Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.bfc58916ecb82b0722c30a119a02dff0.exe
Resource
win7-20231020-en
5 signatures
150 seconds
General
-
Target
NEAS.bfc58916ecb82b0722c30a119a02dff0.exe
-
Size
233KB
-
MD5
bfc58916ecb82b0722c30a119a02dff0
-
SHA1
6e04697aa5185e99ab0da105a2654f37abf6c3a1
-
SHA256
42bcbfbfc0019acea5db079ed46bad64658a57b0286a1ba9e7ef83125b08ba01
-
SHA512
1c4f603888a602e5d86d155f4c8c2e98ed86b6bfa898aa04824d1d60be7d4f98bb63bddb136e7757b7cffee7f1ba405a64f93f11b4b67c8ce3c1411c982ee607
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4MAWYi7tQ:n3C9BRo7MlrWKo+lxtntQ
Malware Config
Signatures
-
Detect Blackmoon payload 33 IoCs
resource yara_rule behavioral2/memory/4716-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2936-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4864-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2236-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3992-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1908-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1368-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4760-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4364-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3896-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4576-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2672-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2156-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4752-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4056-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2796-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3344-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2488-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1984-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4784-212-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1156-227-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4464-243-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4276-267-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1488-279-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4032-281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1708-292-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1708-290-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3436-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2196-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1168-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/640-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2128-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2700-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2936 tppxt.exe 4864 vdxfd.exe 2388 jpvxf.exe 2236 vpbtvj.exe 3992 dlrhb.exe 1908 dxdfr.exe 1368 jbnjrf.exe 4760 blfnt.exe 4364 vlptv.exe 2156 fxhldbp.exe 3896 vtxxnj.exe 4576 ndvnrpj.exe 2672 lbrndl.exe 4752 jdlfvbx.exe 4176 vnnpjht.exe 2700 fbpjvpv.exe 4056 llpvlfv.exe 2796 vjvhpl.exe 5024 rdxdxdr.exe 3344 rrprp.exe 2184 xvpplfr.exe 2488 frvhf.exe 2128 phtbxf.exe 640 btbrj.exe 3236 bpdfn.exe 1984 lppjpt.exe 1168 lvdlv.exe 4784 ldnbbv.exe 3288 trfvjb.exe 1156 jvhbh.exe 2196 bpdvvx.exe 4464 hjhbt.exe 4368 phbjj.exe 3436 vpttjbx.exe 2380 rtdvp.exe 1244 xlxfvb.exe 2940 ljrnvdr.exe 1488 dfbnvt.exe 4032 tvfpdbf.exe 2944 vtfjt.exe 1708 fhdplj.exe 2236 vpbtvj.exe 1668 jjvpdr.exe 1216 vrdvrxf.exe 2684 vdpdb.exe 1656 jvfjjr.exe 3156 jfvtttn.exe 4740 bfhjtd.exe 4364 vlptv.exe 3076 jjpvx.exe 4660 vnpvph.exe 4844 xvxdpx.exe 4468 bjvjb.exe 1108 rdprln.exe 2852 plfvrth.exe 4020 xvvxr.exe 1432 nddhhl.exe 1912 rxfhvh.exe 684 tjnlxh.exe 460 xbvrp.exe 3592 dbpbbdx.exe 1228 djhbv.exe 1592 hbpfr.exe 4936 vrphjpn.exe -
