Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 19:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1ea3a2ce726520e1a1a1ba996f0e4698e95d33d95412089ec5e6cc0104aedc0e.exe
Resource
win7-20240221-en
windows7-x64
6 signatures
150 seconds
General
-
Target
1ea3a2ce726520e1a1a1ba996f0e4698e95d33d95412089ec5e6cc0104aedc0e.exe
-
Size
67KB
-
MD5
9bcc16560f7a79bca7092836b267827e
-
SHA1
1feca117a0c5db853ab54c9631f186d86e511ddc
-
SHA256
1ea3a2ce726520e1a1a1ba996f0e4698e95d33d95412089ec5e6cc0104aedc0e
-
SHA512
93f10a3253a6d2317aff34a4ac38a89f3653ec52309a30ed02e71eec724ccd45227eeda7703b76954ac6d366e20f47001feca5f252b00ca9971d436e505f8470
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA898:ymb3NkkiQ3mdBjFIvl358nLA898
Malware Config
Signatures
-
Detect Blackmoon payload 42 IoCs
Processes:
resource yara_rule behavioral2/memory/3400-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1396-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4332-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2508-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1084-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3476-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4504-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1072-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/636-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2460-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4864-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3276-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3192-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2212-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5040-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1060-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4072-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4244-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1092-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/532-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2756-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4252-181-0x0000000000580000-0x0000000000590000-memory.dmp family_blackmoon behavioral2/memory/2400-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3444-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3168-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1092-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/624-236-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4116-248-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3456-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2428-269-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4340-272-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4504-280-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3616-308-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1580-321-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2996-326-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1828-334-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3964-344-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3964-347-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4224-371-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3300-379-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2400-389-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3376-399-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 48 IoCs
