Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 15:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
eb6cd6e001f1d14e367ba4aa2d210be0_NeikiAnalytics.exe
Resource
win7-20240220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
eb6cd6e001f1d14e367ba4aa2d210be0_NeikiAnalytics.exe
-
Size
119KB
-
MD5
eb6cd6e001f1d14e367ba4aa2d210be0
-
SHA1
419065124b274a357ed59caa0c94b3e13b33d371
-
SHA256
9c4f78b16bd72c8c3850b95bf7b88cd7ed03c84b7e13647e35a3474a3a09e84c
-
SHA512
a5a10e3c4a9edc9813f516c524b2b9239959fdb9120a35306f4d7ad4c426fa02dac9593d592331ba788774bb5eab1bdde183079ab6f15fa0776dc4e6ec0a8d9c
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDomRGApSuLAR2yPBCQ1nDFu1Q8sp:ymb3NkkiQ3mdBjFomR7UsyJC+n0GsgcQ
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral1/memory/1740-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1740-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2224-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2524-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2760-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2532-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2504-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1880-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2480-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3012-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1584-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1436-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1364-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1520-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1556-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1580-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1056-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2732-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1932-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1124-226-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/800-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/924-261-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2060-270-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
dvppj.exe1lxrrlr.exe5bntbh.exedvjpp.exexrxxlrx.exelfffxxr.exebtntbh.exe5dpjj.exefllfrfl.exefffxfxx.exe1nbhnh.exejdddj.exeffrrrfx.exelxfffxf.exettbnhn.exevpvvd.exejvvdd.exeffflxfr.exenhhntb.exetnhttt.exepvjdj.exelffxrxl.exennnbth.exenhbhnt.exedvvvp.exejjvvp.exefrrfxfr.exe3tnntt.exepjjdp.exepjjdv.exefxrfrxf.exetntbtb.exe3thntt.exe7vpdj.exe9rlrflx.exe7xxxlxl.exettnbnt.exehhntnn.exeddvdp.exexllxxxl.exe7lxxxrr.exehbhtnt.exetnhnth.exejdvjv.exevjpjj.exe5rrffxl.exe1lrrxrr.exe1ntnth.exe3bbthn.exe5dvpj.exeddvvp.exeddpvj.exetbnbbh.exennhtnt.exejjdvp.exedpdjp.exexrlfrrf.exelxxxlrf.exebthbbn.exenntbnb.exepppdd.exeddvvp.exe1xllrxx.exexfrrfrf.exepid