Analysis
-
max time kernel
117s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 17:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.691716b66eb8cfdcae6c17af87a38380.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
NEAS.691716b66eb8cfdcae6c17af87a38380.exe
-
Size
63KB
-
MD5
691716b66eb8cfdcae6c17af87a38380
-
SHA1
2373de145c1c0382ebaa1892d265485a39a6d07c
-
SHA256
8ce4d6408c93aae952669cbbd250600ad9f658800dd81531d7135e97e5cbfec4
-
SHA512
094189661c9bd42917af78aef17e7456c20757c0b1527f3737fbe8b44bb13b2ead2b0125788263f563f38f191e03d7261b029a1d103c1412e6eb156188757708
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIpWCz+FR4REh:ymb3NkkiQ3mdBjFIsIpZ+R4Rc
Malware Config
Signatures
-
Detect Blackmoon payload 38 IoCs
resource yara_rule behavioral2/memory/3688-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4700-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4700-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1592-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1788-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4760-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2980-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4720-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1536-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2724-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3768-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3712-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3944-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4704-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4344-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3020-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3020-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3832-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4796-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4944-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3364-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3356-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/740-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1284-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1360-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1360-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/840-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4440-218-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3548-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3764-244-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1876-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1688-295-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5056-303-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/912-309-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2036-325-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3104-324-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3732-334-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3832-339-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4700 rrvbh.exe 1592 dnjpthn.exe 1788 njxllj.exe 4760 xnvdrhn.exe 2980 hfdjdn.exe 4720 xjfrxxb.exe 1536 llhrjrv.exe 2724 dtjxh.exe 3768 xfnxxdp.exe 4904 pfvph.exe 3712 bvhrv.exe 3944 lvjfb.exe 4704 jvrbnfh.exe 4344 fpftxjv.exe 3020 hxtbthd.exe 3832 fvrfdf.exe 4796 brbxvnr.exe 4944 bnjdfvp.exe 3364 vjhpn.exe 3356 xvffp.exe 740 hrjxvjx.exe 1284 pjjbht.exe 1360 dvtjr.exe 840 bnrjb.exe 2644 blxrvb.exe 4000 nddrb.exe 456 nvrnpj.exe 2888 fnhfjp.exe 4440 njhjlnx.exe 3548 fblhxbd.exe 3868 phhrf.exe 3816 vrlnl.exe 3764 wmiprvse.exe 4260 tjnxfv.exe 3420 pbjbnn.exe 4700 tddpxv.exe 4940 rvlnrl.exe 2872 fbhbrvb.exe 4476 lhjjtv.exe 724 hlfrj.exe 1716 hddtjhr.exe 616 nvndbfl.exe 1876 trrdjtx.exe 4156 njjjnfr.exe 1688 jrvfj.exe 5056 rbfxlrx.exe 912 nptxn.exe 2652 rtlnnh.exe 2036 prrbnl.exe 3104 xlfphdf.exe 3824 bbdfphr.exe 3732 fxljd.exe 3832 fbntfbv.exe 3124 htdfvn.exe 2944 tfdrp.exe 3348 dttnv.exe 3492 bblnndn.exe 3876 fbvxxr.exe 776 vthflj.exe 4324 phxnhd.exe 3204 vbfpb.exe 4352 jfrrfh.exe 2356 nvpnffp.exe 1276 rvrfb.exe -
