Analysis
-
max time kernel
107s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 21:37
Behavioral task
behavioral1
Sample
NEAS.f2cf2b0d1ff677bea322c4d33b77ad50.exe
Resource
win7-20231020-en
General
-
Target
NEAS.f2cf2b0d1ff677bea322c4d33b77ad50.exe
-
Size
393KB
-
MD5
f2cf2b0d1ff677bea322c4d33b77ad50
-
SHA1
3d52bfee1f9f5fb03f84deb36814c96021187dc6
-
SHA256
b97b6c891d2dda66a7213852a47811e7e74f775806ca7e15caa8f7fdd57e62d8
-
SHA512
8bb65000032a098fbac0f316fd91ac28d1cd01872d829b2a6c7603d46a3170f89f90dfcaa3f5a39be49099e95b95c3dd8af697629bd11e7d285b7d6f6c451985
-
SSDEEP
12288:Q4wFHoSqRyddW7xJCc5TugZKS9sUvkclI0/RT7:BRyLWFMu91RlI0/RT7
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/4304-20-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/980-27-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4764-25-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4704-58-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/764-63-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3988-81-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/1360-109-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/1852-142-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3244-171-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4928-151-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3816-191-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4396-196-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/208-217-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/5016-237-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4876-242-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4704-245-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3456-256-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3924-267-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4788-309-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/728-360-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/1292-364-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/2792-390-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/2980-399-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3872-418-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/468-428-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/1540-441-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3560-448-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4704-572-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/5064-711-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4012-772-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/2652-865-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/216-1047-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3308-1289-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4392-675-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4748-672-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4492-511-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3704-373-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/2580-331-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3768-319-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/2368-314-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4912-288-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3736-284-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4980-251-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4376-229-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3652-226-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/952-205-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/1692-199-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4672-189-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4772-140-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/2668-136-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/1876-130-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/556-119-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3024-89-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3872-73-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/2168-50-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/2752-44-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3552-41-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/4444-11-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/3520-9-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/2400-4-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/2044-1455-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/2440-1474-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/636-1480-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon behavioral2/memory/1636-1716-0x0000000000400000-0x0000000000436000-memory.dmp family_blackmoon -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral2/memory/2400-0-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0008000000022d7d-8.dat family_berbew behavioral2/files/0x0007000000022e59-16.dat family_berbew behavioral2/files/0x0007000000022e59-15.dat family_berbew behavioral2/memory/4304-20-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0007000000022e5b-24.dat family_berbew behavioral2/memory/980-27-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0007000000022e5b-26.dat family_berbew behavioral2/memory/4764-25-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0007000000022e5a-21.dat family_berbew behavioral2/files/0x0007000000022e5c-30.dat family_berbew behavioral2/files/0x0007000000022e5d-35.dat family_berbew behavioral2/files/0x0007000000022e5f-42.dat family_berbew behavioral2/files/0x0007000000022e62-48.dat family_berbew behavioral2/files/0x0008000000022d7e-54.dat family_berbew behavioral2/memory/4704-58-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0007000000022e63-59.dat family_berbew behavioral2/files/0x0007000000022e63-57.dat family_berbew behavioral2/files/0x0007000000022e64-64.dat family_berbew behavioral2/memory/764-63-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0007000000022e65-69.dat family_berbew behavioral2/files/0x0007000000022e66-74.dat family_berbew behavioral2/files/0x0007000000022e67-77.dat family_berbew behavioral2/memory/3988-81-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0007000000022e68-85.dat family_berbew behavioral2/files/0x0007000000022e69-88.dat family_berbew behavioral2/files/0x0007000000022e69-90.dat family_berbew behavioral2/files/0x0007000000022e6b-93.dat family_berbew behavioral2/files/0x0007000000022e6b-95.dat family_berbew behavioral2/files/0x0008000000022e6c-98.dat family_berbew behavioral2/memory/1360-109-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0008000000022e70-115.dat family_berbew behavioral2/files/0x0008000000022e71-118.dat family_berbew behavioral2/memory/1876-125-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0008000000022e73-129.dat family_berbew behavioral2/files/0x0007000000022e77-147.dat family_berbew behavioral2/files/0x0007000000022e77-146.dat family_berbew behavioral2/memory/1852-142-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0006000000022e7e-161.dat family_berbew behavioral2/files/0x0006000000022e7e-163.dat family_berbew behavioral2/memory/3244-171-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0006000000022e7f-167.dat family_berbew behavioral2/files/0x0006000000022e7f-166.dat family_berbew behavioral2/memory/3628-158-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0008000000022e79-157.dat family_berbew behavioral2/files/0x0008000000022e79-156.dat family_berbew behavioral2/memory/4928-151-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/files/0x0009000000022e78-150.dat family_berbew behavioral2/memory/3816-191-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/4396-196-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/208-217-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/5016-237-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/4876-242-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/4704-245-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/3456-256-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/3924-267-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/4788-309-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/4732-349-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/728-360-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/1292-364-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/2792-390-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/2980-399-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/3872-418-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew behavioral2/memory/468-428-0x0000000000400000-0x0000000000436000-memory.dmp family_berbew -
