Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 08:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a848ade49df16065fdc7f41db62260c0_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
a848ade49df16065fdc7f41db62260c0_NeikiAnalytics.exe
-
Size
114KB
-
MD5
a848ade49df16065fdc7f41db62260c0
-
SHA1
c1718d17cd5392f977b5ffcd7976830679faafbb
-
SHA256
98c7e46ed1bfff2700e17c43348a5b1baee22117f0415e82570d4a14d0711821
-
SHA512
175f2b5a090ce65cb41872a8f445aed5ccf68844e41d0c9ba00efa56984534d7c1052c91be1f63dae6ba5a7385fa66951b6f3c0ec768dc78524048433441391c
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73oYUCD7R2F2UVbyy0Nj:ymb3NkkiQ3mdBjFo73HUoMsAbrg
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/2244-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2064-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2004-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-48-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2780-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2696-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2588-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/316-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2136-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1668-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1600-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1788-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2892-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/668-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1488-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2076-255-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/656-264-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1760-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
jvpvd.exevpdjv.exe5rxxfrf.exe9rfrxxl.exebtbhhn.exenhbnbh.exe3bnhnt.exe9frflrf.exetttntb.exe1pvjj.exepjdvj.exeffrxfrx.exebtttbh.exepdvdp.exexrrllfl.exe5xrflrx.exehbttnn.exepjddj.exexrfflrl.exenhbhnb.exehtnttt.exe3ppdp.exexxrrffr.exennhthn.exetnbnth.exeppdvj.exelfrxllr.exe1bthnb.exeppjpd.exerlxfrrf.exerrfrlll.exe1nhnht.exenbnttb.exejjjvd.exepdjjp.exefxxflrx.exe9tnnhh.exebtthnn.exepjddj.exedvppd.exefflrffr.exefxxfrxf.exetntbnn.exethbnnt.exejdvvd.exe9pjjp.exerlfxffl.exellxfrrx.exettnntn.exenntbhh.exe5dpvd.exevdddp.exexffllxx.exexlflxfl.exehbthbn.exethtnnn.exeddvjv.exedvpvp.exefxllrrx.exelxfffll.exe9nbhhh.exe7bnhnn.exe1pjpd.exejdjjp.exepid process 2104 jvpvd.exe 2064 vpdjv.exe 2004 5rxxfrf.exe 2780 9rfrxxl.exe 2524 btbhhn.exe 2696 nhbnbh.exe 2684 3bnhnt.exe 2588 9frflrf.exe 2136 tttntb.exe 316 1pvjj.exe 1668 pjdvj.exe 1600 ffrxfrx.exe 376 btttbh.exe 1788 pdvdp.exe 300 xrrllfl.exe 