Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
59s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
01/11/2023, 14:23
Behavioral task
behavioral1
Sample
NEAS.f0444f917a1fc8304161bee3889b0790.exe
Resource
win7-20231023-en
5 signatures
150 seconds
General
-
Target
NEAS.f0444f917a1fc8304161bee3889b0790.exe
-
Size
267KB
-
MD5
f0444f917a1fc8304161bee3889b0790
-
SHA1
0047d0bdeecb3d5be09765cd622164820b213835
-
SHA256
b3604ce81cd8ca1f960121f5f7439a4e818c6accad0b5a8937c8292b15daa0bb
-
SHA512
74b0c92cf6d316ada3f8d53d35f1c85accb337400a86b840e5b7edbfcca9437b4f780aefd1063b23af8516b82c0a49fd835d30cb9adf500c6532bc7504d5e9a2
-
SSDEEP
3072:9hOmTsF93UYfwC6GIoutz5yLpcgDE4JBuItR8pTsg8QO6GIouixsp+CvM56ATgLD:9cm4FmowdHoS4BftapTs8Hoo+6MjTV6
Malware Config
Signatures
-
Detect Blackmoon payload 37 IoCs
resource yara_rule behavioral1/memory/2236-6-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2076-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2308-21-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2732-35-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2916-40-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2564-67-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2308-69-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2344-82-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/476-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1068-97-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2864-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2344-137-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2292-146-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/944-156-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1648-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1056-152-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2292-136-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2288-203-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2564-127-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2156-212-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2112-237-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2036-248-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/460-264-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1552-277-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1552-268-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1284-292-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2448-310-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1552-306-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1756-313-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2072-319-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1284-333-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2708-335-0x00000000003C0000-0x00000000003E7000-memory.dmp