Analysis
-
max time kernel
101s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01/11/2023, 14:20
Behavioral task
behavioral1
Sample
NEAS.cf504052d1e3389d486926a6980c1c60.exe
Resource
win7-20231020-en
5 signatures
150 seconds
General
-
Target
NEAS.cf504052d1e3389d486926a6980c1c60.exe
-
Size
133KB
-
MD5
cf504052d1e3389d486926a6980c1c60
-
SHA1
b55af8e29681448418671629ae3986c3d65c86f7
-
SHA256
f5989548553ba1ce86b28c2687c726570918183198f7ca63733fac5b35cad64a
-
SHA512
ee70aa254c893ade9d1711872ee9bb26dab1615cbd2bc4a7800bedfc0e6ed024a19a3b5e0362bef126b0bb56f55768ceaf1944663f6ae3c56bfaba875409b593
-
SSDEEP
3072:9hOmTsF93UYfwC6GIoutz5yLpcgDE4J/CyCB2y:9cm4FmowdHoS4/8Qy
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/1792-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3472-13-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1472-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1384-24-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3140-21-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5024-32-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3644-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2220-42-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/456-46-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3880-52-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1396-55-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2312-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2820-76-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3528-83-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1688-94-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3900-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1548-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1064-158-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5012-164-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3584-180-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/432-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3496-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3792-202-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4384-205-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1412-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/492-222-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3912-227-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4348-225-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1696-237-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3140-245-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1140-214-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3192-260-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1680-177-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3572-172-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1112-169-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3380-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3880-266-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2068-129-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