1048 5xrflrx.exe 2416 hbttnn.exe 1612 pjddj.exe 2172 xrfflrl.exe 2500 nhbhnb.exe 2892 htnttt.exe 668 3ppdp.exe 1488 xxrrffr.exe 1776 nnhthn.exe 2188 tnbnth.exe 2076 ppdvj.exe 656 lfrxllr.exe 1528 1bthnb.exe 868 ppjpd.exe 2036 rlxfrrf.exe 1760 rrfrlll.exe 1824 1nhnht.exe 1184 nbnttb.exe 2092 jjjvd.exe 2196 pdjjp.exe 2776 fxxflrx.exe 2648 9tnnhh.exe 1704 btthnn.exe 2708 pjddj.exe 2616 dvppd.exe 2572 fflrffr.exe 2528 fxxfrxf.exe 3000 tntbnn.exe 2304 thbnnt.exe 1960 jdvvd.exe 2488 9pjjp.exe 1608 rlfxffl.exe 1948 llxfrrx.exe 1744 ttnntn.exe 376 nntbhh.exe 2168 5dpvd.exe 2732 vdddp.exe 1128 xffllxx.exe 1504 xlflxfl.exe 2416 hbthbn.exe 1612 thtnnn.exe 2288 ddvjv.exe 2264 dvpvp.exe 2272 fxllrrx.exe 2892 lxfffll.exe 1300 9nbhhh.exe 1104 7bnhnn.exe 1764 1pjpd.exe 2356 jdjjp.exe -
Processes:
resource yara_rule behavioral1/memory/2244-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2064-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2004-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2696-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/316-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2136-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1668-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1600-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1788-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2892-211-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/668-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1488-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2076-255-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/656-264-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1760-300-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a848ade49df16065fdc7f41db62260c0_NeikiAnalytics.exejvpvd.exevpdjv.exe5rxxfrf.exe9rfrxxl.exebtbhhn.exenhbnbh.exe3bnhnt.exe9frflrf.exetttntb.exe1pvjj.exepjdvj.exeffrxfrx.exebtttbh.exepdvdp.exexrrllfl.exedescription pid process target process PID 2244 wrote to memory of 2104 2244 a848ade49df16065fdc7f41db62260c0_NeikiAnalytics.exe jvpvd.exe PID 2244 wrote to memory of 2104 2244 a848ade49df16065fdc7f41db62260c0_NeikiAnalytics.exe jvpvd.exe PID 2244 wrote to memory of 2104 2244 a848ade49df16065fdc7f41db62260c0_NeikiAnalytics.exe jvpvd.exe PID 2244 wrote to memory of 2104 2244 a848ade49df16065fdc7f41db62260c0_NeikiAnalytics.exe jvpvd.exe PID 2104 wrote to memory of 2064 2104 jvpvd.exe vpdjv.exe PID 2104 wrote to memory of 2064 2104 jvpvd.exe vpdjv.exe PID 2104 wrote to memory of 2064 2104 jvpvd.exe vpdjv.exe PID 2104 wrote to memory of 2064 2104 jvpvd.exe vpdjv.exe PID 2064 wrote to memory of 2004 2064 vpdjv.exe 5rxxfrf.exe PID 2064 