family_blackmoon behavioral1/memory/2584-341-0x00000000003B0000-0x00000000003D7000-memory.dmp family_blackmoon behavioral1/memory/1572-342-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1572-350-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/2688-352-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2992-398-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2076 pxlvj.exe 2308 pdllfv.exe 2732 htjppdb.exe 2916 vthnnrh.exe 2612 drntnr.exe 2468 jnhhv.exe 2564 hdlxlff.exe 2344 pxfxx.exe 476 hhtrnjt.exe 1068 blhhl.exe 556 plbld.exe 2864 xpjlj.exe 2900 xhvvtpn.exe 2292 phljd.exe 1056 pftrpjn.exe 944 jdvdxnr.exe 1868 ftfphtt.exe 292 lphhvfp.exe 1648 pfrjpn.exe 2112 hbldx.exe 2288 bttxn.exe 2156 xnbbvv.exe 1316 hfptvdj.exe 2080 fphnp.exe 2036 xhrtd.exe 1640 htvnft.exe 460 fhxblvj.exe 1552 btfnjl.exe 908 jfhtplr.exe 1284 hrfvj.exe 2408 ldddbb.exe 2448 bndrx.exe 1756 djvxjx.exe 2072 fptll.exe 2708 ldxtx.exe 2584 xhdvpr.exe 1572 tnrhdb.exe 2688 vdnbvj.exe 2640 vbhhvh.exe 2776 nfrjr.exe 2672 bhfjx.exe 2508 xplbn.exe 2556 tprxdnp.exe 2992 htblxdd.exe 2564 fjhnr.exe 372 hfdhfdx.exe 752 pphpdr.exe 1512 fxhpdjv.exe 964 vptpx.exe 392 lvvpt.exe 2560 lfpflpr.exe 2876 lvphdx.exe 1844 fnfrflb.exe 940 xdllhh.exe 1632 pfhll.exe 1040 frtdfdd.exe 2548 bjpnjnt.exe 2296 xlhvrnx.exe 1584 xbpfd.exe 2588 vhndxx.exe 1628 ffxhdb.exe 2164 vxhftf.exe 1224 jrvpb.exe 836 bpxlxl.exe -
resource yara_rule behavioral1/memory/2236-0-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00070000000120ca-8.dat upx behavioral1/memory/2236-6-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00070000000120ca-5.dat upx behavioral1/memory/2076-11-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00070000000120ca-9.dat upx behavioral1/files/0x000e000000012275-18.dat upx behavioral1/files/0x0028000000016d01-26.dat upx behavioral1/files/0x0028000000016d01-27.dat upx behavioral1/memory/2308-21-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000e000000012275-17.dat upx behavioral1/files/0x0009000000016d63-36.dat upx behavioral1/memory/2732-35-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2916-40-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0009000000016d63-38.dat upx behavioral1/files/0x0007000000016d75-46.dat upx behavioral1/files/0x0007000000016d75-47.dat upx behavioral1/files/0x0007000000016d7a-55.dat upx behavioral1/files/0x0007000000016d7a-54.dat upx behavioral1/files/0x0008000000016dac-65.dat upx behavioral1/memory/2564-67-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0008000000016dac-64.dat upx behavioral1/files/0x0011000000016d1d-75.dat upx behavioral1/files/0x0011000000016d1d-74.dat upx behavioral1/files/0x0008000000016e9b-84.dat upx behavioral1/files/0x0008000000016e9b-83.dat upx