Processes:
resource yara_rule behavioral2/memory/3400-4-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3400-2-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1396-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1396-14-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4332-20-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2508-26-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2508-28-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1084-36-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3476-42-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4504-57-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1072-63-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/636-71-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2460-80-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4864-92-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3276-105-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3192-111-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2212-123-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2212-125-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/5040-132-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1060-142-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4072-146-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4244-153-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1092-165-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/532-168-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2756-174-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2400-190-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3444-201-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3168-215-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/624-236-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4116-248-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3456-263-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2428-264-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2428-269-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4340-272-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4504-275-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4504-280-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4284-290-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3616-308-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1580-321-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2996-326-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1828-334-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3964-344-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3964-347-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2756-372-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4224-371-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3300-379-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2400-389-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3376-399-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
5bhbbt.exefffrlxf.exe3dvvp.exelffxrrl.exenbhhbb.exefrxxrxx.exevdjjv.exerffxrlf.exehbbnbt.exerrlfxrl.exedjvjd.exe5rxllfl.exennnhtt.exelxrfxrl.exehbhhbb.exerllfxfx.exehhbhbb.exepdvjv.exelxxlffr.exebbtnbb.exefrrfxlf.exebtthbt.exevdjdv.exehtnhhh.exedpjdd.exetnbnbt.exe1vjdp.exerrrrrff.exeddjdj.exexffrlfx.exerfllrll.exehnnnhb.exepvvpd.exefrxrrrl.exe5hbttt.exejjpjv.exebhhhbb.exedvjdd.exellllfxx.exe7dpjd.exelxxrlfx.exejdpjj.exenttbbn.exevpvvj.exetnbnhb.exe3rrlffx.exe9hhbhb.exepjpjv.exexlfrlfx.exejdvpp.exexlfxrlf.exenbbnnt.exerrfxrfx.exe3nnbhb.exe1hhbbb.exevjvdd.exebtnhtt.exevjddp.exenthbnh.exedvvdp.exelxrfxrf.exejjdvv.exellrlxxf.exevpjjv.exepid process 1396 5bhbbt.exe 4332 fffrlxf.exe 2508 3dvvp.exe 1084 lffxrrl.exe 3476 nbhhbb.exe 3556 frxxrxx.exe 4504 vdjjv.exe 1072 rffxrlf.exe 636 hbbnbt.exe 2460 rrlfxrl.exe 4232 djvjd.exe 4864 5rxllfl.exe 440 nnnhtt.exe 3276 lxrfxrl.exe 3192 hbhhbb.exe 540 rllfxfx.exe 2212 hhbhbb.exe 5040 pdvjv.exe 1060 lxxlffr.exe 4072 bbtnbb.exe 4244 frrfxlf.exe 1092 btthbt.exe 532 vdjdv.exe 2756 htnhhh.exe 4252 dpjdd.exe 2400 tnbnbt.exe 3444 1vjdp.exe 2924 rrrrrff.exe 3168 ddjdj.exe 4492 xffrlfx.exe 1076 rfllrll.exe 3532 hnnnhb.exe 624 pvvpd.exe 3412 frxrrrl.exe 4116 5hbttt.exe 1224 jjpjv.exe 1792 bhhhbb.exe 3456 dvjdd.exe 2428 llllfxx.exe 4340 7dpjd.exe 4504 lxxrlfx.exe 2808 jdpjj.exe 3028 nttbbn.exe 4284 vpvvj.exe 1860 tnbnhb.exe 1400 3rrlffx.exe 876 9hhbhb.exe 3616 pjpjv.exe 2744 xlfrlfx.exe 4040 jdvpp.exe 1580 xlfxrlf.exe 2996 nbbnnt.exe 1828 rrfxrfx.exe 4584 3nnbhb.exe 1008 1hhbbb.exe 3964 vjvdd.exe 3832 btnhtt.exe 4620 vjddp.exe 3024 nthbnh.exe 4884 dvvdp.exe 4224 lxrfxrf.exe 2756 jjdvv.exe 3300 llrlxxf.exe 3728 vpjjv.exe -
Processes:
resource yara_rule behavioral2/memory/3400-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3400-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1396-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1396-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4332-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2508-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2508-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1084-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3476-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1072-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/636-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2460-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4864-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3276-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3192-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2212-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2212-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5040-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1060-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4072-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4244-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1092-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/532-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2756-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2400-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3444-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3168-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/624-236-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4116-248-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