wrote to memory of 2004 2064 vpdjv.exe 5rxxfrf.exe PID 2064 wrote to memory of 2004 2064 vpdjv.exe 5rxxfrf.exe PID 2064 wrote to memory of 2004 2064 vpdjv.exe 5rxxfrf.exe PID 2004 wrote to memory of 2780 2004 5rxxfrf.exe 9rfrxxl.exe PID 2004 wrote to memory of 2780 2004 5rxxfrf.exe 9rfrxxl.exe PID 2004 wrote to memory of 2780 2004 5rxxfrf.exe 9rfrxxl.exe PID 2004 wrote to memory of 2780 2004 5rxxfrf.exe 9rfrxxl.exe PID 2780 wrote to memory of 2524 2780 9rfrxxl.exe btbhhn.exe PID 2780 wrote to memory of 2524 2780 9rfrxxl.exe btbhhn.exe PID 2780 wrote to memory of 2524 2780 9rfrxxl.exe btbhhn.exe PID 2780 wrote to memory of 2524 2780 9rfrxxl.exe btbhhn.exe PID 2524 wrote to memory of 2696 2524 btbhhn.exe nhbnbh.exe PID 2524 wrote to memory of 2696 2524 btbhhn.exe nhbnbh.exe PID 2524 wrote to memory of 2696 2524 btbhhn.exe nhbnbh.exe PID 2524 wrote to memory of 2696 2524 btbhhn.exe nhbnbh.exe PID 2696 wrote to memory of 2684 2696 nhbnbh.exe 3bnhnt.exe PID 2696 wrote to memory of 2684 2696 nhbnbh.exe 3bnhnt.exe PID 2696 wrote to memory of 2684 2696 nhbnbh.exe 3bnhnt.exe PID 2696 wrote to memory of 2684 2696 nhbnbh.exe 3bnhnt.exe PID 2684 wrote to memory of 2588 2684 3bnhnt.exe 9frflrf.exe PID 2684 wrote to memory of 2588 2684 3bnhnt.exe 9frflrf.exe PID 2684 wrote to memory of 2588 2684 3bnhnt.exe 9frflrf.exe PID 2684 wrote to memory of 2588 2684 3bnhnt.exe 9frflrf.exe PID 2588 wrote to memory of 2136 2588 9frflrf.exe tttntb.exe PID 2588 wrote to memory of 2136 2588 9frflrf.exe tttntb.exe PID 2588 wrote to memory of 2136 2588 9frflrf.exe tttntb.exe PID 2588 wrote to memory of 2136 2588 9frflrf.exe tttntb.exe PID 2136 wrote to memory of 316 2136 tttntb.exe 1pvjj.exe PID 2136 wrote to memory of 316 2136 tttntb.exe 1pvjj.exe PID 2136 wrote to memory of 316 2136 tttntb.exe 1pvjj.exe PID 2136 wrote to memory of 316 2136 tttntb.exe 1pvjj.exe PID 316 wrote to memory of 1668 316 1pvjj.exe pjdvj.exe PID 316 wrote to memory of 1668 316 1pvjj.exe pjdvj.exe PID 316 wrote to memory of 1668 316 1pvjj.exe pjdvj.exe PID 316 wrote to memory of 1668 316 1pvjj.exe pjdvj.exe PID 1668 wrote to memory of 1600 1668 pjdvj.exe ffrxfrx.exe PID 1668 wrote to memory of 1600 1668 pjdvj.exe ffrxfrx.exe PID 1668 wrote to memory of 1600 1668 pjdvj.exe ffrxfrx.exe PID 1668 wrote to memory of 1600 1668 pjdvj.exe ffrxfrx.exe PID 1600 wrote to memory of 376 1600 ffrxfrx.exe btttbh.exe PID 1600 wrote to memory of 376 1600 ffrxfrx.exe btttbh.exe PID 1600 wrote to memory of 376 1600 ffrxfrx.exe btttbh.exe PID 1600 wrote to memory of 376 1600 ffrxfrx.exe btttbh.exe PID 376 wrote to memory of 1788 376 btttbh.exe pdvdp.exe PID 376 wrote to memory of 1788 