resource yara_rule behavioral2/memory/3688-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3688-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4700-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4700-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1592-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1592-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1788-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1788-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4760-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4760-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2980-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4720-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4720-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1536-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1536-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2724-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2724-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3768-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3768-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4904-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3712-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3944-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4704-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4704-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3020-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3020-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3832-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4796-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4944-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4944-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3364-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3364-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3356-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3356-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/740-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1284-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1360-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1360-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/840-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2888-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4440-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4440-218-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3548-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3548-221-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3764-239-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3764-244-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3420-249-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2872-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4476-267-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1716-276-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1876-286-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4156-290-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1688-295-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-303-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/912-309-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2036-318-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2036-325-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3104-324-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3824-329-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3732-334-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3832-339-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3124-344-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3688 wrote to memory of 4700 3688 NEAS.691716b66eb8cfdcae6c17af87a38380.exe 82 PID 3688 wrote to memory of 4700 3688 NEAS.691716b66eb8cfdcae6c17af87a38380.exe 82 PID 3688 wrote to memory of 4700 3688 NEAS.691716b66eb8cfdcae6c17af87a38380.exe 82 PID 4700 wrote to memory of 1592 4700 rrvbh.exe 83 PID 4700 wrote to memory of 1592 4700 rrvbh.exe 83 PID 4700 wrote to memory of 1592 4700 rrvbh.exe 83 PID 1592 wrote to memory of 1788 1592 dnjpthn.exe 84 PID 1592 wrote to memory of 1788 1592 dnjpthn.exe 84 PID 1592 wrote to memory of 1788 1592 dnjpthn.exe 84 PID 1788 wrote to memory of 4760 1788 njxllj.exe 85 PID 1788 wrote to memory of 4760 1788 njxllj.exe 85 PID 1788 wrote to memory of 4760 1788 njxllj.exe 85 PID 4760 wrote to memory of 2980 4760 xnvdrhn.exe 87 PID 4760 wrote to memory of 2980 4760 xnvdrhn.exe 87 PID 4760 wrote to memory of 2980 4760 xnvdrhn.exe 87 PID 2980 wrote to memory of 4720 2980 hfdjdn.exe 88 PID 2980 wrote to memory of 4720 2980 hfdjdn.exe 88 PID 2980 wrote to memory of 4720 2980 hfdjdn.exe 88 PID 4720 wrote to memory of 1536 4720 xjfrxxb.exe 89 PID 4720 wrote to memory of 1536 4720 xjfrxxb.exe 89 PID 4720 wrote to memory of 1536 4720 xjfrxxb.exe 89 PID 1536 wrote to memory of 2724 1536 llhrjrv.exe 90 PID 1536 wrote to memory of 2724 1536 llhrjrv.exe 90 PID 1536 wrote to memory of 2724 1536 llhrjrv.exe 90 PID 2724 wrote to memory of 3768 2724 dtjxh.exe 91 PID 2724 wrote to memory of 3768 2724 dtjxh.exe 91 PID 2724 wrote to memory of 3768 2724 dtjxh.exe 91 PID 3768 wrote to memory of 4904 3768 xfnxxdp.exe 92 PID 3768 wrote to memory of 4904 3768 xfnxxdp.exe 92 PID 3768 wrote to memory of 4904 3768 xfnxxdp.exe 92 PID 4904 wrote to memory of 3712 4904 pfvph.exe 93 PID 4904 wrote to memory of 3712 4904 pfvph.exe 93 PID 4904 wrote to memory of 3712 4904 pfvph.exe 93 PID 3712 wrote to memory of 3944 3712 bvhrv.exe 94 PID 3712 wrote to memory of 3944 3712 bvhrv.exe 94 PID 3712 wrote to memory of 3944 3712 bvhrv.exe 94 PID 3944 wrote to memory of 4704 3944 lvjfb.exe 95 PID 3944 wrote to memory of 4704 3944 lvjfb.exe 95 PID 3944 wrote to memory of 4704 3944 lvjfb.exe 95 PID 4704 wrote to memory of 4344 4704 jvrbnfh.exe 96 PID 4704 wrote to memory of 4344 4704 jvrbnfh.exe 96 PID 4704 wrote to memory of 4344 4704 jvrbnfh.exe 96 PID 4344 wrote to memory of 3020 4344 fpftxjv.exe 97 PID 4344 wrote to memory of 3020 4344 fpftxjv.exe 97 PID 4344 wrote to memory of 3020 4344 fpftxjv.exe 97 PID 3020 wrote to memory of 3832 3020 hxtbthd.exe 98 PID 3020 wrote to memory of 3832 3020 hxtbthd.exe 98 PID 3020 wrote to memory of 3832 3020 hxtbthd.exe 98 PID 3832 wrote to memory of 4796 3832 fvrfdf.exe 99 PID 3832 wrote to memory of 4796 3832 fvrfdf.exe 99 PID 3832 wrote to memory of 4796 3832 fvrfdf.exe 99 PID 4796 wrote to memory of 4944 4796 brbxvnr.exe 100 PID 4796 wrote to memory of 4944 4796 brbxvnr.exe 