Analysis
-
max time kernel
40s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 08:53
Behavioral task
behavioral1
Sample
NEAS.5340980cc80b334a2503bf2da3d73a80.exe
Resource
win7-20231023-en
General
-
Target
NEAS.5340980cc80b334a2503bf2da3d73a80.exe
-
Size
139KB
-
MD5
5340980cc80b334a2503bf2da3d73a80
-
SHA1
af4d42a691e80cc7d2c1caaf310994e13abf53c8
-
SHA256
e0fe78e633a767b5098623540a69f8a1a8623b59d44ffe99f1fffcc97f4b1838
-
SHA512
a29a6bf1d8a41d59d892fb281727824864fda98a1db246980092bfb70754a28a2a0746ead88ec5cb53172f66b2fd239576e35fc95f895de8173d0235402cbe8c
-
SSDEEP
3072:EhOmTsF93UYfwC6GIoutcEDjmDH6lPqZD2N/67ZWRZWZ1AgkniE7xn:Ecm4FmowdHoScQmL6l6O/8WOWiEx
Malware Config
Signatures
-
Detect Blackmoon payload 50 IoCs
resource yara_rule behavioral1/memory/2792-15-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2316-6-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2720-28-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/3056-24-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2620-37-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2744-51-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2512-64-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2988-60-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2200-73-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2984-82-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2984-84-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/2020-92-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2020-102-0x0000000000230000-0x0000000000262000-memory.dmp family_blackmoon behavioral1/memory/2752-120-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/312-107-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2568-116-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2000-136-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/1992-138-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/1964-153-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/1992-146-0x00000000001B0000-0x00000000001E2000-memory.dmp family_blackmoon behavioral1/memory/1272-166-0x0000000000440000-0x0000000000472000-memory.dmp family_blackmoon behavioral1/memory/2240-177-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/1692-168-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/1648-207-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/2000-212-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/2308-221-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/1992-227-0x00000000001B0000-0x00000000001E2000-memory.dmp family_blackmoon behavioral1/memory/1452-245-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/1648-255-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/780-259-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2940-305-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/2928-304-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/2940-303-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/1380-319-0x00000000001B0000-0x00000000001E2000-memory.dmp family_blackmoon behavioral1/memory/3024-322-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/1380-312-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2644-341-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2928-353-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/2856-376-0x0000000000230000-0x0000000000262000-memory.dmp family_blackmoon behavioral1/memory/2544-397-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/2008-410-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2608-430-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/2864-436-0x0000000000440000-0x0000000000472000-memory.dmp family_blackmoon behavioral1/memory/2008-444-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2436-466-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/1292-490-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/2280-477-0x0000000000220000-0x0000000000252000-memory.dmp family_blackmoon behavioral1/memory/1292-492-0x00000000003B0000-0x00000000003E2000-memory.dmp family_blackmoon behavioral1/memory/2404-498-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon behavioral1/memory/1076-499-0x0000000000400000-0x0000000000432000-memory.dmp family_blackmoon -