process 2224 dvppj.exe 2524 1lxrrlr.exe 2760 5bntbh.exe 2532 dvjpp.exe 2504 xrxxlrx.exe 1880 lfffxxr.exe 2480 btntbh.exe 3012 5dpjj.exe 1584 fllfrfl.exe 1436 fffxfxx.exe 1364 1nbhnh.exe 1520 jdddj.exe 836 ffrrrfx.exe 1556 lxfffxf.exe 1580 ttbnhn.exe 2164 vpvvd.exe 1056 jvvdd.exe 2732 ffflxfr.exe 1932 nhhntb.exe 2008 tnhttt.exe 1864 pvjdj.exe 704 lffxrxl.exe 1124 nnnbth.exe 800 nhbhnt.exe 2152 dvvvp.exe 820 jjvvp.exe 924 frrfxfr.exe 2060 3tnntt.exe 2212 pjjdp.exe 1072 pjjdv.exe 1904 fxrfrxf.exe 1668 tntbtb.exe 2856 3thntt.exe 1540 7vpdj.exe 2572 9rlrflx.exe 2948 7xxxlxl.exe 1640 ttnbnt.exe 2748 hhntnn.exe 2912 ddvdp.exe 2636 xllxxxl.exe 2416 7lxxxrr.exe 2536 hbhtnt.exe 2124 tnhnth.exe 2864 jdvjv.exe 2196 vjpjj.exe 1388 5rrffxl.exe 1336 1lrrxrr.exe 1776 1ntnth.exe 1232 3bbthn.exe 1456 5dvpj.exe 1512 ddvvp.exe 1768 ddpvj.exe 1872 tbnbbh.exe 1220 nnhtnt.exe 2036 jjdvp.exe 2516 dpdjp.exe 2604 xrlfrrf.exe 2272 lxxxlrf.exe 2512 bthbbn.exe 1728 nntbnb.exe 1548 pppdd.exe 792 ddvvp.exe 1124 1xllrxx.exe 1100 xfrrfrf.exe -
Processes:
resource yara_rule behavioral1/memory/1740-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1740-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2224-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2524-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2760-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2532-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2504-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1880-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3012-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1584-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1436-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1364-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1520-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1556-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1580-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1056-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2732-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1932-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1124-226-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/800-235-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/924-261-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2060-270-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