resource yara_rule behavioral2/memory/4716-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4716-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2936-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2936-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4864-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2388-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2236-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2236-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3992-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3992-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1908-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1908-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1368-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4760-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4364-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3896-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3896-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4576-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4576-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2672-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2156-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4752-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4056-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4056-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2796-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3344-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3344-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2184-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2488-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2488-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1984-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1156-227-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4464-243-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-252-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4276-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4276-267-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1488-274-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1488-279-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4032-281-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2944-285-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1708-292-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1708-290-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2236-296-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1668-301-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2380-258-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3436-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4368-247-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4464-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2196-235-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2196-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1156-225-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1168-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1168-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/640-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2128-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2128-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5024-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2700-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4752-109-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 2936 4716 NEAS.bfc58916ecb82b0722c30a119a02dff0.exe 84 PID 4716 wrote to memory of 2936 4716 NEAS.bfc58916ecb82b0722c30a119a02dff0.exe 84 PID 4716 wrote to memory of 2936 4716 NEAS.bfc58916ecb82b0722c30a119a02dff0.exe 84 PID 2936 wrote to memory of 4864 2936 tppxt.exe 162 PID 2936 wrote to memory of 4864 2936 tppxt.exe 162 PID 2936 wrote to memory of 4864 2936 tppxt.exe 162 PID 4864 wrote to memory of 2388 4864 vdxfd.exe 86 PID 4864 wrote to memory of 2388 4864 vdxfd.exe 86 PID 4864 wrote to memory of 2388 4864 vdxfd.exe 86 PID 2388 wrote to memory of 2236 2388 jpvxf.exe 266 PID 2388 wrote to memory of 2236 2388 jpvxf.exe 266 PID 2388 wrote to memory of 2236 2388 jpvxf.exe 266 PID 2236 wrote to memory of 3992 2236 vpbtvj.exe 88 PID 2236 wrote to memory of 3992 2236 vpbtvj.exe 88 PID 2236 wrote to memory of 3992 2236 vpbtvj.exe 88 PID 3992 wrote to memory of 1908 3992 dlrhb.exe 89 PID 3992 wrote to memory of 1908 3992 dlrhb.exe 89 PID 3992 wrote to memory of 1908 3992 dlrhb.exe 89 PID 1908 wrote to memory of 1368 1908 dxdfr.exe 228 PID 1908 wrote to memory of 1368 1908 dxdfr.exe 228 PID 1908 wrote to memory of 1368 1908 dxdfr.exe 228 PID 1368 wrote to memory of 4760 1368 jbnjrf.exe 408 PID 1368 wrote to memory of 4760 1368 jbnjrf.exe 408 PID 1368 wrote to memory of 4760 1368 jbnjrf.exe 408 PID 4760 wrote to memory of 4364 4760 blfnt.exe 176 PID 4760 wrote to memory of 4364 4760 blfnt.exe 176 PID 4760 wrote to memory of 4364 4760 blfnt.exe 176 PID 4364 wrote to memory of 2156 4364 vlptv.exe 445 PID 4364 wrote to memory of 2156 4364 vlptv.exe 445 PID 4364 wrote to memory of 2156 4364 vlptv.exe 445 PID 2156 wrote to memory of 3896 2156 fxhldbp.exe 306 PID 2156 wrote to memory of 3896 2156 fxhldbp.exe 306 PID 2156 wrote to memory of 3896 2156 fxhldbp.exe 306 PID 3896 wrote to memory of 4576 3896 frfbpf.exe 499 PID 3896 wrote to memory of 4576 3896 frfbpf.exe 499 PID 3896 wrote to memory of 4576 3896 frfbpf.exe 499 PID 4576 wrote to memory of 2672 4576 ndvnrpj.exe 311 PID 4576 wrote to memory of 2672 4576 ndvnrpj.exe 311 PID 4576 wrote to memory of 2672 4576 ndvnrpj.exe 311 PID 2672 wrote to memory of 4752 2672 lbrndl.exe 475 PID 2672 wrote to memory of 4752 2672 lbrndl.exe 475 PID 2672 wrote to memory of 4752 2672 lbrndl.exe 475 PID 4752 wrote to memory of 4176 4752 jdlfvbx.exe 194 PID 4752 wrote to memory of 4176 4752 jdlfvbx.exe 194 PID 4752 wrote to memory of 4176 4752 jdlfvbx.exe 194 PID 4176 wrote to memory of 2700 4176 ljdfvf.exe 99 PID 4176 wrote to memory of 2700 4176 ljdfvf.exe 99 PID 4176 wrote to memory of 2700 4176 ljdfvf.exe 99 PID 2700 wrote to memory of 4056 2700 fbpjvpv.exe 377 PID 2700 wrote to memory of 4056 2700 fbpjvpv.exe 377 PID 2700 wrote to memory of 4056 2700 fbpjvpv.exe 377 PID 4056 wrote to memory of 2796 4056 llpvlfv.exe 100 PID 4056 wrote to memory of 2796 4056 llpvlfv.exe 100 PID 4056 wrote to memory of 2796 4056 llpvlfv.exe 100 PID 2796 wrote to memory of 5024 2796 vjvhpl.exe 524 PID 2796 wrote to memory of 5024 2796 vjvhpl.exe 524 PID 2796 wrote to memory of 5024 2796 vjvhpl.exe 524 PID 5024 wrote to memory of 3344 5024 rdxdxdr.exe 457 PID 5024 wrote to memory of 3344 5024 rdxdxdr.exe 457 PID 5024 wrote to memory of 3344 5024 rdxdxdr.exe 457 PID 3344 wrote to memory of 2184 3344 fjlxj.exe 192 PID 3344 wrote to memory of 2184 3344 fjlxj.exe 192 PID 3344 wrote to memory of 2184 3344 fjlxj.exe 192 PID 2184 wrote to memory of 2488 2184 xvpplfr.exe 378
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.bfc58916ecb82b0722c30a119a02dff0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.bfc58916ecb82b0722c30a119a02dff0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
\??\c:\tppxt.exec:\tppxt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\xnflvnf.exec:\xnflvnf.exe3⤵PID:4864
-
\??\c:\jpvxf.exec:\jpvxf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\jhfbbbr.exec:\jhfbbbr.exe5⤵PID:2236
-
\??\c:\dlrhb.exec:\dlrhb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
\??\c:\dxdfr.exec:\dxdfr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