3456-263-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2428-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2428-269-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4340-272-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-275-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-280-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4284-290-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3616-308-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1580-321-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2996-326-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1828-334-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3964-344-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3964-347-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2756-372-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4224-371-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3300-379-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2400-389-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3376-399-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1ea3a2ce726520e1a1a1ba996f0e4698e95d33d95412089ec5e6cc0104aedc0e.exe5bhbbt.exefffrlxf.exe3dvvp.exelffxrrl.exenbhhbb.exefrxxrxx.exevdjjv.exerffxrlf.exehbbnbt.exerrlfxrl.exedjvjd.exe5rxllfl.exennnhtt.exelxrfxrl.exehbhhbb.exerllfxfx.exehhbhbb.exepdvjv.exelxxlffr.exebbtnbb.exefrrfxlf.exedescription pid process target process PID 3400 wrote to memory of 1396 3400 1ea3a2ce726520e1a1a1ba996f0e4698e95d33d95412089ec5e6cc0104aedc0e.exe 5bhbbt.exe PID 3400 wrote to memory of 1396 3400 1ea3a2ce726520e1a1a1ba996f0e4698e95d33d95412089ec5e6cc0104aedc0e.exe 5bhbbt.exe PID 3400 wrote to memory of 1396 3400 1ea3a2ce726520e1a1a1ba996f0e4698e95d33d95412089ec5e6cc0104aedc0e.exe 5bhbbt.exe PID 1396 wrote to memory of 4332 1396 5bhbbt.exe fffrlxf.exe PID 1396 wrote to memory of 4332 1396 5bhbbt.exe fffrlxf.exe PID 1396 wrote to memory of 4332 1396 5bhbbt.exe fffrlxf.exe PID 4332 wrote to memory of 2508 4332 fffrlxf.exe 3dvvp.exe PID 4332 wrote to memory of 2508 4332 fffrlxf.exe 3dvvp.exe PID 4332 wrote to memory of 2508 4332 fffrlxf.exe 3dvvp.exe PID 2508 wrote to memory of 1084 2508 3dvvp.exe lffxrrl.exe PID 2508 wrote to memory of 1084 2508 3dvvp.exe lffxrrl.exe PID 2508 wrote to memory of 1084 2508 3dvvp.exe lffxrrl.exe PID 1084 wrote to memory of 3476 1084 lffxrrl.exe nbhhbb.exe PID 1084 wrote to memory of 3476 1084 lffxrrl.exe nbhhbb.exe PID 1084 wrote to memory of 3476 1084 lffxrrl.exe nbhhbb.exe PID 3476 wrote to memory of 3556 3476 nbhhbb.exe frxxrxx.exe PID 3476 wrote to memory of 3556 3476 nbhhbb.exe frxxrxx.exe PID 3476 wrote to memory of 3556 3476 nbhhbb.exe frxxrxx.exe PID 3556 wrote to memory of 4504 3556 frxxrxx.exe vdjjv.exe PID 3556 wrote to memory of 4504 3556 frxxrxx.exe vdjjv.exe PID 3556 wrote to memory of 4504 3556 frxxrxx.exe vdjjv.exe PID 4504 wrote to memory of 1072 4504 vdjjv.exe rffxrlf.exe PID 4504 wrote to memory of 1072 4504 vdjjv.exe rffxrlf.exe PID 4504 wrote to memory of 1072 4504 vdjjv.exe rffxrlf.exe PID 1072 wrote to memory of 636 1072 rffxrlf.exe hbbnbt.exe PID 1072 wrote to memory of 636 1072 rffxrlf.exe hbbnbt.exe PID 1072 wrote to memory of 636 1072 rffxrlf.exe hbbnbt.exe