Analysis
-
max time kernel
127s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 18:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NEAS.6dc15c9b9bb0f0b881d05da6064fedd0.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
NEAS.6dc15c9b9bb0f0b881d05da6064fedd0.exe
-
Size
386KB
-
MD5
6dc15c9b9bb0f0b881d05da6064fedd0
-
SHA1
64570c87164fb9f91674e21214912ca18075d7bc
-
SHA256
6ff1a53817ea369b3278e84207e6d60a09ec2e17a27bac80352795713ddb24e6
-
SHA512
3d305019c222b7d738bfc953c54d39c5750d8c7e6611256ef0e979eb5d4bfebb8c396144c2637c8e6c63afe72aa170d3a6312aef4bb6f9a9f733e6473144c40b
-
SSDEEP
6144:n3C9BRIG0asYFm71mPfkVB8dKwaO5CVwE:n3C9uYA7okVqdKwaO5CVH
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral1/memory/2232-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2984-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3012-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2632-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2940-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1004-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1096-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2440-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1936-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2476-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1864-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2368-208-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3056-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2376-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1556-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1628-261-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/604-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1248-311-0x00000000002A0000-0x00000000003A0000-memory.dmp family_blackmoon behavioral1/memory/884-314-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1616-341-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2564-396-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-450-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-451-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2196-474-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2196-476-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2984 tntpbr.exe 3012 jjpndtb.exe 2744 lxtxlr.exe 2632 xbftn.exe 2700 lthvx.exe 2780 fxfxrb.exe 2940 tfphxbr.exe 336 rnrdb.exe 1004 bjpfnt.exe 1096 flhdv.exe 2692 bhpjp.exe 2816 ffhlhd.exe 2440 pvnlxnj.exe 1936 dlrrbv.exe 2476 rntnprd.exe 1864 nbjrbr.exe 764 dtlbhf.exe 940 bnxlxtl.exe 880 rxxlbb.exe 2368 xxjfpn.exe 3056 dnntpnt.exe 1288 dhrlrp.exe 2376 djhdhh.exe 1556 rjndfth.exe 1628 hbrfltv.exe 1248 bdvtbf.exe 604 pttxpxp.exe 1032 ndxxtpv.exe 2872 lrpdb.exe 884 hjpnl.exe 2168 hxblnrv.exe 2232 xpjdr.exe 1616 prxxd.exe 2628 hhfhndf.exe 2656 fdnbx.exe 2644 dbxbv.exe 2756 fxhlvxp.exe 2836 vnnrfh.exe 1716 phppv.exe 2564 dbvtbl.exe 772 jhrfrxr.exe 580 ftrfnp.exe 1496 nlpbl.exe 1304 lnrjrd.exe 2588 lprdftx.exe 2676 ddrlbl.exe 2692 pnvjpp.exe 1272 rltxd.exe 1568 ftndtrf.exe 2196 rnvlh.exe 1040 hfplhtj.exe 1624 jltfrf.exe 2412 thjnvdf.exe 2396 btdhj.exe 2380 dptjpx.exe 2892 njbdjtp.exe 2172 jrdhl.exe 1604 vbbrxv.exe 2312 hlnbhx.exe 848 pbllf.exe 2376 bjtjppl.exe 776 jthvft.exe 2356 nnrrd.exe 1072 drlbph.exe -