behavioral1/memory/2344-82-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/476-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0005000000018727-93.dat upx behavioral1/files/0x0005000000018727-94.dat upx behavioral1/memory/1068-97-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x000500000001873d-103.dat upx behavioral1/memory/1068-106-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/files/0x000500000001873d-104.dat upx behavioral1/files/0x0006000000018ad8-114.dat upx behavioral1/files/0x0006000000018ad8-113.dat upx behavioral1/memory/2864-118-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000018b13-124.dat upx behavioral1/files/0x0006000000018b13-123.dat upx behavioral1/files/0x0006000000018b1e-133.dat upx behavioral1/files/0x0006000000018b1e-132.dat upx behavioral1/files/0x0006000000018b67-144.dat upx behavioral1/files/0x0006000000018b67-143.dat upx behavioral1/files/0x0006000000018b70-154.dat upx behavioral1/memory/944-156-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000018b7b-163.dat upx behavioral1/files/0x0006000000018b7b-164.dat upx behavioral1/files/0x0006000000018b70-153.dat upx behavioral1/files/0x0006000000018b8f-172.dat upx behavioral1/files/0x0006000000018ba3-182.dat upx behavioral1/files/0x0006000000018ba3-181.dat upx behavioral1/memory/1648-184-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x0006000000018ba8-190.dat upx behavioral1/files/0x0006000000018ba8-191.dat upx behavioral1/files/0x0006000000018d0b-201.dat upx behavioral1/files/0x0006000000018d0b-200.dat upx behavioral1/files/0x0006000000018b8f-171.dat upx behavioral1/memory/2292-136-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2288-203-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/files/0x00040000000192c9-210.dat upx behavioral1/files/0x00040000000192c9-209.dat upx behavioral1/memory/2156-212-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2156-218-0x0000000000230000-0x0000000000257000-memory.dmp upx behavioral1/files/0x00040000000192dc-220.dat upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2076 2236 NEAS.f0444f917a1fc8304161bee3889b0790.exe 28 PID 2236 wrote to memory of 2076 2236 NEAS.f0444f917a1fc8304161bee3889b0790.exe 28 PID 2236 wrote to memory of 2076 2236 NEAS.f0444f917a1fc8304161bee3889b0790.exe 28 PID 2236 wrote to memory of 2076 2236 NEAS.f0444f917a1fc8304161bee3889b0790.exe 28 PID 2076 wrote to memory of 2308 2076 pxlvj.exe 31 PID 2076 wrote to memory of 2308 2076 pxlvj.exe 31 PID 2076 wrote to memory of 2308 2076 pxlvj.exe 31 PID 2076 wrote to memory of 2308 2076 pxlvj.exe 31 PID 2308 wrote to memory of 2732 2308 pdllfv.exe 30 PID 2308 wrote to memory of 2732 2308 pdllfv.exe 30 PID 2308 wrote to memory of 2732 2308 pdllfv.exe 30 PID 2308 wrote to memory of 2732 2308 pdllfv.exe 30 PID 2732 wrote to memory of 2916 2732 htjppdb.exe 29 PID 2732 wrote to memory of 2916 