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/files/0x0009000000012025-9.dat family_berbew behavioral1/files/0x0009000000012025-8.dat family_berbew behavioral1/files/0x0009000000012025-5.dat family_berbew behavioral1/files/0x000e000000012274-16.dat family_berbew behavioral1/files/0x000e000000012274-18.dat family_berbew behavioral1/files/0x0032000000014490-26.dat family_berbew behavioral1/files/0x0032000000014490-25.dat family_berbew behavioral1/files/0x0007000000014833-35.dat family_berbew behavioral1/files/0x0007000000014833-34.dat family_berbew behavioral1/files/0x0007000000014abe-53.dat family_berbew behavioral1/files/0x0007000000014abe-52.dat family_berbew behavioral1/files/0x0007000000014a01-44.dat family_berbew behavioral1/files/0x0007000000014a01-43.dat family_berbew behavioral1/files/0x000a000000014adb-62.dat family_berbew behavioral1/files/0x000a000000014adb-61.dat family_berbew behavioral1/files/0x00060000000153bf-80.dat family_berbew behavioral1/files/0x00060000000153bf-79.dat family_berbew behavioral1/files/0x0009000000014b79-70.dat family_berbew behavioral1/files/0x0009000000014b79-71.dat family_berbew behavioral1/files/0x00060000000155fd-89.dat family_berbew behavioral1/files/0x00060000000155fd-90.dat family_berbew behavioral1/files/0x0006000000015601-98.dat family_berbew behavioral1/files/0x0006000000015601-99.dat family_berbew behavioral1/files/0x000600000001560d-118.dat family_berbew behavioral1/files/0x000600000001560d-117.dat family_berbew behavioral1/files/0x00100000000144fa-110.dat family_berbew behavioral1/files/0x00100000000144fa-108.dat family_berbew behavioral1/files/0x0006000000015619-127.dat family_berbew behavioral1/files/0x0006000000015619-126.dat family_berbew behavioral1/files/0x0006000000015654-135.dat family_berbew behavioral1/files/0x0006000000015654-134.dat family_berbew behavioral1/files/0x0006000000015c28-145.dat family_berbew behavioral1/files/0x0006000000015c28-144.dat family_berbew behavioral1/files/0x0006000000015c4f-163.dat family_berbew behavioral1/files/0x0006000000015c3d-155.dat family_berbew behavioral1/files/0x0006000000015c3d-154.dat family_berbew behavioral1/files/0x0006000000015c4f-164.dat family_berbew behavioral1/files/0x0006000000015c57-173.dat family_berbew behavioral1/files/0x0006000000015c57-174.dat family_berbew behavioral1/files/0x0006000000015c6c-183.dat family_berbew behavioral1/files/0x0006000000015c6c-182.dat family_berbew behavioral1/files/0x0006000000015c7a-190.dat family_berbew behavioral1/files/0x0006000000015c7a-191.dat family_berbew behavioral1/memory/1804-193-0x0000000001B80000-0x0000000001BB2000-memory.dmp family_berbew behavioral1/files/0x0006000000015c85-200.dat family_berbew behavioral1/files/0x0006000000015c85-199.dat family_berbew behavioral1/files/0x0006000000015c9c-209.dat family_berbew behavioral1/files/0x0006000000015c9c-208.dat family_berbew behavioral1/files/0x0006000000015ca5-219.dat family_berbew behavioral1/files/0x0006000000015ca5-218.dat family_berbew behavioral1/files/0x0006000000015ce1-238.dat family_berbew behavioral1/files/0x0006000000015caf-229.dat family_berbew behavioral1/files/0x0006000000015caf-228.dat family_berbew behavioral1/memory/2308-237-0x00000000001B0000-0x00000000001E2000-memory.dmp family_berbew behavioral1/files/0x0006000000015ce1-236.dat family_berbew behavioral1/files/0x0006000000015cf0-247.dat family_berbew behavioral1/files/0x0006000000015cf0-246.dat family_berbew behavioral1/files/0x0006000000015db6-256.dat family_berbew behavioral1/files/0x0006000000015db6-254.dat family_berbew behavioral1/files/0x0006000000015dca-264.dat family_berbew behavioral1/files/0x0006000000015dca-265.dat family_berbew behavioral1/files/0x0006000000015e1b-272.dat family_berbew behavioral1/files/0x0006000000015e1b-273.dat family_berbew behavioral1/files/0x0006000000015e3c-282.dat family_berbew -
Executes dropped EXE 64 IoCs
pid Process 2792 dhflx.exe 3056 ttndb.exe 2720 lpptl.exe 2620 plfnjr.exe 2744 vjnjvx.exe 2988 pfddjd.exe 2512 rjtttdv.exe 2200 xdjtr.exe 2984 nbltnnd.exe 2020 rffffjj.exe 312 npbhb.exe 2568 vhpblfl.exe 2752 vftnjn.exe 2000 nfxvxxh.exe 1992 bhhtbrl.exe 1964 fnjtjjh.exe 1272 thdfrvv.exe 1692 lblbp.exe 2240 frfrl.exe 1804 bpppx.exe 2268 ftbbf.exe 1648 pnnhb.exe 2292 nhvnhlr.exe 2308 xtdxlf.exe 856 fdrhtfb.exe 1452 plhjh.exe 704 rjbvhj.exe 780 hndbxht.exe 756 hprntd.exe 272 jdftnv.exe 2928 jdlltd.exe 2272 bxbtn.exe 2940 jpvbvjv.exe 1380 hvbthjd.exe 2132 bprhfbn.exe 3024 lbbthpr.exe 2656 thjlj.exe 2732 thtjl.exe 2644 bnvbdxd.exe 1636 xpfnv.exe 2892 tvxtjbj.exe 2544 xffffh.exe 2856 bntfnt.exe 2680 rlrbtvr.exe 240 hpppxdf.exe 2428 vdhdblt.exe 2488 xbhjptf.exe 2008 rfvhx.exe 1672 bnlpd.exe 312 rblxdlp.exe 2608 htrnxlp.exe 2864 jxhhv.exe 1404 lvhpd.exe 1344 rnjrxlh.exe 2824 hvhbf.exe 2436 tbrpd.exe 2448 pxbrdv.exe 2280 blfhtrn.exe 2476 dbxdxxr.exe 1292 jfltnhd.exe 2404 lnnnvf.exe 1076 lhpjphn.exe 2216 ntfflnn.exe 2144 dxxtxx.exe -
