Analysis
-
max time kernel
156s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2023 18:29
Behavioral task
behavioral1
Sample
NEAS.97a9cc297abc4b354fac008d70ee07f0.exe
Resource
win7-20230831-en
windows7-x64
5 signatures
150 seconds
General
-
Target
NEAS.97a9cc297abc4b354fac008d70ee07f0.exe
-
Size
375KB
-
MD5
97a9cc297abc4b354fac008d70ee07f0
-
SHA1
2dde501a127d3840ecb28023c7af7a62eedd8200
-
SHA256
a78048f677a7c288d3f4f1243ce0ea8709669af545ce2cdf01b33869d8effee9
-
SHA512
5956586e624cfee7b69e30c1111a7ed213e318183907031a5e8f8653c0099ec2dcf6a9caa826fe3caf8b32156c84f4fc15d376d672cf69facbed1dffa5fa383e
-
SSDEEP
6144:Wcm4FmowdHoS0hraHcpOFltH4teP0sAWH6Y6YABVAXG/0ROGk7MD77EwiAQj3Ny6:44wFHoSMeFph0TKQbVeG8RO7747pQjk6
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/4708-8-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3384-23-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4116-28-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3460-35-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1512-32-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5080-43-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1612-12-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2664-4-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/808-57-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1272-63-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1848-70-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2004-68-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3928-79-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2640-84-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4060-89-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4100-96-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2100-110-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4496-123-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4996-134-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/532-147-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4844-155-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5052-161-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/872-166-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1252-168-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3076-179-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4428-182-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2992-190-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1384-196-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2252-187-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2692-175-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3916-141-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2044-118-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1108-115-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2268-199-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3476-94-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1204-211-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2708-218-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/384-221-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5048-247-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4876-252-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4512-258-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/5008-272-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4352-282-