100 PID 4796 wrote to memory of 4944 4796 brbxvnr.exe 100 PID 4944 wrote to memory of 3364 4944 bnjdfvp.exe 101 PID 4944 wrote to memory of 3364 4944 bnjdfvp.exe 101 PID 4944 wrote to memory of 3364 4944 bnjdfvp.exe 101 PID 3364 wrote to memory of 3356 3364 vjhpn.exe 102 PID 3364 wrote to memory of 3356 3364 vjhpn.exe 102 PID 3364 wrote to memory of 3356 3364 vjhpn.exe 102 PID 3356 wrote to memory of 740 3356 xvffp.exe 103 PID 3356 wrote to memory of 740 3356 xvffp.exe 103 PID 3356 wrote to memory of 740 3356 xvffp.exe 103 PID 740 wrote to memory of 1284 740 hrjxvjx.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.691716b66eb8cfdcae6c17af87a38380.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.691716b66eb8cfdcae6c17af87a38380.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
\??\c:\rrvbh.exec:\rrvbh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
\??\c:\dnjpthn.exec:\dnjpthn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1592 -
\??\c:\njxllj.exec:\njxllj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\xnvdrhn.exec:\xnvdrhn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4760 -
\??\c:\hfdjdn.exec:\hfdjdn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\xjfrxxb.exec:\xjfrxxb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4720 -
\??\c:\llhrjrv.exec:\llhrjrv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
\??\c:\dtjxh.exec:\dtjxh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\xfnxxdp.exec:\xfnxxdp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
\??\c:\pfvph.exec:\pfvph.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
\??\c:\bvhrv.exec:\bvhrv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
\??\c:\lvjfb.exec:\lvjfb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3944 -
\??\c:\jvrbnfh.exec:\jvrbnfh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
\??\c:\fpftxjv.exec:\fpftxjv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
\??\c:\hxtbthd.exec:\hxtbthd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\fvrfdf.exec:\fvrfdf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3832 -
\??\c:\brbxvnr.exec:\brbxvnr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4796 -
\??\c:\bnjdfvp.exec:\bnjdfvp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\vjhpn.exec:\vjhpn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
\??\c:\xvffp.exec:\xvffp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3356 -
\??\c:\hrjxvjx.exec:\hrjxvjx.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
\??\c:\pjjbht.exec:\pjjbht.exe23⤵
- Executes dropped EXE
PID:1284 -
\??\c:\dvtjr.exec:\dvtjr.exe24⤵
- Executes dropped EXE
PID:1360 -
\??\c:\bnrjb.exec:\bnrjb.exe25⤵
- Executes dropped EXE
PID:840 -
\??\c:\blxrvb.exec:\blxrvb.exe26⤵
- Executes dropped EXE
PID:2644 -
\??\c:\nddrb.exec:\nddrb.exe27⤵
- Executes dropped EXE
PID:4000 -
\??\c:\nvrnpj.exec:\nvrnpj.exe28⤵
- Executes dropped EXE
PID:456 -
\??\c:\fnhfjp.exec:\fnhfjp.exe29⤵
- Executes dropped EXE
PID:2888 -
\??\c:\njhjlnx.exec:\njhjlnx.exe30⤵
- Executes dropped EXE
PID:4440 -
\??\c:\fblhxbd.exec:\fblhxbd.exe31⤵
- Executes dropped EXE
PID:3548 -
\??\c:\phhrf.exec:\phhrf.exe32⤵
- Executes dropped EXE
PID:3868 -
\??\c:\vrlnl.exec:\vrlnl.exe33⤵
- Executes dropped EXE
PID:3816 -
\??\c:\pvbrdp.exec:\pvbrdp.exe34⤵PID:3764
-
\??\c:\tjnxfv.exec:\tjnxfv.exe35⤵
- Executes dropped EXE
PID:4260 -
\??\c:\pbjbnn.exec:\pbjbnn.exe36⤵
- Executes dropped EXE
PID:3420 -
\??\c:\tddpxv.exec:\tddpxv.exe37⤵
- Executes dropped EXE
PID:4700 -
\??\c:\rvlnrl.exec:\rvlnrl.exe38⤵