eb6cd6e001f1d14e367ba4aa2d210be0_NeikiAnalytics.exedvppj.exe1lxrrlr.exe5bntbh.exedvjpp.exexrxxlrx.exelfffxxr.exebtntbh.exe5dpjj.exefllfrfl.exefffxfxx.exe1nbhnh.exejdddj.exeffrrrfx.exelxfffxf.exettbnhn.exedescription pid process target process PID 1740 wrote to memory of 2224 1740 eb6cd6e001f1d14e367ba4aa2d210be0_NeikiAnalytics.exe dvppj.exe PID 1740 wrote to memory of 2224 1740 eb6cd6e001f1d14e367ba4aa2d210be0_NeikiAnalytics.exe dvppj.exe PID 1740 wrote to memory of 2224 1740 eb6cd6e001f1d14e367ba4aa2d210be0_NeikiAnalytics.exe dvppj.exe PID 1740 wrote to memory of 2224 1740 eb6cd6e001f1d14e367ba4aa2d210be0_NeikiAnalytics.exe dvppj.exe PID 2224 wrote to memory of 2524 2224 dvppj.exe 1lxrrlr.exe PID 2224 wrote to memory of 2524 2224 dvppj.exe 1lxrrlr.exe PID 2224 wrote to memory of 2524 2224 dvppj.exe 1lxrrlr.exe PID 2224 wrote to memory of 2524 2224 dvppj.exe 1lxrrlr.exe PID 2524 wrote to memory of 2760 2524 1lxrrlr.exe 5bntbh.exe PID 2524 wrote to memory of 2760 2524 1lxrrlr.exe 5bntbh.exe PID 2524 wrote to memory of 2760 2524 1lxrrlr.exe 5bntbh.exe PID 2524 wrote to memory of 2760 2524 1lxrrlr.exe 5bntbh.exe PID 2760 wrote to memory of 2532 2760 5bntbh.exe dvjpp.exe PID 2760 wrote to memory of 2532 2760 5bntbh.exe dvjpp.exe PID 2760 wrote to memory of 2532 2760 5bntbh.exe dvjpp.exe PID 2760 wrote to memory of 2532 2760 5bntbh.exe dvjpp.exe PID 2532 wrote to memory of 2504 2532 dvjpp.exe xrxxlrx.exe PID 2532 wrote to memory of 2504 2532 dvjpp.exe xrxxlrx.exe PID 2532 wrote to memory of 2504 2532 dvjpp.exe xrxxlrx.exe PID 2532 wrote to memory of 2504 2532 dvjpp.exe xrxxlrx.exe PID 2504 wrote to memory of 1880 2504 xrxxlrx.exe lfffxxr.exe PID 2504 wrote to memory of 1880 2504 xrxxlrx.exe lfffxxr.exe PID 2504 wrote to memory of 1880 2504 xrxxlrx.exe lfffxxr.exe PID 2504 wrote to memory of 1880 2504 xrxxlrx.exe lfffxxr.exe PID 1880 wrote to memory of 2480 1880 lfffxxr.exe btntbh.exe PID 1880 wrote to memory of 2480 1880 lfffxxr.exe btntbh.exe PID 1880 wrote to memory of 2480 1880 lfffxxr.exe btntbh.exe PID 1880 wrote to memory of 2480 1880 lfffxxr.exe btntbh.exe PID 2480 wrote to memory of 3012 2480 btntbh.exe 5dpjj.exe PID 2480 wrote to memory of 3012 2480 btntbh.exe 5dpjj.exe PID 2480 wrote to memory of 3012 2480 btntbh.exe 5dpjj.exe PID 2480 wrote to memory of 3012 2480 btntbh.exe 5dpjj.exe PID 3012 wrote to memory of 1584 3012 5dpjj.exe fllfrfl.exe PID 3012 wrote to memory of 1584 3012 5dpjj.exe fllfrfl.exe PID 3012 wrote to memory of 1584 3012 5dpjj.exe fllfrfl.exe PID 3012 wrote to memory of 1584 3012 5dpjj.exe fllfrfl.exe PID 1584 wrote to memory of 1436 1584 fllfrfl.exe fffxfxx.exe PID 1584 wrote to memory of 1436 1584 fllfrfl.exe fffxfxx.exe PID 1584 wrote to memory of 1436 1584 fllfrfl.exe fffxfxx.exe PID 1584 wrote to memory of 1436 1584 fllfrfl.exe fffxfxx.exe PID 1436 wrote to memory of 1364 1436 fffxfxx.exe 1nbhnh.exe PID 1436 wrote to memory of 1364 1436 fffxfxx.exe 1nbhnh.exe PID 1436 wrote to memory