Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 17:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.df64c4520f0948fbf38a6bff5b473df0.exe
Resource
win7-20231020-en
5 signatures
150 seconds
General
-
Target
NEAS.df64c4520f0948fbf38a6bff5b473df0.exe
-
Size
75KB
-
MD5
df64c4520f0948fbf38a6bff5b473df0
-
SHA1
997eb32c0220ce75cbd18955337e247f6c6c90f5
-
SHA256
702d908d3a52690bf6c103c5c8540d0971f0d8ed180a2f50058ce11d69dc5d1d
-
SHA512
7728eaf6c828bfd83e6509f14b353f110106c7d24a428407e8175b3e70fbe8f578e2ab04672aea74f7015c705f24967a192f8084cf748dbed21fb962e5937b3f
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIjaQkPcy8WTeAwHVxv:ymb3NkkiQ3mdBjFIpkPcy8qsHVxv
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral1/memory/3032-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2252-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2248-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2872-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2196-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2688-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3048-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2556-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2020-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2792-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2792-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1076-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1888-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/928-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2264-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1804-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1692-304-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1732-319-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2508-334-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2196-392-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2732-393-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3044-402-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-418-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1728-426-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2848-449-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1644-457-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2252 pdbxbx.exe 2248 drhpttn.exe 2872 vrpdlhd.exe 2196 pxtdrt.exe 2688 btdhrjn.exe 2572 prjxtd.exe 3048 hrdnp.exe 948 lnfnxp.exe 2556 pbdnn.exe 2020 rbxhxhn.exe 2792 bjttf.exe 2952 brddn.exe 1076 fprbv.exe 1888 hjftp.exe 2028 bfhvdh.exe 2560 dxhjff.exe 760 hdflbb.exe 928 lvjpbvx.exe 2440 pnbnvbx.exe 2288 xpljjfj.exe 2368 xvffb.exe 896 vrdtdjj.exe 2264 jfptjjx.exe 1804 hjtxp.exe 1248 dfpntn.exe 2188 prpnlvd.exe 1996 tbfrt.exe 1676 ppnlth.exe 1692 nvnlhxv.exe 1732 dbdnxrx.exe 1752 lrdpnf.exe 2508 vnfdlhh.exe 1664 fxfhn.exe 2256 rvnvtl.exe 2864 ttlhxpn.exe 2704 nbpddn.exe 2412 fvblpb.exe 2196 jrdnbnx.exe 2732 hjhjfnj.exe 3044 lvbprf.exe 3056 blhnn.exe 2500 bpbfn.exe 1728 jpthv.exe 636 rjbtxpj.exe 2036 xpflr.exe 2848 bttlp.exe 1644 lflbx.exe 1936 fhbxjtj.exe 1076 nvrflbr.exe 2232 bfdpx.exe 2236 ljbhvj.exe 2024 thdnl.exe 756 nlbdr.exe 760 hlhbvpn.exe 2052 jdlrv.exe 2996 vttvp.exe 2384 pttjjx.exe 1424 fpbtxp.exe 1200 xjrbt.exe 2432 pbvjv.exe 1428 xflhnvr.exe 972 vxlrp.exe 1828 tpfvn.exe 2308 brrtdph.exe -