\??\c:\jvllhnv.exec:\jvllhnv.exe8⤵PID:1368
-
\??\c:\htvlj.exec:\htvlj.exe9⤵PID:4760
-
\??\c:\dbnjx.exec:\dbnjx.exe10⤵PID:4364
-
\??\c:\tprnv.exec:\tprnv.exe11⤵PID:2156
-
\??\c:\bbhbdlv.exec:\bbhbdlv.exe12⤵PID:3896
-
-
-
-
\??\c:\drxbffr.exec:\drxbffr.exe10⤵PID:2412
-
\??\c:\jbdvx.exec:\jbdvx.exe11⤵PID:2336
-
-
-
-
\??\c:\dphlhx.exec:\dphlhx.exe9⤵PID:1272
-
\??\c:\vltpb.exec:\vltpb.exe10⤵PID:5060
-
\??\c:\blvvdx.exec:\blvvdx.exe11⤵PID:1656
-
\??\c:\bfhjtd.exec:\bfhjtd.exe12⤵
- Executes dropped EXE
PID:4740
-
-
-
\??\c:\ppntp.exec:\ppntp.exe11⤵PID:4808
-
-
-
-
-
-
-
\??\c:\tvrfv.exec:\tvrfv.exe6⤵PID:1668
-
\??\c:\rtjtv.exec:\rtjtv.exe7⤵PID:3172
-
\??\c:\pptbnfr.exec:\pptbnfr.exe8⤵PID:4336
-
-
\??\c:\hjfbdt.exec:\hjfbdt.exe8⤵PID:4336
-
\??\c:\djbnv.exec:\djbnv.exe9⤵PID:2412
-
\??\c:\xjtxj.exec:\xjtxj.exe10⤵PID:4256
-
-
-
-
-
-
-
-
-
-
\??\c:\rvdhdn.exec:\rvdhdn.exe1⤵PID:4576
-
\??\c:\bbbjp.exec:\bbbjp.exe2⤵PID:2672
-
\??\c:\bddrj.exec:\bddrj.exe3⤵PID:4752
-
\??\c:\vnnpjht.exec:\vnnpjht.exe4⤵
- Executes dropped EXE
PID:4176
-
-
-
-
\??\c:\xtfnrp.exec:\xtfnrp.exe2⤵PID:208
-
\??\c:\nrprfxp.exec:\nrprfxp.exe3⤵PID:4572
-
\??\c:\jjttjxr.exec:\jjttjxr.exe4⤵PID:2540
-
\??\c:\fjnxx.exec:\fjnxx.exe5⤵PID:1008
-
\??\c:\rnlfhbl.exec:\rnlfhbl.exe6⤵PID:4056
-
\??\c:\vhxlhd.exec:\vhxlhd.exe7⤵PID:4664
-
-
-
-
-
-
-
\??\c:\rlfdbv.exec:\rlfdbv.exe2⤵PID:3576
-
\??\c:\ddvrr.exec:\ddvrr.exe3⤵PID:4016
-
\??\c:\nxdrxr.exec:\nxdrxr.exe4⤵PID:3936
-
-
-
-
\??\c:\fbpjvpv.exec:\fbpjvpv.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\nnvjlx.exec:\nnvjlx.exe2⤵PID:4056
-
-
\??\c:\vjvhpl.exec:\vjvhpl.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\rljvj.exec:\rljvj.exe2⤵PID:5024
-
\??\c:\lrxfn.exec:\lrxfn.exe3⤵PID:1892
-
\??\c:\rxfjp.exec:\rxfjp.exe4⤵PID:4924
-
-
-
-
\??\c:\nvfdfrb.exec:\nvfdfrb.exe1⤵PID:3344
-
\??\c:\tflrft.exec:\tflrft.exe2⤵PID:3604
-
\??\c:\flbhd.exec:\flbhd.exe3⤵PID:3088
-
\??\c:\rphrfv.exec:\rphrfv.exe4⤵PID:2256
-
\??\c:\vffrdtv.exec:\vffrdtv.exe5⤵PID:3428
-
\??\c:\dbvpnrf.exec:\dbvpnrf.exe6⤵PID:3280
-
\??\c:\lhlbp.exec:\lhlbp.exe7⤵PID:1212
-
\??\c:\brxpdb.exec:\brxpdb.exe8⤵PID:492
-
-
-
-
-
-
-
-
\??\c:\phtbxf.exec:\phtbxf.exe1⤵
- Executes dropped EXE
PID:2128 -
\??\c:\ftvhtrx.exec:\ftvhtrx.exe2⤵PID:640
-
\??\c:\bpdfn.exec:\bpdfn.exe3⤵
- Executes dropped EXE
PID:3236
-
-
-
\??\c:\fprvb.exec:\fprvb.exe1⤵PID:2488
-
\??\c:\lppjpt.exec:\lppjpt.exe1⤵
- Executes dropped EXE
PID:1984 -
\??\c:\lvdlv.exec:\lvdlv.exe2⤵
- Executes dropped EXE
PID:1168
-
-
\??\c:\jvhbh.exec:\jvhbh.exe1⤵
- Executes dropped EXE
PID:1156 -
\??\c:\nlhrh.exec:\nlhrh.exe2⤵PID:2196
-
\??\c:\hjhbt.exec:\hjhbt.exe3⤵
- Executes dropped EXE
PID:4464 -
\??\c:\blvbx.exec:\blvbx.exe4⤵PID:2096
-
-
-
-
\??\c:\dxxff.exec:\dxxff.exe1⤵PID:4464
-
\??\c:\phbjj.exec:\phbjj.exe2⤵
- Executes dropped EXE
PID:4368
-
-
\??\c:\rbjjdj.exec:\rbjjdj.exe2⤵PID:1452
-
\??\c:\pjjtpll.exec:\pjjtpll.exe3⤵PID:4456
-
-
-
\??\c:\plphx.exec:\plphx.exe1⤵PID:2380
-
\??\c:\xlxfvb.exec:\xlxfvb.exe2⤵
- Executes dropped EXE
PID:1244 -
\??\c:\nljpf.exec:\nljpf.exe3⤵PID:4276
-
-
-
\??\c:\jbplbx.exec:\jbplbx.exe2⤵PID:1828
-
\??\c:\bxjfj.exec:\bxjfj.exe3⤵PID:960
-
\??\c:\ndxffn.exec:\ndxffn.exe4⤵PID:3580
-
-
\??\c:\hxfbl.exec:\hxfbl.exe4⤵PID:2600
-
-
-
-
\??\c:\jddbb.exec:\jddbb.exe1⤵PID:2940
-
\??\c:\dfbnvt.exec:\dfbnvt.exe2⤵
- Executes dropped EXE
PID:1488 -
\??\c:\nlpfx.exec:\nlpfx.exe3⤵PID:4032
-
\??\c:\xbhxn.exec:\xbhxn.exe4⤵PID:4756
-
\??\c:\fvxbxn.exec:\fvxbxn.exe5⤵PID:3792
-
\??\c:\jjvpdr.exec:\jjvpdr.exe6⤵
- Executes dropped EXE
PID:1668 -
\??\c:\ftxhxv.exec:\ftxhxv.exe7⤵PID:3172
-
-
-
-
-
-
-
\??\c:\rnfbbrj.exec:\rnfbbrj.exe2⤵PID:3764
-
\??\c:\tvfpdbf.exec:\tvfpdbf.exe3⤵
- Executes dropped EXE
PID:4032
-
-
-