1720-124-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4744-112-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2476-108-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3144-280-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2924-284-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3064-294-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2300-303-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4540-338-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3756-364-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2500-368-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/544-376-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1676-382-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4724-403-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3184-428-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4252-461-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2436-471-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4924-490-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1540-528-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/112-537-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3928-566-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1288-576-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1388-579-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3308-714-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3864-977-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3328-1246-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3144-1382-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1472 fprjd.exe 3472 vrvbbpr.exe 3140 ntbrpr.exe 1384 vvnrd.exe 5024 llpfd.exe 3644 bnlfjx.exe 2220 hbttt.exe 456 jjvhtt.exe 3880 jdvxhnv.exe 1396 lvtvhhh.exe 4488 rvdrd.exe 2312 Conhost.exe 4040 fljxh.exe 2820 brxljpj.exe 3528 bptvb.exe 2680 pxttf.exe 1688 fjpxrp.exe 3080 rhtbrd.exe 2740 jtbff.exe 2476 dnlxj.exe 4744 bfntdf.exe 3900 pljxxr.exe 1720 djvbv.exe 2068 dxpjt.exe 1548 hddppb.exe 4864 dndhn.exe 5008 pffdpl.exe 3380 lpxltrn.exe 1064 xjhdrvd.exe 5012 txlhr.exe 1112 pxnjx.exe 3572 bfhvd.exe 1680 fnttjd.exe 3584 vhpxbxb.exe 1168 pftdt.exe 972 jvbbl.exe 432 vlhdhd.exe 1608 xxpbpjj.exe 3496 dfjjd.exe 2336 dnbdtnt.exe 3792 hhlpvdt.exe 4384 ddrhtb.exe 4520 jtbptdj.exe 4116 rfblxxt.exe 1140 fthxfln.exe 1412 rhlvj.exe 492 nrrtt.exe 4348 fhlxb.exe 3912 fdnlhl.exe 112 tjnpbpl.exe 4320 jrvdrtn.exe 1696 htldpp.exe 3276 xrdhbl.exe 3140 jpbpf.exe 4280 dbtlrjd.exe 2684 nlnnp.exe 2844 lhffx.exe 3928 ldhrx.exe 3192 hdxxdfx.exe 1948 nlplxt.exe 3880 xxtxd.exe 5076 drphhr.exe 2340 fbprhn.exe 4632 npphvfp.exe -
