Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 00:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
89fa36063323f00a9699b4ee22f807197d064e7a570554d111e1a598c6474f61.exe
Resource
win7-20240221-en
6 signatures
150 seconds
General
-
Target
89fa36063323f00a9699b4ee22f807197d064e7a570554d111e1a598c6474f61.exe
-
Size
64KB
-
MD5
22ad5a19fff59696eb0898c5af4b1ecb
-
SHA1
c2faa341566ca7894ede2e9f47ac0ccfd32fa255
-
SHA256
89fa36063323f00a9699b4ee22f807197d064e7a570554d111e1a598c6474f61
-
SHA512
5122e3862e620ab1c178927ea6b39856469aab7546a0d002fcf47a6e82ea42bf6b803a8c748e41cc9f6a87386ea22cd8669846c28ff5af39e51d21c31d07a33d
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb0z6Mu/ePS3Ag:ymb3NkkiQ3mdBjFI46TQg
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
resource yara_rule behavioral1/memory/1952-7-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1952-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2000-18-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2564-38-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2564-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3000-28-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2660-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3000-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2000-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2436-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2968-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1592-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/848-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1152-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1544-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1256-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/620-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1688-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1164-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-269-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2204-286-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 19 IoCs
resource yara_rule behavioral1/memory/1952-6-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2564-37-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2660-45-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/3000-27-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2000-16-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2436-73-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2580-83-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2968-134-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1592-142-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/848-161-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1152-178-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2700-170-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1544-196-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1256-232-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/620-241-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1688-250-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/1164-259-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2644-269-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral1/memory/2204-286-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