376 btttbh.exe pdvdp.exe PID 376 wrote to memory of 1788 376 btttbh.exe pdvdp.exe PID 376 wrote to memory of 1788 376 btttbh.exe pdvdp.exe PID 1788 wrote to memory of 300 1788 pdvdp.exe xrrllfl.exe PID 1788 wrote to memory of 300 1788 pdvdp.exe xrrllfl.exe PID 1788 wrote to memory of 300 1788 pdvdp.exe xrrllfl.exe PID 1788 wrote to memory of 300 1788 pdvdp.exe xrrllfl.exe PID 300 wrote to memory of 1048 300 xrrllfl.exe 5xrflrx.exe PID 300 wrote to memory of 1048 300 xrrllfl.exe 5xrflrx.exe PID 300 wrote to memory of 1048 300 xrrllfl.exe 5xrflrx.exe PID 300 wrote to memory of 1048 300 xrrllfl.exe 5xrflrx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a848ade49df16065fdc7f41db62260c0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a848ade49df16065fdc7f41db62260c0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
\??\c:\jvpvd.exec:\jvpvd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\vpdjv.exec:\vpdjv.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2064 -
\??\c:\5rxxfrf.exec:\5rxxfrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\9rfrxxl.exec:\9rfrxxl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\btbhhn.exec:\btbhhn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\nhbnbh.exec:\nhbnbh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
\??\c:\3bnhnt.exec:\3bnhnt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
\??\c:\9frflrf.exec:\9frflrf.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2588 -
\??\c:\tttntb.exec:\tttntb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\1pvjj.exec:\1pvjj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:316 -
\??\c:\pjdvj.exec:\pjdvj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
\??\c:\ffrxfrx.exec:\ffrxfrx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
\??\c:\btttbh.exec:\btttbh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:376 -
\??\c:\pdvdp.exec:\pdvdp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1788 -
\??\c:\xrrllfl.exec:\xrrllfl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:300 -
\??\c:\5xrflrx.exec:\5xrflrx.exe17⤵
- Executes dropped EXE
PID:1048 -
\??\c:\hbttnn.exec:\hbttnn.exe18⤵
- Executes dropped EXE
PID:2416 -
\??\c:\pjddj.exec:\pjddj.exe19⤵
- Executes dropped EXE
PID:1612 -
\??\c:\xrfflrl.exec:\xrfflrl.exe20⤵
- Executes dropped EXE
PID:2172 -
\??\c:\nhbhnb.exec:\nhbhnb.exe21⤵
- Executes dropped EXE
PID:2500 -
\??\c:\htnttt.exec:\htnttt.exe22⤵
- Executes dropped EXE
PID:2892 -
\??\c:\3ppdp.exec:\3ppdp.exe23⤵
- Executes dropped EXE
PID:668 -
\??\c:\xxrrffr.exec:\xxrrffr.exe24⤵
- Executes dropped EXE
PID:1488 -
\??\c:\nnhthn.exec:\nnhthn.exe25⤵
- Executes dropped EXE
PID:1776 -
