Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 22:30
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4c7b9aec4547d7e858ebde38c1491130_NeikiAnalytics.exe
Resource
win7-20240419-en
windows7-x64
5 signatures
150 seconds
General
-
Target
4c7b9aec4547d7e858ebde38c1491130_NeikiAnalytics.exe
-
Size
64KB
-
MD5
4c7b9aec4547d7e858ebde38c1491130
-
SHA1
9cd01457ffd108ed7a1ba5c5f1319b8a595a04f8
-
SHA256
7af6da8924a2e27bbef8ee624acbbe5d44eae03af5c390e7ff76c07b2ef7915a
-
SHA512
6f8b1a078e4de0a0e9b49db27754e7e29ba2368069b1805ee05b303a27a4da7ede6e168499fc8bfbb58d6e3cdef441d23d7a9f1f20309d3bd74730b851ab06ad
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFdJULh12u:ymb3NkkiQ3mdBjFIFdJmp
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2084-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2344-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2640-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2668-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2504-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2484-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2928-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2372-97-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2372-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1684-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1268-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1924-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2144-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1264-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2948-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1032-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1856-258-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1852-294-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
dvpjd.exepvppd.exerfllxrr.exefffrlxx.exetbbthn.exe5ddvj.exerffffff.exebththh.exehbhbtb.exevpjpj.exepjvpv.exeffxflrf.exetbbtbn.exevpjpv.exe7lxxllx.exe7xfrlxr.exennbtnn.exejdjdv.exelrxlffl.exexffxxrx.exebnttbb.exedpjvp.exejdppj.exe9rlxlrf.exennttnt.exenthbtn.exeffflxfr.exefrxlrll.exebttbth.exejjdpd.exepddjv.exelrrxfxr.exehhnthh.exentbnth.exepjvdp.exedvppd.exerlxfrfl.exebtbnhh.exe3hbbth.exepjjdd.exepdppp.exe5rrlrfx.exehnhbbn.exettnthh.exe9vpvj.exedddvj.exeflrffxx.exetbbnht.exehbtbhh.exevdjdj.exe9jjpp.exelrxrrlf.exefflrrxr.exebntnbt.exeppjjp.exe7jpdv.exexrllllx.exelxxrrfx.exetnbhbh.exehbnbtb.exe7ppdd.exerlflxfr.exelxlrfrx.exetnhnnt.exepid process 1676 dvpjd.exe 2344 pvppd.exe 2640 rfllxrr.exe 2668 fffrlxx.exe 2504 tbbthn.exe 2484 5ddvj.exe 2928 rffffff.exe 2372 bththh.exe 1604 hbhbtb.exe 2720 vpjpj.exe 1684 pjvpv.exe 1268 ffxflrf.exe 