Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 17:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
edff3fabab5c6532ed98673f33a22040N.exe
Resource
win7-20240704-en
5 signatures
120 seconds
General
-
Target
edff3fabab5c6532ed98673f33a22040N.exe
-
Size
86KB
-
MD5
edff3fabab5c6532ed98673f33a22040
-
SHA1
e1ed775bcfbcae9cbd9fbdd97ad8b6416488f30f
-
SHA256
736158917ca0eddf0377d1d3b32f8f0e7544aef95dcf9211435c627ce75266c3
-
SHA512
b5a2a36af446b253113e6350001807e9b9fcae4d8853de399b785637559ac2aa86ba26306cf3af1e98233d1a58ac0dfe3cbb1463bb615cff968e8aee5fe394c9
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73yqKH/KjvHo+WdNlj:ymb3NkkiQ3mdBjFo73yX+vI+qvj
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2388-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1668-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2564-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2868-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1312-41-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1312-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2980-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2756-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2884-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2708-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2484-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/112-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1776-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2928-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1984-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2068-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1584-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2544-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2020-216-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2608-226-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/904-261-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2444-270-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1668 bxxxdp.exe 2564 ltftjx.exe 1312 nxthfvv.exe 2868 dnrvvt.exe 2756 hhlrplb.exe 2980 bhbflvf.exe 2660 vxdfl.exe 2884 vndpjhl.exe 2708 rnvvldv.exe 2484 bnplljn.exe 112 dbvdntn.exe 832 xnprl.exe 1496 rthvxxf.exe 1148 bbnffd.exe 1776 vjpfvn.exe 2928 vbtrpfx.exe 1144 dbdxnr.exe 1984 lnhjtxd.exe 2068 hjhthft.exe 1584 rndjt.exe 2544 fjdbn.exe 2020 fdpdnb.exe 2608 fldfp.exe 1644 bdppd.exe 1736 ttbtbnf.exe 3016 jrpvnv.exe 904 bnrhbx.exe 2444 hlnbp.exe 1624 rjvfltb.exe 2232 hllrdf.exe 2124 fjltddp.exe 2560 rvdpb.exe 2588 jtvhdj.exe 2776 ntbrx.exe 2584 jtxlhdv.exe 2892 frldlb.exe 2756 hvhtjlj.exe 2148 bppfjlb.exe 2948 xdtlv.exe 2768 trhtlr.exe 2636 lblfdb.exe 2644 xtrrvx.exe 3060 vphtn.exe 2264 htxtpl.exe 648 rxbvx.exe 2956 hxhxn.exe 1300 lrlvd.exe 2528 lxbptp.exe 1016 flnrj.exe 2036 tpnjvn.exe 1152 rtdhdn.exe 2920 lnhfvlj.exe 2700 ndbbpv.exe 736 hdlfb.exe 2728 dhdplxh.exe 1036 vdlbdhj.exe 1728 ntxrjvl.exe 2476 hjnpxdt.exe 2028 dtppxb.exe 2328 tppfvf.exe 1812 vpxpff.exe 2428 lrrxf.exe 280 tbntvj.exe 1736 xntlr.exe -
