Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
31-10-2023 21:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.e5d76daead20c846bdc2f0671ae2bdd0_JC.exe
Resource
win7-20231023-en
windows7-x64
5 signatures
150 seconds
General
-
Target
NEAS.e5d76daead20c846bdc2f0671ae2bdd0_JC.exe
-
Size
407KB
-
MD5
e5d76daead20c846bdc2f0671ae2bdd0
-
SHA1
14a09f68099181e614dcde57bbc4cbe75569ab16
-
SHA256
794e24350dff4477052fa9d0fe1e5547bbcdc4e3c5aba7e83100ff0dfb60211c
-
SHA512
6cec6678fc222c2582dd51c6907a0c6111aeb783aa16b7bc29ea2c04cd4b5bbb4695a9556aaee37e40984f7fc0c73afc36ac3ac8a249df16446dd90d4f664f4f
-
SSDEEP
6144:n3C9BRo7MlrWKo+lS0Le4xRSAoq78yoyfx9FK:n3C9yMo+S0L9xRnoq7H9FK
Malware Config
Signatures
-
Detect Blackmoon payload 30 IoCs
resource yara_rule behavioral1/memory/2056-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2368-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2900-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2592-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2616-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1772-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2476-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1132-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2520-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2784-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2520-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1264-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1924-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1204-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1556-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2148-220-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/788-218-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1108-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1880-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/964-281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2984-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/576-301-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-329-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1604-346-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-394-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1488-420-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2168-430-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/868-445-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2368 frnxfbh.exe 2900 rbjxfn.exe 2592 bhhhvpj.exe 2616 bbvlr.exe 2828 htvrxpl.exe 1772 rbxpbjh.exe 2476 bblnbr.exe 2948 pnptlt.exe 1132 tjnbntr.exe 1372 dnvrn.exe 2520 fpvrf.exe 2784 bvrhjbv.exe 1264 hdfhrj.exe 1616 jvxpltt.exe 1924 npjxhrh.exe 1696 frrdr.exe 1204 dhdlprb.exe 1556 hnfljp.exe 2944 vrlpl.exe 788 fdbjrl.exe 2148 hhlnj.exe 1536 dljjprd.exe 1108 bljpb.exe 1788 fbbljpv.exe 1880 vdpnv.exe 2868 bfrhrx.exe 964 tplrb.exe 2984 njhdh.exe 576 dxlpdv.exe 600 vjdprvx.exe 2244 hbnvh.exe 2964 bntbhv.exe 2816 hvldbjb.exe 1604 fnvddnp.exe 2720 tbvhp.exe 2700 pnjpbbb.exe 2572 jnhdpb.exe 2688 ltlvh.exe 2500 jlflnjj.exe 2460 vdvrl.exe 2536 bdvxf.exe 1488 bdlvpjr.exe 1508 fbbjlrn.exe 2168 rvjhhbh.exe 1744 nxhrff.exe 868 bvpblt.exe 2776 djffn.exe 1784 drvhh.exe 1644 plnjppx.exe 2000 ldbrvtv.exe 1724 vrjdthl.exe 2288 btvtv.exe 1092 bjhnxjx.exe 1716 trbxhhj.exe 2888 jrpbxd.exe 2280 hrrjp.exe 680 fnjjn.exe 1884 btpxbl.exe 2176 rbpvfr.exe 3044 njjdx.exe 2256 pjhjbn.exe 2216 ljhfxnh.exe 1800 trvxxhn.exe 1532 pbbbbh.exe -