1924 tbbtbn.exe 2144 vpjpv.exe 268 7lxxllx.exe 2820 7xfrlxr.exe 1264 nnbtnn.exe 2948 jdjdv.exe 2196 lrxlffl.exe 2236 xffxxrx.exe 680 bnttbb.exe 1032 dpjvp.exe 640 jdppj.exe 1116 9rlxlrf.exe 3028 nnttnt.exe 1856 nthbtn.exe 372 ffflxfr.exe 1016 frxlrll.exe 2060 bttbth.exe 1852 jjdpd.exe 1348 pddjv.exe 1904 lrrxfxr.exe 1504 hhnthh.exe 1664 ntbnth.exe 2592 pjvdp.exe 2688 dvppd.exe 2588 rlxfrfl.exe 2848 btbnhh.exe 2748 3hbbth.exe 2648 pjjdd.exe 2712 pdppp.exe 2548 5rrlrfx.exe 2544 hnhbbn.exe 2440 ttnthh.exe 1644 9vpvj.exe 2540 dddvj.exe 2792 flrffxx.exe 1772 tbbnht.exe 1684 hbtbhh.exe 1928 vdjdj.exe 276 9jjpp.exe 2396 lrxrrlf.exe 1944 fflrrxr.exe 2288 bntnbt.exe 1428 ppjjp.exe 2832 7jpdv.exe 2924 xrllllx.exe 2200 lxxrrfx.exe 2212 tnbhbh.exe 592 hbnbtb.exe 944 7ppdd.exe 704 rlflxfr.exe 1728 lxlrfrx.exe 648 tnhnnt.exe -
Processes:
resource yara_rule behavioral1/memory/2084-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2344-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2640-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2504-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2372-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1684-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1268-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1924-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2144-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1264-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2948-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1032-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1856-258-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1852-294-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4c7b9aec4547d7e858ebde38c1491130_NeikiAnalytics.exedvpjd.exepvppd.exerfllxrr.exefffrlxx.exetbbthn.exe5ddvj.exerffffff.exebththh.exehbhbtb.exevpjpj.exepjvpv.exeffxflrf.exetbbtbn.exevpjpv.exe7lxxllx.exedescription pid process target process PID 2084 wrote to memory of 1676 2084 4c7b9aec4547d7e858ebde38c1491130_NeikiAnalytics.exe dvpjd.exe PID 2084 wrote to memory of 1676 2084 4c7b9aec4547d7e858ebde38c1491130_NeikiAnalytics.exe dvpjd.exe PID 2084 wrote to memory of 1676 2084 4c7b9aec4547d7e858ebde38c1491130_NeikiAnalytics.exe dvpjd.exe PID 2084 wrote to memory of 1676 2084 4c7b9aec4547d7e858ebde38c1491130_NeikiAnalytics.exe dvpjd.exe PID 1676 wrote to memory of 2344 1676 dvpjd.exe pvppd.exe PID 1676 wrote to memory of 2344 1676 dvpjd.exe pvppd.exe PID 1676 wrote to memory of 2344 1676 dvpjd.exe pvppd.exe PID 1676 wrote to memory of 2344 1676 dvpjd.exe pvppd.exe PID 2344 wrote to memory of 2640 2344 pvppd.exe rfllxrr.exe PID 2344 wrote to