Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 04:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b2432b844c7a40263894904a48b2675c207c57bb23f5239fbb405b1628075c9b.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
b2432b844c7a40263894904a48b2675c207c57bb23f5239fbb405b1628075c9b.exe
-
Size
65KB
-
MD5
135fc4914e879247fd8951963012db10
-
SHA1
066e34c413d54a9b4988b58957e64799c8f4d1ac
-
SHA256
b2432b844c7a40263894904a48b2675c207c57bb23f5239fbb405b1628075c9b
-
SHA512
2b0a039a3472fc82e10daf84ac6b2764557ab80e720d0a6c5a8163efd2eaf0d74fa2ab3c3ed41491e880acf4b9f31b947ff6d66383a1615433c993a871eab9a5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6MTSqfQ:ymb3NkkiQ3mdBjFI4Vc
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/1776-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1208-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1636-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1048-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2028-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1096-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1096-90-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1884-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2480-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1868-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1828-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1780-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3012-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/632-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2084-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1096-399-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
fftnbjb.exeddnnhlr.exenjrbvtd.exejtftf.exexfbdlpr.exejrbfjhf.exebddxtrr.exerhdff.exelndvjpj.exebxnfx.exerblnxn.exebrdvlvv.exedvtrf.exebjrhftj.exevbjjbf.exetbtvf.exexxbxfp.exepljbjn.exeblrblvp.exepxldx.exerdbtbnd.exepdlvxvn.exerltfp.exexvrtrb.exeljdbpb.exejpjbxj.exejnvht.exevxrnl.exexfphf.exexvtlhvv.exerxjld.exexjhnbbp.exedppjjl.exentxdhnd.exefhvtbt.exehjdpndh.exevlrvvvp.exeblnnfbb.exednvpf.exebrxrdn.exelflnrft.exehhpnrpl.exeltfddb.exebpnlj.exejntjvd.exehpjdvp.exelvjpd.exelhprh.exepfpttbp.exenpdppvf.exebvvbhp.exenhvtbd.exepjhft.exevbjlb.exevblrr.exelljnf.exejlfjh.exebhfxj.exepthpfl.exeddhhxvt.exehtvvvfp.exedjlvb.exedfntxlb.exepnjrp.exepid process 1208 fftnbjb.exe 1204 ddnnhlr.exe 1636 njrbvtd.exe 1048 jtftf.exe 2028 xfbdlpr.exe 572 jrbfjhf.exe 1152 bddxtrr.exe 1096 rhdff.exe 1884 lndvjpj.exe 2612 bxnfx.exe 2480 rblnxn.exe 2552 brdvlvv.exe 2528 dvtrf.exe 2856 bjrhftj.exe 2680 vbjjbf.exe 1868 tbtvf.exe 1828 xxbxfp.exe 1780 pljbjn.exe 2908 blrblvp.exe 3012 pxldx.exe 3060 