Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 19:44
Behavioral task
behavioral1
Sample
bd4725329f34911353fa35e0dc3d2bb0_exe32.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
bd4725329f34911353fa35e0dc3d2bb0_exe32.exe
-
Size
283KB
-
MD5
bd4725329f34911353fa35e0dc3d2bb0
-
SHA1
a765cd836465236250d9bb529e2da6422774ed77
-
SHA256
c155ace8cea13fb2cf0205d81d67b7fbe164ad7d0d96540c2cc5fa9fc633f64d
-
SHA512
21b29459c10e274fe3e679889c376cdbd37ed0f6e4b2d9e15537f3f81ebc8795c42a5192481b6a0c01bc50e008a5d8793870fffd2d2e617724175f9b009d9205
-
SSDEEP
6144:ccm4FmowdHoSQkuObHq9ltAszBd+za/p1slTjZXvEQo9dftOI:K4wFHoSQkuUHk1zBR/pMT9XvEhdfJ
Malware Config
Signatures
-
Detect Blackmoon payload 44 IoCs
resource yara_rule behavioral1/memory/3052-6-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2656-11-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2892-25-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2696-30-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2480-44-0x0000000000220000-0x0000000000254000-memory.dmp family_blackmoon behavioral1/memory/2480-43-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2444-48-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2892-75-0x0000000000440000-0x0000000000474000-memory.dmp family_blackmoon behavioral1/memory/584-76-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2724-85-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2772-94-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2808-104-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2772-129-0x0000000000220000-0x0000000000254000-memory.dmp family_blackmoon behavioral1/memory/2128-140-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1716-149-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1280-159-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1200-169-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2840-179-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2544-196-0x0000000000220000-0x0000000000254000-memory.dmp family_blackmoon behavioral1/memory/1064-214-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2200-210-0x0000000000440000-0x0000000000474000-memory.dmp family_blackmoon behavioral1/memory/2224-231-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2224-237-0x00000000001B0000-0x00000000001E4000-memory.dmp family_blackmoon behavioral1/memory/2200-241-0x0000000000440000-0x0000000000474000-memory.dmp family_blackmoon behavioral1/memory/2068-242-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2052-261-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/320-270-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/1648-284-0x0000000001B90000-0x0000000001BC4000-memory.dmp family_blackmoon