PID 636 wrote to memory of 2460 636 hbbnbt.exe rrlfxrl.exe PID 636 wrote to memory of 2460 636 hbbnbt.exe rrlfxrl.exe PID 636 wrote to memory of 2460 636 hbbnbt.exe rrlfxrl.exe PID 2460 wrote to memory of 4232 2460 rrlfxrl.exe djvjd.exe PID 2460 wrote to memory of 4232 2460 rrlfxrl.exe djvjd.exe PID 2460 wrote to memory of 4232 2460 rrlfxrl.exe djvjd.exe PID 4232 wrote to memory of 4864 4232 djvjd.exe 5rxllfl.exe PID 4232 wrote to memory of 4864 4232 djvjd.exe 5rxllfl.exe PID 4232 wrote to memory of 4864 4232 djvjd.exe 5rxllfl.exe PID 4864 wrote to memory of 440 4864 5rxllfl.exe nnnhtt.exe PID 4864 wrote to memory of 440 4864 5rxllfl.exe nnnhtt.exe PID 4864 wrote to memory of 440 4864 5rxllfl.exe nnnhtt.exe PID 440 wrote to memory of 3276 440 nnnhtt.exe lxrfxrl.exe PID 440 wrote to memory of 3276 440 nnnhtt.exe lxrfxrl.exe PID 440 wrote to memory of 3276 440 nnnhtt.exe lxrfxrl.exe PID 3276 wrote to memory of 3192 3276 lxrfxrl.exe hbhhbb.exe PID 3276 wrote to memory of 3192 3276 lxrfxrl.exe hbhhbb.exe PID 3276 wrote to memory of 3192 3276 lxrfxrl.exe hbhhbb.exe PID 3192 wrote to memory of 540 3192 hbhhbb.exe rllfxfx.exe PID 3192 wrote to memory of 540 3192 hbhhbb.exe rllfxfx.exe PID 3192 wrote to memory of 540 3192 hbhhbb.exe rllfxfx.exe PID 540 wrote to memory of 2212 540 rllfxfx.exe hhbhbb.exe PID 540 wrote to memory of 2212 540 rllfxfx.exe hhbhbb.exe PID 540 wrote to memory of 2212 540 rllfxfx.exe hhbhbb.exe PID 2212 wrote to memory of 5040 2212 hhbhbb.exe pdvjv.exe PID 2212 wrote to memory of 5040 2212 hhbhbb.exe pdvjv.exe PID 2212 wrote to memory of 5040 2212 hhbhbb.exe pdvjv.exe PID 5040 wrote to memory of 1060 5040 pdvjv.exe lxxlffr.exe PID 5040 wrote to memory of 1060 5040 pdvjv.exe lxxlffr.exe PID 5040 wrote to memory of 1060 5040 pdvjv.exe lxxlffr.exe PID 1060 wrote to memory of 4072 1060 lxxlffr.exe bbtnbb.exe PID 1060 wrote to memory of 4072 1060 lxxlffr.exe bbtnbb.exe PID 1060 wrote to memory of 4072 1060 lxxlffr.exe bbtnbb.exe PID 4072 wrote to memory of 4244 4072 bbtnbb.exe frrfxlf.exe PID 4072 wrote to memory of 4244 4072 bbtnbb.exe frrfxlf.exe PID 4072 wrote to memory of 4244 4072 bbtnbb.exe frrfxlf.exe PID 4244 wrote to memory of 1092 4244 frrfxlf.exe btthbt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ea3a2ce726520e1a1a1ba996f0e4698e95d33d95412089ec5e6cc0104aedc0e.exe"C:\Users\Admin\AppData\Local\Temp\1ea3a2ce726520e1a1a1ba996f0e4698e95d33d95412089ec5e6cc0104aedc0e.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\5bhbbt.exec:\5bhbbt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fffrlxf.exec:\fffrlxf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3dvvp.exec:\3dvvp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lffxrrl.exec:\lffxrrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbhhbb.exec:\nbhhbb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frxxrxx.exec:\frxxrxx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vdjjv.exec:\vdjjv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rffxrlf.exec:\rffxrlf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbbnbt.exec:\hbbnbt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrlfxrl.exec:\rrlfxrl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djvjd.exec:\djvjd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