resource yara_rule behavioral2/memory/1792-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000022d85-4.dat upx behavioral2/memory/1792-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000022d88-9.dat upx behavioral2/memory/1472-5-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0008000000022d85-3.dat upx behavioral2/files/0x0006000000022d8d-15.dat upx behavioral2/memory/3472-13-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022d8d-17.dat upx behavioral2/files/0x0006000000022d8d-12.dat upx behavioral2/memory/1472-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0007000000022d88-10.dat upx behavioral2/files/0x0006000000022d8e-20.dat upx behavioral2/files/0x0006000000022d90-27.dat upx behavioral2/memory/1384-24-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022d90-28.dat upx behavioral2/files/0x0006000000022d8e-22.dat upx behavioral2/memory/3140-21-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022d91-31.dat upx behavioral2/files/0x0006000000022d91-33.dat upx behavioral2/memory/5024-32-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3644-37-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022d92-38.dat upx behavioral2/files/0x0006000000022d92-36.dat upx behavioral2/memory/2220-42-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022d93-43.dat upx behavioral2/files/0x0006000000022d93-41.dat upx behavioral2/memory/456-46-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022d95-47.dat upx behavioral2/files/0x0006000000022d95-48.dat upx behavioral2/files/0x0006000000022d97-51.dat upx behavioral2/memory/3880-52-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1396-55-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022d98-59.dat upx behavioral2/files/0x0006000000022d98-58.dat upx behavioral2/files/0x0006000000022d97-53.dat upx behavioral2/files/0x0006000000022d99-62.dat upx behavioral2/files/0x0006000000022d99-64.dat upx behavioral2/files/0x0006000000022d9a-67.dat upx behavioral2/files/0x0006000000022d9a-69.dat upx behavioral2/memory/2312-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022d9b-74.dat upx behavioral2/memory/2820-76-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022d9b-72.dat upx behavioral2/files/0x0006000000022d9c-79.dat upx behavioral2/files/0x0006000000022d9c-80.dat upx behavioral2/memory/3528-83-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022d9d-84.dat upx behavioral2/files/0x0006000000022d9d-85.dat upx behavioral2/files/0x0006000000022d9e-88.dat upx behavioral2/files/0x0006000000022d9e-90.dat upx behavioral2/memory/1688-94-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022da0-95.dat upx behavioral2/files/0x0006000000022da1-99.dat upx behavioral2/files/0x0006000000022da1-100.dat upx behavioral2/files/0x0006000000022da3-109.dat upx behavioral2/memory/3900-118-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022da7-133.dat upx behavioral2/memory/1548-136-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/files/0x0006000000022da8-140.dat upx behavioral2/files/0x0006000000022da8-139.dat upx behavioral2/files/0x0006000000022da7-134.dat upx behavioral2/files/0x0006000000022da9-143.dat upx behavioral2/files/0x0006000000022da9-145.dat upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1472 1792 NEAS.cf504052d1e3389d486926a6980c1c60.exe 84 PID 1792 wrote to memory of 1472 1792 NEAS.cf504052d1e3389d486926a6980c1c60.exe 84 PID 1792 wrote to memory of 1472 