- Executes dropped EXE
PID:4940 -
\??\c:\fbhbrvb.exec:\fbhbrvb.exe39⤵
- Executes dropped EXE
PID:2872 -
\??\c:\nvbvnjj.exec:\nvbvnjj.exe40⤵PID:4476
-
\??\c:\xdtddrx.exec:\xdtddrx.exe41⤵PID:724
-
\??\c:\hddtjhr.exec:\hddtjhr.exe42⤵
- Executes dropped EXE
PID:1716 -
\??\c:\nvndbfl.exec:\nvndbfl.exe43⤵
- Executes dropped EXE
PID:616 -
\??\c:\trrdjtx.exec:\trrdjtx.exe44⤵
- Executes dropped EXE
PID:1876 -
\??\c:\njjjnfr.exec:\njjjnfr.exe45⤵
- Executes dropped EXE
PID:4156 -
\??\c:\jrvfj.exec:\jrvfj.exe46⤵
- Executes dropped EXE
PID:1688 -
\??\c:\rbfxlrx.exec:\rbfxlrx.exe47⤵
- Executes dropped EXE
PID:5056 -
\??\c:\nptxn.exec:\nptxn.exe48⤵
- Executes dropped EXE
PID:912 -
\??\c:\rtlnnh.exec:\rtlnnh.exe49⤵
- Executes dropped EXE
PID:2652 -
\??\c:\prrbnl.exec:\prrbnl.exe50⤵
- Executes dropped EXE
PID:2036 -
\??\c:\xlfphdf.exec:\xlfphdf.exe51⤵
- Executes dropped EXE
PID:3104 -
\??\c:\bbdfphr.exec:\bbdfphr.exe52⤵
- Executes dropped EXE
PID:3824
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\fxljd.exec:\fxljd.exe1⤵
- Executes dropped EXE
PID:3732 -
\??\c:\fbntfbv.exec:\fbntfbv.exe2⤵
- Executes dropped EXE
PID:3832 -
\??\c:\htdfvn.exec:\htdfvn.exe3⤵
- Executes dropped EXE
PID:3124
-
-
-
\??\c:\tfdrp.exec:\tfdrp.exe1⤵
- Executes dropped EXE
PID:2944 -
\??\c:\dttnv.exec:\dttnv.exe2⤵
- Executes dropped EXE
PID:3348 -
\??\c:\bblnndn.exec:\bblnndn.exe3⤵
- Executes dropped EXE
PID:3492 -
\??\c:\fbvxxr.exec:\fbvxxr.exe4⤵
- Executes dropped EXE
PID:3876
-
-
-
-
\??\c:\vthflj.exec:\vthflj.exe1⤵
- Executes dropped EXE
PID:776 -
\??\c:\phxnhd.exec:\phxnhd.exe2⤵
- Executes dropped EXE
PID:4324 -
\??\c:\vbfpb.exec:\vbfpb.exe3⤵
- Executes dropped EXE
PID:3204 -
\??\c:\jfrrfh.exec:\jfrrfh.exe4⤵
- Executes dropped EXE
PID:4352 -
\??\c:\nvpnffp.exec:\nvpnffp.exe5⤵
- Executes dropped EXE
PID:2356 -
\??\c:\rvrfb.exec:\rvrfb.exe6⤵
- Executes dropped EXE
PID:1276 -
\??\c:\pxjtf.exec:\pxjtf.exe7⤵PID:2388
-
\??\c:\nthlb.exec:\nthlb.exe8⤵PID:2272
-
\??\c:\dffdx.exec:\dffdx.exe9⤵PID:4552
-
\??\c:\hrddfbl.exec:\hrddfbl.exe10⤵PID:380
-
\??\c:\vpxhb.exec:\vpxhb.exe11⤵PID:5100
-
\??\c:\plfpxjj.exec:\plfpxjj.exe12⤵PID:4964
-
\??\c:\xbtdllp.exec:\xbtdllp.exe13⤵PID:624
-
\??\c:\ffpjvr.exec:\ffpjvr.exe14⤵PID:3684
-
\??\c:\xrblrr.exec:\xrblrr.exe15⤵PID:1476
-
\??\c:\jnbjjp.exec:\jnbjjp.exe16⤵PID:1884
-
\??\c:\lhjjtv.exec:\lhjjtv.exe17⤵
- Executes dropped EXE
PID:4476 -
\??\c:\hlfrj.exec:\hlfrj.exe18⤵
- Executes dropped EXE
PID:724 -
\??\c:\vjlbhnp.exec:\vjlbhnp.exe19⤵PID:1060
-
\??\c:\bjlfrt.exec:\bjlfrt.exe20⤵PID:4412
-
\??\c:\fxjxvb.exec:\fxjxvb.exe21⤵PID:4888
-
\??\c:\vtdvr.exec:\vtdvr.exe22⤵PID:808
-
\??\c:\jlnnhj.exec:\jlnnhj.exe23⤵PID:3984
-
\??\c:\lxfjthr.exec:\lxfjthr.exe24⤵PID:3392
-
\??\c:\dpfdv.exec:\dpfdv.exe25⤵PID:3296
-
\??\c:\xtdlfjd.exec:\xtdlfjd.exe26⤵PID:4364
-
\??\c:\lbvnrjl.exec:\lbvnrjl.exe27⤵PID:4800
-
\??\c:\bhhvjj.exec:\bhhvjj.exe28⤵PID:2632
-
\??\c:\fldnf.exec:\fldnf.exe29⤵PID:1176
-
\??\c:\jhvhvnx.exec:\jhvhvnx.exe30⤵PID:4796
-
\??\c:\tvbxfjd.exec:\tvbxfjd.exe31⤵PID:4672
-
\??\c:\nhhrbb.exec:\nhhrbb.exe32⤵PID:2204
-
\??\c:\plrjdj.exec:\plrjdj.exe33⤵PID:1348
-
\??\c:\bfjfd.exec:\bfjfd.exe34⤵PID:3492
-
\??\c:\rbdhj.exec:\rbdhj.exe35⤵PID:2172
-
\??\c:\rhnblh.exec:\rhnblh.exe36⤵PID:1180
-
\??\c:\fhhddbt.exec:\fhhddbt.exe37⤵PID:1968
-
\??\c:\jfvfprf.exec:\jfvfprf.exe38⤵PID:2040
-
\??\c:\npvjdvb.exec:\npvjdvb.exe39⤵PID:4416
-
\??\c:\hjvjlt.exec:\hjvjlt.exe40⤵PID:2884
-
\??\c:\tlbdn.exec:\tlbdn.exe41⤵PID:3752
-
\??\c:\npxhhlj.exec:\npxhhlj.exe42⤵PID:2888
-
\??\c:\njvfjv.exec:\njvfjv.exe43⤵PID:2396
