Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2023, 18:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.0ac3ce8d2ccb2a9a51d11c45bcc961f0.exe
Resource
win7-20231020-en
5 signatures
150 seconds
General
-
Target
NEAS.0ac3ce8d2ccb2a9a51d11c45bcc961f0.exe
-
Size
54KB
-
MD5
0ac3ce8d2ccb2a9a51d11c45bcc961f0
-
SHA1
86ca62f379bb837f7acf7d99ea7c2913f82db928
-
SHA256
f8e0db83aef1e4cfdcf17cc2815c03a8a2e84a1ba81045edea8d332d9fab3f53
-
SHA512
4276c501051bb937c47c2b3b4860ef55cc16b253ab0c64d0962287fd1bb432adcc77c4c633be00fdb833ca42b559611a611984567b398338555f9c21019ce640
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFdOW:ymb3NkkiQ3mdBjFIFdOW
Malware Config
Signatures
-
Detect Blackmoon payload 30 IoCs
resource yara_rule behavioral2/memory/4404-8-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4004-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1808-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2076-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1976-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4976-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4924-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3480-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3248-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1252-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2736-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3160-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5032-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4980-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2776-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1688-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3088-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/452-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4872-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2952-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3544-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3176-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2452-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4484-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/844-222-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2264-242-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2888-261-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4276-269-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1496-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4496-309-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4004 fpjxfh.exe 1808 pbjjrrt.exe 2076 tljfxn.exe 1976 pvbdx.exe 4976 rttdv.exe 4924 drvxrx.exe 3480 xvbbrt.exe 3248 brnrl.exe 1252 vxbbtt.exe 2736 jtjxb.exe 3160 pnbjh.exe 5032 hxnxn.exe 4980 rjrrbbb.exe 2776 bhhjxhp.exe 1276 llflf.exe 1688 fljtf.exe 3088 xdfvvxv.exe 2724 vxhpnf.exe 452 pvrtb.exe 3892 vprrxd.exe 4872 ttnbhb.exe 2952 fjtbxll.exe 3544 jxbttfn.exe 620 lxxjjpb.exe 2532 tdppr.exe 3176 tfhjv.exe 2452 xbxhvbt.exe 4484 dhvbfvn.exe 844 ndblbtn.exe 2232 vtpvdr.exe 4676 ntxvj.exe 2264 bnplfbj.exe 4516 lnxdt.exe 1084 rdjfxd.exe 2976 tlvdbtv.exe 2888 bfrbpd.exe 4276 hftlj.exe 3020 fxvpvx.exe 3728 lnhnphv.exe 3548 bjxthjn.exe 5064 hnpvbpb.exe 3432 plrbljb.exe 3124 xjblfp.exe 1496 hpbnjll.exe 4496 jtpfjt.exe 680 ftprhn.exe 3480 ffrjxld.exe 2648 dvrxd.exe 4500 bfpnhj.exe 2476 ffpxjfj.exe 3284 xtfpj.exe 3976 xvxbdvx.exe 2908 pvvjdr.exe 3484 ndtph.exe 4928 fvdjdh.exe 1760 nfjtv.exe 4352 ptrnrt.exe 1060 tjxrfjt.exe 3164 frljhj.exe 752 jbnnf.exe 4488 bvpdxtt.exe 3892 bndjxv.exe 4884 nbhlj.exe 3408 bdhptb.exe -
