Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 19:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
240478081d2027f4c19218bbba872d2d2be8f0d09a74190c49f2266c66c4f936.exe
Resource
win7-20240215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
240478081d2027f4c19218bbba872d2d2be8f0d09a74190c49f2266c66c4f936.exe
-
Size
201KB
-
MD5
9989c66a0a28117c476777fa6245dc88
-
SHA1
b2d9f3e1a0952e889f9e62f255a6286e4ee5b5b8
-
SHA256
240478081d2027f4c19218bbba872d2d2be8f0d09a74190c49f2266c66c4f936
-
SHA512
3d1436769712ad1500dff7f669de4eb6f19d42b78331ac640771081c13731b309dd577bd9c9f1367f4cf7a26cf04948d4e798dc1915fd12fca24b7e8baeec7cd
-
SSDEEP
1536:PvQBeOGtrYSSsrc93UBIfdC67m6AJiqgT4+C2HVM1p6TQpbY:PhOm2sI93UufdC67ciJTU2HVS6P
Malware Config
Signatures
-
Detect Blackmoon payload 49 IoCs
Processes:
resource yara_rule behavioral1/memory/2912-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2452-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2600-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2268-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2848-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1704-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3040-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2492-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1644-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1436-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/332-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1208-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1704-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1812-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1112-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1208-183-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/1056-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1976-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/896-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/616-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/764-253-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/2212-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/312-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/764-306-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/972-338-0x00000000003A0000-0x00000000003C9000-memory.dmp family_blackmoon behavioral1/memory/2420-345-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/2420-339-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-366-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1800-373-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1800-379-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/2420-387-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/1536-397-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/768-424-0x00000000002B0000-0x00000000002D9000-memory.dmp family_blackmoon