resource yara_rule behavioral1/memory/2316-1-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/memory/2316-7-0x0000000000220000-0x0000000000252000-memory.dmp upx behavioral1/memory/2792-15-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0009000000012025-9.dat upx behavioral1/files/0x0009000000012025-8.dat upx behavioral1/memory/2316-6-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0009000000012025-5.dat upx behavioral1/files/0x000e000000012274-16.dat upx behavioral1/files/0x000e000000012274-18.dat upx behavioral1/memory/2720-28-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0032000000014490-26.dat upx behavioral1/files/0x0032000000014490-25.dat upx behavioral1/memory/3056-24-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/memory/2620-37-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0007000000014833-35.dat upx behavioral1/files/0x0007000000014833-34.dat upx behavioral1/files/0x0007000000014abe-53.dat upx behavioral1/files/0x0007000000014abe-52.dat upx behavioral1/memory/2744-51-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0007000000014a01-44.dat upx behavioral1/files/0x0007000000014a01-43.dat upx behavioral1/memory/2512-64-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x000a000000014adb-62.dat upx behavioral1/files/0x000a000000014adb-61.dat upx behavioral1/memory/2988-60-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x00060000000153bf-80.dat upx behavioral1/files/0x00060000000153bf-79.dat upx behavioral1/files/0x0009000000014b79-70.dat upx behavioral1/memory/2200-73-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/memory/2984-82-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0009000000014b79-71.dat upx behavioral1/files/0x00060000000155fd-89.dat upx behavioral1/memory/2984-84-0x0000000000220000-0x0000000000252000-memory.dmp upx behavioral1/memory/2020-92-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x00060000000155fd-90.dat upx behavioral1/files/0x0006000000015601-98.dat upx behavioral1/files/0x0006000000015601-99.dat upx behavioral1/memory/2752-120-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x000600000001560d-118.dat upx behavioral1/files/0x000600000001560d-117.dat upx behavioral1/files/0x00100000000144fa-110.dat upx behavioral1/memory/2568-109-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x00100000000144fa-108.dat upx behavioral1/memory/312-107-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/memory/2568-116-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0006000000015619-127.dat upx behavioral1/files/0x0006000000015619-126.dat upx behavioral1/memory/1992-138-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0006000000015654-135.dat upx behavioral1/files/0x0006000000015654-134.dat upx behavioral1/files/0x0006000000015c28-145.dat upx behavioral1/files/0x0006000000015c28-144.dat upx behavioral1/files/0x0006000000015c4f-163.dat upx behavioral1/files/0x0006000000015c3d-155.dat upx behavioral1/files/0x0006000000015c3d-154.dat upx behavioral1/memory/1964-153-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0006000000015c4f-164.dat upx behavioral1/files/0x0006000000015c57-173.dat upx behavioral1/memory/1692-168-0x0000000000400000-0x0000000000432000-memory.dmp upx behavioral1/files/0x0006000000015c57-174.dat upx behavioral1/files/0x0006000000015c6c-183.dat upx behavioral1/files/0x0006000000015c6c-182.dat upx behavioral1/files/0x0006000000015c7a-190.dat upx behavioral1/files/0x0006000000015c7a-191.dat upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2792 2316 NEAS.5340980cc80b334a2503bf2da3d73a80.exe 28 PID 2316 wrote to memory of 2792 2316 NEAS.5340980cc80b334a2503bf2da3d73a80.exe 28 PID 2316 wrote to memory of 2792 2316 NEAS.5340980cc80b334a2503bf2da3d73a80.exe 28 PID 2316 wrote to memory of 2792 2316 NEAS.5340980cc80b334a2503bf2da3d73a80.exe 28 PID 2792 wrote to memory of 3056 2792 dhflx.exe 30 PID 2792 wrote to memory of 3056 2792 dhflx.exe 30 PID 2792 wrote to memory of 3056 2792 dhflx.exe 30 PID 2792 wrote to memory of 3056 2792 dhflx.exe 30 PID 3056 wrote to memory of 2720 3056 ttndb.exe 29 PID 3056 wrote to memory of 2720 3056 ttndb.exe 29 PID 3056 wrote to memory of 2720 3056 ttndb.exe 29 PID 3056 wrote to memory of 2720 3056 ttndb.exe 29 PID 2720 wrote to memory of 2620 2720 lpptl.exe 31 PID 2720 wrote to memory of 2620 2720 lpptl.exe 31 PID 2720 wrote to memory of 2620 2720 lpptl.exe 31 PID 2720 wrote to memory of 2620 2720 lpptl.exe 31 PID 2620 wrote to memory of 2744 2620 plfnjr.exe 32 PID 2620 wrote to memory of 2744 2620 plfnjr.exe 32 PID 2620 wrote to memory of 2744 2620 plfnjr.exe 32 PID 2620 wrote to memory of 2744 2620 plfnjr.exe 32 PID 2744 wrote to memory of 2988 2744 vjnjvx.exe 33 PID 2744 wrote to memory of 2988 2744 vjnjvx.exe 33 PID 2744 wrote to memory of 2988 2744 vjnjvx.exe 33 PID 2744 wrote to memory of 2988 2744 vjnjvx.exe 33 PID 2988 wrote to memory of 2512 2988 pfddjd.exe 34 PID 2988 wrote to memory of 2512 2988 pfddjd.exe 34 PID 2988 wrote to memory of 2512 2988 pfddjd.exe 34 PID 2988 wrote to memory of 2512 2988 pfddjd.exe 34 PID 2512 wrote to memory of 2200 2512 rjtttdv.exe 36 PID 2512 wrote to memory of 2200 2512 rjtttdv.exe 36 PID 2512 wrote to memory of 2200 2512 rjtttdv.exe 36 PID 2512 wrote to memory of 2200 2512 rjtttdv.exe 36 PID 2200 wrote to memory of 2984 2200 xdjtr.exe 35 PID 2200 wrote to memory of 2984 2200 xdjtr.exe 35 PID 2200 wrote to memory of 2984 2200 xdjtr.exe 35 PID 2200 wrote to memory of 2984 2200 xdjtr.exe 