\??\c:\tnbnth.exec:\tnbnth.exe26⤵
- Executes dropped EXE
PID:2188 -
\??\c:\ppdvj.exec:\ppdvj.exe27⤵
- Executes dropped EXE
PID:2076 -
\??\c:\lfrxllr.exec:\lfrxllr.exe28⤵
- Executes dropped EXE
PID:656 -
\??\c:\1bthnb.exec:\1bthnb.exe29⤵
- Executes dropped EXE
PID:1528 -
\??\c:\ppjpd.exec:\ppjpd.exe30⤵
- Executes dropped EXE
PID:868 -
\??\c:\rlxfrrf.exec:\rlxfrrf.exe31⤵
- Executes dropped EXE
PID:2036 -
\??\c:\rrfrlll.exec:\rrfrlll.exe32⤵
- Executes dropped EXE
PID:1760 -
\??\c:\1nhnht.exec:\1nhnht.exe33⤵
- Executes dropped EXE
PID:1824 -
\??\c:\nbnttb.exec:\nbnttb.exe34⤵
- Executes dropped EXE
PID:1184 -
\??\c:\jjjvd.exec:\jjjvd.exe35⤵
- Executes dropped EXE
PID:2092 -
\??\c:\pdjjp.exec:\pdjjp.exe36⤵
- Executes dropped EXE
PID:2196 -
\??\c:\fxllrxx.exec:\fxllrxx.exe37⤵PID:2876
-
\??\c:\fxxflrx.exec:\fxxflrx.exe38⤵
- Executes dropped EXE
PID:2776 -
\??\c:\9tnnhh.exec:\9tnnhh.exe39⤵
- Executes dropped EXE
PID:2648 -
\??\c:\btthnn.exec:\btthnn.exe40⤵
- Executes dropped EXE
PID:1704 -
\??\c:\pjddj.exec:\pjddj.exe41⤵
- Executes dropped EXE
PID:2708 -
\??\c:\dvppd.exec:\dvppd.exe42⤵
- Executes dropped EXE
PID:2616 -
\??\c:\fflrffr.exec:\fflrffr.exe43⤵
- Executes dropped EXE
PID:2572 -
\??\c:\fxxfrxf.exec:\fxxfrxf.exe44⤵
- Executes dropped EXE
PID:2528 -
\??\c:\tntbnn.exec:\tntbnn.exe45⤵
- Executes dropped EXE
PID:3000 -
\??\c:\thbnnt.exec:\thbnnt.exe46⤵
- Executes dropped EXE
PID:2304 -
\??\c:\jdvvd.exec:\jdvvd.exe47⤵
- Executes dropped EXE
PID:1960 -
\??\c:\9pjjp.exec:\9pjjp.exe48⤵
- Executes dropped EXE
PID:2488 -
\??\c:\rlfxffl.exec:\rlfxffl.exe49⤵
- Executes dropped EXE
PID:1608 -
\??\c:\llxfrrx.exec:\llxfrrx.exe50⤵
- Executes dropped EXE
PID:1948 -
\??\c:\ttnntn.exec:\ttnntn.exe51⤵
- Executes dropped EXE
PID:1744 -
\??\c:\nntbhh.exec:\nntbhh.exe52⤵
- Executes dropped EXE
PID:376 -
\??\c:\5dpvd.exec:\5dpvd.exe53⤵
- Executes dropped EXE
PID:2168 -
\??\c:\vdddp.exec:\vdddp.exe54⤵
- Executes dropped EXE
PID:2732 -
\??\c:\xffllxx.exec:\xffllxx.exe55⤵
- Executes dropped EXE
PID:1128 -
\??\c:\xlflxfl.exec:\xlflxfl.exe56⤵
- Executes dropped EXE
PID:1504 -
\??\c:\hbthbn.exec:\hbthbn.exe57⤵
- Executes dropped EXE
PID:2416 -
\??\c:\thtnnn.exec:\thtnnn.exe58⤵
- Executes dropped EXE
PID:1612 -
\??\c:\ddvjv.exec:\ddvjv.exe59⤵
- Executes dropped EXE
PID:2288 -
\??\c:\dvpvp.exec:\dvpvp.exe60⤵
- Executes dropped EXE
PID:2264 -
\??\c:\fxllrrx.exec:\fxllrrx.exe61⤵
- Executes dropped EXE
PID:2272 -
\??\c:\lxfffll.exec:\lxfffll.exe62⤵
- Executes dropped EXE
PID:2892 -
\??\c:\9nbhhh.exec:\9nbhhh.exe63⤵
- Executes dropped EXE
PID:1300 -
\??\c:\7bnhnn.exec:\7bnhnn.exe64⤵
- Executes dropped EXE
PID:1104 -
\??\c:\1pjpd.exec:\1pjpd.exe65⤵
