Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 23:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
32015f5029c47f220b4ed9fdc679c7f0_NeikiAnalytics.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
32015f5029c47f220b4ed9fdc679c7f0_NeikiAnalytics.exe
-
Size
63KB
-
MD5
32015f5029c47f220b4ed9fdc679c7f0
-
SHA1
df7e79db52df49bb4e340a99b43c608d19d734b7
-
SHA256
d53a130d50eb7678d0935e237e5a88eb1c9696c475134418ca9ea3e04a32138e
-
SHA512
560af17b0ef089c75779a9432ae3bdb5ec84e4b807f62774d0e0c8f3565489a0e340090dccfe0b3ab2af70180bb0a22003abaeb572f4561f8cc687a8b977cae4
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIhJm/w/:ymb3NkkiQ3mdBjFILm2
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/3000-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3000-8-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1796-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2176-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3060-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/876-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2496-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1452-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1256-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1944-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1492-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1688-290-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/768-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1192-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1796 thbnbh.exe 2176 tnbhnt.exe 2532 fxrxlrf.exe 2724 486284.exe 3060 u880684.exe 2768 826642.exe 876 004046.exe 2496 282042.exe 1152 2864804.exe 2700 622008.exe 2788 c248860.exe 2912 862206.exe 2952 btntbh.exe 496 82468.exe 1452 g8006.exe 1192 s8028.exe 1608 hhtbnn.exe 1308 4284062.exe 1256 424066.exe 1628 042446.exe 1944 04668.exe 2864 488428.exe 1492 9lrrrxl.exe 836 6066888.exe 840 fxrrfrf.exe 1932 tbbbhh.exe 768 ppdjp.exe 880 4200886.exe 2396 0024680.exe 1688 86006.exe 1188 480684.exe 1748 nttbhn.exe 2324 1btnbh.exe 1544 a2002.exe 2516 tthntn.exe 2636 pdpjv.exe 3012 ppdvv.exe 2552 208462.exe 2744 6480860.exe 2448 608424.exe 2556 vvppd.exe 2596 jvjjp.exe 2612 tntbnn.exe 2728 6422484.exe 2420 264066.exe 2784 ffffrrx.exe 2924 tnbntt.exe 2804 u860624.exe 1736 1nbhhn.exe 1288 1dpdp.exe 624 82620.exe 2492 xxlrxxf.exe 2524 202244.exe 1604 o606662.exe 1808 m0022.exe 2668 o420880.exe 2060 040060.exe 1300 w20006.exe 1628 8288080.exe 1960 q84206.exe 2404 nhntth.exe 1852 26224.exe 572 fxrrffr.exe 344 pppdv.exe -
resource yara_rule behavioral1/memory/3000-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1796-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1796-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/876-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1452-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1256-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1944-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1492-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1688-290-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/768-263-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1192-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-120-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3000 wrote to memory of 1796 3000 32015f5029c47f220b4ed9fdc679c7f0_NeikiAnalytics.exe 28 PID 3000 wrote to memory of 1796 3000 32015f5029c47f220b4ed9fdc679c7f0_NeikiAnalytics.exe 28 PID 3000 wrote to memory of 1796 3000 