pid Process 2000 6848804.exe 3000 pjvvd.exe 2564 9ppvj.exe 2660 nhthtt.exe 2620 bbnbhn.exe 2484 1bbhhb.exe 2436 pjvvp.exe 2580 e82422.exe 2956 jjddv.exe 2712 pdvvj.exe 2924 86228.exe 2936 o462446.exe 2968 e02800.exe 1592 xlxfxxf.exe 1260 02842.exe 848 64222.exe 2700 868806.exe 1152 1vpdj.exe 908 lrxxlrr.exe 1544 jvddj.exe 1052 6642802.exe 2556 204022.exe 2444 64286.exe 1256 48242.exe 620 nnhhtb.exe 1688 04866.exe 1164 jdjjj.exe 2644 082284.exe 712 480640.exe 2204 9ddpv.exe 1200 8260002.exe 1516 nbbhth.exe 1952 60628.exe 2116 fxflrlx.exe 2192 2624000.exe 2564 pjjdd.exe 2768 nnbhhn.exe 3048 hbnthh.exe 2752 jppjd.exe 2736 024466.exe 2848 7dpjp.exe 2484 46226.exe 2480 264062.exe 2944 htbthb.exe 2240 4288006.exe 2720 7pjvd.exe 2684 086244.exe 2796 824028.exe 2520 llxxlrl.exe 2200 60446.exe 1236 046288.exe 1040 862844.exe 1700 4806006.exe 340 42800.exe 544 4866828.exe 332 vdpjj.exe 1484 246622.exe 1488 0046464.exe 1528 tbhnnh.exe 2328 26680.exe 2324 608466.exe 1156 7frxfxf.exe 2868 5rxffff.exe 1848 4666266.exe -
resource yara_rule behavioral1/memory/1952-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3000-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2000-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2436-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1592-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/848-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1152-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1544-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1256-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/620-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1688-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1164-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-269-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2204-286-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2000 1952 89fa36063323f00a9699b4ee22f807197d064e7a570554d111e1a598c6474f61.exe 28 PID 1952 wrote to memory of 2000 1952 89fa36063323f00a9699b4ee22f807197d064e7a570554d111e1a598c6474f61.exe 28 PID 1952 wrote to memory of 2000 1952 89fa36063323f00a9699b4ee22f807197d064e7a570554d111e1a598c6474f61.exe 28 PID 1952 wrote to memory of 2000 1952 89fa36063323f00a9699b4ee22f807197d064e7a570554d111e1a598c6474f61.exe 28 PID 2000 wrote to memory of 3000 2000 6848804.exe 29 PID 2000 wrote to memory of 3000 2000 6848804.exe 29 PID 2000 wrote to memory of 3000 2000 6848804.exe 29 PID 2000 wrote to memory of 3000 2000 6848804.exe 29 PID 3000 wrote to memory of 2564 3000 pjvvd.exe 30 PID 3000 wrote to memory of 2564 3000 pjvvd.exe 30 PID 3000 wrote to memory of 2564 3000 pjvvd.exe 30 PID 3000 wrote to memory of 2564 3000 pjvvd.exe 30 PID 2564 wrote to memory of 2660 2564 9ppvj.exe 31 PID 2564 wrote to memory of 2660 2564 9ppvj.exe 31 PID 2564 wrote to memory of 2660 2564 9ppvj.exe 31 PID 2564 wrote to memory of 2660 2564 9ppvj.exe 31 PID 2660 wrote to memory of 2620 2660 nhthtt.exe 32 PID 2660 wrote to memory of 2620 2660 nhthtt.exe 32 PID 2660 wrote to memory of 2620 2660 nhthtt.exe 32 PID 2660 wrote to memory of 2620 2660 