Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 21:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8a871daba14f59c2388284a6a19930bef754ee1fd149db3dabfbbf054b9b1add.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
8a871daba14f59c2388284a6a19930bef754ee1fd149db3dabfbbf054b9b1add.exe
-
Size
76KB
-
MD5
10b9ad213860fab1096beb2d0178ecd0
-
SHA1
0503c2c17505da522bd197b06ba8d61b749fb773
-
SHA256
8a871daba14f59c2388284a6a19930bef754ee1fd149db3dabfbbf054b9b1add
-
SHA512
c490b90c77c4c83b1a5c159325570e548eeced3a27b3a48832ee1e79108156383d23a5d49202c58171143fa1888e092ba1c2c026cfb4e25237e9db810c135164
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIjaQkPcy8WTeAwHWkDLn/:ymb3NkkiQ3mdBjFIpkPcy8qsHjDD/
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1520-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2340-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2068-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2824-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3064-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2796-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3068-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2236-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2240-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2040-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2176-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1236-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/484-220-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1984-255-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2944-273-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3056-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1748-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ttntnt.exebtnhth.exe7jvdp.exexlllflf.exevpjjd.exejddjv.exexxrllxr.exellflxxf.exe9hthbh.exe7tnbhn.exevvjvd.exe5xlxxfr.exetnbbnt.exehbnnnt.exevjvvd.exevvjpd.exelflrlrf.exe7frxlfr.exenhbhtt.exepjdvd.exeppddj.exerlfxlxf.exexrrxffr.exe5btbbn.exe3vdvd.exedvdjj.exe5frrxfr.exexxflxxl.exe9hhhnt.exetnnbnt.exepjjjp.exefxllrxf.exehhtbht.exe1nhbnt.exeddvdd.exepjvvj.exelfllrrf.exerlfrrxf.exe1htttt.exevvpjd.exepdppv.exexfrrxxf.exerllfxfr.exehhtntt.exenhbbnt.exejdvjd.exedvjdj.exe7fxlxxf.exelxlfrrx.exebtbtbt.exehbnnbh.exe1ddjp.exedvjjj.exelxrrrrx.exelfrflrr.exebbtbbh.exehbhhnt.exepdvdj.exedpjjj.exefxfflrf.exerrxfrff.exehbtbhh.exenhbhth.exevjpdj.exepid process 2340 ttntnt.exe 2068 btnhth.exe 2824 7jvdp.exe 3064 xlllflf.exe 2796 vpjjd.exe 3068 jddjv.exe 2864 xxrllxr.exe 2236 llflxxf.exe 2240 9hthbh.exe 2972 7tnbhn.exe 2040 vvjvd.exe 1672 5xlxxfr.exe 2176 tnbbnt.exe 1064 hbnnnt.exe 1328 vjvvd.exe 2740 vvjpd.exe 