resource yara_rule behavioral2/memory/4404-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4404-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4404-8-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1808-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1808-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2076-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1976-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4976-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4924-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3480-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3248-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3248-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1252-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1252-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2736-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2736-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3160-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5032-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5032-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4980-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4980-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2776-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2776-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1276-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1688-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1688-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3088-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2724-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/452-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/452-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3892-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4872-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4872-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2952-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3544-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2952-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3544-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2532-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3176-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3176-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2452-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2452-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-212-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/844-222-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/844-220-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2264-242-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2264-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4516-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2976-255-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2888-261-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4276-265-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4276-269-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3020-271-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3548-280-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3432-290-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3124-295-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1496-300-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4496-305-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4496-309-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/680-311-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3480-316-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 4004 4404 NEAS.0ac3ce8d2ccb2a9a51d11c45bcc961f0.exe 82 PID 4404 wrote to memory of 4004 4404 NEAS.0ac3ce8d2ccb2a9a51d11c45bcc961f0.exe 82 PID 4404 wrote to memory of 4004 4404 NEAS.0ac3ce8d2ccb2a9a51d11c45bcc961f0.exe 82 PID 4004 wrote to memory of 1808 4004 fpjxfh.exe 83 PID 4004 wrote to memory of 1808 4004 fpjxfh.exe 83 PID 4004 wrote to memory of 1808 4004 fpjxfh.exe 83 PID 1808 wrote to memory of 2076 1808 pbjjrrt.exe 84 PID 1808 wrote to memory of 2076 1808 pbjjrrt.exe 84 PID 1808 wrote to memory of 2076 1808 pbjjrrt.exe 84 PID 2076 wrote to memory of 1976 2076 tljfxn.exe 85 PID 2076 wrote to memory of 1976 2076 tljfxn.exe 85 PID 2076 wrote to memory of 1976 2076 tljfxn.exe 85 PID 1976 wrote to memory of 4976 1976 pvbdx.exe 86 PID 1976 wrote to memory of 4976 1976 pvbdx.exe 86 PID 1976 wrote to memory of 4976 1976 pvbdx.exe 86 PID 4976 wrote to memory of 4924 4976 rttdv.exe 87 PID 4976 wrote to memory of 4924 4976 rttdv.exe 87 PID 4976 wrote to memory of 4924 4976 rttdv.exe 87 PID 4924 wrote to memory of 3480 4924 drvxrx.exe 88 PID 4924 wrote to memory of 3480 4924 drvxrx.exe 88 PID 4924 wrote to memory of 3480 4924 drvxrx.exe 88 PID 3480 wrote to memory of 3248 3480 xvbbrt.exe 89 PID 3480 wrote to memory of 3248 3480 xvbbrt.exe 89 PID 3480 wrote to memory of 3248 3480 xvbbrt.exe 89 PID 3248 wrote to memory of 1252 3248 brnrl.exe 90 PID 3248 wrote to memory of 1252 3248 brnrl.exe 90 PID 3248 wrote to memory of 1252 3248 brnrl.exe 90 PID 1252 wrote to memory of 2736 1252 vxbbtt.exe 91 PID 1252 wrote to memory of 2736 1252 vxbbtt.exe 91 PID 1252 wrote to memory of 2736 1252 vxbbtt.exe 91 PID 2736 wrote to memory of 3160 2736 jtjxb.exe 92 PID 2736 wrote to memory of 3160 2736 jtjxb.exe 92 PID 2736 wrote to memory of 3160 2736 jtjxb.exe 92 PID 3160 wrote to memory of 5032 3160 pnbjh.exe 93 PID 3160 wrote to memory of 5032 3160 pnbjh.exe 93 PID 3160 wrote to memory of 5032 3160 pnbjh.exe 93 PID 5032 wrote to memory of 4980 5032 hxnxn.exe 94 PID 5032 wrote to memory of 4980 5032 hxnxn.exe 94 PID 5032 wrote to memory of 4980 5032 hxnxn.exe 94 PID 4980 wrote to memory of 2776 4980 rjrrbbb.exe 96 PID 4980 wrote to memory of 2776 4980 rjrrbbb.exe 96 PID 4980 wrote to memory of 2776 4980 rjrrbbb.exe 96 PID 2776 wrote to memory of 1276 2776 bhhjxhp.exe 97 PID 2776 wrote to memory of 1276 2776 bhhjxhp.exe 97 PID 2776 wrote to memory of 1276 2776 bhhjxhp.exe 97 PID 1276 wrote to memory of 1688 1276 llflf.exe 98 PID 1276 wrote to memory of 1688 1276 llflf.exe 98 PID 1276 wrote to memory of 1688 1276 llflf.exe 98 PID 1688 wrote to memory of 3088 1688 fljtf.exe 99 PID 1688 wrote to memory of 3088 1688 fljtf.exe 99 PID 1688 wrote to memory of 3088 1688 fljtf.exe 99 PID 3088 wrote to memory of 2724 3088 xdfvvxv.exe 100 PID 3088 wrote to memory of 2724 3088 xdfvvxv.exe 100 PID 3088 wrote to memory of 2724 3088 xdfvvxv.exe 100 PID 2724 wrote to memory of 452 2724 vxhpnf.exe 101 PID 2724 wrote to memory of 452 2724 vxhpnf.exe 101 PID 2724 wrote to memory of 452 2724 vxhpnf.exe 101 PID 452 wrote to memory of 3892 452 pvrtb.exe 102 PID 452 wrote to memory of 3892 452 pvrtb.exe 102 PID 452 wrote to memory of 3892 452 pvrtb.exe 102 PID 3892 wrote to memory of 4872 3892 vprrxd.exe 104 PID 3892 wrote to memory of 4872 3892 vprrxd.exe 104 PID 3892 wrote to memory of 4872 3892 vprrxd.exe 104 PID 4872 wrote to memory of 2952 4872 ttnbhb.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.0ac3ce8d2ccb2a9a51d11c45bcc961f0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.0ac3ce8d2ccb2a9a51d11c45bcc961f0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