2732 htjppdb.exe 29 PID 2732 wrote to memory of 2916 2732 htjppdb.exe 29 PID 2732 wrote to memory of 2916 2732 htjppdb.exe 29 PID 2916 wrote to memory of 2612 2916 vthnnrh.exe 32 PID 2916 wrote to memory of 2612 2916 vthnnrh.exe 32 PID 2916 wrote to memory of 2612 2916 vthnnrh.exe 32 PID 2916 wrote to memory of 2612 2916 vthnnrh.exe 32 PID 2612 wrote to memory of 2468 2612 drntnr.exe 33 PID 2612 wrote to memory of 2468 2612 drntnr.exe 33 PID 2612 wrote to memory of 2468 2612 drntnr.exe 33 PID 2612 wrote to memory of 2468 2612 drntnr.exe 33 PID 2468 wrote to memory of 2564 2468 jnhhv.exe 34 PID 2468 wrote to memory of 2564 2468 jnhhv.exe 34 PID 2468 wrote to memory of 2564 2468 jnhhv.exe 34 PID 2468 wrote to memory of 2564 2468 jnhhv.exe 34 PID 2564 wrote to memory of 2344 2564 hdlxlff.exe 35 PID 2564 wrote to memory of 2344 2564 hdlxlff.exe 35 PID 2564 wrote to memory of 2344 2564 hdlxlff.exe 35 PID 2564 wrote to memory of 2344 2564 hdlxlff.exe 35 PID 2344 wrote to memory of 476 2344 pxfxx.exe 36 PID 2344 wrote to memory of 476 2344 pxfxx.exe 36 PID 2344 wrote to memory of 476 2344 pxfxx.exe 36 PID 2344 wrote to memory of 476 2344 pxfxx.exe 36 PID 476 wrote to memory of 1068 476 hhtrnjt.exe 37 PID 476 wrote to memory of 1068 476 hhtrnjt.exe 37 PID 476 wrote to memory of 1068 476 hhtrnjt.exe 37 PID 476 wrote to memory of 1068 476 hhtrnjt.exe 37 PID 1068 wrote to memory of 556 1068 blhhl.exe 39 PID 1068 wrote to memory of 556 1068 blhhl.exe 39 PID 1068 wrote to memory of 556 1068 blhhl.exe 39 PID 1068 wrote to memory of 556 1068 blhhl.exe 39 PID 556 wrote to memory of 2864 556 plbld.exe 38 PID 556 wrote to memory of 2864 556 plbld.exe 38 PID 556 wrote to memory of 2864 556 plbld.exe 38 PID 556 wrote to memory of 2864 556 plbld.exe 38 PID 2864 wrote to memory of 2900 2864 xpjlj.exe 40 PID 2864 wrote to memory of 2900 2864 xpjlj.exe 40 PID 2864 wrote to memory of 2900 2864 xpjlj.exe 40 PID 2864 wrote to memory of 2900 2864 xpjlj.exe 40 PID 2900 wrote to memory of 2292 2900 xhvvtpn.exe 41 PID 2900 wrote to memory of 2292 2900 xhvvtpn.exe 41 PID 2900 wrote to memory of 2292 2900 xhvvtpn.exe 41 PID 2900 wrote to memory of 2292 2900 xhvvtpn.exe 41 PID 2292 wrote to memory of 1056 2292 phljd.exe 42 PID 2292 wrote to memory of 1056 2292 phljd.exe 42 PID 2292 wrote to memory of 1056 2292 phljd.exe 42 PID 2292 wrote to memory of 1056 2292 phljd.exe 42 PID 1056 wrote to memory of 944 1056 pftrpjn.exe 43 PID 1056 wrote to memory of 944 1056 pftrpjn.exe 43 PID 1056 wrote to memory of 944 1056 pftrpjn.exe 43 PID 1056 wrote to memory of 944 1056 pftrpjn.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f0444f917a1fc8304161bee3889b0790.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f0444f917a1fc8304161bee3889b0790.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