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2288-292-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2060-308-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4492-326-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/112-330-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3992-346-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4824-339-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2032-335-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3104-349-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/2268-368-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3880-383-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4692-392-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4708-398-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3540-424-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3540-420-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1996-432-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3612-463-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3196-469-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/3844-485-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1688-492-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/4888-524-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral2/memory/1208-731-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4708 lfhlxjv.exe 1612 lvfbbfr.exe 3384 dvtxvhd.exe 4116 bdhfb.exe 1512 dhxbvh.exe 3460 xrjpfh.exe 5080 tpndp.exe 2800 bnjtrnp.exe 1084 dbnhjnh.exe 808 bvpnl.exe 1272 tvtdn.exe 2004 pnrvljx.exe 1848 nldxtpl.exe 3928 phhjd.exe 2640 jbfjhd.exe 4060 hhrhlht.exe 3476 bdrlh.exe 4100 xrfldxl.exe 2196 rlvxp.exe 2100 dhdvlxd.exe 1108 lhndrh.exe 2044 jdldb.exe 4496 xllhjj.exe 3896 tnvbbvj.exe 4996 jfjtdt.exe 3916 jbdrxt.exe 532 ptxdpj.exe 4844 pnpjnbj.exe 5052 tvndp.exe 1252 lprllp.exe 872 fltjd.exe 2692 dbpjv.exe 3076 dtxpxh.exe 4428 ffjdd.exe 2252 ljpnjbf.exe 2992 xpxbr.exe 4616 nvvlvp.exe 1384 ffxlrf.exe 2268 vrthrjp.exe 2156 btfffht.exe 3060 rdhvnrr.exe 4328 dhrtvv.exe 1204 dpnlfn.exe 1356 dnbfr.exe 2708 lvvdhjd.exe 384 rjpldl.exe 468 hnrhf.exe 4576 frfvhll.exe 2644 tftbpjd.exe 4420 rxnbbtv.exe 2660 fpjlb.exe 4444 tjvxdn.exe 4180 fflnvt.exe 1512 pfhdjf.exe 5048 thhrnbl.exe 4876 vdtvr.exe 3340 htbdxh.exe 4512 tjnxpx.exe 5108 hptxlf.exe 4112 jbhnjr.exe 4976 rvpltx.exe 1272 tvtdn.exe 5008 thxtpf.exe 1540 fdrrd.exe -
resource yara_rule behavioral2/memory/2664-0-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023167-5.dat upx behavioral2/memory/4708-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0009000000023169-10.dat upx behavioral2/files/0x0009000000023169-9.dat upx behavioral2/files/0x0007000000023243-16.dat upx behavioral2/memory/4116-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/3384-23-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0007000000023246-19.dat upx behavioral2/files/0x0007000000023247-26.dat upx behavioral2/memory/4116-28-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1512-27-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000600000002324b-31.dat upx behavioral2/memory/3460-35-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000600000002324c-37.dat upx behavioral2/files/0x000600000002324c-39.dat upx behavioral2/files/0x000600000002324b-33.dat upx behavioral2/memory/1512-32-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000600000002324d-44.dat