resource yara_rule behavioral1/memory/3032-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2252-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2248-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2872-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/948-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2556-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2020-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2792-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2792-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1076-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1076-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1888-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1888-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/760-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/928-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/928-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2440-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2288-209-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2264-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2264-238-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1804-249-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1804-251-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1248-260-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1996-281-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-291-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1692-301-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1692-304-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1732-312-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1732-319-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1752-322-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2508-334-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1664-342-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-350-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-358-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-366-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2412-374-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-384-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-383-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-392-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-393-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3044-401-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3044-402-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-410-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-418-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1728-426-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-448-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2848-449-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1644-457-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2252 3032 NEAS.df64c4520f0948fbf38a6bff5b473df0.exe 28 PID 3032 wrote to memory of 2252 3032 NEAS.df64c4520f0948fbf38a6bff5b473df0.exe 28 PID 3032 wrote to memory of 2252 3032 NEAS.df64c4520f0948fbf38a6bff5b473df0.exe 28 PID 3032 wrote to memory of 2252 3032 NEAS.df64c4520f0948fbf38a6bff5b473df0.exe 28 PID 2252 wrote to memory of 2248 2252 pdbxbx.exe 29 PID 2252 wrote to memory of 2248 2252 pdbxbx.exe 29 PID 2252 wrote to memory of 2248 2252 pdbxbx.exe 29 PID 2252 wrote to memory of 2248 2252 pdbxbx.exe 29 PID 2248 wrote to memory of 2872 2248 drhpttn.exe 30 PID 2248 wrote to memory of 2872 2248 drhpttn.exe 30 PID 2248 wrote to memory of 2872 2248 drhpttn.exe 30 PID 2248 wrote to memory of 2872 2248 drhpttn.exe 30 PID 2872 wrote to memory of 2196 2872 vrpdlhd.exe 31 PID 2872 wrote to memory of 2196 2872 vrpdlhd.exe 31 PID 2872 wrote to memory of 2196 2872 vrpdlhd.exe 31 PID 2872 wrote to memory of 2196 2872 vrpdlhd.exe 31 PID 2196 wrote to memory of 2688 2196 pxtdrt.exe 32 PID 2196 wrote to memory of 2688 2196 pxtdrt.exe 32 PID 2196 wrote to memory of 2688 2196 pxtdrt.exe 32 PID 2196 wrote to memory of 2688 2196 pxtdrt.exe 32 PID 2688 wrote to memory of 2572 2688 btdhrjn.exe 33 PID 2688 wrote to memory of 2572 2688 btdhrjn.exe 33 PID 2688 wrote to memory of 2572 2688 btdhrjn.exe 33 PID 2688 wrote to memory of 2572 2688 btdhrjn.exe 33 PID 2572 wrote to memory of 3048 2572 prjxtd.exe 34 PID 2572 wrote to memory of 3048 2572 prjxtd.exe 34 PID 2572 wrote to memory of 3048 2572 prjxtd.exe 34 PID 2572 wrote to memory of 3048 2572 prjxtd.exe 34 PID 3048 wrote to memory of 948 3048 hrdnp.exe 35 PID 3048 wrote to memory of 948 3048 hrdnp.exe 35 PID 3048 wrote to memory of 948 3048 hrdnp.exe 35 PID 3048 wrote to memory of 948 3048 hrdnp.exe 35 PID 948 wrote to memory of 2556 948 lnfnxp.exe 36 PID 948 wrote to memory of 2556 948 lnfnxp.exe 36 PID 948 wrote to memory of 2556 948 lnfnxp.exe 36 PID 948 wrote to memory of 2556 948 lnfnxp.exe 36 PID 2556 wrote to memory of 2020 2556 pbdnn.exe 37 PID 2556 wrote to memory of 2020 2556 pbdnn.exe 37 PID 2556 wrote to memory of 2020 2556 pbdnn.exe 37 PID 2556 wrote to memory of 2020 2556 pbdnn.exe 37 PID 2020 wrote to memory of 2792 2020 rbxhxhn.exe 38 PID 2020 wrote to memory of 2792 2020 rbxhxhn.exe 38 PID 2020 wrote to memory of 2792 2020 rbxhxhn.exe 38 PID 2020 wrote to memory of 2792 2020 rbxhxhn.exe 38 PID 2792 wrote to memory of 2952 2792 bjttf.exe 39 PID 2792 wrote to memory of 2952 2792 bjttf.exe 39 PID 2792 wrote to memory of 2952 2792 bjttf.exe 39 PID 2792 wrote to memory of 2952 2792 bjttf.exe 39 PID 2952 