behavioral1/memory/1800-439-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/1308-446-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/860-464-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/860-466-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/3048-480-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/768-478-0x00000000002B0000-0x00000000002D9000-memory.dmp family_blackmoon behavioral1/memory/2708-501-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2708-508-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/324-520-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/1780-522-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/952-536-0x00000000003A0000-0x00000000003C9000-memory.dmp family_blackmoon behavioral1/memory/2860-558-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon behavioral1/memory/2000-577-0x0000000000220000-0x0000000000249000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 32 IoCs
Processes:
resource yara_rule behavioral1/memory/2912-32-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2644-58-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2452-66-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2740-51-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2624-36-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2912-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2600-23-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2268-6-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2848-15-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1704-99-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3040-86-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2492-82-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1644-103-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1436-113-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/332-123-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1208-172-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1812-207-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1112-211-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1056-228-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1976-158-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/896-141-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/616-132-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2212-263-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/312-254-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2420-339-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2816-366-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1800-373-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1536-397-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1308-446-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/860-464-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2708-501-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1780-522-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
5lxfrxl.exehbnthh.exehbttnb.exeddvdv.exexrlxrfr.exejjjjv.exejdpjv.exe7llrlrx.exenhtnhb.exevpdjd.exelflrrrf.exe3thnbn.exenhnthh.exelfrxxfr.exevjdpp.exe7frxxll.exexxrxrxx.exebtnbtt.exe9ddjd.exe5xlfrxf.exenhthnn.exejdvjj.exe5frxxff.exennhnhn.exejjvvj.exehthbhn.exenhhttn.exevpvvp.exe9xxxffr.exe1hbntn.exejdpdp.exefxxllxr.exe3rflfrf.exehbhtbb.exebthhtb.exepjddd.exe1lfrffl.exerrfrlrl.exehbtbnn.exe3nnbht.exeddvpd.exexrffxrx.exedvjjp.exe7dpdp.exexrxfxff.exe7lfflxf.exetnthtn.exenbnnhh.exerrlxrxf.exerrlflrf.exenhbhnn.exevpvdd.exe5jvdp.exerlxfffr.exepjpdj.exepjvjv.exellxlrfr.exetttnnt.exe7tbhbn.exejdvdv.exe7vpvd.exeffrrxlx.exehhbnbh.exepjjvp.exepid process 2848 5lxfrxl.exe 2600 hbnthh.exe 2912 hbttnb.exe 2624 ddvdv.exe 2740 xrlxrfr.exe 2644 jjjjv.exe 2452 jdpjv.exe 2412 7llrlrx.exe 2492 nhtnhb.exe 3040 vpdjd.exe 1704 lflrrrf.exe 1644 3thnbn.exe 1436 nhnthh.exe 332 lfrxxfr.exe 616 vjdpp.exe 896 7frxxll.exe 1828 xxrxrxx.exe 1976 btnbtt.exe 1208 9ddjd.exe 2024 5xlfrxf.exe 2828 nhthnn.exe 2012 jdvjj.exe 1812 5frxxff.exe 1112 nnhnhn.exe 1504 jjvvj.exe 1056 hthbhn.exe 912 nhhttn.exe 764 vpvvp.exe 312 9xxxffr.exe 2212 1hbntn.exe 308 jdpdp.exe 972 fxxllxr.exe 2252 3rflfrf.exe 2260 hbhtbb.exe 3060 bthhtb.exe 2892 pjddd.exe 2524 1lfrffl.exe 2604 rrfrlrl.exe 2648 hbtbnn.exe 2540 3nnbht.exe 2420 ddvpd.exe 2504 xrffxrx.exe 2052 dvjjp.exe 2520 7dpdp.exe 2816 xrxfxff.exe 1800 7lfflxf.exe 2576 tnthtn.exe 1992 nbnnhh.exe 1536 rrlxrxf.exe 1652 rrlflrf.exe 1820 nhbhnn.exe 768 vpvdd.exe 1284 5jvdp.exe 1028 rlxfffr.exe 1748 pjpdj.exe 1308 pjvjv.exe 1676 llxlrfr.exe 860 tttnnt.exe 3064 7tbhbn.exe 3048 jdvdv.exe 1924 7vpvd.exe 2860 ffrrxlx.exe 1812 hhbnbh.exe 2708 pjjvp.exe -
Processes:
resource yara_rule behavioral1/memory/2912-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2452-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2268-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1704-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3040-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2492-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1644-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1436-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/332-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1208-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1812-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1112-211-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1056-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1976-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/896-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/616-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2212-263-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/312-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2420-339-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-366-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1800-373-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2576-386-0x0000000000220000-0x0000000000249000-memory.dmp upx behavioral1/memory/1536-397-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1308-446-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/860-464-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1536-459-0x0000000000220000-0x0000000000249000-memory.dmp upx behavioral1/memory/2708-501-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1780-522-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
