Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 14:09 UTC
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d5afc026b48989055c3f50b560cfd590_NeikiAnalytics.exe
Resource
win7-20240419-en
5 signatures
150 seconds
General
-
Target
d5afc026b48989055c3f50b560cfd590_NeikiAnalytics.exe
-
Size
56KB
-
MD5
d5afc026b48989055c3f50b560cfd590
-
SHA1
5b2001b50e115b9041029c0af803c0473ceb608c
-
SHA256
ac7caee2cc7011864bcdda6102cbe3a8274eb671788e0de5c1a70542ddbe8673
-
SHA512
9bdef22fbad5cbd8a80a5cdb4c67790c6bcc564126f22d3f1b8862f087ae94ef14ca886622874f6f213094eb72722d485720bf725d8507a5f53f4b9fb7911740
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIb6tZ9bO:ymb3NkkiQ3mdBjFIb6tZNO
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
resource yara_rule behavioral2/memory/4604-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4604-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4300-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2720-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3476-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1388-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4748-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5092-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2832-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4912-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/884-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1568-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3960-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2056-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4352-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4572-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2400-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3232-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4520-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4536-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1196-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1952-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1580-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4560-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3080-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3100-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1508 dvjdj.exe 2720 7frlfxl.exe 4300 3hbhtn.exe 3476 hnhbtn.exe 1388 pjvjv.exe 4748 7xxfrrl.exe 2824 xlflxrl.exe 5092 1nhhtt.exe 2832 jvdpd.exe 4912 rflxlfr.exe 884 tbtthh.exe 2704 3hhhbn.exe 1568 jpppv.exe 3960 5xxlxrx.exe 2056 5hbthb.exe 4352 hbnbhb.exe 1956 9jdpd.exe 4572 lllxxlf.exe 2400 tbnhtt.exe 3232 nbthnh.exe 4520 dvdpj.exe 4536 lrrflfx.exe 1196 fllxrrf.exe 1952 bnbttn.exe 1580 1dvpv.exe 4276 3lfxfxf.exe 3800 rffxxrf.exe 4560 tnbthb.exe 3080 5dvjv.exe 4256 vpjvp.exe 3100 rfxlxrf.exe 1000 9lfxlfx.exe 2560 3jdvj.exe 4200 5jjjv.exe 1416 rllxxxx.exe 1820 xlfrllf.exe 1116 ttthth.exe 4456 jjvjv.exe 1448 3jpdv.exe 940 7frrfxf.exe 3956 frfxrfx.exe 3328 ntnhbt.exe 4620 5tnbnh.exe 1560 tnhtnb.exe 1612 jvpjv.exe 2848 vdpdp.exe 4624 1lfrfxl.exe 1036 bthbnn.exe 3520 tbbbtt.exe 1976 3jjdv.exe 2972 pddvv.exe 4368 1xxxrrl.exe 3276 xxrrllf.exe 1928 btttnn.exe 3492 9jpdp.exe 2056 rxfxlll.exe 4352 rrllfff.exe 4052 3bnhhb.exe 3068 nhhnbh.exe 452 pvvpj.exe 2400 vjpjd.exe 2320 lxrfffl.exe 752 lxflxfl.exe 928 1tnhhh.exe -