1792 NEAS.cf504052d1e3389d486926a6980c1c60.exe 84 PID 1472 wrote to memory of 3472 1472 fprjd.exe 85 PID 1472 wrote to memory of 3472 1472 fprjd.exe 85 PID 1472 wrote to memory of 3472 1472 fprjd.exe 85 PID 3472 wrote to memory of 3140 3472 vrvbbpr.exe 86 PID 3472 wrote to memory of 3140 3472 vrvbbpr.exe 86 PID 3472 wrote to memory of 3140 3472 vrvbbpr.exe 86 PID 3140 wrote to memory of 1384 3140 ntbrpr.exe 87 PID 3140 wrote to memory of 1384 3140 ntbrpr.exe 87 PID 3140 wrote to memory of 1384 3140 ntbrpr.exe 87 PID 1384 wrote to memory of 5024 1384 vvnrd.exe 88 PID 1384 wrote to memory of 5024 1384 vvnrd.exe 88 PID 1384 wrote to memory of 5024 1384 vvnrd.exe 88 PID 5024 wrote to memory of 3644 5024 llpfd.exe 89 PID 5024 wrote to memory of 3644 5024 llpfd.exe 89 PID 5024 wrote to memory of 3644 5024 llpfd.exe 89 PID 3644 wrote to memory of 2220 3644 bnlfjx.exe 90 PID 3644 wrote to memory of 2220 3644 bnlfjx.exe 90 PID 3644 wrote to memory of 2220 3644 bnlfjx.exe 90 PID 2220 wrote to memory of 456 2220 hbttt.exe 91 PID 2220 wrote to memory of 456 2220 hbttt.exe 91 PID 2220 wrote to memory of 456 2220 hbttt.exe 91 PID 456 wrote to memory of 3880 456 jjvhtt.exe 92 PID 456 wrote to memory of 3880 456 jjvhtt.exe 92 PID 456 wrote to memory of 3880 456 jjvhtt.exe 92 PID 3880 wrote to memory of 1396 3880 jdvxhnv.exe 93 PID 3880 wrote to memory of 1396 3880 jdvxhnv.exe 93 PID 3880 wrote to memory of 1396 3880 jdvxhnv.exe 93 PID 1396 wrote to memory of 4488 1396 lvtvhhh.exe 94 PID 1396 wrote to memory of 4488 1396 lvtvhhh.exe 94 PID 1396 wrote to memory of 4488 1396 lvtvhhh.exe 94 PID 4488 wrote to memory of 2312 4488 rvdrd.exe 151 PID 4488 wrote to memory of 2312 4488 rvdrd.exe 151 PID 4488 wrote to memory of 2312 4488 rvdrd.exe 151 PID 2312 wrote to memory of 4040 2312 Conhost.exe 96 PID 2312 wrote to memory of 4040 2312 Conhost.exe 96 PID 2312 wrote to memory of 4040 2312 Conhost.exe 96 PID 4040 wrote to memory of 2820 4040 fljxh.exe 97 PID 4040 wrote to memory of 2820 4040 fljxh.exe 97 PID 4040 wrote to memory of 2820 4040 fljxh.exe 97 PID 2820 wrote to memory of 3528 2820 brxljpj.exe 98 PID 2820 wrote to memory of 3528 2820 brxljpj.exe 98 PID 2820 wrote to memory of 3528 2820 brxljpj.exe 98 PID 3528 wrote to memory of 2680 3528 bptvb.exe 99 PID 3528 wrote to memory of 2680 3528 bptvb.exe 99 PID 3528 wrote to memory of 2680 3528 bptvb.exe 99 PID 2680 wrote to memory of 1688 2680 pxttf.exe 100 PID 2680 wrote to memory of 1688 2680 pxttf.exe 100 PID 2680 wrote to memory of 1688 2680 pxttf.exe 100 PID 1688 wrote to memory of 3080 1688 fjpxrp.exe 101 PID 1688 wrote to memory of 3080 1688 fjpxrp.exe 101 PID 1688 wrote to memory of 3080 1688 fjpxrp.exe 101 PID 3080 wrote to memory of 2740 3080 rhtbrd.exe 150 PID 3080 wrote to memory of 2740 3080 rhtbrd.exe 150 PID 3080 wrote to memory of 2740 3080 rhtbrd.exe 150 PID 2740 wrote to memory of 2476 2740 jtbff.exe 149 PID 2740 wrote to memory of 2476 2740 jtbff.exe 149 PID 2740 wrote to memory of 2476 2740 jtbff.exe 149 PID 2476 wrote to memory of 4744 2476 dnlxj.exe 148 PID 2476 wrote to memory of 4744 2476 dnlxj.exe 148 PID 2476 wrote to memory of 4744 2476 dnlxj.exe 148 PID 4744 wrote to memory of 3900 4744 bfntdf.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.cf504052d1e3389d486926a6980c1c60.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.cf504052d1e3389d486926a6980c1c60.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
