Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 22:28
Behavioral task
behavioral1
Sample
98bf7edcecd3592c8b0a9d1e1d4f0be48d8a7379c6a3946603b3557240b730e1.exe
Resource
win7-20240419-en
General
-
Target
98bf7edcecd3592c8b0a9d1e1d4f0be48d8a7379c6a3946603b3557240b730e1.exe
-
Size
211KB
-
MD5
071354ad0f9aabe117106f992bdb3290
-
SHA1
b86a84ca6736597432b10b1737715da5b7bf6fd0
-
SHA256
98bf7edcecd3592c8b0a9d1e1d4f0be48d8a7379c6a3946603b3557240b730e1
-
SHA512
80cf7a8e1c251b282ce03540ee7aec1a3c7bb93cbec177bbf44fbd3b5397e4d7d4714355e5b43705d6b0e98cfcfc4514d9d91629b1d827eca3f5a0dadcdc8625
-
SSDEEP
6144:Hcm4FmowdHoSrXZf8l/ubPzYNLPf4t+l2:V4wFHoSBK/ubLcfI
Malware Config
Signatures
-
Detect Blackmoon payload 38 IoCs
Processes:
resource yara_rule behavioral1/memory/1680-7-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/3036-11-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/3028-26-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2344-29-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2736-44-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2924-53-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2636-64-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2264-66-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2264-73-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2512-83-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2184-91-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2820-108-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2860-118-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1152-127-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1724-144-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/760-153-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1800-169-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1996-178-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2940-187-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/604-205-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1720-222-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/688-232-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2220-307-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2072-327-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2568-385-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1804-399-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/792-418-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1620-425-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/756-458-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/580-502-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1744-510-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2400-523-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/632-536-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/632-543-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1652-767-0x00000000003C0000-0x00000000003F4000-memory.dmp family_blackmoon behavioral1/memory/2080-855-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1664-892-0x0000000000220000-0x0000000000254000-memory.dmp family_blackmoon behavioral1/memory/1796-1005-0x0000000000220000-0x0000000000254000-memory.dmp family_blackmoon -