resource yara_rule behavioral2/memory/4604-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4604-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4300-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2720-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3476-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1388-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4748-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5092-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5092-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5092-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2832-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2832-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2832-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2832-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4912-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/884-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1568-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3960-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2056-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4352-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4572-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2400-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3232-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4520-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1196-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1952-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1580-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4560-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3080-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3100-206-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4604 wrote to memory of 1508 4604 d5afc026b48989055c3f50b560cfd590_NeikiAnalytics.exe 83 PID 4604 wrote to memory of 1508 4604 d5afc026b48989055c3f50b560cfd590_NeikiAnalytics.exe 83 PID 4604 wrote to memory of 1508 4604 d5afc026b48989055c3f50b560cfd590_NeikiAnalytics.exe 83 PID 1508 wrote to memory of 2720 1508 dvjdj.exe 84 PID 1508 wrote to memory of 2720 1508 dvjdj.exe 84 PID 1508 wrote to memory of 2720 1508 dvjdj.exe 84 PID 2720 wrote to memory of 4300 2720 7frlfxl.exe 85 PID 2720 wrote to memory of 4300 2720 7frlfxl.exe 85 PID 2720 wrote to memory of 4300 2720 7frlfxl.exe 85 PID 4300 wrote to memory of 3476 4300 3hbhtn.exe 86 PID 4300 wrote to memory of 3476 4300 3hbhtn.exe 86 PID 4300 wrote to memory of 3476 4300 3hbhtn.exe 86 PID 3476 wrote to memory of 1388 3476 hnhbtn.exe 87 PID 3476 wrote to memory of 1388 3476 hnhbtn.exe 87 PID 3476 wrote to memory of 1388 3476 hnhbtn.exe 87 PID 1388 wrote to memory of 4748 1388 pjvjv.exe 88 PID 1388 wrote to memory of 4748 1388 pjvjv.exe 88 PID 1388 wrote to memory of 4748 1388 pjvjv.exe 88 PID 4748 wrote to memory of 2824 4748 7xxfrrl.exe 89 PID 4748 wrote to memory of 2824 4748 7xxfrrl.exe 89 PID 4748 wrote to memory of 2824 4748 7xxfrrl.exe 89 PID 2824 wrote to memory of 5092 2824 xlflxrl.exe 90 PID 2824 wrote to memory