Analysis
-
max time kernel
86s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 20:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.6bfcf17a507cd5a7d654001740bd9060.exe
Resource
win7-20230831-en
4 signatures
150 seconds
General
-
Target
NEAS.6bfcf17a507cd5a7d654001740bd9060.exe
-
Size
187KB
-
MD5
6bfcf17a507cd5a7d654001740bd9060
-
SHA1
935e44ed9a5537e21307d793ca46632e74842cc3
-
SHA256
0418cbb495d0df399d74622fb9a1d01b6d3d09b54f0732f51858b0a7dd38f5e4
-
SHA512
e8b24722d642de65b12b14aacb49228a0e5710f81773ad767ce93408c222aa893703453cdaebd3ff6f33fcf2c5bd0d41411687c5f0a6a2fa90ce51efd0060d14
-
SSDEEP
3072:YhOmTsF93UYfwC6GIoutLmxHxae5yLpcgDE4JBuItR8pTsgnKbQFe3+e:Ycm4FmowdHoSLEaTBftapTsyFeOe
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral2/memory/1276-4-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1852-14-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4644-13-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4488-23-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3348-20-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3280-31-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4896-36-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4076-41-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/936-46-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3564-52-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4908-54-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3960-60-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3200-65-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1380-72-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4540-83-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4356-80-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3108-94-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4016-97-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4000-100-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3652-106-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3616-114-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3872-131-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3012-140-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3500-143-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1252-148-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4004-161-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1832-172-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3628-187-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5072-199-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4740-196-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1080-208-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4440-218-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1168-222-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3612-217-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2080-230-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4512-243-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3080-249-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3388-258-