Malware Dropper & Backdoor - Berbew 64 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule behavioral1/memory/1680-0-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew behavioral1/memory/1680-7-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\bthbbb.exe family_berbew behavioral1/memory/3036-11-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\pvjvp.exe family_berbew C:\5hhtnh.exe family_berbew behavioral1/memory/3028-26-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew behavioral1/memory/2344-29-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew \??\c:\vjddp.exe family_berbew C:\1xlfrxf.exe family_berbew behavioral1/memory/2736-44-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew behavioral1/memory/2924-45-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew behavioral1/memory/2924-53-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\hbntbb.exe family_berbew behavioral1/memory/2636-55-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\jjvvv.exe family_berbew behavioral1/memory/2636-64-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew behavioral1/memory/2264-66-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\xlllrxf.exe family_berbew behavioral1/memory/2264-73-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\hbntbh.exe family_berbew behavioral1/memory/2512-83-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\lfrxlrf.exe family_berbew behavioral1/memory/2184-91-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew \??\c:\rlfllrx.exe family_berbew C:\hbtbtt.exe family_berbew behavioral1/memory/2820-108-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\ddppv.exe family_berbew behavioral1/memory/2860-118-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew behavioral1/memory/1152-127-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\fxllllx.exe family_berbew C:\9dpdj.exe family_berbew behavioral1/memory/1724-144-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\vvpdp.exe family_berbew C:\rlffrxr.exe family_berbew behavioral1/memory/760-153-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\dvjpv.exe family_berbew behavioral1/memory/1800-169-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\lrlxlrf.exe family_berbew behavioral1/memory/1996-178-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\hbthnn.exe family_berbew behavioral1/memory/2940-187-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\1lrrlxl.exe family_berbew C:\3hbhtb.exe family_berbew behavioral1/memory/604-197-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew \??\c:\pjvpd.exe family_berbew behavioral1/memory/604-205-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\jjvvd.exe family_berbew behavioral1/memory/1720-222-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\tntbht.exe family_berbew behavioral1/memory/688-232-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\vdvpv.exe family_berbew behavioral1/memory/688-227-0x00000000001B0000-0x00000000001E4000-memory.dmp family_berbew behavioral1/memory/2292-234-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\thbbhh.exe family_berbew C:\nntbth.exe family_berbew C:\jdppv.exe family_berbew C:\fflfrxr.exe family_berbew C:\dvvdv.exe family_berbew behavioral1/memory/1592-275-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew C:\jpvjd.exe family_berbew behavioral1/memory/2220-303-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew behavioral1/memory/2220-307-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew behavioral1/memory/2176-314-0x0000000000400000-0x0000000000434000-memory.dmp family_berbew -