35 PID 2984 wrote to memory of 2020 2984 nbltnnd.exe 37 PID 2984 wrote to memory of 2020 2984 nbltnnd.exe 37 PID 2984 wrote to memory of 2020 2984 nbltnnd.exe 37 PID 2984 wrote to memory of 2020 2984 nbltnnd.exe 37 PID 2020 wrote to memory of 312 2020 rffffjj.exe 38 PID 2020 wrote to memory of 312 2020 rffffjj.exe 38 PID 2020 wrote to memory of 312 2020 rffffjj.exe 38 PID 2020 wrote to memory of 312 2020 rffffjj.exe 38 PID 312 wrote to memory of 2568 312 npbhb.exe 39 PID 312 wrote to memory of 2568 312 npbhb.exe 39 PID 312 wrote to memory of 2568 312 npbhb.exe 39 PID 312 wrote to memory of 2568 312 npbhb.exe 39 PID 2568 wrote to memory of 2752 2568 vhpblfl.exe 40 PID 2568 wrote to memory of 2752 2568 vhpblfl.exe 40 PID 2568 wrote to memory of 2752 2568 vhpblfl.exe 40 PID 2568 wrote to memory of 2752 2568 vhpblfl.exe 40 PID 2752 wrote to memory of 2000 2752 vftnjn.exe 42 PID 2752 wrote to memory of 2000 2752 vftnjn.exe 42 PID 2752 wrote to memory of 2000 2752 vftnjn.exe 42 PID 2752 wrote to memory of 2000 2752 vftnjn.exe 42 PID 2000 wrote to memory of 1992 2000 nfxvxxh.exe 41 PID 2000 wrote to memory of 1992 2000 nfxvxxh.exe 41 PID 2000 wrote to memory of 1992 2000 nfxvxxh.exe 41 PID 2000 wrote to memory of 1992 2000 nfxvxxh.exe 41 PID 1992 wrote to memory of 1964 1992 bhhtbrl.exe 43 PID 1992 wrote to memory of 1964 1992 bhhtbrl.exe 43 PID 1992 wrote to memory of 1964 1992 bhhtbrl.exe 43 PID 1992 wrote to memory of 1964 1992 bhhtbrl.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.5340980cc80b334a2503bf2da3d73a80.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.5340980cc80b334a2503bf2da3d73a80.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\dhflx.exec:\dhflx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
\??\c:\ttndb.exec:\ttndb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056
-
-
-
\??\c:\lpptl.exec:\lpptl.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\plfnjr.exec:\plfnjr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\vjnjvx.exec:\vjnjvx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\pfddjd.exec:\pfddjd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
\??\c:\rjtttdv.exec:\rjtttdv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\xdjtr.exec:\xdjtr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200
-
-
-
-
-
-
\??\c:\nbltnnd.exec:\nbltnnd.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\rffffjj.exec:\rffffjj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
\??\c:\npbhb.exec:\npbhb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:312 -
\??\c:\vhpblfl.exec:\vhpblfl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\vftnjn.exec:\vftnjn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\nfxvxxh.exec:\nfxvxxh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000
-
-
-
-
-
-
\??\c:\jbjbr.exec:\jbjbr.exe2⤵PID:1164
-
\??\c:\dpvnvbt.exec:\dpvnvbt.exe3⤵PID:2780
-
-
-
\??\c:\bhhtbrl.exec:\bhhtbrl.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1992 -
\??\c:\fnjtjjh.exec:\fnjtjjh.exe2⤵
- Executes dropped EXE
PID:1964 -
\??\c:\thdfrvv.exec:\thdfrvv.exe3⤵
- Executes dropped EXE
PID:1272 -
\??\c:\lblbp.exec:\lblbp.exe4⤵
- Executes dropped EXE
PID:1692 -
\??\c:\frfrl.exec:\frfrl.exe5⤵
- Executes dropped EXE
PID:2240 -
\??\c:\bpppx.exec:\bpppx.exe6⤵
- Executes dropped EXE
PID:1804 -
\??\c:\ftbbf.exec:\ftbbf.exe7⤵
- Executes dropped EXE
PID:2268 -
\??\c:\pnnhb.exec:\pnnhb.exe8⤵
- Executes dropped EXE
PID:1648
-
-
-
-
-
-
-
-
\??\c:\nhvnhlr.exec:\nhvnhlr.exe1⤵
- Executes dropped EXE
PID:2292 -
\??\c:\xtdxlf.exec:\xtdxlf.exe2⤵
- Executes dropped EXE
PID:2308 -
\??\c:\fdrhtfb.exec:\fdrhtfb.exe3⤵
- Executes dropped EXE
PID:856 -
\??\c:\plhjh.exec:\plhjh.exe4⤵
- Executes dropped EXE
PID:1452
-
-
-
\??\c:\nhtlptv.exec:\nhtlptv.exe3⤵PID:400
-
\??\c:\bhxxtr.exec:\bhxxtr.exe4⤵PID:1756
-
\??\c:\ppdtxx.exec:\ppdtxx.exe5⤵PID:1700
-
\??\c:\dtvtdv.exec:\dtvtdv.exe6⤵PID:756
-
\??\c:\fvrxbfl.exec:\fvrxbfl.exe7⤵PID:1216
-
\??\c:\hrvpptt.exec:\hrvpptt.exe8⤵PID:2888
-
\??\c:\hvbndj.exec:\hvbndj.exe9⤵PID:2944
-
\??\c:\hdplb.exec:\hdplb.exe10⤵PID:2040
-
\??\c:\ftdlxbj.exec:\ftdlxbj.exe11⤵PID:2248
-
\??\c:\nxdxr.exec:\nxdxr.exe12⤵PID:1548
-
\??\c:\dbxdjx.exec:\dbxdjx.exe13⤵PID:1652
-
\??\c:\vvhtt.exec:\vvhtt.exe14⤵PID:2884
-
\??\c:\rfdvr.exec:\rfdvr.exe15⤵PID:2692
-
\??\c:\fhjjd.exec:\fhjjd.exe16⤵PID:2712
-
\??\c:\llljpjt.exec:\llljpjt.exe17⤵PID:3036
-
\??\c:\vdbbj.exec:\vdbbj.exe18⤵PID:2716
-
\??\c:\frjvlt.exec:\frjvlt.exe19⤵PID:2640
-
\??\c:\ftlpbv.exec:\ftlpbv.exe20⤵PID:1628
-
\??\c:\pvnxpn.exec:\pvnxpn.exe21⤵PID:1624
-
\??\c:\pdrjfj.exec:\pdrjfj.exe22⤵PID:2776
-
\??\c:\hddxv.exec:\hddxv.exe23⤵PID:2676
-
\??\c:\nxdjdh.exec:\nxdjdh.exe24⤵PID:848
-
\??\c:\dntltv.exec:\dntltv.exe25⤵PID:2520
-
\??\c:\vjfrn.exec:\vjfrn.exe26⤵PID:240
-
\??\c:\pbdvj.exec:\pbdvj.exe27⤵PID:2984
-
-
-
-
-
-
-
-
-
-
\??\c:\nlfjvl.exec:\nlfjvl.exe19⤵PID:3056