\??\c:\pxlvj.exec:\pxlvj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
\??\c:\pdllfv.exec:\pdllfv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308
-
-
-
\??\c:\vthnnrh.exec:\vthnnrh.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\drntnr.exec:\drntnr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\jnhhv.exec:\jnhhv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\hdlxlff.exec:\hdlxlff.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\pxfxx.exec:\pxfxx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
\??\c:\hhtrnjt.exec:\hhtrnjt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:476 -
\??\c:\blhhl.exec:\blhhl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1068 -
\??\c:\plbld.exec:\plbld.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556
-
-
-
-
-
-
-
-
\??\c:\htjppdb.exec:\htjppdb.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732
-
\??\c:\xpjlj.exec:\xpjlj.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\xhvvtpn.exec:\xhvvtpn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
\??\c:\phljd.exec:\phljd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
\??\c:\pftrpjn.exec:\pftrpjn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\jdvdxnr.exec:\jdvdxnr.exe5⤵
- Executes dropped EXE
PID:944 -
\??\c:\ftfphtt.exec:\ftfphtt.exe6⤵
- Executes dropped EXE
PID:1868 -
\??\c:\lphhvfp.exec:\lphhvfp.exe7⤵
- Executes dropped EXE
PID:292 -
\??\c:\pfrjpn.exec:\pfrjpn.exe8⤵
- Executes dropped EXE
PID:1648
-
-
-
-
-
-
-
-
\??\c:\hbldx.exec:\hbldx.exe1⤵
- Executes dropped EXE
PID:2112 -
\??\c:\bttxn.exec:\bttxn.exe2⤵
- Executes dropped EXE
PID:2288 -
\??\c:\xnbbvv.exec:\xnbbvv.exe3⤵
- Executes dropped EXE
PID:2156 -
\??\c:\hfptvdj.exec:\hfptvdj.exe4⤵
- Executes dropped EXE
PID:1316 -
\??\c:\fphnp.exec:\fphnp.exe5⤵
- Executes dropped EXE
PID:2080 -
\??\c:\xhrtd.exec:\xhrtd.exe6⤵
- Executes dropped EXE
PID:2036 -
\??\c:\htvnft.exec:\htvnft.exe7⤵
- Executes dropped EXE
PID:1640 -
\??\c:\fhxblvj.exec:\fhxblvj.exe8⤵
- Executes dropped EXE
PID:460 -
\??\c:\btfnjl.exec:\btfnjl.exe9⤵
- Executes dropped EXE
PID:1552 -
\??\c:\jfhtplr.exec:\jfhtplr.exe10⤵
- Executes dropped EXE
PID:908
-
-
-
-
-
-
-
-
-
-
\??\c:\ldddbb.exec:\ldddbb.exe1⤵
- Executes dropped EXE
PID:2408 -
\??\c:\bndrx.exec:\bndrx.exe2⤵
- Executes dropped EXE
PID:2448 -
\??\c:\djvxjx.exec:\djvxjx.exe3⤵
- Executes dropped EXE
PID:1756 -
\??\c:\fptll.exec:\fptll.exe4⤵
- Executes dropped EXE
PID:2072 -
\??\c:\ldxtx.exec:\ldxtx.exe5⤵
- Executes dropped EXE
PID:2708 -
\??\c:\xhdvpr.exec:\xhdvpr.exe6⤵
- Executes dropped EXE
PID:2584 -
\??\c:\tnrhdb.exec:\tnrhdb.exe7⤵
- Executes dropped EXE
PID:1572 -
\??\c:\vdnbvj.exec:\vdnbvj.exe8⤵
- Executes dropped EXE
PID:2688 -
\??\c:\vbhhvh.exec:\vbhhvh.exe9⤵
- Executes dropped EXE
PID:2640 -
