Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 08:51 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b310a3112037b2c29616794ef38c7cb0_NeikiAnalytics.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
b310a3112037b2c29616794ef38c7cb0_NeikiAnalytics.exe
-
Size
94KB
-
MD5
b310a3112037b2c29616794ef38c7cb0
-
SHA1
1402c309b452483d85bd45de33059b9c5ffcb6ea
-
SHA256
d29cd5748d7a37dd1a328b05d047f232fbaf4456c3bb0685f0c0f76eb37759cd
-
SHA512
8ce2243dd1d9af736c04e46b5bddd967df979463f6f7d3090b413a4f1eb8d23b56d08377a738d8038258610803e3a75319880c7fb578ec24eb13d47ff1a29e7e
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDInWeNCYGyA2R7JxJAg8dtB:ymb3NkkiQ3mdBjFIWeFGyAsJAg2B
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
resource yara_rule behavioral1/memory/1796-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2144-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2352-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2660-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2712-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2712-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2472-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2544-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2896-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2408-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2320-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/268-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2220-276-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1136-249-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1856-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2096-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3044-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2472-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2352 9lflxxr.exe 2144 nnbbhn.exe 2660 jpjdp.exe 2572 vvjjj.exe 2712 lfxfxrr.exe 2580 hbhnhn.exe 2472 dvjvd.exe 2148 jdpvp.exe 2508 ffxfllr.exe 2544 frflllr.exe 2896 nhntbt.exe 2408 nhntnb.exe 352 1dpdp.exe 2320 ddpvd.exe 2952 lfrlrrx.exe 1204 llxflrf.exe 1496 tnhtht.exe 3044 hhbnbh.exe 2096 ppjpv.exe 2828 jdppv.exe 268 7fflxxl.exe 1476 xxrfrrx.exe 1472 9nhhtt.exe 1856 hbhnhn.exe 1136 5jvdj.exe 2868 3jdvd.exe 2988 llflrrr.exe 2220 lfrxflx.exe 2848 5ntbnt.exe 1500 nttnth.exe 1732 1vvdp.exe 2748 5ppvj.exe 1724 xrllrlx.exe 3068 9ffrflx.exe 2636 llrfxrx.exe 2656 nhbhnt.exe 2760 hbhntb.exe 2776 pvpdj.exe 2556 3lflxfl.exe 2504 5xflxxl.exe 2468 9nhnbh.exe 2216 1jdpp.exe 2752 pjjpv.exe 2676 vpvjv.exe 2176 xxrlxlx.exe 2920 lxrfrlx.exe 1608 htnthh.exe 2172 bthhnn.exe 1784 jdvpd.exe 2764 dvjpp.exe 2924 3lrlxfx.exe 852 5xxllrf.exe 2280 1hhnbh.exe 1152 bhnnbb.exe 1660 vpdjv.exe 2768 vvpvj.exe 2828 9lxfllf.exe 1160 rflllrf.exe 568 nhbbbh.exe 1488 3bbhnn.exe 656 hbntbt.exe 2788 dvpdp.exe 1028 dpvvj.exe 920 lfflrxl.exe -