\??\c:\fhdplj.exec:\fhdplj.exe1⤵
- Executes dropped EXE
PID:1708 -
\??\c:\rpblhn.exec:\rpblhn.exe2⤵PID:2236
-
-
\??\c:\vrdvrxf.exec:\vrdvrxf.exe1⤵
- Executes dropped EXE
PID:1216 -
\??\c:\txnpjjx.exec:\txnpjjx.exe2⤵PID:2684
-
-
\??\c:\fbvhxbd.exec:\fbvhxbd.exe1⤵PID:1656
-
\??\c:\jfvtttn.exec:\jfvtttn.exe2⤵
- Executes dropped EXE
PID:3156 -
\??\c:\jfflvf.exec:\jfflvf.exe3⤵PID:4740
-
-
-
\??\c:\txjxlvx.exec:\txjxlvx.exe1⤵PID:2944
-
\??\c:\ptfjnbd.exec:\ptfjnbd.exe2⤵PID:1248
-
-
\??\c:\bhnxxlv.exec:\bhnxxlv.exe1⤵PID:4364
-
\??\c:\hbtrr.exec:\hbtrr.exe2⤵PID:3076
-
\??\c:\vnpvph.exec:\vnpvph.exe3⤵
- Executes dropped EXE
PID:4660 -
\??\c:\btbfxx.exec:\btbfxx.exe4⤵PID:4844
-
\??\c:\fjvplb.exec:\fjvplb.exe5⤵PID:4468
-
\??\c:\rdprln.exec:\rdprln.exe6⤵
- Executes dropped EXE
PID:1108 -
\??\c:\bldlfdr.exec:\bldlfdr.exe7⤵PID:2852
-
\??\c:\rvprhf.exec:\rvprhf.exe8⤵PID:4020
-
\??\c:\vhllpxx.exec:\vhllpxx.exe9⤵PID:1432
-
\??\c:\rxfhvh.exec:\rxfhvh.exe10⤵
- Executes dropped EXE
PID:1912
-
-
-
-
\??\c:\ftxjvtd.exec:\ftxjvtd.exe8⤵PID:4312
-
\??\c:\pnnlnpf.exec:\pnnlnpf.exe9⤵PID:4572
-
\??\c:\trjtt.exec:\trjtt.exe10⤵PID:1432
-
\??\c:\ppjnx.exec:\ppjnx.exe11⤵PID:2188
-
-
-
-
-
-
-
\??\c:\txvtdx.exec:\txvtdx.exe6⤵PID:4752
-
\??\c:\hjhdj.exec:\hjhdj.exe7⤵PID:2088
-
\??\c:\dbnhr.exec:\dbnhr.exe8⤵PID:4648
-
-
-
\??\c:\hbtpjp.exec:\hbtpjp.exe7⤵PID:2384
-
\??\c:\ppxfrt.exec:\ppxfrt.exe8⤵PID:3500
-
-
-
-
-
-
-
-
\??\c:\bnjpx.exec:\bnjpx.exe1⤵PID:3436
-
\??\c:\nrplj.exec:\nrplj.exe1⤵PID:684
-
\??\c:\xbvrp.exec:\xbvrp.exe2⤵
- Executes dropped EXE
PID:460 -
\??\c:\rldjn.exec:\rldjn.exe3⤵PID:3592
-
\??\c:\hhhfbfj.exec:\hhhfbfj.exe4⤵PID:1228
-
\??\c:\hbpfr.exec:\hbpfr.exe5⤵
- Executes dropped EXE
PID:1592
-
-
-
\??\c:\lnfjrx.exec:\lnfjrx.exe4⤵PID:2640
-
-
-
-
\??\c:\nrvjltd.exec:\nrvjltd.exe2⤵PID:4664
-
\??\c:\xfrfd.exec:\xfrfd.exe3⤵PID:1772
-
-
-
\??\c:\prtrb.exec:\prtrb.exe1⤵PID:4936
-
\??\c:\lbxjrx.exec:\lbxjrx.exe2⤵PID:3428
-
\??\c:\brlxdh.exec:\brlxdh.exe3⤵PID:4848
-
\??\c:\jxfrrnx.exec:\jxfrrnx.exe4⤵PID:4516
-
-
-
-
\??\c:\xxtjfb.exec:\xxtjfb.exe1⤵PID:3288
-
\??\c:\hdnthtf.exec:\hdnthtf.exe1⤵PID:4784
-
\??\c:\tnhjbh.exec:\tnhjbh.exe1⤵PID:1292
-
\??\c:\nhxvnr.exec:\nhxvnr.exe2⤵PID:656
-
\??\c:\jvxjd.exec:\jvxjd.exe3⤵PID:5072
-
-
-
\??\c:\bnftvbd.exec:\bnftvbd.exe1⤵PID:5072
-
\??\c:\ljhrpb.exec:\ljhrpb.exe2⤵PID:3804
-
-
\??\c:\rvxvxph.exec:\rvxvxph.exe2⤵PID:1532
-
\??\c:\xpfptr.exec:\xpfptr.exe3⤵PID:1188
-
\??\c:\nptppp.exec:\nptppp.exe4⤵PID:4464
-
-
-
-
\??\c:\trfvjb.exec:\trfvjb.exe1⤵
- Executes dropped EXE
PID:3288 -
\??\c:\dvdvhrp.exec:\dvdvhrp.exe2⤵PID:1936
-
\??\c:\prflvn.exec:\prflvn.exe3⤵PID:944
-
\??\c:\rbbhfp.exec:\rbbhfp.exe4⤵PID:2496
-
\??\c:\ltlfnht.exec:\ltlfnht.exe5⤵PID:2368
-
\??\c:\rbpjh.exec:\rbpjh.exe6⤵PID:4388
-
\??\c:\rvfjh.exec:\rvfjh.exe7⤵PID:4204
-
-
-
-
-
-
-
\??\c:\tpdnvxl.exec:\tpdnvxl.exe1⤵PID:4232
-
\??\c:\xhrnpjt.exec:\xhrnpjt.exe2⤵PID:2032
-
-
\??\c:\rnnhxff.exec:\rnnhxff.exe2⤵PID:4836
-
\??\c:\jbxdxd.exec:\jbxdxd.exe3⤵PID:3324
-
-
-
\??\c:\btpdrp.exec:\btpdrp.exe1⤵PID:4772
-
\??\c:\xjblrll.exec:\xjblrll.exe2⤵PID:1076
-
-
\??\c:\xnrvx.exec:\xnrvx.exe2⤵PID:1552
-
\??\c:\nltbrrl.exec:\nltbrrl.exe3⤵PID:1084
-
\??\c:\vhbxhp.exec:\vhbxhp.exe4⤵PID:3972
-
\??\c:\xnftnb.exec:\xnftnb.exe5⤵PID:4724
-
\??\c:\vpbtvj.exec:\vpbtvj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
\??\c:\dtjnx.exec:\dtjnx.exe7⤵PID:3676
-
\??\c:\jrnpp.exec:\jrnpp.exe8⤵PID:2412
-
\??\c:\hrhbh.exec:\hrhbh.exe9⤵PID:2336
-
\??\c:\rpvrdfh.exec:\rpvrdfh.exe10⤵PID:4744
-
-
-
-
\??\c:\ltlbpvl.exec:\ltlbpvl.exe8⤵PID:4492
-
\??\c:\bnrfn.exec:\bnrfn.exe9⤵PID:2156
-
\??\c:\xhrfb.exec:\xhrfb.exe10⤵PID:4100
-
-
\??\c:\hpvjxv.exec:\hpvjxv.exe10⤵PID:4808
-
\??\c:\rrtdv.exec:\rrtdv.exe11⤵PID:1440
-
-
-
-
-
-
-
-