Executes dropped EXE 64 IoCs
Processes:
bthbbb.exepvjvp.exe5hhtnh.exevjddp.exe1xlfrxf.exehbntbb.exejjvvv.exexlllrxf.exehbntbh.exelfrxlrf.exerlfllrx.exehbtbtt.exeddppv.exefxllllx.exe9dpdj.exevvpdp.exerlffrxr.exedvjpv.exelrlxlrf.exehbthnn.exe1lrrlxl.exe3hbhtb.exepjvpd.exejjvvd.exetntbht.exevdvpv.exethbbhh.exenntbth.exejdppv.exefflfrxr.exedvvdv.exejpvjd.exefxlxlrx.exenbnntt.exe9djpj.exe1frxxlr.exetnbhtn.exejjddj.exe1xrxlll.exehtbhnn.exe3thhhh.exe1pjjj.exe3lxfllx.exefflfflf.exe7nbnbb.exe9tnthh.exe5jvvd.exe7lfflrf.exehntnnh.exejdvdd.exeddppd.exefrflfxr.exehbnnbb.exehbtnnt.exe9vdjp.exe7rflrxl.exexrlxrxl.exehbtbtb.exepdpvp.exevpjpv.exe1lrrxff.exefxlrlrl.exenhtnbb.exevjpvj.exepid process 3036 bthbbb.exe 3028 pvjvp.exe 2344 5hhtnh.exe 2736 vjddp.exe 2924 1xlfrxf.exe 2636 hbntbb.exe 2264 jjvvv.exe 2512 xlllrxf.exe 2184 hbntbh.exe 3012 lfrxlrf.exe 2820 rlfllrx.exe 2860 hbtbtt.exe 1152 ddppv.exe 1628 fxllllx.exe 1724 9dpdj.exe 760 vvpdp.exe 2588 rlffrxr.exe 1800 dvjpv.exe 1996 lrlxlrf.exe 2940 hbthnn.exe 264 1lrrlxl.exe 604 3hbhtb.exe 1824 pjvpd.exe 1720 jjvvd.exe 688 tntbht.exe 2292 vdvpv.exe 1976 thbbhh.exe 1140 nntbth.exe 2208 jdppv.exe 556 fflfrxr.exe 1592 dvvdv.exe 2360 jpvjd.exe 1708 fxlxlrx.exe 1848 nbnntt.exe 2220 9djpj.exe 2176 1frxxlr.exe 2072 tnbhtn.exe 1712 jjddj.exe 2704 1xrxlll.exe 2624 htbhnn.exe 2652 3thhhh.exe 2924 1pjjj.exe 2540 3lxfllx.exe 2564 fflfflf.exe 2560 7nbnbb.exe 3000 9tnthh.exe 2568 5jvvd.exe 1804 7lfflrf.exe 2828 hntnnh.exe 2888 jdvdd.exe 792 ddppd.exe 1620 frflfxr.exe 1652 hbnnbb.exe 1792 hbtnnt.exe 1600 9vdjp.exe 1416 7rflrxl.exe 756 xrlxrxl.exe 1188 hbtbtb.exe 2472 pdpvp.exe 2948 vpjpv.exe 2164 1lrrxff.exe 668 fxlrlrl.exe 1476 nhtnbb.exe 580 vjpvj.exe -
Processes:
resource yara_rule behavioral1/memory/1680-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/1680-7-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\bthbbb.exe upx behavioral1/memory/3036-11-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\pvjvp.exe upx C:\5hhtnh.exe upx behavioral1/memory/3028-26-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2344-29-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\vjddp.exe upx C:\1xlfrxf.exe upx behavioral1/memory/2736-44-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2924-45-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2924-53-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\hbntbb.exe upx behavioral1/memory/2636-55-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\jjvvv.exe upx behavioral1/memory/2636-64-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2264-66-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\xlllrxf.exe upx behavioral1/memory/2264-73-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\hbntbh.exe upx behavioral1/memory/2512-83-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\lfrxlrf.exe upx behavioral1/memory/2184-91-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\rlfllrx.exe upx C:\hbtbtt.exe upx behavioral1/memory/2820-108-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\ddppv.exe upx behavioral1/memory/2860-118-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/1152-127-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\fxllllx.exe