behavioral1/memory/2068-288-0x0000000000220000-0x0000000000254000-memory.dmp family_blackmoon behavioral1/memory/2940-322-0x0000000000220000-0x0000000000254000-memory.dmp family_blackmoon behavioral1/memory/1544-342-0x0000000000220000-0x0000000000254000-memory.dmp family_blackmoon behavioral1/memory/2676-351-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2676-357-0x00000000003C0000-0x00000000003F4000-memory.dmp family_blackmoon behavioral1/memory/2452-365-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2452-372-0x0000000001B60000-0x0000000001B94000-memory.dmp family_blackmoon behavioral1/memory/2964-380-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2964-386-0x0000000000220000-0x0000000000254000-memory.dmp family_blackmoon behavioral1/memory/2572-387-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/524-396-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/780-410-0x00000000001B0000-0x00000000001E4000-memory.dmp family_blackmoon behavioral1/memory/2788-418-0x00000000002A0000-0x00000000002D4000-memory.dmp family_blackmoon behavioral1/memory/2772-425-0x0000000000440000-0x0000000000474000-memory.dmp family_blackmoon behavioral1/memory/560-426-0x0000000000400000-0x0000000000434000-memory.dmp family_blackmoon behavioral1/memory/2828-439-0x0000000000230000-0x0000000000264000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2656 pldrff.exe 2892 tdlbdd.exe 2696 fhvtflp.exe 2480 blrtl.exe 2444 bxpbjn.exe 1172 txvpp.exe 2968 hdrndjl.exe 584 fhdvdhb.exe 2724 tndrpf.exe 2772 hhtdlp.exe 2808 nhnhf.exe 2376 djbfhvr.exe 1736 jvtdtjr.exe 1600 vfpfvh.exe 2128 lfnfx.exe 1716 tpfpntv.exe 1280 htrlth.exe 1200 njrndp.exe 2840 brhfftj.exe 2544 pvljb.exe 3032 xtpbr.exe 2200 tvxht.exe 1064 pdbtbr.exe 1712 jnldbr.exe 2224 fxrxhjr.exe 2068 jtxhrnf.exe 2328 hnpjx.exe 2052 xrpbr.exe 320 pnxvdt.exe 1648 nfptj.exe 2940 vnxrjx.exe 1220 dpppnb.exe 2984 hjhxx.exe 1468 jflnxb.exe 2916 lfpbnn.exe 2692 vpnbrn.exe 1160 hphlpd.exe 1544 pdpbrjn.exe 2632 lblfht.exe 2676 rrntvbt.exe 2616 tdpphfd.exe 2452 rlbhpf.exe 2512 jhbdhj.exe 2964 lfldjdl.exe 2572 rjxlth.exe 524 dxhjjb.exe 780 nbblfdj.exe 2788 xrtlh.exe 2772 lrrfn.exe 560 ltdxrff.exe 2828 lbbpp.exe 2376 dfbfdvv.exe 1736 ttjblpp.exe 936 lldhl.exe 1520 jtbpxnd.exe 1408 jlrlxhf.exe 1384 fjdvdf.exe 2760 nbhlxtp.exe 2848 hhlpxlj.exe 1944 xjhftd.exe 2124 nphpx.exe 2316 plfdv.exe 528 xffbrvh.exe 956 hfnlrv.exe -