5rxllfl.exec:\5rxllfl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnnhtt.exec:\nnnhtt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxrfxrl.exec:\lxrfxrl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbhhbb.exec:\hbhhbb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rllfxfx.exec:\rllfxfx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhbhbb.exec:\hhbhbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdvjv.exec:\pdvjv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxxlffr.exec:\lxxlffr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbtnbb.exec:\bbtnbb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frrfxlf.exec:\frrfxlf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btthbt.exec:\btthbt.exe23⤵
- Executes dropped EXE
-
\??\c:\vdjdv.exec:\vdjdv.exe24⤵
- Executes dropped EXE
-
\??\c:\htnhhh.exec:\htnhhh.exe25⤵
- Executes dropped EXE
-
\??\c:\dpjdd.exec:\dpjdd.exe26⤵
- Executes dropped EXE
-
\??\c:\tnbnbt.exec:\tnbnbt.exe27⤵
- Executes dropped EXE
-
\??\c:\1vjdp.exec:\1vjdp.exe28⤵
- Executes dropped EXE
-
\??\c:\rrrrrff.exec:\rrrrrff.exe29⤵
- Executes dropped EXE
-
\??\c:\ddjdj.exec:\ddjdj.exe30⤵
- Executes dropped EXE
-
\??\c:\xffrlfx.exec:\xffrlfx.exe31⤵
- Executes dropped EXE
-
\??\c:\rfllrll.exec:\rfllrll.exe32⤵
- Executes dropped EXE
-
\??\c:\hnnnhb.exec:\hnnnhb.exe33⤵
- Executes dropped EXE
-
\??\c:\pvvpd.exec:\pvvpd.exe34⤵
- Executes dropped EXE
-
\??\c:\frxrrrl.exec:\frxrrrl.exe35⤵
- Executes dropped EXE
-
\??\c:\5hbttt.exec:\5hbttt.exe36⤵
- Executes dropped EXE
-
\??\c:\jjpjv.exec:\jjpjv.exe37⤵
- Executes dropped EXE
-
\??\c:\bhhhbb.exec:\bhhhbb.exe38⤵
- Executes dropped EXE
-
\??\c:\dvjdd.exec:\dvjdd.exe39⤵
- Executes dropped EXE
-
\??\c:\llllfxx.exec:\llllfxx.exe40⤵
- Executes dropped EXE
-
\??\c:\7dpjd.exec:\7dpjd.exe41⤵
- Executes dropped EXE
-
\??\c:\lxxrlfx.exec:\lxxrlfx.exe42⤵
- Executes dropped EXE
-
\??\c:\jdpjj.exec:\jdpjj.exe43⤵
- Executes dropped EXE
-
\??\c:\nttbbn.exec:\nttbbn.exe44⤵
- Executes dropped EXE
-
\??\c:\vpvvj.exec:\vpvvj.exe45⤵
- Executes dropped EXE
-
\??\c:\tnbnhb.exec:\tnbnhb.exe46⤵
- Executes dropped EXE
-
\??\c:\3rrlffx.exec:\3rrlffx.exe47⤵
- Executes dropped EXE
-
\??\c:\9hhbhb.exec:\9hhbhb.exe48⤵
- Executes dropped EXE
-
\??\c:\pjpjv.exec:\pjpjv.exe49⤵
- Executes dropped EXE
-
\??\c:\xlfrlfx.exec:\xlfrlfx.exe50⤵
- Executes dropped EXE
-
\??\c:\jdvpp.exec:\jdvpp.exe51⤵
- Executes dropped EXE
-
\??\c:\xlfxrlf.exec:\xlfxrlf.exe52⤵
- Executes dropped EXE
-
\??\c:\nbbnnt.exec:\nbbnnt.exe53⤵
- Executes dropped EXE
-
\??\c:\rrfxrfx.exec:\rrfxrfx.exe54⤵
- Executes dropped EXE
-
\??\c:\3nnbhb.exec:\3nnbhb.exe55⤵
- Executes dropped EXE
-
\??\c:\1hhbbb.exec:\1hhbbb.exe56⤵
- Executes dropped EXE
-
\??\c:\vjvdd.exec:\vjvdd.exe57⤵
- Executes dropped EXE
-
\??\c:\btnhtt.exec:\btnhtt.exe58⤵
- Executes dropped EXE
-
\??\c:\vjddp.exec:\vjddp.exe59⤵
- Executes dropped EXE
-
\??\c:\nthbnh.exec:\nthbnh.exe60⤵
- Executes dropped EXE
-
\??\c:\dvvdp.exec:\dvvdp.exe61⤵
- Executes dropped EXE
-
\??\c:\lxrfxrf.exec:\lxrfxrf.exe62⤵
- Executes dropped EXE
-
\??\c:\jjdvv.exec:\jjdvv.exe63⤵
- Executes dropped EXE
-
\??\c:\llrlxxf.exec:\llrlxxf.exe64⤵
- Executes dropped EXE
-
\??\c:\vpjjv.exec:\vpjjv.exe65⤵
- Executes dropped EXE