wrote to memory of 1076 2952 brddn.exe 40 PID 2952 wrote to memory of 1076 2952 brddn.exe 40 PID 2952 wrote to memory of 1076 2952 brddn.exe 40 PID 2952 wrote to memory of 1076 2952 brddn.exe 40 PID 1076 wrote to memory of 1888 1076 fprbv.exe 41 PID 1076 wrote to memory of 1888 1076 fprbv.exe 41 PID 1076 wrote to memory of 1888 1076 fprbv.exe 41 PID 1076 wrote to memory of 1888 1076 fprbv.exe 41 PID 1888 wrote to memory of 2028 1888 hjftp.exe 42 PID 1888 wrote to memory of 2028 1888 hjftp.exe 42 PID 1888 wrote to memory of 2028 1888 hjftp.exe 42 PID 1888 wrote to memory of 2028 1888 hjftp.exe 42 PID 2028 wrote to memory of 2560 2028 bfhvdh.exe 43 PID 2028 wrote to memory of 2560 2028 bfhvdh.exe 43 PID 2028 wrote to memory of 2560 2028 bfhvdh.exe 43 PID 2028 wrote to memory of 2560 2028 bfhvdh.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.df64c4520f0948fbf38a6bff5b473df0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.df64c4520f0948fbf38a6bff5b473df0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\pdbxbx.exec:\pdbxbx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\drhpttn.exec:\drhpttn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2248 -
\??\c:\vrpdlhd.exec:\vrpdlhd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
\??\c:\pxtdrt.exec:\pxtdrt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
\??\c:\btdhrjn.exec:\btdhrjn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
\??\c:\prjxtd.exec:\prjxtd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\hrdnp.exec:\hrdnp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\lnfnxp.exec:\lnfnxp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:948 -
\??\c:\pbdnn.exec:\pbdnn.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
\??\c:\rbxhxhn.exec:\rbxhxhn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
\??\c:\bjttf.exec:\bjttf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\brddn.exec:\brddn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\fprbv.exec:\fprbv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
\??\c:\hjftp.exec:\hjftp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
\??\c:\bfhvdh.exec:\bfhvdh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\dxhjff.exec:\dxhjff.exe17⤵
- Executes dropped EXE
PID:2560 -
\??\c:\hdflbb.exec:\hdflbb.exe18⤵
- Executes dropped EXE
PID:760 -
\??\c:\lvjpbvx.exec:\lvjpbvx.exe19⤵
- Executes dropped EXE
PID:928 -
\??\c:\pnbnvbx.exec:\pnbnvbx.exe20⤵
- Executes dropped EXE
PID:2440 -
\??\c:\xpljjfj.exec:\xpljjfj.exe21⤵
- Executes dropped EXE
PID:2288 -
\??\c:\xvffb.exec:\xvffb.exe22⤵
- Executes dropped EXE
PID:2368 -
\??\c:\vrdtdjj.exec:\vrdtdjj.exe23⤵
- Executes dropped EXE
PID:896 -
\??\c:\jfptjjx.exec:\jfptjjx.exe24⤵
- Executes dropped EXE
PID:2264 -
\??\c:\hjtxp.exec:\hjtxp.exe25⤵
- Executes dropped EXE
PID:1804 -
\??\c:\dfpntn.exec:\dfpntn.exe26⤵
- Executes dropped EXE
PID:1248 -
\??\c:\prpnlvd.exec:\prpnlvd.exe27⤵
- Executes dropped EXE