resource yara_rule behavioral1/memory/2388-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1668-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2868-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1312-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2980-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2708-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/112-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1776-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1984-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2068-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1584-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2020-216-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2608-226-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/904-261-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2444-270-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 1668 2388 edff3fabab5c6532ed98673f33a22040N.exe 29 PID 2388 wrote to memory of 1668 2388 edff3fabab5c6532ed98673f33a22040N.exe 29 PID 2388 wrote to memory of 1668 2388 edff3fabab5c6532ed98673f33a22040N.exe 29 PID 2388 wrote to memory of 1668 2388 edff3fabab5c6532ed98673f33a22040N.exe 29 PID 1668 wrote to memory of 2564 1668 bxxxdp.exe 30 PID 1668 wrote to memory of 2564 1668 bxxxdp.exe 30 PID 1668 wrote to memory of 2564 1668 bxxxdp.exe 30 PID 1668 wrote to memory of 2564 1668 bxxxdp.exe 30 PID 2564 wrote to memory of 1312 2564 ltftjx.exe 31 PID 2564 wrote to memory of 1312 2564 ltftjx.exe 31 PID 2564 wrote to memory of 1312 2564 ltftjx.exe 31 PID 2564 wrote to memory of 1312 2564 ltftjx.exe 31 PID 1312 wrote to memory of 2868 1312 nxthfvv.exe 32 PID 1312 wrote to memory of 2868 1312 nxthfvv.exe 32 PID 1312 wrote to memory of 2868 1312 nxthfvv.exe 32 PID 1312 wrote to memory of 2868 1312 nxthfvv.exe 32 PID 2868 wrote to memory of 2756 2868 dnrvvt.exe 33 PID 2868 wrote to memory of 2756 2868 dnrvvt.exe 33 PID 2868 wrote to memory of 2756 2868 dnrvvt.exe 33 PID 2868 wrote to memory of 2756 2868 dnrvvt.exe 33 PID 2756 wrote to memory of 2980 2756 hhlrplb.exe 34 PID 2756 wrote to memory of 2980 2756 hhlrplb.exe 34 PID 2756 wrote to memory of 2980 2756 hhlrplb.exe 34 PID 2756 wrote to memory of 2980 2756 hhlrplb.exe 34 PID 2980 wrote to memory of 2660 2980 bhbflvf.exe 35 PID 2980 wrote to memory of 2660 2980 bhbflvf.exe 35 PID 2980 wrote to memory of 2660 2980 bhbflvf.exe 35 PID 2980 wrote to memory of 2660 2980 bhbflvf.exe 35 PID 2660 wrote to memory of 2884 2660 vxdfl.exe 36 PID 2660 wrote to memory of 2884 2660 vxdfl.exe 36 PID 2660 wrote to memory of 2884 2660 vxdfl.exe 36 PID 2660 wrote to memory of 2884 2660 vxdfl.exe 36 PID 2884 wrote to memory of 2708 2884 vndpjhl.exe 37 PID 2884 wrote to memory of 2708 2884 vndpjhl.exe 37 PID 2884 wrote to memory of 2708 2884 