of 2632 2756 5thbhn.exe tnhthn.exe PID 2756 wrote to memory of 2632 2756 5thbhn.exe tnhthn.exe PID 2632 wrote to memory of 2476 2632 tnhthn.exe vdpjd.exe PID 2632 wrote to memory of 2476 2632 tnhthn.exe vdpjd.exe PID 2632 wrote to memory of 2476 2632 tnhthn.exe vdpjd.exe PID 2632 wrote to memory of 2476 2632 tnhthn.exe vdpjd.exe PID 2476 wrote to memory of 2792 2476 vdpjd.exe vpjpv.exe PID 2476 wrote to memory of 2792 2476 vdpjd.exe vpjpv.exe PID 2476 wrote to memory of 2792 2476 vdpjd.exe vpjpv.exe PID 2476 wrote to memory of 2792 2476 vdpjd.exe vpjpv.exe PID 2792 wrote to memory of 1060 2792 vpjpv.exe lffflrf.exe PID 2792 wrote to memory of 1060 2792 vpjpv.exe lffflrf.exe PID 2792 wrote to memory of 1060 2792 vpjpv.exe lffflrf.exe PID 2792 wrote to memory of 1060 2792 vpjpv.exe lffflrf.exe PID 1060 wrote to memory of 1588 1060 lffflrf.exe rlfflfl.exe PID 1060 wrote to memory of 1588 1060 lffflrf.exe rlfflfl.exe PID 1060 wrote to memory of 1588 1060 lffflrf.exe rlfflfl.exe PID 1060 wrote to memory of 1588 1060 lffflrf.exe rlfflfl.exe PID 1588 wrote to memory of 1084 1588 rlfflfl.exe nhnthh.exe PID 1588 wrote to memory of 1084 1588 rlfflfl.exe nhnthh.exe PID 1588 wrote to memory of 1084 1588 rlfflfl.exe nhnthh.exe PID 1588 wrote to memory of 1084 1588 rlfflfl.exe nhnthh.exe PID 1084 wrote to memory of 1716 1084 nhnthh.exe 9bnnbb.exe PID 1084 wrote to memory of 1716 1084 nhnthh.exe 9bnnbb.exe PID 1084 wrote to memory of 1716 1084 nhnthh.exe 9bnnbb.exe PID 1084 wrote to memory of 1716 1084 nhnthh.exe 9bnnbb.exe PID 1716 wrote to memory of 764 1716 9bnnbb.exe flxrflx.exe PID 1716 wrote to memory of 764 1716 9bnnbb.exe flxrflx.exe PID 1716 wrote to memory of 764 1716 9bnnbb.exe flxrflx.exe PID 1716 wrote to memory of 764 1716 9bnnbb.exe flxrflx.exe PID 764 wrote to memory of 2648 764 flxrflx.exe ttbnnt.exe PID 764 wrote to memory of 2648 764 flxrflx.exe ttbnnt.exe PID 764 wrote to memory of 2648 764 flxrflx.exe ttbnnt.exe PID 764 wrote to memory of 2648 764 flxrflx.exe ttbnnt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9badc0fba0845eab9b260ca0f740aea24797de6d84a59760a53adf55bc65a3d7.exe"C:\Users\Admin\AppData\Local\Temp\9badc0fba0845eab9b260ca0f740aea24797de6d84a59760a53adf55bc65a3d7.