Executes dropped EXE 64 IoCs
pid Process 3520 lvjnfn.exe 4444 btfjll.exe 4304 pdrddxx.exe 4764 pbjlvp.exe 980 fjdffn.exe 3756 bvpph.exe 3552 tnvjj.exe 2752 rxnhf.exe 2168 ddfdv.exe 4704 lbnfdbf.exe 764 blfvh.exe 4884 dnffxfv.exe 3872 lrrrl.exe 2064 bvhrjhv.exe 3988 lnlrltb.exe 3024 hvfnp.exe 816 bdfplbj.exe 1684 bdvnlrf.exe 4428 ddvbntb.exe 1360 tvdxlnb.exe 1968 hnbtjdf.exe 556 rfhnrx.exe 1220 rnfpv.exe 1876 bpbndj.exe 2668 jftjbnh.exe 4772 vhllxnv.exe 1852 dtfjp.exe 4928 jxtrlph.exe 1712 lbvnlpt.exe 3628 bbxvpnj.exe 4900 hpdpvnh.exe 3244 bjnlhhv.exe 3852 tbrdpvx.exe 1456 hlrrvxx.exe 5008 vftxrfn.exe 5056 xdhlv.exe 1476 bxvfvpj.exe 4672 rljlh.exe 3816 njvtl.exe 4396 dblfjtr.exe 1692 vvjdjtt.exe 4288 pbrjl.exe 952 tjnxvrf.exe 4256 vpplf.exe 4620 tlvppn.exe 4116 dxjnrxx.exe 208 jdbjrfb.exe 492 xbhxnl.exe 2384 vnjxdbn.exe 3652 fnfvnn.exe 4376 vrrrv.exe 5032 bttldj.exe 884 xtrjh.exe 5016 jfxxvhp.exe 4876 fvdhrbb.exe 4704 lbnfdbf.exe 4172 tvbnrb.exe 4980 tphdhfj.exe 1164 flxhpft.exe 3456 frrhjb.exe 1496 nnbxb.exe 1296 tvbhfjr.exe 3924 tpdptdx.exe 3988 lnlrltb.exe -
resource yara_rule behavioral2/memory/2400-0-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0008000000022d7d-8.dat upx behavioral2/files/0x0007000000022e59-16.dat upx behavioral2/files/0x0007000000022e59-15.dat upx behavioral2/memory/4304-20-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0007000000022e5b-24.dat upx behavioral2/memory/980-27-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0007000000022e5b-26.dat upx behavioral2/memory/4764-25-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0007000000022e5a-21.dat upx behavioral2/files/0x0007000000022e5c-30.dat upx behavioral2/files/0x0007000000022e5d-35.dat upx behavioral2/files/0x0007000000022e5f-42.dat upx behavioral2/files/0x0007000000022e62-48.dat upx behavioral2/files/0x0008000000022d7e-54.dat upx behavioral2/memory/4704-58-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0007000000022e63-59.dat upx behavioral2/files/0x0007000000022e63-57.dat upx behavioral2/files/0x0007000000022e64-64.dat upx behavioral2/memory/764-63-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0007000000022e65-69.dat upx behavioral2/files/0x0007000000022e66-74.dat upx behavioral2/files/0x0007000000022e67-77.dat upx behavioral2/memory/3988-81-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0007000000022e68-85.dat upx behavioral2/files/0x0007000000022e69-88.dat upx behavioral2/files/0x0007000000022e69-90.dat upx behavioral2/files/0x0007000000022e6b-93.dat upx behavioral2/files/0x0007000000022e6b-95.dat upx behavioral2/files/0x0008000000022e6c-98.dat upx behavioral2/memory/1360-109-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0008000000022e70-115.dat upx behavioral2/files/0x0008000000022e71-118.dat upx behavioral2/memory/1876-125-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0008000000022e73-129.dat upx behavioral2/files/0x0007000000022e77-147.dat upx behavioral2/files/0x0007000000022e77-146.dat upx behavioral2/memory/1852-142-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0006000000022e7e-161.dat upx behavioral2/files/0x0006000000022e7e-163.dat upx behavioral2/memory/3244-171-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0006000000022e7f-167.dat upx behavioral2/files/0x0006000000022e7f-166.dat upx behavioral2/memory/3628-158-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0008000000022e79-157.dat upx behavioral2/files/0x0008000000022e79-156.dat upx behavioral2/memory/4928-151-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/files/0x0009000000022e78-150.dat upx behavioral2/memory/3816-191-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4396-196-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/208-217-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/5016-237-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4876-242-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4704-245-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/3456-256-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/3924-267-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4788-309-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/4732-349-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/728-360-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/1292-364-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/2792-390-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/2980-399-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/3872-418-0x0000000000400000-0x0000000000436000-memory.dmp