- Executes dropped EXE
PID:1764 -
\??\c:\jdjjp.exec:\jdjjp.exe66⤵
- Executes dropped EXE
PID:2356 -
\??\c:\fxllxxr.exec:\fxllxxr.exe67⤵PID:880
-
\??\c:\xrxxfxl.exec:\xrxxfxl.exe68⤵PID:1648
-
\??\c:\bbthtb.exec:\bbthtb.exe69⤵PID:812
-
\??\c:\nhnhhh.exec:\nhnhhh.exe70⤵PID:2464
-
\??\c:\jdvdp.exec:\jdvdp.exe71⤵PID:980
-
\??\c:\vjpvv.exec:\vjpvv.exe72⤵PID:2448
-
\??\c:\xlrrflx.exec:\xlrrflx.exe73⤵PID:876
-
\??\c:\xlflxxf.exec:\xlflxxf.exe74⤵PID:884
-
\??\c:\nnhtnb.exec:\nnhtnb.exe75⤵PID:1816
-
\??\c:\ttnttt.exec:\ttnttt.exe76⤵PID:2384
-
\??\c:\pjpvd.exec:\pjpvd.exe77⤵PID:2064
-
\??\c:\jdddd.exec:\jdddd.exe78⤵PID:2792
-
\??\c:\fxrrrxf.exec:\fxrrrxf.exe79⤵PID:2760
-
\??\c:\xlxxrrx.exec:\xlxxrrx.exe80⤵PID:2788
-
\??\c:\tnbhtb.exec:\tnbhtb.exe81⤵PID:2648
-
\??\c:\bnhbnn.exec:\bnhbnn.exe82⤵PID:1704
-
\??\c:\ppdpj.exec:\ppdpj.exe83⤵PID:2756
-
\??\c:\vdjdd.exec:\vdjdd.exe84⤵PID:2544
-
\??\c:\frxflfl.exec:\frxflfl.exe85⤵PID:2572
-
\??\c:\9frllll.exec:\9frllll.exe86⤵PID:2548
-
\??\c:\9tnbhn.exec:\9tnbhn.exe87⤵PID:2948
-
\??\c:\bntntn.exec:\bntntn.exe88⤵PID:340
-
\??\c:\dvjvj.exec:\dvjvj.exe89⤵PID:1960
-
\??\c:\vpjpv.exec:\vpjpv.exe90⤵PID:560
-
\??\c:\9xllxxf.exec:\9xllxxf.exe91⤵PID:1600
-
\??\c:\fxllrfl.exec:\fxllrfl.exe92⤵PID:1964
-
\??\c:\htbbhh.exec:\htbbhh.exe93⤵PID:336
-
\??\c:\7jjjv.exec:\7jjjv.exe94⤵PID:1976
-
\??\c:\7dvvd.exec:\7dvvd.exe95⤵PID:2168
-
\??\c:\rlxffff.exec:\rlxffff.exe96⤵PID:1036
-
\??\c:\7rllxfl.exec:\7rllxfl.exe97⤵PID:760
-
\??\c:\9bbtbh.exec:\9bbtbh.exe98⤵PID:1544
-
\??\c:\tntbhb.exec:\tntbhb.exe99⤵PID:1440
-
\??\c:\jdvdp.exec:\jdvdp.exe100⤵PID:2944
-
\??\c:\rxxxrlf.exec:\rxxxrlf.exe101⤵PID:2288
-
\??\c:\lxlrxxl.exec:\lxlrxxl.exe102⤵PID:2264
-
\??\c:\tnttbb.exec:\tnttbb.exe103⤵PID:2272
-
\??\c:\bnbthb.exec:\bnbthb.exe104⤵PID:1076
-
\??\c:\vpvvd.exec:\vpvvd.exe105⤵PID:1300
-
\??\c:\vpjpv.exec:\vpjpv.exe106⤵PID:820
-
\??\c:\frfxxrx.exec:\frfxxrx.exe107⤵PID:1764
-
\??\c:\fxlxlrx.exec:\fxlxlrx.exe108⤵PID:1624
-
\??\c:\5httnn.exec:\5httnn.exe109⤵PID:880
-
\??\c:\dvdpd.exec:\dvdpd.exe110⤵PID:1648
-
\??\c:\dvppj.exec:\dvppj.exe111⤵PID:812
-
\??\c:\1xlxrrx.exec:\1xlxrrx.exe112⤵PID:1420
-
\??\c:\nntbht.exec:\nntbht.exe113⤵PID:980
-
\??\c:\htbhnt.exec:\htbhnt.exe114⤵PID:2068
-
\??\c:\jddvp.exec:\jddvp.exe115⤵PID:876
-
\??\c:\pjpvj.exec:\pjpvj.exe116⤵PID:1760
-
\??\c:\llfrfrr.exec:\llfrfrr.exe117⤵PID:2972
-
\??\c:\xrffffr.exec:\xrffffr.exe118⤵PID:3052
-
\??\c:\9hbtnn.exec:\9hbtnn.exe119⤵PID:2064
-
\??\c:\pjvdd.exec:\pjvdd.exe120⤵PID:2196
-
\??\c:\dvdvj.exec:\dvdvj.exe121⤵PID:1584
-
\??\c:\llflrrf.exec:\llflrrf.exe122⤵PID:2672
-
\??\c:\xrlrrlr.exec:\xrlrrlr.exe123⤵PID:2844
-
\??\c:\5tbntn.exec:\5tbntn.exe124⤵PID:2704
