Analysis
-
max time kernel
66s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 21:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8a88febac1284f0014b4ac43a3155fc9d90c8da0721e6dc824924c0b4e4b5e56.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
8a88febac1284f0014b4ac43a3155fc9d90c8da0721e6dc824924c0b4e4b5e56.exe
-
Size
62KB
-
MD5
08f74caa73877b162acd1b1a483db270
-
SHA1
c086add3130294460b9d5c9029b16ee9645adc56
-
SHA256
8a88febac1284f0014b4ac43a3155fc9d90c8da0721e6dc824924c0b4e4b5e56
-
SHA512
bf451b779df39d4a8c77a9d96352b696325eab3a669a61a85d357f5d433380cf577c39f9e96fb445090fac368bc5ddd0b65447f14a2ab2634d0238a60d293038
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDII9ZvHKEQ:ymb3NkkiQ3mdBjFII9ZvHKEQ
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/2904-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2592-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/308-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3056-90-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2364-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/404-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1960-279-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1724-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2968-242-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1416-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/936-216-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2180-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1504-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2776-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2264-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1856-126-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2764-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2408-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2508-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2304-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
dvdjv.exefrfxffl.exe5rlllxf.exelffrxlr.exebthntt.exe1nntnt.exehthnbn.exevjpvd.exepjvvd.exefxfxlrf.exexrrrfll.exehbttnn.exettnbbt.exetnhnbb.exepjpvd.exe7pppp.exefxrrffr.exefrfllrl.exexlxxffl.exe5nntbb.exe5tnnhh.exejdjdp.exejdvdd.exelxrlxrf.exe1lffrxl.exebnbhbh.exe5vdvd.exevpvvd.exevpjjv.exefxllfff.exefxrrffl.exebthtbn.exehbthnb.exebthhth.exejvjpp.exe9jvjp.exe9jjjp.exe9rfxxxf.exerrxflrx.exehbntbh.exehbnbbh.exethbthb.exennbnbb.exedjdpd.exevvdpd.exerlrxlrx.exe1lxxlrf.exetnhnth.exebttbbh.exehbbbnn.exedvjjp.exe9jdvd.exevvddp.exexrxxffl.exelxlfllr.exe5xllxfr.exenhnbhh.exehtntbb.exehbtbhh.exevdvdd.exevdvdp.exefrxrrrx.exefxrrfxl.exenhbthh.exepid process 2904 dvdjv.exe 2508 frfxffl.exe 2564 5rlllxf.exe 2592 lffrxlr.exe 2868 bthntt.exe 308 1nntnt.exe 2408 hthnbn.exe 