rdbtbnd.exe 1512 pdlvxvn.exe 908 rltfp.exe 2816 xvrtrb.exe 1044 ljdbpb.exe 632 jpjbxj.exe 2084 jnvht.exe 2844 vxrnl.exe 2512 xfphf.exe 640 xvtlhvv.exe 1768 rxjld.exe 2080 xjhnbbp.exe 1820 dppjjl.exe 2340 ntxdhnd.exe 1720 fhvtbt.exe 1208 hjdpndh.exe 1612 vlrvvvp.exe 1668 blnnfbb.exe 1272 dnvpf.exe 2020 brxrdn.exe 1984 lflnrft.exe 464 hhpnrpl.exe 1016 ltfddb.exe 1736 bpnlj.exe 1096 jntjvd.exe 840 hpjdvp.exe 1884 lvjpd.exe 2484 lhprh.exe 1348 pfpttbp.exe 2828 npdppvf.exe 2888 bvvbhp.exe 2624 nhvtbd.exe 2836 pjhft.exe 2864 vbjlb.exe 1868 vblrr.exe 1836 lljnf.exe 1828 jlfjh.exe 2948 bhfxj.exe 1812 pthpfl.exe 2976 ddhhxvt.exe 1516 htvvvfp.exe 240 djlvb.exe 2516 dfntxlb.exe 2492 pnjrp.exe -
Processes:
resource yara_rule behavioral1/memory/1776-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1776-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1208-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1636-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1048-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2028-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1152-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1096-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1884-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1868-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1828-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1780-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3012-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/632-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1096-399-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b2432b844c7a40263894904a48b2675c207c57bb23f5239fbb405b1628075c9b.exefftnbjb.exeddnnhlr.exenjrbvtd.exejtftf.exexfbdlpr.exejrbfjhf.exebddxtrr.exerhdff.exelndvjpj.exebxnfx.exerblnxn.exebrdvlvv.exedvtrf.exebjrhftj.exevbjjbf.exedescription pid process target process PID 1776 wrote to memory of 1208 1776 b2432b844c7a40263894904a48b2675c207c57bb23f5239fbb405b1628075c9b.exe fftnbjb.exe PID 1776 wrote to memory of 1208 1776 b2432b844c7a40263894904a48b2675c207c57bb23f5239fbb405b1628075c9b.exe fftnbjb.exe PID 1776 wrote to memory of 1208 1776 b2432b844c7a40263894904a48b2675c207c57bb23f5239fbb405b1628075c9b.exe fftnbjb.exe PID 1776 wrote to memory of 1208 1776 b2432b844c7a40263894904a48b2675c207c57bb23f5239fbb405b1628075c9b.exe fftnbjb.exe PID 1208 wrote to memory of 1204 1208 fftnbjb.exe ddnnhlr.exe PID 1208 wrote to memory of 1204 1208 fftnbjb.exe ddnnhlr.exe PID 1208 wrote to memory of 1204 1208 fftnbjb.exe ddnnhlr.exe PID 1208 wrote to memory of 1204 1208 fftnbjb.exe ddnnhlr.exe PID 1204 wrote to memory of 1636 1204 ddnnhlr.exe njrbvtd.exe PID 