memory of 2640 2344 pvppd.exe rfllxrr.exe PID 2344 wrote to memory of 2640 2344 pvppd.exe rfllxrr.exe PID 2344 wrote to memory of 2640 2344 pvppd.exe rfllxrr.exe PID 2640 wrote to memory of 2668 2640 rfllxrr.exe fffrlxx.exe PID 2640 wrote to memory of 2668 2640 rfllxrr.exe fffrlxx.exe PID 2640 wrote to memory of 2668 2640 rfllxrr.exe fffrlxx.exe PID 2640 wrote to memory of 2668 2640 rfllxrr.exe fffrlxx.exe PID 2668 wrote to memory of 2504 2668 fffrlxx.exe tbbthn.exe PID 2668 wrote to memory of 2504 2668 fffrlxx.exe tbbthn.exe PID 2668 wrote to memory of 2504 2668 fffrlxx.exe tbbthn.exe PID 2668 wrote to memory of 2504 2668 fffrlxx.exe tbbthn.exe PID 2504 wrote to memory of 2484 2504 tbbthn.exe 5ddvj.exe PID 2504 wrote to memory of 2484 2504 tbbthn.exe 5ddvj.exe PID 2504 wrote to memory of 2484 2504 tbbthn.exe 5ddvj.exe PID 2504 wrote to memory of 2484 2504 tbbthn.exe 5ddvj.exe PID 2484 wrote to memory of 2928 2484 5ddvj.exe rffffff.exe PID 2484 wrote to memory of 2928 2484 5ddvj.exe rffffff.exe PID 2484 wrote to memory of 2928 2484 5ddvj.exe rffffff.exe PID 2484 wrote to memory of 2928 2484 5ddvj.exe rffffff.exe PID 2928 wrote to memory of 2372 2928 rffffff.exe bththh.exe PID 2928 wrote to memory of 2372 2928 rffffff.exe bththh.exe PID 2928 wrote to memory of 2372 2928 rffffff.exe bththh.exe PID 2928 wrote to memory of 2372 2928 rffffff.exe bththh.exe PID 2372 wrote to memory of 1604 2372 bththh.exe hbhbtb.exe PID 2372 wrote to memory of 1604 2372 bththh.exe hbhbtb.exe PID 2372 wrote to memory of 1604 2372 bththh.exe hbhbtb.exe PID 2372 wrote to memory of 1604 2372 bththh.exe hbhbtb.exe PID 1604 wrote to memory of 2720 1604 hbhbtb.exe vpjpj.exe PID 1604 wrote to memory of 2720 1604 hbhbtb.exe vpjpj.exe PID 1604 wrote to memory of 2720 1604 hbhbtb.exe vpjpj.exe PID 1604 wrote to memory of 2720 1604 hbhbtb.exe vpjpj.exe PID 2720 wrote to memory of 1684 2720 vpjpj.exe pjvpv.exe PID 2720 wrote to memory of 1684 2720 vpjpj.exe pjvpv.exe PID 2720 wrote to memory of 1684 2720 vpjpj.exe pjvpv.exe PID 2720 wrote to memory of 1684 2720 vpjpj.exe pjvpv.exe PID 1684 wrote to memory of 1268 1684 pjvpv.exe ffxflrf.exe PID 1684 wrote to memory of 1268 1684 pjvpv.exe ffxflrf.exe PID 1684 wrote to memory of 1268 1684 pjvpv.exe ffxflrf.exe PID 1684 wrote to memory of 1268 1684 pjvpv.exe ffxflrf.exe PID 1268 wrote to memory of 1924 1268 ffxflrf.exe tbbtbn.exe PID 1268 wrote to memory of 1924 1268 ffxflrf.exe tbbtbn.exe PID 1268 wrote to memory of 1924 1268 ffxflrf.exe tbbtbn.exe PID 1268 wrote to memory of 1924 1268 ffxflrf.exe tbbtbn.exe PID 1924 wrote to memory of 2144 1924 tbbtbn.exe vpjpv.exe PID 1924 wrote to