resource yara_rule behavioral1/memory/1796-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2144-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2352-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2712-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2472-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2896-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2408-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2320-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/268-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2220-276-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1136-249-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1856-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2096-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3044-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2472-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2472-78-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1796 wrote to memory of 2352 1796 b310a3112037b2c29616794ef38c7cb0_NeikiAnalytics.exe 28 PID 1796 wrote to memory of 2352 1796 b310a3112037b2c29616794ef38c7cb0_NeikiAnalytics.exe 28 PID 1796 wrote to memory of 2352 1796 b310a3112037b2c29616794ef38c7cb0_NeikiAnalytics.exe 28 PID 1796 wrote to memory of 2352 1796 b310a3112037b2c29616794ef38c7cb0_NeikiAnalytics.exe 28 PID 2352 wrote to memory of 2144 2352 9lflxxr.exe 29 PID 2352 wrote to memory of 2144 2352 9lflxxr.exe 29 PID 2352 wrote to memory of 2144 2352 9lflxxr.exe 29 PID 2352 wrote to memory of 2144 2352 9lflxxr.exe 29 PID 2144 wrote to memory of 2660 2144 nnbbhn.exe 30 PID 2144 wrote to memory of 2660 2144 nnbbhn.exe 30 PID 2144 wrote to memory of 2660 2144 nnbbhn.exe 30 PID 2144 wrote to memory of 2660 2144 nnbbhn.exe 30 PID 2660 wrote to memory of 2572 2660 jpjdp.exe 31 PID 2660 wrote to memory of 2572 2660 jpjdp.exe 31 PID 2660 wrote to memory of 2572 2660 jpjdp.exe 31 PID 2660 wrote to memory of 2572 2660 jpjdp.exe 31 PID 2572 wrote to memory of 2712 2572 vvjjj.exe 32 PID 2572 wrote to memory of 2712 2572 vvjjj.exe 32 PID 2572 wrote to memory of 2712 2572 vvjjj.exe 32 PID 2572 wrote to memory of 2712 2572 vvjjj.exe 32 PID 2712 wrote to memory of 2580 2712 lfxfxrr.exe 33 PID 2712 wrote to memory of 2580 2712 lfxfxrr.exe 33 PID 2712 wrote to memory of 2580 2712 lfxfxrr.exe 33 PID 2712 wrote to memory of 2580 2712 lfxfxrr.exe 33 PID 2580 wrote to memory of 2472 2580 hbhnhn.exe 34 PID 2580 wrote to memory of 2472 2580 hbhnhn.exe 34 PID 2580 wrote to memory of 2472 2580 hbhnhn.exe 34 PID 2580 wrote to memory of 2472 2580 hbhnhn.exe 34 PID 2472 wrote to memory of 2148 2472 dvjvd.exe 35 PID 2472 wrote to memory of 2148 2472 dvjvd.exe 35 PID 2472 wrote to memory of 2148 2472 dvjvd.exe 35 PID 2472 wrote to memory of 2148 2472 dvjvd.exe 35 PID 2148 wrote to memory of 2508 2148 jdpvp.exe 36 PID 2148 wrote to memory of 2508 2148 jdpvp.exe 36 PID 2148 wrote to memory of 2508 2148 jdpvp.exe 36 PID 2148 wrote to memory