of 5092 2824 xlflxrl.exe 90 PID 2824 wrote to memory of 5092 2824 xlflxrl.exe 90 PID 5092 wrote to memory of 2832 5092 1nhhtt.exe 91 PID 5092 wrote to memory of 2832 5092 1nhhtt.exe 91 PID 5092 wrote to memory of 2832 5092 1nhhtt.exe 91 PID 2832 wrote to memory of 4912 2832 jvdpd.exe 92 PID 2832 wrote to memory of 4912 2832 jvdpd.exe 92 PID 2832 wrote to memory of 4912 2832 jvdpd.exe 92 PID 4912 wrote to memory of 884 4912 rflxlfr.exe 93 PID 4912 wrote to memory of 884 4912 rflxlfr.exe 93 PID 4912 wrote to memory of 884 4912 rflxlfr.exe 93 PID 884 wrote to memory of 2704 884 tbtthh.exe 94 PID 884 wrote to memory of 2704 884 tbtthh.exe 94 PID 884 wrote to memory of 2704 884 tbtthh.exe 94 PID 2704 wrote to memory of 1568 2704 3hhhbn.exe 95 PID 2704 wrote to memory of 1568 2704 3hhhbn.exe 95 PID 2704 wrote to memory of 1568 2704 3hhhbn.exe 95 PID 1568 wrote to memory of 3960 1568 jpppv.exe 96 PID 1568 wrote to memory of 3960 1568 jpppv.exe 96 PID 1568 wrote to memory of 3960 1568 jpppv.exe 96 PID 3960 wrote to memory of 2056 3960 5xxlxrx.exe 97 PID 3960 wrote to memory of 2056 3960 5xxlxrx.exe 97 PID 3960 wrote to memory of 2056 3960 5xxlxrx.exe 97 PID 2056 wrote to memory of 4352 2056 5hbthb.exe 98 PID 2056 wrote to memory of 4352 2056 5hbthb.exe 98 PID 2056 wrote to memory of 4352 2056 5hbthb.exe 98 PID 4352 wrote to memory of 1956 4352 hbnbhb.exe 99 PID 4352 wrote to memory of 1956 4352 hbnbhb.exe 99 PID 4352 wrote to memory of 1956 4352 hbnbhb.exe 99 PID 1956 wrote to memory of 4572 1956 9jdpd.exe 100 PID 1956 wrote to memory of 4572 1956 9jdpd.exe 100 PID 1956 wrote to memory of 4572 1956 9jdpd.exe 100 PID 4572 wrote to memory of 2400 4572 lllxxlf.exe 101 PID 4572 wrote to memory of 2400 4572 lllxxlf.exe 101 PID 4572 wrote to memory of 2400 4572 lllxxlf.exe 101 PID 2400 wrote to memory of 3232 2400 tbnhtt.exe 102 PID 2400 wrote to memory of 3232 2400 tbnhtt.exe 102 PID 2400 wrote to memory of 3232 2400 tbnhtt.exe 102 PID 3232 wrote to memory of 4520 3232 nbthnh.exe 103 PID 3232 wrote to memory of 4520 3232 nbthnh.exe 103 PID 3232 wrote to memory of 4520 3232 nbthnh.exe 103 PID 4520 wrote to memory of 4536 4520 dvdpj.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5afc026b48989055c3f50b560cfd590_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\d5afc026b48989055c3f50b560cfd590_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
\??\c:\dvjdj.exec:\dvjdj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
\??\c:\7frlfxl.exec:\7frlfxl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\3hbhtn.exec:\3hbhtn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
\??\c:\hnhbtn.exec:\hnhbtn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
\??\c:\pjvjv.exec:\pjvjv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\7xxfrrl.exec:\7xxfrrl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
\??\c:\xlflxrl.exec:\xlflxrl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\1nhhtt.exec:\1nhhtt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
\??\c:\jvdpd.exec:\jvdpd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
\??\c:\rflxlfr.exec:\rflxlfr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