240478081d2027f4c19218bbba872d2d2be8f0d09a74190c49f2266c66c4f936.exe5lxfrxl.exehbnthh.exehbttnb.exeddvdv.exexrlxrfr.exejjjjv.exejdpjv.exe7llrlrx.exenhtnhb.exevpdjd.exelflrrrf.exe3thnbn.exenhnthh.exelfrxxfr.exevjdpp.exedescription pid process target process PID 2268 wrote to memory of 2848 2268 240478081d2027f4c19218bbba872d2d2be8f0d09a74190c49f2266c66c4f936.exe 5lxfrxl.exe PID 2268 wrote to memory of 2848 2268 240478081d2027f4c19218bbba872d2d2be8f0d09a74190c49f2266c66c4f936.exe 5lxfrxl.exe PID 2268 wrote to memory of 2848 2268 240478081d2027f4c19218bbba872d2d2be8f0d09a74190c49f2266c66c4f936.exe 5lxfrxl.exe PID 2268 wrote to memory of 2848 2268 240478081d2027f4c19218bbba872d2d2be8f0d09a74190c49f2266c66c4f936.exe 5lxfrxl.exe PID 2848 wrote to memory of 2600 2848 5lxfrxl.exe hbnthh.exe PID 2848 wrote to memory of 2600 2848 5lxfrxl.exe hbnthh.exe PID 2848 wrote to memory of 2600 2848 5lxfrxl.exe hbnthh.exe PID 2848 wrote to memory of 2600 2848 5lxfrxl.exe hbnthh.exe PID 2600 wrote to memory of 2912 2600 hbnthh.exe hbttnb.exe PID 2600 wrote to memory of 2912 2600 hbnthh.exe hbttnb.exe PID 2600 wrote to memory of 2912 2600 hbnthh.exe hbttnb.exe PID 2600 wrote to memory of 2912 2600 hbnthh.exe hbttnb.exe PID 2912 wrote to memory of 2624 2912 hbttnb.exe ddvdv.exe PID 2912 wrote to memory of 2624 2912 hbttnb.exe ddvdv.exe PID 2912 wrote to memory of 2624 2912 hbttnb.exe ddvdv.exe PID 2912 wrote to memory of 2624 2912 hbttnb.exe ddvdv.exe PID 2624 wrote to memory of 2740 2624 ddvdv.exe xrlxrfr.exe PID 2624 wrote to memory of 2740 2624 ddvdv.exe xrlxrfr.exe PID 2624 wrote to memory of 2740 2624 ddvdv.exe xrlxrfr.exe PID 2624 wrote to memory of 2740 2624 ddvdv.exe xrlxrfr.exe PID 2740 wrote to memory of 2644 2740 xrlxrfr.exe jjjjv.exe PID 2740 wrote to memory of 2644 2740 xrlxrfr.exe jjjjv.exe PID 2740 wrote to memory of 2644 2740 xrlxrfr.exe jjjjv.exe PID 2740 wrote to memory of 2644 2740 xrlxrfr.exe jjjjv.exe PID 2644 wrote to memory of 2452 2644 jjjjv.exe jdpjv.exe PID 2644 wrote to memory of 2452 2644 jjjjv.exe jdpjv.exe PID 2644 wrote to memory of 2452 2644 jjjjv.exe jdpjv.exe PID 2644 wrote to memory of 2452 2644 jjjjv.exe jdpjv.exe PID 2452 wrote to memory of 2412 2452 jdpjv.exe 7llrlrx.exe PID 2452 wrote to memory of 2412 2452 jdpjv.exe 7llrlrx.exe PID 2452 wrote to memory of 2412 2452 jdpjv.exe 7llrlrx.exe PID 2452 wrote to memory of 2412 2452 jdpjv.exe 7llrlrx.exe PID 2412 wrote to memory of 2492 2412 7llrlrx.exe nhtnhb.exe PID 2412 wrote to memory of 2492 2412 7llrlrx.exe nhtnhb.exe PID 2412 wrote to memory of 2492 2412 7llrlrx.exe nhtnhb.exe PID 2412 wrote to memory of 2492 2412 7llrlrx.exe nhtnhb.exe PID 2492 wrote to memory of 3040 2492 nhtnhb.exe vpdjd.exe PID 2492 wrote to memory of 3040 2492 nhtnhb.exe vpdjd.exe PID 2492 wrote to memory of 3040 2492 nhtnhb.exe vpdjd.exe PID 2492 wrote to memory of 3040 2492 nhtnhb.exe