-
\??\c:\jjpprbr.exec:\jjpprbr.exe20⤵PID:1620
-
\??\c:\xjrhxf.exec:\xjrhxf.exe21⤵PID:2336
-
\??\c:\bfhbnpn.exec:\bfhbnpn.exe22⤵PID:2556
-
\??\c:\fhvjd.exec:\fhvjd.exe23⤵PID:2648
-
\??\c:\nndfftv.exec:\nndfftv.exe24⤵PID:1604
-
\??\c:\hnldvjf.exec:\hnldvjf.exe25⤵PID:2676
-
\??\c:\vxftfh.exec:\vxftfh.exe26⤵PID:940
-
\??\c:\xdjpfp.exec:\xdjpfp.exe27⤵PID:2552
-
\??\c:\xfltp.exec:\xfltp.exe28⤵PID:2488
-
\??\c:\rjbpt.exec:\rjbpt.exe29⤵PID:240
-
\??\c:\rltpftd.exec:\rltpftd.exe30⤵PID:2428
-
\??\c:\tjlhdhv.exec:\tjlhdhv.exe31⤵PID:2624
-
\??\c:\pfbth.exec:\pfbth.exe32⤵PID:2756
-
\??\c:\rfrrb.exec:\rfrrb.exe33⤵PID:1684
-
\??\c:\vdfxjj.exec:\vdfxjj.exe34⤵PID:2000
-
\??\c:\rpjdv.exec:\rpjdv.exe35⤵PID:1444
-
\??\c:\llnbdn.exec:\llnbdn.exe36⤵PID:1984
-
\??\c:\fnphnd.exec:\fnphnd.exe37⤵PID:2764
-
\??\c:\pdlhn.exec:\pdlhn.exe38⤵PID:1568
-
\??\c:\xrhthv.exec:\xrhthv.exe39⤵PID:2824
-
\??\c:\nxvrh.exec:\nxvrh.exe40⤵PID:1992
-
\??\c:\phffxh.exec:\phffxh.exe41⤵PID:2388
-
\??\c:\xrpvhlv.exec:\xrpvhlv.exe42⤵PID:1272
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\hbhpnlb.exec:\hbhpnlb.exe22⤵PID:240
-
\??\c:\bjfvl.exec:\bjfvl.exe23⤵PID:2888
-
\??\c:\pjbpdv.exec:\pjbpdv.exe24⤵PID:2208
-
\??\c:\jdlttjn.exec:\jdlttjn.exe25⤵PID:644
-
\??\c:\pvrbdfr.exec:\pvrbdfr.exe26⤵PID:788
-
\??\c:\pfvbltx.exec:\pfvbltx.exe27⤵PID:2012
-
\??\c:\hvlpr.exec:\hvlpr.exe28⤵PID:2548
-
\??\c:\xffhlt.exec:\xffhlt.exe29⤵PID:312
-
\??\c:\pjpvrp.exec:\pjpvrp.exe30⤵PID:1972
-
\??\c:\btbvrff.exec:\btbvrff.exe31⤵PID:2864
-
\??\c:\tvfdxp.exec:\tvfdxp.exe32⤵PID:1976
-
\??\c:\bpvrl.exec:\bpvrl.exe33⤵PID:2424
-
\??\c:\drnhdjt.exec:\drnhdjt.exe34⤵PID:2420
-
\??\c:\pbjjr.exec:\pbjjr.exe35⤵PID:1844
-
\??\c:\jdlvvnf.exec:\jdlvvnf.exe36⤵PID:1468
-
\??\c:\drjrj.exec:\drjrj.exe37⤵PID:2456
-
\??\c:\rvbhxf.exec:\rvbhxf.exe38⤵PID:1280
-
\??\c:\jxbdf.exec:\jxbdf.exe39⤵PID:1036
-
\??\c:\jfnjdl.exec:\jfnjdl.exe40⤵PID:2240
-
\??\c:\pphrdr.exec:\pphrdr.exe41⤵PID:1820
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\rnbxpj.exec:\rnbxpj.exe9⤵PID:2744
-
\??\c:\xlxjf.exec:\xlxjf.exe10⤵PID:1688
-
\??\c:\vnjvpr.exec:\vnjvpr.exe11⤵PID:2632
-
\??\c:\bndrr.exec:\bndrr.exe12⤵PID:2980
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\rjbvhj.exec:\rjbvhj.exe1⤵
- Executes dropped EXE
PID:704 -
\??\c:\hndbxht.exec:\hndbxht.exe2⤵
- Executes dropped EXE
PID:780 -
\??\c:\hprntd.exec:\hprntd.exe3⤵
- Executes dropped EXE
PID:756 -
\??\c:\jdftnv.exec:\jdftnv.exe4⤵
- Executes dropped EXE
PID:272 -
\??\c:\jdlltd.exec:\jdlltd.exe5⤵
- Executes dropped EXE
PID:2928 -
\??\c:\bxbtn.exec:\bxbtn.exe6⤵
- Executes dropped EXE
PID:2272 -
\??\c:\jpvbvjv.exec:\jpvbvjv.exe7⤵
- Executes dropped EXE
PID:2940 -
\??\c:\hvbthjd.exec:\hvbthjd.exe8⤵
- Executes dropped EXE
PID:1380 -
\??\c:\bprhfbn.exec:\bprhfbn.exe9⤵
- Executes dropped EXE
PID:2132 -
\??\c:\jndfh.exec:\jndfh.exe10⤵PID:2472
-
\??\c:\jfnxnl.exec:\jfnxnl.exe11⤵PID:848
-
-
-
-
-
-
-
-
-
-
-
\??\c:\thtjl.exec:\thtjl.exe1⤵
- Executes dropped EXE
PID:2732 -
\??\c:\bnvbdxd.exec:\bnvbdxd.exe2⤵
- Executes dropped EXE
PID:2644 -
\??\c:\xpfnv.exec:\xpfnv.exe3⤵
- Executes dropped EXE
PID:1636 -
\??\c:\tvxtjbj.exec:\tvxtjbj.exe4⤵
- Executes dropped EXE
PID:2892 -
\??\c:\bptht.exec:\bptht.exe5⤵PID:2544
-
\??\c:\bntfnt.exec:\bntfnt.exe6⤵
- Executes dropped EXE
PID:2856 -
\??\c:\rlrbtvr.exec:\rlrbtvr.exe7⤵
- Executes dropped EXE
PID:2680 -
\??\c:\hpppxdf.exec:\hpppxdf.exe8⤵
- Executes dropped EXE
PID:240 -
\??\c:\vdhdblt.exec:\vdhdblt.exe9⤵
- Executes dropped EXE
PID:2428 -
\??\c:\xbhjptf.exec:\xbhjptf.exe10⤵
- Executes dropped EXE
PID:2488 -
\??\c:\rfvhx.exec:\rfvhx.exe11⤵
- Executes dropped EXE
PID:2008
-
-
-
-
-
\??\c:\nfbrjv.exec:\nfbrjv.exe8⤵PID:2740
-
\??\c:\dhrfv.exec:\dhrfv.exe9⤵PID:2428
-
\??\c:\vxvrlh.exec:\vxvrlh.exe10⤵PID:2748
-
\??\c:\bffxdll.exec:\bffxdll.exe11⤵PID:2820
-
\??\c:\vvhvdfp.exec:\vvhvdfp.exe12⤵PID:1688
-
\??\c:\nvnjrtp.exec:\nvnjrtp.exe13⤵PID:760
-
\??\c:\flrfnd.exec:\flrfnd.exe14⤵PID:2568
-
\??\c:\ntdnfbt.exec:\ntdnfbt.exe15⤵PID:2844
-
\??\c:\tvlldv.exec:\tvlldv.exe16⤵PID:2868
-
\??\c:\xpnnnj.exec:\xpnnnj.exe17⤵PID:1960
-
\??\c:\tltvlp.exec:\tltvlp.exe18⤵PID:1968
-
\??\c:\frndd.exec:\frndd.exe19⤵PID:2264
-
\??\c:\rjfrx.exec:\rjfrx.exe20⤵PID:1772
-
\??\c:\brrhdlj.exec:\brrhdlj.exe21⤵PID:1272
-
\??\c:\nvhppbj.exec:\nvhppbj.exe22⤵PID:2816
-
\??\c:\dnrjxf.exec:\dnrjxf.exe23⤵PID:1280
-
\??\c:\prjhnrr.exec:\prjhnrr.exe24⤵PID:2068
-
\??\c:\bbthbhr.exec:\bbthbhr.exe25⤵PID:2328
-
\??\c:\fbttbdr.exec:\fbttbdr.exe26⤵PID:2268
-
\??\c:\dtjnxx.exec:\dtjnxx.exe27⤵PID:2404
-
\??\c:\rxdbj.exec:\rxdbj.exe28⤵PID:268
-
\??\c:\jnvlj.exec:\jnvlj.exe29⤵PID:680
-
\??\c:\xxpnxf.exec:\xxpnxf.exe30⤵PID:2308
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\lnfhfpf.exec:\lnfhfpf.exe12⤵PID:2188
-
\??\c:\dvdfvp.exec:\dvdfvp.exe13⤵PID:1884
-
\??\c:\hrtvdl.exec:\hrtvdl.exe14⤵PID:644
-
\??\c:\fftvj.exec:\fftvj.exe15⤵PID:2548