3056 vjpvd.exe 2364 pjvvd.exe 2732 fxfxlrf.exe 2764 xrrrfll.exe 1856 hbttnn.exe 2264 ttnbbt.exe 404 tnhnbb.exe 2776 pjpvd.exe 820 7pppp.exe 1504 fxrrffr.exe 2180 frfllrl.exe 2188 xlxxffl.exe 2580 5nntbb.exe 2816 5tnnhh.exe 936 jdjdp.exe 1416 jdvdd.exe 844 lxrlxrf.exe 2968 1lffrxl.exe 1724 bnbhbh.exe 928 5vdvd.exe 2916 vpvvd.exe 1960 vpjjv.exe 2020 fxllfff.exe 1440 fxrrffl.exe 1844 bthtbn.exe 2956 hbthnb.exe 2568 bthhth.exe 384 jvjpp.exe 2308 9jvjp.exe 2496 9jjjp.exe 2400 9rfxxxf.exe 2440 rrxflrx.exe 2452 hbntbh.exe 2408 hbnbbh.exe 2612 thbthb.exe 2980 nnbnbb.exe 2720 djdpd.exe 1872 vvdpd.exe 1868 rlrxlrx.exe 2072 1lxxlrf.exe 1920 tnhnth.exe 2264 bttbbh.exe 404 hbbbnn.exe 1456 dvjjp.exe 1488 9jdvd.exe 2156 vvddp.exe 1212 xrxxffl.exe 2212 lxlfllr.exe 1900 5xllxfr.exe 2176 nhnbhh.exe 1428 htntbb.exe 1468 hbtbhh.exe 2172 vdvdd.exe 1448 vdvdp.exe 3036 frxrrrx.exe 1780 fxrrfxl.exe 488 nhbthh.exe -
Processes:
resource yara_rule behavioral1/memory/2304-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2592-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/308-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3056-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2364-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/404-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1960-279-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1724-251-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-242-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1416-224-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/936-216-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2180-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1504-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2776-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2264-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1856-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2408-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2408-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2508-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2304-10-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8a88febac1284f0014b4ac43a3155fc9d90c8da0721e6dc824924c0b4e4b5e56.exedvdjv.exefrfxffl.exe5rlllxf.exelffrxlr.exebthntt.exe1nntnt.exehthnbn.exevjpvd.exepjvvd.exefxfxlrf.exexrrrfll.exehbttnn.exettnbbt.exetnhnbb.exepjpvd.exedescription pid process target process PID 2304 wrote to memory of 2904 2304 8a88febac1284f0014b4ac43a3155fc9d90c8da0721e6dc824924c0b4e4b5e56.exe dvdjv.exe PID 2304 wrote to memory of 2904 2304 8a88febac1284f0014b4ac43a3155fc9d90c8da0721e6dc824924c0b4e4b5e56.exe dvdjv.exe PID 2304 wrote to memory of 2904 2304 8a88febac1284f0014b4ac43a3155fc9d90c8da0721e6dc824924c0b4e4b5e56.exe