\??\c:\fbtrhv.exec:\fbtrhv.exe5⤵PID:2028
-
\??\c:\bvpjj.exec:\bvpjj.exe6⤵PID:2220
-
\??\c:\pnlxj.exec:\pnlxj.exe7⤵PID:4272
-
\??\c:\brtfxbl.exec:\brtfxbl.exe8⤵PID:4256
-
\??\c:\dhtvv.exec:\dhtvv.exe9⤵PID:3052
-
\??\c:\fxhldbp.exec:\fxhldbp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156
-
-
-
-
-
-
-
-
-
-
\??\c:\rtbbfrj.exec:\rtbbfrj.exe1⤵PID:2932
-
\??\c:\pptppd.exec:\pptppd.exe1⤵PID:3416
-
\??\c:\vdxfd.exec:\vdxfd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
\??\c:\fdbthn.exec:\fdbthn.exe3⤵PID:2888
-
\??\c:\ltnfnb.exec:\ltnfnb.exe4⤵PID:4420
-
\??\c:\dvxbxj.exec:\dvxbxj.exe5⤵PID:1232
-
\??\c:\xfhrf.exec:\xfhrf.exe6⤵PID:2036
-
\??\c:\vdpdb.exec:\vdpdb.exe7⤵
- Executes dropped EXE
PID:2684 -
\??\c:\dxnlx.exec:\dxnlx.exe8⤵PID:1656
-
\??\c:\nfxhxj.exec:\nfxhxj.exe9⤵PID:4776
-
\??\c:\jfnrt.exec:\jfnrt.exe10⤵PID:4740
-
\??\c:\vlptv.exec:\vlptv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4364 -
\??\c:\jrhfbbl.exec:\jrhfbbl.exe12⤵PID:1416
-
-
-
\??\c:\dvdhhlt.exec:\dvdhhlt.exe11⤵PID:5044
-
-
-
-
\??\c:\nttxjv.exec:\nttxjv.exe9⤵PID:4776
-
\??\c:\fxtfpvd.exec:\fxtfpvd.exe10⤵PID:2016
-
\??\c:\fxvrn.exec:\fxvrn.exe11⤵PID:1840
-
\??\c:\ndfft.exec:\ndfft.exe12⤵PID:1416
-
\??\c:\bpjhvpd.exec:\bpjhvpd.exe13⤵PID:208
-
-
\??\c:\lbrndl.exec:\lbrndl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672
-
-
-
-
-
-
-
-
-
\??\c:\jjvdhd.exec:\jjvdhd.exe6⤵PID:4488
-
\??\c:\jnvdl.exec:\jnvdl.exe7⤵PID:864
-
-
-
-
-
-
-
\??\c:\rtjrfvj.exec:\rtjrfvj.exe2⤵PID:2600
-
-
\??\c:\fhlnbjh.exec:\fhlnbjh.exe1⤵PID:2492
-
\??\c:\lfhjdt.exec:\lfhjdt.exe1⤵PID:3632
-
\??\c:\vjfrxfl.exec:\vjfrxfl.exe1⤵PID:4388
-
\??\c:\tjvdd.exec:\tjvdd.exe2⤵PID:1096
-
-
\??\c:\vhnbr.exec:\vhnbr.exe1⤵PID:2672
-
\??\c:\rbjvhv.exec:\rbjvhv.exe2⤵PID:4312
-
-
\??\c:\ndnpfr.exec:\ndnpfr.exe2⤵PID:1720
-
\??\c:\pfhnfbr.exec:\pfhnfbr.exe3⤵PID:3812
-
\??\c:\tthrlv.exec:\tthrlv.exe4⤵PID:4056
-
\??\c:\hhnptnp.exec:\hhnptnp.exe5⤵PID:4664
-
\??\c:\rljtlj.exec:\rljtlj.exe6⤵PID:5056
-
\??\c:\bvvhv.exec:\bvvhv.exe7⤵PID:3368
-
\??\c:\fptlrn.exec:\fptlrn.exe8⤵PID:4960
-
-
-
-
-
-
-
-
\??\c:\tppptjr.exec:\tppptjr.exe1⤵PID:3420
-
\??\c:\rxnpf.exec:\rxnpf.exe2⤵PID:2188
-
\??\c:\ldnjjxl.exec:\ldnjjxl.exe3⤵PID:3808
-
\??\c:\lthjvv.exec:\lthjvv.exe4⤵PID:1280
-
\??\c:\dfxnn.exec:\dfxnn.exe5⤵PID:2752
-
\??\c:\bxrbnj.exec:\bxrbnj.exe6⤵PID:3416
-
-
\??\c:\xtprr.exec:\xtprr.exe6⤵PID:960
-
\??\c:\dftxnd.exec:\dftxnd.exe7⤵PID:1684
-
-
-
-
-
-
\??\c:\nxrjd.exec:\nxrjd.exe3⤵PID:3080
-
\??\c:\xhrjjnp.exec:\xhrjjnp.exe4⤵PID:4564
-
\??\c:\jbnth.exec:\jbnth.exe5⤵PID:2272
-
\??\c:\rhdpv.exec:\rhdpv.exe6⤵PID:4664
-
\??\c:\rrprp.exec:\rrprp.exe7⤵
- Executes dropped EXE
PID:3344 -
\??\c:\nxhnpjx.exec:\nxhnpjx.exe8⤵PID:4856
-
\??\c:\rhppv.exec:\rhppv.exe9⤵PID:2124
-
\??\c:\vrphjpn.exec:\vrphjpn.exe10⤵
- Executes dropped EXE
PID:4936
-
-
-
-
-
\??\c:\fpvbdjt.exec:\fpvbdjt.exe7⤵PID:5068
-
-
-
-
-
-
-
\??\c:\nvrrptf.exec:\nvrrptf.exe2⤵PID:2260
-
\??\c:\rnvpjx.exec:\rnvpjx.exe3⤵PID:4664
-
\??\c:\ltfjl.exec:\ltfjl.exe4⤵PID:5068
-
\??\c:\fbbblr.exec:\fbbblr.exe5⤵PID:4564
-
\??\c:\jxjnfx.exec:\jxjnfx.exe6⤵PID:3612
-
-
\??\c:\dbpbbdx.exec:\dbpbbdx.exe6⤵
- Executes dropped EXE
PID:3592
-
-
-
\??\c:\lfrjvxb.exec:\lfrjvxb.exe5⤵PID:4564
-
-
-
-
-
\??\c:\jthjrd.exec:\jthjrd.exe1⤵PID:3408
-
\??\c:\fvnrnrf.exec:\fvnrnrf.exe1⤵PID:4112
-
\??\c:\rtnnp.exec:\rtnnp.exe2⤵PID:1484
-
-
\??\c:\tbrjt.exec:\tbrjt.exe1⤵PID:1252
-
\??\c:\xhxhp.exec:\xhxhp.exe2⤵PID:5024
-
\??\c:\vbxrjh.exec:\vbxrjh.exe3⤵PID:3344
-
\??\c:\xvpplfr.exec:\xvpplfr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184
-
-
-
-
\??\c:\xrhbflv.exec:\xrhbflv.exe1⤵PID:2344
-
\??\c:\jhdhpf.exec:\jhdhpf.exe2⤵PID:1068
-
\??\c:\thnxhpj.exec:\thnxhpj.exe3⤵PID:4884
-
\??\c:\pjjdpbv.exec:\pjjdpbv.exe4⤵PID:4820