vndpjhl.exe 37 PID 2884 wrote to memory of 2708 2884 vndpjhl.exe 37 PID 2708 wrote to memory of 2484 2708 rnvvldv.exe 38 PID 2708 wrote to memory of 2484 2708 rnvvldv.exe 38 PID 2708 wrote to memory of 2484 2708 rnvvldv.exe 38 PID 2708 wrote to memory of 2484 2708 rnvvldv.exe 38 PID 2484 wrote to memory of 112 2484 bnplljn.exe 39 PID 2484 wrote to memory of 112 2484 bnplljn.exe 39 PID 2484 wrote to memory of 112 2484 bnplljn.exe 39 PID 2484 wrote to memory of 112 2484 bnplljn.exe 39 PID 112 wrote to memory of 832 112 dbvdntn.exe 40 PID 112 wrote to memory of 832 112 dbvdntn.exe 40 PID 112 wrote to memory of 832 112 dbvdntn.exe 40 PID 112 wrote to memory of 832 112 dbvdntn.exe 40 PID 832 wrote to memory of 1496 832 xnprl.exe 41 PID 832 wrote to memory of 1496 832 xnprl.exe 41 PID 832 wrote to memory of 1496 832 xnprl.exe 41 PID 832 wrote to memory of 1496 832 xnprl.exe 41 PID 1496 wrote to memory of 1148 1496 rthvxxf.exe 42 PID 1496 wrote to memory of 1148 1496 rthvxxf.exe 42 PID 1496 wrote to memory of 1148 1496 rthvxxf.exe 42 PID 1496 wrote to memory of 1148 1496 rthvxxf.exe 42 PID 1148 wrote to memory of 1776 1148 bbnffd.exe 43 PID 1148 wrote to memory of 1776 1148 bbnffd.exe 43 PID 1148 wrote to memory of 1776 1148 bbnffd.exe 43 PID 1148 wrote to memory of 1776 1148 bbnffd.exe 43 PID 1776 wrote to memory of 2928 1776 vjpfvn.exe 44 PID 1776 wrote to memory of 2928 1776 vjpfvn.exe 44 PID 1776 wrote to memory of 2928 1776 vjpfvn.exe 44 PID 1776 wrote to memory of 2928 1776 vjpfvn.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\edff3fabab5c6532ed98673f33a22040N.exe"C:\Users\Admin\AppData\Local\Temp\edff3fabab5c6532ed98673f33a22040N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\bxxxdp.exec:\bxxxdp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
\??\c:\ltftjx.exec:\ltftjx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
\??\c:\nxthfvv.exec:\nxthfvv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
\??\c:\dnrvvt.exec:\dnrvvt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\hhlrplb.exec:\hhlrplb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\bhbflvf.exec:\bhbflvf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\vxdfl.exec:\vxdfl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\vndpjhl.exec:\vndpjhl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\rnvvldv.exec:\rnvvldv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\bnplljn.exec:\bnplljn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\dbvdntn.exec:\dbvdntn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:112 -
\??\c:\xnprl.exec:\xnprl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:832 -
\??\c:\rthvxxf.exec:\rthvxxf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
\??\c:\bbnffd.exec:\bbnffd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
\??\c:\vjpfvn.exec:\vjpfvn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1776 -
\??\c:\vbtrpfx.exec:\vbtrpfx.exe17⤵