of 1364 1436 fffxfxx.exe 1nbhnh.exe PID 1436 wrote to memory of 1364 1436 fffxfxx.exe 1nbhnh.exe PID 1364 wrote to memory of 1520 1364 1nbhnh.exe jdddj.exe PID 1364 wrote to memory of 1520 1364 1nbhnh.exe jdddj.exe PID 1364 wrote to memory of 1520 1364 1nbhnh.exe jdddj.exe PID 1364 wrote to memory of 1520 1364 1nbhnh.exe jdddj.exe PID 1520 wrote to memory of 836 1520 jdddj.exe ffrrrfx.exe PID 1520 wrote to memory of 836 1520 jdddj.exe ffrrrfx.exe PID 1520 wrote to memory of 836 1520 jdddj.exe ffrrrfx.exe PID 1520 wrote to memory of 836 1520 jdddj.exe ffrrrfx.exe PID 836 wrote to memory of 1556 836 ffrrrfx.exe lxfffxf.exe PID 836 wrote to memory of 1556 836 ffrrrfx.exe lxfffxf.exe PID 836 wrote to memory of 1556 836 ffrrrfx.exe lxfffxf.exe PID 836 wrote to memory of 1556 836 ffrrrfx.exe lxfffxf.exe PID 1556 wrote to memory of 1580 1556 lxfffxf.exe ttbnhn.exe PID 1556 wrote to memory of 1580 1556 lxfffxf.exe ttbnhn.exe PID 1556 wrote to memory of 1580 1556 lxfffxf.exe ttbnhn.exe PID 1556 wrote to memory of 1580 1556 lxfffxf.exe ttbnhn.exe PID 1580 wrote to memory of 2164 1580 ttbnhn.exe vpvvd.exe PID 1580 wrote to memory of 2164 1580 ttbnhn.exe vpvvd.exe PID 1580 wrote to memory of 2164 1580 ttbnhn.exe vpvvd.exe PID 1580 wrote to memory of 2164 1580 ttbnhn.exe vpvvd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb6cd6e001f1d14e367ba4aa2d210be0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\eb6cd6e001f1d14e367ba4aa2d210be0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\dvppj.exec:\dvppj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\1lxrrlr.exec:\1lxrrlr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
\??\c:\5bntbh.exec:\5bntbh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
\??\c:\dvjpp.exec:\dvjpp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\xrxxlrx.exec:\xrxxlrx.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
\??\c:\lfffxxr.exec:\lfffxxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
\??\c:\btntbh.exec:\btntbh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\5dpjj.exec:\5dpjj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3012 -
\??\c:\fllfrfl.exec:\fllfrfl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1584 -
\??\c:\fffxfxx.exec:\fffxfxx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
\??\c:\1nbhnh.exec:\1nbhnh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
\??\c:\jdddj.exec:\jdddj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1520 -
\??\c:\ffrrrfx.exec:\ffrrrfx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:836 -
\??\c:\lxfffxf.exec:\lxfffxf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1556 -
\??\c:\ttbnhn.exec:\ttbnhn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1580 -