1236 lflrlrf.exe 1772 7frxlfr.exe 2852 nhbhtt.exe 2312 pjdvd.exe 2432 ppddj.exe 484 rlfxlxf.exe 1652 xrrxffr.exe 2964 5btbbn.exe 1020 3vdvd.exe 1984 dvdjj.exe 892 5frrxfr.exe 2944 xxflxxl.exe 2940 9hhhnt.exe 3056 tnnbnt.exe 1748 pjjjp.exe 2344 fxllrxf.exe 1608 hhtbht.exe 2472 1nhbnt.exe 2112 ddvdd.exe 2072 pjvvj.exe 2828 lfllrrf.exe 2772 rlfrrxf.exe 2668 1htttt.exe 2524 vvpjd.exe 2552 pdppv.exe 2996 xfrrxxf.exe 2688 rllfxfr.exe 2560 hhtntt.exe 2180 nhbbnt.exe 2352 jdvjd.exe 2972 dvjdj.exe 1552 7fxlxxf.exe 1952 lxlfrrx.exe 1048 btbtbt.exe 1832 hbnnbh.exe 2504 1ddjp.exe 1968 dvjjj.exe 2732 lxrrrrx.exe 2716 lfrflrr.exe 2692 bbtbbh.exe 2060 hbhhnt.exe 824 pdvdj.exe 2312 dpjjj.exe 788 fxfflrf.exe 580 rrxfrff.exe 1812 hbtbhh.exe 1092 nhbhth.exe 2480 vjpdj.exe -
Processes:
resource yara_rule behavioral1/memory/1520-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1520-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2340-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2068-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2824-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2796-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3068-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2240-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2040-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1236-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/484-220-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1984-255-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2944-273-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-291-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1748-300-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8a871daba14f59c2388284a6a19930bef754ee1fd149db3dabfbbf054b9b1add.exettntnt.exebtnhth.exe7jvdp.exexlllflf.exevpjjd.exejddjv.exexxrllxr.exellflxxf.exe9hthbh.exe7tnbhn.exevvjvd.exe5xlxxfr.exetnbbnt.exehbnnnt.exevjvvd.exedescription pid process target process PID 1520 wrote to memory of 2340 1520 8a871daba14f59c2388284a6a19930bef754ee1fd149db3dabfbbf054b9b1add.exe ttntnt.exe PID 1520 wrote to memory of 2340 1520 8a871daba14f59c2388284a6a19930bef754ee1fd149db3dabfbbf054b9b1add.exe ttntnt.exe PID 1520 wrote to memory of 2340 1520 8a871daba14f59c2388284a6a19930bef754ee1fd149db3dabfbbf054b9b1add.exe ttntnt.exe PID 1520 wrote to memory of 2340 1520 8a871daba14f59c2388284a6a19930bef754ee1fd149db3dabfbbf054b9b1add.exe ttntnt.exe PID 2340 wrote to memory of 2068 2340 ttntnt.exe btnhth.exe PID 2340 wrote to memory of 2068 2340 ttntnt.exe btnhth.exe PID 2340 wrote to memory of 2068 2340 ttntnt.exe btnhth.exe PID 2340 wrote to memory of 2068 2340 ttntnt.exe btnhth.exe