upx behavioral2/memory/5080-43-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000600000002324e-49.dat upx behavioral2/files/0x000600000002324e-47.dat upx behavioral2/files/0x000600000002324f-54.dat upx behavioral2/files/0x000600000002324f-52.dat upx behavioral2/files/0x000600000002324d-42.dat upx behavioral2/files/0x0007000000023247-25.dat upx behavioral2/files/0x0007000000023246-20.dat upx behavioral2/files/0x0007000000023243-14.dat upx behavioral2/files/0x0007000000023243-11.dat upx behavioral2/memory/1612-12-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/2664-4-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0008000000023167-3.dat upx behavioral2/files/0x0006000000023250-58.dat upx behavioral2/files/0x0006000000023250-59.dat upx behavioral2/memory/808-57-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/1272-63-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0006000000023251-64.dat upx behavioral2/files/0x0006000000023251-62.dat upx behavioral2/files/0x0006000000023252-67.dat upx behavioral2/memory/1848-70-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0006000000023252-69.dat upx behavioral2/memory/2004-68-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0006000000023253-73.dat upx behavioral2/files/0x0006000000023253-75.dat upx behavioral2/files/0x0006000000023254-80.dat upx behavioral2/memory/3928-79-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0006000000023254-78.dat upx behavioral2/files/0x0006000000023255-83.dat upx behavioral2/files/0x0006000000023255-85.dat upx behavioral2/memory/2640-84-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0006000000023256-90.dat upx behavioral2/files/0x0006000000023256-88.dat upx behavioral2/memory/4060-89-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0006000000023257-93.dat upx behavioral2/memory/4100-96-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x0006000000023258-101.dat upx behavioral2/files/0x0006000000023258-100.dat upx behavioral2/files/0x000600000002325a-104.dat upx behavioral2/files/0x000600000002325a-106.dat upx behavioral2/files/0x0006000000023257-95.dat upx behavioral2/files/0x000600000002325b-109.dat upx behavioral2/files/0x000600000002325b-111.dat upx behavioral2/memory/2100-110-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/files/0x000600000002325e-128.dat upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2664 wrote to memory of 4708 2664 NEAS.97a9cc297abc4b354fac008d70ee07f0.exe 82 PID 2664 wrote to memory of 4708 2664 NEAS.97a9cc297abc4b354fac008d70ee07f0.exe 82 PID 2664 wrote to memory of 4708 2664 NEAS.97a9cc297abc4b354fac008d70ee07f0.exe 82 PID 4708 wrote to memory of 1612 4708 vbbhdp.exe 91 PID 4708 wrote to memory of 1612 4708 vbbhdp.exe 91 PID 4708 wrote to memory of 1612 4708 vbbhdp.exe 91 PID 1612 wrote to memory of 3384 1612 lvfbbfr.exe 208 PID 1612 wrote to memory of 3384 1612 lvfbbfr.exe 208 PID 1612 wrote to memory of 3384 1612 lvfbbfr.exe 208 PID 3384 wrote to memory of 4116 3384 dvtxvhd.exe 83 PID 3384 wrote to memory of 4116 3384 dvtxvhd.exe 83 PID 3384 wrote to memory of 4116 3384 dvtxvhd.exe 83 PID 4116 wrote to memory of 1512 4116 bdhfb.exe 136 PID 4116 wrote to memory of 1512 4116 bdhfb.exe 136 PID 4116 wrote to memory of 1512 4116 bdhfb.exe 136 PID 1512 wrote to memory of 3460 1512 dhxbvh.exe 85 PID 1512 wrote to memory of 3460 1512 dhxbvh.exe 