\??\c:\nfrjr.exec:\nfrjr.exe10⤵
- Executes dropped EXE
PID:2776 -
\??\c:\bhfjx.exec:\bhfjx.exe11⤵
- Executes dropped EXE
PID:2672 -
\??\c:\xplbn.exec:\xplbn.exe12⤵
- Executes dropped EXE
PID:2508 -
\??\c:\tprxdnp.exec:\tprxdnp.exe13⤵
- Executes dropped EXE
PID:2556 -
\??\c:\htblxdd.exec:\htblxdd.exe14⤵
- Executes dropped EXE
PID:2992 -
\??\c:\fjhnr.exec:\fjhnr.exe15⤵
- Executes dropped EXE
PID:2564 -
\??\c:\hfdhfdx.exec:\hfdhfdx.exe16⤵
- Executes dropped EXE
PID:372 -
\??\c:\pphpdr.exec:\pphpdr.exe17⤵
- Executes dropped EXE
PID:752 -
\??\c:\fxhpdjv.exec:\fxhpdjv.exe18⤵
- Executes dropped EXE
PID:1512 -
\??\c:\vptpx.exec:\vptpx.exe19⤵
- Executes dropped EXE
PID:964 -
\??\c:\lvvpt.exec:\lvvpt.exe20⤵
- Executes dropped EXE
PID:392 -
\??\c:\lfpflpr.exec:\lfpflpr.exe21⤵
- Executes dropped EXE
PID:2560 -
\??\c:\lvphdx.exec:\lvphdx.exe22⤵
- Executes dropped EXE
PID:2876 -
\??\c:\fnfrflb.exec:\fnfrflb.exe23⤵
- Executes dropped EXE
PID:1844 -
\??\c:\xdllhh.exec:\xdllhh.exe24⤵
- Executes dropped EXE
PID:940 -
\??\c:\pfhll.exec:\pfhll.exe25⤵
- Executes dropped EXE
PID:1632 -
\??\c:\frtdfdd.exec:\frtdfdd.exe26⤵
- Executes dropped EXE
PID:1040 -
\??\c:\bjpnjnt.exec:\bjpnjnt.exe27⤵
- Executes dropped EXE
PID:2548 -
\??\c:\xlhvrnx.exec:\xlhvrnx.exe28⤵
- Executes dropped EXE
PID:2296 -
\??\c:\xbpfd.exec:\xbpfd.exe29⤵
- Executes dropped EXE
PID:1584 -
\??\c:\vhndxx.exec:\vhndxx.exe30⤵
- Executes dropped EXE
PID:2588 -
\??\c:\ffxhdb.exec:\ffxhdb.exe31⤵
- Executes dropped EXE
PID:1628 -
\??\c:\vxhftf.exec:\vxhftf.exe32⤵
- Executes dropped EXE
PID:2164 -
\??\c:\jrvpb.exec:\jrvpb.exe33⤵
- Executes dropped EXE
PID:1224 -
\??\c:\bpxlxl.exec:\bpxlxl.exe34⤵
- Executes dropped EXE
PID:836 -
\??\c:\tpfhn.exec:\tpfhn.exe35⤵PID:2268
-
\??\c:\xhthv.exec:\xhthv.exe36⤵PID:2248
-
\??\c:\llnnb.exec:\llnnb.exe37⤵PID:2088
-
\??\c:\bvpvt.exec:\bvpvt.exe38⤵PID:1928
-
\??\c:\hpldjl.exec:\hpldjl.exe39⤵PID:1380
-
\??\c:\pjvjx.exec:\pjvjx.exe40⤵PID:460
-
\??\c:\nlrvxjl.exec:\nlrvxjl.exe41⤵PID:1880
-
\??\c:\hxfdh.exec:\hxfdh.exe42⤵PID:2976
-
\??\c:\dxftbh.exec:\dxftbh.exe43⤵PID:2872
-
\??\c:\pvdtp.exec:\pvdtp.exe44⤵PID:1664
-
\??\c:\phpdlh.exec:\phpdlh.exe45⤵PID:2172
-
\??\c:\phlxttv.exec:\phlxttv.exe46⤵PID:2964
-
\??\c:\hfpln.exec:\hfpln.exe47⤵PID:2132
-
\??\c:\hpjtxx.exec:\hpjtxx.exe48⤵PID:1956
-
\??\c:\hldnnf.exec:\hldnnf.exe49⤵PID:2984
-
\??\c:\dpptf.exec:\dpptf.exe50⤵PID:1324
-
\??\c:\rrvhhl.exec:\rrvhhl.exe51⤵PID:1288
-
\??\c:\ldnxf.exec:\ldnxf.exe52⤵PID:2604
-
\??\c:\jxfbtlh.exec:\jxfbtlh.exe53⤵PID:2648
-
\??\c:\ddffrbf.exec:\ddffrbf.exe54⤵PID:2688
-
\??\c:\hxpvhff.exec:\hxpvhff.exe55⤵PID:2664
-
\??\c:\bdnhhp.exec:\bdnhhp.exe56⤵PID:2656
-
\??\c:\bhbxdf.exec:\bhbxdf.exe57⤵PID:2612
-
\??\c:\jhtbbhb.exec:\jhtbbhb.exe58⤵PID:2996
-
\??\c:\fdrbrd.exec:\fdrbrd.exe59⤵PID:528
-
\??\c:\dvjplp.exec:\dvjplp.exe60⤵PID:2992