vpdjd.exe PID 3040 wrote to memory of 1704 3040 vpdjd.exe lflrrrf.exe PID 3040 wrote to memory of 1704 3040 vpdjd.exe lflrrrf.exe PID 3040 wrote to memory of 1704 3040 vpdjd.exe lflrrrf.exe PID 3040 wrote to memory of 1704 3040 vpdjd.exe lflrrrf.exe PID 1704 wrote to memory of 1644 1704 lflrrrf.exe 3thnbn.exe PID 1704 wrote to memory of 1644 1704 lflrrrf.exe 3thnbn.exe PID 1704 wrote to memory of 1644 1704 lflrrrf.exe 3thnbn.exe PID 1704 wrote to memory of 1644 1704 lflrrrf.exe 3thnbn.exe PID 1644 wrote to memory of 1436 1644 3thnbn.exe nhnthh.exe PID 1644 wrote to memory of 1436 1644 3thnbn.exe nhnthh.exe PID 1644 wrote to memory of 1436 1644 3thnbn.exe nhnthh.exe PID 1644 wrote to memory of 1436 1644 3thnbn.exe nhnthh.exe PID 1436 wrote to memory of 332 1436 nhnthh.exe lfrxxfr.exe PID 1436 wrote to memory of 332 1436 nhnthh.exe lfrxxfr.exe PID 1436 wrote to memory of 332 1436 nhnthh.exe lfrxxfr.exe PID 1436 wrote to memory of 332 1436 nhnthh.exe lfrxxfr.exe PID 332 wrote to memory of 616 332 lfrxxfr.exe vjdpp.exe PID 332 wrote to memory of 616 332 lfrxxfr.exe vjdpp.exe PID 332 wrote to memory of 616 332 lfrxxfr.exe vjdpp.exe PID 332 wrote to memory of 616 332 lfrxxfr.exe vjdpp.exe PID 616 wrote to memory of 896 616 vjdpp.exe 7frxxll.exe PID 616 wrote to memory of 896 616 vjdpp.exe 7frxxll.exe PID 616 wrote to memory of 896 616 vjdpp.exe 7frxxll.exe PID 616 wrote to memory of 896 616 vjdpp.exe 7frxxll.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\240478081d2027f4c19218bbba872d2d2be8f0d09a74190c49f2266c66c4f936.exe"C:\Users\Admin\AppData\Local\Temp\240478081d2027f4c19218bbba872d2d2be8f0d09a74190c49f2266c66c4f936.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\5lxfrxl.exec:\5lxfrxl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbnthh.exec:\hbnthh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbttnb.exec:\hbttnb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddvdv.exec:\ddvdv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrlxrfr.exec:\xrlxrfr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjjjv.exec:\jjjjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdpjv.exec:\jdpjv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7llrlrx.exec:\7llrlrx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhtnhb.exec:\nhtnhb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpdjd.exec:\vpdjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lflrrrf.exec:\lflrrrf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3thnbn.exec:\3thnbn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhnthh.exec:\nhnthh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfrxxfr.exec:\lfrxxfr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjdpp.exec:\vjdpp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7frxxll.exec:\7frxxll.exe17⤵
- Executes dropped EXE
-
\??\c:\xxrxrxx.exec:\xxrxrxx.exe18⤵
- Executes dropped EXE
-
\??\c:\btnbtt.exec:\btnbtt.exe19⤵
- Executes dropped EXE
-
\??\c:\9ddjd.exec:\9ddjd.exe20⤵
- Executes dropped EXE
-
\??\c:\5xlfrxf.exec:\5xlfrxf.exe21⤵