85 PID 1512 wrote to memory of 3460 1512 dhxbvh.exe 85 PID 3460 wrote to memory of 5080 3460 xrjpfh.exe 190 PID 3460 wrote to memory of 5080 3460 xrjpfh.exe 190 PID 3460 wrote to memory of 5080 3460 xrjpfh.exe 190 PID 5080 wrote to memory of 2800 5080 tpndp.exe 240 PID 5080 wrote to memory of 2800 5080 tpndp.exe 240 PID 5080 wrote to memory of 2800 5080 tpndp.exe 240 PID 2800 wrote to memory of 1084 2800 bnjtrnp.exe 88 PID 2800 wrote to memory of 1084 2800 bnjtrnp.exe 88 PID 2800 wrote to memory of 1084 2800 bnjtrnp.exe 88 PID 1084 wrote to memory of 808 1084 dbnhjnh.exe 89 PID 1084 wrote to memory of 808 1084 dbnhjnh.exe 89 PID 1084 wrote to memory of 808 1084 dbnhjnh.exe 89 PID 808 wrote to memory of 1272 808 bvpnl.exe 198 PID 808 wrote to memory of 1272 808 bvpnl.exe 198 PID 808 wrote to memory of 1272 808 bvpnl.exe 198 PID 1272 wrote to memory of 2004 1272 tvtdn.exe 93 PID 1272 wrote to memory of 2004 1272 tvtdn.exe 93 PID 1272 wrote to memory of 2004 1272 tvtdn.exe 93 PID 2004 wrote to memory of 1848 2004 pnrvljx.exe 94 PID 2004 wrote to memory of 1848 2004 pnrvljx.exe 94 PID 2004 wrote to memory of 1848 2004 pnrvljx.exe 94 PID 1848 wrote to memory of 3928 1848 nldxtpl.exe 96 PID 1848 wrote to memory of 3928 1848 nldxtpl.exe 96 PID 1848 wrote to memory of 3928 1848 nldxtpl.exe 96 PID 3928 wrote to memory of 2640 3928 phhjd.exe 95 PID 3928 wrote to memory of 2640 3928 phhjd.exe 95 PID 3928 wrote to memory of 2640 3928 phhjd.exe 95 PID 2640 wrote to memory of 4060 2640 jbfjhd.exe 97 PID 2640 wrote to memory of 4060 2640 jbfjhd.exe 97 PID 2640 wrote to memory of 4060 2640 jbfjhd.exe 97 PID 4060 wrote to memory of 3476 4060 hhrhlht.exe 98 PID 4060 wrote to memory of 3476 4060 hhrhlht.exe 98 PID 4060 wrote to memory of 3476 4060 hhrhlht.exe 98 PID 3476 wrote to memory of 4100 3476 bdrlh.exe 122 PID 3476 wrote to memory of 4100 3476 bdrlh.exe 122 PID 3476 wrote to memory of 4100 3476 bdrlh.exe 122 PID 4100 wrote to memory of 2196 4100 xrfldxl.exe 99 PID 4100 wrote to memory of 2196 4100 xrfldxl.exe 99 PID 4100 wrote to memory of 2196 4100 xrfldxl.exe 99 PID 2196 wrote to memory of 2100 2196 rlvxp.exe 100 PID 2196 wrote to memory of 2100 2196 rlvxp.exe 100 PID 2196 wrote to memory of 2100 2196 rlvxp.exe 100 PID 2100 wrote to memory of 1108 2100 dhdvlxd.exe 121 PID 2100 wrote to memory of 1108 2100 dhdvlxd.exe 121 PID 2100 wrote to memory of 1108 2100 dhdvlxd.exe 121 PID 1108 wrote to memory of 2044 1108 lhndrh.exe 261
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.97a9cc297abc4b354fac008d70ee07f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.97a9cc297abc4b354fac008d70ee07f0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\lfhlxjv.exec:\lfhlxjv.exe2⤵
- Executes dropped EXE
PID:4708 -
\??\c:\lvfbbfr.exec:\lvfbbfr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1612
-
-
-
\??\c:\bdhfb.exec:\bdhfb.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
\??\c:\lfffjv.exec:\lfffjv.exe2⤵PID:1512
-
\??\c:\xrjpfh.exec:\xrjpfh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
\??\c:\xhvxdl.exec:\xhvxdl.exe4⤵PID:5080
-
\??\c:\tdhxhj.exec:\tdhxhj.exe5⤵PID:2800
-
\??\c:\dbnhjnh.exec:\dbnhjnh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1084 -
\??\c:\bvpnl.exec:\bvpnl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:808 -
\??\c:\rnnnpl.exec:\rnnnpl.exe8⤵PID:1272
-