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3200-279-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3748-292-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3804-291-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/880-322-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3404-329-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4328-339-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4352-358-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4160-365-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/5072-374-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2380-391-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1896-408-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3880-438-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1380-446-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4332-461-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2924-481-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3340-511-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4344-521-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2736-570-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2336-602-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4212-631-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1484-665-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4924-682-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/1852-824-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/4840-943-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/3672-1279-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon behavioral2/memory/2956-1614-0x0000000000400000-0x0000000000430000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1852 lbxrd.exe 4644 bhnhh.exe 3348 npljh.exe 4488 jtxpf.exe 3280 xvhhr.exe 4896 jbprl.exe 4076 xjjrldp.exe 936 vhrbvn.exe 3564 dfhffdh.exe 4908 jxlnd.exe 3960 hpxrfh.exe 3200 vtthvvf.exe 1380 vlftptv.exe 4356 fplvnp.exe 4540 jhnrj.exe 3108 jffpxbp.exe 4016 btfhlbh.exe 4000 dnpvxl.exe 3652 lrhjfl.exe 3616 fvhnv.exe 3580 jppbllj.exe 2628 nnhxnrh.exe 3908 pvxrpl.exe 3872 fxrjx.exe 3012 lhlpbl.exe 3500 xtfjxfp.exe 1252 xpvvft.exe 3308 rnjjrj.exe 4004 trnvtx.exe 2804 nndnlt.exe 1832 hfxpp.exe 5016 hdxddvh.exe 368 hplxn.exe 4344 ffxtj.exe 3628 xrdfddx.exe 1824 bxfrx.exe 1020 phxfv.exe 4740 bhlnb.exe 5072 dpdhxj.exe 3812 fvtvxjd.exe 4236 prdrd.exe 1080 lxxtdd.exe 4692 nhpdh.exe 4440 thhxhb.exe 3612 vfhhtf.exe 1168 tfddnbx.exe 1364 tvpbhn.exe 2080 bhdbdr.exe 4008 pxlbfd.exe 652 jlndjh.exe 2332 ttpvjr.exe 4512 xvlnpbl.exe 1348 vvbnvp.exe 3080 dtbxbfx.exe 1752 tjdjlp.exe 3676 vnbrtpt.exe 3388 xrxpl.exe 208 pbdbv.exe 2180 tnpffrd.exe 4908 ffppdrp.exe 1240 dfndhj.exe 3672 xlvrln.exe 3200 xdvdp.exe 4052 tnfjf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1852 1276 NEAS.6bfcf17a507cd5a7d654001740bd9060.exe 84 PID 1276 wrote to memory of 1852 1276 NEAS.6bfcf17a507cd5a7d654001740bd9060.exe 84 PID 1276 wrote to memory of 1852 1276 NEAS.6bfcf17a507cd5a7d654001740bd9060.exe 84 PID 1852 wrote to memory of 4644 1852 