-
\??\c:\tnbttt.exec:\tnbttt.exe125⤵PID:2848
-
\??\c:\pjpjd.exec:\pjpjd.exe126⤵PID:2536
-
\??\c:\9pddv.exec:\9pddv.exe127⤵PID:2684
-
\??\c:\7fflxfr.exec:\7fflxfr.exe128⤵PID:2960
-
\??\c:\rlffrlr.exec:\rlffrlr.exe129⤵PID:1828
-
\??\c:\ththnh.exec:\ththnh.exe130⤵PID:2176
-
\??\c:\9nntbh.exec:\9nntbh.exe131⤵PID:2576
-
\??\c:\9vjvd.exec:\9vjvd.exe132⤵PID:2444
-
\??\c:\9vjpp.exec:\9vjpp.exe133⤵PID:2720
-
\??\c:\xlllflf.exec:\xlllflf.exe134⤵PID:2492
-
\??\c:\rlflrrx.exec:\rlflrrx.exe135⤵PID:1788
-
\??\c:\1thhhh.exec:\1thhhh.exe136⤵PID:2440
-
\??\c:\hbnnnh.exec:\hbnnnh.exe137⤵PID:2320
-
\??\c:\jdjpj.exec:\jdjpj.exe138⤵PID:1196
-
\??\c:\5dddd.exec:\5dddd.exe139⤵PID:2480
-
\??\c:\fxlxllx.exec:\fxlxllx.exe140⤵PID:2928
-
\??\c:\rfrrflr.exec:\rfrrflr.exe141⤵PID:2024
-
\??\c:\nhbhnn.exec:\nhbhnn.exe142⤵PID:2884
-
\??\c:\bthnnt.exec:\bthnnt.exe143⤵PID:2276
-
\??\c:\pjdjj.exec:\pjdjj.exe144⤵PID:2896
-
\??\c:\lfllrrf.exec:\lfllrrf.exe145⤵PID:1308
-
\??\c:\3rfrxff.exec:\3rfrxff.exe146⤵PID:2400
-
\??\c:\1btbnn.exec:\1btbnn.exe147⤵PID:1864
-
\??\c:\nhtntn.exec:\nhtntn.exe148⤵PID:1616
-
\??\c:\pddvv.exec:\pddvv.exe149⤵PID:2124
-
\??\c:\5vjdd.exec:\5vjdd.exe150⤵PID:3068
-
\??\c:\3lflrxl.exec:\3lflrxl.exe151⤵PID:684
-
\??\c:\xrffllr.exec:\xrffllr.exe152⤵PID:2100
-
\??\c:\nhttbt.exec:\nhttbt.exe153⤵PID:3044
-
\??\c:\thnhhb.exec:\thnhhb.exe154⤵PID:2976
-
\??\c:\vjddv.exec:\vjddv.exe155⤵PID:1756
-
\??\c:\vpdvd.exec:\vpdvd.exe156⤵PID:2824
-
\??\c:\djjpd.exec:\djjpd.exe157⤵PID:2312
-
\??\c:\xxfxrrf.exec:\xxfxrrf.exe158⤵PID:1080
-
\??\c:\9xxrflr.exec:\9xxrflr.exe159⤵PID:3048
-
\??\c:\nhnbhh.exec:\nhnbhh.exe160⤵PID:2832
-
\??\c:\nbhbbt.exec:\nbhbbt.exe161⤵PID:2660
-
\??\c:\dpvpp.exec:\dpvpp.exe162⤵PID:2792
-
\??\c:\7xlffll.exec:\7xlffll.exe163⤵PID:1596
-
\??\c:\rffxxrr.exec:\rffxxrr.exe164⤵PID:2868
-
\??\c:\xlrrxfl.exec:\xlrrxfl.exe165⤵PID:2640
-
\??\c:\1htthb.exec:\1htthb.exe166⤵PID:2708
-
\??\c:\nbntbh.exec:\nbntbh.exe167⤵PID:2516
-
\??\c:\jdpvj.exec:\jdpvj.exe168⤵PID:1792
-
\??\c:\lfrrrrl.exec:\lfrrrrl.exe169⤵PID:2684
-
\??\c:\lflfrlr.exec:\lflfrlr.exe170⤵PID:2560
-
\??\c:\fxllllr.exec:\fxllllr.exe171⤵PID:1828
-
\??\c:\bthhhh.exec:\bthhhh.exe172⤵PID:1960
-
\??\c:\7bnnnh.exec:\7bnnnh.exe173⤵PID:2724
-
\??\c:\pjpjj.exec:\pjpjj.exe174⤵PID:1940
-
\??\c:\3rffffr.exec:\3rffffr.exe175⤵PID:1224
-
\??\c:\hbtnbb.exec:\hbtnbb.exe176⤵PID:1992
-
\??\c:\3hnhhn.exec:\3hnhhn.exe177⤵PID:1660
-
\??\c:\pjppv.exec:\pjppv.exe178⤵PID:2420
-
\??\c:\vpdpj.exec:\vpdpj.exe179⤵PID:2320
-
\??\c:\xlrlrlx.exec:\xlrlrlx.exe180⤵PID:1128
-
\??\c:\xxrrlrx.exec:\xxrrlrx.exe181⤵PID:2816
-
\??\c:\nbhntt.exec:\nbhntt.exe182⤵PID:2280
-
\??\c:\nhtthh.exec:\nhtthh.exe183⤵PID:2024
