Analysis
-
max time kernel
24s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2023 11:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.4b653a81e765bfe0813812fe8ae1c2e0_JC.exe
Resource
win7-20231025-en
windows7-x64
5 signatures
150 seconds
General
-
Target
NEAS.4b653a81e765bfe0813812fe8ae1c2e0_JC.exe
-
Size
68KB
-
MD5
4b653a81e765bfe0813812fe8ae1c2e0
-
SHA1
f7a2f9f1c7085f9b5b524f2c7d801d4bf7851bd8
-
SHA256
c44d227c5f6ea7f1a3f980a0c7f64b4745ceaad2fe79892a0f749b4a5c54d2c2
-
SHA512
d8d155dfb17545839812affb6b27d658d4dd646d866e8af88d3048fa0dfec9197589e52fccdda1748c007ee1c6030429b42441df56cf475c89de7d634d4aab93
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIkpi+qmP3mT:ymb3NkkiQ3mdBjFIj+qmi
Malware Config
Signatures
-
Detect Blackmoon payload 38 IoCs
resource yara_rule behavioral2/memory/3144-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2728-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4464-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1032-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/712-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/952-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3628-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4416-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3176-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4584-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1876-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1876-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1456-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2192-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3008-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4000-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2564-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4284-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1268-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4532-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1488-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5060-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4716-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4928-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3688-218-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2928-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3384-229-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3384-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/856-245-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1132-249-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2788-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4832-269-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1660-279-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3400-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3468-290-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4428-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4820-302-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2148-316-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2728 jlnnpxb.exe 4464 fdhptl.exe 1032 vxrdf.exe 712 dnnrrl.exe 952 hnvnxx.exe 3628 frfdbpv.exe 4416 rvbvd.exe 3176 dbnpdp.exe 4584 ndhrtb.exe 1876 tfhrxv.exe 2320 tnbnpbj.exe 1456 fpxthn.exe 2192 vvhlffl.exe 3008 jfpnbnb.exe 4000 vdxhltt.exe 2564 vfltxv.exe 4284 nljxtlt.exe 1268 xbvdrjd.exe 4532 xjdppxp.exe 4556 nvxbt.exe 1488 dhrll.exe 5060 lnhnx.exe 4940 ddvvdhp.exe 4716 nbrbr.exe 4824 nvxxv.exe 4928 vhbhp.exe 212 vvbbv.exe 3940 hpxhh.exe 3688 lfjlbnr.exe 2928 vlvdrv.exe 3384 lljft.exe 3908 pdtfn.exe 856 xhfxnd.exe 1132 jtxlf.exe 2908 vvdnb.exe 2788 fdvff.exe 4832 nnfftn.exe 4784 bxfvxxj.exe 1660 xvlbnv.exe 1668 vpvdlv.exe 3400 rhpxdnb.exe 3468 jhvllbb.exe 4428 vpnvfnx.exe 4820 ffbpf.exe 4356 pdjxnp.exe 2148 btrjl.exe 3952 hvjpnp.exe 4564 jphrxd.exe 4336 bdnrlrn.exe 4836 ddbbt.exe 1092 ntvjht.exe 1912 fxvdn.exe 2384 tnvdl.exe 4868 dffnj.exe 220 ttfbnfn.exe 4456 tpnbp.exe 1184 htjprpb.exe 1528 lfhdjtf.exe 660 hlxhddj.exe 3032 fhvbbp.exe 4444 bbfffjp.exe 404 vvbdd.exe 2476 ltvhx.exe 3676 xlbxbf.exe -