memory of 2144 1924 tbbtbn.exe vpjpv.exe PID 1924 wrote to memory of 2144 1924 tbbtbn.exe vpjpv.exe PID 1924 wrote to memory of 2144 1924 tbbtbn.exe vpjpv.exe PID 2144 wrote to memory of 268 2144 vpjpv.exe 7lxxllx.exe PID 2144 wrote to memory of 268 2144 vpjpv.exe 7lxxllx.exe PID 2144 wrote to memory of 268 2144 vpjpv.exe 7lxxllx.exe PID 2144 wrote to memory of 268 2144 vpjpv.exe 7lxxllx.exe PID 268 wrote to memory of 2820 268 7lxxllx.exe 7xfrlxr.exe PID 268 wrote to memory of 2820 268 7lxxllx.exe 7xfrlxr.exe PID 268 wrote to memory of 2820 268 7lxxllx.exe 7xfrlxr.exe PID 268 wrote to memory of 2820 268 7lxxllx.exe 7xfrlxr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c7b9aec4547d7e858ebde38c1491130_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4c7b9aec4547d7e858ebde38c1491130_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\dvpjd.exec:\dvpjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
\??\c:\pvppd.exec:\pvppd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
\??\c:\rfllxrr.exec:\rfllxrr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
\??\c:\fffrlxx.exec:\fffrlxx.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\tbbthn.exec:\tbbthn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\5ddvj.exec:\5ddvj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\rffffff.exec:\rffffff.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\bththh.exec:\bththh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\hbhbtb.exec:\hbhbtb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
\??\c:\vpjpj.exec:\vpjpj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
\??\c:\pjvpv.exec:\pjvpv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\ffxflrf.exec:\ffxflrf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
\??\c:\tbbtbn.exec:\tbbtbn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\vpjpv.exec:\vpjpv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\7lxxllx.exec:\7lxxllx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:268 -
\??\c:\7xfrlxr.exec:\7xfrlxr.exe17⤵
- Executes dropped EXE
PID:2820 -
\??\c:\nnbtnn.exec:\nnbtnn.exe18⤵
- Executes dropped EXE
PID:1264 -
\??\c:\jdjdv.exec:\jdjdv.exe19⤵
- Executes dropped EXE
PID:2948 -
\??\c:\lrxlffl.exec:\lrxlffl.exe20⤵
- Executes dropped EXE
PID:2196 -
\??\c:\xffxxrx.exec:\xffxxrx.exe21⤵
- Executes dropped EXE
PID:2236 -
\??\c:\bnttbb.exec:\bnttbb.exe22⤵
- Executes dropped EXE
PID:680 -
\??\c:\dpjvp.exec:\dpjvp.exe23⤵
- Executes dropped EXE
PID:1032 -
\??\c:\jdppj.exec:\jdppj.exe24⤵
- Executes dropped EXE
PID:640 -
\??\c:\9rlxlrf.exec:\9rlxlrf.exe25⤵
- Executes dropped EXE
PID:1116 -
\??\c:\nnttnt.exec:\nnttnt.exe26⤵