-
-
\??\c:\hrrttf.exec:\hrrttf.exe4⤵PID:2508
-
-
-
\??\c:\vtlbj.exec:\vtlbj.exe3⤵PID:3804
-
\??\c:\bblvb.exec:\bblvb.exe4⤵PID:3176
-
-
-
-
\??\c:\tjxbvv.exec:\tjxbvv.exe1⤵PID:2268
-
\??\c:\vhllvfn.exec:\vhllvfn.exe2⤵PID:3504
-
\??\c:\frnjn.exec:\frnjn.exe3⤵PID:3796
-
-
-
\??\c:\brvlb.exec:\brvlb.exe1⤵PID:1096
-
\??\c:\txltxff.exec:\txltxff.exe2⤵PID:1828
-
-
\??\c:\ltvbvbj.exec:\ltvbvbj.exe2⤵PID:4204
-
\??\c:\rfbjn.exec:\rfbjn.exe3⤵PID:3916
-
-
-
\??\c:\xrvffl.exec:\xrvffl.exe1⤵PID:1684
-
\??\c:\dbtvvhn.exec:\dbtvvhn.exe2⤵PID:4412
-
\??\c:\btdxjnb.exec:\btdxjnb.exe3⤵PID:2944
-
\??\c:\xjvvxhp.exec:\xjvvxhp.exe4⤵PID:3792
-
-
-
-
\??\c:\ftpbrp.exec:\ftpbrp.exe1⤵PID:4500
-
\??\c:\fhnvrf.exec:\fhnvrf.exe1⤵PID:2848
-
\??\c:\bhttdj.exec:\bhttdj.exe2⤵PID:4336
-
\??\c:\jrxpftn.exec:\jrxpftn.exe3⤵PID:2076
-
-
\??\c:\vhfxtd.exec:\vhfxtd.exe3⤵PID:2076
-
\??\c:\frjxnlv.exec:\frjxnlv.exe4⤵PID:3676
-
-
-
-
\??\c:\xbdjbh.exec:\xbdjbh.exe1⤵PID:4420
-
\??\c:\jbnjrf.exec:\jbnjrf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1368
-
-
\??\c:\dddbl.exec:\dddbl.exe1⤵PID:1520
-
\??\c:\rfhrlx.exec:\rfhrlx.exe2⤵PID:3420
-
-
\??\c:\rhvjfbf.exec:\rhvjfbf.exe1⤵PID:4268
-
\??\c:\nndndt.exec:\nndndt.exe1⤵PID:3580
-
\??\c:\hprbnv.exec:\hprbnv.exe2⤵PID:4772
-
-
\??\c:\njbrbr.exec:\njbrbr.exe1⤵PID:4248
-
\??\c:\jthtvn.exec:\jthtvn.exe1⤵PID:764
-
\??\c:\vflbxdn.exec:\vflbxdn.exe2⤵PID:4568
-
-
\??\c:\vpfbdpv.exec:\vpfbdpv.exe1⤵PID:4520
-
\??\c:\drfpxxt.exec:\drfpxxt.exe2⤵PID:4856
-
\??\c:\pntxhjt.exec:\pntxhjt.exe3⤵PID:448
-
\??\c:\rxbdtlp.exec:\rxbdtlp.exe4⤵PID:3820
-
-
\??\c:\rphdt.exec:\rphdt.exe4⤵PID:4936
-
\??\c:\nhtfv.exec:\nhtfv.exe5⤵PID:4848
-
\??\c:\bnbdrt.exec:\bnbdrt.exe6⤵PID:640
-
\??\c:\xbtxxf.exec:\xbtxxf.exe7⤵PID:404
-
-
\??\c:\xbhpx.exec:\xbhpx.exe7⤵PID:404
-
\??\c:\vrdlvd.exec:\vrdlvd.exe8⤵PID:3108
-
\??\c:\lbfbldr.exec:\lbfbldr.exe9⤵PID:3968
-
\??\c:\jjtpd.exec:\jjtpd.exe10⤵PID:4192
-
-
-
-
\??\c:\dbxvp.exec:\dbxvp.exe8⤵PID:1292
-
-
-
-
-
\??\c:\jfvnd.exec:\jfvnd.exe5⤵PID:4824
-
\??\c:\dpjnx.exec:\dpjnx.exe6⤵PID:4704
-
\??\c:\jbhjvbl.exec:\jbhjvbl.exe7⤵PID:1192
-
\??\c:\njdbhr.exec:\njdbhr.exe8⤵PID:3308
-
\??\c:\fxlfvv.exec:\fxlfvv.exe9⤵PID:3960
-
\??\c:\njflt.exec:\njflt.exe10⤵PID:2828
-
\??\c:\pnvfhxj.exec:\pnvfhxj.exe11⤵PID:1752
-
\??\c:\jjrlhfp.exec:\jjrlhfp.exe12⤵PID:3176
-
\??\c:\bpdvvx.exec:\bpdvvx.exe13⤵
- Executes dropped EXE
PID:2196 -
\??\c:\rhpvvx.exec:\rhpvvx.exe14⤵PID:3192
-
\??\c:\hxvtbdv.exec:\hxvtbdv.exe15⤵PID:4476
-
\??\c:\fnvfd.exec:\fnvfd.exe16⤵PID:5096
-
\??\c:\ptrxllf.exec:\ptrxllf.exe17⤵PID:1268
-
\??\c:\tnntnpx.exec:\tnntnpx.exe18⤵PID:3292
-
\??\c:\jflprp.exec:\jflprp.exe19⤵PID:1828
-
\??\c:\dhbrn.exec:\dhbrn.exe20⤵PID:4500
-
\??\c:\bflhplh.exec:\bflhplh.exe21⤵PID:1076
-
\??\c:\xtvbbh.exec:\xtvbbh.exe22⤵PID:3748
-
\??\c:\xvvxr.exec:\xvvxr.exe23⤵
- Executes dropped EXE
PID:4020 -
\??\c:\ljldvp.exec:\ljldvp.exe24⤵PID:2388
-
\??\c:\nxlphd.exec:\nxlphd.exe25⤵PID:2992
-
\??\c:\hvtjld.exec:\hvtjld.exe26⤵PID:3992
-
\??\c:\hhxbrvj.exec:\hhxbrvj.exe27⤵PID:312
-
\??\c:\nrtnv.exec:\nrtnv.exe28⤵PID:4756
-
\??\c:\nhtth.exec:\nhtth.exe29⤵PID:4148
-
\??\c:\pjbhh.exec:\pjbhh.exe30⤵PID:2076
-
\??\c:\dlpfdfl.exec:\dlpfdfl.exe31⤵PID:864
-
\??\c:\tfddtt.exec:\tfddtt.exe32⤵PID:3676
-
\??\c:\ftdvp.exec:\ftdvp.exe33⤵PID:4244
-
\??\c:\fxbtv.exec:\fxbtv.exe34⤵PID:3412
-
\??\c:\hhhdnl.exec:\hhhdnl.exe35⤵PID:472
-
\??\c:\frfbpf.exec:\frfbpf.exe36⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
\??\c:\fnnntld.exec:\fnnntld.exe37⤵PID:1440
-
\??\c:\bjprnnp.exec:\bjprnnp.exe38⤵PID:4308
-
\??\c:\jttjrxn.exec:\jttjrxn.exe39⤵PID:1584
-
\??\c:\rdlxfn.exec:\rdlxfn.exe40⤵PID:4776
-
\??\c:\ljdfvf.exec:\ljdfvf.exe41⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