upx C:\9dpdj.exe upx behavioral1/memory/1724-144-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\vvpdp.exe upx C:\rlffrxr.exe upx behavioral1/memory/760-153-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\dvjpv.exe upx behavioral1/memory/1800-169-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\lrlxlrf.exe upx behavioral1/memory/1996-178-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\hbthnn.exe upx behavioral1/memory/2940-187-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\1lrrlxl.exe upx C:\3hbhtb.exe upx behavioral1/memory/604-197-0x0000000000400000-0x0000000000434000-memory.dmp upx \??\c:\pjvpd.exe upx behavioral1/memory/604-205-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\jjvvd.exe upx behavioral1/memory/1720-222-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\tntbht.exe upx behavioral1/memory/688-232-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\vdvpv.exe upx behavioral1/memory/2292-234-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\thbbhh.exe upx C:\nntbth.exe upx C:\jdppv.exe upx C:\fflfrxr.exe upx C:\dvvdv.exe upx behavioral1/memory/1592-275-0x0000000000400000-0x0000000000434000-memory.dmp upx C:\jpvjd.exe upx behavioral1/memory/2220-303-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2220-307-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2176-314-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/2072-327-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
98bf7edcecd3592c8b0a9d1e1d4f0be48d8a7379c6a3946603b3557240b730e1.exebthbbb.exepvjvp.exe5hhtnh.exevjddp.exe1xlfrxf.exehbntbb.exejjvvv.exexlllrxf.exehbntbh.exelfrxlrf.exerlfllrx.exehbtbtt.exeddppv.exefxllllx.exe9dpdj.exedescription pid process target process PID 1680 wrote to memory of 3036 1680 98bf7edcecd3592c8b0a9d1e1d4f0be48d8a7379c6a3946603b3557240b730e1.exe bthbbb.exe PID 1680 wrote to memory of 3036 1680 98bf7edcecd3592c8b0a9d1e1d4f0be48d8a7379c6a3946603b3557240b730e1.exe bthbbb.exe PID 1680 wrote to memory of 3036 1680 98bf7edcecd3592c8b0a9d1e1d4f0be48d8a7379c6a3946603b3557240b730e1.exe bthbbb.exe PID 1680 wrote to memory of 3036 1680 98bf7edcecd3592c8b0a9d1e1d4f0be48d8a7379c6a3946603b3557240b730e1.exe bthbbb.exe PID 3036 wrote to memory of 3028 3036 bthbbb.exe pvjvp.exe PID 3036 wrote to memory of 3028 3036 bthbbb.exe pvjvp.exe PID 3036 wrote to memory of 3028 3036 bthbbb.exe pvjvp.exe PID 3036 wrote to memory of 3028 3036 bthbbb.exe pvjvp.exe PID 3028 wrote to memory of 2344 3028 pvjvp.exe 5hhtnh.exe PID 3028 wrote to memory of 2344 3028 pvjvp.exe 5hhtnh.exe PID 3028 wrote to memory of 2344 3028 pvjvp.exe 5hhtnh.exe PID 3028 wrote to memory of 2344 3028 pvjvp.exe 5hhtnh.exe PID 2344 wrote to memory of 2736 2344 5hhtnh.exe vjddp.exe PID 2344 wrote to memory of 2736 2344 5hhtnh.exe vjddp.exe PID 2344 wrote to memory of 2736 2344 5hhtnh.exe vjddp.exe PID 2344 wrote to memory of 2736 2344 5hhtnh.exe vjddp.exe PID 2736 wrote to memory of 2924 2736 vjddp.exe 1xlfrxf.exe PID 2736 wrote to memory of 2924 2736 vjddp.exe 1xlfrxf.exe PID 2736 wrote to memory of 2924 2736 vjddp.exe 1xlfrxf.exe PID 2736 wrote to memory of 2924 2736 vjddp.exe 1xlfrxf.exe PID 2924 wrote to memory of 2636 2924 1xlfrxf.exe hbntbb.exe PID 2924 wrote to memory of 2636 2924 