- Executes dropped EXE
PID:2928 -
\??\c:\dbdxnr.exec:\dbdxnr.exe18⤵
- Executes dropped EXE
PID:1144 -
\??\c:\lnhjtxd.exec:\lnhjtxd.exe19⤵
- Executes dropped EXE
PID:1984 -
\??\c:\hjhthft.exec:\hjhthft.exe20⤵
- Executes dropped EXE
PID:2068 -
\??\c:\rndjt.exec:\rndjt.exe21⤵
- Executes dropped EXE
PID:1584 -
\??\c:\fjdbn.exec:\fjdbn.exe22⤵
- Executes dropped EXE
PID:2544 -
\??\c:\fdpdnb.exec:\fdpdnb.exe23⤵
- Executes dropped EXE
PID:2020 -
\??\c:\fldfp.exec:\fldfp.exe24⤵
- Executes dropped EXE
PID:2608 -
\??\c:\bdppd.exec:\bdppd.exe25⤵
- Executes dropped EXE
PID:1644 -
\??\c:\ttbtbnf.exec:\ttbtbnf.exe26⤵
- Executes dropped EXE
PID:1736 -
\??\c:\jrpvnv.exec:\jrpvnv.exe27⤵
- Executes dropped EXE
PID:3016 -
\??\c:\bnrhbx.exec:\bnrhbx.exe28⤵
- Executes dropped EXE
PID:904 -
\??\c:\hlnbp.exec:\hlnbp.exe29⤵
- Executes dropped EXE
PID:2444 -
\??\c:\rjvfltb.exec:\rjvfltb.exe30⤵
- Executes dropped EXE
PID:1624 -
\??\c:\hllrdf.exec:\hllrdf.exe31⤵
- Executes dropped EXE
PID:2232 -
\??\c:\fjltddp.exec:\fjltddp.exe32⤵
- Executes dropped EXE
PID:2124 -
\??\c:\rvdpb.exec:\rvdpb.exe33⤵
- Executes dropped EXE
PID:2560 -
\??\c:\jtvhdj.exec:\jtvhdj.exe34⤵
- Executes dropped EXE
PID:2588 -
\??\c:\ntbrx.exec:\ntbrx.exe35⤵
- Executes dropped EXE
PID:2776 -
\??\c:\jtxlhdv.exec:\jtxlhdv.exe36⤵
- Executes dropped EXE
PID:2584 -
\??\c:\frldlb.exec:\frldlb.exe37⤵
- Executes dropped EXE
PID:2892 -
\??\c:\hvhtjlj.exec:\hvhtjlj.exe38⤵
- Executes dropped EXE
PID:2756 -
\??\c:\bppfjlb.exec:\bppfjlb.exe39⤵
- Executes dropped EXE
PID:2148 -
\??\c:\xdtlv.exec:\xdtlv.exe40⤵
- Executes dropped EXE
PID:2948 -
\??\c:\trhtlr.exec:\trhtlr.exe41⤵
- Executes dropped EXE
PID:2768 -
\??\c:\lblfdb.exec:\lblfdb.exe42⤵
- Executes dropped EXE
PID:2636 -
\??\c:\xtrrvx.exec:\xtrrvx.exe43⤵
- Executes dropped EXE
PID:2644 -
\??\c:\vphtn.exec:\vphtn.exe44⤵
- Executes dropped EXE
PID:3060 -
\??\c:\htxtpl.exec:\htxtpl.exe45⤵
- Executes dropped EXE
PID:2264 -
\??\c:\rxbvx.exec:\rxbvx.exe46⤵
- Executes dropped EXE
PID:648 -
\??\c:\hxhxn.exec:\hxhxn.exe47⤵
- Executes dropped EXE
PID:2956 -
\??\c:\lrlvd.exec:\lrlvd.exe48⤵
- Executes dropped EXE
PID:1300 -
\??\c:\lxbptp.exec:\lxbptp.exe49⤵
- Executes dropped EXE
PID:2528 -
\??\c:\flnrj.exec:\flnrj.exe50⤵
- Executes dropped EXE
PID:1016 -
\??\c:\tpnjvn.exec:\tpnjvn.exe51⤵
- Executes dropped EXE
PID:2036 -
\??\c:\rtdhdn.exec:\rtdhdn.exe52⤵
- Executes dropped EXE
PID:1152 -
\??\c:\lnhfvlj.exec:\lnhfvlj.exe53⤵
- Executes dropped EXE
PID:2920 -
\??\c:\ndbbpv.exec:\ndbbpv.exe54⤵
- Executes dropped EXE
PID:2700 -
\??\c:\hdlfb.exec:\hdlfb.exe55⤵
- Executes dropped EXE
PID:736 -
\??\c:\dhdplxh.exec:\dhdplxh.exe56⤵
- Executes dropped EXE
PID:2728 -
\??\c:\vdlbdhj.exec:\vdlbdhj.exe57⤵
- Executes dropped EXE
PID:1036 -
\??\c:\ntxrjvl.exec:\ntxrjvl.exe58⤵
- Executes dropped EXE
PID:1728 -
\??\c:\hjnpxdt.exec:\hjnpxdt.exe59⤵
- Executes dropped EXE
PID:2476 -
\??\c:\dtppxb.exec:\dtppxb.exe60⤵
- Executes dropped EXE