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\dpvvv.exec:\dpvvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1fxlfll.exec:\1fxlfll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9thnht.exec:\9thnht.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjdjv.exec:\pjdjv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ppjdv.exec:\ppjdv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5fffrfr.exec:\5fffrfr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5thbhn.exec:\5thbhn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnhthn.exec:\tnhthn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vdpjd.exec:\vdpjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpjpv.exec:\vpjpv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lffflrf.exec:\lffflrf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlfflfl.exec:\rlfflfl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhnthh.exec:\nhnthh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9bnnbb.exec:\9bnnbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\flxrflx.exec:\flxrflx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttbnnt.exec:\ttbnnt.exe17⤵
- Executes dropped EXE
-
\??\c:\7vjjj.exec:\7vjjj.exe18⤵
- Executes dropped EXE
-
\??\c:\rrxllrf.exec:\rrxllrf.exe19⤵
- Executes dropped EXE
-
\??\c:\xxrfrrl.exec:\xxrfrrl.exe20⤵
- Executes dropped EXE
-
\??\c:\ntnntb.exec:\ntnntb.exe21⤵
- Executes dropped EXE
-
\??\c:\1dpvv.exec:\1dpvv.exe22⤵
- Executes dropped EXE
-
\??\c:\lfxxlfx.exec:\lfxxlfx.exe23⤵
- Executes dropped EXE
-
\??\c:\fxrrxfr.exec:\fxrrxfr.exe24⤵
- Executes dropped EXE
-
\??\c:\ttthtb.exec:\ttthtb.exe25⤵
- Executes dropped EXE
-
\??\c:\ddjpp.exec:\ddjpp.exe26⤵
- Executes dropped EXE
-
\??\c:\jvvdd.exec:\jvvdd.exe27⤵
- Executes dropped EXE
-
\??\c:\llffllr.exec:\llffllr.exe28⤵
- Executes dropped EXE
-
\??\c:\llfxxll.exec:\llfxxll.exe29⤵
- Executes dropped EXE
-
\??\c:\ppdjj.exec:\ppdjj.exe30⤵
- Executes dropped EXE
-
\??\c:\jvvvj.exec:\jvvvj.exe31⤵
- Executes dropped EXE
-