1204 wrote to memory of 1636 1204 ddnnhlr.exe njrbvtd.exe PID 1204 wrote to memory of 1636 1204 ddnnhlr.exe njrbvtd.exe PID 1204 wrote to memory of 1636 1204 ddnnhlr.exe njrbvtd.exe PID 1636 wrote to memory of 1048 1636 njrbvtd.exe jtftf.exe PID 1636 wrote to memory of 1048 1636 njrbvtd.exe jtftf.exe PID 1636 wrote to memory of 1048 1636 njrbvtd.exe jtftf.exe PID 1636 wrote to memory of 1048 1636 njrbvtd.exe jtftf.exe PID 1048 wrote to memory of 2028 1048 jtftf.exe xfbdlpr.exe PID 1048 wrote to memory of 2028 1048 jtftf.exe xfbdlpr.exe PID 1048 wrote to memory of 2028 1048 jtftf.exe xfbdlpr.exe PID 1048 wrote to memory of 2028 1048 jtftf.exe xfbdlpr.exe PID 2028 wrote to memory of 572 2028 xfbdlpr.exe jrbfjhf.exe PID 2028 wrote to memory of 572 2028 xfbdlpr.exe jrbfjhf.exe PID 2028 wrote to memory of 572 2028 xfbdlpr.exe jrbfjhf.exe PID 2028 wrote to memory of 572 2028 xfbdlpr.exe jrbfjhf.exe PID 572 wrote to memory of 1152 572 jrbfjhf.exe bddxtrr.exe PID 572 wrote to memory of 1152 572 jrbfjhf.exe bddxtrr.exe PID 572 wrote to memory of 1152 572 jrbfjhf.exe bddxtrr.exe PID 572 wrote to memory of 1152 572 jrbfjhf.exe bddxtrr.exe PID 1152 wrote to memory of 1096 1152 bddxtrr.exe rhdff.exe PID 1152 wrote to memory of 1096 1152 bddxtrr.exe rhdff.exe PID 1152 wrote to memory of 1096 1152 bddxtrr.exe rhdff.exe PID 1152 wrote to memory of 1096 1152 bddxtrr.exe rhdff.exe PID 1096 wrote to memory of 1884 1096 rhdff.exe lndvjpj.exe PID 1096 wrote to memory of 1884 1096 rhdff.exe lndvjpj.exe PID 1096 wrote to memory of 1884 1096 rhdff.exe lndvjpj.exe PID 1096 wrote to memory of 1884 1096 rhdff.exe lndvjpj.exe PID 1884 wrote to memory of 2612 1884 lndvjpj.exe bxnfx.exe PID 1884 wrote to memory of 2612 1884 lndvjpj.exe bxnfx.exe PID 1884 wrote to memory of 2612 1884 lndvjpj.exe bxnfx.exe PID 1884 wrote to memory of 2612 1884 lndvjpj.exe bxnfx.exe PID 2612 wrote to memory of 2480 2612 bxnfx.exe rblnxn.exe PID 2612 wrote to memory of 2480 2612 bxnfx.exe rblnxn.exe PID 2612 wrote to memory of 2480 2612 bxnfx.exe rblnxn.exe PID 2612 wrote to memory of 2480 2612 bxnfx.exe rblnxn.exe PID 2480 wrote to memory of 2552 2480 rblnxn.exe brdvlvv.exe PID 2480 wrote to memory of 2552 2480 rblnxn.exe brdvlvv.exe PID 2480 wrote to memory of 2552 2480 rblnxn.exe brdvlvv.exe PID 2480 wrote to memory of 2552 2480 rblnxn.exe brdvlvv.exe PID 2552 wrote to memory of 2528 2552 brdvlvv.exe dvtrf.exe PID 2552 wrote to memory of 2528 2552 brdvlvv.exe dvtrf.exe PID 2552 wrote to memory of 2528 2552 brdvlvv.exe dvtrf.exe PID 2552 wrote to memory of 2528 2552 brdvlvv.exe dvtrf.exe PID 2528 wrote to memory of 2856 2528 dvtrf.exe bjrhftj.exe PID 2528 wrote to