\??\c:\vpvvd.exec:\vpvvd.exe17⤵
- Executes dropped EXE
PID:2164 -
\??\c:\jvvdd.exec:\jvvdd.exe18⤵
- Executes dropped EXE
PID:1056 -
\??\c:\ffflxfr.exec:\ffflxfr.exe19⤵
- Executes dropped EXE
PID:2732 -
\??\c:\nhhntb.exec:\nhhntb.exe20⤵
- Executes dropped EXE
PID:1932 -
\??\c:\tnhttt.exec:\tnhttt.exe21⤵
- Executes dropped EXE
PID:2008 -
\??\c:\pvjdj.exec:\pvjdj.exe22⤵
- Executes dropped EXE
PID:1864 -
\??\c:\lffxrxl.exec:\lffxrxl.exe23⤵
- Executes dropped EXE
PID:704 -
\??\c:\nnnbth.exec:\nnnbth.exe24⤵
- Executes dropped EXE
PID:1124 -
\??\c:\nhbhnt.exec:\nhbhnt.exe25⤵
- Executes dropped EXE
PID:800 -
\??\c:\dvvvp.exec:\dvvvp.exe26⤵
- Executes dropped EXE
PID:2152 -
\??\c:\jjvvp.exec:\jjvvp.exe27⤵
- Executes dropped EXE
PID:820 -
\??\c:\frrfxfr.exec:\frrfxfr.exe28⤵
- Executes dropped EXE
PID:924 -
\??\c:\3tnntt.exec:\3tnntt.exe29⤵
- Executes dropped EXE
PID:2060 -
\??\c:\pjjdp.exec:\pjjdp.exe30⤵
- Executes dropped EXE
PID:2212 -
\??\c:\pjjdv.exec:\pjjdv.exe31⤵
- Executes dropped EXE
PID:1072 -
\??\c:\fxrfrxf.exec:\fxrfrxf.exe32⤵
- Executes dropped EXE
PID:1904 -
\??\c:\tntbtb.exec:\tntbtb.exe33⤵
- Executes dropped EXE
PID:1668 -
\??\c:\3thntt.exec:\3thntt.exe34⤵
- Executes dropped EXE
PID:2856 -
\??\c:\7vpdj.exec:\7vpdj.exe35⤵
- Executes dropped EXE
PID:1540 -
\??\c:\9rlrflx.exec:\9rlrflx.exe36⤵
- Executes dropped EXE
PID:2572 -
\??\c:\7xxxlxl.exec:\7xxxlxl.exe37⤵
- Executes dropped EXE
PID:2948 -
\??\c:\ttnbnt.exec:\ttnbnt.exe38⤵
- Executes dropped EXE
PID:1640 -
\??\c:\hhntnn.exec:\hhntnn.exe39⤵
- Executes dropped EXE
PID:2748 -
\??\c:\ddvdp.exec:\ddvdp.exe40⤵
- Executes dropped EXE
PID:2912 -
\??\c:\xllxxxl.exec:\xllxxxl.exe41⤵
- Executes dropped EXE
PID:2636 -
\??\c:\7lxxxrr.exec:\7lxxxrr.exe42⤵
- Executes dropped EXE
PID:2416 -
\??\c:\hbhtnt.exec:\hbhtnt.exe43⤵
- Executes dropped EXE
PID:2536 -
\??\c:\tnhnth.exec:\tnhnth.exe44⤵
- Executes dropped EXE
PID:2124 -
\??\c:\jdvjv.exec:\jdvjv.exe45⤵
- Executes dropped EXE
PID:2864 -
\??\c:\vjpjj.exec:\vjpjj.exe46⤵
- Executes dropped EXE
PID:2196 -
\??\c:\5rrffxl.exec:\5rrffxl.exe47⤵
- Executes dropped EXE
PID:1388 -
\??\c:\1lrrxrr.exec:\1lrrxrr.exe48⤵
- Executes dropped EXE
PID:1336 -
\??\c:\1ntnth.exec:\1ntnth.exe49⤵
- Executes dropped EXE
PID:1776 -
\??\c:\3bbthn.exec:\3bbthn.exe50⤵
- Executes dropped EXE
PID:1232 -
\??\c:\5dvpj.exec:\5dvpj.exe51⤵
- Executes dropped EXE
PID:1456 -
\??\c:\ddvvp.exec:\ddvvp.exe52⤵
- Executes dropped EXE
PID:1512 -
\??\c:\ddpvj.exec:\ddpvj.exe53⤵
- Executes dropped EXE
PID:1768 -
\??\c:\tbnbbh.exec:\tbnbbh.exe54⤵
- Executes dropped EXE
PID:1872 -
\??\c:\nnhtnt.exec:\nnhtnt.exe55⤵
- Executes dropped EXE
PID:1220 -
\??\c:\jjdvp.exec:\jjdvp.exe56⤵