\??\c:\lfflflx.exec:\lfflflx.exe32⤵
- Executes dropped EXE
-
\??\c:\nhntnt.exec:\nhntnt.exe33⤵
- Executes dropped EXE
-
\??\c:\ddddd.exec:\ddddd.exe34⤵
- Executes dropped EXE
-
\??\c:\5jddd.exec:\5jddd.exe35⤵
- Executes dropped EXE
-
\??\c:\xlxxflr.exec:\xlxxflr.exe36⤵
- Executes dropped EXE
-
\??\c:\xxfflxf.exec:\xxfflxf.exe37⤵
- Executes dropped EXE
-
\??\c:\nhbhbh.exec:\nhbhbh.exe38⤵
- Executes dropped EXE
-
\??\c:\pjvvj.exec:\pjvvj.exe39⤵
- Executes dropped EXE
-
\??\c:\vppjp.exec:\vppjp.exe40⤵
- Executes dropped EXE
-
\??\c:\3rlllrr.exec:\3rlllrr.exe41⤵
- Executes dropped EXE
-
\??\c:\9lllrfr.exec:\9lllrfr.exe42⤵
- Executes dropped EXE
-
\??\c:\nbbhnn.exec:\nbbhnn.exe43⤵
- Executes dropped EXE
-
\??\c:\bbbbnt.exec:\bbbbnt.exe44⤵
- Executes dropped EXE
-
\??\c:\jjdjj.exec:\jjdjj.exe45⤵
- Executes dropped EXE
-
\??\c:\jddjp.exec:\jddjp.exe46⤵
- Executes dropped EXE
-
\??\c:\llflxfr.exec:\llflxfr.exe47⤵
- Executes dropped EXE
-
\??\c:\xfxrxrf.exec:\xfxrxrf.exe48⤵
- Executes dropped EXE
-
\??\c:\tnttbh.exec:\tnttbh.exe49⤵
- Executes dropped EXE
-
\??\c:\9btbtn.exec:\9btbtn.exe50⤵
- Executes dropped EXE
-
\??\c:\vpjpp.exec:\vpjpp.exe51⤵
- Executes dropped EXE
-
\??\c:\dpdvd.exec:\dpdvd.exe52⤵
- Executes dropped EXE
-
\??\c:\lffflll.exec:\lffflll.exe53⤵
- Executes dropped EXE
-
\??\c:\xlffrrr.exec:\xlffrrr.exe54⤵
- Executes dropped EXE
-
\??\c:\3bnnnh.exec:\3bnnnh.exe55⤵
- Executes dropped EXE
-
\??\c:\hhbhhn.exec:\hhbhhn.exe56⤵
- Executes dropped EXE
-
\??\c:\7jppp.exec:\7jppp.exe57⤵
- Executes dropped EXE
-
\??\c:\flxrxrr.exec:\flxrxrr.exe58⤵
- Executes dropped EXE
-
\??\c:\flxfffl.exec:\flxfffl.exe59⤵
- Executes dropped EXE
-
\??\c:\bttntt.exec:\bttntt.exe60⤵
- Executes dropped EXE
-
\??\c:\nhhnnh.exec:\nhhnnh.exe61⤵
- Executes dropped EXE
-
\??\c:\xxfrffr.exec:\xxfrffr.exe62⤵
- Executes dropped EXE
-
\??\c:\rlflxll.exec:\rlflxll.exe63⤵
- Executes dropped EXE
-
\??\c:\3thhnh.exec:\3thhnh.exe64⤵
- Executes dropped EXE
-
\??\c:\3nnbbb.exec:\3nnbbb.exe65⤵
- Executes dropped EXE
-
\??\c:\5dvjj.exec:\5dvjj.exe66⤵
-
\??\c:\frfrrxl.exec:\frfrrxl.exe67⤵
-
\??\c:\9xrxfrx.exec:\9xrxfrx.exe68⤵
-