memory of 2856 2528 dvtrf.exe bjrhftj.exe PID 2528 wrote to memory of 2856 2528 dvtrf.exe bjrhftj.exe PID 2528 wrote to memory of 2856 2528 dvtrf.exe bjrhftj.exe PID 2856 wrote to memory of 2680 2856 bjrhftj.exe vbjjbf.exe PID 2856 wrote to memory of 2680 2856 bjrhftj.exe vbjjbf.exe PID 2856 wrote to memory of 2680 2856 bjrhftj.exe vbjjbf.exe PID 2856 wrote to memory of 2680 2856 bjrhftj.exe vbjjbf.exe PID 2680 wrote to memory of 1868 2680 vbjjbf.exe tbtvf.exe PID 2680 wrote to memory of 1868 2680 vbjjbf.exe tbtvf.exe PID 2680 wrote to memory of 1868 2680 vbjjbf.exe tbtvf.exe PID 2680 wrote to memory of 1868 2680 vbjjbf.exe tbtvf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2432b844c7a40263894904a48b2675c207c57bb23f5239fbb405b1628075c9b.exe"C:\Users\Admin\AppData\Local\Temp\b2432b844c7a40263894904a48b2675c207c57bb23f5239fbb405b1628075c9b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
\??\c:\fftnbjb.exec:\fftnbjb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1208 -
\??\c:\ddnnhlr.exec:\ddnnhlr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
\??\c:\njrbvtd.exec:\njrbvtd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\jtftf.exec:\jtftf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1048 -
\??\c:\xfbdlpr.exec:\xfbdlpr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
\??\c:\jrbfjhf.exec:\jrbfjhf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
\??\c:\bddxtrr.exec:\bddxtrr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
\??\c:\rhdff.exec:\rhdff.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1096 -
\??\c:\lndvjpj.exec:\lndvjpj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
\??\c:\bxnfx.exec:\bxnfx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\rblnxn.exec:\rblnxn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\brdvlvv.exec:\brdvlvv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\dvtrf.exec:\dvtrf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\bjrhftj.exec:\bjrhftj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2856 -
\??\c:\vbjjbf.exec:\vbjjbf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\tbtvf.exec:\tbtvf.exe17⤵
- Executes dropped EXE
PID:1868 -
\??\c:\xxbxfp.exec:\xxbxfp.exe18⤵
- Executes dropped EXE
PID:1828 -
\??\c:\pljbjn.exec:\pljbjn.exe19⤵
- Executes dropped EXE
PID:1780 -
\??\c:\blrblvp.exec:\blrblvp.exe20⤵
- Executes dropped EXE
PID:2908 -
\??\c:\pxldx.exec:\pxldx.exe21⤵
- Executes dropped EXE
PID:3012 -
\??\c:\rdbtbnd.exec:\rdbtbnd.exe22⤵
- Executes dropped EXE
PID:3060 -
\??\c:\pdlvxvn.exec:\pdlvxvn.exe23⤵
- Executes dropped EXE
PID:1512 -
\??\c:\rltfp.exec:\rltfp.exe24⤵
- Executes dropped EXE
PID:908 -
\??\c:\xvrtrb.exec:\xvrtrb.exe25⤵