-
\??\c:\ttphr.exec:\ttphr.exe61⤵PID:1960
-
\??\c:\brvfr.exec:\brvfr.exe62⤵PID:1328
-
\??\c:\rvfbvn.exec:\rvfbvn.exe63⤵PID:476
-
\??\c:\rxdbnh.exec:\rxdbnh.exe64⤵PID:1816
-
\??\c:\vbpdrbj.exec:\vbpdrbj.exe65⤵PID:2860
-
\??\c:\hfdhl.exec:\hfdhl.exe66⤵PID:556
-
\??\c:\flrlrd.exec:\flrlrd.exe67⤵PID:1452
-
\??\c:\rlhxx.exec:\rlhxx.exe68⤵PID:2892
-
\??\c:\vtrpn.exec:\vtrpn.exe69⤵PID:904
-
\??\c:\hlrrr.exec:\hlrrr.exe70⤵PID:948
-
\??\c:\blhjdff.exec:\blhjdff.exe71⤵PID:1632
-
\??\c:\rlvdtt.exec:\rlvdtt.exe72⤵PID:2780
-
\??\c:\lhxnvnf.exec:\lhxnvnf.exe73⤵PID:2808
-
\??\c:\djvltpb.exec:\djvltpb.exe74⤵PID:2280
-
\??\c:\vpdtr.exec:\vpdtr.exe75⤵PID:1832
-
\??\c:\fhfblt.exec:\fhfblt.exe76⤵PID:2112
-
\??\c:\rvptfhb.exec:\rvptfhb.exe77⤵PID:2152
-
\??\c:\dvhbxvh.exec:\dvhbxvh.exe78⤵PID:2100
-
\??\c:\nnxjh.exec:\nnxjh.exe79⤵PID:2124
-
\??\c:\fxfphb.exec:\fxfphb.exe80⤵PID:1204
-
\??\c:\fplxb.exec:\fplxb.exe81⤵PID:1944
-
\??\c:\lhdhtdt.exec:\lhdhtdt.exe82⤵PID:2268
-
\??\c:\jxdnpfp.exec:\jxdnpfp.exe83⤵PID:2080
-
\??\c:\flbbvd.exec:\flbbvd.exe84⤵PID:988
-
\??\c:\bltpt.exec:\bltpt.exe85⤵PID:1684
-
\??\c:\vdpvhxj.exec:\vdpvhxj.exe86⤵PID:2980
-
\??\c:\nbhfxn.exec:\nbhfxn.exe87⤵PID:460
-
\??\c:\tnnrhb.exec:\tnnrhb.exe88⤵PID:2956
-
\??\c:\dfbjd.exec:\dfbjd.exe89⤵PID:1388
-
\??\c:\nvdtjn.exec:\nvdtjn.exe90⤵PID:596
-
\??\c:\lxphpf.exec:\lxphpf.exe91⤵PID:1664
-
\??\c:\tfljf.exec:\tfljf.exe92⤵PID:3044
-
\??\c:\hvddh.exec:\hvddh.exe93⤵PID:2824
-
\??\c:\jvftd.exec:\jvftd.exe94⤵PID:1236
-
\??\c:\vhrfrdl.exec:\vhrfrdl.exe95⤵PID:2464
-
\??\c:\vhprrf.exec:\vhprrf.exe96⤵PID:2680
-
\??\c:\dljdvbb.exec:\dljdvbb.exe97⤵PID:2584
-
\??\c:\xbhnd.exec:\xbhnd.exe98⤵PID:1540
-
\??\c:\hhnvbd.exec:\hhnvbd.exe99⤵PID:2912
-
\??\c:\tfvvhxn.exec:\tfvvhxn.exe100⤵PID:2628
-
\??\c:\rjlnxfr.exec:\rjlnxfr.exe101⤵PID:2776
-
\??\c:\rvjbn.exec:\rvjbn.exe102⤵PID:2828
-
\??\c:\rdplf.exec:\rdplf.exe103⤵PID:2468
-
\??\c:\fbtlttx.exec:\fbtlttx.exe104⤵PID:3020
-
\??\c:\bjhjd.exec:\bjhjd.exe105⤵PID:2544
-
\??\c:\nhhpp.exec:\nhhpp.exe106⤵PID:3008
-
\??\c:\pjlbjnb.exec:\pjlbjnb.exe107⤵PID:1744
-
\??\c:\dbvhbjp.exec:\dbvhbjp.exe108⤵PID:572
-
\??\c:\tdpfrx.exec:\tdpfrx.exe109⤵PID:2856
-
\??\c:\ppjrhfl.exec:\ppjrhfl.exe110⤵PID:2596
-
\??\c:\xnvbxhb.exec:\xnvbxhb.exe111⤵PID:964
-
\??\c:\rhnxjtf.exec:\rhnxjtf.exe112⤵PID:2480
-
\??\c:\nfdhj.exec:\nfdhj.exe113⤵PID:392
-
\??\c:\rvtpfhb.exec:\rvtpfhb.exe114⤵PID:1452
-
\??\c:\rhtbt.exec:\rhtbt.exe115⤵PID:1788
-
\??\c:\rdrrflj.exec:\rdrrflj.exe116⤵PID:904
-
\??\c:\ddrpf.exec:\ddrpf.exe117⤵PID:1972
-
\??\c:\bnnfrnj.exec:\bnnfrnj.exe118⤵PID:1820
-
\??\c:\jpldp.exec:\jpldp.exe119⤵PID:2808
-
\??\c:\hldxp.exec:\hldxp.exe120⤵PID:1652
-
\??\c:\xlhlvd.exec:\xlhlvd.exe121⤵PID:2280
-
\??\c:\pbhtd.exec:\pbhtd.exe122⤵PID:2588
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-