1xlfrxf.exe hbntbb.exe PID 2924 wrote to memory of 2636 2924 1xlfrxf.exe hbntbb.exe PID 2924 wrote to memory of 2636 2924 1xlfrxf.exe hbntbb.exe PID 2636 wrote to memory of 2264 2636 hbntbb.exe jjvvv.exe PID 2636 wrote to memory of 2264 2636 hbntbb.exe jjvvv.exe PID 2636 wrote to memory of 2264 2636 hbntbb.exe jjvvv.exe PID 2636 wrote to memory of 2264 2636 hbntbb.exe jjvvv.exe PID 2264 wrote to memory of 2512 2264 jjvvv.exe xlllrxf.exe PID 2264 wrote to memory of 2512 2264 jjvvv.exe xlllrxf.exe PID 2264 wrote to memory of 2512 2264 jjvvv.exe xlllrxf.exe PID 2264 wrote to memory of 2512 2264 jjvvv.exe xlllrxf.exe PID 2512 wrote to memory of 2184 2512 xlllrxf.exe hbntbh.exe PID 2512 wrote to memory of 2184 2512 xlllrxf.exe hbntbh.exe PID 2512 wrote to memory of 2184 2512 xlllrxf.exe hbntbh.exe PID 2512 wrote to memory of 2184 2512 xlllrxf.exe hbntbh.exe PID 2184 wrote to memory of 3012 2184 hbntbh.exe lfrxlrf.exe PID 2184 wrote to memory of 3012 2184 hbntbh.exe lfrxlrf.exe PID 2184 wrote to memory of 3012 2184 hbntbh.exe lfrxlrf.exe PID 2184 wrote to memory of 3012 2184 hbntbh.exe lfrxlrf.exe PID 3012 wrote to memory of 2820 3012 lfrxlrf.exe rlfllrx.exe PID 3012 wrote to memory of 2820 3012 lfrxlrf.exe rlfllrx.exe PID 3012 wrote to memory of 2820 3012 lfrxlrf.exe rlfllrx.exe PID 3012 wrote to memory of 2820 3012 lfrxlrf.exe rlfllrx.exe PID 2820 wrote to memory of 2860 2820 rlfllrx.exe hbtbtt.exe PID 2820 wrote to memory of 2860 2820 rlfllrx.exe hbtbtt.exe PID 2820 wrote to memory of 2860 2820 rlfllrx.exe hbtbtt.exe PID 2820 wrote to memory of 2860 2820 rlfllrx.exe hbtbtt.exe PID 2860 wrote to memory of 1152 2860 hbtbtt.exe ddppv.exe PID 2860 wrote to memory of 1152 2860 hbtbtt.exe ddppv.exe PID 2860 wrote to memory of 1152 2860 hbtbtt.exe ddppv.exe PID 2860 wrote to memory of 1152 2860 hbtbtt.exe ddppv.exe PID 1152 wrote to memory of 1628 1152 ddppv.exe fxllllx.exe PID 1152 wrote to memory of 1628 1152 ddppv.exe fxllllx.exe PID 1152 wrote to memory of 1628 1152 ddppv.exe fxllllx.exe PID 1152 wrote to memory of 1628 1152 ddppv.exe fxllllx.exe PID 1628 wrote to memory of 1724 1628 fxllllx.exe 9dpdj.exe PID 1628 wrote to memory of 1724 1628 fxllllx.exe 9dpdj.exe PID 1628 wrote to memory of 1724 1628 fxllllx.exe 9dpdj.exe PID 1628 wrote to memory of 1724 1628 fxllllx.exe 9dpdj.exe PID 1724 wrote to memory of 760 1724 9dpdj.exe vvpdp.exe PID 1724 wrote to memory of 760 1724 9dpdj.exe vvpdp.exe PID 1724 wrote to memory of 760 1724 9dpdj.exe vvpdp.exe PID 1724 wrote to memory of 760 1724 9dpdj.exe vvpdp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\98bf7edcecd3592c8b0a9d1e1d4f0be48d8a7379c6a3946603b3557240b730e1.exe"C:\Users\Admin\AppData\Local\Temp\98bf7edcecd3592c8b0a9d1e1d4f0be48d8a7379c6a3946603b3557240b730e1.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\bthbbb.exec:\bthbbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvjvp.exec:\pvjvp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5hhtnh.exec:\5hhtnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjddp.exec:\vjddp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1xlfrxf.exec:\1xlfrxf.