-
\??\c:\lfxrfxl.exec:\lfxrfxl.exe66⤵
-
\??\c:\thttnn.exec:\thttnn.exe67⤵
-
\??\c:\rllfrfx.exec:\rllfrfx.exe68⤵
-
\??\c:\nbttnb.exec:\nbttnb.exe69⤵
-
\??\c:\frllflf.exec:\frllflf.exe70⤵
-
\??\c:\djvvj.exec:\djvvj.exe71⤵
-
\??\c:\hbhttt.exec:\hbhttt.exe72⤵
-
\??\c:\pjvpd.exec:\pjvpd.exe73⤵
-
\??\c:\bnbnbt.exec:\bnbnbt.exe74⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe75⤵
-
\??\c:\xxrfrrl.exec:\xxrfrrl.exe76⤵
-
\??\c:\9bbnbt.exec:\9bbnbt.exe77⤵
-
\??\c:\jdpdp.exec:\jdpdp.exe78⤵
-
\??\c:\ththhb.exec:\ththhb.exe79⤵
-
\??\c:\3vdpj.exec:\3vdpj.exe80⤵
-
\??\c:\7lrlxxr.exec:\7lrlxxr.exe81⤵
-
\??\c:\thnnbn.exec:\thnnbn.exe82⤵
-
\??\c:\rlflxlr.exec:\rlflxlr.exe83⤵
-
\??\c:\hbnbnt.exec:\hbnbnt.exe84⤵
-
\??\c:\vpjdj.exec:\vpjdj.exe85⤵
-
\??\c:\3bhbhh.exec:\3bhbhh.exe86⤵
-
\??\c:\1jpdd.exec:\1jpdd.exe87⤵
-
\??\c:\rrxlrfl.exec:\rrxlrfl.exe88⤵
-
\??\c:\httbth.exec:\httbth.exe89⤵
-
\??\c:\fxrlxxl.exec:\fxrlxxl.exe90⤵
-
\??\c:\nbhbbt.exec:\nbhbbt.exe91⤵
-
\??\c:\rxxrfxr.exec:\rxxrfxr.exe92⤵
-
\??\c:\btbtbb.exec:\btbtbb.exe93⤵
-
\??\c:\5dpvj.exec:\5dpvj.exe94⤵
-
\??\c:\1bthbn.exec:\1bthbn.exe95⤵
-
\??\c:\vddvj.exec:\vddvj.exe96⤵
-
\??\c:\lxxlffx.exec:\lxxlffx.exe97⤵
-
\??\c:\hbbbnn.exec:\hbbbnn.exe98⤵
-
\??\c:\tnbhnb.exec:\tnbhnb.exe99⤵
-
\??\c:\1rrrflx.exec:\1rrrflx.exe100⤵
-
\??\c:\httnhh.exec:\httnhh.exe101⤵
-
\??\c:\jvddj.exec:\jvddj.exe102⤵
-
\??\c:\lxrlxrl.exec:\lxrlxrl.exe103⤵
-
\??\c:\jdvpd.exec:\jdvpd.exe104⤵
-
\??\c:\3rlflff.exec:\3rlflff.exe105⤵
-
\??\c:\frxrrrf.exec:\frxrrrf.exe106⤵
-
\??\c:\ddjjd.exec:\ddjjd.exe107⤵
-
\??\c:\xllxllx.exec:\xllxllx.exe108⤵
-
\??\c:\7nhbhb.exec:\7nhbhb.exe109⤵
-
\??\c:\lfxrfxl.exec:\lfxrfxl.exe110⤵
-
\??\c:\7hbtnh.exec:\7hbtnh.exe111⤵
-
\??\c:\pvdpd.exec:\pvdpd.exe112⤵
-
\??\c:\frllfxx.exec:\frllfxx.exe113⤵
-
\??\c:\dvjdv.exec:\dvjdv.exe114⤵
-
\??\c:\7lrxffx.exec:\7lrxffx.exe115⤵
-
\??\c:\nbhttn.exec:\nbhttn.exe116⤵
-
\??\c:\3jvpd.exec:\3jvpd.exe117⤵
-
\??\c:\xrxlrrl.exec:\xrxlrrl.exe118⤵
-
\??\c:\pvpjd.exec:\pvpjd.exe119⤵
-
\??\c:\9xxrfxr.exec:\9xxrfxr.exe120⤵
-
\??\c:\1htnbt.exec:\1htnbt.exe121⤵
-
\??\c:\1ddpd.exec:\1ddpd.exe122⤵
-
\??\c:\vdvvj.exec:\vdvvj.exe123⤵
-
\??\c:\nbbnbt.exec:\nbbnbt.exe124⤵
-
\??\c:\pjjdd.exec:\pjjdd.exe125⤵
-
\??\c:\rfffrrl.exec:\rfffrrl.exe126⤵
-
\??\c:\pdjdp.exec:\pdjdp.exe127⤵
-
\??\c:\lfrlrlf.exec:\lfrlrlf.exe128⤵
-
\??\c:\vjpjp.exec:\vjpjp.exe129⤵
-
\??\c:\lfllfll.exec:\lfllfll.exe130⤵
-
\??\c:\jvddv.exec:\jvddv.exe131⤵
-
\??\c:\rxlxfxf.exec:\rxlxfxf.exe132⤵
-
\??\c:\nhhbnt.exec:\nhhbnt.exe133⤵
-
\??\c:\vjdvd.exec:\vjdvd.exe134⤵
-
\??\c:\3nbtbb.exec:\3nbtbb.exe135⤵
-
\??\c:\vppdv.exec:\vppdv.exe136⤵
-
\??\c:\vjjdp.exec:\vjjdp.exe137⤵
-
\??\c:\btbbtt.exec:\btbbtt.exe138⤵
-
\??\c:\dvjdv.exec:\dvjdv.exe139⤵
-
\??\c:\fllxllx.exec:\fllxllx.exe140⤵
-
\??\c:\7vvpj.exec:\7vvpj.exe141⤵
-
\??\c:\lxfxllf.exec:\lxfxllf.exe142⤵
-
\??\c:\vddvp.exec:\vddvp.exe143⤵
-
\??\c:\9flffff.exec:\9flffff.exe144⤵
-
\??\c:\ttbttt.exec:\ttbttt.exe145⤵
-
\??\c:\dvjvj.exec:\dvjvj.exe146⤵
-
\??\c:\rrxffnh.exec:\rrxffnh.exe147⤵
-
\??\c:\pjddv.exec:\pjddv.exe148⤵
-
\??\c:\rfxrllf.exec:\rfxrllf.exe149⤵
-
\??\c:\vdjdd.exec:\vdjdd.exe150⤵
-
\??\c:\rfrfxxx.exec:\rfrfxxx.exe151⤵
-
\??\c:\llxxlfx.exec:\llxxlfx.exe152⤵
-
\??\c:\vvpjd.exec:\vvpjd.exe153⤵
-