PID:2188 -
\??\c:\tbfrt.exec:\tbfrt.exe28⤵
- Executes dropped EXE
PID:1996 -
\??\c:\ppnlth.exec:\ppnlth.exe29⤵
- Executes dropped EXE
PID:1676 -
\??\c:\nvnlhxv.exec:\nvnlhxv.exe30⤵
- Executes dropped EXE
PID:1692 -
\??\c:\dbdnxrx.exec:\dbdnxrx.exe31⤵
- Executes dropped EXE
PID:1732 -
\??\c:\lrdpnf.exec:\lrdpnf.exe32⤵
- Executes dropped EXE
PID:1752 -
\??\c:\vnfdlhh.exec:\vnfdlhh.exe33⤵
- Executes dropped EXE
PID:2508 -
\??\c:\fxfhn.exec:\fxfhn.exe34⤵
- Executes dropped EXE
PID:1664 -
\??\c:\rvnvtl.exec:\rvnvtl.exe35⤵
- Executes dropped EXE
PID:2256 -
\??\c:\ttlhxpn.exec:\ttlhxpn.exe36⤵
- Executes dropped EXE
PID:2864 -
\??\c:\nbpddn.exec:\nbpddn.exe37⤵
- Executes dropped EXE
PID:2704 -
\??\c:\fvblpb.exec:\fvblpb.exe38⤵
- Executes dropped EXE
PID:2412 -
\??\c:\jrdnbnx.exec:\jrdnbnx.exe39⤵
- Executes dropped EXE
PID:2196 -
\??\c:\hjhjfnj.exec:\hjhjfnj.exe40⤵
- Executes dropped EXE
PID:2732 -
\??\c:\lvbprf.exec:\lvbprf.exe41⤵
- Executes dropped EXE
PID:3044 -
\??\c:\blhnn.exec:\blhnn.exe42⤵
- Executes dropped EXE
PID:3056 -
\??\c:\bpbfn.exec:\bpbfn.exe43⤵
- Executes dropped EXE
PID:2500 -
\??\c:\jpthv.exec:\jpthv.exe44⤵
- Executes dropped EXE
PID:1728 -
\??\c:\rjbtxpj.exec:\rjbtxpj.exe45⤵
- Executes dropped EXE
PID:636 -
\??\c:\xpflr.exec:\xpflr.exe46⤵
- Executes dropped EXE
PID:2036 -
\??\c:\bttlp.exec:\bttlp.exe47⤵
- Executes dropped EXE
PID:2848 -
\??\c:\lflbx.exec:\lflbx.exe48⤵
- Executes dropped EXE
PID:1644 -
\??\c:\fhbxjtj.exec:\fhbxjtj.exe49⤵
- Executes dropped EXE
PID:1936 -
\??\c:\nvrflbr.exec:\nvrflbr.exe50⤵
- Executes dropped EXE
PID:1076 -
\??\c:\bfdpx.exec:\bfdpx.exe51⤵
- Executes dropped EXE
PID:2232 -
\??\c:\ljbhvj.exec:\ljbhvj.exe52⤵
- Executes dropped EXE
PID:2236 -
\??\c:\thdnl.exec:\thdnl.exe53⤵
- Executes dropped EXE
PID:2024 -
\??\c:\nlbdr.exec:\nlbdr.exe54⤵
- Executes dropped EXE
PID:756 -
\??\c:\hlhbvpn.exec:\hlhbvpn.exe55⤵
- Executes dropped EXE
PID:760 -
\??\c:\jdlrv.exec:\jdlrv.exe56⤵
- Executes dropped EXE
PID:2052 -
\??\c:\vttvp.exec:\vttvp.exe57⤵
- Executes dropped EXE
PID:2996 -
\??\c:\pttjjx.exec:\pttjjx.exe58⤵
- Executes dropped EXE
PID:2384 -
\??\c:\fpbtxp.exec:\fpbtxp.exe59⤵
- Executes dropped EXE
PID:1424 -
\??\c:\xjrbt.exec:\xjrbt.exe60⤵
- Executes dropped EXE
PID:1200 -
\??\c:\pbvjv.exec:\pbvjv.exe61⤵
- Executes dropped EXE
PID:2432 -
\??\c:\xflhnvr.exec:\xflhnvr.exe62⤵
- Executes dropped EXE
PID:1428 -
\??\c:\vxlrp.exec:\vxlrp.exe63⤵
- Executes dropped EXE
PID:972 -
\??\c:\tpfvn.exec:\tpfvn.exe64⤵
- Executes dropped EXE
PID:1828 -
\??\c:\brrtdph.exec:\brrtdph.exe65⤵
- Executes dropped EXE
PID:2308 -
\??\c:\xddbt.exec:\xddbt.exe66⤵PID:904
-
\??\c:\ndxlh.exec:\ndxlh.exe67⤵PID:2524
-
\??\c:\bfjnh.exec:\bfjnh.exe68⤵PID:1116
-
\??\c:\dhrplnj.exec:\dhrplnj.exe69⤵PID:2300
-
\??\c:\nxrjbh.exec:\nxrjbh.exe70⤵PID:1012
-
\??\c:\rprptfb.exec:\rprptfb.exe71⤵PID:880
-
\??\c:\dfhlvvf.exec:\dfhlvvf.exe72⤵PID:2464
-
\??\c:\bxfftb.exec:\bxfftb.exe73⤵PID:1352