- Executes dropped EXE
PID:2816 -
\??\c:\ljdbpb.exec:\ljdbpb.exe26⤵
- Executes dropped EXE
PID:1044 -
\??\c:\jpjbxj.exec:\jpjbxj.exe27⤵
- Executes dropped EXE
PID:632 -
\??\c:\jnvht.exec:\jnvht.exe28⤵
- Executes dropped EXE
PID:2084 -
\??\c:\vxrnl.exec:\vxrnl.exe29⤵
- Executes dropped EXE
PID:2844 -
\??\c:\xfphf.exec:\xfphf.exe30⤵
- Executes dropped EXE
PID:2512 -
\??\c:\xvtlhvv.exec:\xvtlhvv.exe31⤵
- Executes dropped EXE
PID:640 -
\??\c:\rxjld.exec:\rxjld.exe32⤵
- Executes dropped EXE
PID:1768 -
\??\c:\xjhnbbp.exec:\xjhnbbp.exe33⤵
- Executes dropped EXE
PID:2080 -
\??\c:\dppjjl.exec:\dppjjl.exe34⤵
- Executes dropped EXE
PID:1820 -
\??\c:\ntxdhnd.exec:\ntxdhnd.exe35⤵
- Executes dropped EXE
PID:2340 -
\??\c:\fhvtbt.exec:\fhvtbt.exe36⤵
- Executes dropped EXE
PID:1720 -
\??\c:\hjdpndh.exec:\hjdpndh.exe37⤵
- Executes dropped EXE
PID:1208 -
\??\c:\vlrvvvp.exec:\vlrvvvp.exe38⤵
- Executes dropped EXE
PID:1612 -
\??\c:\blnnfbb.exec:\blnnfbb.exe39⤵
- Executes dropped EXE
PID:1668 -
\??\c:\dnvpf.exec:\dnvpf.exe40⤵
- Executes dropped EXE
PID:1272 -
\??\c:\brxrdn.exec:\brxrdn.exe41⤵
- Executes dropped EXE
PID:2020 -
\??\c:\lflnrft.exec:\lflnrft.exe42⤵
- Executes dropped EXE
PID:1984 -
\??\c:\hhpnrpl.exec:\hhpnrpl.exe43⤵
- Executes dropped EXE
PID:464 -
\??\c:\ltfddb.exec:\ltfddb.exe44⤵
- Executes dropped EXE
PID:1016 -
\??\c:\bpnlj.exec:\bpnlj.exe45⤵
- Executes dropped EXE
PID:1736 -
\??\c:\jntjvd.exec:\jntjvd.exe46⤵
- Executes dropped EXE
PID:1096 -
\??\c:\hpjdvp.exec:\hpjdvp.exe47⤵
- Executes dropped EXE
PID:840 -
\??\c:\lvjpd.exec:\lvjpd.exe48⤵
- Executes dropped EXE
PID:1884 -
\??\c:\lhprh.exec:\lhprh.exe49⤵
- Executes dropped EXE
PID:2484 -
\??\c:\pfpttbp.exec:\pfpttbp.exe50⤵
- Executes dropped EXE
PID:1348 -
\??\c:\npdppvf.exec:\npdppvf.exe51⤵
- Executes dropped EXE
PID:2828 -
\??\c:\bvvbhp.exec:\bvvbhp.exe52⤵
- Executes dropped EXE
PID:2888 -
\??\c:\nhvtbd.exec:\nhvtbd.exe53⤵
- Executes dropped EXE
PID:2624 -
\??\c:\pjhft.exec:\pjhft.exe54⤵
- Executes dropped EXE
PID:2836 -
\??\c:\vbjlb.exec:\vbjlb.exe55⤵
- Executes dropped EXE
PID:2864 -
\??\c:\vblrr.exec:\vblrr.exe56⤵
- Executes dropped EXE
PID:1868 -
\??\c:\lljnf.exec:\lljnf.exe57⤵
- Executes dropped EXE
PID:1836 -
\??\c:\jlfjh.exec:\jlfjh.exe58⤵
- Executes dropped EXE
PID:1828 -
\??\c:\bhfxj.exec:\bhfxj.exe59⤵
- Executes dropped EXE
PID:2948 -
\??\c:\pthpfl.exec:\pthpfl.exe60⤵
- Executes dropped EXE
PID:1812 -
\??\c:\ddhhxvt.exec:\ddhhxvt.exe61⤵
- Executes dropped EXE
PID:2976 -
\??\c:\htvvvfp.exec:\htvvvfp.exe62⤵
- Executes dropped EXE
PID:1516 -
\??\c:\djlvb.exec:\djlvb.exe63⤵
- Executes dropped EXE
PID:240 -
\??\c:\dfntxlb.exec:\dfntxlb.exe64⤵