\??\c:\fprjd.exec:\fprjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
\??\c:\vrvbbpr.exec:\vrvbbpr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
\??\c:\ntbrpr.exec:\ntbrpr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
\??\c:\vvnrd.exec:\vvnrd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
\??\c:\llpfd.exec:\llpfd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
\??\c:\bnlfjx.exec:\bnlfjx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3644 -
\??\c:\hbttt.exec:\hbttt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
\??\c:\jjvhtt.exec:\jjvhtt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
\??\c:\jdvxhnv.exec:\jdvxhnv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
\??\c:\lvtvhhh.exec:\lvtvhhh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1396 -
\??\c:\rvdrd.exec:\rvdrd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\jfvntd.exec:\jfvntd.exe13⤵PID:2312
-
\??\c:\fljxh.exec:\fljxh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
\??\c:\brxljpj.exec:\brxljpj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\bptvb.exec:\bptvb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
\??\c:\pxttf.exec:\pxttf.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\fjpxrp.exec:\fjpxrp.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
\??\c:\rhtbrd.exec:\rhtbrd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3080 -
\??\c:\jtbff.exec:\jtbff.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\dbtlrjd.exec:\dbtlrjd.exe5⤵
- Executes dropped EXE
PID:4280
-
-
-
-
-
\??\c:\pljxxr.exec:\pljxxr.exe1⤵
- Executes dropped EXE
PID:3900 -
\??\c:\djvbv.exec:\djvbv.exe2⤵
- Executes dropped EXE
PID:1720
-
-
\??\c:\dndhn.exec:\dndhn.exe1⤵
- Executes dropped EXE
PID:4864 -
\??\c:\pffdpl.exec:\pffdpl.exe2⤵
- Executes dropped EXE
PID:5008
-
-
\??\c:\lpxltrn.exec:\lpxltrn.exe1⤵
- Executes dropped EXE
PID:3380 -
\??\c:\xjhdrvd.exec:\xjhdrvd.exe2⤵
- Executes dropped EXE
PID:1064
-
-
\??\c:\txlhr.exec:\txlhr.exe1⤵
- Executes dropped EXE
PID:5012 -
\??\c:\pxnjx.exec:\pxnjx.exe2⤵
- Executes dropped EXE
PID:1112 -
\??\c:\bfhvd.exec:\bfhvd.exe3⤵
- Executes dropped EXE
PID:3572
-
-
-
\??\c:\hhlpvdt.exec:\hhlpvdt.exe1⤵
- Executes dropped EXE
PID:3792 -
\??\c:\ddrhtb.exec:\ddrhtb.exe2⤵
- Executes dropped EXE
PID:4384
-
-
\??\c:\jtbptdj.exec:\jtbptdj.exe1⤵
- Executes dropped EXE
PID:4520 -
\??\c:\rfblxxt.exec:\rfblxxt.exe2⤵
- Executes dropped EXE
PID:4116 -
\??\c:\fthxfln.exec:\fthxfln.exe3⤵
- Executes dropped EXE
PID:1140 -
\??\c:\rhlvj.exec:\rhlvj.exe4⤵
- Executes dropped EXE
PID:1412 -
\??\c:\nrrtt.exec:\nrrtt.exe5⤵
- Executes dropped EXE