\??\c:\pnrvljx.exec:\pnrvljx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\nldxtpl.exec:\nldxtpl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
\??\c:\phhjd.exec:\phhjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928
-
-
-
-
-
-
-
-
\??\c:\thhrnbl.exec:\thhrnbl.exe5⤵
- Executes dropped EXE
PID:5048 -
\??\c:\frdnx.exec:\frdnx.exe6⤵PID:3540
-
\??\c:\hrnhtn.exec:\hrnhtn.exe7⤵PID:3012
-
\??\c:\vrrbhh.exec:\vrrbhh.exe8⤵PID:1996
-
-
-
-
-
-
-
-
\??\c:\xtdhv.exec:\xtdhv.exe1⤵PID:3384
-
\??\c:\prlfbxh.exec:\prlfbxh.exe2⤵PID:1600
-
-
\??\c:\jbfjhd.exec:\jbfjhd.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\hhrhlht.exec:\hhrhlht.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
\??\c:\bdrlh.exec:\bdrlh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
\??\c:\xrfldxl.exec:\xrfldxl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100
-
-
-
-
\??\c:\rlvxp.exec:\rlvxp.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
\??\c:\dhdvlxd.exec:\dhdvlxd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\lhndrh.exec:\lhndrh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108
-
-
-
\??\c:\httbp.exec:\httbp.exe1⤵PID:2044
-
\??\c:\xllhjj.exec:\xllhjj.exe2⤵
- Executes dropped EXE
PID:4496
-
-
\??\c:\dvnhrpx.exec:\dvnhrpx.exe2⤵PID:2332
-
\??\c:\fnfxdtr.exec:\fnfxdtr.exe3⤵PID:3860
-
\??\c:\xdvpv.exec:\xdvpv.exe4⤵PID:4608
-
\??\c:\xrtnrv.exec:\xrtnrv.exe5⤵PID:544
-
\??\c:\jrtnrrj.exec:\jrtnrrj.exe6⤵PID:1652
-
\??\c:\ltvbnh.exec:\ltvbnh.exe7⤵PID:4292
-
\??\c:\pphpfl.exec:\pphpfl.exe8⤵PID:2520
-
\??\c:\prrxhj.exec:\prrxhj.exe9⤵PID:5040
-
\??\c:\lprllp.exec:\lprllp.exe10⤵
- Executes dropped EXE
PID:1252 -
\??\c:\fbdxlvd.exec:\fbdxlvd.exe11⤵PID:4280
-
\??\c:\lpvtvbd.exec:\lpvtvbd.exe12⤵PID:4244
-
\??\c:\jplvhh.exec:\jplvhh.exe13⤵PID:3104
-
\??\c:\fhttvlf.exec:\fhttvlf.exe14⤵PID:4724
-
\??\c:\xxxxdxh.exec:\xxxxdxh.exe15⤵PID:1480
-
\??\c:\xdthpd.exec:\xdthpd.exe16⤵PID:1520
-
\??\c:\fdbxr.exec:\fdbxr.exe17⤵PID:4848
-
\??\c:\jjvlhl.exec:\jjvlhl.exe18⤵PID:1268
-
\??\c:\lldblx.exec:\lldblx.exe19⤵PID:3056
-
\??\c:\vlphlxj.exec:\vlphlxj.exe20⤵PID:3880
-
\??\c:\dnbfr.exec:\dnbfr.exe21⤵
- Executes dropped EXE
PID:1356 -
\??\c:\rthpvtt.exec:\rthpvtt.exe22⤵PID:4692
-
\??\c:\bthvp.exec:\bthvp.exe23⤵PID:4632
-
\??\c:\tnhptr.exec:\tnhptr.exe24⤵PID:3304
-
\??\c:\ptrdbbr.exec:\ptrdbbr.exe25⤵PID:1156
-
\??\c:\xjlxldj.exec:\xjlxldj.exe26⤵PID:4116
-
\??\c:\pvjbppp.exec:\pvjbppp.exe27⤵PID:2528
-
\??\c:\fflnvt.exec:\fflnvt.exe28⤵
- Executes dropped EXE
PID:4180 -
\??\c:\pfhdjf.exec:\pfhdjf.exe29⤵
- Executes dropped EXE
PID:1512 -
\??\c:\fldbx.exec:\fldbx.exe30⤵PID:2564
-
\??\c:\vdtvr.exec:\vdtvr.exe31⤵
- Executes dropped EXE
PID:4876 -
\??\c:\phhvxp.exec:\phhvxp.exe32⤵PID:1224
-
\??\c:\dbtdvt.exec:\dbtdvt.exe33⤵PID:228
-
\??\c:\nnrhpr.exec:\nnrhpr.exe34⤵PID:3012
-
\??\c:\phbrnj.exec:\phbrnj.exe35⤵PID:808
-
\??\c:\lvxtlff.exec:\lvxtlff.exe36⤵PID:2440
-
\??\c:\thxtpf.exec:\thxtpf.exe37⤵
- Executes dropped EXE
PID:5008 -
\??\c:\nlfdj.exec:\nlfdj.exe38⤵PID:1208
-
\??\c:\lxpnfdx.exec:\lxpnfdx.exe39⤵PID:3424
-
\??\c:\dtdhdd.exec:\dtdhdd.exe40⤵PID:1016
-
\??\c:\rfhvtv.exec:\rfhvtv.exe41⤵PID:4488
-
\??\c:\hdjpx.exec:\hdjpx.exe42⤵PID:2972
-
\??\c:\flvvj.exec:\flvvj.exe43⤵PID:3772
-
\??\c:\tjnbhx.exec:\tjnbhx.exe44⤵PID:4896
-
\??\c:\txhhl.exec:\txhhl.exe45⤵PID:3612
-
\??\c:\jhvxj.exec:\jhvxj.exe46⤵PID:4600
-
\??\c:\nvrbld.exec:\nvrbld.exe47⤵PID:2756
-