\??\c:\tbtthh.exec:\tbtthh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:884 -
\??\c:\3hhhbn.exec:\3hhhbn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\jpppv.exec:\jpppv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1568 -
\??\c:\5xxlxrx.exec:\5xxlxrx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
\??\c:\5hbthb.exec:\5hbthb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
\??\c:\hbnbhb.exec:\hbnbhb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
\??\c:\9jdpd.exec:\9jdpd.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
\??\c:\lllxxlf.exec:\lllxxlf.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
\??\c:\tbnhtt.exec:\tbnhtt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
\??\c:\nbthnh.exec:\nbthnh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3232 -
\??\c:\dvdpj.exec:\dvdpj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4520 -
\??\c:\lrrflfx.exec:\lrrflfx.exe23⤵
- Executes dropped EXE
PID:4536 -
\??\c:\fllxrrf.exec:\fllxrrf.exe24⤵
- Executes dropped EXE
PID:1196 -
\??\c:\bnbttn.exec:\bnbttn.exe25⤵
- Executes dropped EXE
PID:1952 -
\??\c:\1dvpv.exec:\1dvpv.exe26⤵
- Executes dropped EXE
PID:1580 -
\??\c:\3lfxfxf.exec:\3lfxfxf.exe27⤵
- Executes dropped EXE
PID:4276 -
\??\c:\rffxxrf.exec:\rffxxrf.exe28⤵
- Executes dropped EXE
PID:3800 -
\??\c:\tnbthb.exec:\tnbthb.exe29⤵
- Executes dropped EXE
PID:4560 -
\??\c:\5dvjv.exec:\5dvjv.exe30⤵
- Executes dropped EXE
PID:3080 -
\??\c:\vpjvp.exec:\vpjvp.exe31⤵
- Executes dropped EXE
PID:4256 -
\??\c:\rfxlxrf.exec:\rfxlxrf.exe32⤵
- Executes dropped EXE
PID:3100 -
\??\c:\9lfxlfx.exec:\9lfxlfx.exe33⤵
- Executes dropped EXE
PID:1000 -
\??\c:\3jdvj.exec:\3jdvj.exe34⤵
- Executes dropped EXE
PID:2560 -
\??\c:\5jjjv.exec:\5jjjv.exe35⤵
- Executes dropped EXE
PID:4200 -
\??\c:\rllxxxx.exec:\rllxxxx.exe36⤵
- Executes dropped EXE
PID:1416 -
\??\c:\xlfrllf.exec:\xlfrllf.exe37⤵
- Executes dropped EXE
PID:1820 -
\??\c:\ttthth.exec:\ttthth.exe38⤵
- Executes dropped EXE
PID:1116 -
\??\c:\jjvjv.exec:\jjvjv.exe39⤵
- Executes dropped EXE
PID:4456 -
\??\c:\3jpdv.exec:\3jpdv.exe40⤵
- Executes dropped EXE
PID:1448 -
\??\c:\7frrfxf.exec:\7frrfxf.exe41⤵
- Executes dropped EXE
PID:940 -
\??\c:\frfxrfx.exec:\frfxrfx.exe42⤵
- Executes dropped EXE
PID:3956 -
\??\c:\ntnhbt.exec:\ntnhbt.exe43⤵
- Executes dropped EXE
PID:3328 -
\??\c:\5tnbnh.exec:\5tnbnh.exe44⤵
- Executes dropped EXE
PID:4620 -
\??\c:\tnhtnb.exec:\tnhtnb.exe45⤵
- Executes dropped EXE
PID:1560 -
\??\c:\jvpjv.exec:\jvpjv.exe46⤵
- Executes dropped EXE
PID:1612 -
\??\c:\vdpdp.exec:\vdpdp.exe47⤵
- Executes dropped EXE
PID:2848 -
\??\c:\1lfrfxl.exec:\1lfrfxl.exe48⤵
- Executes dropped EXE
PID:4624 -
\??\c:\bthbnn.exec:\bthbnn.exe49⤵
- Executes dropped EXE
PID:1036 -
\??\c:\tbbbtt.exec:\tbbbtt.exe50⤵
- Executes dropped EXE
PID:3520 -
\??\c:\3jjdv.exec:\3jjdv.exe51⤵
- Executes dropped EXE
PID:1976 -
\??\c:\pddvv.exec:\pddvv.exe52⤵
- Executes dropped EXE
PID:2972 -
\??\c:\1xxxrrl.exec:\1xxxrrl.exe53⤵
- Executes dropped EXE
PID:4368 -
\??\c:\xxrrllf.exec:\xxrrllf.exe54⤵
- Executes dropped EXE
PID:3276 -
\??\c:\btttnn.exec:\btttnn.exe55⤵
- Executes dropped EXE
PID:1928 -
\??\c:\9jpdp.exec:\9jpdp.exe56⤵
- Executes dropped EXE
PID:3492 -