dvdjv.exe PID 2304 wrote to memory of 2904 2304 8a88febac1284f0014b4ac43a3155fc9d90c8da0721e6dc824924c0b4e4b5e56.exe dvdjv.exe PID 2904 wrote to memory of 2508 2904 dvdjv.exe frfxffl.exe PID 2904 wrote to memory of 2508 2904 dvdjv.exe frfxffl.exe PID 2904 wrote to memory of 2508 2904 dvdjv.exe frfxffl.exe PID 2904 wrote to memory of 2508 2904 dvdjv.exe frfxffl.exe PID 2508 wrote to memory of 2564 2508 frfxffl.exe 5rlllxf.exe PID 2508 wrote to memory of 2564 2508 frfxffl.exe 5rlllxf.exe PID 2508 wrote to memory of 2564 2508 frfxffl.exe 5rlllxf.exe PID 2508 wrote to memory of 2564 2508 frfxffl.exe 5rlllxf.exe PID 2564 wrote to memory of 2592 2564 5rlllxf.exe lffrxlr.exe PID 2564 wrote to memory of 2592 2564 5rlllxf.exe lffrxlr.exe PID 2564 wrote to memory of 2592 2564 5rlllxf.exe lffrxlr.exe PID 2564 wrote to memory of 2592 2564 5rlllxf.exe lffrxlr.exe PID 2592 wrote to memory of 2868 2592 lffrxlr.exe bthntt.exe PID 2592 wrote to memory of 2868 2592 lffrxlr.exe bthntt.exe PID 2592 wrote to memory of 2868 2592 lffrxlr.exe bthntt.exe PID 2592 wrote to memory of 2868 2592 lffrxlr.exe bthntt.exe PID 2868 wrote to memory of 308 2868 bthntt.exe 1nntnt.exe PID 2868 wrote to memory of 308 2868 bthntt.exe 1nntnt.exe PID 2868 wrote to memory of 308 2868 bthntt.exe 1nntnt.exe PID 2868 wrote to memory of 308 2868 bthntt.exe 1nntnt.exe PID 308 wrote to memory of 2408 308 1nntnt.exe hbnbbh.exe PID 308 wrote to memory of 2408 308 1nntnt.exe hbnbbh.exe PID 308 wrote to memory of 2408 308 1nntnt.exe hbnbbh.exe PID 308 wrote to memory of 2408 308 1nntnt.exe hbnbbh.exe PID 2408 wrote to memory of 3056 2408 hthnbn.exe vjpvd.exe PID 2408 wrote to memory of 3056 2408 hthnbn.exe vjpvd.exe PID 2408 wrote to memory of 3056 2408 hthnbn.exe vjpvd.exe PID 2408 wrote to memory of 3056 2408 hthnbn.exe vjpvd.exe PID 3056 wrote to memory of 2364 3056 vjpvd.exe pjvvd.exe PID 3056 wrote to memory of 2364 3056 vjpvd.exe pjvvd.exe PID 3056 wrote to memory of 2364 3056 vjpvd.exe pjvvd.exe PID 3056 wrote to memory of 2364 3056 vjpvd.exe pjvvd.exe PID 2364 wrote to memory of 2732 2364 pjvvd.exe fxfxlrf.exe PID 2364 wrote to memory of 2732 2364 pjvvd.exe fxfxlrf.exe PID 2364 wrote to memory of 2732 2364 pjvvd.exe fxfxlrf.exe PID 2364 wrote to memory of 2732 2364 pjvvd.exe fxfxlrf.exe PID 2732 wrote to memory of 2764 2732 fxfxlrf.exe xrrrfll.exe PID 2732 wrote to memory of 2764 2732 fxfxlrf.exe xrrrfll.exe PID 2732 wrote to memory of 2764 2732 fxfxlrf.exe xrrrfll.exe PID 2732 wrote to memory of 2764 2732 fxfxlrf.exe xrrrfll.exe PID 2764 wrote to memory of 1856 2764 xrrrfll.exe hbttnn.exe PID 2764 wrote to memory of 1856 2764 xrrrfll.exe hbttnn.exe PID 2764 wrote to memory of 1856 2764 xrrrfll.exe hbttnn.exe PID 2764 