32015f5029c47f220b4ed9fdc679c7f0_NeikiAnalytics.exe 28 PID 3000 wrote to memory of 1796 3000 32015f5029c47f220b4ed9fdc679c7f0_NeikiAnalytics.exe 28 PID 1796 wrote to memory of 2176 1796 thbnbh.exe 29 PID 1796 wrote to memory of 2176 1796 thbnbh.exe 29 PID 1796 wrote to memory of 2176 1796 thbnbh.exe 29 PID 1796 wrote to memory of 2176 1796 thbnbh.exe 29 PID 2176 wrote to memory of 2532 2176 tnbhnt.exe 30 PID 2176 wrote to memory of 2532 2176 tnbhnt.exe 30 PID 2176 wrote to memory of 2532 2176 tnbhnt.exe 30 PID 2176 wrote to memory of 2532 2176 tnbhnt.exe 30 PID 2532 wrote to memory of 2724 2532 fxrxlrf.exe 31 PID 2532 wrote to memory of 2724 2532 fxrxlrf.exe 31 PID 2532 wrote to memory of 2724 2532 fxrxlrf.exe 31 PID 2532 wrote to memory of 2724 2532 fxrxlrf.exe 31 PID 2724 wrote to memory of 3060 2724 486284.exe 32 PID 2724 wrote to memory of 3060 2724 486284.exe 32 PID 2724 wrote to memory of 3060 2724 486284.exe 32 PID 2724 wrote to memory of 3060 2724 486284.exe 32 PID 3060 wrote to memory of 2768 3060 u880684.exe 33 PID 3060 wrote to memory of 2768 3060 u880684.exe 33 PID 3060 wrote to memory of 2768 3060 u880684.exe 33 PID 3060 wrote to memory of 2768 3060 u880684.exe 33 PID 2768 wrote to memory of 876 2768 826642.exe 34 PID 2768 wrote to memory of 876 2768 826642.exe 34 PID 2768 wrote to memory of 876 2768 826642.exe 34 PID 2768 wrote to memory of 876 2768 826642.exe 34 PID 876 wrote to memory of 2496 876 004046.exe 35 PID 876 wrote to memory of 2496 876 004046.exe 35 PID 876 wrote to memory of 2496 876 004046.exe 35 PID 876 wrote to memory of 2496 876 004046.exe 35 PID 2496 wrote to memory of 1152 2496 282042.exe 36 PID 2496 wrote to memory of 1152 2496 282042.exe 36 PID 2496 wrote to memory of 1152 2496 282042.exe 36 PID 2496 wrote to memory of 1152 2496 282042.exe 36 PID 1152 wrote to memory of 2700 1152 2864804.exe 117 PID 1152 wrote to memory of 2700 1152 2864804.exe 117 PID 1152 wrote to memory of 2700 1152 2864804.exe 117 PID 1152 wrote to memory of 2700 1152 2864804.exe 117 PID 2700 wrote to memory of 2788 2700 622008.exe 38 PID 2700 wrote to memory of 2788 2700 622008.exe 38 PID 2700 wrote to memory of 2788 2700 622008.exe 38 PID 2700 wrote to memory of 2788 2700 622008.exe 38 PID 2788 wrote to memory of 2912 2788 c248860.exe 39 PID 2788 wrote to memory of 2912 2788 c248860.exe 39 PID 2788 wrote to memory of 2912 2788 c248860.exe 39 PID 2788 wrote to memory of 2912 2788 c248860.exe 39 PID 2912 wrote to memory of 2952 2912 862206.exe 40 PID 2912 wrote to memory of 2952 2912 862206.exe 40 PID 2912 wrote to memory of 2952 2912 862206.exe 40 PID 2912 wrote to memory of 2952 2912 862206.exe 40 PID 2952 wrote to memory of 496 2952 btntbh.exe 41 PID 2952 wrote to memory of 496 2952 btntbh.exe 41 PID 2952 wrote to memory of 496 2952 btntbh.exe 41 PID 2952 wrote to memory of 496 2952 btntbh.exe 41 PID 496 wrote to memory of 1452 496 82468.exe 123 PID 496 wrote to memory of 1452 496 82468.exe 123 PID 496 wrote to memory of 1452 496 82468.exe 123 PID 496 wrote to memory of 1452 496 82468.exe 123 PID 1452 wrote to memory of 1192 1452 g8006.exe 124 PID 1452 wrote to memory of 1192 1452 g8006.exe 124 PID 1452 wrote to memory of 1192 1452 g8006.exe 124 PID 1452 wrote to memory of 1192 1452 g8006.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\32015f5029c47f220b4ed9fdc679c7f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\32015f5029c47f220b4ed9fdc679c7f0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\thbnbh.exec:\thbnbh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\tnbhnt.exec:\tnbhnt.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\fxrxlrf.exec:\fxrxlrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\486284.exec:\486284.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\u880684.exec:\u880684.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