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbntbb.exec:\hbntbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjvvv.exec:\jjvvv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlllrxf.exec:\xlllrxf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbntbh.exec:\hbntbh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfrxlrf.exec:\lfrxlrf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlfllrx.exec:\rlfllrx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbtbtt.exec:\hbtbtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddppv.exec:\ddppv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxllllx.exec:\fxllllx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9dpdj.exec:\9dpdj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvpdp.exec:\vvpdp.exe17⤵
- Executes dropped EXE
-
\??\c:\rlffrxr.exec:\rlffrxr.exe18⤵
- Executes dropped EXE
-
\??\c:\dvjpv.exec:\dvjpv.exe19⤵
- Executes dropped EXE
-
\??\c:\lrlxlrf.exec:\lrlxlrf.exe20⤵
- Executes dropped EXE
-
\??\c:\hbthnn.exec:\hbthnn.exe21⤵
- Executes dropped EXE
-
\??\c:\1lrrlxl.exec:\1lrrlxl.exe22⤵
- Executes dropped EXE
-
\??\c:\3hbhtb.exec:\3hbhtb.exe23⤵
- Executes dropped EXE
-
\??\c:\pjvpd.exec:\pjvpd.exe24⤵
- Executes dropped EXE
-
\??\c:\jjvvd.exec:\jjvvd.exe25⤵
- Executes dropped EXE
-
\??\c:\tntbht.exec:\tntbht.exe26⤵
- Executes dropped EXE
-
\??\c:\vdvpv.exec:\vdvpv.exe27⤵
- Executes dropped EXE
-
\??\c:\thbbhh.exec:\thbbhh.exe28⤵
- Executes dropped EXE
-
\??\c:\nntbth.exec:\nntbth.exe29⤵
- Executes dropped EXE
-
\??\c:\jdppv.exec:\jdppv.exe30⤵
- Executes dropped EXE
-
\??\c:\fflfrxr.exec:\fflfrxr.exe31⤵
- Executes dropped EXE
-
\??\c:\dvvdv.exec:\dvvdv.exe32⤵
- Executes dropped EXE
-
\??\c:\jpvjd.exec:\jpvjd.exe33⤵
- Executes dropped EXE
-
\??\c:\fxlxlrx.exec:\fxlxlrx.exe34⤵
- Executes dropped EXE
-
\??\c:\nbnntt.exec:\nbnntt.exe35⤵
- Executes dropped EXE
-
\??\c:\9djpj.exec:\9djpj.exe36⤵
- Executes dropped EXE
-
\??\c:\pppjv.exec:\pppjv.exe37⤵
-
\??\c:\1frxxlr.exec:\1frxxlr.exe38⤵
- Executes dropped EXE
-
\??\c:\tnbhtn.exec:\tnbhtn.exe39⤵
- Executes dropped EXE
-
\??\c:\jjddj.exec:\jjddj.exe40⤵
- Executes dropped EXE
-
\??\c:\1xrxlll.exec:\1xrxlll.exe41⤵
- Executes dropped EXE
-
\??\c:\htbhnn.exec:\htbhnn.exe42⤵
- Executes dropped EXE
-
\??\c:\3thhhh.exec:\3thhhh.exe43⤵
- Executes dropped EXE
-
\??\c:\1pjjj.exec:\1pjjj.exe44⤵
- Executes dropped EXE
-
\??\c:\3lxfllx.exec:\3lxfllx.exe45⤵
- Executes dropped EXE
-
\??\c:\fflfflf.exec:\fflfflf.exe46⤵
- Executes dropped EXE
-
\??\c:\7nbnbb.exec:\7nbnbb.exe47⤵
- Executes dropped EXE
-
\??\c:\9tnthh.exec:\9tnthh.exe48⤵
- Executes dropped EXE
-
\??\c:\5jvvd.exec:\5jvvd.exe49⤵
- Executes dropped EXE
-
\??\c:\7lfflrf.exec:\7lfflrf.exe50⤵
- Executes dropped EXE
-
\??\c:\hntnnh.exec:\hntnnh.exe51⤵
- Executes dropped EXE
-
\??\c:\jdvdd.exec:\jdvdd.exe52⤵
- Executes dropped EXE
-
\??\c:\ddppd.exec:\ddppd.exe53⤵
- Executes dropped EXE
-
\??\c:\frflfxr.exec:\frflfxr.exe54⤵
- Executes dropped EXE
-
\??\c:\hbnnbb.exec:\hbnnbb.exe55⤵
- Executes dropped EXE
-
\??\c:\hbtnnt.exec:\hbtnnt.exe56⤵
- Executes dropped EXE
-
\??\c:\9vdjp.exec:\9vdjp.exe57⤵
- Executes dropped EXE
-
\??\c:\7rflrxl.exec:\7rflrxl.exe58⤵
- Executes dropped EXE
-
\??\c:\xrlxrxl.exec:\xrlxrxl.exe59⤵
- Executes dropped EXE
-
\??\c:\hbtbtb.exec:\hbtbtb.exe60⤵
- Executes dropped EXE
-
\??\c:\pdpvp.exec:\pdpvp.exe61⤵
- Executes dropped EXE
-
\??\c:\vpjpv.exec:\vpjpv.exe62⤵
- Executes dropped EXE
-
\??\c:\1lrrxff.exec:\1lrrxff.exe63⤵
- Executes dropped EXE