- Executes dropped EXE
-
\??\c:\nhthnn.exec:\nhthnn.exe22⤵
- Executes dropped EXE
-
\??\c:\jdvjj.exec:\jdvjj.exe23⤵
- Executes dropped EXE
-
\??\c:\5frxxff.exec:\5frxxff.exe24⤵
- Executes dropped EXE
-
\??\c:\nnhnhn.exec:\nnhnhn.exe25⤵
- Executes dropped EXE
-
\??\c:\jjvvj.exec:\jjvvj.exe26⤵
- Executes dropped EXE
-
\??\c:\hthbhn.exec:\hthbhn.exe27⤵
- Executes dropped EXE
-
\??\c:\nhhttn.exec:\nhhttn.exe28⤵
- Executes dropped EXE
-
\??\c:\vpvvp.exec:\vpvvp.exe29⤵
- Executes dropped EXE
-
\??\c:\9xxxffr.exec:\9xxxffr.exe30⤵
- Executes dropped EXE
-
\??\c:\1hbntn.exec:\1hbntn.exe31⤵
- Executes dropped EXE
-
\??\c:\jdpdp.exec:\jdpdp.exe32⤵
- Executes dropped EXE
-
\??\c:\fxxllxr.exec:\fxxllxr.exe33⤵
- Executes dropped EXE
-
\??\c:\3rflfrf.exec:\3rflfrf.exe34⤵
- Executes dropped EXE
-
\??\c:\hbhtbb.exec:\hbhtbb.exe35⤵
- Executes dropped EXE
-
\??\c:\bthhtb.exec:\bthhtb.exe36⤵
- Executes dropped EXE
-
\??\c:\pjddd.exec:\pjddd.exe37⤵
- Executes dropped EXE
-
\??\c:\1lfrffl.exec:\1lfrffl.exe38⤵
- Executes dropped EXE
-
\??\c:\rrfrlrl.exec:\rrfrlrl.exe39⤵
- Executes dropped EXE
-
\??\c:\hbtbnn.exec:\hbtbnn.exe40⤵
- Executes dropped EXE
-
\??\c:\3nnbht.exec:\3nnbht.exe41⤵
- Executes dropped EXE
-
\??\c:\ddvpd.exec:\ddvpd.exe42⤵
- Executes dropped EXE
-
\??\c:\xrffxrx.exec:\xrffxrx.exe43⤵
- Executes dropped EXE
-
\??\c:\dvjjp.exec:\dvjjp.exe44⤵
- Executes dropped EXE
-
\??\c:\7dpdp.exec:\7dpdp.exe45⤵
- Executes dropped EXE
-
\??\c:\xrxfxff.exec:\xrxfxff.exe46⤵
- Executes dropped EXE
-
\??\c:\7lfflxf.exec:\7lfflxf.exe47⤵
- Executes dropped EXE
-
\??\c:\tnthtn.exec:\tnthtn.exe48⤵
- Executes dropped EXE
-
\??\c:\nbnnhh.exec:\nbnnhh.exe49⤵
- Executes dropped EXE
-
\??\c:\rrlxrxf.exec:\rrlxrxf.exe50⤵
- Executes dropped EXE
-
\??\c:\rrlflrf.exec:\rrlflrf.exe51⤵
- Executes dropped EXE
-
\??\c:\nhbhnn.exec:\nhbhnn.exe52⤵
- Executes dropped EXE
-
\??\c:\vpvdd.exec:\vpvdd.exe53⤵
- Executes dropped EXE
-
\??\c:\5jvdp.exec:\5jvdp.exe54⤵
- Executes dropped EXE
-
\??\c:\rlxfffr.exec:\rlxfffr.exe55⤵
- Executes dropped EXE
-
\??\c:\pjpdj.exec:\pjpdj.exe56⤵
- Executes dropped EXE
-
\??\c:\pjvjv.exec:\pjvjv.exe57⤵
- Executes dropped EXE
-
\??\c:\llxlrfr.exec:\llxlrfr.exe58⤵
- Executes dropped EXE
-
\??\c:\tttnnt.exec:\tttnnt.exe59⤵
- Executes dropped EXE
-
\??\c:\7tbhbn.exec:\7tbhbn.exe60⤵
- Executes dropped EXE
-
\??\c:\jdvdv.exec:\jdvdv.exe61⤵
- Executes dropped EXE
-
\??\c:\7vpvd.exec:\7vpvd.exe62⤵
- Executes dropped EXE
-
\??\c:\ffrrxlx.exec:\ffrrxlx.exe63⤵
- Executes dropped EXE
-
\??\c:\hhbnbh.exec:\hhbnbh.exe64⤵
- Executes dropped EXE
-
\??\c:\pjjvp.exec:\pjjvp.exe65⤵
- Executes dropped EXE
-
\??\c:\pjvjp.exec:\pjvjp.exe66⤵
-
\??\c:\9fflrfl.exec:\9fflrfl.exe67⤵
-
\??\c:\9ttbtb.exec:\9ttbtb.exe68⤵
-
\??\c:\nbtbtb.exec:\nbtbtb.exe69⤵
-
\??\c:\ppdpd.exec:\ppdpd.exe70⤵
-
\??\c:\frflfrx.exec:\frflfrx.exe71⤵
-
\??\c:\fxlrlrx.exec:\fxlrlrx.exe72⤵
-
\??\c:\tnbhtt.exec:\tnbhtt.exe73⤵
-
\??\c:\vpdpj.exec:\vpdpj.exe74⤵
-
\??\c:\1frrxlx.exec:\1frrxlx.exe75⤵
-
\??\c:\9xffflf.exec:\9xffflf.exe76⤵
-