- Executes dropped EXE
PID:2516 -
\??\c:\pnjrp.exec:\pnjrp.exe65⤵
- Executes dropped EXE
PID:2492 -
\??\c:\nbhxx.exec:\nbhxx.exe66⤵PID:2804
-
\??\c:\tbhptr.exec:\tbhptr.exe67⤵PID:2160
-
\??\c:\tjjlv.exec:\tjjlv.exe68⤵PID:2448
-
\??\c:\fnlphb.exec:\fnlphb.exe69⤵PID:1660
-
\??\c:\ddrfdj.exec:\ddrfdj.exe70⤵PID:2112
-
\??\c:\jbttpf.exec:\jbttpf.exe71⤵PID:2844
-
\??\c:\xpvvvnn.exec:\xpvvvnn.exe72⤵PID:1936
-
\??\c:\rdfjbt.exec:\rdfjbt.exe73⤵PID:1764
-
\??\c:\nlxhpn.exec:\nlxhpn.exe74⤵PID:2096
-
\??\c:\bxlpjf.exec:\bxlpjf.exe75⤵PID:2076
-
\??\c:\hntpxtx.exec:\hntpxtx.exe76⤵PID:1676
-
\??\c:\jhjpj.exec:\jhjpj.exe77⤵PID:1552
-
\??\c:\rndtvvx.exec:\rndtvvx.exe78⤵PID:2340
-
\??\c:\xfntp.exec:\xfntp.exe79⤵PID:1988
-
\??\c:\brrtb.exec:\brrtb.exe80⤵PID:1204
-
\??\c:\vlxrllf.exec:\vlxrllf.exe81⤵PID:1416
-
\??\c:\pvxvn.exec:\pvxvn.exe82⤵PID:1264
-
\??\c:\vnfrlnb.exec:\vnfrlnb.exe83⤵PID:2012
-
\??\c:\dxjhhlx.exec:\dxjhhlx.exe84⤵PID:2020
-
\??\c:\vnvfhlb.exec:\vnvfhlb.exe85⤵PID:776
-
\??\c:\jrttx.exec:\jrttx.exe86⤵PID:516
-
\??\c:\lfbphvf.exec:\lfbphvf.exe87⤵PID:1880
-
\??\c:\vfnlf.exec:\vfnlf.exe88⤵PID:612
-
\??\c:\rhnfhvl.exec:\rhnfhvl.exe89⤵PID:1772
-
\??\c:\xpplpr.exec:\xpplpr.exe90⤵PID:2672
-
\??\c:\jvtlfxj.exec:\jvtlfxj.exe91⤵PID:2472
-
\??\c:\vnvlvr.exec:\vnvlvr.exe92⤵PID:2484
-
\??\c:\dbjbrlt.exec:\dbjbrlt.exe93⤵PID:1348
-
\??\c:\flrlldb.exec:\flrlldb.exe94⤵PID:2840
-
\??\c:\jdvvn.exec:\jdvvn.exe95⤵PID:2640
-
\??\c:\xbnffnt.exec:\xbnffnt.exe96⤵PID:2700
-
\??\c:\jvblrj.exec:\jvblrj.exe97⤵PID:1944
-
\??\c:\xbrjt.exec:\xbrjt.exe98⤵PID:1824
-
\??\c:\phtfbx.exec:\phtfbx.exe99⤵PID:2972
-
\??\c:\jbfnbrf.exec:\jbfnbrf.exe100⤵PID:2916
-
\??\c:\bhhtnrd.exec:\bhhtnrd.exe101⤵PID:2568
-
\??\c:\lpffhbh.exec:\lpffhbh.exe102⤵PID:1828
-
\??\c:\nrtptfd.exec:\nrtptfd.exe103⤵PID:1640
-
\??\c:\rxxfjbl.exec:\rxxfjbl.exe104⤵PID:1648
-
\??\c:\rbbrtrf.exec:\rbbrtrf.exe105⤵PID:2976
-
\??\c:\nrvfrl.exec:\nrvfrl.exe106⤵PID:964
-
\??\c:\rxpnvx.exec:\rxpnvx.exe107⤵PID:2764
-
\??\c:\brvfv.exec:\brvfv.exe108⤵PID:2516
-
\??\c:\lphjfxr.exec:\lphjfxr.exe109⤵PID:1576
-
\??\c:\lnhnhb.exec:\lnhnhb.exe110⤵PID:1044
-
\??\c:\bdrrr.exec:\bdrrr.exe111⤵PID:800
-
\??\c:\vlnntv.exec:\vlnntv.exe112⤵PID:2880
-
\??\c:\tnltjp.exec:\tnltjp.exe113⤵PID:1784
-
\??\c:\dlhtj.exec:\dlhtj.exe114⤵PID:1560
-
\??\c:\njbdb.exec:\njbdb.exe115⤵PID:2296
-
\??\c:\rbxtjf.exec:\rbxtjf.exe116⤵PID:892
-
\??\c:\djtvdh.exec:\djtvdh.exe117⤵PID:2120
-
\??\c:\fhhljlx.exec:\fhhljlx.exe118⤵PID:2260
-
\??\c:\htfln.exec:\htfln.exe119⤵PID:1680
-
\??\c:\vthrxlf.exec:\vthrxlf.exe120⤵PID:1588
-
\??\c:\tvlvh.exec:\tvlvh.exe121⤵PID:1552
-
\??\c:\bdxhh.exec:\bdxhh.exe122⤵PID:2340
-
\??\c:\xdnbdnp.exec:\xdnbdnp.exe123⤵PID:1568