lbxrd.exe 82 PID 1852 wrote to memory of 4644 1852 lbxrd.exe 82 PID 1852 wrote to memory of 4644 1852 lbxrd.exe 82 PID 4644 wrote to memory of 3348 4644 bhnhh.exe 83 PID 4644 wrote to memory of 3348 4644 bhnhh.exe 83 PID 4644 wrote to memory of 3348 4644 bhnhh.exe 83 PID 3348 wrote to memory of 4488 3348 npljh.exe 85 PID 3348 wrote to memory of 4488 3348 npljh.exe 85 PID 3348 wrote to memory of 4488 3348 npljh.exe 85 PID 4488 wrote to memory of 3280 4488 jtxpf.exe 86 PID 4488 wrote to memory of 3280 4488 jtxpf.exe 86 PID 4488 wrote to memory of 3280 4488 jtxpf.exe 86 PID 3280 wrote to memory of 4896 3280 xvhhr.exe 87 PID 3280 wrote to memory of 4896 3280 xvhhr.exe 87 PID 3280 wrote to memory of 4896 3280 xvhhr.exe 87 PID 4896 wrote to memory of 4076 4896 jbprl.exe 88 PID 4896 wrote to memory of 4076 4896 jbprl.exe 88 PID 4896 wrote to memory of 4076 4896 jbprl.exe 88 PID 4076 wrote to memory of 936 4076 xjjrldp.exe 90 PID 4076 wrote to memory of 936 4076 xjjrldp.exe 90 PID 4076 wrote to memory of 936 4076 xjjrldp.exe 90 PID 936 wrote to memory of 3564 936 vhrbvn.exe 89 PID 936 wrote to memory of 3564 936 vhrbvn.exe 89 PID 936 wrote to memory of 3564 936 vhrbvn.exe 89 PID 3564 wrote to memory of 4908 3564 dfhffdh.exe 92 PID 3564 wrote to memory of 4908 3564 dfhffdh.exe 92 PID 3564 wrote to memory of 4908 3564 dfhffdh.exe 92 PID 4908 wrote to memory of 3960 4908 jxlnd.exe 93 PID 4908 wrote to memory of 3960 4908 jxlnd.exe 93 PID 4908 wrote to memory of 3960 4908 jxlnd.exe 93 PID 3960 wrote to memory of 3200 3960 hpxrfh.exe 94 PID 3960 wrote to memory of 3200 3960 hpxrfh.exe 94 PID 3960 wrote to memory of 3200 3960 hpxrfh.exe 94 PID 3200 wrote to memory of 1380 3200 vtthvvf.exe 95 PID 3200 wrote to memory of 1380 3200 vtthvvf.exe 95 PID 3200 wrote to memory of 1380 3200 vtthvvf.exe 95 PID 1380 wrote to memory of 4356 1380 vlftptv.exe 96 PID 1380 wrote to memory of 4356 1380 vlftptv.exe 96 PID 1380 wrote to memory of 4356 1380 vlftptv.exe 96 PID 4356 wrote to memory of 4540 4356 fplvnp.exe 97 PID 4356 wrote to memory of 4540 4356 fplvnp.exe 97 PID 4356 wrote to memory of 4540 4356 fplvnp.exe 97 PID 4540 wrote to memory of 3108 4540 jhnrj.exe 98 PID 4540 wrote to memory of 3108 4540 jhnrj.exe 98 PID 4540 wrote to memory of 3108 4540 jhnrj.exe 98 PID 3108 wrote to memory of 4016 3108 jffpxbp.exe 99 PID 3108 wrote to memory of 4016 3108 jffpxbp.exe 99 PID 3108 wrote to memory of 4016 3108 jffpxbp.exe 99 PID 4016 wrote to memory of 4000 4016 btfhlbh.exe 100 PID 4016 wrote to memory of 4000 4016 btfhlbh.exe 100 PID 4016 wrote to memory of 4000 4016 btfhlbh.exe 100 PID 4000 wrote to memory of 3652 4000 dnpvxl.exe 101 PID 4000 wrote to memory of 3652 4000 dnpvxl.exe 101 PID 4000 wrote to memory of 3652 4000 dnpvxl.exe 101 PID 3652 wrote to memory of 3616 3652 lrhjfl.exe 102 PID 3652 wrote to memory of 3616 3652 lrhjfl.exe 102 PID 3652 wrote to memory of 3616 3652 lrhjfl.exe 102 PID 3616 wrote to memory of 3580 3616 fvhnv.exe 103 PID 3616 wrote to memory of 3580 3616 fvhnv.exe 103 PID 3616 wrote to memory of 3580 3616 fvhnv.exe 103 PID 3580 wrote to memory of 2628 3580 jppbllj.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6bfcf17a507cd5a7d654001740bd9060.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6bfcf17a507cd5a7d654001740bd9060.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