PID:492
-
-
-
-
-
\??\c:\fdnlhl.exec:\fdnlhl.exe1⤵
- Executes dropped EXE
PID:3912 -
\??\c:\tjnpbpl.exec:\tjnpbpl.exe2⤵
- Executes dropped EXE
PID:112 -
\??\c:\jrvdrtn.exec:\jrvdrtn.exe3⤵
- Executes dropped EXE
PID:4320 -
\??\c:\htldpp.exec:\htldpp.exe4⤵
- Executes dropped EXE
PID:1696
-
-
-
-
\??\c:\xrdhbl.exec:\xrdhbl.exe1⤵
- Executes dropped EXE
PID:3276 -
\??\c:\jpbpf.exec:\jpbpf.exe2⤵
- Executes dropped EXE
PID:3140
-
-
\??\c:\ldhrx.exec:\ldhrx.exe1⤵
- Executes dropped EXE
PID:3928 -
\??\c:\hdxxdfx.exec:\hdxxdfx.exe2⤵
- Executes dropped EXE
PID:3192 -
\??\c:\nlplxt.exec:\nlplxt.exe3⤵
- Executes dropped EXE
PID:1948 -
\??\c:\xxtxd.exec:\xxtxd.exe4⤵
- Executes dropped EXE
PID:3880 -
\??\c:\drphhr.exec:\drphhr.exe5⤵
- Executes dropped EXE
PID:5076 -
\??\c:\fbprhn.exec:\fbprhn.exe6⤵
- Executes dropped EXE
PID:2340 -
\??\c:\npphvfp.exec:\npphvfp.exe7⤵
- Executes dropped EXE
PID:4632 -
\??\c:\hbxfdt.exec:\hbxfdt.exe8⤵PID:3144
-
\??\c:\nrxdtf.exec:\nrxdtf.exe9⤵PID:2924
-
\??\c:\xvdtddf.exec:\xvdtddf.exe10⤵PID:648
-
\??\c:\trthr.exec:\trthr.exe11⤵PID:3064
-
\??\c:\rvhnlbj.exec:\rvhnlbj.exe12⤵PID:4092
-
\??\c:\tlhnnv.exec:\tlhnnv.exe13⤵PID:4712
-
\??\c:\dxtjbpv.exec:\dxtjbpv.exe14⤵PID:2300
-
\??\c:\vnjbpnv.exec:\vnjbpnv.exe15⤵PID:1800
-
\??\c:\npnbr.exec:\npnbr.exe16⤵PID:3808
-
\??\c:\fnndfxd.exec:\fnndfxd.exe17⤵PID:3872
-
\??\c:\ttbdvjt.exec:\ttbdvjt.exe18⤵PID:3000
-
\??\c:\rxjnjh.exec:\rxjnjh.exe19⤵PID:3160
-
\??\c:\rjdjpvx.exec:\rjdjpvx.exe20⤵PID:1820
-
\??\c:\lfxhddb.exec:\lfxhddb.exe21⤵PID:224
-
\??\c:\jhndb.exec:\jhndb.exe22⤵PID:4592
-
\??\c:\jlppt.exec:\jlppt.exe23⤵PID:3524
-
\??\c:\btrnx.exec:\btrnx.exe24⤵PID:2944
-
\??\c:\njrpfd.exec:\njrpfd.exe25⤵PID:960
-
\??\c:\lxtfpbx.exec:\lxtfpbx.exe26⤵PID:4540
-
\??\c:\xvfltld.exec:\xvfltld.exe27⤵PID:3748
-
\??\c:\pxnrlx.exec:\pxnrlx.exe28⤵PID:1808
-
\??\c:\tdnth.exec:\tdnth.exe29⤵PID:4004
-
\??\c:\trvtdbv.exec:\trvtdbv.exe30⤵PID:2432
-
\??\c:\lddjfb.exec:\lddjfb.exe31⤵PID:4300
-
\??\c:\lptlff.exec:\lptlff.exe32⤵PID:3560
-
\??\c:\ndjltjx.exec:\ndjltjx.exe33⤵PID:3756
-
\??\c:\xbnbl.exec:\xbnbl.exe34⤵PID:1564
-
\??\c:\ldlltpn.exec:\ldlltpn.exe35⤵PID:2500
-
\??\c:\vjxlvp.exec:\vjxlvp.exe36⤵PID:1340
-
\??\c:\xjvphxr.exec:\xjvphxr.exe37⤵PID:544
-
\??\c:\tpbrjp.exec:\tpbrjp.exe38⤵PID:1676
-
\??\c:\hhhnvx.exec:\hhhnvx.exe39⤵PID:3920
-
\??\c:\tnffpjr.exec:\tnffpjr.exe40⤵PID:4000
-
\??\c:\xjlhx.exec:\xjlhx.exe41⤵PID:4568
-
\??\c:\hvbfb.exec:\hvbfb.exe42⤵PID:3208
-
\??\c:\rjhlpxd.exec:\rjhlpxd.exe43⤵PID:4912
-
\??\c:\hrdxfbx.exec:\hrdxfbx.exe44⤵PID:2956
-
\??\c:\drbrhp.exec:\drbrhp.exe45⤵PID:4724
-
\??\c:\txhvb.exec:\txhvb.exe46⤵PID:4708
-
\??\c:\nlxbn.exec:\nlxbn.exe47⤵PID:2812
-
\??\c:\hprljv.exec:\hprljv.exe48⤵PID:4700
-
\??\c:\rxbdl.exec:\rxbdl.exe49⤵PID:3928
-
\??\c:\fnjvt.exec:\fnjvt.exe50⤵PID:2084
-
\??\c:\fbhvtp.exec:\fbhvtp.exe51⤵PID:1388
-
\??\c:\vdhdf.exec:\vdhdf.exe52⤵PID:1396
-
\??\c:\xtjnd.exec:\xtjnd.exe53⤵PID:1740
-
\??\c:\xvddtlr.exec:\xvddtlr.exe54⤵PID:3184
-
\??\c:\bjrdtd.exec:\bjrdtd.exe55⤵PID:4040
-