\??\c:\fpjxfh.exec:\fpjxfh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4004 -
\??\c:\pbjjrrt.exec:\pbjjrrt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1808 -
\??\c:\tljfxn.exec:\tljfxn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\pvbdx.exec:\pvbdx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
\??\c:\rttdv.exec:\rttdv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
\??\c:\drvxrx.exec:\drvxrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4924 -
\??\c:\xvbbrt.exec:\xvbbrt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
\??\c:\brnrl.exec:\brnrl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
\??\c:\vxbbtt.exec:\vxbbtt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
\??\c:\jtjxb.exec:\jtjxb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\pnbjh.exec:\pnbjh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
\??\c:\hxnxn.exec:\hxnxn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5032 -
\??\c:\rjrrbbb.exec:\rjrrbbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
\??\c:\bhhjxhp.exec:\bhhjxhp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\llflf.exec:\llflf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
\??\c:\fljtf.exec:\fljtf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
\??\c:\xdfvvxv.exec:\xdfvvxv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
\??\c:\vxhpnf.exec:\vxhpnf.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\pvrtb.exec:\pvrtb.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:452 -
\??\c:\vprrxd.exec:\vprrxd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3892 -
\??\c:\ttnbhb.exec:\ttnbhb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4872 -
\??\c:\fjtbxll.exec:\fjtbxll.exe23⤵
- Executes dropped EXE
PID:2952 -
\??\c:\jxbttfn.exec:\jxbttfn.exe24⤵
- Executes dropped EXE
PID:3544 -
\??\c:\lxxjjpb.exec:\lxxjjpb.exe25⤵
- Executes dropped EXE
PID:620 -
\??\c:\tdppr.exec:\tdppr.exe26⤵
- Executes dropped EXE
PID:2532 -
\??\c:\tfhjv.exec:\tfhjv.exe27⤵
- Executes dropped EXE
PID:3176 -
\??\c:\xbxhvbt.exec:\xbxhvbt.exe28⤵
- Executes dropped EXE
PID:2452 -
\??\c:\dhvbfvn.exec:\dhvbfvn.exe29⤵
- Executes dropped EXE
PID:4484 -
\??\c:\ndblbtn.exec:\ndblbtn.exe30⤵
- Executes dropped EXE
PID:844 -
\??\c:\vtpvdr.exec:\vtpvdr.exe31⤵
- Executes dropped EXE
PID:2232 -
\??\c:\ntxvj.exec:\ntxvj.exe32⤵
- Executes dropped EXE
PID:4676 -
\??\c:\bnplfbj.exec:\bnplfbj.exe33⤵
- Executes dropped EXE
PID:2264 -
\??\c:\lnxdt.exec:\lnxdt.exe34⤵
- Executes dropped EXE
PID:4516 -
\??\c:\rdjfxd.exec:\rdjfxd.exe35⤵
- Executes dropped EXE
PID:1084 -
\??\c:\tlvdbtv.exec:\tlvdbtv.exe36⤵
- Executes dropped EXE
PID:2976 -
\??\c:\bfrbpd.exec:\bfrbpd.exe37⤵
- Executes dropped EXE
PID:2888 -
\??\c:\hftlj.exec:\hftlj.exe38⤵
- Executes dropped EXE
PID:4276 -
\??\c:\fxvpvx.exec:\fxvpvx.exe39⤵
- Executes dropped EXE
PID:3020 -
\??\c:\lnhnphv.exec:\lnhnphv.exe40⤵
- Executes dropped EXE
PID:3728 -
\??\c:\bjxthjn.exec:\bjxthjn.exe41⤵
- Executes dropped EXE
PID:3548 -
\??\c:\hnpvbpb.exec:\hnpvbpb.exe42⤵
- Executes dropped EXE
PID:5064 -
\??\c:\plrbljb.exec:\plrbljb.exe43⤵
- Executes dropped EXE
PID:3432 -
\??\c:\xjblfp.exec:\xjblfp.exe44⤵
- Executes dropped EXE
PID:3124 -
\??\c:\hpbnjll.exec:\hpbnjll.exe45⤵
- Executes dropped EXE
PID:1496 -
\??\c:\jtpfjt.exec:\jtpfjt.exe46⤵
- Executes dropped EXE
PID:4496 -
\??\c:\ftprhn.exec:\ftprhn.exe47⤵
- Executes dropped EXE
PID:680 -
\??\c:\ffrjxld.exec:\ffrjxld.exe48⤵
- Executes dropped EXE
PID:3480 -
\??\c:\dvrxd.exec:\dvrxd.exe49⤵
- Executes dropped EXE
PID:2648 -
\??\c:\bfpnhj.exec:\bfpnhj.exe50⤵
- Executes dropped EXE