\??\c:\lbxrd.exec:\lbxrd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1852
-
-
\??\c:\bhnhh.exec:\bhnhh.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
\??\c:\npljh.exec:\npljh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3348 -
\??\c:\jtxpf.exec:\jtxpf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\xvhhr.exec:\xvhhr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
\??\c:\jbprl.exec:\jbprl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
\??\c:\xjjrldp.exec:\xjjrldp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
\??\c:\vhrbvn.exec:\vhrbvn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936
-
-
-
-
-
-
\??\c:\dlxxrd.exec:\dlxxrd.exe3⤵PID:4440
-
\??\c:\bnhlbx.exec:\bnhlbx.exe4⤵PID:2916
-
\??\c:\fjtrt.exec:\fjtrt.exe5⤵PID:3428
-
\??\c:\fvpxl.exec:\fvpxl.exe6⤵PID:2908
-
\??\c:\trntp.exec:\trntp.exe7⤵PID:4436
-
\??\c:\pljfbd.exec:\pljfbd.exe8⤵PID:3188
-
\??\c:\llnpd.exec:\llnpd.exe9⤵PID:1448
-
\??\c:\pbhlfh.exec:\pbhlfh.exe10⤵PID:4188
-
\??\c:\vhdjhfl.exec:\vhdjhfl.exe11⤵PID:884
-
\??\c:\fxxbd.exec:\fxxbd.exe12⤵PID:3640
-
\??\c:\vrrhnv.exec:\vrrhnv.exe13⤵PID:4496
-
\??\c:\hdvjv.exec:\hdvjv.exe14⤵PID:2992
-
\??\c:\jphlr.exec:\jphlr.exe15⤵PID:4052
-
\??\c:\rlrldt.exec:\rlrldt.exe16⤵PID:3804
-
\??\c:\lxxfn.exec:\lxxfn.exe17⤵PID:1464
-
\??\c:\ftffj.exec:\ftffj.exe18⤵PID:3476
-
\??\c:\vvxhhxl.exec:\vvxhhxl.exe19⤵PID:568
-
\??\c:\rvnbr.exec:\rvnbr.exe20⤵PID:1068
-
\??\c:\fjrtr.exec:\fjrtr.exe21⤵PID:3096
-
\??\c:\tpddn.exec:\tpddn.exe22⤵PID:4616
-
\??\c:\xxprfp.exec:\xxprfp.exe23⤵PID:3268
-
\??\c:\xnbdj.exec:\xnbdj.exe24⤵PID:4624
-
\??\c:\frtrx.exec:\frtrx.exe25⤵PID:1396
-
\??\c:\hlljh.exec:\hlljh.exe26⤵PID:1284
-
\??\c:\lrxvrfd.exec:\lrxvrfd.exe27⤵PID:396
-
\??\c:\xtxpnph.exec:\xtxpnph.exe28⤵PID:4124
-
\??\c:\xbdbn.exec:\xbdbn.exe29⤵PID:2220
-
\??\c:\hnnlhx.exec:\hnnlhx.exe30⤵PID:5020
-
\??\c:\pbtdtb.exec:\pbtdtb.exe31⤵PID:4300
-
\??\c:\lnbrjb.exec:\lnbrjb.exe32⤵PID:3332
-
\??\c:\xdvtvx.exec:\xdvtvx.exe33⤵PID:4792
-
\??\c:\nbpxrlb.exec:\nbpxrlb.exe34⤵PID:3624
-
\??\c:\xhvpl.exec:\xhvpl.exe35⤵PID:2296
-
\??\c:\drvrrlj.exec:\drvrrlj.exe36⤵PID:5112
-
\??\c:\rpjhb.exec:\rpjhb.exe37⤵PID:2752
-
\??\c:\ttvxbv.exec:\ttvxbv.exe38⤵PID:2344
-
\??\c:\ptpdt.exec:\ptpdt.exe39⤵PID:3716
-
\??\c:\frltvp.exec:\frltvp.exe40⤵PID:3816
-
\??\c:\xnlfx.exec:\xnlfx.exe41⤵PID:4840
-
\??\c:\pnjpnj.exec:\pnjpnj.exe42⤵PID:2020
-
\??\c:\tnvbvrb.exec:\tnvbvrb.exe43⤵PID:644
-
\??\c:\pdnlhhv.exec:\pdnlhhv.exe44⤵PID:3212
-
\??\c:\hvvfjrn.exec:\hvvfjrn.exe45⤵PID:4168
-
\??\c:\hxdjtjp.exec:\hxdjtjp.exe46⤵PID:4516
-
\??\c:\fvjrxj.exec:\fvjrxj.exe47⤵PID:2356
-
\??\c:\rhplrnx.exec:\rhplrnx.exe48⤵PID:1048
-
\??\c:\ppfxrj.exec:\ppfxrj.exe49⤵PID:652
-
\??\c:\txxrlp.exec:\txxrlp.exe50⤵PID:4436
-
\??\c:\ftvxx.exec:\ftvxx.exe51⤵PID:3188