wrote to memory of 1856 2764 xrrrfll.exe hbttnn.exe PID 1856 wrote to memory of 2264 1856 hbttnn.exe bttbbh.exe PID 1856 wrote to memory of 2264 1856 hbttnn.exe bttbbh.exe PID 1856 wrote to memory of 2264 1856 hbttnn.exe bttbbh.exe PID 1856 wrote to memory of 2264 1856 hbttnn.exe bttbbh.exe PID 2264 wrote to memory of 404 2264 ttnbbt.exe tnhnbb.exe PID 2264 wrote to memory of 404 2264 ttnbbt.exe tnhnbb.exe PID 2264 wrote to memory of 404 2264 ttnbbt.exe tnhnbb.exe PID 2264 wrote to memory of 404 2264 ttnbbt.exe tnhnbb.exe PID 404 wrote to memory of 2776 404 tnhnbb.exe pjpvd.exe PID 404 wrote to memory of 2776 404 tnhnbb.exe pjpvd.exe PID 404 wrote to memory of 2776 404 tnhnbb.exe pjpvd.exe PID 404 wrote to memory of 2776 404 tnhnbb.exe pjpvd.exe PID 2776 wrote to memory of 820 2776 pjpvd.exe 7pppp.exe PID 2776 wrote to memory of 820 2776 pjpvd.exe 7pppp.exe PID 2776 wrote to memory of 820 2776 pjpvd.exe 7pppp.exe PID 2776 wrote to memory of 820 2776 pjpvd.exe 7pppp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a88febac1284f0014b4ac43a3155fc9d90c8da0721e6dc824924c0b4e4b5e56.exe"C:\Users\Admin\AppData\Local\Temp\8a88febac1284f0014b4ac43a3155fc9d90c8da0721e6dc824924c0b4e4b5e56.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
\??\c:\dvdjv.exec:\dvdjv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\frfxffl.exec:\frfxffl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\5rlllxf.exec:\5rlllxf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\lffrxlr.exec:\lffrxlr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\bthntt.exec:\bthntt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\1nntnt.exec:\1nntnt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:308 -
\??\c:\hthnbn.exec:\hthnbn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\vjpvd.exec:\vjpvd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
\??\c:\pjvvd.exec:\pjvvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\fxfxlrf.exec:\fxfxlrf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
\??\c:\xrrrfll.exec:\xrrrfll.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
\??\c:\hbttnn.exec:\hbttnn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\ttnbbt.exec:\ttnbbt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
\??\c:\tnhnbb.exec:\tnhnbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
\??\c:\pjpvd.exec:\pjpvd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
\??\c:\7pppp.exec:\7pppp.exe17⤵
- Executes dropped EXE
PID:820 -
\??\c:\fxrrffr.exec:\fxrrffr.exe18⤵
- Executes dropped EXE
PID:1504 -
\??\c:\frfllrl.exec:\frfllrl.exe19⤵
- Executes dropped EXE
PID:2180 -
\??\c:\xlxxffl.exec:\xlxxffl.exe20⤵
- Executes dropped EXE
PID:2188 -
\??\c:\5nntbb.exec:\5nntbb.exe21⤵
- Executes dropped EXE