-
\??\c:\vxdldr.exec:\vxdldr.exe74⤵PID:1584
-
\??\c:\jflvjb.exec:\jflvjb.exe75⤵PID:1956
-
\??\c:\hldnn.exec:\hldnn.exe76⤵PID:2712
-
\??\c:\bvttr.exec:\bvttr.exe77⤵PID:2868
-
\??\c:\njvpp.exec:\njvpp.exe78⤵PID:2728
-
\??\c:\fffxbr.exec:\fffxbr.exe79⤵PID:2856
-
\??\c:\pdfnn.exec:\pdfnn.exe80⤵PID:2752
-
\??\c:\jjntxd.exec:\jjntxd.exe81⤵PID:2568
-
\??\c:\pvjtpxx.exec:\pvjtpxx.exe82⤵PID:2736
-
\??\c:\rjthj.exec:\rjthj.exe83⤵PID:2576
-
\??\c:\hrpdtnt.exec:\hrpdtnt.exe84⤵PID:3052
-
\??\c:\ldfbhb.exec:\ldfbhb.exe85⤵PID:1220
-
\??\c:\nxrbn.exec:\nxrbn.exe86⤵PID:1068
-
\??\c:\ffvbnt.exec:\ffvbnt.exe87⤵PID:2504
-
\??\c:\hxntr.exec:\hxntr.exe88⤵PID:560
-
\??\c:\vrrrj.exec:\vrrrj.exe89⤵PID:2840
-
\??\c:\nfdpxr.exec:\nfdpxr.exe90⤵PID:2020
-
\??\c:\nrvxrb.exec:\nrvxrb.exe91⤵PID:1940
-
\??\c:\prvbjbr.exec:\prvbjbr.exe92⤵PID:1920
-
\??\c:\prpdfp.exec:\prpdfp.exe93⤵PID:1092
-
\??\c:\vpbfhn.exec:\vpbfhn.exe94⤵PID:1960
-
\??\c:\ndnbjx.exec:\ndnbjx.exe95⤵PID:2360
-
\??\c:\jxrtfbn.exec:\jxrtfbn.exe96⤵PID:1976
-
\??\c:\fffvllb.exec:\fffvllb.exe97⤵PID:1640
-
\??\c:\pffrrt.exec:\pffrrt.exe98⤵PID:1764
-
\??\c:\xblbh.exec:\xblbh.exe99⤵PID:2208
-
\??\c:\dtbvbv.exec:\dtbvbv.exe100⤵PID:1816
-
\??\c:\dflxtrh.exec:\dflxtrh.exe101⤵PID:1396
-
\??\c:\rrrbn.exec:\rrrbn.exe102⤵PID:2376
-
\??\c:\dhhdb.exec:\dhhdb.exe103⤵PID:584
-
\??\c:\pbhnrx.exec:\pbhnrx.exe104⤵PID:2420
-
\??\c:\plxnp.exec:\plxnp.exe105⤵PID:1180
-
\??\c:\rjtxfn.exec:\rjtxfn.exe106⤵PID:2432
-
\??\c:\lrvlltn.exec:\lrvlltn.exe107⤵PID:1600
-
\??\c:\pxxdnnd.exec:\pxxdnnd.exe108⤵PID:1988
-
\??\c:\jrhvbd.exec:\jrhvbd.exe109⤵PID:2016
-
\??\c:\pxrbvp.exec:\pxrbvp.exe110⤵PID:608
-
\??\c:\npnltnp.exec:\npnltnp.exe111⤵PID:2748
-
\??\c:\dvdtptn.exec:\dvdtptn.exe112⤵PID:588
-
\??\c:\rvrvjtn.exec:\rvrvjtn.exe113⤵PID:1116
-
\??\c:\ffrpvlb.exec:\ffrpvlb.exe114⤵PID:2652
-
\??\c:\thbtd.exec:\thbtd.exe115⤵PID:1052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\tfvjnjp.exec:\tfvjnjp.exe1⤵PID:1504
-
\??\c:\bftlp.exec:\bftlp.exe2⤵PID:1704
-
\??\c:\fjhnttt.exec:\fjhnttt.exe3⤵PID:3060
-
\??\c:\vphfrfd.exec:\vphfrfd.exe4⤵PID:2508
-
\??\c:\pxjjjrx.exec:\pxjjjrx.exe5⤵PID:2700
-
\??\c:\bfjnl.exec:\bfjnl.exe6⤵PID:2400
-
-
-
-
-
-
\??\c:\rdfjvvt.exec:\rdfjvvt.exe1⤵PID:2984
-
\??\c:\xjxfrdd.exec:\xjxfrdd.exe2⤵PID:2428
-
\??\c:\nbfttp.exec:\nbfttp.exe3⤵PID:2724
-
\??\c:\frlfl.exec:\frlfl.exe4⤵PID:2200
-
\??\c:\ffhft.exec:\ffhft.exe5⤵PID:2892
-
\??\c:\fjnnxr.exec:\fjnnxr.exe6⤵PID:2732
-
\??\c:\httfjlh.exec:\httfjlh.exe7⤵PID:2940
-
-
-
-
-
-
-
\??\c:\jldtj.exec:\jldtj.exe1⤵PID:1308
-
\??\c:\fvppr.exec:\fvppr.exe2⤵PID:1008
-
\??\c:\prhpppf.exec:\prhpppf.exe3⤵PID:2556
-
\??\c:\tbpdf.exec:\tbpdf.exe4⤵PID:2672
-
\??\c:\lxdtpbt.exec:\lxdtpbt.exe5⤵PID:2844
-
\??\c:\vhvfr.exec:\vhvfr.exe6⤵PID:2140
-
\??\c:\trlbtfb.exec:\trlbtfb.exe7⤵PID:2036
-
\??\c:\ddhrn.exec:\ddhrn.exe8⤵PID:1940
-
\??\c:\xflfh.exec:\xflfh.exe9⤵PID:2164
-
\??\c:\bnhft.exec:\bnhft.exe10⤵PID:2216
-