- Executes dropped EXE
PID:3028 -
\??\c:\nthbtn.exec:\nthbtn.exe27⤵
- Executes dropped EXE
PID:1856 -
\??\c:\ffflxfr.exec:\ffflxfr.exe28⤵
- Executes dropped EXE
PID:372 -
\??\c:\frxlrll.exec:\frxlrll.exe29⤵
- Executes dropped EXE
PID:1016 -
\??\c:\bttbth.exec:\bttbth.exe30⤵
- Executes dropped EXE
PID:2060 -
\??\c:\jjdpd.exec:\jjdpd.exe31⤵
- Executes dropped EXE
PID:1852 -
\??\c:\pddjv.exec:\pddjv.exe32⤵
- Executes dropped EXE
PID:1348 -
\??\c:\lrrxfxr.exec:\lrrxfxr.exe33⤵
- Executes dropped EXE
PID:1904 -
\??\c:\hhnthh.exec:\hhnthh.exe34⤵
- Executes dropped EXE
PID:1504 -
\??\c:\ntbnth.exec:\ntbnth.exe35⤵
- Executes dropped EXE
PID:1664 -
\??\c:\pjvdp.exec:\pjvdp.exe36⤵
- Executes dropped EXE
PID:2592 -
\??\c:\dvppd.exec:\dvppd.exe37⤵
- Executes dropped EXE
PID:2688 -
\??\c:\rlxfrfl.exec:\rlxfrfl.exe38⤵
- Executes dropped EXE
PID:2588 -
\??\c:\btbnhh.exec:\btbnhh.exe39⤵
- Executes dropped EXE
PID:2848 -
\??\c:\3hbbth.exec:\3hbbth.exe40⤵
- Executes dropped EXE
PID:2748 -
\??\c:\pjjdd.exec:\pjjdd.exe41⤵
- Executes dropped EXE
PID:2648 -
\??\c:\pdppp.exec:\pdppp.exe42⤵
- Executes dropped EXE
PID:2712 -
\??\c:\5rrlrfx.exec:\5rrlrfx.exe43⤵
- Executes dropped EXE
PID:2548 -
\??\c:\hnhbbn.exec:\hnhbbn.exe44⤵
- Executes dropped EXE
PID:2544 -
\??\c:\ttnthh.exec:\ttnthh.exe45⤵
- Executes dropped EXE
PID:2440 -
\??\c:\9vpvj.exec:\9vpvj.exe46⤵
- Executes dropped EXE
PID:1644 -
\??\c:\dddvj.exec:\dddvj.exe47⤵
- Executes dropped EXE
PID:2540 -
\??\c:\flrffxx.exec:\flrffxx.exe48⤵
- Executes dropped EXE
PID:2792 -
\??\c:\tbbnht.exec:\tbbnht.exe49⤵
- Executes dropped EXE
PID:1772 -
\??\c:\hbtbhh.exec:\hbtbhh.exe50⤵
- Executes dropped EXE
PID:1684 -
\??\c:\vdjdj.exec:\vdjdj.exe51⤵
- Executes dropped EXE
PID:1928 -
\??\c:\9jjpp.exec:\9jjpp.exe52⤵
- Executes dropped EXE
PID:276 -
\??\c:\lrxrrlf.exec:\lrxrrlf.exe53⤵
- Executes dropped EXE
PID:2396 -
\??\c:\fflrrxr.exec:\fflrrxr.exe54⤵
- Executes dropped EXE
PID:1944 -
\??\c:\bntnbt.exec:\bntnbt.exe55⤵
- Executes dropped EXE
PID:2288 -
\??\c:\ppjjp.exec:\ppjjp.exe56⤵
- Executes dropped EXE
PID:1428 -
\??\c:\7jpdv.exec:\7jpdv.exe57⤵
- Executes dropped EXE
PID:2832 -
\??\c:\xrllllx.exec:\xrllllx.exe58⤵
- Executes dropped EXE
PID:2924 -
\??\c:\lxxrrfx.exec:\lxxrrfx.exe59⤵
- Executes dropped EXE
PID:2200 -
\??\c:\tnbhbh.exec:\tnbhbh.exe60⤵
- Executes dropped EXE
PID:2212 -
\??\c:\hbnbtb.exec:\hbnbtb.exe61⤵
- Executes dropped EXE
PID:592 -
\??\c:\7ppdd.exec:\7ppdd.exe62⤵
- Executes dropped EXE
PID:944 -
\??\c:\rlflxfr.exec:\rlflxfr.exe63⤵
- Executes dropped EXE
PID:704 -
\??\c:\lxlrfrx.exec:\lxlrfrx.exe64⤵
- Executes dropped EXE
PID:1728 -
\??\c:\tnhnnt.exec:\tnhnnt.exe65⤵