PID:2580 -
\??\c:\5tnnhh.exec:\5tnnhh.exe22⤵
- Executes dropped EXE
PID:2816 -
\??\c:\jdjdp.exec:\jdjdp.exe23⤵
- Executes dropped EXE
PID:936 -
\??\c:\jdvdd.exec:\jdvdd.exe24⤵
- Executes dropped EXE
PID:1416 -
\??\c:\lxrlxrf.exec:\lxrlxrf.exe25⤵
- Executes dropped EXE
PID:844 -
\??\c:\1lffrxl.exec:\1lffrxl.exe26⤵
- Executes dropped EXE
PID:2968 -
\??\c:\bnbhbh.exec:\bnbhbh.exe27⤵
- Executes dropped EXE
PID:1724 -
\??\c:\5vdvd.exec:\5vdvd.exe28⤵
- Executes dropped EXE
PID:928 -
\??\c:\vpvvd.exec:\vpvvd.exe29⤵
- Executes dropped EXE
PID:2916 -
\??\c:\vpjjv.exec:\vpjjv.exe30⤵
- Executes dropped EXE
PID:1960 -
\??\c:\fxllfff.exec:\fxllfff.exe31⤵
- Executes dropped EXE
PID:2020 -
\??\c:\fxrrffl.exec:\fxrrffl.exe32⤵
- Executes dropped EXE
PID:1440 -
\??\c:\bthtbn.exec:\bthtbn.exe33⤵
- Executes dropped EXE
PID:1844 -
\??\c:\hbthnb.exec:\hbthnb.exe34⤵
- Executes dropped EXE
PID:2956 -
\??\c:\bthhth.exec:\bthhth.exe35⤵
- Executes dropped EXE
PID:2568 -
\??\c:\jvjpp.exec:\jvjpp.exe36⤵
- Executes dropped EXE
PID:384 -
\??\c:\9jvjp.exec:\9jvjp.exe37⤵
- Executes dropped EXE
PID:2308 -
\??\c:\9jjjp.exec:\9jjjp.exe38⤵
- Executes dropped EXE
PID:2496 -
\??\c:\9rfxxxf.exec:\9rfxxxf.exe39⤵
- Executes dropped EXE
PID:2400 -
\??\c:\rrxflrx.exec:\rrxflrx.exe40⤵
- Executes dropped EXE
PID:2440 -
\??\c:\hbntbh.exec:\hbntbh.exe41⤵
- Executes dropped EXE
PID:2452 -
\??\c:\hbnbbh.exec:\hbnbbh.exe42⤵
- Executes dropped EXE
PID:2408 -
\??\c:\thbthb.exec:\thbthb.exe43⤵
- Executes dropped EXE
PID:2612 -
\??\c:\nnbnbb.exec:\nnbnbb.exe44⤵
- Executes dropped EXE
PID:2980 -
\??\c:\djdpd.exec:\djdpd.exe45⤵
- Executes dropped EXE
PID:2720 -
\??\c:\vvdpd.exec:\vvdpd.exe46⤵
- Executes dropped EXE
PID:1872 -
\??\c:\rlrxlrx.exec:\rlrxlrx.exe47⤵
- Executes dropped EXE
PID:1868 -
\??\c:\1lxxlrf.exec:\1lxxlrf.exe48⤵
- Executes dropped EXE
PID:2072 -
\??\c:\tnhnth.exec:\tnhnth.exe49⤵
- Executes dropped EXE
PID:1920 -
\??\c:\bttbbh.exec:\bttbbh.exe50⤵
- Executes dropped EXE
PID:2264 -
\??\c:\hbbbnn.exec:\hbbbnn.exe51⤵
- Executes dropped EXE
PID:404 -
\??\c:\dvjjp.exec:\dvjjp.exe52⤵
- Executes dropped EXE
PID:1456 -
\??\c:\9jdvd.exec:\9jdvd.exe53⤵
- Executes dropped EXE
PID:1488 -
\??\c:\vvddp.exec:\vvddp.exe54⤵
- Executes dropped EXE
PID:2156 -
\??\c:\xrxxffl.exec:\xrxxffl.exe55⤵
- Executes dropped EXE
PID:1212 -
\??\c:\lxlfllr.exec:\lxlfllr.exe56⤵
- Executes dropped EXE
PID:2212 -
\??\c:\5xllxfr.exec:\5xllxfr.exe57⤵
- Executes dropped EXE
PID:1900 -
\??\c:\nhnbhh.exec:\nhnbhh.exe58⤵
- Executes dropped EXE
PID:2176 -
\??\c:\htntbb.exec:\htntbb.exe59⤵
- Executes dropped EXE
PID:1428 -
\??\c:\hbtbhh.exec:\hbtbhh.exe60⤵
- Executes dropped EXE
PID:1468 -
\??\c:\vdvdd.exec:\vdvdd.exe61⤵
- Executes dropped EXE
PID:2172 -