PID 2068 wrote to memory of 2824 2068 btnhth.exe 7jvdp.exe PID 2068 wrote to memory of 2824 2068 btnhth.exe 7jvdp.exe PID 2068 wrote to memory of 2824 2068 btnhth.exe 7jvdp.exe PID 2068 wrote to memory of 2824 2068 btnhth.exe 7jvdp.exe PID 2824 wrote to memory of 3064 2824 7jvdp.exe xlllflf.exe PID 2824 wrote to memory of 3064 2824 7jvdp.exe xlllflf.exe PID 2824 wrote to memory of 3064 2824 7jvdp.exe xlllflf.exe PID 2824 wrote to memory of 3064 2824 7jvdp.exe xlllflf.exe PID 3064 wrote to memory of 2796 3064 xlllflf.exe vpjjd.exe PID 3064 wrote to memory of 2796 3064 xlllflf.exe vpjjd.exe PID 3064 wrote to memory of 2796 3064 xlllflf.exe vpjjd.exe PID 3064 wrote to memory of 2796 3064 xlllflf.exe vpjjd.exe PID 2796 wrote to memory of 3068 2796 vpjjd.exe jddjv.exe PID 2796 wrote to memory of 3068 2796 vpjjd.exe jddjv.exe PID 2796 wrote to memory of 3068 2796 vpjjd.exe jddjv.exe PID 2796 wrote to memory of 3068 2796 vpjjd.exe jddjv.exe PID 3068 wrote to memory of 2864 3068 jddjv.exe xxrllxr.exe PID 3068 wrote to memory of 2864 3068 jddjv.exe xxrllxr.exe PID 3068 wrote to memory of 2864 3068 jddjv.exe xxrllxr.exe PID 3068 wrote to memory of 2864 3068 jddjv.exe xxrllxr.exe PID 2864 wrote to memory of 2236 2864 xxrllxr.exe llflxxf.exe PID 2864 wrote to memory of 2236 2864 xxrllxr.exe llflxxf.exe PID 2864 wrote to memory of 2236 2864 xxrllxr.exe llflxxf.exe PID 2864 wrote to memory of 2236 2864 xxrllxr.exe llflxxf.exe PID 2236 wrote to memory of 2240 2236 llflxxf.exe 9hthbh.exe PID 2236 wrote to memory of 2240 2236 llflxxf.exe 9hthbh.exe PID 2236 wrote to memory of 2240 2236 llflxxf.exe 9hthbh.exe PID 2236 wrote to memory of 2240 2236 llflxxf.exe 9hthbh.exe PID 2240 wrote to memory of 2972 2240 9hthbh.exe 7tnbhn.exe PID 2240 wrote to memory of 2972 2240 9hthbh.exe 7tnbhn.exe PID 2240 wrote to memory of 2972 2240 9hthbh.exe 7tnbhn.exe PID 2240 wrote to memory of 2972 2240 9hthbh.exe 7tnbhn.exe PID 2972 wrote to memory of 2040 2972 7tnbhn.exe vvjvd.exe PID 2972 wrote to memory of 2040 2972 7tnbhn.exe vvjvd.exe PID 2972 wrote to memory of 2040 2972 7tnbhn.exe vvjvd.exe PID 2972 wrote to memory of 2040 2972 7tnbhn.exe vvjvd.exe PID 2040 wrote to memory of 1672 2040 vvjvd.exe 5xlxxfr.exe PID 2040 wrote to memory of 1672 2040 vvjvd.exe 5xlxxfr.exe PID 2040 wrote to memory of 1672 2040 vvjvd.exe 5xlxxfr.exe PID 2040 wrote to memory of 1672 2040 vvjvd.exe 5xlxxfr.exe PID 1672 wrote to memory of 2176 1672 5xlxxfr.exe tnbbnt.exe PID 1672 wrote to memory of 2176 1672 5xlxxfr.exe tnbbnt.exe PID 1672 wrote to memory of 2176 1672 5xlxxfr.exe tnbbnt.exe PID 1672 wrote to memory of 2176 1672 5xlxxfr.exe tnbbnt.exe PID 2176 wrote to memory of 