nhthtt.exe 32 PID 2620 wrote to memory of 2484 2620 bbnbhn.exe 33 PID 2620 wrote to memory of 2484 2620 bbnbhn.exe 33 PID 2620 wrote to memory of 2484 2620 bbnbhn.exe 33 PID 2620 wrote to memory of 2484 2620 bbnbhn.exe 33 PID 2484 wrote to memory of 2436 2484 1bbhhb.exe 34 PID 2484 wrote to memory of 2436 2484 1bbhhb.exe 34 PID 2484 wrote to memory of 2436 2484 1bbhhb.exe 34 PID 2484 wrote to memory of 2436 2484 1bbhhb.exe 34 PID 2436 wrote to memory of 2580 2436 pjvvp.exe 35 PID 2436 wrote to memory of 2580 2436 pjvvp.exe 35 PID 2436 wrote to memory of 2580 2436 pjvvp.exe 35 PID 2436 wrote to memory of 2580 2436 pjvvp.exe 35 PID 2580 wrote to memory of 2956 2580 e82422.exe 36 PID 2580 wrote to memory of 2956 2580 e82422.exe 36 PID 2580 wrote to memory of 2956 2580 e82422.exe 36 PID 2580 wrote to memory of 2956 2580 e82422.exe 36 PID 2956 wrote to memory of 2712 2956 jjddv.exe 37 PID 2956 wrote to memory of 2712 2956 jjddv.exe 37 PID 2956 wrote to memory of 2712 2956 jjddv.exe 37 PID 2956 wrote to memory of 2712 2956 jjddv.exe 37 PID 2712 wrote to memory of 2924 2712 pdvvj.exe 38 PID 2712 wrote to memory of 2924 2712 pdvvj.exe 38 PID 2712 wrote to memory of 2924 2712 pdvvj.exe 38 PID 2712 wrote to memory of 2924 2712 pdvvj.exe 38 PID 2924 wrote to memory of 2936 2924 86228.exe 39 PID 2924 wrote to memory of 2936 2924 86228.exe 39 PID 2924 wrote to memory of 2936 2924 86228.exe 39 PID 2924 wrote to memory of 2936 2924 86228.exe 39 PID 2936 wrote to memory of 2968 2936 o462446.exe 40 PID 2936 wrote to memory of 2968 2936 o462446.exe 40 PID 2936 wrote to memory of 2968 2936 o462446.exe 40 PID 2936 wrote to memory of 2968 2936 o462446.exe 40 PID 2968 wrote to memory of 1592 2968 e02800.exe 41 PID 2968 wrote to memory of 1592 2968 e02800.exe 41 PID 2968 wrote to memory of 1592 2968 e02800.exe 41 PID 2968 wrote to memory of 1592 2968 e02800.exe 41 PID 1592 wrote to memory of 1260 1592 xlxfxxf.exe 42 PID 1592 wrote to memory of 1260 1592 xlxfxxf.exe 42 PID 1592 wrote to memory of 1260 1592 xlxfxxf.exe 42 PID 1592 wrote to memory of 1260 1592 xlxfxxf.exe 42 PID 1260 wrote to memory of 848 1260 02842.exe 43 PID 1260 wrote to memory of 848 1260 02842.exe 43 PID 1260 wrote to memory of 848 1260 02842.exe 43 PID 1260 wrote to memory of 848 1260 02842.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\89fa36063323f00a9699b4ee22f807197d064e7a570554d111e1a598c6474f61.exe"C:\Users\Admin\AppData\Local\Temp\89fa36063323f00a9699b4ee22f807197d064e7a570554d111e1a598c6474f61.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\6848804.exec:\6848804.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
\??\c:\pjvvd.exec:\pjvvd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\9ppvj.exec:\9ppvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\nhthtt.exec:\nhthtt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\bbnbhn.exec:\bbnbhn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\1bbhhb.exec:\1bbhhb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\pjvvp.exec:\pjvvp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
\??\c:\e82422.exec:\e82422.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\jjddv.exec:\jjddv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