-
\??\c:\fxlrlrl.exec:\fxlrlrl.exe64⤵
- Executes dropped EXE
-
\??\c:\nhtnbb.exec:\nhtnbb.exe65⤵
- Executes dropped EXE
-
\??\c:\vjpvj.exec:\vjpvj.exe66⤵
- Executes dropped EXE
-
\??\c:\jjdjd.exec:\jjdjd.exe67⤵
-
\??\c:\rlrxxxl.exec:\rlrxxxl.exe68⤵
-
\??\c:\thbhtb.exec:\thbhtb.exe69⤵
-
\??\c:\1nhntt.exec:\1nhntt.exe70⤵
-
\??\c:\vpddp.exec:\vpddp.exe71⤵
-
\??\c:\3xlrxff.exec:\3xlrxff.exe72⤵
-
\??\c:\fxllxxl.exec:\fxllxxl.exe73⤵
-
\??\c:\ttthtt.exec:\ttthtt.exe74⤵
-
\??\c:\dvjvp.exec:\dvjvp.exe75⤵
-
\??\c:\pjppp.exec:\pjppp.exe76⤵
-
\??\c:\7fllllr.exec:\7fllllr.exe77⤵
-
\??\c:\xlxxxrf.exec:\xlxxxrf.exe78⤵
-
\??\c:\nntnnn.exec:\nntnnn.exe79⤵
-
\??\c:\vppvd.exec:\vppvd.exe80⤵
-
\??\c:\pjdjp.exec:\pjdjp.exe81⤵
-
\??\c:\frxrxxx.exec:\frxrxxx.exe82⤵
-
\??\c:\5hnnnn.exec:\5hnnnn.exe83⤵
-
\??\c:\hhbhbb.exec:\hhbhbb.exe84⤵
-
\??\c:\djvjv.exec:\djvjv.exe85⤵
-
\??\c:\9fflrrx.exec:\9fflrrx.exe86⤵
-
\??\c:\9rrfrxf.exec:\9rrfrxf.exe87⤵
-
\??\c:\1btbbh.exec:\1btbbh.exe88⤵
-
\??\c:\dvjpj.exec:\dvjpj.exe89⤵
-
\??\c:\vvjpd.exec:\vvjpd.exe90⤵
-
\??\c:\rrlxlfl.exec:\rrlxlfl.exe91⤵
-
\??\c:\frlflrr.exec:\frlflrr.exe92⤵
-
\??\c:\nbhbnh.exec:\nbhbnh.exe93⤵
-
\??\c:\vpdjd.exec:\vpdjd.exe94⤵
-
\??\c:\1vddd.exec:\1vddd.exe95⤵
-
\??\c:\fxlrflx.exec:\fxlrflx.exe96⤵
-
\??\c:\nhbhnn.exec:\nhbhnn.exe97⤵
-
\??\c:\tnbthn.exec:\tnbthn.exe98⤵
-
\??\c:\vdppj.exec:\vdppj.exe99⤵
-
\??\c:\vpdjd.exec:\vpdjd.exe100⤵
-
\??\c:\xrxxffr.exec:\xrxxffr.exe101⤵
-
\??\c:\tnhthb.exec:\tnhthb.exe102⤵
-
\??\c:\bththn.exec:\bththn.exe103⤵
-
\??\c:\pjvvj.exec:\pjvvj.exe104⤵
-
\??\c:\xrflrxl.exec:\xrflrxl.exe105⤵
-
\??\c:\bhtbtt.exec:\bhtbtt.exe106⤵
-
\??\c:\dvjdv.exec:\dvjdv.exe107⤵
-
\??\c:\3vddd.exec:\3vddd.exe108⤵
-
\??\c:\rllxrfx.exec:\rllxrfx.exe109⤵
-
\??\c:\frflrrx.exec:\frflrrx.exe110⤵
-
\??\c:\5nnhbb.exec:\5nnhbb.exe111⤵
-
\??\c:\vpjvd.exec:\vpjvd.exe112⤵
-
\??\c:\vpjdv.exec:\vpjdv.exe113⤵
-
\??\c:\rlfrffx.exec:\rlfrffx.exe114⤵
-
\??\c:\1nhnbh.exec:\1nhnbh.exe115⤵
-
\??\c:\tnbhth.exec:\tnbhth.exe116⤵
-
\??\c:\ddpjp.exec:\ddpjp.exe117⤵
-
\??\c:\xlrrrrx.exec:\xlrrrrx.exe118⤵
-
\??\c:\fxrflrf.exec:\fxrflrf.exe119⤵
-
\??\c:\ntbnth.exec:\ntbnth.exe120⤵
-
\??\c:\9vjpd.exec:\9vjpd.exe121⤵
-
\??\c:\fflrlff.exec:\fflrlff.exe122⤵
-
\??\c:\hhbbnn.exec:\hhbbnn.exe123⤵
-
\??\c:\bthttt.exec:\bthttt.exe124⤵
-
\??\c:\jjvdj.exec:\jjvdj.exe125⤵
-
\??\c:\fxrrffx.exec:\fxrrffx.exe126⤵
-
\??\c:\9hthtt.exec:\9hthtt.exe127⤵
-
\??\c:\3btbht.exec:\3btbht.exe128⤵
-
\??\c:\pppdp.exec:\pppdp.exe129⤵
-
\??\c:\lfxflxr.exec:\lfxflxr.exe130⤵
-
\??\c:\llffllx.exec:\llffllx.exe131⤵
-
\??\c:\bhhttn.exec:\bhhttn.exe132⤵
-
\??\c:\dvddd.exec:\dvddd.exe133⤵
-
\??\c:\lxfxxxl.exec:\lxfxxxl.exe134⤵
-
\??\c:\fxxxxfl.exec:\fxxxxfl.exe135⤵
-
\??\c:\nhhtht.exec:\nhhtht.exe136⤵
-
\??\c:\hbhntn.exec:\hbhntn.exe137⤵
-
\??\c:\jjpdj.exec:\jjpdj.exe138⤵
-
\??\c:\rrxxfxl.exec:\rrxxfxl.exe139⤵
-
\??\c:\bhhbbb.exec:\bhhbbb.exe140⤵
-
\??\c:\pjpjv.exec:\pjpjv.exe141⤵
-
\??\c:\lfrxflf.exec:\lfrxflf.exe142⤵
-
\??\c:\9xrrffr.exec:\9xrrffr.exe143⤵
-
\??\c:\bnbnnt.exec:\bnbnnt.exe144⤵
-
\??\c:\7pvdp.exec:\7pvdp.exe145⤵
-
\??\c:\pjvpv.exec:\pjvpv.exe146⤵
-
\??\c:\fxxrlfl.exec:\fxxrlfl.exe147⤵
-
\??\c:\hbthnb.exec:\hbthnb.exe148⤵
-
\??\c:\thhnnb.exec:\thhnnb.exe149⤵
-
\??\c:\7jdpv.exec:\7jdpv.exe150⤵
-
\??\c:\rlrxlxx.exec:\rlrxlxx.exe151⤵
-