-
\??\c:\nprdvhj.exec:\nprdvhj.exe124⤵PID:1204
-
\??\c:\fnfnrdv.exec:\fnfnrdv.exe125⤵PID:1048
-
\??\c:\bfprh.exec:\bfprh.exe126⤵PID:524
-
\??\c:\rrhjlf.exec:\rrhjlf.exe127⤵PID:2016
-
\??\c:\thhdrxp.exec:\thhdrxp.exe128⤵PID:548
-
\??\c:\tppxxn.exec:\tppxxn.exe129⤵PID:1752
-
\??\c:\trtthf.exec:\trtthf.exe130⤵PID:564
-
\??\c:\vbhvl.exec:\vbhvl.exe131⤵PID:1848
-
\??\c:\nxpff.exec:\nxpff.exe132⤵PID:2404
-
\??\c:\fnrfnr.exec:\fnrfnr.exe133⤵PID:1772
-
\??\c:\fbhdtdh.exec:\fbhdtdh.exe134⤵PID:1116
-
\??\c:\ntnbv.exec:\ntnbv.exe135⤵PID:2704
-
\??\c:\nrplhn.exec:\nrplhn.exe136⤵PID:2556
-
\??\c:\hhnhdpx.exec:\hhnhdpx.exe137⤵PID:1348
-
\??\c:\jhvjrnv.exec:\jhvjrnv.exe138⤵PID:2840
-
\??\c:\tvtlnvv.exec:\tvtlnvv.exe139⤵PID:2852
-
\??\c:\frjdll.exec:\frjdll.exe140⤵PID:1352
-
\??\c:\fvlljjn.exec:\fvlljjn.exe141⤵PID:1896
-
\??\c:\jlfdnj.exec:\jlfdnj.exe142⤵PID:2944
-
\??\c:\hjnvh.exec:\hjnvh.exe143⤵PID:2972
-
\??\c:\vdpxrhv.exec:\vdpxrhv.exe144⤵PID:1716
-
\??\c:\jrjbd.exec:\jrjbd.exe145⤵PID:2568
-
\??\c:\hbnphrt.exec:\hbnphrt.exe146⤵PID:2980
-
\??\c:\tnnrdn.exec:\tnnrdn.exe147⤵PID:3052
-
\??\c:\pnfvdf.exec:\pnfvdf.exe148⤵PID:1604
-
\??\c:\rhrjr.exec:\rhrjr.exe149⤵PID:864
-
\??\c:\rpxndxr.exec:\rpxndxr.exe150⤵PID:964
-
\??\c:\rjhpb.exec:\rjhpb.exe151⤵PID:2816
-
\??\c:\bvbbfbj.exec:\bvbbfbj.exe152⤵PID:1292
-
\??\c:\bnjtdpn.exec:\bnjtdpn.exe153⤵PID:1392
-
\??\c:\xtvjvlt.exec:\xtvjvlt.exe154⤵PID:1044
-
\??\c:\vvbvth.exec:\vvbvth.exe155⤵PID:800
-
\??\c:\bfrfbdd.exec:\bfrfbdd.exe156⤵PID:2880
-
\??\c:\ldtndpp.exec:\ldtndpp.exe157⤵PID:1784
-
\??\c:\hlxjj.exec:\hlxjj.exe158⤵PID:2288
-
\??\c:\nntnflv.exec:\nntnflv.exe159⤵PID:900
-
\??\c:\nvppbhp.exec:\nvppbhp.exe160⤵PID:2576
-
\??\c:\rvfnlrb.exec:\rvfnlrb.exe161⤵PID:988
-
\??\c:\bvtfv.exec:\bvtfv.exe162⤵PID:2080
-
\??\c:\dllrt.exec:\dllrt.exe163⤵PID:1580
-
\??\c:\tvbnpn.exec:\tvbnpn.exe164⤵PID:2364
-
\??\c:\btvlhd.exec:\btvlhd.exe165⤵PID:1252
-
\??\c:\xfpjtvb.exec:\xfpjtvb.exe166⤵PID:1988
-
\??\c:\ljxhr.exec:\ljxhr.exe167⤵PID:1288
-
\??\c:\ltpbdx.exec:\ltpbdx.exe168⤵PID:2032
-
\??\c:\jhvjn.exec:\jhvjn.exe169⤵PID:1264
-
\??\c:\rbbtv.exec:\rbbtv.exe170⤵PID:2012
-
\??\c:\hnvnx.exec:\hnvnx.exe171⤵PID:2020
-
\??\c:\vlptn.exec:\vlptn.exe172⤵PID:1596
-
\??\c:\lbtjn.exec:\lbtjn.exe173⤵PID:516
-
\??\c:\nhhxflj.exec:\nhhxflj.exe174⤵PID:956
-
\??\c:\vdlvnvn.exec:\vdlvnvn.exe175⤵PID:1844
-
\??\c:\ptxdx.exec:\ptxdx.exe176⤵PID:2612
-
\??\c:\tvhptlp.exec:\tvhptlp.exe177⤵PID:2476
-
\??\c:\lnvpt.exec:\lnvpt.exe178⤵PID:2480
-
\??\c:\ddxpp.exec:\ddxpp.exe179⤵PID:2628
-
\??\c:\ftjvrf.exec:\ftjvrf.exe180⤵PID:2560
-
\??\c:\vpttff.exec:\vpttff.exe181⤵PID:2548
-
\??\c:\nllxtl.exec:\nllxtl.exe182⤵PID:2620
-