\??\c:\vdvdp.exec:\vdvdp.exe62⤵
- Executes dropped EXE
PID:1448 -
\??\c:\frxrrrx.exec:\frxrrrx.exe63⤵
- Executes dropped EXE
PID:3036 -
\??\c:\fxrrfxl.exec:\fxrrfxl.exe64⤵
- Executes dropped EXE
PID:1780 -
\??\c:\nhbthh.exec:\nhbthh.exe65⤵
- Executes dropped EXE
PID:488 -
\??\c:\vddpj.exec:\vddpj.exe66⤵PID:752
-
\??\c:\rlrrrrx.exec:\rlrrrrx.exe67⤵PID:1608
-
\??\c:\bthtbt.exec:\bthtbt.exe68⤵PID:2924
-
\??\c:\vpjpv.exec:\vpjpv.exe69⤵PID:3044
-
\??\c:\frrlfrl.exec:\frrlfrl.exe70⤵PID:2216
-
\??\c:\xxllffx.exec:\xxllffx.exe71⤵PID:1556
-
\??\c:\7pjpd.exec:\7pjpd.exe72⤵PID:2304
-
\??\c:\lxlxxff.exec:\lxlxxff.exe73⤵PID:2472
-
\??\c:\7tnbnb.exec:\7tnbnb.exe74⤵PID:2904
-
\??\c:\dppjp.exec:\dppjp.exe75⤵PID:2560
-
\??\c:\vpdjp.exec:\vpdjp.exe76⤵PID:2512
-
\??\c:\fxrrxff.exec:\fxrrxff.exe77⤵PID:2564
-
\??\c:\fxxxlll.exec:\fxxxlll.exe78⤵PID:2412
-
\??\c:\9jpvv.exec:\9jpvv.exe79⤵PID:2656
-
\??\c:\ppvdd.exec:\ppvdd.exe80⤵PID:2372
-
\??\c:\fxlxfrx.exec:\fxlxfrx.exe81⤵PID:2432
-
\??\c:\5tbbtb.exec:\5tbbtb.exe82⤵PID:2896
-
\??\c:\9lxrxxf.exec:\9lxrxxf.exe83⤵PID:1908
-
\??\c:\3hbbnn.exec:\3hbbnn.exe84⤵PID:2952
-
\??\c:\nbtthb.exec:\nbtthb.exe85⤵PID:2724
-
\??\c:\ddjpd.exec:\ddjpd.exe86⤵PID:2524
-
\??\c:\fxxxxrx.exec:\fxxxxrx.exe87⤵PID:2732
-
\??\c:\1bhhnn.exec:\1bhhnn.exe88⤵PID:1880
-
\??\c:\1bhhnn.exec:\1bhhnn.exe89⤵PID:1616
-
\??\c:\vpdpd.exec:\vpdpd.exe90⤵PID:1528
-
\??\c:\jdvpj.exec:\jdvpj.exe91⤵PID:824
-
\??\c:\lfrxxrx.exec:\lfrxxrx.exe92⤵PID:2884
-
\??\c:\rlfrxfl.exec:\rlfrxfl.exe93⤵PID:2744
-
\??\c:\lffxxff.exec:\lffxxff.exe94⤵PID:1432
-
\??\c:\btnhhb.exec:\btnhhb.exe95⤵PID:2032
-
\??\c:\tntthn.exec:\tntthn.exe96⤵PID:2888
-
\??\c:\pdjdp.exec:\pdjdp.exe97⤵PID:2016
-
\??\c:\9jddj.exec:\9jddj.exe98⤵PID:2636
-
\??\c:\lffrxff.exec:\lffrxff.exe99⤵PID:1256
-
\??\c:\lfrrllr.exec:\lfrrllr.exe100⤵PID:532
-
\??\c:\bnttnn.exec:\bnttnn.exe101⤵PID:1076
-
\??\c:\hbtntt.exec:\hbtntt.exe102⤵PID:856
-
\??\c:\5hthhh.exec:\5hthhh.exe103⤵PID:2780
-
\??\c:\pjppp.exec:\pjppp.exe104⤵PID:1472
-
\??\c:\dddvd.exec:\dddvd.exe105⤵PID:1952
-
\??\c:\jvvpj.exec:\jvvpj.exe106⤵PID:3068
-
\??\c:\rlxrxxx.exec:\rlxrxxx.exe107⤵PID:240
-
\??\c:\rllffff.exec:\rllffff.exe108⤵PID:1928
-
\??\c:\7btnbt.exec:\7btnbt.exe109⤵PID:2208
-
\??\c:\9nnhtt.exec:\9nnhtt.exe110⤵PID:2280
-
\??\c:\tnbhtn.exec:\tnbhtn.exe111⤵PID:568
-
\??\c:\pjvdv.exec:\pjvdv.exe112⤵PID:2020
-
\??\c:\pdjjp.exec:\pdjjp.exe113⤵PID:1440
-
\??\c:\frfrlfr.exec:\frfrlfr.exe114⤵PID:1844
-
\??\c:\fxlrfxx.exec:\fxlrfxx.exe115⤵PID:2520
-
\??\c:\nbnhtt.exec:\nbnhtt.exe116⤵PID:2584
-
\??\c:\nbthnh.exec:\nbthnh.exe117⤵PID:2528
-
\??\c:\1bnhhh.exec:\1bnhhh.exe118⤵PID:2028
-
\??\c:\vjvvd.exec:\vjvvd.exe119⤵PID:2448
-
\??\c:\7jvdd.exec:\7jvdd.exe120⤵PID:2592
-