resource yara_rule behavioral1/memory/3052-0-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/3052-6-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x00060000000120e6-7.dat upx behavioral1/files/0x00060000000120e6-5.dat upx behavioral1/memory/2656-11-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x000a000000012288-19.dat upx behavioral1/memory/2892-18-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x000a000000012288-17.dat upx behavioral1/files/0x00060000000120e6-8.dat upx behavioral1/memory/2892-25-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x002b000000015c7c-28.dat upx behavioral1/memory/2696-30-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x002b000000015c7c-27.dat upx behavioral1/files/0x0007000000015ce1-37.dat upx behavioral1/memory/2480-43-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x0007000000015ce1-36.dat upx behavioral1/memory/2444-48-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x0007000000015d33-46.dat upx behavioral1/files/0x0007000000015d33-45.dat upx behavioral1/files/0x0007000000015db6-55.dat upx behavioral1/files/0x0007000000015db6-54.dat upx behavioral1/files/0x0009000000015e8d-63.dat upx behavioral1/files/0x0009000000015e8d-64.dat upx behavioral1/files/0x0009000000015ea6-73.dat upx behavioral1/files/0x0009000000015ea6-72.dat upx behavioral1/memory/584-76-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x0019000000015c87-82.dat upx behavioral1/files/0x0019000000015c87-83.dat upx behavioral1/memory/2724-85-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x0006000000016446-92.dat upx behavioral1/files/0x0006000000016446-91.dat upx behavioral1/memory/2772-94-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x0006000000016581-101.dat upx behavioral1/memory/2808-104-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x0006000000016581-102.dat upx behavioral1/files/0x00060000000165f1-112.dat upx behavioral1/files/0x00060000000165f1-111.dat upx behavioral1/files/0x0006000000016801-120.dat upx behavioral1/files/0x0006000000016801-121.dat upx behavioral1/files/0x0006000000016adf-130.dat upx behavioral1/files/0x0006000000016adf-128.dat upx behavioral1/files/0x0006000000016bf9-138.dat upx behavioral1/files/0x0006000000016bf9-137.dat upx behavioral1/memory/2128-140-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x0006000000016c12-147.dat upx behavioral1/files/0x0006000000016c12-146.dat upx behavioral1/memory/1716-149-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/memory/1280-159-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x0006000000016c1a-156.dat upx behavioral1/files/0x0006000000016c1a-155.dat upx behavioral1/memory/1200-169-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x0006000000016c65-167.dat upx behavioral1/files/0x0006000000016c65-166.dat upx behavioral1/files/0x0006000000016c91-177.dat upx behavioral1/files/0x0006000000016cbc-186.dat upx behavioral1/files/0x0006000000016cbc-184.dat upx behavioral1/memory/2840-179-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral1/files/0x0006000000016c91-176.dat upx behavioral1/files/0x0006000000016ccd-194.dat