\??\c:\1htbhn.exec:\1htbhn.exe77⤵
-
\??\c:\vpjjp.exec:\vpjjp.exe78⤵
-
\??\c:\7xrfflr.exec:\7xrfflr.exe79⤵
-
\??\c:\tnhhtt.exec:\tnhhtt.exe80⤵
-
\??\c:\jdvdv.exec:\jdvdv.exe81⤵
-
\??\c:\3pjjv.exec:\3pjjv.exe82⤵
-
\??\c:\nbhbhb.exec:\nbhbhb.exe83⤵
-
\??\c:\nhbhnn.exec:\nhbhnn.exe84⤵
-
\??\c:\lfllrlr.exec:\lfllrlr.exe85⤵
-
\??\c:\btbbhn.exec:\btbbhn.exe86⤵
-
\??\c:\5rlxxlr.exec:\5rlxxlr.exe87⤵
-
\??\c:\nbhhnn.exec:\nbhhnn.exe88⤵
-
\??\c:\dpddj.exec:\dpddj.exe89⤵
-
\??\c:\9fflrrx.exec:\9fflrrx.exe90⤵
-
\??\c:\1hbttt.exec:\1hbttt.exe91⤵
-
\??\c:\9tntnt.exec:\9tntnt.exe92⤵
-
\??\c:\pdjjd.exec:\pdjjd.exe93⤵
-
\??\c:\xlrrlll.exec:\xlrrlll.exe94⤵
-
\??\c:\bbnntb.exec:\bbnntb.exe95⤵
-
\??\c:\5jdvj.exec:\5jdvj.exe96⤵
-
\??\c:\lfxflrx.exec:\lfxflrx.exe97⤵
-
\??\c:\hbnnbh.exec:\hbnnbh.exe98⤵
-
\??\c:\7flrxxl.exec:\7flrxxl.exe99⤵
-
\??\c:\3hhnnn.exec:\3hhnnn.exe100⤵
-
\??\c:\rlrrflx.exec:\rlrrflx.exe101⤵
-
\??\c:\btbhnb.exec:\btbhnb.exe102⤵
-
\??\c:\dvdvj.exec:\dvdvj.exe103⤵
-
\??\c:\thttnn.exec:\thttnn.exe104⤵
-
\??\c:\9htthh.exec:\9htthh.exe105⤵
-
\??\c:\pjpvd.exec:\pjpvd.exe106⤵
-
\??\c:\thhnbh.exec:\thhnbh.exe107⤵
-
\??\c:\7thbbt.exec:\7thbbt.exe108⤵
-
\??\c:\7jpdd.exec:\7jpdd.exe109⤵
-
\??\c:\3xrlfxx.exec:\3xrlfxx.exe110⤵
-
\??\c:\lxxxxrx.exec:\lxxxxrx.exe111⤵
-
\??\c:\jdppd.exec:\jdppd.exe112⤵
-
\??\c:\dpvpp.exec:\dpvpp.exe113⤵
-
\??\c:\rflflrf.exec:\rflflrf.exe114⤵
-
\??\c:\bnnnbb.exec:\bnnnbb.exe115⤵
-
\??\c:\dvjdj.exec:\dvjdj.exe116⤵
-
\??\c:\ddvvj.exec:\ddvvj.exe117⤵
-
\??\c:\lfrrrrx.exec:\lfrrrrx.exe118⤵
-
\??\c:\lfrxxxx.exec:\lfrxxxx.exe119⤵
-
\??\c:\9hbbtb.exec:\9hbbtb.exe120⤵
-
\??\c:\vpdvp.exec:\vpdvp.exe121⤵
-
\??\c:\vjpvv.exec:\vjpvv.exe122⤵
-
\??\c:\3xfrxxx.exec:\3xfrxxx.exe123⤵
-
\??\c:\nhnthh.exec:\nhnthh.exe124⤵
-
\??\c:\bthhtb.exec:\bthhtb.exe125⤵
-
\??\c:\5rflffl.exec:\5rflffl.exe126⤵
-
\??\c:\9rlllxx.exec:\9rlllxx.exe127⤵
-
\??\c:\9pvdd.exec:\9pvdd.exe128⤵
-
\??\c:\dpppd.exec:\dpppd.exe129⤵
-
\??\c:\3xrflfl.exec:\3xrflfl.exe130⤵
-
\??\c:\hhhntt.exec:\hhhntt.exe131⤵
-
\??\c:\jdjjj.exec:\jdjjj.exe132⤵
-
\??\c:\3vjjj.exec:\3vjjj.exe133⤵
-
\??\c:\lxflxxf.exec:\lxflxxf.exe134⤵
-
\??\c:\lflxfxf.exec:\lflxfxf.exe135⤵
-
\??\c:\btttbb.exec:\btttbb.exe136⤵
-
\??\c:\3pvpv.exec:\3pvpv.exe137⤵
-
\??\c:\rfxfllr.exec:\rfxfllr.exe138⤵
-
\??\c:\xlxflfl.exec:\xlxflfl.exe139⤵
-
\??\c:\5tnbbh.exec:\5tnbbh.exe140⤵
-
\??\c:\nnbhtt.exec:\nnbhtt.exe141⤵
-
\??\c:\1pjpv.exec:\1pjpv.exe142⤵
-
\??\c:\pdjpv.exec:\pdjpv.exe143⤵
-
\??\c:\5frxffl.exec:\5frxffl.exe144⤵
-
\??\c:\hththh.exec:\hththh.exe145⤵
-
\??\c:\bntbnh.exec:\bntbnh.exe146⤵
-
\??\c:\dvjpd.exec:\dvjpd.exe147⤵
-
\??\c:\xlxrxfl.exec:\xlxrxfl.exe148⤵
-
\??\c:\1lxxxxl.exec:\1lxxxxl.exe149⤵
-
\??\c:\1nhhnb.exec:\1nhhnb.exe150⤵
-
\??\c:\bnbtbh.exec:\bnbtbh.exe151⤵
-
\??\c:\dpdvv.exec:\dpdvv.exe152⤵
-
\??\c:\3dvjj.exec:\3dvjj.exe153⤵
-
\??\c:\xxfrllx.exec:\xxfrllx.exe154⤵
-
\??\c:\lrrlxll.exec:\lrrlxll.exe155⤵
-
\??\c:\nbthnn.exec:\nbthnn.exe156⤵
-
\??\c:\9pvdv.exec:\9pvdv.exe157⤵
-
\??\c:\1pjpp.exec:\1pjpp.exe158⤵
-
\??\c:\5rxfxrx.exec:\5rxfxrx.exe159⤵