\??\c:\7htthh.exec:\7htthh.exe152⤵
-
\??\c:\hhbbnt.exec:\hhbbnt.exe153⤵
-
\??\c:\9jdjj.exec:\9jdjj.exe154⤵
-
\??\c:\llrlrfx.exec:\llrlrfx.exe155⤵
-
\??\c:\tnntbb.exec:\tnntbb.exe156⤵
-
\??\c:\bbbntn.exec:\bbbntn.exe157⤵
-
\??\c:\jjdjd.exec:\jjdjd.exe158⤵
-
\??\c:\pppvj.exec:\pppvj.exe159⤵
-
\??\c:\1rrxlrx.exec:\1rrxlrx.exe160⤵
-
\??\c:\nhbtnt.exec:\nhbtnt.exe161⤵
-
\??\c:\bbbnhn.exec:\bbbnhn.exe162⤵
-
\??\c:\pjpdd.exec:\pjpdd.exe163⤵
-
\??\c:\ffrrxfl.exec:\ffrrxfl.exe164⤵
-
\??\c:\xrllxlr.exec:\xrllxlr.exe165⤵
-
\??\c:\bbnbth.exec:\bbnbth.exe166⤵
-
\??\c:\hbhnbh.exec:\hbhnbh.exe167⤵
-
\??\c:\ddpvp.exec:\ddpvp.exe168⤵
-
\??\c:\rrfrlxx.exec:\rrfrlxx.exe169⤵
-
\??\c:\fffffxr.exec:\fffffxr.exe170⤵
-
\??\c:\9bbhbh.exec:\9bbhbh.exe171⤵
-
\??\c:\nhbhnn.exec:\nhbhnn.exe172⤵
-
\??\c:\vpvdv.exec:\vpvdv.exe173⤵
-
\??\c:\vjppd.exec:\vjppd.exe174⤵
-
\??\c:\7rlfrrl.exec:\7rlfrrl.exe175⤵
-
\??\c:\ttbbtb.exec:\ttbbtb.exe176⤵
-
\??\c:\nhtbhh.exec:\nhtbhh.exe177⤵
-
\??\c:\jjdpj.exec:\jjdpj.exe178⤵
-
\??\c:\5vvjv.exec:\5vvjv.exe179⤵
-
\??\c:\rflxfrx.exec:\rflxfrx.exe180⤵
-
\??\c:\htbbhh.exec:\htbbhh.exe181⤵
-
\??\c:\htbhhh.exec:\htbhhh.exe182⤵
-
\??\c:\jdvdv.exec:\jdvdv.exe183⤵
-
\??\c:\dvpvd.exec:\dvpvd.exe184⤵
-
\??\c:\xlfllxl.exec:\xlfllxl.exe185⤵
-
\??\c:\xxxrrfr.exec:\xxxrrfr.exe186⤵
-
\??\c:\5bttbn.exec:\5bttbn.exe187⤵
-
\??\c:\jpddp.exec:\jpddp.exe188⤵
-
\??\c:\5dddj.exec:\5dddj.exe189⤵
-
\??\c:\5frxflx.exec:\5frxflx.exe190⤵
-
\??\c:\xlxrrrx.exec:\xlxrrrx.exe191⤵
-
\??\c:\bbhnht.exec:\bbhnht.exe192⤵
-
\??\c:\nnbbtt.exec:\nnbbtt.exe193⤵
-
\??\c:\dvpdp.exec:\dvpdp.exe194⤵
-
\??\c:\vpjjv.exec:\vpjjv.exe195⤵
-
\??\c:\lxllflf.exec:\lxllflf.exe196⤵
-
\??\c:\frllffl.exec:\frllffl.exe197⤵
-
\??\c:\nnhtbh.exec:\nnhtbh.exe198⤵
-
\??\c:\jdjvp.exec:\jdjvp.exe199⤵
-
\??\c:\jdvdv.exec:\jdvdv.exe200⤵
-
\??\c:\lxflrrr.exec:\lxflrrr.exe201⤵
-
\??\c:\xflxxxr.exec:\xflxxxr.exe202⤵
-
\??\c:\3nbbnh.exec:\3nbbnh.exe203⤵
-
\??\c:\jdvvd.exec:\jdvvd.exe204⤵
-
\??\c:\jvjjv.exec:\jvjjv.exe205⤵
-
\??\c:\rlxfllx.exec:\rlxfllx.exe206⤵
-
\??\c:\xrrrllx.exec:\xrrrllx.exe207⤵
-
\??\c:\btnttt.exec:\btnttt.exe208⤵
-
\??\c:\vpjvp.exec:\vpjvp.exe209⤵
-
\??\c:\3vpdp.exec:\3vpdp.exe210⤵
-
\??\c:\fxflrrf.exec:\fxflrrf.exe211⤵
-
\??\c:\9frlrff.exec:\9frlrff.exe212⤵
-
\??\c:\7tbbnn.exec:\7tbbnn.exe213⤵
-
\??\c:\nhtntt.exec:\nhtntt.exe214⤵
-
\??\c:\jjddv.exec:\jjddv.exe215⤵
-
\??\c:\rrllxfx.exec:\rrllxfx.exe216⤵
-
\??\c:\9rrrffx.exec:\9rrrffx.exe217⤵
-
\??\c:\bthhtt.exec:\bthhtt.exe218⤵
-
\??\c:\hbhhbh.exec:\hbhhbh.exe219⤵
-
\??\c:\jdppd.exec:\jdppd.exe220⤵
-
\??\c:\1rxlxlf.exec:\1rxlxlf.exe221⤵
-
\??\c:\lxllrxf.exec:\lxllrxf.exe222⤵
-
\??\c:\hbtbnn.exec:\hbtbnn.exe223⤵
-
\??\c:\ttbnhh.exec:\ttbnhh.exe224⤵
-
\??\c:\jvdpv.exec:\jvdpv.exe225⤵
-
\??\c:\7dpvj.exec:\7dpvj.exe226⤵
-
\??\c:\xlrxrrf.exec:\xlrxrrf.exe227⤵
-
\??\c:\bthnhh.exec:\bthnhh.exe228⤵
-
\??\c:\bnbbtb.exec:\bnbbtb.exe229⤵
-
\??\c:\ppvdv.exec:\ppvdv.exe230⤵
-
\??\c:\vdpdd.exec:\vdpdd.exe231⤵
-
\??\c:\5llxxff.exec:\5llxxff.exe232⤵
-
\??\c:\5tthhn.exec:\5tthhn.exe233⤵
-
\??\c:\nhbnht.exec:\nhbnht.exe234⤵
-
\??\c:\jjpjp.exec:\jjpjp.exe235⤵
-
\??\c:\jdppj.exec:\jdppj.exe236⤵
-
\??\c:\xlrrfxx.exec:\xlrrfxx.exe237⤵
-
\??\c:\tbtnhn.exec:\tbtnhn.exe238⤵
-
\??\c:\nbntbn.exec:\nbntbn.exe239⤵
-
\??\c:\1djjp.exec:\1djjp.exe240⤵
-
\??\c:\pvpvp.exec:\pvpvp.exe241⤵