- Executes dropped EXE
PID:648 -
\??\c:\bhhbht.exec:\bhhbht.exe66⤵PID:2996
-
\??\c:\ppvdv.exec:\ppvdv.exe67⤵PID:3028
-
\??\c:\fxlxlrx.exec:\fxlxlrx.exe68⤵PID:1568
-
\??\c:\rrrlfrf.exec:\rrrlfrf.exe69⤵PID:840
-
\??\c:\bbtbht.exec:\bbtbht.exe70⤵PID:372
-
\??\c:\bnbbtb.exec:\bnbbtb.exe71⤵PID:1984
-
\??\c:\djjdj.exec:\djjdj.exe72⤵PID:2444
-
\??\c:\pvvjp.exec:\pvvjp.exe73⤵PID:2320
-
\??\c:\3rxrrxr.exec:\3rxrrxr.exe74⤵PID:2180
-
\??\c:\nbnbbn.exec:\nbnbbn.exe75⤵PID:2892
-
\??\c:\ddpvj.exec:\ddpvj.exe76⤵PID:1532
-
\??\c:\vjdjv.exec:\vjdjv.exe77⤵PID:2084
-
\??\c:\rrxlxfl.exec:\rrxlxfl.exe78⤵PID:2280
-
\??\c:\flfxflf.exec:\flfxflf.exe79⤵PID:2032
-
\??\c:\hhhnhh.exec:\hhhnhh.exe80⤵PID:2852
-
\??\c:\jpvpp.exec:\jpvpp.exe81⤵PID:2632
-
\??\c:\pvjjd.exec:\pvjjd.exe82⤵PID:2516
-
\??\c:\rllxrlf.exec:\rllxrlf.exe83⤵PID:2668
-
\??\c:\xfxlfxr.exec:\xfxlfxr.exe84⤵PID:2492
-
\??\c:\1hbbnb.exec:\1hbbnb.exe85⤵PID:2560
-
\??\c:\3hhtth.exec:\3hhtth.exe86⤵PID:2300
-
\??\c:\pddjd.exec:\pddjd.exe87⤵PID:2308
-
\??\c:\fxxlxlx.exec:\fxxlxlx.exe88⤵PID:1620
-
\??\c:\fflfxlf.exec:\fflfxlf.exe89⤵PID:1596
-
\??\c:\1hbtnt.exec:\1hbtnt.exe90⤵PID:2468
-
\??\c:\jvvjd.exec:\jvvjd.exe91⤵PID:1956
-
\??\c:\ppdvj.exec:\ppdvj.exe92⤵PID:1552
-
\??\c:\xlxxlfl.exec:\xlxxlfl.exe93⤵PID:2800
-
\??\c:\lffllxf.exec:\lffllxf.exe94⤵PID:1980
-
\??\c:\bbthtt.exec:\bbthtt.exe95⤵PID:276
-
\??\c:\jpjjj.exec:\jpjjj.exe96⤵PID:2120
-
\??\c:\jjppj.exec:\jjppj.exe97⤵PID:2384
-
\??\c:\rxrfllx.exec:\rxrfllx.exe98⤵PID:2920
-
\??\c:\rlxlxxl.exec:\rlxlxxl.exe99⤵PID:1428
-
\??\c:\7nhnhn.exec:\7nhnhn.exe100⤵PID:2244
-
\??\c:\tnttnn.exec:\tnttnn.exe101⤵PID:2868
-
\??\c:\3pjdp.exec:\3pjdp.exe102⤵PID:2232
-
\??\c:\jdpdp.exec:\jdpdp.exe103⤵PID:2252
-
\??\c:\rlxrflx.exec:\rlxrflx.exe104⤵PID:680
-
\??\c:\fxlrfrl.exec:\fxlrfrl.exe105⤵PID:1036
-
\??\c:\nhbhtb.exec:\nhbhtb.exe106⤵PID:1764
-
\??\c:\9vpjd.exec:\9vpjd.exe107⤵PID:2448
-
\??\c:\dvjpd.exec:\dvjpd.exe108⤵PID:1116
-
\??\c:\3fxlflf.exec:\3fxlflf.exe109⤵PID:1112
-
\??\c:\rflrllx.exec:\rflrllx.exe110⤵PID:2132
-
\??\c:\hntnht.exec:\hntnht.exe111⤵PID:1000
-
\??\c:\pjdjd.exec:\pjdjd.exe112⤵PID:2568
-
\??\c:\7vpdv.exec:\7vpdv.exe113⤵PID:2836
-
\??\c:\lxrxrrl.exec:\lxrxrrl.exe114⤵PID:1912
-
\??\c:\lfflflx.exec:\lfflflx.exe115⤵PID:2056
-
\??\c:\bthtbn.exec:\bthtbn.exe116⤵PID:1436
-
\??\c:\ntbthb.exec:\ntbthb.exe117⤵PID:2856
-
\??\c:\vvdjv.exec:\vvdjv.exe118⤵PID:1904
-
\??\c:\1xlrxfr.exec:\1xlrxfr.exe119⤵PID:1504
-
\??\c:\lffxlrl.exec:\lffxlrl.exe120⤵PID:3004
-
\??\c:\tnbttt.exec:\tnbttt.exe121⤵PID:2592
-
\??\c:\7tbtbn.exec:\7tbtbn.exe122⤵PID:2688
-
\??\c:\vdjvp.exec:\vdjvp.exe123⤵PID:2696
-
\??\c:\pjddv.exec:\pjddv.exe124⤵PID:2848