-
\??\c:\9xllllr.exec:\9xllllr.exe160⤵
-
\??\c:\thhntt.exec:\thhntt.exe161⤵
-
\??\c:\ddvdj.exec:\ddvdj.exe162⤵
-
\??\c:\dvjpp.exec:\dvjpp.exe163⤵
-
\??\c:\rlxxrxf.exec:\rlxxrxf.exe164⤵
-
\??\c:\rfflxrx.exec:\rfflxrx.exe165⤵
-
\??\c:\htbhnn.exec:\htbhnn.exe166⤵
-
\??\c:\btnbnb.exec:\btnbnb.exe167⤵
-
\??\c:\dpdjp.exec:\dpdjp.exe168⤵
-
\??\c:\jvjjp.exec:\jvjjp.exe169⤵
-
\??\c:\lxlllfl.exec:\lxlllfl.exe170⤵
-
\??\c:\3tbhbh.exec:\3tbhbh.exe171⤵
-
\??\c:\thtbnn.exec:\thtbnn.exe172⤵
-
\??\c:\jvjdp.exec:\jvjdp.exe173⤵
-
\??\c:\vjvpv.exec:\vjvpv.exe174⤵
-
\??\c:\lflrxxf.exec:\lflrxxf.exe175⤵
-
\??\c:\5tntnb.exec:\5tntnb.exe176⤵
-
\??\c:\1nbbbn.exec:\1nbbbn.exe177⤵
-
\??\c:\jdvdj.exec:\jdvdj.exe178⤵
-
\??\c:\dpddd.exec:\dpddd.exe179⤵
-
\??\c:\fxrrxxf.exec:\fxrrxxf.exe180⤵
-
\??\c:\nhttnn.exec:\nhttnn.exe181⤵
-
\??\c:\1pddj.exec:\1pddj.exe182⤵
-
\??\c:\jvjjj.exec:\jvjjj.exe183⤵
-
\??\c:\3lrllfx.exec:\3lrllfx.exe184⤵
-
\??\c:\xrrlrlr.exec:\xrrlrlr.exe185⤵
-
\??\c:\btbhtn.exec:\btbhtn.exe186⤵
-
\??\c:\jvdvd.exec:\jvdvd.exe187⤵
-
\??\c:\dvvvp.exec:\dvvvp.exe188⤵
-
\??\c:\jdjpp.exec:\jdjpp.exe189⤵
-
\??\c:\xlffrrr.exec:\xlffrrr.exe190⤵
-
\??\c:\tnhtnb.exec:\tnhtnb.exe191⤵
-
\??\c:\bnntbb.exec:\bnntbb.exe192⤵
-
\??\c:\5pjjv.exec:\5pjjv.exe193⤵
-
\??\c:\jvvdv.exec:\jvvdv.exe194⤵
-
\??\c:\rfrrfff.exec:\rfrrfff.exe195⤵
-
\??\c:\htbhnh.exec:\htbhnh.exe196⤵
-
\??\c:\5bhbbt.exec:\5bhbbt.exe197⤵
-
\??\c:\pjvpd.exec:\pjvpd.exe198⤵
-
\??\c:\7vjjj.exec:\7vjjj.exe199⤵
-
\??\c:\xlxllrf.exec:\xlxllrf.exe200⤵
-
\??\c:\5rxflrf.exec:\5rxflrf.exe201⤵
-
\??\c:\htbbbt.exec:\htbbbt.exe202⤵
-
\??\c:\9jddv.exec:\9jddv.exe203⤵
-
\??\c:\7vvvv.exec:\7vvvv.exe204⤵
-
\??\c:\xrxxxxf.exec:\xrxxxxf.exe205⤵
-
\??\c:\ffrllrx.exec:\ffrllrx.exe206⤵
-
\??\c:\nbnnnn.exec:\nbnnnn.exe207⤵
-
\??\c:\7bttbh.exec:\7bttbh.exe208⤵
-
\??\c:\jdpjv.exec:\jdpjv.exe209⤵
-
\??\c:\dvdvj.exec:\dvdvj.exe210⤵
-
\??\c:\fxxflxf.exec:\fxxflxf.exe211⤵
-
\??\c:\3fxlflx.exec:\3fxlflx.exe212⤵
-
\??\c:\tnhhnt.exec:\tnhhnt.exe213⤵
-
\??\c:\vpddj.exec:\vpddj.exe214⤵
-
\??\c:\jpdvp.exec:\jpdvp.exe215⤵
-
\??\c:\fxxlrxl.exec:\fxxlrxl.exe216⤵
-
\??\c:\bbthbt.exec:\bbthbt.exe217⤵
-
\??\c:\vpjpp.exec:\vpjpp.exe218⤵
-
\??\c:\3fxlrrx.exec:\3fxlrrx.exe219⤵
-
\??\c:\xrxfrxl.exec:\xrxfrxl.exe220⤵
-
\??\c:\3nbnbn.exec:\3nbnbn.exe221⤵
-
\??\c:\7vvpd.exec:\7vvpd.exe222⤵
-
\??\c:\jdppd.exec:\jdppd.exe223⤵
-
\??\c:\xrffflr.exec:\xrffflr.exe224⤵
-
\??\c:\tnbtth.exec:\tnbtth.exe225⤵
-
\??\c:\nhnhbn.exec:\nhnhbn.exe226⤵
-
\??\c:\vdpvp.exec:\vdpvp.exe227⤵
-
\??\c:\xrfrfrr.exec:\xrfrfrr.exe228⤵
-
\??\c:\ffxflrx.exec:\ffxflrx.exe229⤵
-
\??\c:\7nbhnb.exec:\7nbhnb.exe230⤵
-
\??\c:\lfxxrrf.exec:\lfxxrrf.exe231⤵
-
\??\c:\5rllrrr.exec:\5rllrrr.exe232⤵
-
\??\c:\3thnbb.exec:\3thnbb.exe233⤵
-
\??\c:\nbnhtt.exec:\nbnhtt.exe234⤵
-
\??\c:\jdpdj.exec:\jdpdj.exe235⤵
-
\??\c:\pdppd.exec:\pdppd.exe236⤵
-
\??\c:\llxlfff.exec:\llxlfff.exe237⤵
-
\??\c:\xlflxfl.exec:\xlflxfl.exe238⤵
-
\??\c:\nhttbn.exec:\nhttbn.exe239⤵
-
\??\c:\jdjjp.exec:\jdjjp.exe240⤵
-
\??\c:\dvjjj.exec:\dvjjj.exe241⤵