\??\c:\dvjdp.exec:\dvjdp.exe154⤵
-
\??\c:\ntbthn.exec:\ntbthn.exe155⤵
-
\??\c:\jddpd.exec:\jddpd.exe156⤵
-
\??\c:\vjddv.exec:\vjddv.exe157⤵
-
\??\c:\xrxrffr.exec:\xrxrffr.exe158⤵
-
\??\c:\jdddv.exec:\jdddv.exe159⤵
-
\??\c:\llrlxxr.exec:\llrlxxr.exe160⤵
-
\??\c:\tnhnhn.exec:\tnhnhn.exe161⤵
-
\??\c:\5ppjd.exec:\5ppjd.exe162⤵
-
\??\c:\rlffrrl.exec:\rlffrrl.exe163⤵
-
\??\c:\vdpvd.exec:\vdpvd.exe164⤵
-
\??\c:\lfxrlfx.exec:\lfxrlfx.exe165⤵
-
\??\c:\tbhhbh.exec:\tbhhbh.exe166⤵
-
\??\c:\3ppjv.exec:\3ppjv.exe167⤵
-
\??\c:\lxxlffx.exec:\lxxlffx.exe168⤵
-
\??\c:\vppjd.exec:\vppjd.exe169⤵
-
\??\c:\xrrlllr.exec:\xrrlllr.exe170⤵
-
\??\c:\jddvp.exec:\jddvp.exe171⤵
-
\??\c:\1rrlllf.exec:\1rrlllf.exe172⤵
-
\??\c:\xlxxlrf.exec:\xlxxlrf.exe173⤵
-
\??\c:\vpjdv.exec:\vpjdv.exe174⤵
-
\??\c:\hhbtnh.exec:\hhbtnh.exe175⤵
-
\??\c:\jdjdj.exec:\jdjdj.exe176⤵
-
\??\c:\lffrllf.exec:\lffrllf.exe177⤵
-
\??\c:\vpppp.exec:\vpppp.exe178⤵
-
\??\c:\5lxxxxx.exec:\5lxxxxx.exe179⤵
-
\??\c:\thbhth.exec:\thbhth.exe180⤵
-
\??\c:\5vjjd.exec:\5vjjd.exe181⤵
-
\??\c:\nbbbtt.exec:\nbbbtt.exe182⤵
-
\??\c:\jvvvp.exec:\jvvvp.exe183⤵
-
\??\c:\lxxrffx.exec:\lxxrffx.exe184⤵
-
\??\c:\jjjdp.exec:\jjjdp.exe185⤵
-
\??\c:\rllffff.exec:\rllffff.exe186⤵
-
\??\c:\ddddv.exec:\ddddv.exe187⤵
-
\??\c:\rffxllf.exec:\rffxllf.exe188⤵
-
\??\c:\bhhbtt.exec:\bhhbtt.exe189⤵
-
\??\c:\vvvpd.exec:\vvvpd.exe190⤵
-
\??\c:\3ttnbb.exec:\3ttnbb.exe191⤵
-
\??\c:\thhbtn.exec:\thhbtn.exe192⤵
-
\??\c:\9xrlrxx.exec:\9xrlrxx.exe193⤵
-
\??\c:\1hnhbb.exec:\1hnhbb.exe194⤵
-
\??\c:\jddvj.exec:\jddvj.exe195⤵
-
\??\c:\1xxrllf.exec:\1xxrllf.exe196⤵
-
\??\c:\9tttnn.exec:\9tttnn.exe197⤵
-
\??\c:\djvvd.exec:\djvvd.exe198⤵
-
\??\c:\1vdvv.exec:\1vdvv.exe199⤵
-
\??\c:\thhbnn.exec:\thhbnn.exe200⤵
-
\??\c:\vjpjd.exec:\vjpjd.exe201⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe202⤵
-
\??\c:\lrxrrxx.exec:\lrxrrxx.exe203⤵
-
\??\c:\vjppj.exec:\vjppj.exe204⤵
-
\??\c:\fxfrffx.exec:\fxfrffx.exe205⤵
-
\??\c:\nhnhbt.exec:\nhnhbt.exe206⤵
-
\??\c:\jddjv.exec:\jddjv.exe207⤵
-
\??\c:\xxffrrl.exec:\xxffrrl.exe208⤵
-
\??\c:\hbttbb.exec:\hbttbb.exe209⤵
-
\??\c:\lffxrrl.exec:\lffxrrl.exe210⤵
-
\??\c:\hbbtbb.exec:\hbbtbb.exe211⤵
-
\??\c:\nnnhtt.exec:\nnnhtt.exe212⤵
-
\??\c:\5lrlfrr.exec:\5lrlfrr.exe213⤵
-
\??\c:\nbbbbb.exec:\nbbbbb.exe214⤵
-
\??\c:\7bhhhh.exec:\7bhhhh.exe215⤵
-
\??\c:\rlxxllr.exec:\rlxxllr.exe216⤵
-
\??\c:\1nttbb.exec:\1nttbb.exe217⤵
-
\??\c:\pjppd.exec:\pjppd.exe218⤵
-
\??\c:\httnbb.exec:\httnbb.exe219⤵
-
\??\c:\jdpjp.exec:\jdpjp.exe220⤵
-
\??\c:\3ffxlff.exec:\3ffxlff.exe221⤵
-
\??\c:\nhhbbb.exec:\nhhbbb.exe222⤵
-
\??\c:\thbnnb.exec:\thbnnb.exe223⤵
-
\??\c:\dvjjj.exec:\dvjjj.exe224⤵
-
\??\c:\xrrlxxx.exec:\xrrlxxx.exe225⤵
-
\??\c:\nhhbtt.exec:\nhhbtt.exe226⤵
-
\??\c:\dddvv.exec:\dddvv.exe227⤵
-
\??\c:\fxfrllr.exec:\fxfrllr.exe228⤵
-
\??\c:\bbbtnh.exec:\bbbtnh.exe229⤵
-
\??\c:\3rrlfff.exec:\3rrlfff.exe230⤵
-
\??\c:\9ntnhh.exec:\9ntnhh.exe231⤵
-
\??\c:\dvdvj.exec:\dvdvj.exe232⤵
-
\??\c:\fflfrrl.exec:\fflfrrl.exe233⤵
-
\??\c:\1nnhbh.exec:\1nnhbh.exe234⤵
-
\??\c:\dvvpv.exec:\dvvpv.exe235⤵
-
\??\c:\1xfxlll.exec:\1xfxlll.exe236⤵
-
\??\c:\hhnhtb.exec:\hhnhtb.exe237⤵
-
\??\c:\jdvpd.exec:\jdvpd.exe238⤵
-
\??\c:\hbnhbb.exec:\hbnhbb.exe239⤵
-
\??\c:\3vvvp.exec:\3vvvp.exe240⤵
-
\??\c:\fxrlfxx.exec:\fxrlfxx.exe241⤵