\??\c:\7bnnnb.exec:\7bnnnb.exe69⤵
-
\??\c:\thttbh.exec:\thttbh.exe70⤵
-
\??\c:\dvvdj.exec:\dvvdj.exe71⤵
-
\??\c:\5jdvv.exec:\5jdvv.exe72⤵
-
\??\c:\frxflrx.exec:\frxflrx.exe73⤵
-
\??\c:\5lflfff.exec:\5lflfff.exe74⤵
-
\??\c:\nththh.exec:\nththh.exe75⤵
-
\??\c:\9hbntn.exec:\9hbntn.exe76⤵
-
\??\c:\ddpjj.exec:\ddpjj.exe77⤵
-
\??\c:\dvjdv.exec:\dvjdv.exe78⤵
-
\??\c:\rlrxfll.exec:\rlrxfll.exe79⤵
-
\??\c:\fxflxxx.exec:\fxflxxx.exe80⤵
-
\??\c:\1thhhb.exec:\1thhhb.exe81⤵
-
\??\c:\1jjvj.exec:\1jjvj.exe82⤵
-
\??\c:\jdpvd.exec:\jdpvd.exe83⤵
-
\??\c:\rlffxxl.exec:\rlffxxl.exe84⤵
-
\??\c:\7lfxffr.exec:\7lfxffr.exe85⤵
-
\??\c:\nhbtnb.exec:\nhbtnb.exe86⤵
-
\??\c:\thtbbb.exec:\thtbbb.exe87⤵
-
\??\c:\jdvdj.exec:\jdvdj.exe88⤵
-
\??\c:\5fxxxfl.exec:\5fxxxfl.exe89⤵
-
\??\c:\5fxxfxl.exec:\5fxxfxl.exe90⤵
-
\??\c:\5nnbbt.exec:\5nnbbt.exe91⤵
-
\??\c:\nhnhbt.exec:\nhnhbt.exe92⤵
-
\??\c:\pvpdd.exec:\pvpdd.exe93⤵
-
\??\c:\djvjp.exec:\djvjp.exe94⤵
-
\??\c:\llrfflf.exec:\llrfflf.exe95⤵
-
\??\c:\7tnnbt.exec:\7tnnbt.exe96⤵
-
\??\c:\hthbhb.exec:\hthbhb.exe97⤵
-
\??\c:\jdjjj.exec:\jdjjj.exe98⤵
-
\??\c:\jjdpj.exec:\jjdpj.exe99⤵
-
\??\c:\fxxlfrl.exec:\fxxlfrl.exe100⤵
-
\??\c:\3bbnnt.exec:\3bbnnt.exe101⤵
-
\??\c:\thtnnt.exec:\thtnnt.exe102⤵
-
\??\c:\jvddv.exec:\jvddv.exe103⤵
-
\??\c:\pddjj.exec:\pddjj.exe104⤵
-
\??\c:\1xxlrxf.exec:\1xxlrxf.exe105⤵
-
\??\c:\lxflrxf.exec:\lxflrxf.exe106⤵
-
\??\c:\hbnntb.exec:\hbnntb.exe107⤵
-
\??\c:\5pjpd.exec:\5pjpd.exe108⤵
-
\??\c:\3pjjd.exec:\3pjjd.exe109⤵
-
\??\c:\7lxfxxr.exec:\7lxfxxr.exe110⤵
-
\??\c:\7fxxxxf.exec:\7fxxxxf.exe111⤵
-
\??\c:\hbbhbt.exec:\hbbhbt.exe112⤵
-
\??\c:\ddjjj.exec:\ddjjj.exe113⤵
-
\??\c:\1pjjv.exec:\1pjjv.exe114⤵
-
\??\c:\rrflxll.exec:\rrflxll.exe115⤵
-
\??\c:\thhhbb.exec:\thhhbb.exe116⤵
-
\??\c:\btnnhh.exec:\btnnhh.exe117⤵
-
\??\c:\7vjjp.exec:\7vjjp.exe118⤵
-
\??\c:\9jpjj.exec:\9jpjj.exe119⤵
-
\??\c:\xxrxlrx.exec:\xxrxlrx.exe120⤵
-
\??\c:\3xfflrx.exec:\3xfflrx.exe121⤵
-
\??\c:\nhntbb.exec:\nhntbb.exe122⤵
-
\??\c:\7ntttn.exec:\7ntttn.exe123⤵
-
\??\c:\7dvvp.exec:\7dvvp.exe124⤵
-
\??\c:\rllrllx.exec:\rllrllx.exe125⤵
-
\??\c:\fffrxfl.exec:\fffrxfl.exe126⤵
-