-
\??\c:\ldtljx.exec:\ldtljx.exe16⤵PID:2868
-
\??\c:\pfhdpf.exec:\pfhdpf.exe17⤵PID:2836
-
\??\c:\ffhfptx.exec:\ffhfptx.exe18⤵PID:1968
-
\??\c:\xnrjrd.exec:\xnrjrd.exe19⤵PID:2164
-
\??\c:\nxdnr.exec:\nxdnr.exe20⤵PID:888
-
\??\c:\drflrhf.exec:\drflrhf.exe21⤵PID:1272
-
\??\c:\lvdnhh.exec:\lvdnhh.exe22⤵PID:2412
-
\??\c:\fndjpn.exec:\fndjpn.exe23⤵PID:1280
-
\??\c:\vvpdvjx.exec:\vvpdvjx.exe24⤵PID:2052
-
\??\c:\xdnlx.exec:\xdnlx.exe25⤵PID:2328
-
\??\c:\xnljn.exec:\xnljn.exe26⤵PID:584
-
\??\c:\dtvfpf.exec:\dtvfpf.exe27⤵PID:2404
-
\??\c:\jvptl.exec:\jvptl.exe28⤵PID:2976
-
\??\c:\fvbvfxb.exec:\fvbvfxb.exe29⤵PID:2396
-
\??\c:\brxlf.exec:\brxlf.exe30⤵PID:288
-
\??\c:\hftjbbn.exec:\hftjbbn.exe31⤵PID:1720
-
\??\c:\djhrdv.exec:\djhrdv.exe32⤵PID:968
-
\??\c:\ltdpvnx.exec:\ltdpvnx.exe33⤵PID:1680
-
\??\c:\vjvrntf.exec:\vjvrntf.exe34⤵PID:284
-
\??\c:\rfjjt.exec:\rfjjt.exe35⤵PID:788
-
\??\c:\hlfppxt.exec:\hlfppxt.exe36⤵PID:1852
-
\??\c:\rbfrr.exec:\rbfrr.exe37⤵PID:908
-
\??\c:\phjntr.exec:\phjntr.exe38⤵PID:612
-
\??\c:\nvbnjpx.exec:\nvbnjpx.exe39⤵PID:2148
-
\??\c:\bhhrdvp.exec:\bhhrdvp.exe40⤵PID:2472
-
\??\c:\jrfvfrd.exec:\jrfvfrd.exe41⤵PID:1544
-
\??\c:\xxnht.exec:\xxnht.exe42⤵PID:1600
-
\??\c:\bpvrb.exec:\bpvrb.exe43⤵PID:2664
-
\??\c:\rftnn.exec:\rftnn.exe44⤵PID:2652
-
\??\c:\vnnjl.exec:\vnnjl.exe45⤵PID:1768
-
\??\c:\ltdfn.exec:\ltdfn.exe46⤵PID:3004
-
\??\c:\hflpl.exec:\hflpl.exe47⤵PID:3024
-
-
-
-
-
-
\??\c:\rjtrr.exec:\rjtrr.exe43⤵PID:2180
-
\??\c:\lrjxx.exec:\lrjxx.exe44⤵PID:1668
-
\??\c:\tnrdtpl.exec:\tnrdtpl.exe45⤵PID:2700
-
\??\c:\tnrdr.exec:\tnrdr.exe46⤵PID:2724
-
\??\c:\ppfplrn.exec:\ppfplrn.exe47⤵PID:2332
-
\??\c:\fxhlf.exec:\fxhlf.exe48⤵PID:1768
-
\??\c:\pntdrv.exec:\pntdrv.exe49⤵PID:848
-
\??\c:\vrrvt.exec:\vrrvt.exe50⤵PID:1300
-
-
\??\c:\fltvjhj.exec:\fltvjhj.exe50⤵PID:2848
-
\??\c:\dttbhjr.exec:\dttbhjr.exe51⤵PID:1632
-
-
-
-
-
-
\??\c:\lrnxpht.exec:\lrnxpht.exe47⤵PID:3012
-
\??\c:\btlrjr.exec:\btlrjr.exe48⤵PID:1604
-
\??\c:\ldlllf.exec:\ldlllf.exe49⤵PID:2544
-
\??\c:\vfrjxj.exec:\vfrjxj.exe50⤵PID:2528
-
\??\c:\djbflbb.exec:\djbflbb.exe51⤵PID:3024
-
\??\c:\hjxpfd.exec:\hjxpfd.exe52⤵PID:2336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\lfbvx.exec:\lfbvx.exe37⤵PID:2032
-
-
-
\??\c:\bvrrr.exec:\bvrrr.exe36⤵PID:772
-
\??\c:\nrdnxft.exec:\nrdnxft.exe37⤵PID:2928
-
\??\c:\lnlpp.exec:\lnlpp.exe38⤵PID:576
-
\??\c:\jfrnh.exec:\jfrnh.exe39⤵PID:1548
-
\??\c:\fdlxl.exec:\fdlxl.exe40⤵PID:2120
-
\??\c:\hhtdd.exec:\hhtdd.exe41⤵PID:2152
-
\??\c:\pfvxh.exec:\pfvxh.exe42⤵PID:3064
-
\??\c:\xfnvbhd.exec:\xfnvbhd.exe43⤵PID:2700
-
\??\c:\bdrvjd.exec:\bdrvjd.exe44⤵PID:2592
-
\??\c:\hjjdh.exec:\hjjdh.exe45⤵PID:1732
-
\??\c:\xblnvlx.exec:\xblnvlx.exe46⤵PID:2908
-
\??\c:\fxdlbn.exec:\fxdlbn.exe47⤵PID:2772
-
\??\c:\xbddp.exec:\xbddp.exe48⤵PID:2892
-
\??\c:\bbdffxh.exec:\bbdffxh.exe49⤵PID:2536
-
\??\c:\hhrbn.exec:\hhrbn.exe50⤵PID:2212
-
\??\c:\hlvrlvl.exec:\hlvrlvl.exe51⤵PID:984
-
\??\c:\tfrrb.exec:\tfrrb.exe52⤵PID:940
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\bntpx.exec:\bntpx.exe41⤵PID:2884
-
\??\c:\xnpbllr.exec:\xnpbllr.exe42⤵PID:2880
-
\??\c:\hnltt.exec:\hnltt.exe43⤵PID:2716
-
-
\??\c:\lvjvl.exec:\lvjvl.exe43⤵PID:2200
-
\??\c:\nrnfnr.exec:\nrnfnr.exe44⤵PID:2972
-
-
-
-
-
-
\??\c:\jrfrvl.exec:\jrfrvl.exe40⤵PID:2896
-
\??\c:\nlrlfx.exec:\nlrlfx.exe41⤵PID:2792
-
\??\c:\rhlff.exec:\rhlff.exe42⤵PID:1640
-
\??\c:\bnhxtp.exec:\bnhxtp.exe43⤵PID:2880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\pjftb.exec:\pjftb.exe24⤵PID:2300
-
\??\c:\rrfln.exec:\rrfln.exe25⤵PID:1844
-
\??\c:\llxpvv.exec:\llxpvv.exe26⤵PID:2904
-
-
-
-
-
-
-
-
\??\c:\jbdxd.exec:\jbdxd.exe20⤵PID:1568
-
\??\c:\xjjffdn.exec:\xjjffdn.exe21⤵PID:2824
-
\??\c:\jntjt.exec:\jntjt.exe22⤵PID:2448
-
\??\c:\brhrpf.exec:\brhrpf.exe23⤵PID:1404
-
\??\c:\dhljf.exec:\dhljf.exe24⤵PID:1844
-
\??\c:\rtfhnv.exec:\rtfhnv.exe25⤵PID:1840
-
\??\c:\xfblbn.exec:\xfblbn.exe26⤵PID:2324
-
\??\c:\tfrpfvx.exec:\tfrpfvx.exe27⤵PID:1500
-
-
-
-
-
-
\??\c:\fxdxp.exec:\fxdxp.exe23⤵PID:2824
-
\??\c:\xjjlj.exec:\xjjlj.exe24⤵PID:1216
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\thjlj.exec:\thjlj.exe1⤵
- Executes dropped EXE
PID:2656
-
\??\c:\pjjfbvt.exec:\pjjfbvt.exe1⤵PID:3024
-
\??\c:\rblxdlp.exec:\rblxdlp.exe1⤵
- Executes dropped EXE
PID:312 -
\??\c:\htrnxlp.exec:\htrnxlp.exe2⤵
- Executes dropped EXE
PID:2608 -
\??\c:\jxhhv.exec:\jxhhv.exe3⤵
- Executes dropped EXE
PID:2864 -
\??\c:\lvhpd.exec:\lvhpd.exe4⤵
- Executes dropped EXE
PID:1404 -
\??\c:\rnjrxlh.exec:\rnjrxlh.exe5⤵
- Executes dropped EXE
PID:1344 -
\??\c:\hvhbf.exec:\hvhbf.exe6⤵
- Executes dropped EXE
PID:2824 -
\??\c:\trxjvh.exec:\trxjvh.exe7⤵PID:2436
-
\??\c:\pxbrdv.exec:\pxbrdv.exe8⤵
- Executes dropped EXE
PID:2448 -
\??\c:\blfhtrn.exec:\blfhtrn.exe9⤵
- Executes dropped EXE
PID:2280 -
\??\c:\dbxdxxr.exec:\dbxdxxr.exe10⤵
- Executes dropped EXE
PID:2476 -
\??\c:\jfltnhd.exec:\jfltnhd.exe11⤵