\??\c:\rfrxffl.exec:\rfrxffl.exe121⤵PID:2652
-
\??\c:\9rrxxxr.exec:\9rrxxxr.exe122⤵PID:1720
-
\??\c:\rfrxrff.exec:\rfrxrff.exe123⤵PID:2444
-
\??\c:\3thhhb.exec:\3thhhb.exe124⤵PID:2452
-
\??\c:\ntbbbt.exec:\ntbbbt.exe125⤵PID:2408
-
\??\c:\nbhbbb.exec:\nbhbbb.exe126⤵PID:2612
-
\??\c:\pjddd.exec:\pjddd.exe127⤵PID:2364
-
\??\c:\pdpvp.exec:\pdpvp.exe128⤵PID:2388
-
\??\c:\1djjp.exec:\1djjp.exe129⤵PID:1932
-
\??\c:\5frfxxx.exec:\5frfxxx.exe130⤵PID:2256
-
\??\c:\rxfxfff.exec:\rxfxfff.exe131⤵PID:1616
-
\??\c:\lxxfxff.exec:\lxxfxff.exe132⤵PID:2708
-
\??\c:\5tnthb.exec:\5tnthb.exe133⤵PID:824
-
\??\c:\bhnhbt.exec:\bhnhbt.exe134⤵PID:1364
-
\??\c:\bnnnhb.exec:\bnnnhb.exe135⤵PID:2744
-
\??\c:\hnthbb.exec:\hnthbb.exe136⤵PID:1432
-
\??\c:\dpvvj.exec:\dpvvj.exe137⤵PID:2032
-
\??\c:\3jvjj.exec:\3jvjj.exe138⤵PID:2872
-
\??\c:\rfrrlfr.exec:\rfrrlfr.exe139⤵PID:2016
-
\??\c:\rxlrlff.exec:\rxlrlff.exe140⤵PID:2636
-
\??\c:\5xxxrff.exec:\5xxxrff.exe141⤵PID:1256
-
\??\c:\bnbbhn.exec:\bnbbhn.exe142⤵PID:2476
-
\??\c:\5nbbbb.exec:\5nbbbb.exe143⤵PID:1076
-
\??\c:\nhnnnh.exec:\nhnnnh.exe144⤵PID:856
-
\??\c:\vpddj.exec:\vpddj.exe145⤵PID:2780
-
\??\c:\jdppj.exec:\jdppj.exe146⤵PID:1472
-
\??\c:\pdjvd.exec:\pdjvd.exe147⤵PID:1952
-
\??\c:\rflrxxf.exec:\rflrxxf.exe148⤵PID:1060
-
\??\c:\frfrxxl.exec:\frfrxxl.exe149⤵PID:240
-
\??\c:\lrlffxx.exec:\lrlffxx.exe150⤵PID:1928
-
\??\c:\xlxrxff.exec:\xlxrxff.exe151⤵PID:2208
-
\??\c:\ntnhth.exec:\ntnhth.exe152⤵PID:2240
-
\??\c:\9bthbh.exec:\9bthbh.exe153⤵PID:568
-
\??\c:\jvvdv.exec:\jvvdv.exe154⤵PID:2020
-
\??\c:\1dvvj.exec:\1dvvj.exe155⤵PID:1440
-
\??\c:\xrrrxfr.exec:\xrrrxfr.exe156⤵PID:2472
-
\??\c:\xrlfllr.exec:\xrlfllr.exe157⤵PID:2520
-
\??\c:\7rfffff.exec:\7rfffff.exe158⤵PID:2584
-
\??\c:\1nhhhh.exec:\1nhhhh.exe159⤵PID:2040
-
\??\c:\thnntt.exec:\thnntt.exe160⤵PID:2028
-
\??\c:\nhbnbb.exec:\nhbnbb.exe161⤵PID:2448
-
\??\c:\7pdvv.exec:\7pdvv.exe162⤵PID:2496
-
\??\c:\frfxfrx.exec:\frfxfrx.exe163⤵PID:1548
-
\??\c:\tnbnnt.exec:\tnbnnt.exe164⤵PID:1720
-
\??\c:\jvvvp.exec:\jvvvp.exe165⤵PID:2444
-
\??\c:\xrxxxfr.exec:\xrxxxfr.exe166⤵PID:328
-
\??\c:\lxllllx.exec:\lxllllx.exe167⤵PID:2408
-
\??\c:\tnnttb.exec:\tnnttb.exe168⤵PID:2612
-
\??\c:\pdjdd.exec:\pdjdd.exe169⤵PID:2980
-
\??\c:\1vppd.exec:\1vppd.exe170⤵PID:2388
-
\??\c:\3lxffxf.exec:\3lxffxf.exe171⤵PID:1932
-
\??\c:\nbhbhb.exec:\nbhbhb.exe172⤵PID:2256
-
\??\c:\jpjdj.exec:\jpjdj.exe173⤵PID:1616
-
\??\c:\rrrrlxr.exec:\rrrrlxr.exe174⤵PID:2708
-
\??\c:\1frxrff.exec:\1frxrff.exe175⤵PID:824
-
\??\c:\dpdjj.exec:\dpdjj.exe176⤵PID:1364
-
\??\c:\djpjj.exec:\djpjj.exe177⤵PID:2744
-
\??\c:\xlrrlfl.exec:\xlrrlfl.exe178⤵PID:1432
-
\??\c:\bnbnbb.exec:\bnbnbb.exe179⤵PID:2032
-
\??\c:\btbntb.exec:\btbntb.exe180⤵PID:2160
-
\??\c:\jddvj.exec:\jddvj.exe181⤵PID:2168
-