1064 2176 tnbbnt.exe hbnnnt.exe PID 2176 wrote to memory of 1064 2176 tnbbnt.exe hbnnnt.exe PID 2176 wrote to memory of 1064 2176 tnbbnt.exe hbnnnt.exe PID 2176 wrote to memory of 1064 2176 tnbbnt.exe hbnnnt.exe PID 1064 wrote to memory of 1328 1064 hbnnnt.exe vjvvd.exe PID 1064 wrote to memory of 1328 1064 hbnnnt.exe vjvvd.exe PID 1064 wrote to memory of 1328 1064 hbnnnt.exe vjvvd.exe PID 1064 wrote to memory of 1328 1064 hbnnnt.exe vjvvd.exe PID 1328 wrote to memory of 2740 1328 vjvvd.exe vvjpd.exe PID 1328 wrote to memory of 2740 1328 vjvvd.exe vvjpd.exe PID 1328 wrote to memory of 2740 1328 vjvvd.exe vvjpd.exe PID 1328 wrote to memory of 2740 1328 vjvvd.exe vvjpd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a871daba14f59c2388284a6a19930bef754ee1fd149db3dabfbbf054b9b1add.exe"C:\Users\Admin\AppData\Local\Temp\8a871daba14f59c2388284a6a19930bef754ee1fd149db3dabfbbf054b9b1add.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\ttntnt.exec:\ttntnt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
\??\c:\btnhth.exec:\btnhth.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
\??\c:\7jvdp.exec:\7jvdp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\xlllflf.exec:\xlllflf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\vpjjd.exec:\vpjjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\jddjv.exec:\jddjv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
\??\c:\xxrllxr.exec:\xxrllxr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\llflxxf.exec:\llflxxf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
\??\c:\9hthbh.exec:\9hthbh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
\??\c:\7tnbhn.exec:\7tnbhn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2972 -
\??\c:\vvjvd.exec:\vvjvd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\5xlxxfr.exec:\5xlxxfr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
\??\c:\tnbbnt.exec:\tnbbnt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\hbnnnt.exec:\hbnnnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
\??\c:\vjvvd.exec:\vjvvd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1328 -
\??\c:\vvjpd.exec:\vvjpd.exe17⤵
- Executes dropped EXE
PID:2740 -
\??\c:\lflrlrf.exec:\lflrlrf.exe18⤵
- Executes dropped EXE
PID:1236 -
\??\c:\7frxlfr.exec:\7frxlfr.exe19⤵
- Executes dropped EXE
PID:1772 -
\??\c:\nhbhtt.exec:\nhbhtt.exe20⤵
- Executes dropped EXE
PID:2852 -
\??\c:\pjdvd.exec:\pjdvd.exe21⤵
- Executes dropped EXE
PID:2312 -
\??\c:\ppddj.exec:\ppddj.exe22⤵
- Executes dropped EXE
PID:2432 -
\??\c:\rlfxlxf.exec:\rlfxlxf.exe23⤵
- Executes dropped EXE
PID:484 -
\??\c:\xrrxffr.exec:\xrrxffr.exe24⤵
- Executes dropped EXE
PID:1652 -