- Executes dropped EXE
PID:1292
-
-
-
-
-
-
-
-
-
-
-
\??\c:\bnlpd.exec:\bnlpd.exe1⤵
- Executes dropped EXE
PID:1672
-
\??\c:\lnnnvf.exec:\lnnnvf.exe1⤵
- Executes dropped EXE
PID:2404 -
\??\c:\lhpjphn.exec:\lhpjphn.exe2⤵
- Executes dropped EXE
PID:1076 -
\??\c:\ntfflnn.exec:\ntfflnn.exe3⤵
- Executes dropped EXE
PID:2216 -
\??\c:\dxxtxx.exec:\dxxtxx.exe4⤵
- Executes dropped EXE
PID:2144 -
\??\c:\vnbdpl.exec:\vnbdpl.exe5⤵PID:776
-
\??\c:\lxhfb.exec:\lxhfb.exe6⤵PID:640
-
\??\c:\xdvrx.exec:\xdvrx.exe7⤵PID:436
-
\??\c:\dldxnl.exec:\dldxnl.exe8⤵PID:1476
-
\??\c:\htbndt.exec:\htbndt.exe9⤵PID:984
-
\??\c:\tdrhh.exec:\tdrhh.exe10⤵PID:1452
-
\??\c:\dfxnntv.exec:\dfxnntv.exe11⤵PID:1216
-
\??\c:\flfnrl.exec:\flfnrl.exe12⤵PID:1644
-
\??\c:\bbjjtb.exec:\bbjjtb.exe13⤵PID:576
-
\??\c:\hlrfpxh.exec:\hlrfpxh.exe14⤵PID:2040
-
\??\c:\ntjlr.exec:\ntjlr.exe15⤵PID:1316
-
\??\c:\rbjjv.exec:\rbjjv.exe16⤵PID:2120
-
\??\c:\nvhft.exec:\nvhft.exe17⤵PID:1736
-
\??\c:\lfxdrv.exec:\lfxdrv.exe18⤵PID:2380
-
\??\c:\lbpnlvd.exec:\lbpnlvd.exe19⤵PID:2316
-
\??\c:\vjfhtv.exec:\vjfhtv.exe20⤵PID:1768
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\hvbdn.exec:\hvbdn.exe1⤵PID:2332
-
\??\c:\lbbthpr.exec:\lbbthpr.exe2⤵
- Executes dropped EXE
PID:3024 -
\??\c:\tnpnhpx.exec:\tnpnhpx.exe3⤵PID:2908
-
\??\c:\fffntf.exec:\fffntf.exe4⤵PID:2660
-
\??\c:\hnjfnv.exec:\hnjfnv.exe5⤵PID:1624
-
\??\c:\bbnjh.exec:\bbnjh.exe6⤵PID:2768
-
\??\c:\thtjj.exec:\thtjj.exe7⤵PID:2620
-
\??\c:\xffffh.exec:\xffffh.exe8⤵
- Executes dropped EXE
PID:2544 -
\??\c:\djxbvj.exec:\djxbvj.exe9⤵PID:2528
-
\??\c:\pljbhr.exec:\pljbhr.exe10⤵PID:1164
-
\??\c:\jpvjtn.exec:\jpvjtn.exe11⤵PID:2972
-
\??\c:\fbvnbnf.exec:\fbvnbnf.exe12⤵PID:2080
-
\??\c:\tjbnfhx.exec:\tjbnfhx.exe13⤵PID:2192
-
\??\c:\vffpn.exec:\vffpn.exe14⤵PID:2284
-
\??\c:\jljrvnv.exec:\jljrvnv.exe15⤵PID:2808
-
\??\c:\hnrjfr.exec:\hnrjfr.exe16⤵PID:2756
-
\??\c:\hhjdpn.exec:\hhjdpn.exe17⤵PID:2576
-
\??\c:\fpfpftr.exec:\fpfpftr.exe18⤵PID:2760
-
\??\c:\rpxnvpf.exec:\rpxnvpf.exe19⤵PID:2420
-
\??\c:\rtfndt.exec:\rtfndt.exe20⤵PID:2952
-
\??\c:\xppnrh.exec:\xppnrh.exe21⤵PID:2816
-
\??\c:\xndttn.exec:\xndttn.exe22⤵PID:2452
-
\??\c:\blvhf.exec:\blvhf.exe23⤵PID:1892
-
\??\c:\tbrpd.exec:\tbrpd.exe24⤵
- Executes dropped EXE
PID:2436 -
\??\c:\vfhxxbv.exec:\vfhxxbv.exe25⤵PID:1820
-
\??\c:\htfbltj.exec:\htfbltj.exe26⤵PID:1844
-
\??\c:\ldnpdlp.exec:\ldnpdlp.exe27⤵PID:1056
-
\??\c:\lnftbxf.exec:\lnftbxf.exe28⤵PID:1784
-
\??\c:\nndxph.exec:\nndxph.exe29⤵PID:268
-
\??\c:\rjhvd.exec:\rjhvd.exe30⤵PID:1648
-
\??\c:\lrvxdrl.exec:\lrvxdrl.exe31⤵PID:2100
-
\??\c:\blnxpdl.exec:\blnxpdl.exe32⤵PID:524
-
\??\c:\bhhjhfl.exec:\bhhjhfl.exe33⤵PID:2360
-
\??\c:\xtllpbj.exec:\xtllpbj.exe34⤵PID:2084
-
\??\c:\vlvjh.exec:\vlvjh.exe35⤵PID:1512
-
\??\c:\jdljrhl.exec:\jdljrhl.exe36⤵PID:1852
-
\??\c:\vfllphd.exec:\vfllphd.exe37⤵PID:3000
-
\??\c:\jvtvj.exec:\jvtvj.exe38⤵PID:1108
-
\??\c:\ptlffnx.exec:\ptlffnx.exe39⤵PID:108
-
\??\c:\vvhdhhf.exec:\vvhdhhf.exe40⤵PID:1580
-
\??\c:\xlhrx.exec:\xlhrx.exe41⤵PID:1192
-
\??\c:\vtfvnxr.exec:\vtfvnxr.exe42⤵PID:2248
-
\??\c:\pdfpj.exec:\pdfpj.exe43⤵PID:2152
-
-
-
-
-
\??\c:\lxprb.exec:\lxprb.exe40⤵PID:2156
-
\??\c:\hbtvfhb.exec:\hbtvfhb.exe41⤵PID:1276
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\jvjrhlp.exec:\jvjrhlp.exe16⤵PID:2188
-
\??\c:\pjbvxx.exec:\pjbvxx.exe17⤵PID:620
-
-
-
-
-
-
-
\??\c:\vvjbnb.exec:\vvjbnb.exe12⤵PID:2776
-
\??\c:\vhbnf.exec:\vhbnf.exe13⤵PID:932
-
\??\c:\fdtrjvl.exec:\fdtrjvl.exe14⤵PID:2620
-
\??\c:\bhbjf.exec:\bhbjf.exe15⤵PID:2040
-
\??\c:\rfhhj.exec:\rfhhj.exe16⤵PID:2660
-
\??\c:\vdblx.exec:\vdblx.exe17⤵PID:2536
-
\??\c:\pdtftb.exec:\pdtftb.exe18⤵PID:240
-
\??\c:\nrhllnp.exec:\nrhllnp.exe19⤵PID:1164
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\tpfbdvn.exec:\tpfbdvn.exe9⤵PID:2492
-
\??\c:\pvjfrt.exec:\pvjfrt.exe10⤵PID:2624
-
\??\c:\hhdxp.exec:\hhdxp.exe11⤵PID:1848
-
\??\c:\nrvbjxj.exec:\nrvbjxj.exe12⤵PID:696
-
\??\c:\hnrhf.exec:\hnrhf.exe13⤵PID:1520
-
\??\c:\tvvlhvf.exec:\tvvlhvf.exe14⤵PID:760
-
\??\c:\tvvfj.exec:\tvvfj.exe15⤵PID:2444
-
\??\c:\jbnjhv.exec:\jbnjhv.exe16⤵PID:2844
-
\??\c:\fjbfd.exec:\fjbfd.exe17⤵PID:1976
-
\??\c:\xtjhd.exec:\xtjhd.exe18⤵PID:312
-
\??\c:\nxtnpn.exec:\nxtnpn.exe19⤵PID:2760
-
\??\c:\npbrj.exec:\npbrj.exe20⤵PID:2004
-
\??\c:\jbnfrnx.exec:\jbnfrnx.exe21⤵PID:1404
-
\??\c:\fdhnnb.exec:\fdhnnb.exe22⤵PID:2412
-
\??\c:\hdfnnhx.exec:\hdfnnhx.exe23⤵PID:2452
-
\??\c:\pbbllpj.exec:\pbbllpj.exe24⤵PID:2448
-
\??\c:\dljnx.exec:\dljnx.exe25⤵PID:1996
-
\??\c:\fhhjlft.exec:\fhhjlft.exe26⤵PID:1880
-
\??\c:\vlvndp.exec:\vlvndp.exe27⤵PID:2372
-
\??\c:\hlvfh.exec:\hlvfh.exe28⤵PID:952
-
\??\c:\ptlvl.exec:\ptlvl.exe29⤵PID:2920
-
\??\c:\dppbj.exec:\dppbj.exe30⤵PID:792
-
\??\c:\nlrll.exec:\nlrll.exe31⤵PID:1100
-
\??\c:\lvjffp.exec:\lvjffp.exe32⤵PID:1084
-
\??\c:\vfntxfn.exec:\vfntxfn.exe33⤵PID:2100
-
\??\c:\nxfdtdl.exec:\nxfdtdl.exe34⤵PID:524