\??\c:\xnxvbx.exec:\xnxvbx.exe42⤵PID:2672
-
\??\c:\nbpxfp.exec:\nbpxfp.exe43⤵PID:4988
-
\??\c:\nddhhl.exec:\nddhhl.exe44⤵
- Executes dropped EXE
PID:1432 -
\??\c:\lrfrld.exec:\lrfrld.exe45⤵PID:1404
-
\??\c:\xjlrnxt.exec:\xjlrnxt.exe46⤵PID:4472
-
\??\c:\fxvdv.exec:\fxvdv.exe47⤵PID:4992
-
\??\c:\rdrtjbj.exec:\rdrtjbj.exe48⤵PID:2736
-
\??\c:\lthhr.exec:\lthhr.exe49⤵PID:4664
-
\??\c:\fjlxj.exec:\fjlxj.exe50⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
\??\c:\bbxhdtd.exec:\bbxhdtd.exe51⤵PID:4600
-
\??\c:\vpfnx.exec:\vpfnx.exe52⤵PID:3832
-
\??\c:\tdrjnft.exec:\tdrjnft.exe53⤵PID:2416
-
\??\c:\fhrdb.exec:\fhrdb.exe54⤵PID:4824
-
\??\c:\nrrjrbr.exec:\nrrjrbr.exe55⤵PID:3428
-
\??\c:\jbnhn.exec:\jbnhn.exe56⤵PID:4316
-
\??\c:\tbtlrv.exec:\tbtlrv.exe57⤵PID:3308
-
\??\c:\blrpl.exec:\blrpl.exe58⤵PID:5088
-
\??\c:\hljht.exec:\hljht.exe59⤵PID:5020
-
\??\c:\frjpvd.exec:\frjpvd.exe60⤵PID:560
-
\??\c:\nbtfbn.exec:\nbtfbn.exe61⤵PID:1068
-
\??\c:\vfdjd.exec:\vfdjd.exe62⤵PID:2496
-
\??\c:\vpttjbx.exec:\vpttjbx.exe63⤵
- Executes dropped EXE
PID:3436 -
\??\c:\prpvjtt.exec:\prpvjtt.exe64⤵PID:3508
-
\??\c:\xprpph.exec:\xprpph.exe65⤵PID:5108
-
\??\c:\hnthhh.exec:\hnthhh.exe66⤵PID:5096
-
\??\c:\vfpjbdl.exec:\vfpjbdl.exe67⤵PID:4496
-
\??\c:\ddlfdbl.exec:\ddlfdbl.exe68⤵PID:3944
-
\??\c:\nxvdjd.exec:\nxvdjd.exe69⤵PID:1384
-
\??\c:\phtxh.exec:\phtxh.exe70⤵PID:4500
-
\??\c:\nhnftl.exec:\nhnftl.exe71⤵PID:2456
-
\??\c:\hjrtlrv.exec:\hjrtlrv.exe72⤵PID:3908
-
\??\c:\rnblll.exec:\rnblll.exe73⤵PID:3844
-
\??\c:\dhvvf.exec:\dhvvf.exe74⤵PID:3584
-
\??\c:\bbjpdj.exec:\bbjpdj.exe75⤵PID:2108
-
\??\c:\pnnflbd.exec:\pnnflbd.exe76⤵PID:1084
-
\??\c:\hrnfdb.exec:\hrnfdb.exe77⤵PID:4724
-
\??\c:\xxrbdrb.exec:\xxrbdrb.exe78⤵PID:116
-
\??\c:\fpxfj.exec:\fpxfj.exe79⤵PID:4420
-
\??\c:\bdfhvvv.exec:\bdfhvvv.exe80⤵PID:4560
-
\??\c:\bfnxl.exec:\bfnxl.exe81⤵PID:2192
-
\??\c:\fdttrjh.exec:\fdttrjh.exe82⤵PID:4876
-
\??\c:\lhnnj.exec:\lhnnj.exe83⤵PID:4700
-
\??\c:\htbtjj.exec:\htbtjj.exe84⤵PID:2928
-
\??\c:\hprtfrf.exec:\hprtfrf.exe85⤵PID:4808
-
\??\c:\vfrtn.exec:\vfrtn.exe86⤵PID:1840
-
\??\c:\fvjnfnh.exec:\fvjnfnh.exe87⤵PID:1440
-
\??\c:\jnvvb.exec:\jnvvb.exe88⤵PID:1416
-
\??\c:\vbpjx.exec:\vbpjx.exe89⤵PID:1008
-
\??\c:\pfjblnj.exec:\pfjblnj.exe90⤵PID:4572
-
\??\c:\prbbtb.exec:\prbbtb.exe91⤵PID:3788
-
\??\c:\rdpnttj.exec:\rdpnttj.exe92⤵PID:1432
-
\??\c:\jnhbbp.exec:\jnhbbp.exe93⤵PID:2460
-
\??\c:\rxppbdj.exec:\rxppbdj.exe94⤵PID:4472
-
\??\c:\ddtnfh.exec:\ddtnfh.exe95⤵PID:4048
-
\??\c:\ltrvvxx.exec:\ltrvvxx.exe96⤵PID:2736
-
\??\c:\lltfn.exec:\lltfn.exe97⤵PID:4664
-
\??\c:\fxxbxld.exec:\fxxbxld.exe98⤵PID:1228
-
\??\c:\nhvnxxn.exec:\nhvnxxn.exe99⤵PID:4600
-
\??\c:\xfnbjrx.exec:\xfnbjrx.exe100⤵PID:3832
-
\??\c:\fndbbj.exec:\fndbbj.exe101⤵PID:2416
-
\??\c:\bfdxl.exec:\bfdxl.exe102⤵PID:3528
-
\??\c:\pxjrdrx.exec:\pxjrdrx.exe103⤵PID:2764
-
\??\c:\pvrxn.exec:\pvrxn.exe104⤵PID:4316
-
\??\c:\nxxrhv.exec:\nxxrhv.exe105⤵PID:1936
-
\??\c:\xvdfxf.exec:\xvdfxf.exe106⤵PID:1188
-
\??\c:\fhbjbx.exec:\fhbjbx.exe107⤵PID:2508
-
\??\c:\tjjfthj.exec:\tjjfthj.exe108⤵PID:3432
-
\??\c:\vdlpvlj.exec:\vdlpvlj.exe109⤵PID:2096
-
\??\c:\hbnftv.exec:\hbnftv.exe110⤵PID:2816
-
\??\c:\frbfvv.exec:\frbfvv.exe111⤵PID:2368
-
\??\c:\jrnnfxx.exec:\jrnnfxx.exe112⤵PID:4552
-
\??\c:\vjtthh.exec:\vjtthh.exe113⤵PID:4088
-
\??\c:\dvrlffd.exec:\dvrlffd.exe114⤵PID:4972
-
\??\c:\hhrhdj.exec:\hhrhdj.exe115⤵PID:3944
-
\??\c:\rxxhnd.exec:\rxxhnd.exe116⤵PID:3996
-
\??\c:\xtrdhr.exec:\xtrdhr.exe117⤵PID:4436
-
\??\c:\tprlrtr.exec:\tprlrtr.exe118⤵PID:1920
-
\??\c:\pfvrn.exec:\pfvrn.exe119⤵PID:2348
-
\??\c:\brxppp.exec:\brxppp.exe120⤵PID:2752
-
\??\c:\vldhnnj.exec:\vldhnnj.exe121⤵PID:1620
-
\??\c:\phvfdj.exec:\phvfdj.exe122⤵PID:4152
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-