\??\c:\trfbnj.exec:\trfbnj.exe48⤵PID:4260
-
\??\c:\nblxvdh.exec:\nblxvdh.exe49⤵PID:2060
-
\??\c:\dpbjbt.exec:\dpbjbt.exe50⤵PID:3900
-
\??\c:\xhpdjtv.exec:\xhpdjtv.exe51⤵PID:1892
-
\??\c:\nxvptvp.exec:\nxvptvp.exe52⤵PID:4684
-
\??\c:\vpbxj.exec:\vpbxj.exe53⤵PID:2204
-
\??\c:\hdtftd.exec:\hdtftd.exe54⤵PID:4820
-
\??\c:\fxjhbbf.exec:\fxjhbbf.exe55⤵PID:3824
-
\??\c:\pjfxvx.exec:\pjfxvx.exe56⤵PID:4240
-
\??\c:\pftxb.exec:\pftxb.exe57⤵PID:2696
-
\??\c:\xhrtjd.exec:\xhrtjd.exe58⤵PID:1508
-
\??\c:\flhblj.exec:\flhblj.exe59⤵PID:4928
-
\??\c:\xlfhh.exec:\xlfhh.exe60⤵PID:2588
-
\??\c:\bprnd.exec:\bprnd.exe61⤵PID:2372
-
\??\c:\dpfhl.exec:\dpfhl.exe62⤵PID:3320
-
\??\c:\xppxhbl.exec:\xppxhbl.exe63⤵PID:3892
-
\??\c:\plhxr.exec:\plhxr.exe64⤵PID:4508
-
\??\c:\bvdhl.exec:\bvdhl.exe65⤵PID:4256
-
\??\c:\fdxjjdt.exec:\fdxjjdt.exe66⤵PID:1680
-
\??\c:\xrjlhnn.exec:\xrjlhnn.exe67⤵PID:2664
-
\??\c:\njhdb.exec:\njhdb.exe68⤵PID:3436
-
\??\c:\lbhxtph.exec:\lbhxtph.exe69⤵PID:4632
-
\??\c:\vtlfp.exec:\vtlfp.exe70⤵PID:3304
-
\??\c:\rbhpbjh.exec:\rbhpbjh.exe71⤵PID:2856
-
\??\c:\xxxnrf.exec:\xxxnrf.exe72⤵PID:4116
-
\??\c:\ndnbnb.exec:\ndnbnb.exe73⤵PID:4996
-
\??\c:\ddtxn.exec:\ddtxn.exe74⤵PID:692
-
\??\c:\xnphj.exec:\xnphj.exe75⤵PID:1784
-
\??\c:\vxxnnvx.exec:\vxxnnvx.exe76⤵PID:2564
-
\??\c:\nvjbv.exec:\nvjbv.exe77⤵PID:4404
-
\??\c:\vtvbb.exec:\vtvbb.exe78⤵PID:1428
-
\??\c:\bpbhrv.exec:\bpbhrv.exe79⤵PID:2004
-
\??\c:\txptxxb.exec:\txptxxb.exe80⤵PID:4440
-
\??\c:\vjtvxt.exec:\vjtvxt.exe81⤵PID:3980
-
\??\c:\trjdjbr.exec:\trjdjbr.exe82⤵PID:5036
-
\??\c:\fdphj.exec:\fdphj.exe83⤵PID:5068
-
\??\c:\xtxxn.exec:\xtxxn.exe84⤵PID:3332
-
\??\c:\bvnrfdj.exec:\bvnrfdj.exe85⤵PID:4436
-
\??\c:\fxpvttb.exec:\fxpvttb.exe86⤵PID:860
-
\??\c:\tbpxhdd.exec:\tbpxhdd.exe87⤵PID:1580
-
\??\c:\lfrntvl.exec:\lfrntvl.exe88⤵PID:4592
-
\??\c:\lbhhfv.exec:\lbhhfv.exe89⤵PID:3772
-
\??\c:\ftbxhh.exec:\ftbxhh.exe90⤵PID:60
-
\??\c:\tllvjnb.exec:\tllvjnb.exe91⤵PID:2100
-
\??\c:\nfrxjn.exec:\nfrxjn.exe92⤵PID:2680
-
\??\c:\djfrxhb.exec:\djfrxhb.exe93⤵PID:772
-
\??\c:\dfhdtxv.exec:\dfhdtxv.exe94⤵PID:2332
-
\??\c:\ppbhxp.exec:\ppbhxp.exe95⤵PID:2444
-
\??\c:\bnjrr.exec:\bnjrr.exe96⤵PID:1544
-
\??\c:\rxndjt.exec:\rxndjt.exe97⤵PID:4584
-
\??\c:\dpbfnvp.exec:\dpbfnvp.exe98⤵PID:4284
-
\??\c:\rnhjf.exec:\rnhjf.exe99⤵PID:3900
-
\??\c:\jvhlrfp.exec:\jvhlrfp.exe100⤵PID:1892
-
\??\c:\rpnxn.exec:\rpnxn.exe101⤵PID:532
-
\??\c:\hlhjn.exec:\hlhjn.exe102⤵PID:1800
-
\??\c:\tjhrhnf.exec:\tjhrhnf.exe103⤵PID:4820
-
\??\c:\tdtbd.exec:\tdtbd.exe104⤵PID:5012
-
\??\c:\hrjdbdb.exec:\hrjdbdb.exe105⤵PID:112
-
\??\c:\xvbtjrx.exec:\xvbtjrx.exe106⤵PID:2692
-
\??\c:\lbfflh.exec:\lbfflh.exe107⤵PID:3992
-
\??\c:\trrtd.exec:\trrtd.exe108⤵PID:3176
-
\??\c:\frjtx.exec:\frjtx.exe109⤵PID:2488
-
\??\c:\brbxptn.exec:\brbxptn.exe110⤵PID:2188
-
\??\c:\bhdnl.exec:\bhdnl.exe111⤵PID:2824
-
\??\c:\pbflhpl.exec:\pbflhpl.exe112⤵PID:1888
-
\??\c:\dxlpnfl.exec:\dxlpnfl.exe113⤵PID:4848
-
\??\c:\hlfthnl.exec:\hlfthnl.exe114⤵PID:2484
-
\??\c:\jpdhdtt.exec:\jpdhdtt.exe115⤵PID:4780
-
\??\c:\xtxpb.exec:\xtxpb.exe116⤵PID:372
-
\??\c:\fntbhpd.exec:\fntbhpd.exe117⤵PID:4692
-
\??\c:\vlblnv.exec:\vlblnv.exe118⤵PID:1032
-
\??\c:\llhlx.exec:\llhlx.exe119⤵PID:4636
-
\??\c:\xbjnjtp.exec:\xbjnjtp.exe120⤵PID:5004
-
\??\c:\fhdtbdb.exec:\fhdtbdb.exe121⤵PID:2404
-
\??\c:\hhvhdt.exec:\hhvhdt.exe122⤵PID:748
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-