resource yara_rule behavioral1/memory/2232-2-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2984-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3012-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2632-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1004-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1096-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1096-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2440-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1936-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1864-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1864-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/764-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/880-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2368-208-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1288-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2376-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1556-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1628-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1628-261-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1248-270-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/604-282-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1248-311-0x00000000002A0000-0x00000000003A0000-memory.dmp upx behavioral1/memory/884-314-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1616-341-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-349-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2656-357-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-373-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1716-388-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-396-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/580-412-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1496-420-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-435-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-450-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-451-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-474-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2196-476-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1040-483-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-491-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2984 2232 NEAS.6dc15c9b9bb0f0b881d05da6064fedd0.exe 28 PID 2232 wrote to memory of 2984 2232 NEAS.6dc15c9b9bb0f0b881d05da6064fedd0.exe 28 PID 2232 wrote to memory of 2984 2232 NEAS.6dc15c9b9bb0f0b881d05da6064fedd0.exe 28 PID 2232 wrote to memory of 2984 2232 NEAS.6dc15c9b9bb0f0b881d05da6064fedd0.exe 28 PID 2984 wrote to memory of 3012 2984 tntpbr.exe 29 PID 2984 wrote to memory of 3012 2984 tntpbr.exe 29 PID 2984 wrote to memory of 3012 2984 tntpbr.exe 29 PID 2984 wrote to memory of 3012 2984 tntpbr.exe 29 PID 3012 wrote to memory of 2744 3012 jjpndtb.exe 30 PID 3012 wrote to memory of 2744 3012 jjpndtb.exe 30 PID 3012 wrote to memory of 2744 3012 jjpndtb.exe 30 PID 3012 wrote to memory of 2744 3012 jjpndtb.exe 30 PID 2744 wrote to memory of 2632 2744 lxtxlr.exe 31 PID 2744 wrote to memory of 2632 2744 lxtxlr.exe 31 PID 2744 wrote to memory of 2632 2744 lxtxlr.exe 31 PID 2744 wrote to memory of 2632 2744 lxtxlr.exe 31 