upx behavioral2/memory/468-428-0x0000000000400000-0x0000000000436000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2400 wrote to memory of 3520 2400 xdjppf.exe 421 PID 2400 wrote to memory of 3520 2400 xdjppf.exe 421 PID 2400 wrote to memory of 3520 2400 xdjppf.exe 421 PID 3520 wrote to memory of 4444 3520 lvjnfn.exe 420 PID 3520 wrote to memory of 4444 3520 lvjnfn.exe 420 PID 3520 wrote to memory of 4444 3520 lvjnfn.exe 420 PID 4444 wrote to memory of 4304 4444 btfjll.exe 419 PID 4444 wrote to memory of 4304 4444 btfjll.exe 419 PID 4444 wrote to memory of 4304 4444 btfjll.exe 419 PID 4304 wrote to memory of 4764 4304 pdrddxx.exe 418 PID 4304 wrote to memory of 4764 4304 pdrddxx.exe 418 PID 4304 wrote to memory of 4764 4304 pdrddxx.exe 418 PID 4764 wrote to memory of 980 4764 pbjlvp.exe 21 PID 4764 wrote to memory of 980 4764 pbjlvp.exe 21 PID 4764 wrote to memory of 980 4764 pbjlvp.exe 21 PID 980 wrote to memory of 3756 980 fjdffn.exe 417 PID 980 wrote to memory of 3756 980 fjdffn.exe 417 PID 980 wrote to memory of 3756 980 fjdffn.exe 417 PID 3756 wrote to memory of 3552 3756 bvpph.exe 416 PID 3756 wrote to memory of 3552 3756 bvpph.exe 416 PID 3756 wrote to memory of 3552 3756 bvpph.exe 416 PID 3552 wrote to memory of 2752 3552 tnvjj.exe 22 PID 3552 wrote to memory of 2752 3552 tnvjj.exe 22 PID 3552 wrote to memory of 2752 3552 tnvjj.exe 22 PID 2752 wrote to memory of 2168 2752 rxnhf.exe 415 PID 2752 wrote to memory of 2168 2752 rxnhf.exe 415 PID 2752 wrote to memory of 2168 2752 rxnhf.exe 415 PID 2168 wrote to memory of 4704 2168 ddfdv.exe 414 PID 2168 wrote to memory of 4704 2168 ddfdv.exe 414 PID 2168 wrote to memory of 4704 2168 ddfdv.exe 414 PID 4704 wrote to memory of 764 4704 lbnfdbf.exe 146 PID 4704 wrote to memory of 764 4704 lbnfdbf.exe 146 PID 4704 wrote to memory of 764 4704 lbnfdbf.exe 146 PID 764 wrote to memory of 4884 764 blfvh.exe 24 PID 764 wrote to memory of 4884 764 blfvh.exe 24 PID 764 wrote to memory of 4884 764 blfvh.exe 24 PID 4884 wrote to memory of 3872 4884 dnffxfv.exe 413 PID 4884 wrote to memory of 3872 4884 dnffxfv.exe 413 PID 4884 wrote to memory of 3872 4884 dnffxfv.exe 413 PID 3872 wrote to memory of 2064 3872 lrrrl.exe 412 PID 3872 wrote to memory of 2064 3872 lrrrl.exe 412 PID 3872 wrote to memory of 2064 3872 lrrrl.exe 412 PID 2064 wrote to memory of 3988 2064 bvhrjhv.exe 411 PID 2064 wrote to memory of 3988 2064 bvhrjhv.exe 411 PID 2064 wrote to memory of 3988 2064 bvhrjhv.exe 411 PID 3988 wrote to memory of 3024 3988 lnlrltb.exe 410 PID 3988 wrote to memory of 3024 3988 lnlrltb.exe 410 PID 3988 wrote to memory of 3024 3988 lnlrltb.exe 410 PID 3024 wrote to memory of 816 3024 hvfnp.exe 409 PID 3024 wrote to memory of 816 3024 hvfnp.exe 409 PID 3024 wrote to memory of 816 3024 hvfnp.exe 409 PID 816 wrote to memory of 1684 816 bdfplbj.exe 408 PID 816 wrote to memory of 1684 816 bdfplbj.exe 408 PID 816 wrote to memory of 1684 816 bdfplbj.exe 408 PID 1684 wrote to memory of 4428 1684 bdvnlrf.exe 407 PID 1684 wrote to memory of 4428 1684 bdvnlrf.exe 407 PID 1684 wrote to memory of 4428 1684 bdvnlrf.exe 407 PID 4428 wrote to memory of 1360 4428 ddvbntb.exe 25 PID 4428 wrote to memory of 1360 4428 ddvbntb.exe 25 PID 4428 wrote to memory of 1360 4428 ddvbntb.exe 25 PID 1360 wrote to memory of 1968 1360 tvdxlnb.exe 493 PID 1360 wrote to memory of 1968 1360 tvdxlnb.exe 493 PID 1360 wrote to memory of 1968 1360 tvdxlnb.exe 493 PID 1968 wrote to memory of 556 1968 hnbtjdf.exe 324
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f2cf2b0d1ff677bea322c4d33b77ad50.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f2cf2b0d1ff677bea322c4d33b77ad50.exe"1⤵PID:2400
-
\??\c:\tvhnhnf.exec:\tvhnhnf.exe2⤵PID:4932
-
-
\??\c:\fjdffn.exec:\fjdffn.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:980 -
\??\c:\bvpph.exec:\bvpph.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3756
-
-
\??\c:\rxnhf.exec:\rxnhf.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\ddfdv.exec:\ddfdv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2168