- Executes dropped EXE
PID:2036 -
\??\c:\dpdjp.exec:\dpdjp.exe57⤵
- Executes dropped EXE
PID:2516 -
\??\c:\xrlfrrf.exec:\xrlfrrf.exe58⤵
- Executes dropped EXE
PID:2604 -
\??\c:\lxxxlrf.exec:\lxxxlrf.exe59⤵
- Executes dropped EXE
PID:2272 -
\??\c:\bthbbn.exec:\bthbbn.exe60⤵
- Executes dropped EXE
PID:2512 -
\??\c:\nntbnb.exec:\nntbnb.exe61⤵
- Executes dropped EXE
PID:1728 -
\??\c:\pppdd.exec:\pppdd.exe62⤵
- Executes dropped EXE
PID:1548 -
\??\c:\ddvvp.exec:\ddvvp.exe63⤵
- Executes dropped EXE
PID:792 -
\??\c:\1xllrxx.exec:\1xllrxx.exe64⤵
- Executes dropped EXE
PID:1124 -
\??\c:\xfrrfrf.exec:\xfrrfrf.exe65⤵
- Executes dropped EXE
PID:1100 -
\??\c:\nnbhbh.exec:\nnbhbh.exe66⤵PID:3024
-
\??\c:\vddpp.exec:\vddpp.exe67⤵PID:276
-
\??\c:\ddjpv.exec:\ddjpv.exe68⤵PID:3068
-
\??\c:\ffxxflr.exec:\ffxxflr.exe69⤵PID:924
-
\??\c:\flrfrfr.exec:\flrfrfr.exe70⤵PID:2220
-
\??\c:\nhtbnn.exec:\nhtbnn.exe71⤵PID:2100
-
\??\c:\9nbhtb.exec:\9nbhtb.exe72⤵PID:2076
-
\??\c:\ppjdj.exec:\ppjdj.exe73⤵PID:896
-
\??\c:\pjvvj.exec:\pjvvj.exe74⤵PID:1908
-
\??\c:\1rrxlxl.exec:\1rrxlxl.exe75⤵PID:1976
-
\??\c:\rrllxxl.exec:\rrllxxl.exe76⤵PID:1528
-
\??\c:\bbntnb.exec:\bbntnb.exe77⤵PID:2224
-
\??\c:\bthnbn.exec:\bthnbn.exe78⤵PID:2668
-
\??\c:\vvvdj.exec:\vvvdj.exe79⤵PID:2524
-
\??\c:\jpjpp.exec:\jpjpp.exe80⤵PID:1048
-
\??\c:\rlxflfr.exec:\rlxflfr.exe81⤵PID:2440
-
\??\c:\rrflffl.exec:\rrflffl.exe82⤵PID:2288
-
\??\c:\nthbht.exec:\nthbht.exe83⤵PID:2588
-
\??\c:\bhnhbb.exec:\bhnhbb.exe84⤵PID:2488
-
\??\c:\bbttbb.exec:\bbttbb.exe85⤵PID:2824
-
\??\c:\vvpdj.exec:\vvpdj.exe86⤵PID:2160
-
\??\c:\vvpdp.exec:\vvpdp.exe87⤵PID:3012
-
\??\c:\xrxlrfr.exec:\xrxlrfr.exe88⤵PID:1968
-
\??\c:\llfrflr.exec:\llfrflr.exe89⤵PID:320
-
\??\c:\bbntnt.exec:\bbntnt.exe90⤵PID:1228
-
\??\c:\nbnbnn.exec:\nbnbnn.exe91⤵PID:280
-
\??\c:\vjvvj.exec:\vjvvj.exe92⤵PID:2192
-
\??\c:\xrllrxf.exec:\xrllrxf.exe93⤵PID:1508
-
\??\c:\xrflrlr.exec:\xrflrlr.exe94⤵PID:1556
-
\??\c:\hhnthn.exec:\hhnthn.exe95⤵PID:2476
-
\??\c:\3ntbhn.exec:\3ntbhn.exe96⤵PID:500
-
\??\c:\jpvjj.exec:\jpvjj.exe97⤵PID:1692
-
\??\c:\vpddp.exec:\vpddp.exe98⤵PID:2644
-
\??\c:\rrffxfl.exec:\rrffxfl.exe99⤵PID:2732
-
\??\c:\rrlrllx.exec:\rrlrllx.exe100⤵PID:2376
-
\??\c:\tbbnnh.exec:\tbbnnh.exe101⤵PID:2728
-
\??\c:\hhbbnn.exec:\hhbbnn.exe102⤵PID:608
-
\??\c:\ppdjv.exec:\ppdjv.exe103⤵PID:1864
-
\??\c:\7dpvj.exec:\7dpvj.exe104⤵PID:656
-
\??\c:\fxlxllx.exec:\fxlxllx.exe105⤵PID:2052
-
\??\c:\lfxfxfr.exec:\lfxfxfr.exe106⤵PID:1940
-
\??\c:\xfrlrrx.exec:\xfrlrrx.exe107⤵PID:1324
-
\??\c:\bbhbnh.exec:\bbhbnh.exe108⤵PID:1820
-
\??\c:\hbhntt.exec:\hbhntt.exe109⤵PID:940
-
\??\c:\jjvvj.exec:\jjvvj.exe110⤵PID:776
-
\??\c:\7pjvj.exec:\7pjvj.exe111⤵PID:1688
-
\??\c:\fxlrflx.exec:\fxlrflx.exe112⤵PID:1620