upx behavioral1/files/0x0006000000016ccd-193.dat upx behavioral1/files/0x0006000000016cd5-203.dat upx behavioral1/files/0x0006000000016cd5-202.dat upx behavioral1/files/0x0006000000016ce1-212.dat upx behavioral1/memory/1064-214-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2656 3052 bd4725329f34911353fa35e0dc3d2bb0_exe32.exe 28 PID 3052 wrote to memory of 2656 3052 bd4725329f34911353fa35e0dc3d2bb0_exe32.exe 28 PID 3052 wrote to memory of 2656 3052 bd4725329f34911353fa35e0dc3d2bb0_exe32.exe 28 PID 3052 wrote to memory of 2656 3052 bd4725329f34911353fa35e0dc3d2bb0_exe32.exe 28 PID 2656 wrote to memory of 2892 2656 pldrff.exe 29 PID 2656 wrote to memory of 2892 2656 pldrff.exe 29 PID 2656 wrote to memory of 2892 2656 pldrff.exe 29 PID 2656 wrote to memory of 2892 2656 pldrff.exe 29 PID 2892 wrote to memory of 2696 2892 tdlbdd.exe 30 PID 2892 wrote to memory of 2696 2892 tdlbdd.exe 30 PID 2892 wrote to memory of 2696 2892 tdlbdd.exe 30 PID 2892 wrote to memory of 2696 2892 tdlbdd.exe 30 PID 2696 wrote to memory of 2480 2696 fhvtflp.exe 31 PID 2696 wrote to memory of 2480 2696 fhvtflp.exe 31 PID 2696 wrote to memory of 2480 2696 fhvtflp.exe 31 PID 2696 wrote to memory of 2480 2696 fhvtflp.exe 31 PID 2480 wrote to memory of 2444 2480 blrtl.exe 32 PID 2480 wrote to memory of 2444 2480 blrtl.exe 32 PID 2480 wrote to memory of 2444 2480 blrtl.exe 32 PID 2480 wrote to memory of 2444 2480 blrtl.exe 32 PID 2444 wrote to memory of 1172 2444 bxpbjn.exe 33 PID 2444 wrote to memory of 1172 2444 bxpbjn.exe 33 PID 2444 wrote to memory of 1172 2444 bxpbjn.exe 33 PID 2444 wrote to memory of 1172 2444 bxpbjn.exe 33 PID 1172 wrote to memory of 2968 1172 txvpp.exe 34 PID 1172 wrote to memory of 2968 1172 txvpp.exe 34 PID 1172 wrote to memory of 2968 1172 txvpp.exe 34 PID 1172 wrote to memory of 2968 1172 txvpp.exe 34 PID 2968 wrote to memory of 584 2968 hdrndjl.exe 35 PID 2968 wrote to memory of 584 2968 hdrndjl.exe 35 PID 2968 wrote to memory of 584 2968 hdrndjl.exe 35 PID 2968 wrote to memory of 584 2968 hdrndjl.exe 35 PID 584 wrote to memory of 2724 584 fhdvdhb.exe 36 PID 584 wrote to memory of 2724 584 fhdvdhb.exe 36 PID 584 wrote to memory of 2724 584 fhdvdhb.exe 36 PID 584 wrote to memory of 2724 584 fhdvdhb.exe 36 PID 2724 wrote to memory of 2772 2724 tndrpf.exe 37 PID 2724 wrote to memory of 2772 2724 tndrpf.exe 37 PID 2724 wrote to memory of 2772 2724 tndrpf.exe 37 PID 2724 wrote to memory of 2772 2724 tndrpf.exe 37 PID 2772 wrote to memory of 2808 2772 hhtdlp.exe 38 PID 2772 wrote to memory of 2808 2772 hhtdlp.exe 38 PID 2772 wrote to memory of 2808 2772 hhtdlp.exe 38 PID 2772 wrote to memory of 2808 2772 hhtdlp.exe 38 PID 2808 wrote to memory of 2376 2808 