\??\c:\rxfxlll.exec:\rxfxlll.exe57⤵
- Executes dropped EXE
PID:2056 -
\??\c:\rrllfff.exec:\rrllfff.exe58⤵
- Executes dropped EXE
PID:4352 -
\??\c:\3bnhhb.exec:\3bnhhb.exe59⤵
- Executes dropped EXE
PID:4052 -
\??\c:\nhhnbh.exec:\nhhnbh.exe60⤵
- Executes dropped EXE
PID:3068 -
\??\c:\pvvpj.exec:\pvvpj.exe61⤵
- Executes dropped EXE
PID:452 -
\??\c:\vjpjd.exec:\vjpjd.exe62⤵
- Executes dropped EXE
PID:2400 -
\??\c:\lxrfffl.exec:\lxrfffl.exe63⤵
- Executes dropped EXE
PID:2320 -
\??\c:\lxflxfl.exec:\lxflxfl.exe64⤵
- Executes dropped EXE
PID:752 -
\??\c:\1tnhhh.exec:\1tnhhh.exe65⤵
- Executes dropped EXE
PID:928 -
\??\c:\djdvp.exec:\djdvp.exe66⤵PID:1248
-
\??\c:\djppp.exec:\djppp.exe67⤵PID:3040
-
\??\c:\9xfxrrr.exec:\9xfxrrr.exe68⤵PID:1952
-
\??\c:\rfffxff.exec:\rfffxff.exe69⤵PID:1696
-
\??\c:\5hnnhh.exec:\5hnnhh.exe70⤵PID:4784
-
\??\c:\nbbthh.exec:\nbbthh.exe71⤵PID:4440
-
\??\c:\vdjdv.exec:\vdjdv.exe72⤵PID:3564
-
\??\c:\pdddv.exec:\pdddv.exe73⤵PID:1168
-
\??\c:\fxffffx.exec:\fxffffx.exe74⤵PID:3008
-
\??\c:\lfffxll.exec:\lfffxll.exe75⤵PID:4680
-
\??\c:\1nnnhh.exec:\1nnnhh.exe76⤵PID:3076
-
\??\c:\bbnnnb.exec:\bbnnnb.exe77⤵PID:3100
-
\??\c:\jjppd.exec:\jjppd.exe78⤵PID:748
-
\??\c:\pddjp.exec:\pddjp.exe79⤵PID:4056
-
\??\c:\5xxlllf.exec:\5xxlllf.exe80⤵PID:2064
-
\??\c:\ffllrrx.exec:\ffllrrx.exe81⤵PID:3808
-
\??\c:\5bbtnn.exec:\5bbtnn.exe82⤵PID:4312
-
\??\c:\jvvpj.exec:\jvvpj.exe83⤵PID:4076
-
\??\c:\7ddvv.exec:\7ddvv.exe84⤵PID:2024
-
\??\c:\ffrxrxx.exec:\ffrxrxx.exe85⤵PID:2004
-
\??\c:\lfrlfff.exec:\lfrlfff.exe86⤵PID:4596
-
\??\c:\xrxrllf.exec:\xrxrllf.exe87⤵PID:4424
-
\??\c:\1bhbbn.exec:\1bhbbn.exe88⤵PID:2072
-
\??\c:\dvjvp.exec:\dvjvp.exe89⤵PID:3272
-
\??\c:\jjjdv.exec:\jjjdv.exe90⤵PID:5076
-
\??\c:\vdppv.exec:\vdppv.exe91⤵PID:4748
-
\??\c:\lxrrllf.exec:\lxrrllf.exe92⤵PID:3608
-
\??\c:\hhhnbt.exec:\hhhnbt.exe93⤵PID:2120
-
\??\c:\1xfxxfl.exec:\1xfxxfl.exe94⤵PID:4992
-
\??\c:\llllfff.exec:\llllfff.exe95⤵PID:4092
-
\??\c:\bhhhbb.exec:\bhhhbb.exe96⤵PID:3664
-
\??\c:\bbhbbb.exec:\bbhbbb.exe97⤵PID:512
-
\??\c:\3pppd.exec:\3pppd.exe98⤵PID:1292
-
\??\c:\pvdvp.exec:\pvdvp.exe99⤵PID:2640
-
\??\c:\rllfrrl.exec:\rllfrrl.exe100⤵PID:2344
-
\??\c:\lrxrrrl.exec:\lrxrrrl.exe101⤵PID:2152
-
\??\c:\1bbbtb.exec:\1bbbtb.exe102⤵PID:3304
-
\??\c:\hnhhbb.exec:\hnhhbb.exe103⤵PID:4332
-
\??\c:\dpjdp.exec:\dpjdp.exe104⤵PID:3204
-
\??\c:\dvjvj.exec:\dvjvj.exe105⤵PID:388
-
\??\c:\xrfrrll.exec:\xrfrrll.exe106⤵PID:4864
-
\??\c:\nntbtt.exec:\nntbtt.exe107⤵PID:2224
-
\??\c:\3bbtnt.exec:\3bbtnt.exe108⤵PID:364
-
\??\c:\bbtbtt.exec:\bbtbtt.exe109⤵PID:1044
-
\??\c:\3jppd.exec:\3jppd.exe110⤵PID:2736
-
\??\c:\vpjjj.exec:\vpjjj.exe111⤵PID:2384
-
\??\c:\fllllrl.exec:\fllllrl.exe112⤵PID:2636
-
\??\c:\rxxrffx.exec:\rxxrffx.exe113⤵PID:632
-
\??\c:\bnnhbn.exec:\bnnhbn.exe114⤵PID:1952
-
\??\c:\bnhbtn.exec:\bnhbtn.exe115⤵PID:5016
-
\??\c:\jdjjd.exec:\jdjjd.exe116⤵PID:4540
-
\??\c:\pvjdv.exec:\pvjdv.exe117⤵PID:3508
-
\??\c:\frxxrrl.exec:\frxxrrl.exe118⤵PID:4560
-
\??\c:\tnhbtt.exec:\tnhbtt.exe119⤵PID:4140
-
\??\c:\7btnbb.exec:\7btnbb.exe120⤵PID:3008
-
\??\c:\1xfrlfx.exec:\1xfrlfx.exe121⤵PID:4680
-
\??\c:\flxflxf.exec:\flxflxf.exe122⤵PID:4852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-