-
-
\??\c:\tfbvd.exec:\tfbvd.exe1⤵PID:764
-
\??\c:\dnffxfv.exec:\dnffxfv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
\??\c:\lrrrl.exec:\lrrrl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3872
-
-
-
\??\c:\vfvtpd.exec:\vfvtpd.exe2⤵PID:3872
-
\??\c:\fpttvvn.exec:\fpttvvn.exe3⤵PID:2460
-
-
\??\c:\bvhrjhv.exec:\bvhrjhv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064
-
-
-
\??\c:\tvdxlnb.exec:\tvdxlnb.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1360 -
\??\c:\hdddnb.exec:\hdddnb.exe2⤵PID:1968
-
-
\??\c:\thxrr.exec:\thxrr.exe1⤵PID:556
-
\??\c:\bnvptd.exec:\bnvptd.exe2⤵PID:1220
-
\??\c:\tvdvth.exec:\tvdvth.exe3⤵PID:2224
-
\??\c:\bldxr.exec:\bldxr.exe4⤵PID:4652
-
\??\c:\jvfvt.exec:\jvfvt.exe5⤵PID:4084
-
\??\c:\bbbfdvd.exec:\bbbfdvd.exe6⤵PID:3812
-
\??\c:\tdbxffh.exec:\tdbxffh.exe7⤵PID:2256
-
\??\c:\nbxflb.exec:\nbxflb.exe8⤵PID:2504
-
\??\c:\plnnhnx.exec:\plnnhnx.exe9⤵PID:3876
-
\??\c:\rdfbxf.exec:\rdfbxf.exe10⤵PID:3644
-
-
-
-
-
\??\c:\rvlthnx.exec:\rvlthnx.exe7⤵PID:1020
-
\??\c:\lrvtbx.exec:\lrvtbx.exe8⤵PID:4660
-
\??\c:\jpnrp.exec:\jpnrp.exe9⤵PID:2156
-
-
-
-
-
-
-
-
-
\??\c:\rnfpv.exec:\rnfpv.exe2⤵
- Executes dropped EXE
PID:1220 -
\??\c:\bpbndj.exec:\bpbndj.exe3⤵
- Executes dropped EXE
PID:1876
-
-
-
\??\c:\vhllxnv.exec:\vhllxnv.exe1⤵
- Executes dropped EXE
PID:4772 -
\??\c:\dtfjp.exec:\dtfjp.exe2⤵
- Executes dropped EXE
PID:1852
-
-
\??\c:\hpdpvnh.exec:\hpdpvnh.exe1⤵
- Executes dropped EXE
PID:4900 -
\??\c:\ddtbp.exec:\ddtbp.exe2⤵PID:3244
-
\??\c:\xdtbxhn.exec:\xdtbxhn.exe3⤵PID:4796
-
\??\c:\fjppppt.exec:\fjppppt.exe4⤵PID:2588
-
\??\c:\hdltv.exec:\hdltv.exe5⤵PID:224
-
\??\c:\hjhlp.exec:\hjhlp.exe6⤵PID:3156
-
\??\c:\bxxvt.exec:\bxxvt.exe7⤵PID:1188
-
\??\c:\dthbhb.exec:\dthbhb.exe8⤵PID:1848
-
\??\c:\rxdvrfr.exec:\rxdvrfr.exe9⤵PID:1588
-
-
-
-
\??\c:\nfbbjr.exec:\nfbbjr.exe7⤵PID:4864
-
\??\c:\rbpvh.exec:\rbpvh.exe8⤵PID:376
-
-
-
-
-
-
-
-
\??\c:\bdtdlfh.exec:\bdtdlfh.exe2⤵PID:3840
-
-
\??\c:\xxdpr.exec:\xxdpr.exe1⤵PID:1456
-
\??\c:\hnvrfl.exec:\hnvrfl.exe2⤵PID:5008
-
\??\c:\xblppt.exec:\xblppt.exe3⤵PID:5056
-
\??\c:\dvlbjhj.exec:\dvlbjhj.exe4⤵PID:2840
-
-
-
-
\??\c:\tbrdpvx.exec:\tbrdpvx.exe1⤵
- Executes dropped EXE
PID:3852
-
\??\c:\prvjfpt.exec:\prvjfpt.exe1⤵PID:4620
-
\??\c:\flxrdb.exec:\flxrdb.exe2⤵PID:4200
-
\??\c:\rfvndb.exec:\rfvndb.exe3⤵PID:1780
-
-
-
\??\c:\vnjxdbn.exec:\vnjxdbn.exe1⤵
- Executes dropped EXE
PID:2384 -
\??\c:\pbxhr.exec:\pbxhr.exe2⤵PID:3652
-
\??\c:\vrrrv.exec:\vrrrv.exe3⤵
- Executes dropped EXE
PID:4376
-
-
-
\??\c:\xrdrnx.exec:\xrdrnx.exe1⤵PID:884
-
\??\c:\vbjflhh.exec:\vbjflhh.exe1⤵PID:4172
-
\??\c:\vtdhnfj.exec:\vtdhnfj.exe1⤵PID:1496
-
\??\c:\htbrtjh.exec:\htbrtjh.exe1⤵PID:3988
-
\??\c:\rxdfd.exec:\rxdfd.exe2⤵PID:5108
-
\??\c:\lnhbrf.exec:\lnhbrf.exe3⤵PID:5004
-
\??\c:\drdtxx.exec:\drdtxx.exe4⤵PID:1540
-
\??\c:\tbhftp.exec:\tbhftp.exe5⤵PID:2188
-
\??\c:\bffxvdf.exec:\bffxvdf.exe6⤵PID:3560
-
\??\c:\vprbtr.exec:\vprbtr.exe7⤵PID:3332
-
-
-
\??\c:\jxppp.exec:\jxppp.exe6⤵PID:4912
-
-
-
-
\??\c:\bbxbprp.exec:\bbxbprp.exe4⤵PID:2396
-
\??\c:\bdbthf.exec:\bdbthf.exe5⤵PID:4476
-
-
-
-
-
\??\c:\hvfnp.exec:\hvfnp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
\??\c:\pfhlr.exec:\pfhlr.exe3⤵PID:4832
-
\??\c:\rttlhd.exec:\rttlhd.exe4⤵PID:3124
-
-
-
-
\??\c:\jlfprp.exec:\jlfprp.exe1⤵PID:3924
-
\??\c:\vfffhx.exec:\vfffhx.exe2⤵PID:2124
-
\??\c:\rrnnjfv.exec:\rrnnjfv.exe3⤵PID:3736
-
-
-
\??\c:\bbtllx.exec:\bbtllx.exe1⤵PID:4912
-
\??\c:\njlrxrf.exec:\njlrxrf.exe2⤵PID:2152
-
\??\c:\thdbfrf.exec:\thdbfrf.exe3⤵PID:2012
-
\??\c:\txrnnp.exec:\txrnnp.exe4⤵PID:3996
-
\??\c:\ntvnh.exec:\ntvnh.exe5⤵PID:4896
-
\??\c:\nllbhd.exec:\nllbhd.exe6⤵PID:2620
-
-
-
-
\??\c:\rjllhv.exec:\rjllhv.exe4⤵PID:3444
-
-
-
-
\??\c:\vnvjxxl.exec:\vnvjxxl.exe2⤵PID:1620
-
-
\??\c:\njdfb.exec:\njdfb.exe1⤵PID:4788
-
\??\c:\tbdllx.exec:\tbdllx.exe2⤵PID:2368
-
-
\??\c:\tlrbxf.exec:\tlrbxf.exe1⤵PID:4780
-
\??\c:\hftnfx.exec:\hftnfx.exe1⤵PID:2580
-
\??\c:\bplvh.exec:\bplvh.exe2⤵PID:2748
-
-
\??\c:\fvbtdfl.exec:\fvbtdfl.exe1⤵PID:3804
-
\??\c:\nnhtv.exec:\nnhtv.exe1⤵PID:1456
-
\??\c:\nvvxh.exec:\nvvxh.exe2⤵PID:4392
-
-
\??\c:\lfhdjr.exec:\lfhdjr.exe1⤵PID:4316
-
\??\c:\nljbrr.exec:\nljbrr.exe2⤵PID:4732
-
-
\??\c:\nbjfx.exec:\nbjfx.exe1⤵PID:3704
-