\??\c:\7hnnnn.exec:\7hnnnn.exe127⤵
-
\??\c:\nhtthn.exec:\nhtthn.exe128⤵
-
\??\c:\9jpvd.exec:\9jpvd.exe129⤵
-
\??\c:\llfrrxr.exec:\llfrrxr.exe130⤵
-
\??\c:\rfrxfll.exec:\rfrxfll.exe131⤵
-
\??\c:\9bnttn.exec:\9bnttn.exe132⤵
-
\??\c:\tbhhnh.exec:\tbhhnh.exe133⤵
-
\??\c:\vdvvj.exec:\vdvvj.exe134⤵
-
\??\c:\dppvv.exec:\dppvv.exe135⤵
-
\??\c:\flllxfl.exec:\flllxfl.exe136⤵
-
\??\c:\rlxflfx.exec:\rlxflfx.exe137⤵
-
\??\c:\5nbbhh.exec:\5nbbhh.exe138⤵
-
\??\c:\bbnbnb.exec:\bbnbnb.exe139⤵
-
\??\c:\pjvjj.exec:\pjvjj.exe140⤵
-
\??\c:\dpdjj.exec:\dpdjj.exe141⤵
-
\??\c:\fxlrffx.exec:\fxlrffx.exe142⤵
-
\??\c:\nnhnbh.exec:\nnhnbh.exe143⤵
-
\??\c:\tthhhn.exec:\tthhhn.exe144⤵
-
\??\c:\vjppj.exec:\vjppj.exe145⤵
-
\??\c:\3jddj.exec:\3jddj.exe146⤵
-
\??\c:\fxlrffl.exec:\fxlrffl.exe147⤵
-
\??\c:\htnntt.exec:\htnntt.exe148⤵
-
\??\c:\pjdpd.exec:\pjdpd.exe149⤵
-
\??\c:\pjdjp.exec:\pjdjp.exe150⤵
-
\??\c:\ffxrrxr.exec:\ffxrrxr.exe151⤵
-
\??\c:\frffrfl.exec:\frffrfl.exe152⤵
-
\??\c:\bnnthn.exec:\bnnthn.exe153⤵
-
\??\c:\7nhhbh.exec:\7nhhbh.exe154⤵
-
\??\c:\jppvv.exec:\jppvv.exe155⤵
-
\??\c:\vddpv.exec:\vddpv.exe156⤵
-
\??\c:\fxrlxfx.exec:\fxrlxfx.exe157⤵
-
\??\c:\btbthb.exec:\btbthb.exe158⤵
-
\??\c:\nthtnt.exec:\nthtnt.exe159⤵
-
\??\c:\pjppv.exec:\pjppv.exe160⤵
-
\??\c:\dpvpp.exec:\dpvpp.exe161⤵
-
\??\c:\lllrrrf.exec:\lllrrrf.exe162⤵
-
\??\c:\llfllxl.exec:\llfllxl.exe163⤵
-
\??\c:\htbnhn.exec:\htbnhn.exe164⤵
-
\??\c:\1htnbb.exec:\1htnbb.exe165⤵
-
\??\c:\9pdjp.exec:\9pdjp.exe166⤵
-
\??\c:\ddpvv.exec:\ddpvv.exe167⤵
-
\??\c:\7frxlrf.exec:\7frxlrf.exe168⤵
-
\??\c:\rrlrxfr.exec:\rrlrxfr.exe169⤵
-
\??\c:\1nhhnb.exec:\1nhhnb.exe170⤵
-
\??\c:\tnbtnt.exec:\tnbtnt.exe171⤵
-
\??\c:\jvpdd.exec:\jvpdd.exe172⤵
-
\??\c:\vjjvj.exec:\vjjvj.exe173⤵
-
\??\c:\ffxlxlr.exec:\ffxlxlr.exe174⤵
-
\??\c:\xfrlrlr.exec:\xfrlrlr.exe175⤵
-
\??\c:\3hbhnt.exec:\3hbhnt.exe176⤵
-
\??\c:\btnbbb.exec:\btnbbb.exe177⤵
-
\??\c:\vpjpv.exec:\vpjpv.exe178⤵
-
\??\c:\vpjpv.exec:\vpjpv.exe179⤵
-
\??\c:\rllflrf.exec:\rllflrf.exe180⤵
-
\??\c:\rlxlrlx.exec:\rlxlrlx.exe181⤵
-
\??\c:\btthnh.exec:\btthnh.exe182⤵
-
\??\c:\bnhthh.exec:\bnhthh.exe183⤵
-
\??\c:\dddjv.exec:\dddjv.exe184⤵