of 2508 2148 jdpvp.exe 36 PID 2508 wrote to memory of 2544 2508 ffxfllr.exe 37 PID 2508 wrote to memory of 2544 2508 ffxfllr.exe 37 PID 2508 wrote to memory of 2544 2508 ffxfllr.exe 37 PID 2508 wrote to memory of 2544 2508 ffxfllr.exe 37 PID 2544 wrote to memory of 2896 2544 frflllr.exe 38 PID 2544 wrote to memory of 2896 2544 frflllr.exe 38 PID 2544 wrote to memory of 2896 2544 frflllr.exe 38 PID 2544 wrote to memory of 2896 2544 frflllr.exe 38 PID 2896 wrote to memory of 2408 2896 nhntbt.exe 39 PID 2896 wrote to memory of 2408 2896 nhntbt.exe 39 PID 2896 wrote to memory of 2408 2896 nhntbt.exe 39 PID 2896 wrote to memory of 2408 2896 nhntbt.exe 39 PID 2408 wrote to memory of 352 2408 nhntnb.exe 40 PID 2408 wrote to memory of 352 2408 nhntnb.exe 40 PID 2408 wrote to memory of 352 2408 nhntnb.exe 40 PID 2408 wrote to memory of 352 2408 nhntnb.exe 40 PID 352 wrote to memory of 2320 352 1dpdp.exe 41 PID 352 wrote to memory of 2320 352 1dpdp.exe 41 PID 352 wrote to memory of 2320 352 1dpdp.exe 41 PID 352 wrote to memory of 2320 352 1dpdp.exe 41 PID 2320 wrote to memory of 2952 2320 ddpvd.exe 42 PID 2320 wrote to memory of 2952 2320 ddpvd.exe 42 PID 2320 wrote to memory of 2952 2320 ddpvd.exe 42 PID 2320 wrote to memory of 2952 2320 ddpvd.exe 42 PID 2952 wrote to memory of 1204 2952 lfrlrrx.exe 43 PID 2952 wrote to memory of 1204 2952 lfrlrrx.exe 43 PID 2952 wrote to memory of 1204 2952 lfrlrrx.exe 43 PID 2952 wrote to memory of 1204 2952 lfrlrrx.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\b310a3112037b2c29616794ef38c7cb0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b310a3112037b2c29616794ef38c7cb0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
\??\c:\9lflxxr.exec:\9lflxxr.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\nnbbhn.exec:\nnbbhn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\jpjdp.exec:\jpjdp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\vvjjj.exec:\vvjjj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\lfxfxrr.exec:\lfxfxrr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\hbhnhn.exec:\hbhnhn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\dvjvd.exec:\dvjvd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
\??\c:\jdpvp.exec:\jdpvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\ffxfllr.exec:\ffxfllr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\frflllr.exec:\frflllr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\nhntbt.exec:\nhntbt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\nhntnb.exec:\nhntnb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\1dpdp.exec:\1dpdp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:352 -
\??\c:\ddpvd.exec:\ddpvd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\lfrlrrx.exec:\lfrlrrx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2952 -
\??\c:\llxflrf.exec:\llxflrf.exe17⤵
- Executes dropped EXE
PID:1204 -
\??\c:\tnhtht.exec:\tnhtht.exe18⤵