-
\??\c:\vpvdj.exec:\vpvdj.exe184⤵PID:1260
-
\??\c:\pjvpv.exec:\pjvpv.exe185⤵PID:2276
-
\??\c:\ffrxllx.exec:\ffrxllx.exe186⤵PID:2152
-
\??\c:\xrfrxrf.exec:\xrfrxrf.exe187⤵PID:928
-
\??\c:\nnthnh.exec:\nnthnh.exe188⤵PID:644
-
\??\c:\tnbbhh.exec:\tnbbhh.exe189⤵PID:1864
-
\??\c:\dvdjp.exec:\dvdjp.exe190⤵PID:1548
-
\??\c:\3pddp.exec:\3pddp.exe191⤵PID:1144
-
\??\c:\frllxxf.exec:\frllxxf.exe192⤵PID:328
-
\??\c:\9hbnbn.exec:\9hbnbn.exe193⤵PID:2012
-
\??\c:\vpdpp.exec:\vpdpp.exe194⤵PID:2052
-
\??\c:\ppvvp.exec:\ppvvp.exe195⤵PID:3060
-
\??\c:\fxxxxfl.exec:\fxxxxfl.exe196⤵PID:2976
-
\??\c:\xrlxflx.exec:\xrlxflx.exe197⤵PID:1756
-
\??\c:\btbbnn.exec:\btbbnn.exe198⤵PID:2824
-
\??\c:\bntbtt.exec:\bntbtt.exe199⤵PID:2104
-
\??\c:\jdvvd.exec:\jdvvd.exe200⤵PID:1080
-
\??\c:\vpdpd.exec:\vpdpd.exe201⤵PID:2876
-
\??\c:\1rrxffl.exec:\1rrxffl.exe202⤵PID:2832
-
\??\c:\frflrxf.exec:\frflrxf.exe203⤵PID:2760
-
\??\c:\7thbnn.exec:\7thbnn.exe204⤵PID:2196
-
\??\c:\3nhnbn.exec:\3nhnbn.exe205⤵PID:2088
-
\??\c:\dvjdp.exec:\dvjdp.exe206⤵PID:2696
-
\??\c:\vpdjj.exec:\vpdjj.exe207⤵PID:2688
-
\??\c:\5fxfrlr.exec:\5fxfrlr.exe208⤵PID:2580
-
\??\c:\3lxfflx.exec:\3lxfflx.exe209⤵PID:2532
-
\??\c:\hbhtbb.exec:\hbhtbb.exe210⤵PID:2568
-
\??\c:\3htttt.exec:\3htttt.exe211⤵PID:2304
-
\??\c:\7vjpd.exec:\7vjpd.exe212⤵PID:2136
-
\??\c:\dvpvd.exec:\dvpvd.exe213⤵PID:1620
-
\??\c:\lfxfxxr.exec:\lfxfxxr.exe214⤵PID:2504
-
\??\c:\9frrxrf.exec:\9frrxrf.exe215⤵PID:756
-
\??\c:\hbttbn.exec:\hbttbn.exe216⤵PID:1972
-
\??\c:\tnnthn.exec:\tnnthn.exe217⤵PID:1980
-
\??\c:\pjvdj.exec:\pjvdj.exe218⤵PID:1248
-
\??\c:\ffxfllr.exec:\ffxfllr.exe219⤵PID:2040
-
\??\c:\9xxxrxx.exec:\9xxxrxx.exe220⤵PID:2412
-
\??\c:\7thtth.exec:\7thtth.exe221⤵PID:1768
-
\??\c:\nnhnbb.exec:\nnhnbb.exe222⤵PID:2820
-
\??\c:\jjvjp.exec:\jjvjp.exe223⤵PID:2108
-
\??\c:\dvpvj.exec:\dvpvj.exe224⤵PID:2940
-
\??\c:\fxlfrlr.exec:\fxlfrlr.exe225⤵PID:780
-
\??\c:\7frrxrf.exec:\7frrxrf.exe226⤵PID:2500
-
\??\c:\hhnthh.exec:\hhnthh.exe227⤵PID:1244
-
\??\c:\tthhbh.exec:\tthhbh.exe228⤵PID:1776
-
\??\c:\1pjvv.exec:\1pjvv.exe229⤵PID:1780
-
\??\c:\5dvvp.exec:\5dvvp.exe230⤵PID:1536
-
\??\c:\rfrxxfl.exec:\rfrxxfl.exe231⤵PID:1636
-
\??\c:\xrflxxl.exec:\xrflxxl.exe232⤵PID:688
-
\??\c:\btnnbb.exec:\btnnbb.exe233⤵PID:2124
-
\??\c:\hhnnhh.exec:\hhnnhh.exe234⤵PID:684
-
\??\c:\9pdjp.exec:\9pdjp.exe235⤵PID:900
-
\??\c:\7ddpv.exec:\7ddpv.exe236⤵PID:1736
-
\??\c:\fflxxfx.exec:\fflxxfx.exe237⤵PID:1236
-
\??\c:\fxrfflf.exec:\fxrfflf.exe238⤵PID:3044
-
\??\c:\bhnhbb.exec:\bhnhbb.exe239⤵PID:2068
-
\??\c:\ppvpd.exec:\ppvpd.exe240⤵PID:2448
-
\??\c:\pjvvj.exec:\pjvvj.exe241⤵PID:2836
-
\??\c:\9rffrfl.exec:\9rffrfl.exe242⤵PID:1184