\??\c:\pdvvj.exec:\pdvvj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\86228.exec:\86228.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\o462446.exec:\o462446.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\e02800.exec:\e02800.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2968 -
\??\c:\xlxfxxf.exec:\xlxfxxf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1592 -
\??\c:\02842.exec:\02842.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1260 -
\??\c:\64222.exec:\64222.exe17⤵
- Executes dropped EXE
PID:848 -
\??\c:\868806.exec:\868806.exe18⤵
- Executes dropped EXE
PID:2700 -
\??\c:\1vpdj.exec:\1vpdj.exe19⤵
- Executes dropped EXE
PID:1152 -
\??\c:\lrxxlrr.exec:\lrxxlrr.exe20⤵
- Executes dropped EXE
PID:908 -
\??\c:\jvddj.exec:\jvddj.exe21⤵
- Executes dropped EXE
PID:1544 -
\??\c:\6642802.exec:\6642802.exe22⤵
- Executes dropped EXE
PID:1052 -
\??\c:\204022.exec:\204022.exe23⤵
- Executes dropped EXE
PID:2556 -
\??\c:\64286.exec:\64286.exe24⤵
- Executes dropped EXE
PID:2444 -
\??\c:\48242.exec:\48242.exe25⤵
- Executes dropped EXE
PID:1256 -
\??\c:\nnhhtb.exec:\nnhhtb.exe26⤵
- Executes dropped EXE
PID:620 -
\??\c:\04866.exec:\04866.exe27⤵
- Executes dropped EXE
PID:1688 -
\??\c:\jdjjj.exec:\jdjjj.exe28⤵
- Executes dropped EXE
PID:1164 -
\??\c:\082284.exec:\082284.exe29⤵
- Executes dropped EXE
PID:2644 -
\??\c:\480640.exec:\480640.exe30⤵
- Executes dropped EXE
PID:712 -
\??\c:\9ddpv.exec:\9ddpv.exe31⤵
- Executes dropped EXE
PID:2204 -
\??\c:\8260002.exec:\8260002.exe32⤵
- Executes dropped EXE
PID:1200 -
\??\c:\nbbhth.exec:\nbbhth.exe33⤵
- Executes dropped EXE
PID:1516 -
\??\c:\60628.exec:\60628.exe34⤵
- Executes dropped EXE
PID:1952 -
\??\c:\fxflrlx.exec:\fxflrlx.exe35⤵
- Executes dropped EXE
PID:2116 -
\??\c:\2624000.exec:\2624000.exe36⤵
- Executes dropped EXE
PID:2192 -
\??\c:\pjjdd.exec:\pjjdd.exe37⤵
- Executes dropped EXE
PID:2564 -
\??\c:\nnbhhn.exec:\nnbhhn.exe38⤵
- Executes dropped EXE
PID:2768 -
\??\c:\hbnthh.exec:\hbnthh.exe39⤵
- Executes dropped EXE
PID:3048 -
\??\c:\jppjd.exec:\jppjd.exe40⤵
- Executes dropped EXE
PID:2752 -
\??\c:\024466.exec:\024466.exe41⤵
- Executes dropped EXE
PID:2736 -
\??\c:\7dpjp.exec:\7dpjp.exe42⤵
- Executes dropped EXE
PID:2848 -
\??\c:\46226.exec:\46226.exe43⤵
- Executes dropped EXE
PID:2484 -
\??\c:\264062.exec:\264062.exe44⤵
- Executes dropped EXE
PID:2480 -
\??\c:\htbthb.exec:\htbthb.exe45⤵
- Executes dropped EXE
PID:2944 -
\??\c:\4288006.exec:\4288006.exe46⤵
- Executes dropped EXE
PID:2240 -
\??\c:\7pjvd.exec:\7pjvd.exe47⤵
- Executes dropped EXE
PID:2720 -
\??\c:\086244.exec:\086244.exe48⤵
- Executes dropped EXE
PID:2684 -
\??\c:\824028.exec:\824028.exe49⤵
- Executes dropped EXE
PID:2796 -
\??\c:\llxxlrl.exec:\llxxlrl.exe50⤵
- Executes dropped EXE
PID:2520 -
\??\c:\60446.exec:\60446.exe51⤵
- Executes dropped EXE
PID:2200 -
\??\c:\046288.exec:\046288.exe52⤵
- Executes dropped EXE
PID:1236 -
\??\c:\862844.exec:\862844.exe53⤵
- Executes dropped EXE
PID:1040 -
\??\c:\4806006.exec:\4806006.exe54⤵
- Executes dropped EXE
PID:1700 -
\??\c:\42800.exec:\42800.exe55⤵
- Executes dropped EXE
PID:340 -
\??\c:\4866828.exec:\4866828.exe56⤵
- Executes dropped EXE