\??\c:\jlrtn.exec:\jlrtn.exe183⤵PID:2700
-
\??\c:\jvrrbfj.exec:\jvrrbfj.exe184⤵PID:1944
-
\??\c:\rfnjtf.exec:\rfnjtf.exe185⤵PID:1824
-
\??\c:\bpvhfv.exec:\bpvhfv.exe186⤵PID:2920
-
\??\c:\vfpntfl.exec:\vfpntfl.exe187⤵PID:2916
-
\??\c:\xdhhr.exec:\xdhhr.exe188⤵PID:1564
-
\??\c:\xlxldd.exec:\xlxldd.exe189⤵PID:2236
-
\??\c:\rnjjv.exec:\rnjjv.exe190⤵PID:3012
-
\??\c:\flbbt.exec:\flbbt.exe191⤵PID:2980
-
\??\c:\hvdnn.exec:\hvdnn.exe192⤵PID:1372
-
\??\c:\xfxrvf.exec:\xfxrvf.exe193⤵PID:560
-
\??\c:\hpddhl.exec:\hpddhl.exe194⤵PID:916
-
\??\c:\ddnftj.exec:\ddnftj.exe195⤵PID:2492
-
\??\c:\xhvhdf.exec:\xhvhdf.exe196⤵PID:2816
-
\??\c:\nfhpp.exec:\nfhpp.exe197⤵PID:1556
-
\??\c:\jldvld.exec:\jldvld.exe198⤵PID:848
-
\??\c:\trttr.exec:\trttr.exe199⤵PID:1044
-
\??\c:\dlfpn.exec:\dlfpn.exe200⤵PID:1748
-
\??\c:\nbhfld.exec:\nbhfld.exe201⤵PID:2108
-
\??\c:\ljfxbn.exec:\ljfxbn.exe202⤵PID:272
-
\??\c:\txvbbp.exec:\txvbbp.exe203⤵PID:2264
-
\??\c:\vlrjdnr.exec:\vlrjdnr.exe204⤵PID:900
-
\??\c:\fhbbx.exec:\fhbbx.exe205⤵PID:1040
-
\??\c:\dphxl.exec:\dphxl.exe206⤵PID:1820
-
\??\c:\jjtjh.exec:\jjtjh.exe207⤵PID:2420
-
\??\c:\nthnvn.exec:\nthnvn.exe208⤵PID:876
-
\??\c:\nnfhtv.exec:\nnfhtv.exe209⤵PID:1532
-
\??\c:\tbbtlt.exec:\tbbtlt.exe210⤵PID:1320
-
\??\c:\vxrjp.exec:\vxrjp.exe211⤵PID:2324
-
\??\c:\tthnh.exec:\tthnh.exe212⤵PID:1272
-
\??\c:\ldlfldv.exec:\ldlfldv.exe213⤵PID:2024
-
\??\c:\tvnnb.exec:\tvnnb.exe214⤵PID:572
-
\??\c:\bbvjn.exec:\bbvjn.exe215⤵PID:1168
-
\??\c:\nrrfr.exec:\nrrfr.exe216⤵PID:1016
-
\??\c:\bvbtb.exec:\bvbtb.exe217⤵PID:1740
-
\??\c:\fljpv.exec:\fljpv.exe218⤵PID:2408
-
\??\c:\bvbrbj.exec:\bvbrbj.exe219⤵PID:840
-
\??\c:\bpjbp.exec:\bpjbp.exe220⤵PID:2772
-
\??\c:\lrrjb.exec:\lrrjb.exe221⤵PID:2396
-
\??\c:\fjdnt.exec:\fjdnt.exe222⤵PID:2532
-
\??\c:\bphdhpr.exec:\bphdhpr.exe223⤵PID:2828
-
\??\c:\rfxttvx.exec:\rfxttvx.exe224⤵PID:2656
-
\??\c:\fpldp.exec:\fpldp.exe225⤵PID:2644
-
\??\c:\hlvnx.exec:\hlvnx.exe226⤵PID:2680
-
\??\c:\trxxdvb.exec:\trxxdvb.exe227⤵PID:2860
-
\??\c:\flpbjbr.exec:\flpbjbr.exe228⤵PID:1624
-
\??\c:\jjttfrn.exec:\jjttfrn.exe229⤵PID:2936
-
\??\c:\ndjnrvp.exec:\ndjnrvp.exe230⤵PID:2572
-
\??\c:\fxdvr.exec:\fxdvr.exe231⤵PID:2924
-
\??\c:\jjdvrnt.exec:\jjdvrnt.exe232⤵PID:2948
-
\??\c:\vfnjfbr.exec:\vfnjfbr.exe233⤵PID:3068
-
\??\c:\xnfjlv.exec:\xnfjlv.exe234⤵PID:1524
-
\??\c:\xhfjtvx.exec:\xhfjtvx.exe235⤵PID:2896
-
\??\c:\ddldj.exec:\ddldj.exe236⤵PID:984
-
\??\c:\rdvvtv.exec:\rdvvtv.exe237⤵PID:1892
-
\??\c:\nrldljx.exec:\nrldljx.exe238⤵PID:908
-
\??\c:\jtnrxx.exec:\jtnrxx.exe239⤵PID:2960
-
\??\c:\nrttlx.exec:\nrttlx.exe240⤵PID:1056
-
\??\c:\dvpfddj.exec:\dvpfddj.exe241⤵PID:2196
-
\??\c:\bthlfj.exec:\bthlfj.exe242⤵PID:2088