nhnhf.exe 39 PID 2808 wrote to memory of 2376 2808 nhnhf.exe 39 PID 2808 wrote to memory of 2376 2808 nhnhf.exe 39 PID 2808 wrote to memory of 2376 2808 nhnhf.exe 39 PID 2376 wrote to memory of 1736 2376 djbfhvr.exe 40 PID 2376 wrote to memory of 1736 2376 djbfhvr.exe 40 PID 2376 wrote to memory of 1736 2376 djbfhvr.exe 40 PID 2376 wrote to memory of 1736 2376 djbfhvr.exe 40 PID 1736 wrote to memory of 1600 1736 jvtdtjr.exe 41 PID 1736 wrote to memory of 1600 1736 jvtdtjr.exe 41 PID 1736 wrote to memory of 1600 1736 jvtdtjr.exe 41 PID 1736 wrote to memory of 1600 1736 jvtdtjr.exe 41 PID 1600 wrote to memory of 2128 1600 vfpfvh.exe 42 PID 1600 wrote to memory of 2128 1600 vfpfvh.exe 42 PID 1600 wrote to memory of 2128 1600 vfpfvh.exe 42 PID 1600 wrote to memory of 2128 1600 vfpfvh.exe 42 PID 2128 wrote to memory of 1716 2128 lfnfx.exe 43 PID 2128 wrote to memory of 1716 2128 lfnfx.exe 43 PID 2128 wrote to memory of 1716 2128 lfnfx.exe 43 PID 2128 wrote to memory of 1716 2128 lfnfx.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd4725329f34911353fa35e0dc3d2bb0_exe32.exe"C:\Users\Admin\AppData\Local\Temp\bd4725329f34911353fa35e0dc3d2bb0_exe32.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
\??\c:\pldrff.exec:\pldrff.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
\??\c:\tdlbdd.exec:\tdlbdd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\fhvtflp.exec:\fhvtflp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\blrtl.exec:\blrtl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\bxpbjn.exec:\bxpbjn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
\??\c:\txvpp.exec:\txvpp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
\??\c:\hdrndjl.exec:\hdrndjl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\fhdvdhb.exec:\fhdvdhb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:584 -
\??\c:\tndrpf.exec:\tndrpf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\hhtdlp.exec:\hhtdlp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\nhnhf.exec:\nhnhf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\djbfhvr.exec:\djbfhvr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\jvtdtjr.exec:\jvtdtjr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\vfpfvh.exec:\vfpfvh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\lfnfx.exec:\lfnfx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\tpfpntv.exec:\tpfpntv.exe17⤵
- Executes dropped EXE
PID:1716 -
\??\c:\htrlth.exec:\htrlth.exe18⤵
- Executes dropped EXE
PID:1280 -
\??\c:\njrndp.exec:\njrndp.exe19⤵
- Executes dropped EXE
PID:1200 -
\??\c:\brhfftj.exec:\brhfftj.exe20⤵
- Executes dropped EXE
PID:2840 -
\??\c:\pvljb.exec:\pvljb.exe21⤵
- Executes dropped EXE
PID:2544
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\xtpbr.exec:\xtpbr.exe1⤵