resource yara_rule behavioral2/memory/3144-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3144-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2728-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4464-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4464-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1032-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1032-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/712-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/712-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/952-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3628-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4416-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3176-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3176-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4584-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4584-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1876-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1876-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2320-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1456-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2192-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2192-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3008-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4000-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2564-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2564-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4284-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1268-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4532-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4532-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1488-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1488-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5060-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4716-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4716-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4928-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/212-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3940-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3688-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3688-218-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2928-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3384-229-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3384-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3908-236-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/856-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/856-245-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1132-247-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1132-249-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2788-258-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2788-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4832-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4832-269-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1660-274-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1660-279-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3400-286-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3400-284-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3468-290-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4428-295-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4428-300-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4820-302-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4356-306-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2148-311-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2148-316-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 2728 3144 NEAS.4b653a81e765bfe0813812fe8ae1c2e0_JC.exe 84 PID 3144 wrote to memory of 2728 3144 NEAS.4b653a81e765bfe0813812fe8ae1c2e0_JC.exe 84 PID 3144 wrote to memory of 2728 3144 NEAS.4b653a81e765bfe0813812fe8ae1c2e0_JC.exe 84 PID 2728 wrote to memory of 4464 2728 jlnnpxb.exe 85 PID 2728 wrote to memory of 4464 2728 jlnnpxb.exe 85 PID 2728 wrote to memory of 4464 2728 jlnnpxb.exe 85 PID 4464 wrote to memory of 1032 4464 fdhptl.exe 86 PID 4464 wrote to memory of 1032 4464 fdhptl.exe 86 PID 4464 wrote to memory of 1032 4464 fdhptl.exe 86 PID 1032 wrote to memory of 712 1032 vxrdf.exe 87 PID 1032 wrote to memory of 712 1032 vxrdf.exe 87 PID 1032 wrote to memory of 712 1032 vxrdf.exe 87 PID 712 wrote to memory of 952 712 dnnrrl.exe 88 PID 712 wrote to memory of 952 712 dnnrrl.exe 88 PID 712 wrote to memory of 952 712 dnnrrl.exe 88 PID 952 wrote to memory of 3628 952 hnvnxx.exe 89 PID 952 wrote to memory of 3628 952 hnvnxx.exe 89 PID 952 wrote to memory of 3628 952 hnvnxx.exe 89 PID 3628 wrote to memory of 4416 3628 frfdbpv.exe 90 PID 3628 wrote to memory of 4416 3628 frfdbpv.exe 90 PID 3628 wrote to memory of 4416 3628 frfdbpv.exe 90 PID 4416 wrote to memory of 3176 4416 rvbvd.exe 91 PID 4416 wrote to memory of 3176 4416 rvbvd.exe 91 PID 4416 wrote to memory of 3176 4416 rvbvd.exe 91 PID 3176 wrote to memory of 4584 3176 dbnpdp.exe 92 PID 3176 wrote to memory of 4584 3176 dbnpdp.exe 92 PID 3176 wrote to memory of 4584 3176 dbnpdp.exe 92 PID 4584 wrote to memory of 1876 4584 ndhrtb.exe 93 PID 4584 wrote to memory of 1876 4584 ndhrtb.exe 93 PID 4584 wrote to memory of 1876 4584 ndhrtb.exe 93 PID 1876 wrote to memory of 2320 1876 tfhrxv.exe 94 PID 1876 wrote to memory of 2320 1876 tfhrxv.exe 94 PID 1876 wrote to memory of 2320 1876 tfhrxv.exe 94 PID 2320 wrote to memory of 1456 2320 tnbnpbj.exe 95 PID 2320 wrote to memory of 1456 2320 tnbnpbj.exe 95 PID 2320 wrote to memory of 1456 2320 tnbnpbj.exe 95 PID 1456 wrote to memory of 2192 1456 fpxthn.exe 96 PID 1456 wrote to memory of 2192 1456 fpxthn.exe 96 PID 1456 wrote to memory of 2192 1456 fpxthn.exe 96 PID 2192 wrote to memory of 3008 2192 vvhlffl.exe 97 PID 2192 wrote to memory of 3008 2192 vvhlffl.exe 97 PID 2192 wrote to memory of 3008 2192 vvhlffl.exe 97 PID 3008 wrote to memory of 4000 3008 jfpnbnb.exe 98 PID 3008 wrote to memory of 4000 3008 jfpnbnb.exe 98 PID 3008 wrote to memory of 4000 3008 jfpnbnb.exe 98 PID 4000 wrote to memory of 2564 4000 vdxhltt.exe 99 PID 4000 wrote to memory of 2564 4000 vdxhltt.exe 99 PID 4000 wrote to memory of 2564 4000 vdxhltt.exe 99 PID 2564 wrote to memory of 4284 2564 vfltxv.exe 100 PID 2564 wrote to memory of 4284 2564 vfltxv.exe 100 PID 2564 wrote to memory of 4284 2564 vfltxv.exe 100 PID 4284 wrote to memory of 1268 4284 nljxtlt.exe 101 PID 4284 wrote to memory of 1268 4284 nljxtlt.exe 101 PID 4284 wrote to memory of 1268 4284 nljxtlt.exe 101 PID 1268 wrote to memory of 4532 1268 xbvdrjd.exe 102 PID 1268 wrote to memory of 4532 1268 xbvdrjd.exe 102 PID 1268 wrote to memory of 4532 1268 xbvdrjd.exe 102 PID 4532 wrote to memory of 4556 4532 xjdppxp.exe 103 PID 4532 wrote to memory of 4556 4532 xjdppxp.exe 103 PID 4532 wrote to memory of 4556 4532 xjdppxp.exe 103 PID 4556 wrote to memory of 1488 4556 nvxbt.exe 104 PID 4556 wrote to memory of 1488 4556 nvxbt.exe 104 PID 4556 wrote to memory of 1488 4556 nvxbt.exe 104 PID 1488 wrote to memory of 5060 1488 dhrll.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4b653a81e765bfe0813812fe8ae1c2e0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4b653a81e765bfe0813812fe8ae1c2e0_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