\??\c:\xdjppf.exec:\xdjppf.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\lvjnfn.exec:\lvjnfn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520
-
-
-
\??\c:\npjvh.exec:\npjvh.exe1⤵PID:1528
-
\??\c:\txpll.exec:\txpll.exe2⤵PID:492
-
\??\c:\pxfbjr.exec:\pxfbjr.exe3⤵PID:2792
-
\??\c:\tvxxlxx.exec:\tvxxlxx.exe4⤵PID:1312
-
-
\??\c:\djbpxdv.exec:\djbpxdv.exe4⤵PID:1312
-
\??\c:\bbndxh.exec:\bbndxh.exe5⤵PID:4368
-
-
-
-
-
\??\c:\jbxrhp.exec:\jbxrhp.exe2⤵PID:4764
-
\??\c:\pvtjbv.exec:\pvtjbv.exe3⤵PID:640
-
-
-
\??\c:\bjdfb.exec:\bjdfb.exe1⤵PID:4496
-
\??\c:\pptjv.exec:\pptjv.exe2⤵PID:2980
-
-
\??\c:\jxrnxbh.exec:\jxrnxbh.exe1⤵PID:4964
-
\??\c:\ttdbjvd.exec:\ttdbjvd.exe2⤵PID:764
-
-
\??\c:\thbrht.exec:\thbrht.exe2⤵PID:4876
-
\??\c:\rtrpj.exec:\rtrpj.exe3⤵PID:4012
-
\??\c:\dplbr.exec:\dplbr.exe4⤵PID:2740
-
-
-
-
\??\c:\tvrpxtj.exec:\tvrpxtj.exe1⤵PID:4440
-
\??\c:\fnjpvdn.exec:\fnjpvdn.exe1⤵PID:2044
-
\??\c:\rbfvj.exec:\rbfvj.exe1⤵PID:3040
-
\??\c:\hvfbp.exec:\hvfbp.exe1⤵PID:3340
-
\??\c:\bflvdt.exec:\bflvdt.exe2⤵PID:636
-
-
\??\c:\bxfjpl.exec:\bxfjpl.exe1⤵PID:1172
-
\??\c:\frdjl.exec:\frdjl.exe2⤵PID:4720
-
-
\??\c:\hbnnlbx.exec:\hbnnlbx.exe1⤵PID:2836
-
\??\c:\nxnhpjb.exec:\nxnhpjb.exe2⤵PID:4556
-
\??\c:\ptdjnt.exec:\ptdjnt.exe3⤵PID:3028
-
-
-
\??\c:\jnjxxvv.exec:\jnjxxvv.exe2⤵PID:3972
-
\??\c:\ndrlxv.exec:\ndrlxv.exe3⤵PID:3028
-
\??\c:\hbldx.exec:\hbldx.exe4⤵PID:3644
-
\??\c:\rnlpn.exec:\rnlpn.exe5⤵PID:1636
-
-
-
\??\c:\btnbb.exec:\btnbb.exe4⤵PID:4872
-
-
-
-
\??\c:\pvrdt.exec:\pvrdt.exe1⤵PID:3804
-
\??\c:\dxnnd.exec:\dxnnd.exe2⤵PID:4412
-
-
\??\c:\fbtftj.exec:\fbtftj.exe2⤵PID:2588
-
-
\??\c:\hthrv.exec:\hthrv.exe1⤵PID:4492
-
\??\c:\jvlnvl.exec:\jvlnvl.exe2⤵PID:2852
-
-
\??\c:\jlrrj.exec:\jlrrj.exe1⤵PID:3360
-
\??\c:\dlpnnbj.exec:\dlpnnbj.exe2⤵PID:2684
-
\??\c:\fvfltvh.exec:\fvfltvh.exe3⤵PID:1624
-
-
-
\??\c:\jbrbp.exec:\jbrbp.exe2⤵PID:2004
-
\??\c:\plbjfvt.exec:\plbjfvt.exe3⤵PID:420
-
-
\??\c:\ltbtnvt.exec:\ltbtnvt.exe3⤵PID:728
-
\??\c:\ftlbvln.exec:\ftlbvln.exe4⤵PID:4744
-
-
-
-
\??\c:\lxlxnr.exec:\lxlxnr.exe1⤵PID:2172
-
\??\c:\trdbllb.exec:\trdbllb.exe2⤵PID:4252
-
-
\??\c:\pjdhxdl.exec:\pjdhxdl.exe2⤵PID:3480
-
\??\c:\tlphp.exec:\tlphp.exe3⤵PID:4624
-
-
-
\??\c:\rnnbn.exec:\rnnbn.exe1⤵PID:4216
-
\??\c:\lxbftn.exec:\lxbftn.exe2⤵PID:4996
-
\??\c:\dvdnbdn.exec:\dvdnbdn.exe3⤵PID:3756
-
\??\c:\tnvjj.exec:\tnvjj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552
-
-
-
-
\??\c:\hdfnt.exec:\hdfnt.exe1⤵PID:2720
-
\??\c:\bnbptn.exec:\bnbptn.exe2⤵PID:3552
-
-
\??\c:\pjjhdfd.exec:\pjjhdfd.exe1⤵PID:4220
-
\??\c:\fxfjh.exec:\fxfjh.exe2⤵PID:4040
-
-
\??\c:\pjvhbbl.exec:\pjvhbbl.exe1⤵PID:4704
-
\??\c:\vfhthb.exec:\vfhthb.exe2⤵PID:4144
-
-
\??\c:\lrltvj.exec:\lrltvj.exe1⤵PID:1496
-
\??\c:\pbnfpn.exec:\pbnfpn.exe2⤵PID:1064
-
\??\c:\hjbvx.exec:\hjbvx.exe3⤵PID:3912
-
-
\??\c:\dpfvh.exec:\dpfvh.exe3⤵PID:4012
-
-
-
\??\c:\tpnpjfn.exec:\tpnpjfn.exe2⤵PID:2756
-
\??\c:\prjvn.exec:\prjvn.exe3⤵PID:4232
-
-
-
\??\c:\jrfvbxx.exec:\jrfvbxx.exe1⤵PID:4964
-
\??\c:\xxjvrtj.exec:\xxjvrtj.exe2⤵PID:3824
-
\??\c:\flxhhn.exec:\flxhhn.exe3⤵PID:4000
-
\??\c:\dndpnpb.exec:\dndpnpb.exe4⤵PID:1180
-
\??\c:\dnrvrr.exec:\dnrvrr.exe5⤵PID:4904
-
\??\c:\dtdjprf.exec:\dtdjprf.exe6⤵PID:2472
-
\??\c:\lnjnnh.exec:\lnjnnh.exe7⤵PID:4340
-
\??\c:\drnxn.exec:\drnxn.exe8⤵PID:3784
-
\??\c:\vvbbv.exec:\vvbbv.exe9⤵PID:1296
-
-
-
-
-
-
-
-
\??\c:\nrhhlnj.exec:\nrhhlnj.exe3⤵PID:2572
-
\??\c:\njbbjtn.exec:\njbbjtn.exe4⤵PID:1828
-
-
-
-
\??\c:\tbfrvv.exec:\tbfrvv.exe1⤵PID:1548
-
\??\c:\ppvllh.exec:\ppvllh.exe2⤵PID:3316
-
-
\??\c:\hxnnbf.exec:\hxnnbf.exe1⤵PID:620
-
\??\c:\fpxprd.exec:\fpxprd.exe2⤵PID:3124
-
\??\c:\jvjvdf.exec:\jvjvdf.exe3⤵PID:3784
-
\??\c:\fdjnr.exec:\fdjnr.exe4⤵PID:4752
-
-
-
-
\??\c:\drvndpx.exec:\drvndpx.exe2⤵PID:2124
-
-
\??\c:\lxdfh.exec:\lxdfh.exe1⤵PID:3688
-
\??\c:\xjrjx.exec:\xjrjx.exe2⤵PID:2392
-
-
\??\c:\fxdxvvp.exec:\fxdxvvp.exe2⤵PID:2504
-
\??\c:\xlxxlvn.exec:\xlxxlvn.exe3⤵PID:3468
-
\??\c:\vvddhr.exec:\vvddhr.exe4⤵PID:1676
-
-
-
-
\??\c:\prpjpf.exec:\prpjpf.exe1⤵PID:3768
-
\??\c:\fpprbt.exec:\fpprbt.exe2⤵PID:3840
-
\??\c:\rvrdd.exec:\rvrdd.exe3⤵PID:4504
-
\??\c:\fvdrdtx.exec:\fvdrdtx.exe4⤵PID:4204
-
-
-
-
\??\c:\ldnbxb.exec:\ldnbxb.exe2⤵PID:776
-
-
\??\c:\dtpnb.exec:\dtpnb.exe1⤵PID:3212
-
\??\c:\pdrpr.exec:\pdrpr.exe2⤵PID:4624
-
\??\c:\fppdfv.exec:\fppdfv.exe3⤵PID:4776
-
\??\c:\nvpxdx.exec:\nvpxdx.exe4⤵PID:4220