- Executes dropped EXE
PID:3032 -
\??\c:\tvxht.exec:\tvxht.exe2⤵
- Executes dropped EXE
PID:2200 -
\??\c:\pdbtbr.exec:\pdbtbr.exe3⤵
- Executes dropped EXE
PID:1064 -
\??\c:\jnldbr.exec:\jnldbr.exe4⤵
- Executes dropped EXE
PID:1712 -
\??\c:\fxrxhjr.exec:\fxrxhjr.exe5⤵
- Executes dropped EXE
PID:2224 -
\??\c:\jtxhrnf.exec:\jtxhrnf.exe6⤵
- Executes dropped EXE
PID:2068 -
\??\c:\hnpjx.exec:\hnpjx.exe7⤵
- Executes dropped EXE
PID:2328 -
\??\c:\xrpbr.exec:\xrpbr.exe8⤵
- Executes dropped EXE
PID:2052 -
\??\c:\pnxvdt.exec:\pnxvdt.exe9⤵
- Executes dropped EXE
PID:320 -
\??\c:\nfptj.exec:\nfptj.exe10⤵
- Executes dropped EXE
PID:1648 -
\??\c:\vnxrjx.exec:\vnxrjx.exe11⤵
- Executes dropped EXE
PID:2940 -
\??\c:\dpppnb.exec:\dpppnb.exe12⤵
- Executes dropped EXE
PID:1220 -
\??\c:\hjhxx.exec:\hjhxx.exe13⤵
- Executes dropped EXE
PID:2984 -
\??\c:\jflnxb.exec:\jflnxb.exe14⤵
- Executes dropped EXE
PID:1468 -
\??\c:\lfpbnn.exec:\lfpbnn.exe15⤵
- Executes dropped EXE
PID:2916 -
\??\c:\vpnbrn.exec:\vpnbrn.exe16⤵
- Executes dropped EXE
PID:2692 -
\??\c:\hphlpd.exec:\hphlpd.exe17⤵
- Executes dropped EXE
PID:1160 -
\??\c:\pdpbrjn.exec:\pdpbrjn.exe18⤵
- Executes dropped EXE
PID:1544 -
\??\c:\lblfht.exec:\lblfht.exe19⤵
- Executes dropped EXE
PID:2632 -
\??\c:\rrntvbt.exec:\rrntvbt.exe20⤵
- Executes dropped EXE
PID:2676 -
\??\c:\tdpphfd.exec:\tdpphfd.exe21⤵
- Executes dropped EXE
PID:2616 -
\??\c:\rlbhpf.exec:\rlbhpf.exe22⤵
- Executes dropped EXE
PID:2452 -
\??\c:\jhbdhj.exec:\jhbdhj.exe23⤵
- Executes dropped EXE
PID:2512 -
\??\c:\lfldjdl.exec:\lfldjdl.exe24⤵
- Executes dropped EXE
PID:2964 -
\??\c:\rjxlth.exec:\rjxlth.exe25⤵
- Executes dropped EXE
PID:2572 -
\??\c:\dxhjjb.exec:\dxhjjb.exe26⤵
- Executes dropped EXE
PID:524 -
\??\c:\nbblfdj.exec:\nbblfdj.exe27⤵
- Executes dropped EXE
PID:780 -
\??\c:\xrtlh.exec:\xrtlh.exe28⤵
- Executes dropped EXE
PID:2788 -
\??\c:\lrrfn.exec:\lrrfn.exe29⤵
- Executes dropped EXE
PID:2772 -
\??\c:\ltdxrff.exec:\ltdxrff.exe30⤵
- Executes dropped EXE
PID:560 -
\??\c:\lbbpp.exec:\lbbpp.exe31⤵
- Executes dropped EXE
PID:2828 -
\??\c:\dfbfdvv.exec:\dfbfdvv.exe32⤵
- Executes dropped EXE
PID:2376 -
\??\c:\ttjblpp.exec:\ttjblpp.exe33⤵
- Executes dropped EXE
PID:1736 -
\??\c:\lldhl.exec:\lldhl.exe34⤵
- Executes dropped EXE
PID:936 -
\??\c:\jtbpxnd.exec:\jtbpxnd.exe35⤵
- Executes dropped EXE
PID:1520 -
\??\c:\jlrlxhf.exec:\jlrlxhf.exe36⤵
- Executes dropped EXE
PID:1408 -
\??\c:\fjdvdf.exec:\fjdvdf.exe37⤵
- Executes dropped EXE
PID:1384 -
\??\c:\nbhlxtp.exec:\nbhlxtp.exe38⤵
- Executes dropped EXE
PID:2760 -
\??\c:\hhlpxlj.exec:\hhlpxlj.exe39⤵
- Executes dropped EXE
PID:2848 -
\??\c:\xjhftd.exec:\xjhftd.exe40⤵
- Executes dropped EXE
PID:1944 -