\??\c:\xtpdp.exec:\xtpdp.exe56⤵PID:2888
-
\??\c:\nljdb.exec:\nljdb.exe57⤵PID:4016
-
\??\c:\npdnprj.exec:\npdnprj.exe58⤵PID:3064
-
\??\c:\htnjjr.exec:\htnjjr.exe59⤵PID:1192
-
\??\c:\hpbffn.exec:\hpbffn.exe60⤵PID:4536
-
\??\c:\nvnjd.exec:\nvnjd.exe61⤵PID:1856
-
\??\c:\rnplj.exec:\rnplj.exe62⤵PID:4956
-
\??\c:\rtvpdvl.exec:\rtvpdvl.exe63⤵PID:1720
-
\??\c:\rtppdhh.exec:\rtppdhh.exe64⤵PID:4252
-
\??\c:\nxrbtd.exec:\nxrbtd.exe65⤵PID:956
-
\??\c:\dpvhtdn.exec:\dpvhtdn.exe66⤵PID:2436
-
\??\c:\xvtvpnx.exec:\xvtvpnx.exe67⤵PID:1708
-
\??\c:\pxtvv.exec:\pxtvv.exe68⤵PID:2464
-
\??\c:\rxbbh.exec:\rxbbh.exe69⤵PID:4920
-
\??\c:\tflbxd.exec:\tflbxd.exe70⤵PID:2944
-
\??\c:\bnfrpln.exec:\bnfrpln.exe71⤵PID:1736
-
\??\c:\fdxxbx.exec:\fdxxbx.exe72⤵PID:400
-
\??\c:\vhddbll.exec:\vhddbll.exe73⤵PID:4924
-
\??\c:\dpldrdb.exec:\dpldrdb.exe74⤵PID:4852
-
\??\c:\fxbrxt.exec:\fxbrxt.exe75⤵PID:4600
-
\??\c:\tjhdhpp.exec:\tjhdhpp.exe76⤵PID:1608
-
\??\c:\vrvjh.exec:\vrvjh.exe77⤵PID:4192
-
\??\c:\bnnphnr.exec:\bnnphnr.exe78⤵PID:4764
-
\??\c:\lbnrlv.exec:\lbnrlv.exe79⤵PID:736
-
\??\c:\ltdhnhr.exec:\ltdhnhr.exe80⤵PID:3108
-
\??\c:\bpddtvf.exec:\bpddtvf.exe81⤵PID:3996
-
\??\c:\jnjxv.exec:\jnjxv.exe82⤵PID:440
-
\??\c:\vfbxtf.exec:\vfbxtf.exe83⤵PID:2052
-
\??\c:\vhxjbj.exec:\vhxjbj.exe84⤵PID:2596
-
\??\c:\vdjvbvt.exec:\vdjvbvt.exe85⤵PID:1540
-
\??\c:\lhddpr.exec:\lhddpr.exe86⤵PID:4644
-
\??\c:\brhtxl.exec:\brhtxl.exe87⤵PID:4212
-
\??\c:\hbdvf.exec:\hbdvf.exe88⤵PID:112
-
\??\c:\bxlxftn.exec:\bxlxftn.exe89⤵PID:3312
-
\??\c:\xnthpxt.exec:\xnthpxt.exe90⤵PID:5032
-
\??\c:\tvxvdfh.exec:\tvxvdfh.exe91⤵PID:4608
-
\??\c:\tljnlt.exec:\tljnlt.exe92⤵PID:1188
-
\??\c:\dvpfv.exec:\dvpfv.exe93⤵PID:1724
-
\??\c:\bdbrt.exec:\bdbrt.exe94⤵PID:4480
-
\??\c:\lvppt.exec:\lvppt.exe95⤵PID:2812
-
\??\c:\bnvhlbx.exec:\bnvhlbx.exe96⤵PID:2844
-
\??\c:\dtbdvpn.exec:\dtbdvpn.exe97⤵PID:3928
-
\??\c:\prplt.exec:\prplt.exe98⤵PID:2084
-
\??\c:\djpjt.exec:\djpjt.exe99⤵PID:1288
-
\??\c:\jhrpfnl.exec:\jhrpfnl.exe100⤵PID:1388
-
\??\c:\vxnpj.exec:\vxnpj.exe101⤵PID:4632
-
\??\c:\xljrjb.exec:\xljrjb.exe102⤵PID:2820
-
\??\c:\bhrjvvd.exec:\bhrjvvd.exe103⤵PID:1688
-
\??\c:\jdvbx.exec:\jdvbx.exe104⤵PID:4092
-
\??\c:\ddpdxnr.exec:\ddpdxnr.exe105⤵PID:1192
-
\??\c:\fjjfjnh.exec:\fjjfjnh.exe106⤵PID:4536
-
\??\c:\bltjxr.exec:\bltjxr.exe107⤵PID:4744
-
\??\c:\xtfjtbp.exec:\xtfjtbp.exe108⤵PID:2608
-
\??\c:\hdxhj.exec:\hdxhj.exe109⤵PID:3980
-
\??\c:\xdvrhf.exec:\xdvrhf.exe110⤵PID:4252
-
\??\c:\xjdlbxt.exec:\xjdlbxt.exe111⤵PID:956
-
\??\c:\ttxbp.exec:\ttxbp.exe112⤵PID:2808
-
\??\c:\jbllb.exec:\jbllb.exe113⤵PID:2436
-
\??\c:\rjbfppr.exec:\rjbfppr.exe114⤵PID:4860
-
\??\c:\pfjdl.exec:\pfjdl.exe115⤵PID:4456
-
\??\c:\bttdt.exec:\bttdt.exe116⤵PID:1640
-
\??\c:\pvrthb.exec:\pvrthb.exe117⤵PID:4188
-
\??\c:\tnndjx.exec:\tnndjx.exe118⤵PID:4400
-
\??\c:\tnpdnnr.exec:\tnpdnnr.exe119⤵PID:4924
-
\??\c:\xhbtnx.exec:\xhbtnx.exe120⤵PID:4300
-
\??\c:\fvjrpnl.exec:\fvjrpnl.exe121⤵PID:4392
-
\??\c:\lvrlt.exec:\lvrlt.exe122⤵PID:3304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-