PID:2028 -
\??\c:\tppfvf.exec:\tppfvf.exe61⤵
- Executes dropped EXE
PID:2328 -
\??\c:\vpxpff.exec:\vpxpff.exe62⤵
- Executes dropped EXE
PID:1812 -
\??\c:\lrrxf.exec:\lrrxf.exe63⤵
- Executes dropped EXE
PID:2428 -
\??\c:\tbntvj.exec:\tbntvj.exe64⤵
- Executes dropped EXE
PID:280 -
\??\c:\xntlr.exec:\xntlr.exe65⤵
- Executes dropped EXE
PID:1736 -
\??\c:\jnrxjvd.exec:\jnrxjvd.exe66⤵PID:908
-
\??\c:\bjvrdnx.exec:\bjvrdnx.exe67⤵PID:2164
-
\??\c:\jpfxfb.exec:\jpfxfb.exe68⤵PID:2500
-
\??\c:\hjbpdn.exec:\hjbpdn.exe69⤵PID:2096
-
\??\c:\tpjbj.exec:\tpjbj.exe70⤵PID:2180
-
\??\c:\lrpvb.exec:\lrpvb.exe71⤵PID:1684
-
\??\c:\jrxdhn.exec:\jrxdhn.exe72⤵PID:2908
-
\??\c:\fnlxdtl.exec:\fnlxdtl.exe73⤵PID:2564
-
\??\c:\fhlrll.exec:\fhlrll.exe74⤵PID:2772
-
\??\c:\xhfdhr.exec:\xhfdhr.exe75⤵PID:1572
-
\??\c:\bxbdn.exec:\bxbdn.exe76⤵PID:2872
-
\??\c:\jfnvjdt.exec:\jfnvjdt.exe77⤵PID:2868
-
\??\c:\xrtvnnt.exec:\xrtvnnt.exe78⤵PID:2792
-
\??\c:\pvrbl.exec:\pvrbl.exe79⤵PID:2748
-
\??\c:\lpbrx.exec:\lpbrx.exe80⤵PID:300
-
\??\c:\lxhrdt.exec:\lxhrdt.exe81⤵PID:2640
-
\??\c:\nxxrjfv.exec:\nxxrjfv.exe82⤵PID:2648
-
\??\c:\jbpplnb.exec:\jbpplnb.exe83⤵PID:1400
-
\??\c:\rvjtf.exec:\rvjtf.exe84⤵PID:2288
-
\??\c:\fplrxr.exec:\fplrxr.exe85⤵PID:2612
-
\??\c:\nvhrlf.exec:\nvhrlf.exe86⤵PID:1912
-
\??\c:\ltvnlh.exec:\ltvnlh.exe87⤵PID:1264
-
\??\c:\vtfhxp.exec:\vtfhxp.exe88⤵PID:1956
-
\??\c:\txfbx.exec:\txfbx.exe89⤵PID:1688
-
\??\c:\tplnfx.exec:\tplnfx.exe90⤵PID:2032
-
\??\c:\hvlnfpp.exec:\hvlnfpp.exe91⤵PID:844
-
\??\c:\xhjrdn.exec:\xhjrdn.exe92⤵PID:2812
-
\??\c:\vhxll.exec:\vhxll.exe93⤵PID:1196
-
\??\c:\jrxfv.exec:\jrxfv.exe94⤵PID:1976
-
\??\c:\bdndhph.exec:\bdndhph.exe95⤵PID:2104
-
\??\c:\jblrvlh.exec:\jblrvlh.exe96⤵PID:936
-
\??\c:\hvxhpnx.exec:\hvxhpnx.exe97⤵PID:2024
-
\??\c:\thdph.exec:\thdph.exe98⤵PID:2416
-
\??\c:\jfjpjdl.exec:\jfjpjdl.exe99⤵PID:2216
-
\??\c:\nbnlv.exec:\nbnlv.exe100⤵PID:1788
-
\??\c:\lbdrtl.exec:\lbdrtl.exe101⤵PID:1520
-
\??\c:\bhftltp.exec:\bhftltp.exe102⤵PID:2420
-
\??\c:\xplhvr.exec:\xplhvr.exe103⤵PID:1384
-
\??\c:\tjnjx.exec:\tjnjx.exe104⤵PID:836
-
\??\c:\vphxrj.exec:\vphxrj.exe105⤵PID:2376
-
\??\c:\rprnhv.exec:\rprnhv.exe106⤵PID:2176
-
\??\c:\txftlvx.exec:\txftlvx.exe107⤵PID:1808
-
\??\c:\vhxjld.exec:\vhxjld.exe108⤵PID:2600
-
\??\c:\jthdptn.exec:\jthdptn.exe109⤵PID:1624
-
\??\c:\htpjrlr.exec:\htpjrlr.exe110⤵PID:2196
-
\??\c:\fldbxpn.exec:\fldbxpn.exe111⤵PID:664
-
\??\c:\dhhbbrr.exec:\dhhbbrr.exe112⤵PID:2108
-
\??\c:\xllbx.exec:\xllbx.exe113⤵PID:2304
-
\??\c:\trhdvft.exec:\trhdvft.exe114⤵PID:1704
-
\??\c:\tdphx.exec:\tdphx.exe115⤵PID:2468
-
\??\c:\lbtrbl.exec:\lbtrbl.exe116⤵PID:2896
-
\??\c:\vlbvhpv.exec:\vlbvhpv.exe117⤵PID:2784
-
\??\c:\rbhdx.exec:\rbhdx.exe118⤵PID:2916
-
\??\c:\bdbbx.exec:\bdbbx.exe119⤵PID:2980
-
\??\c:\pdpxh.exec:\pdpxh.exe120⤵PID:2800
-
\??\c:\bfrdblx.exec:\bfrdblx.exe121⤵PID:2152
-
\??\c:\hjlpx.exec:\hjlpx.exe122⤵PID:2652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-