\??\c:\5btbbn.exec:\5btbbn.exe25⤵
- Executes dropped EXE
PID:2964 -
\??\c:\3vdvd.exec:\3vdvd.exe26⤵
- Executes dropped EXE
PID:1020 -
\??\c:\dvdjj.exec:\dvdjj.exe27⤵
- Executes dropped EXE
PID:1984 -
\??\c:\5frrxfr.exec:\5frrxfr.exe28⤵
- Executes dropped EXE
PID:892 -
\??\c:\xxflxxl.exec:\xxflxxl.exe29⤵
- Executes dropped EXE
PID:2944 -
\??\c:\9hhhnt.exec:\9hhhnt.exe30⤵
- Executes dropped EXE
PID:2940 -
\??\c:\tnnbnt.exec:\tnnbnt.exe31⤵
- Executes dropped EXE
PID:3056 -
\??\c:\pjjjp.exec:\pjjjp.exe32⤵
- Executes dropped EXE
PID:1748 -
\??\c:\fxllrxf.exec:\fxllrxf.exe33⤵
- Executes dropped EXE
PID:2344 -
\??\c:\hhtbht.exec:\hhtbht.exe34⤵
- Executes dropped EXE
PID:1608 -
\??\c:\1nhbnt.exec:\1nhbnt.exe35⤵
- Executes dropped EXE
PID:2472 -
\??\c:\ddvdd.exec:\ddvdd.exe36⤵
- Executes dropped EXE
PID:2112 -
\??\c:\pjvvj.exec:\pjvvj.exe37⤵
- Executes dropped EXE
PID:2072 -
\??\c:\lfllrrf.exec:\lfllrrf.exe38⤵
- Executes dropped EXE
PID:2828 -
\??\c:\rlfrrxf.exec:\rlfrrxf.exe39⤵
- Executes dropped EXE
PID:2772 -
\??\c:\1htttt.exec:\1htttt.exe40⤵
- Executes dropped EXE
PID:2668 -
\??\c:\vvpjd.exec:\vvpjd.exe41⤵
- Executes dropped EXE
PID:2524 -
\??\c:\pdppv.exec:\pdppv.exe42⤵
- Executes dropped EXE
PID:2552 -
\??\c:\xfrrxxf.exec:\xfrrxxf.exe43⤵
- Executes dropped EXE
PID:2996 -
\??\c:\rllfxfr.exec:\rllfxfr.exe44⤵
- Executes dropped EXE
PID:2688 -
\??\c:\hhtntt.exec:\hhtntt.exe45⤵
- Executes dropped EXE
PID:2560 -
\??\c:\nhbbnt.exec:\nhbbnt.exe46⤵
- Executes dropped EXE
PID:2180 -
\??\c:\jdvjd.exec:\jdvjd.exe47⤵
- Executes dropped EXE
PID:2352 -
\??\c:\dvjdj.exec:\dvjdj.exe48⤵
- Executes dropped EXE
PID:2972 -
\??\c:\7fxlxxf.exec:\7fxlxxf.exe49⤵
- Executes dropped EXE
PID:1552 -
\??\c:\lxlfrrx.exec:\lxlfrrx.exe50⤵
- Executes dropped EXE
PID:1952 -
\??\c:\btbtbt.exec:\btbtbt.exe51⤵
- Executes dropped EXE
PID:1048 -
\??\c:\hbnnbh.exec:\hbnnbh.exe52⤵
- Executes dropped EXE
PID:1832 -
\??\c:\1ddjp.exec:\1ddjp.exe53⤵
- Executes dropped EXE
PID:2504 -
\??\c:\dvjjj.exec:\dvjjj.exe54⤵
- Executes dropped EXE
PID:1968 -
\??\c:\lxrrrrx.exec:\lxrrrrx.exe55⤵
- Executes dropped EXE
PID:2732 -
\??\c:\lfrflrr.exec:\lfrflrr.exe56⤵
- Executes dropped EXE
PID:2716 -
\??\c:\bbtbbh.exec:\bbtbbh.exe57⤵
- Executes dropped EXE
PID:2692 -
\??\c:\hbhhnt.exec:\hbhhnt.exe58⤵
- Executes dropped EXE
PID:2060 -
\??\c:\pdvdj.exec:\pdvdj.exe59⤵
- Executes dropped EXE
PID:824 -
\??\c:\dpjjj.exec:\dpjjj.exe60⤵
- Executes dropped EXE
PID:2312 -
\??\c:\fxfflrf.exec:\fxfflrf.exe61⤵
- Executes dropped EXE
PID:788 -
\??\c:\rrxfrff.exec:\rrxfrff.exe62⤵
- Executes dropped EXE
PID:580 -
\??\c:\hbtbhh.exec:\hbtbhh.exe63⤵
- Executes dropped EXE
PID:1812 -
\??\c:\nhbhth.exec:\nhbhth.exe64⤵