\??\c:\vnbnjt.exec:\vnbnjt.exe11⤵PID:2616
-
\??\c:\jxbtdh.exec:\jxbtdh.exe12⤵PID:2212
-
\??\c:\bppfrv.exec:\bppfrv.exe13⤵PID:2668
-
\??\c:\nffrd.exec:\nffrd.exe14⤵PID:2100
-
\??\c:\rxdblx.exec:\rxdblx.exe15⤵PID:668
-
\??\c:\hxljvhn.exec:\hxljvhn.exe16⤵PID:2320
-
\??\c:\plnnv.exec:\plnnv.exe17⤵PID:2992
-
\??\c:\xnhnnht.exec:\xnhnnht.exe18⤵PID:2452
-
\??\c:\fprtd.exec:\fprtd.exe19⤵PID:1612
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\jrhrdft.exec:\jrhrdft.exe1⤵PID:2492
-
\??\c:\tvtfbrl.exec:\tvtfbrl.exe2⤵PID:1536
-
\??\c:\htnrn.exec:\htnrn.exe3⤵PID:1596
-
\??\c:\xjjrpf.exec:\xjjrpf.exe4⤵PID:1260
-
\??\c:\fvtlnbt.exec:\fvtlnbt.exe5⤵PID:940
-
\??\c:\pflnn.exec:\pflnn.exe6⤵PID:272
-
\??\c:\bhvjjjb.exec:\bhvjjjb.exe7⤵PID:904
-
\??\c:\hvfpn.exec:\hvfpn.exe8⤵PID:920
-
\??\c:\bfvbfjd.exec:\bfvbfjd.exe9⤵PID:2300
-
\??\c:\xflvbl.exec:\xflvbl.exe10⤵PID:1708
-
\??\c:\rtlptfr.exec:\rtlptfr.exe11⤵PID:1732
-
\??\c:\bltdjj.exec:\bltdjj.exe12⤵PID:2088
-
\??\c:\ljvdpj.exec:\ljvdpj.exe13⤵PID:2960
-
\??\c:\ltlndd.exec:\ltlndd.exe14⤵PID:1552
-
\??\c:\nbhpj.exec:\nbhpj.exe15⤵PID:2508
-
\??\c:\bnxvdj.exec:\bnxvdj.exe16⤵PID:2720
-
\??\c:\rjltbrf.exec:\rjltbrf.exe17⤵PID:2860
-
\??\c:\hxnfxvl.exec:\hxnfxvl.exe18⤵PID:2864
-
\??\c:\rlrhfj.exec:\rlrhfj.exe19⤵PID:2856
-
\??\c:\jbpndb.exec:\jbpndb.exe20⤵PID:2824
-
\??\c:\vxhlt.exec:\vxhlt.exe21⤵PID:2644
-
\??\c:\hlrtp.exec:\hlrtp.exe22⤵PID:2636
-
\??\c:\rhlbt.exec:\rhlbt.exe23⤵PID:1252
-
\??\c:\drhxthp.exec:\drhxthp.exe24⤵PID:3052
-
\??\c:\thprhfb.exec:\thprhfb.exe25⤵PID:528
-
\??\c:\vfrpbp.exec:\vfrpbp.exe26⤵PID:2660
-
\??\c:\lltrfd.exec:\lltrfd.exe27⤵PID:2640
-
\??\c:\tffdn.exec:\tffdn.exe28⤵PID:2840
-
\??\c:\nhpjtl.exec:\nhpjtl.exe29⤵PID:2180
-
\??\c:\drxrxrj.exec:\drxrxrj.exe30⤵PID:2544
-
\??\c:\bjtjfh.exec:\bjtjfh.exe31⤵PID:2220
-
\??\c:\frltfn.exec:\frltfn.exe32⤵PID:2484
-
\??\c:\fpbtv.exec:\fpbtv.exe33⤵PID:2560
-
\??\c:\tbfxvt.exec:\tbfxvt.exe34⤵PID:1640
-
\??\c:\frxvj.exec:\frxvj.exe35⤵PID:2668
-
\??\c:\rdhhjx.exec:\rdhhjx.exe36⤵PID:1696
-
\??\c:\tjffdvd.exec:\tjffdvd.exe37⤵PID:1804
-
\??\c:\rvlpnbh.exec:\rvlpnbh.exe38⤵PID:2996
-
\??\c:\lbphtl.exec:\lbphtl.exe39⤵PID:1400
-
\??\c:\lpbbrnr.exec:\lpbbrnr.exe40⤵PID:2456
-
\??\c:\dndlv.exec:\dndlv.exe41⤵PID:1612
-
\??\c:\bjhftp.exec:\bjhftp.exe42⤵PID:1188
-
\??\c:\hjnnff.exec:\hjnnff.exe43⤵PID:2432
-
\??\c:\tdxvpjn.exec:\tdxvpjn.exe44⤵PID:1248
-
\??\c:\bndxnr.exec:\bndxnr.exe45⤵PID:320
-
\??\c:\fnjbdxl.exec:\fnjbdxl.exe46⤵PID:272
-
\??\c:\rxfrb.exec:\rxfrb.exe47⤵PID:3008
-
\??\c:\dtpprbt.exec:\dtpprbt.exe48⤵PID:2656
-
\??\c:\dxvlvv.exec:\dxvlvv.exe49⤵PID:1692
-
\??\c:\lvbhdbn.exec:\lvbhdbn.exe50⤵PID:1604
-
\??\c:\rlxjfr.exec:\rlxjfr.exe51⤵PID:1460
-
\??\c:\fxdlxh.exec:\fxdlxh.exe52⤵PID:2144
-
\??\c:\dbrjjp.exec:\dbrjjp.exe53⤵PID:816
-
\??\c:\dfjnjf.exec:\dfjnjf.exe54⤵PID:1948
-
\??\c:\fbbbx.exec:\fbbbx.exe55⤵PID:2256
-
\??\c:\btvdj.exec:\btvdj.exe56⤵PID:1744
-
\??\c:\rfrblt.exec:\rfrblt.exe57⤵PID:2704
-