resource yara_rule behavioral1/memory/2056-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2368-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2900-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2592-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2616-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2616-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1772-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1132-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1132-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2520-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2784-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2520-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1264-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1264-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1616-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1924-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1204-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1556-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/788-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2148-220-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/788-218-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1536-229-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1108-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1788-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1880-260-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1880-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/964-281-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2984-291-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/576-301-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-329-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-337-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1604-346-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1604-345-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-362-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-386-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-394-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1488-412-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1488-420-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-428-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-430-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/868-445-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1784-460-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1644-468-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1724-484-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2368 2056 NEAS.e5d76daead20c846bdc2f0671ae2bdd0_JC.exe 28 PID 2056 wrote to memory of 2368 2056 NEAS.e5d76daead20c846bdc2f0671ae2bdd0_JC.exe 28 PID 2056 wrote to memory of 2368 2056 NEAS.e5d76daead20c846bdc2f0671ae2bdd0_JC.exe 28 PID 2056 wrote to memory of 2368 2056 NEAS.e5d76daead20c846bdc2f0671ae2bdd0_JC.exe 28 PID 2368 wrote to memory of 2900 2368 frnxfbh.exe 29 PID 2368 wrote to memory of 2900 2368 frnxfbh.exe 29 PID 2368 wrote to memory of 2900 2368 frnxfbh.exe 29 PID 2368 wrote to memory of 2900 2368 frnxfbh.exe 29 PID 2900 wrote to memory of 2592 2900 rbjxfn.exe 30 PID 2900 wrote to memory of 2592 2900 rbjxfn.exe 30 PID 2900 wrote to memory of 2592 2900 rbjxfn.exe 30 PID 2900 wrote to memory of 2592 2900 rbjxfn.exe 30 PID 2592 wrote to memory of 2616 2592 bhhhvpj.exe 31 PID 2592 wrote to memory of 2616 2592 bhhhvpj.exe 31 PID 2592 wrote to memory of 2616 2592 bhhhvpj.exe 31 PID 2592 wrote to memory of 2616 2592 bhhhvpj.exe 31 PID 2616 wrote to memory of 2828 2616 bbvlr.exe 32 PID 2616 wrote to memory of 2828 2616 bbvlr.exe 32 PID 2616 wrote to memory of 2828 2616 bbvlr.exe 32 PID 2616 wrote to memory of 2828 2616 bbvlr.exe 32 PID 2828 wrote to memory of 1772 2828 htvrxpl.exe 33 PID 2828 wrote to memory of 1772 2828 htvrxpl.exe 33 PID 2828 wrote to memory of 1772 2828 htvrxpl.exe 33 PID 2828 wrote to memory of 1772 2828 htvrxpl.exe 33 PID 1772 wrote to memory of 2476 1772 rbxpbjh.exe 34 PID 1772 wrote to memory of 2476 1772 rbxpbjh.exe 34 PID 1772 wrote to memory of 2476 1772 rbxpbjh.exe 34 PID 1772 wrote to memory of 2476 1772 rbxpbjh.exe 34 PID 2476 wrote to memory of 2948 2476 bblnbr.exe 35 PID 2476 wrote to memory of 2948 2476 bblnbr.exe 35 PID 2476 wrote to memory of 2948 2476 bblnbr.exe 35 PID 2476 wrote to memory of 2948 2476 bblnbr.exe 35 PID 2948 wrote to memory of 1132 2948 pnptlt.exe 36 PID 2948 wrote to memory of 1132 2948 pnptlt.exe 36 PID 2948 wrote to memory of 1132 2948 pnptlt.exe 36 PID 2948 wrote to memory of 1132 2948 pnptlt.exe 36 PID 1132 wrote to memory of 1372 1132 tjnbntr.exe 37 PID 1132 wrote to memory of 1372 1132 tjnbntr.exe 37 PID 1132 wrote to memory of 1372 1132 tjnbntr.exe 37 PID 1132 wrote to memory of 1372 1132 tjnbntr.exe 37 PID 1372 wrote to memory of 2520 1372 dnvrn.exe 38 PID 1372 wrote to memory of 2520 1372 dnvrn.exe 38 PID 1372 wrote to memory of 2520 1372 dnvrn.exe 38 PID 1372 wrote to memory of 2520 1372 dnvrn.exe 38 PID 2520 wrote to memory of 2784 2520 fpvrf.exe 39 PID 2520 wrote to memory of 2784 2520 fpvrf.exe 39 PID 2520 wrote to memory of 2784 2520 fpvrf.exe 39 PID 2520 wrote to memory of 2784 2520 fpvrf.exe 39 PID 2784 wrote to memory of 1264 2784 bvrhjbv.exe 40 PID 2784 wrote to memory of 1264 2784 bvrhjbv.exe 40 PID 2784 wrote to memory of 1264 2784 bvrhjbv.exe 40 PID 2784 wrote to memory of 1264 2784 bvrhjbv.exe 40 PID 1264 wrote to memory of 1616 1264 hdfhrj.exe 41 PID 1264 wrote to memory of 1616 1264 hdfhrj.exe 41 PID 1264 wrote to memory of 1616 1264 hdfhrj.exe 41 PID 1264 wrote to memory of 1616 1264 hdfhrj.exe 41 PID 1616 wrote to memory of 1924 1616 jvxpltt.exe 42 PID 1616 wrote to memory of 1924 1616 jvxpltt.exe 42 PID 1616 wrote to memory of 1924 1616 jvxpltt.exe 42 PID 1616 wrote to memory of 1924 1616 jvxpltt.exe 42 PID 1924 wrote to memory of 1696 1924 npjxhrh.exe 43 PID 1924 wrote to memory of 1696 1924 npjxhrh.exe 43 PID 1924 wrote to memory of 1696 1924 npjxhrh.exe 43 PID 1924 wrote to memory of 1696 1924 npjxhrh.