PID 2632 wrote to memory of 2700 2632 xbftn.exe 32 PID 2632 wrote to memory of 2700 2632 xbftn.exe 32 PID 2632 wrote to memory of 2700 2632 xbftn.exe 32 PID 2632 wrote to memory of 2700 2632 xbftn.exe 32 PID 2700 wrote to memory of 2780 2700 lthvx.exe 33 PID 2700 wrote to memory of 2780 2700 lthvx.exe 33 PID 2700 wrote to memory of 2780 2700 lthvx.exe 33 PID 2700 wrote to memory of 2780 2700 lthvx.exe 33 PID 2780 wrote to memory of 2940 2780 fxfxrb.exe 34 PID 2780 wrote to memory of 2940 2780 fxfxrb.exe 34 PID 2780 wrote to memory of 2940 2780 fxfxrb.exe 34 PID 2780 wrote to memory of 2940 2780 fxfxrb.exe 34 PID 2940 wrote to memory of 336 2940 tfphxbr.exe 35 PID 2940 wrote to memory of 336 2940 tfphxbr.exe 35 PID 2940 wrote to memory of 336 2940 tfphxbr.exe 35 PID 2940 wrote to memory of 336 2940 tfphxbr.exe 35 PID 336 wrote to memory of 1004 336 rnrdb.exe 36 PID 336 wrote to memory of 1004 336 rnrdb.exe 36 PID 336 wrote to memory of 1004 336 rnrdb.exe 36 PID 336 wrote to memory of 1004 336 rnrdb.exe 36 PID 1004 wrote to memory of 1096 1004 bjpfnt.exe 37 PID 1004 wrote to memory of 1096 1004 bjpfnt.exe 37 PID 1004 wrote to memory of 1096 1004 bjpfnt.exe 37 PID 1004 wrote to memory of 1096 1004 bjpfnt.exe 37 PID 1096 wrote to memory of 2692 1096 flhdv.exe 38 PID 1096 wrote to memory of 2692 1096 flhdv.exe 38 PID 1096 wrote to memory of 2692 1096 flhdv.exe 38 PID 1096 wrote to memory of 2692 1096 flhdv.exe 38 PID 2692 wrote to memory of 2816 2692 bhpjp.exe 39 PID 2692 wrote to memory of 2816 2692 bhpjp.exe 39 PID 2692 wrote to memory of 2816 2692 bhpjp.exe 39 PID 2692 wrote to memory of 2816 2692 bhpjp.exe 39 PID 2816 wrote to memory of 2440 2816 ffhlhd.exe 40 PID 2816 wrote to memory of 2440 2816 ffhlhd.exe 40 PID 2816 wrote to memory of 2440 2816 ffhlhd.exe 40 PID 2816 wrote to memory of 2440 2816 ffhlhd.exe 40 PID 2440 wrote to memory of 1936 2440 pvnlxnj.exe 41 PID 2440 wrote to memory of 1936 2440 pvnlxnj.exe 41 PID 2440 wrote to memory of 1936 2440 pvnlxnj.exe 41 PID 2440 wrote to memory of 1936 2440 pvnlxnj.exe 41 PID 1936 wrote to memory of 2476 1936 dlrrbv.exe 42 PID 1936 wrote to memory of 2476 1936 dlrrbv.exe 42 PID 1936 wrote to memory of 2476 1936 dlrrbv.exe 42 PID 1936 wrote to memory of 2476 1936 dlrrbv.exe 42 PID 2476 wrote to memory of 1864 2476 rntnprd.exe 43 PID 2476 wrote to memory of 1864 2476 rntnprd.exe 43 PID 2476 wrote to memory of 1864 2476 rntnprd.exe 43 PID 2476 wrote to memory of 1864 2476 rntnprd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6dc15c9b9bb0f0b881d05da6064fedd0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6dc15c9b9bb0f0b881d05da6064fedd0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\tntpbr.exec:\tntpbr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\jjpndtb.exec:\jjpndtb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\lxtxlr.exec:\lxtxlr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\xbftn.exec:\xbftn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2632 -
\??\c:\lthvx.exec:\lthvx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\fxfxrb.exec:\fxfxrb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\tfphxbr.exec:\tfphxbr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\rnrdb.exec:\rnrdb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:336 -