\??\c:\txrbxrx.exec:\txrbxrx.exe58⤵PID:2708
-
\??\c:\lrtxfv.exec:\lrtxfv.exe59⤵PID:2648
-
\??\c:\xxvnn.exec:\xxvnn.exe60⤵PID:2824
-
\??\c:\hjrlb.exec:\hjrlb.exe61⤵PID:2444
-
\??\c:\xjxbj.exec:\xjxbj.exe62⤵PID:2940
-
\??\c:\nvddhf.exec:\nvddhf.exe63⤵PID:1740
-
\??\c:\ddfhlv.exec:\ddfhlv.exe64⤵PID:340
-
\??\c:\lnffpll.exec:\lnffpll.exe65⤵PID:2552
-
\??\c:\rfxhdv.exec:\rfxhdv.exe66⤵PID:2832
-
\??\c:\fdthpv.exec:\fdthpv.exe67⤵PID:1556
-
\??\c:\fbvtdtd.exec:\fbvtdtd.exe68⤵PID:2800
-
\??\c:\lnvnvl.exec:\lnvnvl.exe69⤵PID:2228
-
\??\c:\jntvp.exec:\jntvp.exe70⤵PID:1888
-
\??\c:\bhtdb.exec:\bhtdb.exe71⤵PID:1080
-
\??\c:\nnxpfv.exec:\nnxpfv.exe72⤵PID:2616
-
\??\c:\pdrvdlb.exec:\pdrvdlb.exe73⤵PID:628
-
\??\c:\phxhnrh.exec:\phxhnrh.exe74⤵PID:2060
-
\??\c:\bhfdb.exec:\bhfdb.exe75⤵PID:3000
-
\??\c:\hhxpn.exec:\hhxpn.exe76⤵PID:1816
-
\??\c:\hpjhnlp.exec:\hpjhnlp.exe77⤵PID:472
-
\??\c:\vdxvrf.exec:\vdxvrf.exe78⤵PID:2340
-
\??\c:\bddjvbb.exec:\bddjvbb.exe79⤵PID:2452
-
\??\c:\nfptlbf.exec:\nfptlbf.exe80⤵PID:2456
-
\??\c:\jdjdr.exec:\jdjdr.exe81⤵PID:972
-
\??\c:\vbxrllv.exec:\vbxrllv.exe82⤵PID:2004
-
\??\c:\pnndx.exec:\pnndx.exe83⤵PID:2980
-
\??\c:\fjrtdt.exec:\fjrtdt.exe84⤵PID:1972
-
\??\c:\ntltp.exec:\ntltp.exe85⤵PID:1016
-
\??\c:\htnnxft.exec:\htnnxft.exe86⤵PID:2148
-
\??\c:\lxrpx.exec:\lxrpx.exe87⤵PID:1872
-
\??\c:\rrxhbnh.exec:\rrxhbnh.exe88⤵PID:924
-
\??\c:\xpvdtb.exec:\xpvdtb.exe89⤵PID:1748
-
\??\c:\pvdlfp.exec:\pvdlfp.exe90⤵PID:3068
-
\??\c:\tvbbf.exec:\tvbbf.exe91⤵PID:2464
-
\??\c:\vjnfnf.exec:\vjnfnf.exe92⤵PID:2088
-
\??\c:\fpjbhp.exec:\fpjbhp.exe93⤵PID:2392
-
\??\c:\jdvvx.exec:\jdvvx.exe94⤵PID:1552
-
\??\c:\hxtnbjv.exec:\hxtnbjv.exe95⤵PID:1688
-
\??\c:\jvjfvll.exec:\jvjfvll.exe96⤵PID:2860
-
\??\c:\vhfvb.exec:\vhfvb.exe97⤵PID:2588
-
\??\c:\hnjnxbr.exec:\hnjnxbr.exe98⤵PID:2196
-
\??\c:\frntv.exec:\frntv.exe99⤵PID:2692
-
\??\c:\hnhvll.exec:\hnhvll.exe100⤵PID:2644
-
\??\c:\hntjjxx.exec:\hntjjxx.exe101⤵PID:764
-
\??\c:\fbdrrhp.exec:\fbdrrhp.exe102⤵PID:2732
-
\??\c:\jhdtdl.exec:\jhdtdl.exe103⤵PID:3052
-
\??\c:\lprbfdd.exec:\lprbfdd.exe104⤵PID:2804
-
\??\c:\tfrfld.exec:\tfrfld.exe105⤵PID:2944
-
\??\c:\vpvppn.exec:\vpvppn.exe106⤵PID:1560
-
\??\c:\lljjndf.exec:\lljjndf.exe107⤵PID:1484
-
\??\c:\dxvbd.exec:\dxvbd.exe108⤵PID:1920
-
\??\c:\plvvf.exec:\plvvf.exe109⤵PID:1628
-
\??\c:\tlxvnv.exec:\tlxvnv.exe110⤵PID:2752
-
\??\c:\vlpxt.exec:\vlpxt.exe111⤵PID:1028
-
\??\c:\pnbhtx.exec:\pnbhtx.exe112⤵PID:1772
-
\??\c:\pdrdh.exec:\pdrdh.exe113⤵PID:2056
-
\??\c:\brfpdbj.exec:\brfpdbj.exe114⤵PID:2284
-
\??\c:\fndjn.exec:\fndjn.exe115⤵PID:2460
-
\??\c:\djvnllf.exec:\djvnllf.exe116⤵PID:268
-
\??\c:\nbljbn.exec:\nbljbn.exe117⤵PID:944
-
\??\c:\xtjdln.exec:\xtjdln.exe118⤵PID:2080
-
\??\c:\vnvlhrt.exec:\vnvlhrt.exe119⤵PID:1180
-
\??\c:\ffvbd.exec:\ffvbd.exe120⤵PID:1208
-
\??\c:\fpnjhrj.exec:\fpnjhrj.exe121⤵PID:1828
-
\??\c:\xfrvbb.exec:\xfrvbb.exe122⤵PID:2308
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-