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.e5d76daead20c846bdc2f0671ae2bdd0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.e5d76daead20c846bdc2f0671ae2bdd0_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
\??\c:\frnxfbh.exec:\frnxfbh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2368 -
\??\c:\rbjxfn.exec:\rbjxfn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\bhhhvpj.exec:\bhhhvpj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\bbvlr.exec:\bbvlr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
\??\c:\htvrxpl.exec:\htvrxpl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\rbxpbjh.exec:\rbxpbjh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
\??\c:\bblnbr.exec:\bblnbr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\pnptlt.exec:\pnptlt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2948 -
\??\c:\tjnbntr.exec:\tjnbntr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
\??\c:\dnvrn.exec:\dnvrn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
\??\c:\fpvrf.exec:\fpvrf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
\??\c:\bvrhjbv.exec:\bvrhjbv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\hdfhrj.exec:\hdfhrj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
\??\c:\jvxpltt.exec:\jvxpltt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
\??\c:\npjxhrh.exec:\npjxhrh.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\frrdr.exec:\frrdr.exe17⤵
- Executes dropped EXE
PID:1696 -
\??\c:\dhdlprb.exec:\dhdlprb.exe18⤵
- Executes dropped EXE
PID:1204 -
\??\c:\hnfljp.exec:\hnfljp.exe19⤵
- Executes dropped EXE
PID:1556 -
\??\c:\vrlpl.exec:\vrlpl.exe20⤵
- Executes dropped EXE
PID:2944 -
\??\c:\fdbjrl.exec:\fdbjrl.exe21⤵
- Executes dropped EXE
PID:788 -
\??\c:\hhlnj.exec:\hhlnj.exe22⤵
- Executes dropped EXE
PID:2148 -
\??\c:\dljjprd.exec:\dljjprd.exe23⤵
- Executes dropped EXE
PID:1536 -
\??\c:\bljpb.exec:\bljpb.exe24⤵
- Executes dropped EXE
PID:1108 -
\??\c:\fbbljpv.exec:\fbbljpv.exe25⤵
- Executes dropped EXE
PID:1788 -
\??\c:\vdpnv.exec:\vdpnv.exe26⤵
- Executes dropped EXE
PID:1880 -
\??\c:\bfrhrx.exec:\bfrhrx.exe27⤵
- Executes dropped EXE
PID:2868 -
\??\c:\tplrb.exec:\tplrb.exe28⤵
- Executes dropped EXE
PID:964 -
\??\c:\njhdh.exec:\njhdh.exe29⤵
- Executes dropped EXE
PID:2984 -
\??\c:\dxlpdv.exec:\dxlpdv.exe30⤵
- Executes dropped EXE
PID:576 -
\??\c:\vjdprvx.exec:\vjdprvx.exe31⤵
- Executes dropped EXE
PID:600
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\hbnvh.exec:\hbnvh.exe1⤵
- Executes dropped EXE
PID:2244 -
\??\c:\bntbhv.exec:\bntbhv.exe2⤵
- Executes dropped EXE
PID:2964 -
\??\c:\hvldbjb.exec:\hvldbjb.exe3⤵