PID:544 -
\??\c:\vdpjj.exec:\vdpjj.exe57⤵
- Executes dropped EXE
PID:332 -
\??\c:\246622.exec:\246622.exe58⤵
- Executes dropped EXE
PID:1484 -
\??\c:\0046464.exec:\0046464.exe59⤵
- Executes dropped EXE
PID:1488 -
\??\c:\tbhnnh.exec:\tbhnnh.exe60⤵
- Executes dropped EXE
PID:1528 -
\??\c:\26680.exec:\26680.exe61⤵
- Executes dropped EXE
PID:2328 -
\??\c:\608466.exec:\608466.exe62⤵
- Executes dropped EXE
PID:2324 -
\??\c:\7frxfxf.exec:\7frxfxf.exe63⤵
- Executes dropped EXE
PID:1156 -
\??\c:\5rxffff.exec:\5rxffff.exe64⤵
- Executes dropped EXE
PID:2868 -
\??\c:\4666266.exec:\4666266.exe65⤵
- Executes dropped EXE
PID:1848 -
\??\c:\028466.exec:\028466.exe66⤵PID:1876
-
\??\c:\08440.exec:\08440.exe67⤵PID:648
-
\??\c:\9htnnb.exec:\9htnnb.exe68⤵PID:1628
-
\??\c:\jvdvd.exec:\jvdvd.exe69⤵PID:976
-
\??\c:\rfxllrl.exec:\rfxllrl.exe70⤵PID:1676
-
\??\c:\g0262.exec:\g0262.exe71⤵PID:1764
-
\??\c:\2400044.exec:\2400044.exe72⤵PID:2172
-
\??\c:\dpjpd.exec:\dpjpd.exe73⤵PID:1740
-
\??\c:\u682222.exec:\u682222.exe74⤵PID:2040
-
\??\c:\q64400.exec:\q64400.exe75⤵PID:1516
-
\??\c:\nhbhbn.exec:\nhbhbn.exe76⤵PID:2388
-
\??\c:\m4488.exec:\m4488.exe77⤵PID:1952
-
\??\c:\22224.exec:\22224.exe78⤵PID:2428
-
\??\c:\tnbtnn.exec:\tnbtnn.exe79⤵PID:2192
-
\??\c:\jvjvd.exec:\jvjvd.exe80⤵PID:2468
-
\??\c:\048440.exec:\048440.exe81⤵PID:2768
-
\??\c:\080688.exec:\080688.exe82⤵PID:2776
-
\??\c:\w00628.exec:\w00628.exe83⤵PID:2752
-
\??\c:\08002.exec:\08002.exe84⤵PID:2080
-
\??\c:\e84006.exec:\e84006.exe85⤵PID:2848
-
\??\c:\c606884.exec:\c606884.exe86⤵PID:2484
-
\??\c:\3fxflrf.exec:\3fxflrf.exe87⤵PID:2480
-
\??\c:\q24066.exec:\q24066.exe88⤵PID:2008
-
\??\c:\2644440.exec:\2644440.exe89⤵PID:2240
-
\??\c:\bntbhb.exec:\bntbhb.exe90⤵PID:2696
-
\??\c:\xrfrflx.exec:\xrfrflx.exe91⤵PID:2684
-
\??\c:\8688488.exec:\8688488.exe92⤵PID:504
-
\??\c:\pjvjv.exec:\pjvjv.exe93⤵PID:2520
-
\??\c:\1rxxfff.exec:\1rxxfff.exe94⤵PID:2968
-
\??\c:\420066.exec:\420066.exe95⤵PID:1976
-
\??\c:\5jdjp.exec:\5jdjp.exe96⤵PID:1696
-
\??\c:\nhnnhh.exec:\nhnnhh.exe97⤵PID:1700
-
\??\c:\26262.exec:\26262.exe98⤵PID:2708
-
\??\c:\jpvpd.exec:\jpvpd.exe99⤵PID:544
-
\??\c:\48484.exec:\48484.exe100⤵PID:536
-
\??\c:\6866828.exec:\6866828.exe101⤵PID:1484
-
\??\c:\864602.exec:\864602.exe102⤵PID:1600
-
\??\c:\thnhhh.exec:\thnhhh.exe103⤵PID:2104
-
\??\c:\htbhnh.exec:\htbhnh.exe104⤵PID:2328
-
\??\c:\268844.exec:\268844.exe105⤵PID:2324
-
\??\c:\7nthhn.exec:\7nthhn.exe106⤵PID:2296
-
\??\c:\3nbbhh.exec:\3nbbhh.exe107⤵PID:2868
-
\??\c:\vvpdd.exec:\vvpdd.exe108⤵PID:2528
-
\??\c:\7pjjv.exec:\7pjjv.exe109⤵PID:1876
-
\??\c:\602804.exec:\602804.exe110⤵PID:1884
-
\??\c:\480026.exec:\480026.exe111⤵PID:1628
-
\??\c:\jdjpj.exec:\jdjpj.exe112⤵PID:1404
-
\??\c:\e80688.exec:\e80688.exe113⤵PID:1676
-
\??\c:\vvjjv.exec:\vvjjv.exe114⤵PID:2396
-
\??\c:\7jvdd.exec:\7jvdd.exe115⤵PID:2172
-
\??\c:\3djdj.exec:\3djdj.exe116⤵PID:1740
-
\??\c:\8206284.exec:\8206284.exe117⤵PID:2208
-
\??\c:\6806262.exec:\6806262.exe118⤵PID:2368
-
\??\c:\86844.exec:\86844.exe119⤵PID:2388
-
\??\c:\2428200.exec:\2428200.exe120⤵PID:3052
-
\??\c:\nhbhnn.exec:\nhbhnn.exe121⤵PID:2588
-
\??\c:\jdpvj.exec:\jdpvj.exe122⤵PID:2660
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-