-
\??\c:\tddll.exec:\tddll.exe35⤵PID:1552
-
\??\c:\pvhlfx.exec:\pvhlfx.exe36⤵PID:2084
-
\??\c:\pltxbh.exec:\pltxbh.exe37⤵PID:112
-
\??\c:\xhtpd.exec:\xhtpd.exe38⤵PID:1476
-
\??\c:\lprhxn.exec:\lprhxn.exe39⤵PID:1160
-
\??\c:\vpdxdf.exec:\vpdxdf.exe40⤵PID:1644
-
\??\c:\xpxbpv.exec:\xpxbpv.exe41⤵PID:1616
-
\??\c:\lpjbjb.exec:\lpjbjb.exe42⤵PID:576
-
\??\c:\fdvxl.exec:\fdvxl.exe43⤵PID:1044
-
\??\c:\tndhrhj.exec:\tndhrhj.exe44⤵PID:2900
-
\??\c:\fhrbbpr.exec:\fhrbbpr.exe45⤵PID:2120
-
\??\c:\xpnhvfn.exec:\xpnhvfn.exe46⤵PID:940
-
\??\c:\frhdb.exec:\frhdb.exe47⤵PID:2664
-
\??\c:\jdnflj.exec:\jdnflj.exe48⤵PID:3056
-
\??\c:\fnjbxl.exec:\fnjbxl.exe49⤵PID:2880
-
\??\c:\vjfpvfd.exec:\vjfpvfd.exe50⤵PID:2256
-
\??\c:\tbbnv.exec:\tbbnv.exe51⤵PID:2704
-
\??\c:\njlpb.exec:\njlpb.exe52⤵PID:2668
-
\??\c:\txjbnnt.exec:\txjbnnt.exe53⤵PID:2616
-
\??\c:\jhfvfr.exec:\jhfvfr.exe54⤵PID:2892
-
\??\c:\rvndrft.exec:\rvndrft.exe55⤵PID:2584
-
\??\c:\xrxnbbb.exec:\xrxnbbb.exe56⤵PID:2208
-
\??\c:\fhlljv.exec:\fhlljv.exe57⤵PID:2988
-
\??\c:\jvfpl.exec:\jvfpl.exe58⤵PID:2680
-
-
-
-
\??\c:\hvpdn.exec:\hvpdn.exe56⤵PID:2208
-
\??\c:\nrhnf.exec:\nrhnf.exe57⤵PID:1848
-
\??\c:\fndvb.exec:\fndvb.exe58⤵PID:812
-
\??\c:\bfphlp.exec:\bfphlp.exe59⤵PID:1688
-
\??\c:\rdhfr.exec:\rdhfr.exe60⤵PID:2056
-
\??\c:\pxrfjrb.exec:\pxrfjrb.exe61⤵PID:1536
-
-
-
-
-
-
-
-
-
\??\c:\xnpll.exec:\xnpll.exe54⤵PID:2660
-
\??\c:\hrfjvdd.exec:\hrfjvdd.exe55⤵PID:1380
-
\??\c:\jvdrxjd.exec:\jvdrxjd.exe56⤵PID:940
-
\??\c:\bfbxnv.exec:\bfbxnv.exe57⤵PID:2520
-
\??\c:\vdtlp.exec:\vdtlp.exe58⤵PID:2200
-
\??\c:\vfnnv.exec:\vfnnv.exe59⤵PID:2512
-
\??\c:\bbftp.exec:\bbftp.exe60⤵PID:2984
-
\??\c:\rbjtj.exec:\rbjtj.exe61⤵PID:2980
-
\??\c:\vpftvnv.exec:\vpftvnv.exe62⤵PID:2008
-
\??\c:\jxjtrr.exec:\jxjtrr.exe63⤵PID:2012
-
\??\c:\pjlthn.exec:\pjlthn.exe64⤵PID:1536
-
\??\c:\rnrdh.exec:\rnrdh.exe65⤵PID:2960
-
\??\c:\ppjdvp.exec:\ppjdvp.exe66⤵PID:2752
-
\??\c:\ljjll.exec:\ljjll.exe67⤵PID:1304
-
\??\c:\nrxld.exec:\nrxld.exe68⤵PID:1976
-
\??\c:\rfhxtxt.exec:\rfhxtxt.exe69⤵PID:2696
-
\??\c:\dffljv.exec:\dffljv.exe70⤵PID:2420
-
\??\c:\tbfjr.exec:\tbfjr.exe71⤵PID:2464
-
\??\c:\rbtvvp.exec:\rbtvvp.exe72⤵PID:2016
-
\??\c:\xnvprtt.exec:\xnvprtt.exe73⤵PID:1072
-
\??\c:\lrvrfd.exec:\lrvrfd.exe74⤵PID:2448
-
\??\c:\vfbrfj.exec:\vfbrfj.exe75⤵PID:1068
-
\??\c:\jthbbn.exec:\jthbbn.exe76⤵PID:2324
-
\??\c:\npbhrfp.exec:\npbhrfp.exe77⤵PID:2604
-
\??\c:\vbnjdnv.exec:\vbnjdnv.exe78⤵PID:2904
-
\??\c:\vnrxdrt.exec:\vnrxdrt.exe79⤵PID:792
-
\??\c:\fbhjbhl.exec:\fbhjbhl.exe80⤵PID:2560
-
\??\c:\hrpjr.exec:\hrpjr.exe81⤵PID:2092
-
\??\c:\rnbdn.exec:\rnbdn.exe82⤵PID:776
-
\??\c:\lbdrht.exec:\lbdrht.exe83⤵PID:1168
-
\??\c:\ljrlv.exec:\ljrlv.exe84⤵PID:1296
-
\??\c:\rbdxv.exec:\rbdxv.exe85⤵PID:112
-
\??\c:\xllrnp.exec:\xllrnp.exe86⤵PID:2956
-
\??\c:\rnxdjv.exec:\rnxdjv.exe87⤵PID:2948
-
\??\c:\hpjljtv.exec:\hpjljtv.exe88⤵PID:1940
-
\??\c:\jjvljn.exec:\jjvljn.exe89⤵PID:2944
-
\??\c:\pfhbxb.exec:\pfhbxb.exe90⤵PID:2032
-
\??\c:\tpfdv.exec:\tpfdv.exe91⤵PID:1192
-
\??\c:\lbtbrn.exec:\lbtbrn.exe92⤵PID:1776
-
\??\c:\pbnrd.exec:\pbnrd.exe93⤵PID:2380
-
\??\c:\bvtlbdj.exec:\bvtlbdj.exe94⤵PID:2792
-
\??\c:\hnhjn.exec:\hnhjn.exe95⤵PID:3056
-
\??\c:\lxdft.exec:\lxdft.exe96⤵PID:2304
-
\??\c:\rpfbnp.exec:\rpfbnp.exe97⤵PID:1836
-
\??\c:\xrljh.exec:\xrljh.exe98⤵PID:3036
-
\??\c:\bvjvrbr.exec:\bvjvrbr.exe99⤵PID:2668
-
\??\c:\djbrvff.exec:\djbrvff.exe100⤵PID:1636
-
\??\c:\jdxldph.exec:\jdxldph.exe101⤵PID:2744
-
\??\c:\hxdhn.exec:\hxdhn.exe102⤵PID:2648
-
\??\c:\jbvftbv.exec:\jbvftbv.exe103⤵PID:2552
-
\??\c:\ldblx.exec:\ldblx.exe104⤵PID:2848
-
\??\c:\rjdxnjt.exec:\rjdxnjt.exe105⤵PID:2492
-
\??\c:\jlnvnxn.exec:\jlnvnxn.exe106⤵PID:1516
-
\??\c:\fvntpxh.exec:\fvntpxh.exe107⤵PID:1164
-
\??\c:\nfbrvh.exec:\nfbrvh.exe108⤵PID:1520
-
\??\c:\dbfdxf.exec:\dbfdxf.exe109⤵PID:1300
-
\??\c:\dxljxp.exec:\dxljxp.exe110⤵PID:1524
-
\??\c:\dnfbtb.exec:\dnfbtb.exe111⤵PID:2188
-
\??\c:\nlhddjd.exec:\nlhddjd.exe112⤵PID:1816
-
\??\c:\rrnlp.exec:\rrnlp.exe113⤵PID:1120
-
\??\c:\lvvpd.exec:\lvvpd.exe114⤵PID:2608
-
\??\c:\rbxdhxr.exec:\rbxdhxr.exe115⤵PID:2576
-
\??\c:\jtbtf.exec:\jtbtf.exe116⤵PID:1568
-
\??\c:\tldtx.exec:\tldtx.exe117⤵PID:2824
-
\??\c:\pblxt.exec:\pblxt.exe118⤵PID:2828
-
\??\c:\bftbbl.exec:\bftbbl.exe119⤵PID:1872
-
-
-
\??\c:\rxrdln.exec:\rxrdln.exe118⤵PID:1584
-
\??\c:\fdvbjnf.exec:\fdvbjnf.exe119⤵PID:2160
-
\??\c:\pjjnhl.exec:\pjjnhl.exe120⤵PID:2952
-
\??\c:\rfpfx.exec:\rfpfx.exe121⤵PID:1280
-
-
-
-
-
-
-
-
\??\c:\jdhtpp.exec:\jdhtpp.exe115⤵PID:312
-
\??\c:\xdxnrxp.exec:\xdxnrxp.exe116⤵PID:1956
-
\??\c:\rfttf.exec:\rfttf.exe117⤵PID:1960
-
\??\c:\fvlll.exec:\fvlll.exe118⤵PID:1844
-
\??\c:\bvvfdhf.exec:\bvvfdhf.exe119⤵PID:2456
-
\??\c:\tbtfhnb.exec:\tbtfhnb.exe120⤵PID:320
-
\??\c:\vndrpj.exec:\vndrpj.exe121⤵PID:1360
-
\??\c:\jnbnprl.exec:\jnbnprl.exe122⤵PID:2448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-