- Executes dropped EXE
PID:2816 -
\??\c:\fnvddnp.exec:\fnvddnp.exe4⤵
- Executes dropped EXE
PID:1604 -
\??\c:\tbvhp.exec:\tbvhp.exe5⤵
- Executes dropped EXE
PID:2720 -
\??\c:\pnjpbbb.exec:\pnjpbbb.exe6⤵
- Executes dropped EXE
PID:2700 -
\??\c:\jnhdpb.exec:\jnhdpb.exe7⤵
- Executes dropped EXE
PID:2572 -
\??\c:\ltlvh.exec:\ltlvh.exe8⤵
- Executes dropped EXE
PID:2688 -
\??\c:\jlflnjj.exec:\jlflnjj.exe9⤵
- Executes dropped EXE
PID:2500 -
\??\c:\vdvrl.exec:\vdvrl.exe10⤵
- Executes dropped EXE
PID:2460 -
\??\c:\bdvxf.exec:\bdvxf.exe11⤵
- Executes dropped EXE
PID:2536 -
\??\c:\bdlvpjr.exec:\bdlvpjr.exe12⤵
- Executes dropped EXE
PID:1488 -
\??\c:\fbbjlrn.exec:\fbbjlrn.exe13⤵
- Executes dropped EXE
PID:1508 -
\??\c:\rvjhhbh.exec:\rvjhhbh.exe14⤵
- Executes dropped EXE
PID:2168 -
\??\c:\nxhrff.exec:\nxhrff.exe15⤵
- Executes dropped EXE
PID:1744 -
\??\c:\bvpblt.exec:\bvpblt.exe16⤵
- Executes dropped EXE
PID:868 -
\??\c:\djffn.exec:\djffn.exe17⤵
- Executes dropped EXE
PID:2776 -
\??\c:\drvhh.exec:\drvhh.exe18⤵
- Executes dropped EXE
PID:1784 -
\??\c:\plnjppx.exec:\plnjppx.exe19⤵
- Executes dropped EXE
PID:1644 -
\??\c:\ldbrvtv.exec:\ldbrvtv.exe20⤵
- Executes dropped EXE
PID:2000 -
\??\c:\vrjdthl.exec:\vrjdthl.exe21⤵
- Executes dropped EXE
PID:1724 -
\??\c:\btvtv.exec:\btvtv.exe22⤵
- Executes dropped EXE
PID:2288 -
\??\c:\bjhnxjx.exec:\bjhnxjx.exe23⤵
- Executes dropped EXE
PID:1092 -
\??\c:\trbxhhj.exec:\trbxhhj.exe24⤵
- Executes dropped EXE
PID:1716 -
\??\c:\jrpbxd.exec:\jrpbxd.exe25⤵
- Executes dropped EXE
PID:2888 -
\??\c:\hrrjp.exec:\hrrjp.exe26⤵
- Executes dropped EXE
PID:2280 -
\??\c:\fnjjn.exec:\fnjjn.exe27⤵
- Executes dropped EXE
PID:680 -
\??\c:\btpxbl.exec:\btpxbl.exe28⤵
- Executes dropped EXE
PID:1884 -
\??\c:\rbpvfr.exec:\rbpvfr.exe29⤵
- Executes dropped EXE
PID:2176 -
\??\c:\njjdx.exec:\njjdx.exe30⤵
- Executes dropped EXE
PID:3044 -
\??\c:\pjhjbn.exec:\pjhjbn.exe31⤵
- Executes dropped EXE
PID:2256 -
\??\c:\ljhfxnh.exec:\ljhfxnh.exe32⤵
- Executes dropped EXE
PID:2216 -
\??\c:\trvxxhn.exec:\trvxxhn.exe33⤵
- Executes dropped EXE
PID:1800 -
\??\c:\pbbbbh.exec:\pbbbbh.exe34⤵
- Executes dropped EXE
PID:1532 -
\??\c:\tdrxx.exec:\tdrxx.exe35⤵PID:2640
-
\??\c:\bnbdpxt.exec:\bnbdpxt.exe36⤵PID:2284
-
\??\c:\prhfpnx.exec:\prhfpnx.exe37⤵PID:1944
-
\??\c:\phhhph.exec:\phhhph.exe38⤵PID:1440
-
\??\c:\nnnfd.exec:\nnnfd.exe39⤵PID:2936
-
\??\c:\dfjnpd.exec:\dfjnpd.exe40⤵PID:600
-
\??\c:\rttplr.exec:\rttplr.exe41⤵PID:2020
-
\??\c:\nnlhpfb.exec:\nnlhpfb.exe42⤵PID:2376
-
\??\c:\pfvjr.exec:\pfvjr.exe43⤵PID:1576
-
\??\c:\nnrnfxf.exec:\nnrnfxf.exe44⤵PID:2816
-
\??\c:\hppfd.exec:\hppfd.exe45⤵PID:1604
-
\??\c:\lxblbnt.exec:\lxblbnt.exe46⤵PID:2704
-
\??\c:\vtpbb.exec:\vtpbb.exe47⤵PID:2736
-
\??\c:\xhtdp.exec:\xhtdp.exe48⤵PID:2764
-
\??\c:\ndndn.exec:\ndndn.exe49⤵PID:2688
-
\??\c:\hrbbphb.exec:\hrbbphb.exe50⤵PID:1472
-
\??\c:\lvrjxvp.exec:\lvrjxvp.exe51⤵PID:2908
-
\??\c:\btbrf.exec:\btbrf.exe52⤵PID:2540
-
\??\c:\vjdjrv.exec:\vjdjrv.exe53⤵PID:952
-
\??\c:\tbttbrd.exec:\tbttbrd.exe54⤵PID:644
-
\??\c:\fhlpl.exec:\fhlpl.exe55⤵PID:1580