- Executes dropped EXE
PID:1092 -
\??\c:\vjpdj.exec:\vjpdj.exe65⤵
- Executes dropped EXE
PID:2480 -
\??\c:\dvddp.exec:\dvddp.exe66⤵PID:964
-
\??\c:\xrflrrf.exec:\xrflrrf.exe67⤵PID:1372
-
\??\c:\9lflfrl.exec:\9lflfrl.exe68⤵PID:2404
-
\??\c:\btbhbh.exec:\btbhbh.exe69⤵PID:2928
-
\??\c:\htbbbb.exec:\htbbbb.exe70⤵PID:848
-
\??\c:\ddjpv.exec:\ddjpv.exe71⤵PID:2444
-
\??\c:\pdjjv.exec:\pdjjv.exe72⤵PID:1200
-
\??\c:\fflrflx.exec:\fflrflx.exe73⤵PID:2956
-
\??\c:\hbnhnt.exec:\hbnhnt.exe74⤵PID:2264
-
\??\c:\nhnnbb.exec:\nhnnbb.exe75⤵PID:2108
-
\??\c:\vpddd.exec:\vpddd.exe76⤵PID:2268
-
\??\c:\1djpj.exec:\1djpj.exe77⤵PID:2596
-
\??\c:\ffxrrfl.exec:\ffxrrfl.exe78⤵PID:1760
-
\??\c:\7lflxff.exec:\7lflxff.exe79⤵PID:2656
-
\??\c:\7htbhn.exec:\7htbhn.exe80⤵PID:2792
-
\??\c:\tnthtb.exec:\tnthtb.exe81⤵PID:2772
-
\??\c:\jpvpd.exec:\jpvpd.exe82⤵PID:2120
-
\??\c:\3jvjp.exec:\3jvjp.exe83⤵PID:2856
-
\??\c:\9fxrflr.exec:\9fxrflr.exe84⤵PID:2652
-
\??\c:\rrlrxxf.exec:\rrlrxxf.exe85⤵PID:2628
-
\??\c:\tnnnbb.exec:\tnnnbb.exe86⤵PID:2636
-
\??\c:\5tnnhh.exec:\5tnnhh.exe87⤵PID:3048
-
\??\c:\bnnbnb.exec:\bnnbnb.exe88⤵PID:2428
-
\??\c:\jdjpd.exec:\jdjpd.exe89⤵PID:2352
-
\??\c:\pdppd.exec:\pdppd.exe90⤵PID:2484
-
\??\c:\rlxxllr.exec:\rlxxllr.exe91⤵PID:1248
-
\??\c:\rlrfrxf.exec:\rlrfrxf.exe92⤵PID:2176
-
\??\c:\hbtbhh.exec:\hbtbhh.exe93⤵PID:1860
-
\??\c:\tnbhtt.exec:\tnbhtt.exe94⤵PID:1340
-
\??\c:\vppvj.exec:\vppvj.exe95⤵PID:2744
-
\??\c:\vpdvd.exec:\vpdvd.exe96⤵PID:1972
-
\??\c:\fxffrfr.exec:\fxffrfr.exe97⤵PID:2604
-
\??\c:\fxxxrfr.exec:\fxxxrfr.exe98⤵PID:2752
-
\??\c:\9hhhth.exec:\9hhhth.exe99⤵PID:2556
-
\??\c:\nbhntb.exec:\nbhntb.exe100⤵PID:1584
-
\??\c:\5vpvj.exec:\5vpvj.exe101⤵PID:596
-
\??\c:\jdpjv.exec:\jdpjv.exe102⤵PID:2988
-
\??\c:\9pddp.exec:\9pddp.exe103⤵PID:716
-
\??\c:\fxlrffl.exec:\fxlrffl.exe104⤵PID:1756
-
\??\c:\3xlxllx.exec:\3xlxllx.exe105⤵PID:1056
-
\??\c:\hbhhnt.exec:\hbhhnt.exe106⤵PID:1020
-
\??\c:\thbbbh.exec:\thbbbh.exe107⤵PID:1996
-
\??\c:\dvpdp.exec:\dvpdp.exe108⤵PID:1624
-
\??\c:\vjjpd.exec:\vjjpd.exe109⤵PID:1168
-
\??\c:\fxxlrxf.exec:\fxxlrxf.exe110⤵PID:292
-
\??\c:\7rlxfrr.exec:\7rlxfrr.exe111⤵PID:1804
-
\??\c:\tntbhh.exec:\tntbhh.exe112⤵PID:1512
-
\??\c:\httttt.exec:\httttt.exe113⤵PID:2220
-
\??\c:\jvjpv.exec:\jvjpv.exe114⤵PID:1520
-
\??\c:\jvppd.exec:\jvppd.exe115⤵PID:2188
-
\??\c:\lxflllx.exec:\lxflllx.exe116⤵PID:1728
-
\??\c:\xrrxffr.exec:\xrrxffr.exe117⤵PID:1460
-
\??\c:\hbtbtb.exec:\hbtbtb.exe118⤵PID:2876
-
\??\c:\tthtbb.exec:\tthtbb.exe119⤵PID:2252
-
\??\c:\vjvdj.exec:\vjvdj.exe120⤵PID:1760
-
\??\c:\dvvvp.exec:\dvvvp.exe121⤵PID:3064
-
\??\c:\lflxlrx.exec:\lflxlrx.exe122⤵PID:2796
-
\??\c:\lfflllf.exec:\lfflllf.exe123⤵PID:2676
-