-
\??\c:\ndfxhf.exec:\ndfxhf.exe44⤵PID:4036
-
\??\c:\vtpprpl.exec:\vtpprpl.exe45⤵PID:4372
-
\??\c:\vpfxht.exec:\vpfxht.exe46⤵PID:4392
-
\??\c:\rrhntt.exec:\rrhntt.exe47⤵PID:3360
-
\??\c:\rlplxjh.exec:\rlplxjh.exe48⤵PID:624
-
\??\c:\fjlxjp.exec:\fjlxjp.exe49⤵PID:4940
-
\??\c:\fldpfbp.exec:\fldpfbp.exe50⤵PID:4708
-
\??\c:\dlfbb.exec:\dlfbb.exe51⤵PID:4192
-
\??\c:\jxrjh.exec:\jxrjh.exe52⤵PID:368
-
\??\c:\tjftxvf.exec:\tjftxvf.exe53⤵PID:2108
-
\??\c:\fjbrf.exec:\fjbrf.exe54⤵PID:1220
-
\??\c:\ffvft.exec:\ffvft.exe55⤵PID:4356
-
\??\c:\tjxdd.exec:\tjxdd.exe56⤵PID:4160
-
\??\c:\jdhvd.exec:\jdhvd.exe57⤵PID:912
-
\??\c:\txpvjn.exec:\txpvjn.exe58⤵PID:3448
-
\??\c:\npxdp.exec:\npxdp.exe59⤵PID:1368
-
\??\c:\vphvp.exec:\vphvp.exe60⤵PID:3772
-
\??\c:\vbbxrnr.exec:\vbbxrnr.exe61⤵PID:3540
-
\??\c:\lnbxd.exec:\lnbxd.exe62⤵PID:4712
-
\??\c:\jvlvbhd.exec:\jvlvbhd.exe63⤵PID:4620
-
\??\c:\fjbnp.exec:\fjbnp.exe64⤵PID:2792
-
\??\c:\flrlf.exec:\flrlf.exe65⤵PID:4460
-
\??\c:\vrrxnl.exec:\vrrxnl.exe66⤵PID:2264
-
\??\c:\fljbh.exec:\fljbh.exe67⤵PID:444
-
\??\c:\bvpvnl.exec:\bvpvnl.exe68⤵PID:4432
-
\??\c:\fbtbpp.exec:\fbtbpp.exe69⤵PID:4784
-
\??\c:\dltvbdr.exec:\dltvbdr.exe70⤵PID:4384
-
\??\c:\tdfnl.exec:\tdfnl.exe71⤵PID:2172
-
\??\c:\rbftjlr.exec:\rbftjlr.exe72⤵PID:3004
-
\??\c:\nvnfpv.exec:\nvnfpv.exe73⤵PID:1968
-
\??\c:\vbjnhd.exec:\vbjnhd.exe74⤵PID:3204
-
\??\c:\dtbhv.exec:\dtbhv.exe75⤵PID:4416
-
\??\c:\phrnjrb.exec:\phrnjrb.exe76⤵PID:3744
-
\??\c:\brbbtd.exec:\brbbtd.exe77⤵PID:4764
-
\??\c:\rfnftt.exec:\rfnftt.exe78⤵PID:5000
-
\??\c:\lfxlvfd.exec:\lfxlvfd.exe79⤵PID:4968
-
\??\c:\tvhxf.exec:\tvhxf.exe80⤵PID:4308
-
\??\c:\thtvdx.exec:\thtvdx.exe81⤵PID:4260
-
\??\c:\xpdjfjn.exec:\xpdjfjn.exe82⤵PID:1256
-
\??\c:\fbnldv.exec:\fbnldv.exe83⤵PID:2148
-
\??\c:\jxrvbfb.exec:\jxrvbfb.exe84⤵PID:4816
-
\??\c:\lvhvv.exec:\lvhvv.exe85⤵PID:1520
-
\??\c:\bljdb.exec:\bljdb.exe86⤵PID:3768
-
\??\c:\jjpdtb.exec:\jjpdtb.exe87⤵PID:3260
-
\??\c:\ptdbx.exec:\ptdbx.exe88⤵PID:4936
-
\??\c:\lxdxtf.exec:\lxdxtf.exe89⤵PID:2376
-
\??\c:\vhnrd.exec:\vhnrd.exe90⤵PID:4464
-
\??\c:\xlrbv.exec:\xlrbv.exe91⤵PID:4864
-
\??\c:\dfdbv.exec:\dfdbv.exe92⤵PID:4732
-
\??\c:\htdnhb.exec:\htdnhb.exe93⤵PID:3448
-
\??\c:\tvfvltp.exec:\tvfvltp.exe94⤵PID:4892
-
\??\c:\lfvbbfr.exec:\lfvbbfr.exe95⤵PID:3404
-
\??\c:\pntrr.exec:\pntrr.exe96⤵PID:868
-
\??\c:\dflbnn.exec:\dflbnn.exe97⤵PID:3632
-
\??\c:\dnprd.exec:\dnprd.exe98⤵PID:4188
-
\??\c:\njbvhx.exec:\njbvhx.exe99⤵PID:3736
-
\??\c:\pnhpf.exec:\pnhpf.exe100⤵PID:1296
-
\??\c:\bxfvv.exec:\bxfvv.exe101⤵PID:4596
-
\??\c:\xrxddn.exec:\xrxddn.exe102⤵PID:3356
-
\??\c:\lrxxv.exec:\lrxxv.exe103⤵PID:4960
-
\??\c:\ldljhbj.exec:\ldljhbj.exe104⤵PID:984
-
\??\c:\hjdff.exec:\hjdff.exe105⤵PID:4384
-
\??\c:\tbllvr.exec:\tbllvr.exe106⤵PID:2172
-
\??\c:\djdjf.exec:\djdjf.exe107⤵PID:3004
-
\??\c:\nnjdxdp.exec:\nnjdxdp.exe108⤵PID:1968
-
\??\c:\xxntvt.exec:\xxntvt.exe109⤵PID:2972
-
\??\c:\bfdrxt.exec:\bfdrxt.exe110⤵PID:848
-
\??\c:\fjrtn.exec:\fjrtn.exe111⤵PID:3860
-
\??\c:\xlrlj.exec:\xlrlj.exe112⤵PID:4600
-
\??\c:\jfvvpr.exec:\jfvvpr.exe113⤵PID:5000
-
\??\c:\jtvndvn.exec:\jtvndvn.exe114⤵PID:2580
-
\??\c:\hxlxnnv.exec:\hxlxnnv.exe115⤵PID:4300
-
\??\c:\jdxbrnv.exec:\jdxbrnv.exe116⤵PID:3688
-
\??\c:\dhfhxf.exec:\dhfhxf.exe117⤵PID:3440
-
\??\c:\tfhjnbn.exec:\tfhjnbn.exe118⤵PID:1644
-
\??\c:\vnlnxjp.exec:\vnlnxjp.exe119⤵PID:4940
-
\??\c:\tdvvjlf.exec:\tdvvjlf.exe120⤵PID:3228
-
\??\c:\ddlrh.exec:\ddlrh.exe121⤵PID:1688
-
\??\c:\rldbxpl.exec:\rldbxpl.exe122⤵PID:2652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-