\??\c:\826642.exec:\826642.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\004046.exec:\004046.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
\??\c:\282042.exec:\282042.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
\??\c:\2864804.exec:\2864804.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
\??\c:\622008.exec:\622008.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\c248860.exec:\c248860.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\862206.exec:\862206.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\btntbh.exec:\btntbh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\82468.exec:\82468.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:496 -
\??\c:\g8006.exec:\g8006.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1452 -
\??\c:\s8028.exec:\s8028.exe17⤵
- Executes dropped EXE
PID:1192 -
\??\c:\hhtbnn.exec:\hhtbnn.exe18⤵
- Executes dropped EXE
PID:1608 -
\??\c:\4284062.exec:\4284062.exe19⤵
- Executes dropped EXE
PID:1308 -
\??\c:\424066.exec:\424066.exe20⤵
- Executes dropped EXE
PID:1256 -
\??\c:\042446.exec:\042446.exe21⤵
- Executes dropped EXE
PID:1628 -
\??\c:\04668.exec:\04668.exe22⤵
- Executes dropped EXE
PID:1944 -
\??\c:\488428.exec:\488428.exe23⤵
- Executes dropped EXE
PID:2864 -
\??\c:\9lrrrxl.exec:\9lrrrxl.exe24⤵
- Executes dropped EXE
PID:1492 -
\??\c:\6066888.exec:\6066888.exe25⤵
- Executes dropped EXE
PID:836 -
\??\c:\fxrrfrf.exec:\fxrrfrf.exe26⤵
- Executes dropped EXE
PID:840 -
\??\c:\tbbbhh.exec:\tbbbhh.exe27⤵
- Executes dropped EXE
PID:1932 -
\??\c:\ppdjp.exec:\ppdjp.exe28⤵
- Executes dropped EXE
PID:768 -
\??\c:\4200886.exec:\4200886.exe29⤵
- Executes dropped EXE
PID:880 -
\??\c:\0024680.exec:\0024680.exe30⤵
- Executes dropped EXE
PID:2396 -
\??\c:\86006.exec:\86006.exe31⤵
- Executes dropped EXE
PID:1688 -
\??\c:\480684.exec:\480684.exe32⤵
- Executes dropped EXE
PID:1188 -
\??\c:\nttbhn.exec:\nttbhn.exe33⤵
- Executes dropped EXE
PID:1748 -
\??\c:\1btnbh.exec:\1btnbh.exe34⤵
- Executes dropped EXE
PID:2324 -
\??\c:\hbttnh.exec:\hbttnh.exe35⤵PID:1588
-
\??\c:\a2002.exec:\a2002.exe36⤵
- Executes dropped EXE
PID:1544 -
\??\c:\tthntn.exec:\tthntn.exe37⤵
- Executes dropped EXE
PID:2516 -
\??\c:\pdpjv.exec:\pdpjv.exe38⤵
- Executes dropped EXE
PID:2636 -
\??\c:\ppdvv.exec:\ppdvv.exe39⤵
- Executes dropped EXE
PID:3012 -
\??\c:\208462.exec:\208462.exe40⤵
- Executes dropped EXE
PID:2552 -
\??\c:\6480860.exec:\6480860.exe41⤵
- Executes dropped EXE
PID:2744 -
\??\c:\608424.exec:\608424.exe42⤵
- Executes dropped EXE
PID:2448 -
\??\c:\vvppd.exec:\vvppd.exe43⤵
- Executes dropped EXE
PID:2556 -
\??\c:\jvjjp.exec:\jvjjp.exe44⤵
- Executes dropped EXE
PID:2596 -
\??\c:\tntbnn.exec:\tntbnn.exe45⤵
- Executes dropped EXE
PID:2612 -
\??\c:\6422484.exec:\6422484.exe46⤵
- Executes dropped EXE
PID:2728 -
\??\c:\264066.exec:\264066.exe47⤵
- Executes dropped EXE
PID:2420 -
\??\c:\ffffrrx.exec:\ffffrrx.exe48⤵
- Executes dropped EXE
PID:2784 -
\??\c:\tnbntt.exec:\tnbntt.exe49⤵
- Executes dropped EXE
PID:2924 -
\??\c:\u860624.exec:\u860624.exe50⤵
- Executes dropped EXE
PID:2804 -
\??\c:\1nbhhn.exec:\1nbhhn.exe51⤵
- Executes dropped EXE
PID:1736 -
\??\c:\1dpdp.exec:\1dpdp.exe52⤵
- Executes dropped EXE