-
\??\c:\1htbhh.exec:\1htbhh.exe125⤵PID:2488
-
\??\c:\vppjv.exec:\vppjv.exe126⤵PID:3056
-
\??\c:\jvppd.exec:\jvppd.exe127⤵PID:2712
-
\??\c:\rrrrxxl.exec:\rrrrxxl.exe128⤵PID:2548
-
\??\c:\rlrxllf.exec:\rlrxllf.exe129⤵PID:1804
-
\??\c:\tnhthn.exec:\tnhthn.exe130⤵PID:2440
-
\??\c:\ttnthn.exec:\ttnthn.exe131⤵PID:2552
-
\??\c:\7jdpd.exec:\7jdpd.exe132⤵PID:2540
-
\??\c:\dddjv.exec:\dddjv.exe133⤵PID:2728
-
\??\c:\lrflfrx.exec:\lrflfrx.exe134⤵PID:1772
-
\??\c:\tbthtn.exec:\tbthtn.exe135⤵PID:1936
-
\??\c:\3btbnn.exec:\3btbnn.exe136⤵PID:1940
-
\??\c:\7vvdv.exec:\7vvdv.exe137⤵PID:1712
-
\??\c:\9vvdp.exec:\9vvdp.exe138⤵PID:2396
-
\??\c:\7llxlxr.exec:\7llxlxr.exe139⤵PID:1452
-
\??\c:\rfxlrxl.exec:\rfxlrxl.exe140⤵PID:2820
-
\??\c:\tnbhbh.exec:\tnbhbh.exe141⤵PID:1364
-
\??\c:\tnbhtb.exec:\tnbhtb.exe142⤵PID:2832
-
\??\c:\jdvdv.exec:\jdvdv.exe143⤵PID:2244
-
\??\c:\rrrxrxr.exec:\rrrxrxr.exe144⤵PID:2200
-
\??\c:\3lxfrlx.exec:\3lxfrlx.exe145⤵PID:2108
-
\??\c:\nbtbnn.exec:\nbtbnn.exe146⤵PID:592
-
\??\c:\tnbbhh.exec:\tnbbhh.exe147⤵PID:1564
-
\??\c:\dvjvd.exec:\dvjvd.exe148⤵PID:704
-
\??\c:\ddjpd.exec:\ddjpd.exe149⤵PID:1728
-
\??\c:\fxxxfrf.exec:\fxxxfrf.exe150⤵PID:648
-
\??\c:\bbtbbb.exec:\bbtbbb.exe151⤵PID:292
-
\??\c:\nnhntt.exec:\nnhntt.exe152⤵PID:896
-
\??\c:\vvdjv.exec:\vvdjv.exe153⤵PID:1988
-
\??\c:\ppjvp.exec:\ppjvp.exe154⤵PID:1568
-
\??\c:\lfllrxr.exec:\lfllrxr.exe155⤵PID:2176
-
\??\c:\nhthbn.exec:\nhthbn.exe156⤵PID:1984
-
\??\c:\hthhnt.exec:\hthhnt.exe157⤵PID:2444
-
\??\c:\vpppj.exec:\vpppj.exe158⤵PID:2320
-
\??\c:\dvdpv.exec:\dvdpv.exe159⤵PID:2292
-
\??\c:\llfrrff.exec:\llfrrff.exe160⤵PID:2892
-
\??\c:\3rrfrrl.exec:\3rrfrrl.exe161⤵PID:1532
-
\??\c:\nhhtbn.exec:\nhhtbn.exe162⤵PID:2084
-
\??\c:\dvjpv.exec:\dvjpv.exe163⤵PID:2628
-
\??\c:\djdpd.exec:\djdpd.exe164⤵PID:1664
-
\??\c:\rfrlrrx.exec:\rfrlrrx.exe165⤵PID:2608
-
\??\c:\rxlxrxr.exec:\rxlxrxr.exe166⤵PID:2632
-
\??\c:\bbhbtt.exec:\bbhbtt.exe167⤵PID:2640
-
\??\c:\dvvdv.exec:\dvvdv.exe168⤵PID:2668
-
\??\c:\vdvvd.exec:\vdvvd.exe169⤵PID:1108
-
\??\c:\rlllrxx.exec:\rlllrxx.exe170⤵PID:2376
-
\??\c:\lfrrflx.exec:\lfrrflx.exe171⤵PID:2932
-
\??\c:\ththnt.exec:\ththnt.exe172⤵PID:2308
-
\??\c:\nnnbbn.exec:\nnnbbn.exe173⤵PID:2544
-
\??\c:\vppvj.exec:\vppvj.exe174⤵PID:1596
-
\??\c:\ppdjp.exec:\ppdjp.exe175⤵PID:1644
-
\??\c:\fxlxxlx.exec:\fxlxxlx.exe176⤵PID:1956
-
\??\c:\hhbntb.exec:\hhbntb.exe177⤵PID:1932
-
\??\c:\dvjpd.exec:\dvjpd.exe178⤵PID:2800
-
\??\c:\jjdjv.exec:\jjdjv.exe179⤵PID:1980
-
\??\c:\xxrlrfl.exec:\xxrlrfl.exe180⤵PID:316
-
\??\c:\3rxrxxl.exec:\3rxrxxl.exe181⤵PID:2120
-
\??\c:\hbtbtt.exec:\hbtbtt.exe182⤵PID:1448
-
\??\c:\ppddd.exec:\ppddd.exe183⤵PID:2820
-