- Executes dropped EXE
PID:1496 -
\??\c:\hhbnbh.exec:\hhbnbh.exe19⤵
- Executes dropped EXE
PID:3044 -
\??\c:\ppjpv.exec:\ppjpv.exe20⤵
- Executes dropped EXE
PID:2096 -
\??\c:\jdppv.exec:\jdppv.exe21⤵
- Executes dropped EXE
PID:2828 -
\??\c:\7fflxxl.exec:\7fflxxl.exe22⤵
- Executes dropped EXE
PID:268 -
\??\c:\xxrfrrx.exec:\xxrfrrx.exe23⤵
- Executes dropped EXE
PID:1476 -
\??\c:\9nhhtt.exec:\9nhhtt.exe24⤵
- Executes dropped EXE
PID:1472 -
\??\c:\hbhnhn.exec:\hbhnhn.exe25⤵
- Executes dropped EXE
PID:1856 -
\??\c:\5jvdj.exec:\5jvdj.exe26⤵
- Executes dropped EXE
PID:1136 -
\??\c:\3jdvd.exec:\3jdvd.exe27⤵
- Executes dropped EXE
PID:2868 -
\??\c:\llflrrr.exec:\llflrrr.exe28⤵
- Executes dropped EXE
PID:2988 -
\??\c:\lfrxflx.exec:\lfrxflx.exe29⤵
- Executes dropped EXE
PID:2220 -
\??\c:\5ntbnt.exec:\5ntbnt.exe30⤵
- Executes dropped EXE
PID:2848 -
\??\c:\nttnth.exec:\nttnth.exe31⤵
- Executes dropped EXE
PID:1500 -
\??\c:\1vvdp.exec:\1vvdp.exe32⤵
- Executes dropped EXE
PID:1732 -
\??\c:\5ppvj.exec:\5ppvj.exe33⤵
- Executes dropped EXE
PID:2748 -
\??\c:\xrllrlx.exec:\xrllrlx.exe34⤵
- Executes dropped EXE
PID:1724 -
\??\c:\9ffrflx.exec:\9ffrflx.exe35⤵
- Executes dropped EXE
PID:3068 -
\??\c:\llrfxrx.exec:\llrfxrx.exe36⤵
- Executes dropped EXE
PID:2636 -
\??\c:\nhbhnt.exec:\nhbhnt.exe37⤵
- Executes dropped EXE
PID:2656 -
\??\c:\hbhntb.exec:\hbhntb.exe38⤵
- Executes dropped EXE
PID:2760 -
\??\c:\pvpdj.exec:\pvpdj.exe39⤵
- Executes dropped EXE
PID:2776 -
\??\c:\3lflxfl.exec:\3lflxfl.exe40⤵
- Executes dropped EXE
PID:2556 -
\??\c:\5xflxxl.exec:\5xflxxl.exe41⤵
- Executes dropped EXE
PID:2504 -
\??\c:\9nhnbh.exec:\9nhnbh.exe42⤵
- Executes dropped EXE
PID:2468 -
\??\c:\1jdpp.exec:\1jdpp.exe43⤵
- Executes dropped EXE
PID:2216 -
\??\c:\pjjpv.exec:\pjjpv.exe44⤵
- Executes dropped EXE
PID:2752 -
\??\c:\vpvjv.exec:\vpvjv.exe45⤵
- Executes dropped EXE
PID:2676 -
\??\c:\xxrlxlx.exec:\xxrlxlx.exe46⤵
- Executes dropped EXE
PID:2176 -
\??\c:\lxrfrlx.exec:\lxrfrlx.exe47⤵
- Executes dropped EXE
PID:2920 -
\??\c:\htnthh.exec:\htnthh.exe48⤵
- Executes dropped EXE
PID:1608 -
\??\c:\bthhnn.exec:\bthhnn.exe49⤵
- Executes dropped EXE
PID:2172 -
\??\c:\jdvpd.exec:\jdvpd.exe50⤵
- Executes dropped EXE
PID:1784 -
\??\c:\dvjpp.exec:\dvjpp.exe51⤵
- Executes dropped EXE
PID:2764 -
\??\c:\3lrlxfx.exec:\3lrlxfx.exe52⤵
- Executes dropped EXE
PID:2924 -
\??\c:\5xxllrf.exec:\5xxllrf.exe53⤵
- Executes dropped EXE
PID:852 -
\??\c:\1hhnbh.exec:\1hhnbh.exe54⤵
- Executes dropped EXE
PID:2280 -
\??\c:\bhnnbb.exec:\bhnnbb.exe55⤵
- Executes dropped EXE
PID:1152 -
\??\c:\vpdjv.exec:\vpdjv.exe56⤵
- Executes dropped EXE
PID:1660 -
\??\c:\vvpvj.exec:\vvpvj.exe57⤵
- Executes dropped EXE
PID:2768 -
\??\c:\9lxfllf.exec:\9lxfllf.exe58⤵
- Executes dropped EXE
PID:2828 -
\??\c:\rflllrf.exec:\rflllrf.exe59⤵
- Executes dropped EXE
PID:1160 -
\??\c:\nhbbbh.exec:\nhbbbh.exe60⤵
- Executes dropped EXE
PID:568 -