-
\??\c:\thlbhd.exec:\thlbhd.exe5⤵PID:1332
-
\??\c:\ndxlxh.exec:\ndxlxh.exe6⤵PID:632
-
\??\c:\xtpppt.exec:\xtpppt.exe7⤵PID:3152
-
\??\c:\vhltb.exec:\vhltb.exe8⤵PID:4704
-
-
-
-
-
-
-
\??\c:\nntvx.exec:\nntvx.exe3⤵PID:1780
-
\??\c:\thntd.exec:\thntd.exe4⤵PID:3492
-
-
-
-
\??\c:\thfrbp.exec:\thfrbp.exe1⤵PID:1432
-
\??\c:\tbnrbh.exec:\tbnrbh.exe2⤵PID:5076
-
-
\??\c:\vrxbfr.exec:\vrxbfr.exe1⤵PID:1612
-
\??\c:\hbbvtr.exec:\hbbvtr.exe2⤵PID:2792
-
-
\??\c:\rttntn.exec:\rttntn.exe1⤵PID:4512
-
\??\c:\xdlhn.exec:\xdlhn.exe2⤵PID:3144
-
\??\c:\pbtxpt.exec:\pbtxpt.exe3⤵PID:2804
-
-
-
\??\c:\blptnxb.exec:\blptnxb.exe1⤵PID:540
-
\??\c:\hxllnnp.exec:\hxllnnp.exe2⤵PID:4428
-
-
\??\c:\btjtrl.exec:\btjtrl.exe1⤵PID:4048
-
\??\c:\rbflrtt.exec:\rbflrtt.exe2⤵PID:3016
-
-
\??\c:\pdrnh.exec:\pdrnh.exe1⤵PID:5088
-
\??\c:\rpnjvrh.exec:\rpnjvrh.exe2⤵PID:1712
-
\??\c:\bbxvpnj.exec:\bbxvpnj.exe3⤵
- Executes dropped EXE
PID:3628
-
-
-
\??\c:\frtbvd.exec:\frtbvd.exe1⤵PID:2504
-
\??\c:\ddbjlft.exec:\ddbjlft.exe2⤵PID:320
-
\??\c:\vjbvrpx.exec:\vjbvrpx.exe3⤵PID:4780
-
\??\c:\fvdlr.exec:\fvdlr.exe4⤵PID:2568
-
-
-
-
\??\c:\dldlx.exec:\dldlx.exe1⤵PID:4080
-
\??\c:\fnnnr.exec:\fnnnr.exe2⤵PID:5008
-
\??\c:\ffbbnnl.exec:\ffbbnnl.exe3⤵PID:1956
-
-
\??\c:\ntllnn.exec:\ntllnn.exe3⤵PID:4744
-
-
-
\??\c:\flfnb.exec:\flfnb.exe2⤵PID:3424
-
\??\c:\pntbbdn.exec:\pntbbdn.exe3⤵PID:1972
-
\??\c:\nflpp.exec:\nflpp.exe4⤵PID:3816
-
\??\c:\fjdhdtp.exec:\fjdhdtp.exe5⤵PID:4492
-
\??\c:\rnlvx.exec:\rnlvx.exe6⤵PID:2000
-
\??\c:\dtdbdb.exec:\dtdbdb.exe7⤵PID:2172
-
\??\c:\dpfbfr.exec:\dpfbfr.exe8⤵PID:3480
-
\??\c:\vrddnrj.exec:\vrddnrj.exe9⤵PID:4200
-
\??\c:\ntjhdx.exec:\ntjhdx.exe10⤵PID:1508
-
\??\c:\bjxjl.exec:\bjxjl.exe11⤵PID:4196
-
-
-
-
-
-
-
\??\c:\tlvpj.exec:\tlvpj.exe6⤵PID:1624
-
-
-
-
-
-
\??\c:\rlxlpph.exec:\rlxlpph.exe1⤵PID:4360
-
\??\c:\xfnjrj.exec:\xfnjrj.exe2⤵PID:1624
-
\??\c:\jjvnl.exec:\jjvnl.exe3⤵PID:4840
-
-
-
\??\c:\ffhbv.exec:\ffhbv.exe1⤵PID:728
-
\??\c:\ptbpvx.exec:\ptbpvx.exe2⤵PID:1292
-
-
\??\c:\nrbbl.exec:\nrbbl.exe1⤵PID:4252
-
\??\c:\tfxtl.exec:\tfxtl.exe2⤵PID:564
-
-
\??\c:\ftdnfn.exec:\ftdnfn.exe2⤵PID:4200
-
-
\??\c:\lpdtrv.exec:\lpdtrv.exe1⤵PID:548
-
\??\c:\rnfdrrf.exec:\rnfdrrf.exe2⤵PID:4952
-
\??\c:\trdjrbt.exec:\trdjrbt.exe3⤵PID:1176
-
-
-
\??\c:\vvxbd.exec:\vvxbd.exe1⤵PID:752
-
\??\c:\dfpffrx.exec:\dfpffrx.exe2⤵PID:4764
-
-
\??\c:\dpbxl.exec:\dpbxl.exe1⤵PID:3960
-
\??\c:\pvntrpr.exec:\pvntrpr.exe2⤵PID:884
-
\??\c:\dvvdxj.exec:\dvvdxj.exe3⤵PID:2212
-
-
\??\c:\jfxxvhp.exec:\jfxxvhp.exe3⤵
- Executes dropped EXE
PID:5016
-
-
-
\??\c:\plxjl.exec:\plxjl.exe2⤵PID:2168
-
\??\c:\fblfn.exec:\fblfn.exe3⤵PID:368
-
\??\c:\ntrvjn.exec:\ntrvjn.exe4⤵PID:1244
-
\??\c:\dnvpjj.exec:\dnvpjj.exe5⤵PID:452
-
-
-
-
\??\c:\lbnfdbf.exec:\lbnfdbf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
\??\c:\dndjxbh.exec:\dndjxbh.exe4⤵PID:1932
-
\??\c:\prnpbl.exec:\prnpbl.exe5⤵PID:2572
-
-
-
-
-
\??\c:\dddvrf.exec:\dddvrf.exe1⤵PID:1244
-
\??\c:\xtfvxf.exec:\xtfvxf.exe2⤵PID:2980
-
\??\c:\vbljjv.exec:\vbljjv.exe3⤵PID:2572
-
\??\c:\xltlfx.exec:\xltlfx.exe4⤵PID:5040
-
\??\c:\brvnd.exec:\brvnd.exe5⤵PID:4440
-
\??\c:\fvpjxd.exec:\fvpjxd.exe6⤵PID:3308
-
\??\c:\fbdxvxl.exec:\fbdxvxl.exe7⤵PID:1828
-
\??\c:\dfbnx.exec:\dfbnx.exe8⤵PID:412
-
\??\c:\pbnbtph.exec:\pbnbtph.exe9⤵PID:4348
-
\??\c:\djbttt.exec:\djbttt.exe10⤵PID:1908
-
\??\c:\rrjprvt.exec:\rrjprvt.exe11⤵PID:408
-
-
-
\??\c:\bppjv.exec:\bppjv.exe10⤵PID:2440
-
\??\c:\vtjjrnl.exec:\vtjjrnl.exe11⤵PID:4468
-
\??\c:\flxjh.exec:\flxjh.exe12⤵PID:5092
-
\??\c:\jxbvjv.exec:\jxbvjv.exe13⤵PID:636
-
\??\c:\fbrnlnx.exec:\fbrnlnx.exe14⤵PID:540
-
\??\c:\thbnbjb.exec:\thbnbjb.exe15⤵PID:4232
-
\??\c:\lndhpp.exec:\lndhpp.exe16⤵PID:4752
-
\??\c:\hnbtjdf.exec:\hnbtjdf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1968 -
\??\c:\jtdrhhn.exec:\jtdrhhn.exe18⤵PID:1824
-
\??\c:\dprfx.exec:\dprfx.exe19⤵PID:3136
-
\??\c:\lxhbpfl.exec:\lxhbpfl.exe20⤵PID:3460
-
\??\c:\flnbl.exec:\flnbl.exe21⤵PID:4456
-
\??\c:\rdtvph.exec:\rdtvph.exe22⤵PID:3560
-
\??\c:\bhpfff.exec:\bhpfff.exe23⤵PID:4880
-
\??\c:\xffjjtv.exec:\xffjjtv.exe24⤵PID:3736
-
\??\c:\pbfjtbj.exec:\pbfjtbj.exe25⤵PID:3660
-
\??\c:\jxtrlph.exec:\jxtrlph.exe26⤵
- Executes dropped EXE
PID:4928 -
\??\c:\tnbtnlr.exec:\tnbtnlr.exe27⤵PID:2104
-
\??\c:\pvjpbf.exec:\pvjpbf.exe28⤵PID:4720
-