\??\c:\nphpx.exec:\nphpx.exe41⤵
- Executes dropped EXE
PID:2124 -
\??\c:\plfdv.exec:\plfdv.exe42⤵
- Executes dropped EXE
PID:2316 -
\??\c:\xffbrvh.exec:\xffbrvh.exe43⤵
- Executes dropped EXE
PID:528 -
\??\c:\hfnlrv.exec:\hfnlrv.exe44⤵
- Executes dropped EXE
PID:956 -
\??\c:\vvvnf.exec:\vvvnf.exe45⤵PID:2324
-
\??\c:\ldtrn.exec:\ldtrn.exe46⤵PID:2260
-
\??\c:\jxnhvdd.exec:\jxnhvdd.exe47⤵PID:1712
-
\??\c:\btbtx.exec:\btbtx.exe48⤵PID:1776
-
\??\c:\hxjxb.exec:\hxjxb.exe49⤵PID:1492
-
\??\c:\fxfjl.exec:\fxfjl.exe50⤵PID:2860
-
\??\c:\hjrpbr.exec:\hjrpbr.exe51⤵PID:1080
-
\??\c:\phjfn.exec:\phjfn.exe52⤵PID:1604
-
\??\c:\nprttnp.exec:\nprttnp.exe53⤵PID:3036
-
\??\c:\xxtbpx.exec:\xxtbpx.exe54⤵PID:1040
-
\??\c:\txbvvj.exec:\txbvvj.exe55⤵PID:904
-
\??\c:\pfjtp.exec:\pfjtp.exe56⤵PID:320
-
\??\c:\pfhld.exec:\pfhld.exe57⤵PID:2388
-
\??\c:\nlxtnv.exec:\nlxtnv.exe58⤵PID:2380
-
\??\c:\bfdrrn.exec:\bfdrrn.exe59⤵PID:1636
-
\??\c:\lhllpvj.exec:\lhllpvj.exe60⤵PID:1928
-
\??\c:\lfrnb.exec:\lfrnb.exe61⤵PID:2924
-
\??\c:\jjdfjhf.exec:\jjdfjhf.exe62⤵PID:2588
-
\??\c:\pbnbpv.exec:\pbnbpv.exe63⤵PID:2244
-
\??\c:\bdnbp.exec:\bdnbp.exe64⤵PID:2600
-
\??\c:\lxffljx.exec:\lxffljx.exe65⤵PID:2652
-
\??\c:\jtphtl.exec:\jtphtl.exe66⤵PID:2476
-
\??\c:\xvxrvl.exec:\xvxrvl.exe67⤵PID:2856
-
\??\c:\jhlhtbf.exec:\jhlhtbf.exe68⤵PID:2460
-
\??\c:\xxplf.exec:\xxplf.exe69⤵PID:2440
-
\??\c:\hbjblb.exec:\hbjblb.exe70⤵PID:2564
-
\??\c:\lxhbfl.exec:\lxhbfl.exe71⤵PID:2640
-
\??\c:\vnfjfbr.exec:\vnfjfbr.exe72⤵PID:2512
-
\??\c:\pbpln.exec:\pbpln.exe73⤵PID:2972
-
\??\c:\lfntrd.exec:\lfntrd.exe74⤵PID:1484
-
\??\c:\xtlxr.exec:\xtlxr.exe75⤵PID:2776
-
\??\c:\pfddjdf.exec:\pfddjdf.exe76⤵PID:2800
-
\??\c:\rrfntjn.exec:\rrfntjn.exe77⤵PID:1084
-
\??\c:\vndvb.exec:\vndvb.exe78⤵PID:276
-
\??\c:\vvprh.exec:\vvprh.exe79⤵PID:2772
-
\??\c:\rtfhhhn.exec:\rtfhhhn.exe80⤵PID:1892
-
\??\c:\xhdxv.exec:\xhdxv.exe81⤵PID:1552
-
\??\c:\lhbnfr.exec:\lhbnfr.exe82⤵PID:760
-
\??\c:\hnltrv.exec:\hnltrv.exe83⤵PID:1968
-
\??\c:\nlxht.exec:\nlxht.exe84⤵PID:1612
-
\??\c:\dhlbx.exec:\dhlbx.exe85⤵PID:2128
-
\??\c:\hdlhdnj.exec:\hdlhdnj.exe86⤵PID:1568
-
\??\c:\ldnfh.exec:\ldnfh.exe87⤵PID:2232
-
\??\c:\nbpdldt.exec:\nbpdldt.exe88⤵PID:1696
-
\??\c:\txxhd.exec:\txxhd.exe89⤵PID:2848
-
\??\c:\jljljxp.exec:\jljljxp.exe90⤵PID:1388
-
\??\c:\xrxvh.exec:\xrxvh.exe91⤵PID:2248
-
\??\c:\vnthnnl.exec:\vnthnnl.exe92⤵PID:2200
-
\??\c:\ldvlf.exec:\ldvlf.exe93⤵PID:2368
-
\??\c:\xdjpt.exec:\xdjpt.exe94⤵PID:2308
-
\??\c:\pppxlxd.exec:\pppxlxd.exe95⤵PID:1392
-
\??\c:\bththt.exec:\bththt.exe96⤵PID:1684
-
\??\c:\jvhxlht.exec:\jvhxlht.exe97⤵PID:1020
-
\??\c:\bplvv.exec:\bplvv.exe98⤵PID:2628
-
\??\c:\ddlnvt.exec:\ddlnvt.exe99⤵PID:2160
-
\??\c:\jltjlrd.exec:\jltjlrd.exe100⤵PID:1080
-