\??\c:\jlnnpxb.exec:\jlnnpxb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\fdhptl.exec:\fdhptl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
\??\c:\vxrdf.exec:\vxrdf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
\??\c:\dnnrrl.exec:\dnnrrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:712 -
\??\c:\hnvnxx.exec:\hnvnxx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
\??\c:\frfdbpv.exec:\frfdbpv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
\??\c:\rvbvd.exec:\rvbvd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
\??\c:\dbnpdp.exec:\dbnpdp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3176 -
\??\c:\ndhrtb.exec:\ndhrtb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
\??\c:\tfhrxv.exec:\tfhrxv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
\??\c:\tnbnpbj.exec:\tnbnpbj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\fpxthn.exec:\fpxthn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
\??\c:\vvhlffl.exec:\vvhlffl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
\??\c:\jfpnbnb.exec:\jfpnbnb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\vdxhltt.exec:\vdxhltt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
\??\c:\vfltxv.exec:\vfltxv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\nljxtlt.exec:\nljxtlt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
\??\c:\xbvdrjd.exec:\xbvdrjd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
\??\c:\xjdppxp.exec:\xjdppxp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
\??\c:\nvxbt.exec:\nvxbt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
\??\c:\dhrll.exec:\dhrll.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1488 -
\??\c:\lnhnx.exec:\lnhnx.exe23⤵
- Executes dropped EXE
PID:5060 -
\??\c:\ddvvdhp.exec:\ddvvdhp.exe24⤵
- Executes dropped EXE
PID:4940 -
\??\c:\nbrbr.exec:\nbrbr.exe25⤵
- Executes dropped EXE
PID:4716 -
\??\c:\nvxxv.exec:\nvxxv.exe26⤵
- Executes dropped EXE
PID:4824 -
\??\c:\vhbhp.exec:\vhbhp.exe27⤵
- Executes dropped EXE
PID:4928 -
\??\c:\vvbbv.exec:\vvbbv.exe28⤵
- Executes dropped EXE
PID:212 -
\??\c:\hpxhh.exec:\hpxhh.exe29⤵
- Executes dropped EXE
PID:3940 -
\??\c:\lfjlbnr.exec:\lfjlbnr.exe30⤵
- Executes dropped EXE
PID:3688 -
\??\c:\vlvdrv.exec:\vlvdrv.exe31⤵
- Executes dropped EXE
PID:2928 -
\??\c:\lljft.exec:\lljft.exe32⤵
- Executes dropped EXE
PID:3384 -
\??\c:\pdtfn.exec:\pdtfn.exe33⤵
- Executes dropped EXE
PID:3908 -
\??\c:\xhfxnd.exec:\xhfxnd.exe34⤵
- Executes dropped EXE
PID:856 -
\??\c:\jtxlf.exec:\jtxlf.exe35⤵
- Executes dropped EXE
PID:1132 -
\??\c:\vvdnb.exec:\vvdnb.exe36⤵
- Executes dropped EXE
PID:2908 -
\??\c:\fdvff.exec:\fdvff.exe37⤵
- Executes dropped EXE
PID:2788 -
\??\c:\nnfftn.exec:\nnfftn.exe38⤵
- Executes dropped EXE
PID:4832 -
\??\c:\bxfvxxj.exec:\bxfvxxj.exe39⤵
- Executes dropped EXE
PID:4784 -
\??\c:\xvlbnv.exec:\xvlbnv.exe40⤵
- Executes dropped EXE
PID:1660 -
\??\c:\vpvdlv.exec:\vpvdlv.exe41⤵
- Executes dropped EXE
PID:1668 -
\??\c:\rhpxdnb.exec:\rhpxdnb.exe42⤵
- Executes dropped EXE
PID:3400 -
\??\c:\jhvllbb.exec:\jhvllbb.exe43⤵
- Executes dropped EXE
PID:3468 -
\??\c:\vpnvfnx.exec:\vpnvfnx.exe44⤵
- Executes dropped EXE
PID:4428 -
\??\c:\ffbpf.exec:\ffbpf.exe45⤵
- Executes dropped EXE
PID:4820 -
\??\c:\pdjxnp.exec:\pdjxnp.exe46⤵
- Executes dropped EXE
PID:4356 -
\??\c:\btrjl.exec:\btrjl.exe47⤵
- Executes dropped EXE
PID:2148 -
\??\c:\hvjpnp.exec:\hvjpnp.exe48⤵
- Executes dropped EXE