-
\??\c:\txvtvf.exec:\txvtvf.exe52⤵PID:2816
-
\??\c:\vbvjpd.exec:\vbvjpd.exe53⤵PID:3700
-
\??\c:\xpllbn.exec:\xpllbn.exe54⤵PID:4244
-
\??\c:\pbjtpr.exec:\pbjtpr.exe55⤵PID:3796
-
\??\c:\btflx.exec:\btflx.exe56⤵PID:4240
-
\??\c:\vhxphxr.exec:\vhxphxr.exe57⤵PID:4048
-
\??\c:\fjfhvfr.exec:\fjfhvfr.exe58⤵PID:1264
-
\??\c:\vtxtfj.exec:\vtxtfj.exe59⤵PID:4312
-
\??\c:\fjfnl.exec:\fjfnl.exe60⤵PID:1464
-
\??\c:\frxfx.exec:\frxfx.exe61⤵PID:3768
-
\??\c:\pxxhpj.exec:\pxxhpj.exe62⤵PID:568
-
\??\c:\pvrvfx.exec:\pvrvfx.exe63⤵PID:3652
-
\??\c:\nphnh.exec:\nphnh.exe64⤵PID:4864
-
\??\c:\hfdpf.exec:\hfdpf.exe65⤵PID:4616
-
\??\c:\xjxvnbx.exec:\xjxvnbx.exe66⤵PID:3268
-
\??\c:\xfhvxb.exec:\xfhvxb.exe67⤵PID:1768
-
\??\c:\xrdlhhd.exec:\xrdlhhd.exe68⤵PID:4580
-
\??\c:\lntbx.exec:\lntbx.exe69⤵PID:4836
-
\??\c:\xbvhl.exec:\xbvhl.exe70⤵PID:4228
-
\??\c:\tnrrfp.exec:\tnrrfp.exe71⤵PID:3916
-
\??\c:\nldtbnv.exec:\nldtbnv.exe72⤵PID:4684
-
\??\c:\xbhxn.exec:\xbhxn.exe73⤵PID:1612
-
\??\c:\tppbjlb.exec:\tppbjlb.exe74⤵PID:1252
-
\??\c:\jhpnj.exec:\jhpnj.exe75⤵PID:3744
-
\??\c:\tblvjhr.exec:\tblvjhr.exe76⤵PID:4004
-
\??\c:\rlbtbnr.exec:\rlbtbnr.exe77⤵PID:1756
-
\??\c:\vvdbvv.exec:\vvdbvv.exe78⤵PID:2420
-
\??\c:\hffnb.exec:\hffnb.exe79⤵PID:3320
-
\??\c:\bprdv.exec:\bprdv.exe80⤵PID:4396
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\lhvjbph.exec:\lhvjbph.exe63⤵PID:2400
-
\??\c:\hfbxnt.exec:\hfbxnt.exe64⤵PID:4628
-
\??\c:\vlfhh.exec:\vlfhh.exe65⤵PID:3308
-
\??\c:\pfjnd.exec:\pfjnd.exe66⤵PID:2420
-
\??\c:\tnppv.exec:\tnppv.exe67⤵PID:2768
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\jrbfxf.exec:\jrbfxf.exe43⤵PID:4644
-
\??\c:\nlhbdnv.exec:\nlhbdnv.exe44⤵PID:2000
-
\??\c:\pjrrrf.exec:\pjrrrf.exe45⤵PID:380
-
\??\c:\ptldp.exec:\ptldp.exe46⤵PID:3084
-
\??\c:\nxphv.exec:\nxphv.exe47⤵PID:444
-
\??\c:\pjxlh.exec:\pjxlh.exe48⤵PID:3776
-
\??\c:\jrtpfpn.exec:\jrtpfpn.exe49⤵PID:4512
-
\??\c:\fvxhdfp.exec:\fvxhdfp.exe50⤵PID:4956
-
\??\c:\lvlfd.exec:\lvlfd.exe51⤵PID:2040
-
\??\c:\vttxjdf.exec:\vttxjdf.exe52⤵PID:3388
-
\??\c:\jfltv.exec:\jfltv.exe53⤵PID:648
-
\??\c:\bnjlvjh.exec:\bnjlvjh.exe54⤵PID:2368
-
\??\c:\bpljl.exec:\bpljl.exe55⤵PID:4564
-
\??\c:\pvbbnjr.exec:\pvbbnjr.exe56⤵PID:884
-
\??\c:\hhfnndj.exec:\hhfnndj.exe57⤵PID:3700
-
\??\c:\pvxlvtn.exec:\pvxlvtn.exe58⤵PID:1708
-
\??\c:\fpjlpn.exec:\fpjlpn.exe59⤵PID:3892
-
\??\c:\bxlrf.exec:\bxlrf.exe60⤵PID:4872
-
\??\c:\ndfrn.exec:\ndfrn.exe61⤵PID:4428
-
\??\c:\fbptnnt.exec:\fbptnnt.exe62⤵PID:5060
-
\??\c:\ttljd.exec:\ttljd.exe63⤵PID:3440
-
\??\c:\fbhtlx.exec:\fbhtlx.exe64⤵PID:2200
-
\??\c:\tvlrjhf.exec:\tvlrjhf.exe65⤵PID:5036
-
\??\c:\rvxnppn.exec:\rvxnppn.exe66⤵PID:4104
-
\??\c:\pvlpljf.exec:\pvlpljf.exe67⤵PID:3128
-
\??\c:\xxfvrxx.exec:\xxfvrxx.exe68⤵PID:4736
-
\??\c:\xlplxv.exec:\xlplxv.exe69⤵PID:3616
-
\??\c:\xvdtjnl.exec:\xvdtjnl.exe70⤵PID:1396
-
\??\c:\dllrxn.exec:\dllrxn.exe71⤵PID:2924
-
\??\c:\xffprvr.exec:\xffprvr.exe72⤵PID:472
-
\??\c:\hbpfd.exec:\hbpfd.exe73⤵PID:3404
-
\??\c:\xxhxnr.exec:\xxhxnr.exe74⤵PID:5108
-
\??\c:\hjfjf.exec:\hjfjf.exe75⤵PID:4064
-