\??\c:\plxxlt.exec:\plxxlt.exe101⤵PID:2212
-
\??\c:\vxlvp.exec:\vxlvp.exe102⤵PID:1284
-
\??\c:\pthnnj.exec:\pthnnj.exe103⤵PID:2732
-
\??\c:\nnlhrp.exec:\nnlhrp.exe104⤵PID:2940
-
\??\c:\hfhbntr.exec:\hfhbntr.exe105⤵PID:1464
-
\??\c:\tlnrtbh.exec:\tlnrtbh.exe106⤵PID:2392
-
\??\c:\tnxfdl.exec:\tnxfdl.exe107⤵PID:1564
-
\??\c:\bfvdnpb.exec:\bfvdnpb.exe108⤵PID:2688
-
\??\c:\jhxbrbx.exec:\jhxbrbx.exe109⤵PID:2584
-
\??\c:\thjjpbd.exec:\thjjpbd.exe110⤵PID:1512
-
\??\c:\rnbvl.exec:\rnbvl.exe111⤵PID:1952
-
\??\c:\flblvtp.exec:\flblvtp.exe112⤵PID:1544
-
\??\c:\dbftr.exec:\dbftr.exe113⤵PID:2648
-
\??\c:\dvtpv.exec:\dvtpv.exe114⤵PID:2484
-
\??\c:\tplvdxp.exec:\tplvdxp.exe115⤵PID:2500
-
\??\c:\lvplphn.exec:\lvplphn.exe116⤵PID:2960
-
\??\c:\dxdvlv.exec:\dxdvlv.exe117⤵PID:2424
-
\??\c:\vnvbh.exec:\vnvbh.exe118⤵PID:676
-
\??\c:\rvdff.exec:\rvdff.exe119⤵PID:1880
-
\??\c:\nlvhhxr.exec:\nlvhhxr.exe120⤵PID:600
-
\??\c:\ntlxbr.exec:\ntlxbr.exe121⤵PID:524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\fhnnx.exec:\fhnnx.exe102⤵PID:2052
-
\??\c:\vxvhf.exec:\vxvhf.exe103⤵PID:1264
-
\??\c:\hrxndl.exec:\hrxndl.exe104⤵PID:2144
-
\??\c:\hfbjv.exec:\hfbjv.exe105⤵PID:892
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\ppjxfnx.exec:\ppjxfnx.exe90⤵PID:2124
-
\??\c:\jnhdvtd.exec:\jnhdvtd.exe91⤵PID:1120
-
\??\c:\fxxfnr.exec:\fxxfnr.exe92⤵PID:2248
-
\??\c:\vtxhj.exec:\vtxhj.exe93⤵PID:940
-
\??\c:\lnnxnfd.exec:\lnnxnfd.exe94⤵PID:2324
-
\??\c:\lvrrdvp.exec:\lvrrdvp.exe95⤵PID:1976
-
\??\c:\nxdnh.exec:\nxdnh.exe96⤵PID:1044
-
\??\c:\jvfpnr.exec:\jvfpnr.exe97⤵PID:1528
-
\??\c:\lfpbrfr.exec:\lfpbrfr.exe98⤵PID:1924
-
\??\c:\jhxpxtx.exec:\jhxpxtx.exe99⤵PID:1284
-
\??\c:\tvntb.exec:\tvntb.exe100⤵PID:1220
-
\??\c:\hfddpfh.exec:\hfddpfh.exe101⤵PID:1860
-
\??\c:\frhbhj.exec:\frhbhj.exe102⤵PID:2596
-
\??\c:\btdfdj.exec:\btdfdj.exe103⤵PID:2180
-
\??\c:\jrbxp.exec:\jrbxp.exe104⤵PID:2928
-
\??\c:\dtnxpb.exec:\dtnxpb.exe105⤵PID:2660
-
\??\c:\fjntt.exec:\fjntt.exe106⤵PID:2920
-
\??\c:\bhhjxpv.exec:\bhhjxpv.exe107⤵PID:984
-
\??\c:\jtbnjf.exec:\jtbnjf.exe108⤵PID:2700
-
\??\c:\hxfdf.exec:\hxfdf.exe109⤵PID:2468
-
\??\c:\fdxdrj.exec:\fdxdrj.exe110⤵PID:2472
-
\??\c:\nnlndjx.exec:\nnlndjx.exe111⤵PID:2052
-
\??\c:\ffdrlhd.exec:\ffdrlhd.exe112⤵PID:2892
-
\??\c:\fbrrx.exec:\fbrrx.exe113⤵PID:2952
-
\??\c:\pdnthdx.exec:\pdnthdx.exe114⤵PID:1596
-
\??\c:\dfvnxln.exec:\dfvnxln.exe115⤵PID:1540
-
\??\c:\jrvdp.exec:\jrvdp.exe116⤵PID:1740
-
\??\c:\bnbpp.exec:\bnbpp.exe117⤵PID:2508
-
\??\c:\rphbnvh.exec:\rphbnvh.exe118⤵PID:2756
-
\??\c:\lbrnxx.exec:\lbrnxx.exe119⤵PID:2772
-
\??\c:\pnjdb.exec:\pnjdb.exe120⤵PID:1588
-
\??\c:\dlxxvh.exec:\dlxxvh.exe121⤵PID:1268
-
\??\c:\vvnvr.exec:\vvnvr.exe122⤵PID:1896
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-