\??\c:\1jdvj.exec:\1jdvj.exe184⤵PID:2920
-
\??\c:\bttnbh.exec:\bttnbh.exe185⤵PID:2832
-
\??\c:\bnhnbt.exec:\bnhnbt.exe186⤵PID:2948
-
\??\c:\pjdjv.exec:\pjdjv.exe187⤵PID:2236
-
\??\c:\pdvdp.exec:\pdvdp.exe188⤵PID:2232
-
\??\c:\7rxflrl.exec:\7rxflrl.exe189⤵PID:592
-
\??\c:\rrfrrxr.exec:\rrfrrxr.exe190⤵PID:944
-
\??\c:\hbnnhh.exec:\hbnnhh.exe191⤵PID:704
-
\??\c:\nhbhbh.exec:\nhbhbh.exe192⤵PID:2864
-
\??\c:\djvvv.exec:\djvvv.exe193⤵PID:1844
-
\??\c:\ddpjd.exec:\ddpjd.exe194⤵PID:2804
-
\??\c:\rrrflff.exec:\rrrflff.exe195⤵PID:2216
-
\??\c:\rrfrrxx.exec:\rrfrrxx.exe196⤵PID:2132
-
\??\c:\nbnnnb.exec:\nbnnnb.exe197⤵PID:1000
-
\??\c:\7jvdp.exec:\7jvdp.exe198⤵PID:2264
-
\??\c:\dvjjj.exec:\dvjjj.exe199⤵PID:1984
-
\??\c:\7xxrffr.exec:\7xxrffr.exe200⤵PID:2272
-
\??\c:\rlrxrxf.exec:\rlrxrxf.exe201⤵PID:1256
-
\??\c:\hhttbh.exec:\hhttbh.exe202⤵PID:2980
-
\??\c:\btntht.exec:\btntht.exe203⤵PID:2892
-
\??\c:\pjpvj.exec:\pjpvj.exe204⤵PID:1504
-
\??\c:\vpdjp.exec:\vpdjp.exe205⤵PID:2084
-
\??\c:\xlflflr.exec:\xlflflr.exe206⤵PID:2692
-
\??\c:\7lfllfl.exec:\7lfllfl.exe207⤵PID:2752
-
\??\c:\1nhtnn.exec:\1nhtnn.exe208⤵PID:1676
-
\??\c:\nnhntb.exec:\nnhntb.exe209⤵PID:2632
-
\??\c:\jjdvj.exec:\jjdvj.exe210⤵PID:2848
-
\??\c:\1fxxllr.exec:\1fxxllr.exe211⤵PID:2516
-
\??\c:\llflxfr.exec:\llflxfr.exe212⤵PID:3056
-
\??\c:\bhbnnt.exec:\bhbnnt.exe213⤵PID:2376
-
\??\c:\3nhtht.exec:\3nhtht.exe214⤵PID:2548
-
\??\c:\1dpdj.exec:\1dpdj.exe215⤵PID:2308
-
\??\c:\jjjvd.exec:\jjjvd.exe216⤵PID:2552
-
\??\c:\5xxffrf.exec:\5xxffrf.exe217⤵PID:1548
-
\??\c:\lllrxlx.exec:\lllrxlx.exe218⤵PID:1644
-
\??\c:\ttnhtb.exec:\ttnhtb.exe219⤵PID:1772
-
\??\c:\nhbhbh.exec:\nhbhbh.exe220⤵PID:1932
-
\??\c:\dddpp.exec:\dddpp.exe221⤵PID:1940
-
\??\c:\rllrlll.exec:\rllrlll.exe222⤵PID:1660
-
\??\c:\fxlxrfl.exec:\fxlxrfl.exe223⤵PID:2380
-
\??\c:\9nhnhn.exec:\9nhnhn.exe224⤵PID:316
-
\??\c:\btnntt.exec:\btnntt.exe225⤵PID:2120
-
\??\c:\dpdjv.exec:\dpdjv.exe226⤵PID:1448
-
\??\c:\jvddj.exec:\jvddj.exe227⤵PID:2820
-
\??\c:\xrlrlxf.exec:\xrlrlxf.exe228⤵PID:2208
-
\??\c:\xrrrxfr.exec:\xrrrxfr.exe229⤵PID:2832
-
\??\c:\3btthh.exec:\3btthh.exe230⤵PID:2948
-
\??\c:\9pjvd.exec:\9pjvd.exe231⤵PID:2236
-
\??\c:\jpdjv.exec:\jpdjv.exe232⤵PID:580
-
\??\c:\frfxffr.exec:\frfxffr.exe233⤵PID:592
-
\??\c:\7xrfrfr.exec:\7xrfrfr.exe234⤵PID:1564
-
\??\c:\5htbhn.exec:\5htbhn.exe235⤵PID:2008
-
\??\c:\jjdpp.exec:\jjdpp.exe236⤵PID:2360
-
\??\c:\vvpdd.exec:\vvpdd.exe237⤵PID:556
-
\??\c:\xllfllr.exec:\xllfllr.exe238⤵PID:668
-
\??\c:\fflrllr.exec:\fflrllr.exe239⤵PID:2216
-
\??\c:\ntthbn.exec:\ntthbn.exe240⤵PID:2132
-
\??\c:\3htbbb.exec:\3htbbb.exe241⤵PID:1568
-
\??\c:\1jvdj.exec:\1jvdj.exe242⤵PID:3020