\??\c:\1htnbb.exec:\1htnbb.exe124⤵PID:2812
-
\??\c:\3jjjj.exec:\3jjjj.exe125⤵PID:2652
-
\??\c:\7vpdj.exec:\7vpdj.exe126⤵PID:2536
-
\??\c:\rlxxffl.exec:\rlxxffl.exe127⤵PID:2968
-
\??\c:\lfxlxxl.exec:\lfxlxxl.exe128⤵PID:2636
-
\??\c:\3bttbb.exec:\3bttbb.exe129⤵PID:1316
-
\??\c:\nbtbhn.exec:\nbtbhn.exe130⤵PID:1152
-
\??\c:\vpdjj.exec:\vpdjj.exe131⤵PID:1820
-
\??\c:\jdjvv.exec:\jdjvv.exe132⤵PID:2324
-
\??\c:\lfflxxl.exec:\lfflxxl.exe133⤵PID:1008
-
\??\c:\tnhhtt.exec:\tnhhtt.exe134⤵PID:1064
-
\??\c:\nnhnbh.exec:\nnhnbh.exe135⤵PID:1992
-
\??\c:\7hhnbn.exec:\7hhnbn.exe136⤵PID:316
-
\??\c:\9ddvj.exec:\9ddvj.exe137⤵PID:820
-
\??\c:\3dppv.exec:\3dppv.exe138⤵PID:2868
-
\??\c:\9lflfff.exec:\9lflfff.exe139⤵PID:2256
-
\??\c:\rrfrrxf.exec:\rrfrrxf.exe140⤵PID:2852
-
\??\c:\hhntnh.exec:\hhntnh.exe141⤵PID:2056
-
\??\c:\btbhtt.exec:\btbhtt.exe142⤵PID:2432
-
\??\c:\bbhbnt.exec:\bbhbnt.exe143⤵PID:600
-
\??\c:\dvjjp.exec:\dvjjp.exe144⤵PID:1204
-
\??\c:\1lffllr.exec:\1lffllr.exe145⤵PID:1544
-
\??\c:\3lxlxxf.exec:\3lxlxxf.exe146⤵PID:2032
-
\??\c:\hthnnn.exec:\hthnnn.exe147⤵PID:2500
-
\??\c:\nhbhhh.exec:\nhbhhh.exe148⤵PID:1336
-
\??\c:\dvjjp.exec:\dvjjp.exe149⤵PID:2924
-
\??\c:\9jpdv.exec:\9jpdv.exe150⤵PID:2932
-
\??\c:\fxlffff.exec:\fxlffff.exe151⤵PID:2884
-
\??\c:\lllfrrx.exec:\lllfrrx.exe152⤵PID:2412
-
\??\c:\3rxrxrl.exec:\3rxrxrl.exe153⤵PID:2336
-
\??\c:\bbbnth.exec:\bbbnth.exe154⤵PID:2096
-
\??\c:\nhbhhh.exec:\nhbhhh.exe155⤵PID:1616
-
\??\c:\dvpdp.exec:\dvpdp.exe156⤵PID:1588
-
\??\c:\pppvv.exec:\pppvv.exe157⤵PID:1720
-
\??\c:\9lfrlrr.exec:\9lfrlrr.exe158⤵PID:1600
-
\??\c:\xxxxrrf.exec:\xxxxrrf.exe159⤵PID:1796
-
\??\c:\nhhntb.exec:\nhhntb.exe160⤵PID:2072
-
\??\c:\5nhhnh.exec:\5nhhnh.exe161⤵PID:2784
-
\??\c:\dpddp.exec:\dpddp.exe162⤵PID:2760
-
\??\c:\vpjvp.exec:\vpjvp.exe163⤵PID:2816
-
\??\c:\rllrxfr.exec:\rllrxfr.exe164⤵PID:2524
-
\??\c:\rffxrrf.exec:\rffxrrf.exe165⤵PID:1664
-
\??\c:\nhtbnn.exec:\nhtbnn.exe166⤵PID:2960
-
\??\c:\7bbhnt.exec:\7bbhnt.exe167⤵PID:2516
-
\??\c:\dvjpp.exec:\dvjpp.exe168⤵PID:2560
-
\??\c:\vjvvd.exec:\vjvvd.exe169⤵PID:2240
-
\??\c:\3rlxffr.exec:\3rlxffr.exe170⤵PID:2984
-
\??\c:\tnttbt.exec:\tnttbt.exe171⤵PID:2972
-
\??\c:\tnbhtb.exec:\tnbhtb.exe172⤵PID:2024
-
\??\c:\vppvd.exec:\vppvd.exe173⤵PID:1952
-
\??\c:\pjppp.exec:\pjppp.exe174⤵PID:1844
-
\??\c:\3rffrrx.exec:\3rffrrx.exe175⤵PID:1028
-
\??\c:\9xxlflr.exec:\9xxlflr.exe176⤵PID:1808
-
\??\c:\hbtbnn.exec:\hbtbnn.exe177⤵PID:2744
-
\??\c:\btnbbn.exec:\btnbbn.exe178⤵PID:1972
-
\??\c:\ntthnn.exec:\ntthnn.exe179⤵PID:2848
-
\??\c:\pjvdd.exec:\pjvdd.exe180⤵PID:2948
-
\??\c:\rfffrlx.exec:\rfffrlx.exe181⤵PID:2292
-
\??\c:\lfrfxxl.exec:\lfrfxxl.exe182⤵PID:608
-