-
\??\c:\npdnj.exec:\npdnj.exe56⤵PID:2016
-
\??\c:\bdlvndx.exec:\bdlvndx.exe57⤵PID:2448
-
\??\c:\bptbb.exec:\bptbb.exe58⤵PID:2564
-
\??\c:\btjrrh.exec:\btjrrh.exe59⤵PID:2024
-
\??\c:\bxpnhl.exec:\bxpnhl.exe60⤵PID:1616
-
\??\c:\bfjbfh.exec:\bfjbfh.exe61⤵PID:1496
-
\??\c:\pjjbnr.exec:\pjjbnr.exe62⤵PID:1708
-
\??\c:\xrppdlf.exec:\xrppdlf.exe63⤵PID:1712
-
\??\c:\lfhxv.exec:\lfhxv.exe64⤵PID:2100
-
\??\c:\trlbrxh.exec:\trlbrxh.exe65⤵PID:1204
-
\??\c:\vdrbd.exec:\vdrbd.exe66⤵PID:2944
-
\??\c:\vlfjt.exec:\vlfjt.exe67⤵PID:1948
-
\??\c:\hdhfrx.exec:\hdhfrx.exe68⤵PID:552
-
\??\c:\btbxl.exec:\btbxl.exe69⤵PID:3040
-
\??\c:\tljfr.exec:\tljfr.exe70⤵PID:2156
-
\??\c:\blrfp.exec:\blrfp.exe71⤵PID:1368
-
\??\c:\rfdnrjj.exec:\rfdnrjj.exe72⤵PID:2256
-
\??\c:\hvvjtrn.exec:\hvvjtrn.exe73⤵PID:1872
-
\??\c:\ntxprjp.exec:\ntxprjp.exe74⤵PID:112
-
\??\c:\ljhht.exec:\ljhht.exe75⤵PID:2868
-
\??\c:\brhjb.exec:\brhjb.exe76⤵PID:2640
-
\??\c:\hjfxtht.exec:\hjfxtht.exe77⤵PID:964
-
\??\c:\jlndd.exec:\jlndd.exe78⤵PID:948
-
\??\c:\bxjvjxt.exec:\bxjvjxt.exe79⤵PID:1972
-
\??\c:\ndpprvn.exec:\ndpprvn.exe80⤵PID:2108
-
\??\c:\dvhppn.exec:\dvhppn.exe81⤵PID:2300
-
\??\c:\jvjnb.exec:\jvjnb.exe82⤵PID:1288
-
\??\c:\hblltrd.exec:\hblltrd.exe83⤵PID:2056
-
\??\c:\xtdnbnn.exec:\xtdnbnn.exe84⤵PID:2756
-
\??\c:\fxfrxb.exec:\fxfrxb.exe85⤵PID:1612
-
\??\c:\vblxnl.exec:\vblxnl.exe86⤵PID:2592
-
\??\c:\vnjjh.exec:\vnjjh.exe87⤵PID:2700
-
\??\c:\pvvbpb.exec:\pvvbpb.exe88⤵PID:2572
-
\??\c:\dptndvx.exec:\dptndvx.exe89⤵PID:2456
-
\??\c:\ptjjhn.exec:\ptjjhn.exe90⤵PID:1684
-
\??\c:\jprvxp.exec:\jprvxp.exe91⤵PID:1460
-
\??\c:\jjvhfjb.exec:\jjvhfjb.exe92⤵PID:2440
-
\??\c:\lrhjlr.exec:\lrhjlr.exe93⤵PID:1740
-
\??\c:\rfpttbd.exec:\rfpttbd.exe94⤵PID:2444
-
\??\c:\lpbfrfp.exec:\lpbfrfp.exe95⤵PID:952
-
\??\c:\djhvvvp.exec:\djhvvvp.exe96⤵PID:644
-
\??\c:\vrdnd.exec:\vrdnd.exe97⤵PID:1580
-
\??\c:\vdjhjh.exec:\vdjhjh.exe98⤵PID:2796
-
\??\c:\bjbprnt.exec:\bjbprnt.exe99⤵PID:1652
-
\??\c:\trvxlf.exec:\trvxlf.exe100⤵PID:2776
-
\??\c:\hpfxb.exec:\hpfxb.exe101⤵PID:2248
-
\??\c:\nxhfdn.exec:\nxhfdn.exe102⤵PID:1588
-
\??\c:\nrpnhlj.exec:\nrpnhlj.exe103⤵PID:956
-
\??\c:\nrjlb.exec:\nrjlb.exe104⤵PID:1708
-
\??\c:\lvpvjvt.exec:\lvpvjvt.exe105⤵PID:1696
-
\??\c:\tffbbtp.exec:\tffbbtp.exe106⤵PID:476
-
\??\c:\rjdtbv.exec:\rjdtbv.exe107⤵PID:2860
-
\??\c:\tjbhp.exec:\tjbhp.exe108⤵PID:2944
-
\??\c:\fpbth.exec:\fpbth.exe109⤵PID:2848
-
\??\c:\fphbhnd.exec:\fphbhnd.exe110⤵PID:680
-
\??\c:\tvjjbrr.exec:\tvjjbrr.exe111⤵PID:3008
-
\??\c:\xdhhdvt.exec:\xdhhdvt.exe112⤵PID:2156
-
\??\c:\rjfbl.exec:\rjfbl.exe113⤵PID:1032
-
\??\c:\jrbndrr.exec:\jrbndrr.exe114⤵PID:1832
-
\??\c:\tdrhfrf.exec:\tdrhfrf.exe115⤵PID:3012
-
\??\c:\jxbnxj.exec:\jxbnxj.exe116⤵PID:2872
-
\??\c:\xbnvvv.exec:\xbnvvv.exe117⤵PID:2868
-
\??\c:\dvfrlj.exec:\dvfrlj.exe118⤵PID:2184
-
\??\c:\rvnlxh.exec:\rvnlxh.exe119⤵PID:2380
-
\??\c:\fjxbpd.exec:\fjxbpd.exe120⤵PID:1304
-
\??\c:\hfdhbh.exec:\hfdhbh.exe121⤵PID:1160
-
\??\c:\nntxvjn.exec:\nntxvjn.exe122⤵PID:2224
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-