PID:1288 -
\??\c:\82620.exec:\82620.exe53⤵
- Executes dropped EXE
PID:624 -
\??\c:\xxlrxxf.exec:\xxlrxxf.exe54⤵
- Executes dropped EXE
PID:2492 -
\??\c:\202244.exec:\202244.exe55⤵
- Executes dropped EXE
PID:2524 -
\??\c:\o606662.exec:\o606662.exe56⤵
- Executes dropped EXE
PID:1604 -
\??\c:\m0022.exec:\m0022.exe57⤵
- Executes dropped EXE
PID:1808 -
\??\c:\o420880.exec:\o420880.exe58⤵
- Executes dropped EXE
PID:2668 -
\??\c:\040060.exec:\040060.exe59⤵
- Executes dropped EXE
PID:2060 -
\??\c:\w20006.exec:\w20006.exe60⤵
- Executes dropped EXE
PID:1300 -
\??\c:\8288080.exec:\8288080.exe61⤵
- Executes dropped EXE
PID:1628 -
\??\c:\q84206.exec:\q84206.exe62⤵
- Executes dropped EXE
PID:1960 -
\??\c:\nhntth.exec:\nhntth.exe63⤵
- Executes dropped EXE
PID:2404 -
\??\c:\26224.exec:\26224.exe64⤵
- Executes dropped EXE
PID:1852 -
\??\c:\fxrrffr.exec:\fxrrffr.exe65⤵
- Executes dropped EXE
PID:572 -
\??\c:\pppdv.exec:\pppdv.exe66⤵
- Executes dropped EXE
PID:344 -
\??\c:\pjdjp.exec:\pjdjp.exe67⤵PID:1860
-
\??\c:\bnntbn.exec:\bnntbn.exe68⤵PID:2240
-
\??\c:\8082880.exec:\8082880.exe69⤵PID:1656
-
\??\c:\4800224.exec:\4800224.exe70⤵PID:2140
-
\??\c:\i488446.exec:\i488446.exe71⤵PID:1780
-
\??\c:\tnhnnn.exec:\tnhnnn.exe72⤵PID:1972
-
\??\c:\lfxfllx.exec:\lfxfllx.exe73⤵PID:2340
-
\??\c:\w60844.exec:\w60844.exe74⤵PID:1668
-
\??\c:\ffrxlxr.exec:\ffrxlxr.exe75⤵PID:320
-
\??\c:\hbhnbb.exec:\hbhnbb.exe76⤵PID:1584
-
\??\c:\0462444.exec:\0462444.exe77⤵PID:2212
-
\??\c:\dpddd.exec:\dpddd.exe78⤵PID:2760
-
\??\c:\vjvdj.exec:\vjvdj.exe79⤵PID:2988
-
\??\c:\c862442.exec:\c862442.exe80⤵PID:2280
-
\??\c:\ffrrxxx.exec:\ffrrxxx.exe81⤵PID:1664
-
\??\c:\bbhhht.exec:\bbhhht.exe82⤵PID:2580
-
\??\c:\thhtbh.exec:\thhtbh.exe83⤵PID:1432
-
\??\c:\02884.exec:\02884.exe84⤵PID:2736
-
\??\c:\ddpvd.exec:\ddpvd.exe85⤵PID:2840
-
\??\c:\fxrllxf.exec:\fxrllxf.exe86⤵PID:2752
-
\??\c:\xlrrxfl.exec:\xlrrxfl.exe87⤵PID:2544
-
\??\c:\tnbbnh.exec:\tnbbnh.exe88⤵PID:2992
-
\??\c:\060620.exec:\060620.exe89⤵PID:1644
-
\??\c:\4408806.exec:\4408806.exe90⤵PID:2588
-
\??\c:\840640.exec:\840640.exe91⤵PID:2700
-
\??\c:\440666.exec:\440666.exe92⤵PID:2936
-
\??\c:\868400.exec:\868400.exe93⤵PID:1504
-
\??\c:\pjvjp.exec:\pjvjp.exe94⤵PID:2664
-
\??\c:\60402.exec:\60402.exe95⤵PID:1512
-
\??\c:\208868.exec:\208868.exe96⤵PID:2972
-
\??\c:\048400.exec:\048400.exe97⤵PID:1452
-
\??\c:\dvpdj.exec:\dvpdj.exe98⤵PID:1192
-
\??\c:\rlxxrxr.exec:\rlxxrxr.exe99⤵PID:1304
-
\??\c:\80622.exec:\80622.exe100⤵PID:1760
-
\??\c:\lxllrxr.exec:\lxllrxr.exe101⤵PID:2520
-
\??\c:\004062.exec:\004062.exe102⤵PID:2072
-
\??\c:\446888.exec:\446888.exe103⤵PID:1908
-
\??\c:\8680668.exec:\8680668.exe104⤵PID:2064
-
\??\c:\8824284.exec:\8824284.exe105⤵PID:1108
-
\??\c:\w42400.exec:\w42400.exe106⤵PID:2120
-
\??\c:\llrxrxl.exec:\llrxrxl.exe107⤵PID:2868
-
\??\c:\0488064.exec:\0488064.exe108⤵PID:436
-
\??\c:\8846280.exec:\8846280.exe109⤵PID:580
-
\??\c:\5nthhn.exec:\5nthhn.exe110⤵PID:3040
-
\??\c:\842820.exec:\842820.exe111⤵PID:304
-
\??\c:\tthnbb.exec:\tthnbb.exe112⤵PID:928
-
\??\c:\60824.exec:\60824.exe113⤵PID:1716
-
\??\c:\268804.exec:\268804.exe114⤵PID:1740
-
\??\c:\o806208.exec:\o806208.exe115⤵PID:1688
-
\??\c:\228282.exec:\228282.exe116⤵PID:2224
-
\??\c:\3vpvj.exec:\3vpvj.exe117⤵PID:808
-
\??\c:\rfllllx.exec:\rfllllx.exe118⤵PID:1580
-
\??\c:\204062.exec:\204062.exe119⤵PID:2384
-
\??\c:\btbbbh.exec:\btbbbh.exe120⤵PID:1076
-
\??\c:\i028604.exec:\i028604.exe121⤵PID:3016
-
\??\c:\7vpvj.exec:\7vpvj.exe122⤵PID:2572
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-