\??\c:\bjpfnt.exec:\bjpfnt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1004 -
\??\c:\flhdv.exec:\flhdv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\bhpjp.exec:\bhpjp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\ffhlhd.exec:\ffhlhd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\pvnlxnj.exec:\pvnlxnj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
\??\c:\dlrrbv.exec:\dlrrbv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
\??\c:\rntnprd.exec:\rntnprd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2476 -
\??\c:\nbjrbr.exec:\nbjrbr.exe17⤵
- Executes dropped EXE
PID:1864 -
\??\c:\dtlbhf.exec:\dtlbhf.exe18⤵
- Executes dropped EXE
PID:764 -
\??\c:\bnxlxtl.exec:\bnxlxtl.exe19⤵
- Executes dropped EXE
PID:940 -
\??\c:\rxxlbb.exec:\rxxlbb.exe20⤵
- Executes dropped EXE
PID:880 -
\??\c:\xxjfpn.exec:\xxjfpn.exe21⤵
- Executes dropped EXE
PID:2368 -
\??\c:\dnntpnt.exec:\dnntpnt.exe22⤵
- Executes dropped EXE
PID:3056 -
\??\c:\dhrlrp.exec:\dhrlrp.exe23⤵
- Executes dropped EXE
PID:1288 -
\??\c:\djhdhh.exec:\djhdhh.exe24⤵
- Executes dropped EXE
PID:2376 -
\??\c:\rjndfth.exec:\rjndfth.exe25⤵
- Executes dropped EXE
PID:1556 -
\??\c:\hbrfltv.exec:\hbrfltv.exe26⤵
- Executes dropped EXE
PID:1628 -
\??\c:\bdvtbf.exec:\bdvtbf.exe27⤵
- Executes dropped EXE
PID:1248 -
\??\c:\pttxpxp.exec:\pttxpxp.exe28⤵
- Executes dropped EXE
PID:604 -
\??\c:\ndxxtpv.exec:\ndxxtpv.exe29⤵
- Executes dropped EXE
PID:1032 -
\??\c:\lrpdb.exec:\lrpdb.exe30⤵
- Executes dropped EXE
PID:2872 -
\??\c:\hjpnl.exec:\hjpnl.exe31⤵
- Executes dropped EXE
PID:884 -
\??\c:\hxblnrv.exec:\hxblnrv.exe32⤵
- Executes dropped EXE
PID:2168 -
\??\c:\xpjdr.exec:\xpjdr.exe33⤵
- Executes dropped EXE
PID:2232 -
\??\c:\prxxd.exec:\prxxd.exe34⤵
- Executes dropped EXE
PID:1616 -
\??\c:\hhfhndf.exec:\hhfhndf.exe35⤵
- Executes dropped EXE
PID:2628 -
\??\c:\fdnbx.exec:\fdnbx.exe36⤵
- Executes dropped EXE
PID:2656 -
\??\c:\dbxbv.exec:\dbxbv.exe37⤵
- Executes dropped EXE
PID:2644 -
\??\c:\fxhlvxp.exec:\fxhlvxp.exe38⤵
- Executes dropped EXE
PID:2756 -
\??\c:\vnnrfh.exec:\vnnrfh.exe39⤵
- Executes dropped EXE
PID:2836 -
\??\c:\phppv.exec:\phppv.exe40⤵
- Executes dropped EXE
PID:1716 -
\??\c:\dbvtbl.exec:\dbvtbl.exe41⤵
- Executes dropped EXE
PID:2564 -
\??\c:\jhrfrxr.exec:\jhrfrxr.exe42⤵
- Executes dropped EXE
PID:772 -
\??\c:\ftrfnp.exec:\ftrfnp.exe43⤵
- Executes dropped EXE
PID:580 -
\??\c:\nlpbl.exec:\nlpbl.exe44⤵
- Executes dropped EXE
PID:1496 -
\??\c:\lnrjrd.exec:\lnrjrd.exe45⤵
- Executes dropped EXE
PID:1304 -
\??\c:\lprdftx.exec:\lprdftx.exe46⤵
- Executes dropped EXE
PID:2588 -
\??\c:\ddrlbl.exec:\ddrlbl.exe47⤵
- Executes dropped EXE
PID:2676 -
\??\c:\pnvjpp.exec:\pnvjpp.exe48⤵
- Executes dropped EXE
PID:2692 -
\??\c:\rltxd.exec:\rltxd.exe49⤵
- Executes dropped EXE
PID:1272 -
\??\c:\ftndtrf.exec:\ftndtrf.exe50⤵
- Executes dropped EXE
PID:1568 -
\??\c:\rnvlh.exec:\rnvlh.exe51⤵
- Executes dropped EXE
PID:2196 -
\??\c:\hfplhtj.exec:\hfplhtj.exe52⤵
- Executes dropped EXE
PID:1040 -
\??\c:\jltfrf.exec:\jltfrf.exe53⤵
- Executes dropped EXE
PID:1624 -
\??\c:\thjnvdf.exec:\thjnvdf.exe54⤵
- Executes dropped EXE
PID:2412 -
\??\c:\btdhj.exec:\btdhj.exe55⤵
- Executes dropped EXE
PID:2396 -