\??\c:\hbbppdr.exec:\hbbppdr.exe29⤵PID:3840
-
\??\c:\nrdbjtv.exec:\nrdbjtv.exe30⤵PID:4504
-
\??\c:\djlrnjr.exec:\djlrnjr.exe31⤵PID:3028
-
\??\c:\llrdjb.exec:\llrdjb.exe32⤵PID:3920
-
\??\c:\xvdfrj.exec:\xvdfrj.exe33⤵PID:5048
-
\??\c:\thpdjfp.exec:\thpdjfp.exe34⤵PID:2892
-
\??\c:\tbvnplr.exec:\tbvnplr.exe35⤵PID:756
-
\??\c:\fvvfdr.exec:\fvvfdr.exe36⤵PID:1588
-
\??\c:\fjtxv.exec:\fjtxv.exe37⤵PID:4760
-
\??\c:\ffjdxj.exec:\ffjdxj.exe38⤵PID:4492
-
\??\c:\lldntln.exec:\lldntln.exe39⤵PID:4644
-
\??\c:\pftxlh.exec:\pftxlh.exe40⤵PID:4360
-
\??\c:\xlfftr.exec:\xlfftr.exe41⤵PID:3376
-
\??\c:\dtlpfl.exec:\dtlpfl.exe42⤵PID:2532
-
\??\c:\jdxjx.exec:\jdxjx.exe43⤵PID:3520
-
\??\c:\lbxrjb.exec:\lbxrjb.exe44⤵PID:3360
-
\??\c:\jvxvp.exec:\jvxvp.exe45⤵PID:4128
-
\??\c:\ndfrp.exec:\ndfrp.exe46⤵PID:752
-
\??\c:\nnvtrtl.exec:\nnvtrtl.exe47⤵PID:316
-
\??\c:\ndthvrv.exec:\ndthvrv.exe48⤵PID:3236
-
\??\c:\fnfvnn.exec:\fnfvnn.exe49⤵
- Executes dropped EXE
PID:3652 -
\??\c:\vphrhbv.exec:\vphrhbv.exe50⤵PID:3760
-
\??\c:\xtrjh.exec:\xtrjh.exe51⤵
- Executes dropped EXE
PID:884 -
\??\c:\tppvdvj.exec:\tppvdvj.exe52⤵PID:1332
-
\??\c:\rvpxlh.exec:\rvpxlh.exe53⤵PID:368
-
\??\c:\rjfxpj.exec:\rjfxpj.exe54⤵PID:4076
-
\??\c:\rxdbrtd.exec:\rxdbrtd.exe55⤵PID:1244
-
\??\c:\bxvfvpj.exec:\bxvfvpj.exe56⤵
- Executes dropped EXE
PID:1476 -
\??\c:\pnvrrjl.exec:\pnvrrjl.exe57⤵PID:3396
-
\??\c:\vjjlb.exec:\vjjlb.exe58⤵PID:100
-
\??\c:\pnvxp.exec:\pnvxp.exe59⤵PID:2044
-
\??\c:\ffnndbn.exec:\ffnndbn.exe60⤵PID:4964
-
\??\c:\jpjbd.exec:\jpjbd.exe61⤵PID:764
-
\??\c:\dvnntxd.exec:\dvnntxd.exe62⤵PID:3872
-
\??\c:\ddbbbh.exec:\ddbbbh.exe63⤵PID:3800
-
\??\c:\njrpdr.exec:\njrpdr.exe64⤵PID:4348
-
\??\c:\fvllrl.exec:\fvllrl.exe65⤵PID:2440
-
\??\c:\tdtrht.exec:\tdtrht.exe66⤵PID:1484
-
\??\c:\ndnfvn.exec:\ndnfvn.exe67⤵PID:4340
-
\??\c:\vtftv.exec:\vtftv.exe68⤵PID:636
-
\??\c:\tvbhfjr.exec:\tvbhfjr.exe69⤵
- Executes dropped EXE
PID:1296 -
\??\c:\rndtdtp.exec:\rndtdtp.exe70⤵PID:3016
-
\??\c:\pltvp.exec:\pltvp.exe71⤵PID:1472
-
\??\c:\hdprhbr.exec:\hdprhbr.exe72⤵PID:3856
-
\??\c:\nnfnf.exec:\nnfnf.exe73⤵PID:2124
-
\??\c:\jxxvhjp.exec:\jxxvhjp.exe74⤵PID:4660
-
\??\c:\rjnnbx.exec:\rjnnbx.exe75⤵PID:1632
-
\??\c:\nhrlbbl.exec:\nhrlbbl.exe76⤵PID:556
-
\??\c:\jbbbf.exec:\jbbbf.exe77⤵PID:4324
-
\??\c:\tlttlvp.exec:\tlttlvp.exe78⤵PID:1876
-
\??\c:\ntpbp.exec:\ntpbp.exe79⤵PID:2052
-
\??\c:\hxtvhrr.exec:\hxtvhrr.exe80⤵PID:4896
-
\??\c:\fhxvh.exec:\fhxvh.exe81⤵PID:648
-
\??\c:\fnfflf.exec:\fnfflf.exe82⤵PID:3876
-
\??\c:\jrpnnr.exec:\jrpnnr.exe83⤵PID:3744
-
\??\c:\lvrrx.exec:\lvrrx.exe84⤵PID:2104
-
\??\c:\ljhff.exec:\ljhff.exe85⤵PID:3240
-
\??\c:\bpjdn.exec:\bpjdn.exe86⤵PID:2580
-
\??\c:\xdrnpdb.exec:\xdrnpdb.exe87⤵PID:4780
-
\??\c:\fvblfjb.exec:\fvblfjb.exe88⤵PID:3068
-
\??\c:\jfvdtl.exec:\jfvdtl.exe89⤵PID:4236
-
\??\c:\hjlbb.exec:\hjlbb.exe90⤵PID:376
-
\??\c:\ldrfx.exec:\ldrfx.exe91⤵PID:4412
-
\??\c:\nxxbrx.exec:\nxxbrx.exe92⤵PID:1956
-
\??\c:\xpvrvx.exec:\xpvrvx.exe93⤵PID:4744
-
\??\c:\fhfdjrb.exec:\fhfdjrb.exe94⤵PID:2728
-
\??\c:\fttrn.exec:\fttrn.exe95⤵PID:2684
-
\??\c:\fxffldr.exec:\fxffldr.exe96⤵PID:4840
-
\??\c:\bnvblbf.exec:\bnvblbf.exe97⤵PID:1192
-
\??\c:\bdvrrxh.exec:\bdvrrxh.exe98⤵PID:5068
-
\??\c:\xvxbd.exec:\xvxbd.exe99⤵PID:944
-
\??\c:\dvptjd.exec:\dvptjd.exe100⤵PID:4620
-
\??\c:\vntfhh.exec:\vntfhh.exe101⤵PID:5064
-
\??\c:\vvbvfld.exec:\vvbvfld.exe102⤵PID:1432
-
\??\c:\nfnxpv.exec:\nfnxpv.exe103⤵PID:1612
-
\??\c:\fdrvnpr.exec:\fdrvnpr.exe104⤵PID:2996
-
\??\c:\xpxppj.exec:\xpxppj.exe105⤵PID:4240
-
\??\c:\dvflf.exec:\dvflf.exe106⤵PID:2196
-
\??\c:\txxlhx.exec:\txxlhx.exe107⤵PID:4368
-
\??\c:\fvlfp.exec:\fvlfp.exe108⤵PID:4040
-
\??\c:\djhvjpv.exec:\djhvjpv.exe109⤵PID:460
-
\??\c:\vdvlfvx.exec:\vdvlfvx.exe110⤵PID:2648
-
\??\c:\bbhfn.exec:\bbhfn.exe111⤵PID:3668
-
\??\c:\nrfprtt.exec:\nrfprtt.exe112⤵PID:1476
-
\??\c:\rxfhnbj.exec:\rxfhnbj.exe113⤵PID:5040
-
\??\c:\jlfpbvt.exec:\jlfpbvt.exe114⤵PID:876
-
\??\c:\vfrljb.exec:\vfrljb.exe115⤵PID:3228
-
\??\c:\bnljrd.exec:\bnljrd.exe116⤵PID:444
-
\??\c:\jrjptrv.exec:\jrjptrv.exe117⤵PID:764
-
\??\c:\phtvh.exec:\phtvh.exe118⤵PID:3716
-
\??\c:\drjbfrp.exec:\drjbfrp.exe119⤵PID:4000
-
\??\c:\rlbfvnh.exec:\rlbfvnh.exe120⤵PID:2460
-
\??\c:\fbnlfb.exec:\fbnlfb.exe121⤵PID:4876
-
\??\c:\pbnbl.exec:\pbnbl.exe122⤵PID:3340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-