-
\??\c:\3pjjv.exec:\3pjjv.exe185⤵
-
\??\c:\vpddj.exec:\vpddj.exe186⤵
-
\??\c:\ffxlffx.exec:\ffxlffx.exe187⤵
-
\??\c:\nhhnth.exec:\nhhnth.exe188⤵
-
\??\c:\hhbnbh.exec:\hhbnbh.exe189⤵
-
\??\c:\1vjvj.exec:\1vjvj.exe190⤵
-
\??\c:\jvppd.exec:\jvppd.exe191⤵
-
\??\c:\7xxlxlr.exec:\7xxlxlr.exe192⤵
-
\??\c:\xrlrxfr.exec:\xrlrxfr.exe193⤵
-
\??\c:\nhthnn.exec:\nhthnn.exe194⤵
-
\??\c:\nhbhhn.exec:\nhbhhn.exe195⤵
-
\??\c:\dddvd.exec:\dddvd.exe196⤵
-
\??\c:\5jdpj.exec:\5jdpj.exe197⤵
-
\??\c:\xlrrfxx.exec:\xlrrfxx.exe198⤵
-
\??\c:\9fflxfl.exec:\9fflxfl.exe199⤵
-
\??\c:\xrlxfrx.exec:\xrlxfrx.exe200⤵
-
\??\c:\btnnbh.exec:\btnnbh.exe201⤵
-
\??\c:\ppvdd.exec:\ppvdd.exe202⤵
-
\??\c:\pjpdp.exec:\pjpdp.exe203⤵
-
\??\c:\7rxxfff.exec:\7rxxfff.exe204⤵
-
\??\c:\3rrlrrf.exec:\3rrlrrf.exe205⤵
-
\??\c:\xrlrffr.exec:\xrlrffr.exe206⤵
-
\??\c:\hbnbnb.exec:\hbnbnb.exe207⤵
-
\??\c:\nhttbb.exec:\nhttbb.exe208⤵
-
\??\c:\5djjv.exec:\5djjv.exe209⤵
-
\??\c:\ppjjp.exec:\ppjjp.exe210⤵
-
\??\c:\lffrlrf.exec:\lffrlrf.exe211⤵
-
\??\c:\xlxllll.exec:\xlxllll.exe212⤵
-
\??\c:\nttnbn.exec:\nttnbn.exe213⤵
-
\??\c:\hbbbhn.exec:\hbbbhn.exe214⤵
-
\??\c:\jjvvd.exec:\jjvvd.exe215⤵
-
\??\c:\3vjpv.exec:\3vjpv.exe216⤵
-
\??\c:\rllrxff.exec:\rllrxff.exe217⤵
-
\??\c:\9xlxlfl.exec:\9xlxlfl.exe218⤵
-
\??\c:\hbtnbh.exec:\hbtnbh.exe219⤵
-
\??\c:\bhtbnt.exec:\bhtbnt.exe220⤵
-
\??\c:\jdjjp.exec:\jdjjp.exe221⤵
-
\??\c:\vdpdv.exec:\vdpdv.exe222⤵
-
\??\c:\lfxflrf.exec:\lfxflrf.exe223⤵
-
\??\c:\fxfrlxr.exec:\fxfrlxr.exe224⤵
-
\??\c:\bthttb.exec:\bthttb.exe225⤵
-
\??\c:\pjvdj.exec:\pjvdj.exe226⤵
-
\??\c:\djdvv.exec:\djdvv.exe227⤵
-
\??\c:\1ffrxfr.exec:\1ffrxfr.exe228⤵
-
\??\c:\rrfrlrf.exec:\rrfrlrf.exe229⤵
-
\??\c:\5btbht.exec:\5btbht.exe230⤵
-
\??\c:\7bhnnn.exec:\7bhnnn.exe231⤵
-
\??\c:\jdjpv.exec:\jdjpv.exe232⤵
-
\??\c:\vppvp.exec:\vppvp.exe233⤵
-
\??\c:\fxlxfxr.exec:\fxlxfxr.exe234⤵
-
\??\c:\xrlrflr.exec:\xrlrflr.exe235⤵
-
\??\c:\3tbthb.exec:\3tbthb.exe236⤵
-
\??\c:\hbbhnn.exec:\hbbhnn.exe237⤵
-
\??\c:\dvpdj.exec:\dvpdj.exe238⤵
-
\??\c:\vppdj.exec:\vppdj.exe239⤵
-
\??\c:\lrlrrrx.exec:\lrlrrrx.exe240⤵
-
\??\c:\frflxxr.exec:\frflxxr.exe241⤵