\??\c:\3htbhh.exec:\3htbhh.exe183⤵PID:604
-
\??\c:\tththh.exec:\tththh.exe184⤵PID:2312
-
\??\c:\vpvjj.exec:\vpvjj.exe185⤵PID:484
-
\??\c:\dvdjp.exec:\dvdjp.exe186⤵PID:1812
-
\??\c:\frxrfrf.exec:\frxrfrf.exe187⤵PID:2908
-
\??\c:\rfrxxfr.exec:\rfrxxfr.exe188⤵PID:2480
-
\??\c:\9hthht.exec:\9hthht.exe189⤵PID:1256
-
\??\c:\1bnhhh.exec:\1bnhhh.exe190⤵PID:964
-
\??\c:\9pppd.exec:\9pppd.exe191⤵PID:356
-
\??\c:\pjppv.exec:\pjppv.exe192⤵PID:1516
-
\??\c:\7dppp.exec:\7dppp.exe193⤵PID:2380
-
\??\c:\lfrxflr.exec:\lfrxflr.exe194⤵PID:3024
-
\??\c:\lxrlfxf.exec:\lxrlfxf.exe195⤵PID:2320
-
\??\c:\1tnthn.exec:\1tnthn.exe196⤵PID:2956
-
\??\c:\nhbntb.exec:\nhbntb.exe197⤵PID:1580
-
\??\c:\pdvvp.exec:\pdvvp.exe198⤵PID:2200
-
\??\c:\vjdvv.exec:\vjdvv.exe199⤵PID:2424
-
\??\c:\frrxlxf.exec:\frrxlxf.exe200⤵PID:1636
-
\??\c:\7xffrrx.exec:\7xffrrx.exe201⤵PID:2072
-
\??\c:\nhtbtb.exec:\nhtbtb.exe202⤵PID:2764
-
\??\c:\hbhbnh.exec:\hbhbnh.exe203⤵PID:3064
-
\??\c:\vpjvp.exec:\vpjvp.exe204⤵PID:2796
-
\??\c:\9lrrrrl.exec:\9lrrrrl.exe205⤵PID:2676
-
\??\c:\xlffxlr.exec:\xlffxlr.exe206⤵PID:2864
-
\??\c:\1thtnb.exec:\1thtnb.exe207⤵PID:2872
-
\??\c:\3vpdp.exec:\3vpdp.exe208⤵PID:2548
-
\??\c:\xxrrxfr.exec:\xxrrxfr.exe209⤵PID:2976
-
\??\c:\lxxrffl.exec:\lxxrffl.exe210⤵PID:2980
-
\??\c:\vpdpj.exec:\vpdpj.exe211⤵PID:1316
-
\??\c:\jvjdj.exec:\jvjdj.exe212⤵PID:1672
-
\??\c:\rllrfll.exec:\rllrfll.exe213⤵PID:1656
-
\??\c:\nhbhhn.exec:\nhbhhn.exe214⤵PID:2388
-
\??\c:\tnhbht.exec:\tnhbht.exe215⤵PID:1964
-
\??\c:\1vpvd.exec:\1vpvd.exe216⤵PID:1456
-
\??\c:\jjvjd.exec:\jjvjd.exe217⤵PID:492
-
\??\c:\1xlfllr.exec:\1xlfllr.exe218⤵PID:316
-
\??\c:\fffxxlf.exec:\fffxxlf.exe219⤵PID:820
-
\??\c:\nbhhhb.exec:\nbhhhb.exe220⤵PID:2692
-
\??\c:\tntnnn.exec:\tntnnn.exe221⤵PID:2288
-
\??\c:\dpddd.exec:\dpddd.exe222⤵PID:2852
-
\??\c:\jdjdj.exec:\jdjdj.exe223⤵PID:1320
-
\??\c:\frlxxrx.exec:\frlxxrx.exe224⤵PID:2432
-
\??\c:\5fflrxl.exec:\5fflrxl.exe225⤵PID:716
-
\??\c:\bhnhbn.exec:\bhnhbn.exe226⤵PID:1204
-
\??\c:\9pddp.exec:\9pddp.exe227⤵PID:1544
-
\??\c:\jjpvp.exec:\jjpvp.exe228⤵PID:2308
-
\??\c:\3xrxlrf.exec:\3xrxlrf.exe229⤵PID:2908
-
\??\c:\xlxxxxf.exec:\xlxxxxf.exe230⤵PID:1336
-
\??\c:\htbbhn.exec:\htbbhn.exe231⤵PID:2924
-
\??\c:\tnbbbb.exec:\tnbbbb.exe232⤵PID:1676
-
\??\c:\3vjvj.exec:\3vjvj.exe233⤵PID:2884
-
\??\c:\ppvdv.exec:\ppvdv.exe234⤵PID:1704
-
\??\c:\1flrfrl.exec:\1flrfrl.exe235⤵PID:900
-
\??\c:\tbnthb.exec:\tbnthb.exe236⤵PID:1520
-
\??\c:\pdpvp.exec:\pdpvp.exe237⤵PID:1616
-
\??\c:\vpddj.exec:\vpddj.exe238⤵PID:1588
-
\??\c:\llflxxf.exec:\llflxxf.exe239⤵PID:2456
-
\??\c:\rllrlrr.exec:\rllrlrr.exe240⤵PID:1600
-
\??\c:\btbbtb.exec:\btbbtb.exe241⤵PID:2424
-
\??\c:\pvjvp.exec:\pvjvp.exe242⤵PID:2824