PID:4500 -
\??\c:\ffpxjfj.exec:\ffpxjfj.exe51⤵
- Executes dropped EXE
PID:2476 -
\??\c:\xtfpj.exec:\xtfpj.exe52⤵
- Executes dropped EXE
PID:3284 -
\??\c:\xvxbdvx.exec:\xvxbdvx.exe53⤵
- Executes dropped EXE
PID:3976 -
\??\c:\pvvjdr.exec:\pvvjdr.exe54⤵
- Executes dropped EXE
PID:2908 -
\??\c:\ndtph.exec:\ndtph.exe55⤵
- Executes dropped EXE
PID:3484 -
\??\c:\fvdjdh.exec:\fvdjdh.exe56⤵
- Executes dropped EXE
PID:4928 -
\??\c:\nfjtv.exec:\nfjtv.exe57⤵
- Executes dropped EXE
PID:1760 -
\??\c:\ptrnrt.exec:\ptrnrt.exe58⤵
- Executes dropped EXE
PID:4352 -
\??\c:\tjxrfjt.exec:\tjxrfjt.exe59⤵
- Executes dropped EXE
PID:1060 -
\??\c:\frljhj.exec:\frljhj.exe60⤵
- Executes dropped EXE
PID:3164 -
\??\c:\jbnnf.exec:\jbnnf.exe61⤵
- Executes dropped EXE
PID:752 -
\??\c:\bvpdxtt.exec:\bvpdxtt.exe62⤵
- Executes dropped EXE
PID:4488 -
\??\c:\bndjxv.exec:\bndjxv.exe63⤵
- Executes dropped EXE
PID:3892 -
\??\c:\nbhlj.exec:\nbhlj.exe64⤵
- Executes dropped EXE
PID:4884 -
\??\c:\bdhptb.exec:\bdhptb.exe65⤵
- Executes dropped EXE
PID:3408 -
\??\c:\fxpnt.exec:\fxpnt.exe66⤵PID:3300
-
\??\c:\vtjtp.exec:\vtjtp.exe67⤵PID:1532
-
\??\c:\jttnbjt.exec:\jttnbjt.exe68⤵PID:5000
-
\??\c:\pfppv.exec:\pfppv.exe69⤵PID:3808
-
\??\c:\jxrlh.exec:\jxrlh.exe70⤵PID:4024
-
\??\c:\pthhb.exec:\pthhb.exe71⤵PID:2808
-
\??\c:\vbxjxt.exec:\vbxjxt.exe72⤵PID:3560
-
\??\c:\pphvpn.exec:\pphvpn.exe73⤵PID:4484
-
\??\c:\lnvbttf.exec:\lnvbttf.exe74⤵PID:2436
-
\??\c:\tldjpbl.exec:\tldjpbl.exe75⤵PID:1584
-
\??\c:\xbxfn.exec:\xbxfn.exe76⤵PID:4160
-
\??\c:\tnvxr.exec:\tnvxr.exe77⤵PID:4824
-
\??\c:\jnlnn.exec:\jnlnn.exe78⤵PID:2300
-
\??\c:\ntptbhr.exec:\ntptbhr.exe79⤵PID:4116
-
\??\c:\jtdhvn.exec:\jtdhvn.exe80⤵PID:4292
-
\??\c:\ffrbl.exec:\ffrbl.exe81⤵PID:4944
-
\??\c:\xvvhx.exec:\xvvhx.exe82⤵PID:2424
-
\??\c:\jrlhr.exec:\jrlhr.exe83⤵PID:4404
-
\??\c:\xvndp.exec:\xvndp.exe84⤵PID:1380
-
\??\c:\jhprpxd.exec:\jhprpxd.exe85⤵PID:3652
-
\??\c:\lpbrnpt.exec:\lpbrnpt.exe86⤵PID:3572
-
\??\c:\rtrrrpx.exec:\rtrrrpx.exe87⤵PID:4248
-
\??\c:\dpvdvrx.exec:\dpvdvrx.exe88⤵PID:4644
-
\??\c:\ljdrt.exec:\ljdrt.exe89⤵PID:2992
-
\??\c:\vbdflb.exec:\vbdflb.exe90⤵PID:2904
-
\??\c:\xbvtp.exec:\xbvtp.exe91⤵PID:3760
-
\??\c:\xrdlhxn.exec:\xrdlhxn.exe92⤵PID:3328
-
\??\c:\rldlj.exec:\rldlj.exe93⤵PID:436
-
\??\c:\dvbjx.exec:\dvbjx.exe94⤵PID:4880
-
\??\c:\jdrbflx.exec:\jdrbflx.exe95⤵PID:5112
-
\??\c:\xppnpp.exec:\xppnpp.exe96⤵PID:3084
-
\??\c:\bpxfdhr.exec:\bpxfdhr.exe97⤵PID:4856
-
\??\c:\vtnbjv.exec:\vtnbjv.exe98⤵PID:180
-
\??\c:\phlxvbb.exec:\phlxvbb.exe99⤵PID:2776
-
\??\c:\lhndvf.exec:\lhndvf.exe100⤵PID:8
-
\??\c:\rdxhjfn.exec:\rdxhjfn.exe101⤵PID:2536
-
\??\c:\tnxvx.exec:\tnxvx.exe102⤵PID:2492
-
\??\c:\rdhhd.exec:\rdhhd.exe103⤵PID:2696
-
\??\c:\fdvjpxt.exec:\fdvjpxt.exe104⤵PID:4652
-
\??\c:\jjjvjnn.exec:\jjjvjnn.exe105⤵PID:3076
-
\??\c:\nhdjh.exec:\nhdjh.exe106⤵PID:1536
-
\??\c:\hlhpr.exec:\hlhpr.exe107⤵PID:2772
-
\??\c:\lffrr.exec:\lffrr.exe108⤵PID:4892
-
\??\c:\ttldrxh.exec:\ttldrxh.exe109⤵PID:2340
-
\??\c:\hdxtlrp.exec:\hdxtlrp.exe110⤵PID:3540
-
\??\c:\vrjdnf.exec:\vrjdnf.exe111⤵PID:4932
-
\??\c:\bjfptf.exec:\bjfptf.exe112⤵PID:1532
-
\??\c:\dlvdhdr.exec:\dlvdhdr.exe113⤵PID:1372
-
\??\c:\bfrbn.exec:\bfrbn.exe114⤵PID:3808
-
\??\c:\vbfbtn.exec:\vbfbtn.exe115⤵PID:4024
-
\??\c:\vbfxp.exec:\vbfxp.exe116⤵PID:2808
-
\??\c:\xhhnl.exec:\xhhnl.exe117⤵PID:4632
-
\??\c:\llhxln.exec:\llhxln.exe118⤵PID:4964
-
\??\c:\vrhdfh.exec:\vrhdfh.exe119⤵PID:4788
-
\??\c:\rvvxjnr.exec:\rvvxjnr.exe120⤵PID:1952
-
\??\c:\vdbxjtv.exec:\vdbxjtv.exe121⤵PID:2828
-
\??\c:\hnrnl.exec:\hnrnl.exe122⤵PID:3584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-