\??\c:\dptjpx.exec:\dptjpx.exe56⤵
- Executes dropped EXE
PID:2380 -
\??\c:\njbdjtp.exec:\njbdjtp.exe57⤵
- Executes dropped EXE
PID:2892 -
\??\c:\jrdhl.exec:\jrdhl.exe58⤵
- Executes dropped EXE
PID:2172 -
\??\c:\vbbrxv.exec:\vbbrxv.exe59⤵
- Executes dropped EXE
PID:1604 -
\??\c:\hlnbhx.exec:\hlnbhx.exe60⤵
- Executes dropped EXE
PID:2312 -
\??\c:\pbllf.exec:\pbllf.exe61⤵
- Executes dropped EXE
PID:848 -
\??\c:\bjtjppl.exec:\bjtjppl.exe62⤵
- Executes dropped EXE
PID:2376 -
\??\c:\jthvft.exec:\jthvft.exe63⤵
- Executes dropped EXE
PID:776 -
\??\c:\nnrrd.exec:\nnrrd.exe64⤵
- Executes dropped EXE
PID:2356 -
\??\c:\drlbph.exec:\drlbph.exe65⤵
- Executes dropped EXE
PID:1072 -
\??\c:\fhvnjd.exec:\fhvnjd.exe66⤵PID:2212
-
\??\c:\jhntvd.exec:\jhntvd.exe67⤵PID:844
-
\??\c:\dfjlhpv.exec:\dfjlhpv.exe68⤵PID:2088
-
\??\c:\rthvxhp.exec:\rthvxhp.exe69⤵PID:1308
-
\??\c:\jrbrv.exec:\jrbrv.exe70⤵PID:1160
-
\??\c:\rjthh.exec:\rjthh.exe71⤵PID:884
-
\??\c:\vxptbp.exec:\vxptbp.exe72⤵PID:2116
-
\??\c:\rxhdvll.exec:\rxhdvll.exe73⤵PID:1608
-
\??\c:\ndrhnph.exec:\ndrhnph.exe74⤵PID:3040
-
\??\c:\nnbbpx.exec:\nnbbpx.exe75⤵PID:636
-
\??\c:\rfflj.exec:\rfflj.exe76⤵PID:2728
-
\??\c:\hflrhl.exec:\hflrhl.exe77⤵PID:2388
-
\??\c:\jdrfh.exec:\jdrfh.exe78⤵PID:1756
-
\??\c:\nxflfp.exec:\nxflfp.exe79⤵PID:2672
-
\??\c:\lfpnrxt.exec:\lfpnrxt.exe80⤵PID:2668
-
\??\c:\hhprdh.exec:\hhprdh.exe81⤵PID:2504
-
\??\c:\dnnplvl.exec:\dnnplvl.exe82⤵PID:2176
-
\??\c:\nphpp.exec:\nphpp.exe83⤵PID:2480
-
\??\c:\bvnfb.exec:\bvnfb.exe84⤵PID:772
-
\??\c:\rrnbj.exec:\rrnbj.exe85⤵PID:568
-
\??\c:\vjvdhvd.exec:\vjvdhvd.exe86⤵PID:1496
-
\??\c:\lffxhfh.exec:\lffxhfh.exe87⤵PID:1304
-
\??\c:\tnjtplp.exec:\tnjtplp.exe88⤵PID:2688
-
\??\c:\pdvpd.exec:\pdvpd.exe89⤵PID:2952
-
\??\c:\dbjrj.exec:\dbjrj.exe90⤵PID:2188
-
\??\c:\fbxvrfv.exec:\fbxvrfv.exe91⤵PID:1552
-
\??\c:\pfrfn.exec:\pfrfn.exe92⤵PID:2468
-
\??\c:\njvdx.exec:\njvdx.exe93⤵PID:1952
-
\??\c:\pvpbld.exec:\pvpbld.exe94⤵PID:1052
-
\??\c:\pndhdbr.exec:\pndhdbr.exe95⤵PID:932
-
\??\c:\vjtdv.exec:\vjtdv.exe96⤵PID:924
-
\??\c:\xvbjn.exec:\xvbjn.exe97⤵PID:2540
-
\??\c:\rtfvfj.exec:\rtfvfj.exe98⤵PID:2400
-
\??\c:\rpbxjl.exec:\rpbxjl.exe99⤵PID:2028
-
\??\c:\rvnxhrx.exec:\rvnxhrx.exe100⤵PID:2368
-
\??\c:\tjfxtjv.exec:\tjfxtjv.exe101⤵PID:1920
-
\??\c:\htbfbd.exec:\htbfbd.exe102⤵PID:3000
-
\??\c:\vlhnrpt.exec:\vlhnrpt.exe103⤵PID:1276
-
\??\c:\vhvhb.exec:\vhvhb.exe104⤵PID:372
-
\??\c:\jlvhx.exec:\jlvhx.exe105⤵PID:1388
-
\??\c:\jdlrh.exec:\jdlrh.exe106⤵PID:1548
-
\??\c:\dfpfvbx.exec:\dfpfvbx.exe107⤵PID:1824
-
\??\c:\lfvhbdf.exec:\lfvhbdf.exe108⤵PID:1268
-
\??\c:\brvnj.exec:\brvnj.exe109⤵PID:2296
-
\??\c:\pvjftnp.exec:\pvjftnp.exe110⤵PID:2212
-
\??\c:\xdtvjd.exec:\xdtvjd.exe111⤵PID:1784
-
\??\c:\jlhvpl.exec:\jlhvpl.exe112⤵PID:2680
-
\??\c:\tnndjtj.exec:\tnndjtj.exe113⤵PID:2192
-
\??\c:\jbjbftr.exec:\jbjbftr.exe114⤵PID:3020
-
\??\c:\nbvvd.exec:\nbvvd.exe115⤵PID:1680
-
\??\c:\tfrhhv.exec:\tfrhhv.exe116⤵PID:3036
-
\??\c:\hbbnj.exec:\hbbnj.exe117⤵PID:2856
-
\??\c:\fhhpln.exec:\fhhpln.exe118⤵PID:3012
-
\??\c:\lfnftr.exec:\lfnftr.exe119⤵PID:2728
-
\??\c:\xbtjpn.exec:\xbtjpn.exe120⤵PID:2868
-
\??\c:\fnjdll.exec:\fnjdll.exe121⤵PID:2804
-
\??\c:\tfrbdb.exec:\tfrbdb.exe122⤵PID:2832
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-