\??\c:\dxnhh.exec:\dxnhh.exe76⤵PID:4500
-
\??\c:\jfphx.exec:\jfphx.exe77⤵PID:3756
-
\??\c:\nhjpj.exec:\nhjpj.exe78⤵PID:1860
-
\??\c:\hjjrt.exec:\hjjrt.exe79⤵PID:3624
-
\??\c:\prnpdn.exec:\prnpdn.exe80⤵PID:1664
-
\??\c:\xtbhx.exec:\xtbhx.exe81⤵PID:1632
-
\??\c:\pftvt.exec:\pftvt.exe82⤵PID:4740
-
\??\c:\pxddjr.exec:\pxddjr.exe83⤵PID:3900
-
\??\c:\jphvlb.exec:\jphvlb.exe84⤵PID:3716
-
\??\c:\vhrfv.exec:\vhrfv.exe85⤵PID:4340
-
\??\c:\fpfpp.exec:\fpfpp.exe86⤵PID:3816
-
\??\c:\jlhxntl.exec:\jlhxntl.exe87⤵PID:440
-
\??\c:\fpjvb.exec:\fpjvb.exe88⤵PID:780
-
\??\c:\txjnhb.exec:\txjnhb.exe89⤵PID:3612
-
\??\c:\vldvfnd.exec:\vldvfnd.exe90⤵PID:4644
-
\??\c:\xllnf.exec:\xllnf.exe91⤵PID:1828
-
\??\c:\blrhx.exec:\blrhx.exe92⤵PID:2904
-
\??\c:\xjnxfv.exec:\xjnxfv.exe93⤵PID:4536
-
\??\c:\rlhll.exec:\rlhll.exe94⤵PID:3084
-
\??\c:\jhfjf.exec:\jhfjf.exe95⤵PID:2916
-
\??\c:\jntbndp.exec:\jntbndp.exe96⤵PID:4516
-
\??\c:\rxrdbn.exec:\rxrdbn.exe97⤵PID:3372
-
\??\c:\vpnrfx.exec:\vpnrfx.exe98⤵PID:2936
-
\??\c:\dhhhlt.exec:\dhhhlt.exe99⤵PID:2736
-
\??\c:\vpbrtfn.exec:\vpbrtfn.exe100⤵PID:3764
-
\??\c:\bptnvvn.exec:\bptnvvn.exe101⤵PID:3676
-
\??\c:\jfvnbh.exec:\jfvnbh.exe102⤵PID:4360
-
\??\c:\bxvrl.exec:\bxvrl.exe103⤵PID:4820
-
\??\c:\nthtf.exec:\nthtf.exe104⤵PID:4316
-
\??\c:\jvdlx.exec:\jvdlx.exe105⤵PID:3700
-
\??\c:\hpjff.exec:\hpjff.exe106⤵PID:4496
-
\??\c:\ddjxbhb.exec:\ddjxbhb.exe107⤵PID:3892
-
\??\c:\vbvlvxx.exec:\vbvlvxx.exe108⤵PID:1360
-
\??\c:\lntnpt.exec:\lntnpt.exe109⤵PID:3672
-
\??\c:\ndtxnr.exec:\ndtxnr.exe110⤵PID:2392
-
\??\c:\hbrblx.exec:\hbrblx.exe111⤵PID:3440
-
\??\c:\xjdrxvb.exec:\xjdrxvb.exe112⤵PID:2200
-
\??\c:\pdhtb.exec:\pdhtb.exe113⤵PID:5036
-
\??\c:\ddxhdb.exec:\ddxhdb.exe114⤵PID:2796
-
\??\c:\fxjfh.exec:\fxjfh.exe115⤵PID:4628
-
\??\c:\tjttr.exec:\tjttr.exe116⤵PID:3320
-
\??\c:\hhjplv.exec:\hhjplv.exe117⤵PID:880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\xpndjx.exec:\xpndjx.exe103⤵PID:2368
-
-
-
-
-
-
\??\c:\vjfvhdn.exec:\vjfvhdn.exe99⤵PID:2736
-
\??\c:\prdljdh.exec:\prdljdh.exe100⤵PID:3640
-
\??\c:\hjtld.exec:\hjtld.exe101⤵PID:4188
-
\??\c:\nxfpf.exec:\nxfpf.exe102⤵PID:3200
-
\??\c:\fxhtth.exec:\fxhtth.exe103⤵PID:3252
-
\??\c:\pjbhnx.exec:\pjbhnx.exe104⤵PID:2992
-
\??\c:\rpvhf.exec:\rpvhf.exe105⤵PID:3636
-
\??\c:\lpthv.exec:\lpthv.exe106⤵PID:4872
-
\??\c:\nlxbn.exec:\nlxbn.exe107⤵PID:4428
-
\??\c:\bprfx.exec:\bprfx.exe108⤵PID:1464
-
\??\c:\xdvnr.exec:\xdvnr.exe109⤵PID:4016
-
\??\c:\ltbphx.exec:\ltbphx.exe110⤵PID:3000
-
\??\c:\ndhjfxv.exec:\ndhjfxv.exe111⤵PID:384
-
\??\c:\frdtr.exec:\frdtr.exe112⤵PID:4396
-
\??\c:\rnfrnl.exec:\rnfrnl.exe113⤵PID:4624
-
\??\c:\lnpnjbl.exec:\lnpnjbl.exe114⤵PID:2920
-
\??\c:\dptnnrb.exec:\dptnnrb.exe115⤵PID:5080
-
\??\c:\vxxtx.exec:\vxxtx.exe116⤵PID:4296
-
\??\c:\jfnphdb.exec:\jfnphdb.exe117⤵PID:988
-
\??\c:\xdtbpxf.exec:\xdtbpxf.exe118⤵PID:3692
-
\??\c:\jvjvfp.exec:\jvjvfp.exe119⤵PID:4684
-
\??\c:\pvbxtx.exec:\pvbxtx.exe120⤵PID:4952
-
\??\c:\tpvdxv.exec:\tpvdxv.exe121⤵PID:5020
-
\??\c:\tnfnt.exec:\tnfnt.exe122⤵PID:3332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-