\??\c:\dpddp.exec:\dpddp.exe182⤵PID:584
-
\??\c:\xllrlxl.exec:\xllrlxl.exe183⤵PID:1788
-
\??\c:\lfrrxff.exec:\lfrrxff.exe184⤵PID:2344
-
\??\c:\thnntt.exec:\thnntt.exe185⤵PID:692
-
\??\c:\bnhbtb.exec:\bnhbtb.exe186⤵PID:716
-
\??\c:\5pjjj.exec:\5pjjj.exe187⤵PID:2556
-
\??\c:\3pvvd.exec:\3pvvd.exe188⤵PID:1472
-
\??\c:\5ffffxf.exec:\5ffffxf.exe189⤵PID:488
-
\??\c:\fxlrxxx.exec:\fxlrxxx.exe190⤵PID:2068
-
\??\c:\7xxrrff.exec:\7xxrrff.exe191⤵PID:280
-
\??\c:\httbhh.exec:\httbhh.exe192⤵PID:2924
-
\??\c:\5hthhh.exec:\5hthhh.exe193⤵PID:924
-
\??\c:\dvjvd.exec:\dvjvd.exe194⤵PID:1444
-
\??\c:\vpvjp.exec:\vpvjp.exe195⤵PID:1556
-
\??\c:\fllllff.exec:\fllllff.exe196⤵PID:804
-
\??\c:\3lfllrr.exec:\3lfllrr.exe197⤵PID:1660
-
\??\c:\btbhnt.exec:\btbhnt.exe198⤵PID:2504
-
\??\c:\ttbntb.exec:\ttbntb.exe199⤵PID:2640
-
\??\c:\vdjjj.exec:\vdjjj.exe200⤵PID:2300
-
\??\c:\pvjvv.exec:\pvjvv.exe201⤵PID:2564
-
\??\c:\lfrrxrr.exec:\lfrrxrr.exe202⤵PID:2492
-
\??\c:\xlxfrll.exec:\xlxfrll.exe203⤵PID:1540
-
\??\c:\nbtttt.exec:\nbtttt.exe204⤵PID:2420
-
\??\c:\btbnnt.exec:\btbnnt.exe205⤵PID:2432
-
\??\c:\pdjjj.exec:\pdjjj.exe206⤵PID:2692
-
\??\c:\dpvdv.exec:\dpvdv.exe207⤵PID:2644
-
\??\c:\frxxrlr.exec:\frxxrlr.exe208⤵PID:2704
-
\??\c:\xrfrfff.exec:\xrfrfff.exe209⤵PID:1280
-
\??\c:\9xlrffl.exec:\9xlrffl.exe210⤵PID:2612
-
\??\c:\bthhhn.exec:\bthhhn.exe211⤵PID:1868
-
\??\c:\9hthnh.exec:\9hthnh.exe212⤵PID:2752
-
\??\c:\dvjpd.exec:\dvjpd.exe213⤵PID:1528
-
\??\c:\ppvdv.exec:\ppvdv.exe214⤵PID:2072
-
\??\c:\fxxlxfl.exec:\fxxlxfl.exe215⤵PID:1864
-
\??\c:\7rfrffl.exec:\7rfrffl.exe216⤵PID:2352
-
\??\c:\tnbhbh.exec:\tnbhbh.exe217⤵PID:1996
-
\??\c:\5tthnh.exec:\5tthnh.exe218⤵PID:648
-
\??\c:\pjppj.exec:\pjppj.exe219⤵PID:3064
-
\??\c:\vpjjd.exec:\vpjjd.exe220⤵PID:2164
-
\??\c:\9rllxff.exec:\9rllxff.exe221⤵PID:2148
-
\??\c:\hbbbhb.exec:\hbbbhb.exe222⤵PID:336
-
\??\c:\jvpvj.exec:\jvpvj.exe223⤵PID:2816
-
\??\c:\vpvvj.exec:\vpvvj.exe224⤵PID:604
-
\??\c:\3xfflfl.exec:\3xfflfl.exe225⤵PID:2356
-
\??\c:\3lrfllr.exec:\3lrfllr.exe226⤵PID:2944
-
\??\c:\bbbnbb.exec:\bbbnbb.exe227⤵PID:1120
-
\??\c:\5hbbnn.exec:\5hbbnn.exe228⤵PID:1028
-
\??\c:\dvvdp.exec:\dvvdp.exe229⤵PID:1732
-
\??\c:\ddjjv.exec:\ddjjv.exe230⤵PID:300
-
\??\c:\xfflfll.exec:\xfflfll.exe231⤵PID:1320
-
\??\c:\nbhtbt.exec:\nbhtbt.exe232⤵PID:656
-
\??\c:\bthhbn.exec:\bthhbn.exe233⤵PID:3044
-
\??\c:\vjddv.exec:\vjddv.exe234⤵PID:712
-
\??\c:\vdvdj.exec:\vdvdj.exe235⤵PID:1840
-
\??\c:\rllxfrl.exec:\rllxfrl.exe236⤵PID:1664
-
\??\c:\lllrlrx.exec:\lllrlrx.exe237⤵PID:2488
-
\??\c:\3tnhtn.exec:\3tnhtn.exe238⤵PID:2664
-
\??\c:\5hbhtb.exec:\5hbhtb.exe239⤵PID:2800
-
\??\c:\pdpdv.exec:\pdpdv.exe240⤵PID:2804
-
\??\c:\3dvpp.exec:\3dvpp.exe241⤵PID:2308
-
\??\c:\ffxlrfx.exec:\ffxlrfx.exe242⤵PID:2928