PID:3952 -
\??\c:\jphrxd.exec:\jphrxd.exe49⤵
- Executes dropped EXE
PID:4564 -
\??\c:\bdnrlrn.exec:\bdnrlrn.exe50⤵
- Executes dropped EXE
PID:4336 -
\??\c:\ddbbt.exec:\ddbbt.exe51⤵
- Executes dropped EXE
PID:4836 -
\??\c:\ntvjht.exec:\ntvjht.exe52⤵
- Executes dropped EXE
PID:1092 -
\??\c:\fxvdn.exec:\fxvdn.exe53⤵
- Executes dropped EXE
PID:1912 -
\??\c:\tnvdl.exec:\tnvdl.exe54⤵
- Executes dropped EXE
PID:2384 -
\??\c:\dffnj.exec:\dffnj.exe55⤵
- Executes dropped EXE
PID:4868 -
\??\c:\ttfbnfn.exec:\ttfbnfn.exe56⤵
- Executes dropped EXE
PID:220 -
\??\c:\tpnbp.exec:\tpnbp.exe57⤵
- Executes dropped EXE
PID:4456 -
\??\c:\htjprpb.exec:\htjprpb.exe58⤵
- Executes dropped EXE
PID:1184 -
\??\c:\lfhdjtf.exec:\lfhdjtf.exe59⤵
- Executes dropped EXE
PID:1528 -
\??\c:\hlxhddj.exec:\hlxhddj.exe60⤵
- Executes dropped EXE
PID:660 -
\??\c:\fhvbbp.exec:\fhvbbp.exe61⤵
- Executes dropped EXE
PID:3032 -
\??\c:\bbfffjp.exec:\bbfffjp.exe62⤵
- Executes dropped EXE
PID:4444 -
\??\c:\vvbdd.exec:\vvbdd.exe63⤵
- Executes dropped EXE
PID:404 -
\??\c:\ltvhx.exec:\ltvhx.exe64⤵
- Executes dropped EXE
PID:2476 -
\??\c:\xlbxbf.exec:\xlbxbf.exe65⤵
- Executes dropped EXE
PID:3676 -
\??\c:\rrdpnh.exec:\rrdpnh.exe66⤵PID:3060
-
\??\c:\rrtbtr.exec:\rrtbtr.exe67⤵PID:2576
-
\??\c:\tdvtbhn.exec:\tdvtbhn.exe68⤵PID:3780
-
\??\c:\bvtvjj.exec:\bvtvjj.exe69⤵PID:4980
-
\??\c:\rjrdbfh.exec:\rjrdbfh.exe70⤵PID:3328
-
\??\c:\xnnlb.exec:\xnnlb.exe71⤵PID:4148
-
\??\c:\ntvbh.exec:\ntvbh.exe72⤵PID:2212
-
\??\c:\pdrrt.exec:\pdrrt.exe73⤵PID:1076
-
\??\c:\tjfjf.exec:\tjfjf.exe74⤵PID:3940
-
\??\c:\vbpjblv.exec:\vbpjblv.exe75⤵PID:3632
-
\??\c:\nnjfbl.exec:\nnjfbl.exe76⤵PID:1580
-
\??\c:\rrvvt.exec:\rrvvt.exe77⤵PID:3956
-
\??\c:\rhppl.exec:\rhppl.exe78⤵PID:4112
-
\??\c:\xtfrh.exec:\xtfrh.exe79⤵PID:856
-
\??\c:\thrxrfr.exec:\thrxrfr.exe80⤵PID:1364
-
\??\c:\rnndj.exec:\rnndj.exe81⤵PID:3656
-
\??\c:\tfdxf.exec:\tfdxf.exe82⤵PID:1716
-
\??\c:\nljlb.exec:\nljlb.exe83⤵PID:1292
-
\??\c:\nnlvfrd.exec:\nnlvfrd.exe84⤵PID:4708
-
\??\c:\dfjrr.exec:\dfjrr.exe85⤵PID:1760
-
\??\c:\nptbr.exec:\nptbr.exe86⤵PID:3584
-
\??\c:\hdnnhfl.exec:\hdnnhfl.exe87⤵PID:3624
-
\??\c:\tvnjpjf.exec:\tvnjpjf.exe88⤵PID:2108
-
\??\c:\rrjxx.exec:\rrjxx.exe89⤵PID:2328
-
\??\c:\xxfvt.exec:\xxfvt.exe90⤵PID:4216
-
\??\c:\hrfptf.exec:\hrfptf.exe91⤵PID:4812
-
\??\c:\dldjxv.exec:\dldjxv.exe92⤵PID:2148
-
\??\c:\btvjr.exec:\btvjr.exe93⤵PID:644
-
\??\c:\xvxtn.exec:\xvxtn.exe94⤵PID:2188
-
\??\c:\txdtvh.exec:\txdtvh.exe95⤵PID:1876
-
\??\c:\lvplbj.exec:\lvplbj.exe96⤵PID:880
-
\??\c:\hjtfjxl.exec:\hjtfjxl.exe97⤵PID:3360
-
\??\c:\bdfffnt.exec:\bdfffnt.exe98⤵PID:920
-
\??\c:\bpltphb.exec:\bpltphb.exe99⤵PID:2652
-
\??\c:\pbtxnd.exec:\pbtxnd.exe100⤵PID:3728
-
\??\c:\bhxjvnn.exec:\bhxjvnn.exe101⤵PID:2180
-
\??\c:\rppjb.exec:\rppjb.exe102⤵PID:3008
-
\??\c:\ppdjp.exec:\ppdjp.exe103⤵PID:2508
-
\??\c:\lfvnffr.exec:\lfvnffr.exe104⤵PID:1528
-
\??\c:\pnllxx.exec:\pnllxx.exe105⤵PID:4352
-
\??\c:\vnxhj.exec:\vnxhj.exe106⤵PID:3032
-
\??\c:\brbpvjv.exec:\brbpvjv.exe107⤵PID:1708
-
\??\c:\tbjddft.exec:\tbjddft.exe108⤵PID:4920
-
\??\c:\nthrjf.exec:\nthrjf.exe109⤵PID:4300
-
\??\c:\llrpl.exec:\llrpl.exe110⤵PID:3092
-
\??\c:\vbvnthx.exec:\vbvnthx.exe111⤵PID:1284
-
\??\c:\tjbdr.exec:\tjbdr.exe112⤵PID:3672
-
\??\c:\phbnpf.exec:\phbnpf.exe113⤵PID:4716
-
\??\c:\hxdtx.exec:\hxdtx.exe114⤵PID:4928
-
\??\c:\plllp.exec:\plllp.exe115⤵PID:4040
-
\??\c:\xnbxfr.exec:\xnbxfr.exe116⤵PID:1076
-
\??\c:\vbnffrb.exec:\vbnffrb.exe117⤵PID:4776
-
\??\c:\vnnnln.exec:\vnnnln.exe118⤵PID:3608
-
\??\c:\lpndnf.exec:\lpndnf.exe119⤵PID:2708
-
\??\c:\pltvfb.exec:\pltvfb.exe120⤵PID:4112
-
\??\c:\djdnr.exec:\djdnr.exe121⤵PID:2908
-
\??\c:\vvtrfnj.exec:\vvtrfnj.exe122⤵PID:3264
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-