\??\c:\3bbhnn.exec:\3bbhnn.exe61⤵
- Executes dropped EXE
PID:1488 -
\??\c:\hbntbt.exec:\hbntbt.exe62⤵
- Executes dropped EXE
PID:656 -
\??\c:\dvpdp.exec:\dvpdp.exe63⤵
- Executes dropped EXE
PID:2788 -
\??\c:\dpvvj.exec:\dpvvj.exe64⤵
- Executes dropped EXE
PID:1028 -
\??\c:\lfflrxl.exec:\lfflrxl.exe65⤵
- Executes dropped EXE
PID:920 -
\??\c:\xrfrxxf.exec:\xrfrxxf.exe66⤵PID:1360
-
\??\c:\bthhnn.exec:\bthhnn.exe67⤵PID:468
-
\??\c:\hthbbn.exec:\hthbbn.exe68⤵PID:2220
-
\??\c:\dvjvv.exec:\dvjvv.exe69⤵PID:2088
-
\??\c:\ddpjd.exec:\ddpjd.exe70⤵PID:576
-
\??\c:\xxlrxxf.exec:\xxlrxxf.exe71⤵PID:1936
-
\??\c:\xxlrxrl.exec:\xxlrxrl.exe72⤵PID:1732
-
\??\c:\btbbhn.exec:\btbbhn.exe73⤵PID:1728
-
\??\c:\btbnhh.exec:\btbnhh.exe74⤵PID:2588
-
\??\c:\vjppj.exec:\vjppj.exe75⤵PID:3032
-
\??\c:\7pddj.exec:\7pddj.exe76⤵PID:2824
-
\??\c:\frflrxf.exec:\frflrxf.exe77⤵PID:2448
-
\??\c:\9rrfrrf.exec:\9rrfrrf.exe78⤵PID:3012
-
\??\c:\tnthht.exec:\tnthht.exe79⤵PID:1276
-
\??\c:\rfrxrrf.exec:\rfrxrrf.exe80⤵PID:2196
-
\??\c:\rlllflx.exec:\rlllflx.exe81⤵PID:2240
-
\??\c:\hbhhtt.exec:\hbhhtt.exe82⤵PID:2564
-
\??\c:\btthnt.exec:\btthnt.exe83⤵PID:1200
-
\??\c:\tnttbb.exec:\tnttbb.exe84⤵PID:2720
-
\??\c:\ddjjv.exec:\ddjjv.exe85⤵PID:2492
-
\??\c:\pdddd.exec:\pdddd.exe86⤵PID:2784
-
\??\c:\lxfflxl.exec:\lxfflxl.exe87⤵PID:1580
-
\??\c:\lxrrrlf.exec:\lxrrrlf.exe88⤵PID:1656
-
\??\c:\btnnnn.exec:\btnnnn.exe89⤵PID:2756
-
\??\c:\dddvp.exec:\dddvp.exe90⤵PID:2036
-
\??\c:\xrflrrx.exec:\xrflrrx.exe91⤵PID:1684
-
\??\c:\tnbbhn.exec:\tnbbhn.exe92⤵PID:2500
-
\??\c:\9jjdv.exec:\9jjdv.exe93⤵PID:1524
-
\??\c:\ppvjp.exec:\ppvjp.exe94⤵PID:2480
-
\??\c:\xxrxffl.exec:\xxrxffl.exe95⤵PID:1496
-
\??\c:\nnhnnn.exec:\nnhnnn.exe96⤵PID:2008
-
\??\c:\9jjvd.exec:\9jjvd.exe97⤵PID:2316
-
\??\c:\xrllrxf.exec:\xrllrxf.exe98⤵PID:2844
-
\??\c:\7xxflrf.exec:\7xxflrf.exe99⤵PID:1924
-
\??\c:\nnhnhn.exec:\nnhnhn.exe100⤵PID:2872
-
\??\c:\tnntbn.exec:\tnntbn.exe101⤵PID:1648
-
\??\c:\jdvdj.exec:\jdvdj.exe102⤵PID:1816
-
\??\c:\3jddj.exec:\3jddj.exe103⤵PID:1488
-
\??\c:\xlxfrrx.exec:\xlxfrrx.exe104⤵PID:1856
-
\??\c:\xxxlrfl.exec:\xxxlrfl.exe105⤵PID:1136
-
\??\c:\nhnbhn.exec:\nhnbhn.exe106⤵PID:704
-
\??\c:\bthnnb.exec:\bthnnb.exe107⤵PID:2852
-
\??\c:\pjvdj.exec:\pjvdj.exe108⤵PID:1560
-
\??\c:\ppddj.exec:\ppddj.exe109⤵PID:2308
-
\??\c:\jdvpd.exec:\jdvpd.exe110⤵PID:2856
-
\??\c:\ffrflxf.exec:\ffrflxf.exe111⤵PID:1500
-
\??\c:\9lrrlrr.exec:\9lrrlrr.exe112⤵PID:1652
-
\??\c:\tnbnbb.exec:\tnbnbb.exe113⤵PID:2372
-
\??\c:\9ttbnt.exec:\9ttbnt.exe114⤵PID:2628
-
\??\c:\jjvjv.exec:\jjvjv.exe115⤵PID:2664
-
\??\c:\vdjdj.exec:\vdjdj.exe116⤵PID:2584
-
\??\c:\9lrrrxf.exec:\9lrrrxf.exe117⤵PID:2576
-
\??\c:\rlfrrxl.exec:\rlfrrxl.exe118⤵PID:1280
-
\??\c:\tnbthh.exec:\tnbthh.exe119⤵PID:2656
-
\??\c:\1bbhnn.exec:\1bbhnn.exe120⤵PID:1276
-
\??\c:\5ppvv.exec:\5ppvv.exe121⤵PID:2712
-
\??\c:\jdppv.exec:\jdppv.exe122⤵PID:2792
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-