-
\??\c:\fxfxlfl.exec:\fxfxlfl.exe113⤵PID:2944
-
\??\c:\bbtbnn.exec:\bbtbnn.exe114⤵PID:1072
-
\??\c:\9hbnhn.exec:\9hbnhn.exe115⤵PID:2012
-
\??\c:\jjvdp.exec:\jjvdp.exe116⤵PID:1964
-
\??\c:\vpdpd.exec:\vpdpd.exe117⤵PID:2900
-
\??\c:\9lfflfl.exec:\9lfflfl.exe118⤵PID:2872
-
\??\c:\tnbnth.exec:\tnbnth.exe119⤵PID:2972
-
\??\c:\7btnbn.exec:\7btnbn.exe120⤵PID:2672
-
\??\c:\vdpvj.exec:\vdpvj.exe121⤵PID:2616
-
\??\c:\5vpjp.exec:\5vpjp.exe122⤵PID:2420
-
\??\c:\lfrfxfr.exec:\lfrfxfr.exe123⤵PID:2848
-
\??\c:\3lxfllx.exec:\3lxfllx.exe124⤵PID:2504
-
\??\c:\3ntbnt.exec:\3ntbnt.exe125⤵PID:2468
-
\??\c:\hhntbh.exec:\hhntbh.exe126⤵PID:2820
-
\??\c:\vdjpj.exec:\vdjpj.exe127⤵PID:2836
-
\??\c:\ddvdd.exec:\ddvdd.exe128⤵PID:2312
-
\??\c:\1xlfrlx.exec:\1xlfrlx.exe129⤵PID:2320
-
\??\c:\xrrrflr.exec:\xrrrflr.exe130⤵PID:644
-
\??\c:\hhtnht.exec:\hhtnht.exe131⤵PID:844
-
\??\c:\vvvvd.exec:\vvvvd.exe132⤵PID:2172
-
\??\c:\jdvjv.exec:\jdvjv.exe133⤵PID:1752
-
\??\c:\9rlfrrf.exec:\9rlfrrf.exe134⤵PID:1868
-
\??\c:\lflrlrf.exec:\lflrlrf.exe135⤵PID:1608
-
\??\c:\thbbhb.exec:\thbbhb.exe136⤵PID:1592
-
\??\c:\tbhbnh.exec:\tbhbnh.exe137⤵PID:1028
-
\??\c:\pjpjp.exec:\pjpjp.exe138⤵PID:2020
-
\??\c:\9dvdd.exec:\9dvdd.exe139⤵PID:848
-
\??\c:\fffrlxf.exec:\fffrlxf.exe140⤵PID:2028
-
\??\c:\5bnbnb.exec:\5bnbnb.exe141⤵PID:3044
-
\??\c:\1ntbtn.exec:\1ntbtn.exe142⤵PID:2112
-
\??\c:\pjppd.exec:\pjppd.exe143⤵PID:2000
-
\??\c:\xrrxxrf.exec:\xrrxxrf.exe144⤵PID:1420
-
\??\c:\rxlxrrl.exec:\rxlxrrl.exe145⤵PID:1128
-
\??\c:\hnhnhb.exec:\hnhnhb.exe146⤵PID:580
-
\??\c:\tthttt.exec:\tthttt.exe147⤵PID:2304
-
\??\c:\vvdjd.exec:\vvdjd.exe148⤵PID:556
-
\??\c:\ppjpj.exec:\ppjpj.exe149⤵PID:1296
-
\??\c:\xrflrxx.exec:\xrflrxx.exe150⤵PID:1684
-
\??\c:\bnbhhn.exec:\bnbhhn.exe151⤵PID:552
-
\??\c:\bbthtb.exec:\bbthtb.exe152⤵PID:3004
-
\??\c:\jjvdd.exec:\jjvdd.exe153⤵PID:572
-
\??\c:\jvjpv.exec:\jvjpv.exe154⤵PID:1604
-
\??\c:\9xrrlrx.exec:\9xrrlrx.exe155⤵PID:2896
-
\??\c:\rrrlxlx.exec:\rrrlxlx.exe156⤵PID:1672
-
\??\c:\7nhtnn.exec:\7nhtnn.exe157⤵PID:2136
-
\??\c:\9hbbht.exec:\9hbbht.exe158⤵PID:3048
-
\??\c:\jdppv.exec:\jdppv.exe159⤵PID:1644
-
\??\c:\ddppj.exec:\ddppj.exe160⤵PID:2648
-
\??\c:\rrfxrrf.exec:\rrfxrrf.exe161⤵PID:2684
-
\??\c:\5fxlfrl.exec:\5fxlfrl.exe162⤵PID:2540
-
\??\c:\nnntnt.exec:\nnntnt.exe163⤵PID:1640
-
\??\c:\bttnht.exec:\bttnht.exe164⤵PID:2532
-
\??\c:\jdppd.exec:\jdppd.exe165⤵PID:2528
-
\??\c:\ddpvj.exec:\ddpvj.exe166⤵PID:2432
-
\??\c:\xxlrxxf.exec:\xxlrxxf.exe167⤵PID:2444
-
\??\c:\llrxrrr.exec:\llrxrrr.exe168⤵PID:2428
-
\??\c:\nnbbhh.exec:\nnbbhh.exe169⤵PID:2492
-
\??\c:\bbtnhb.exec:\bbtnhb.exe170⤵PID:2864
-
\??\c:\pdpvv.exec:\pdpvv.exe171⤵PID:1920
-
\??\c:\jvdvp.exec:\jvdvp.exe172⤵PID:1632
-
\??\c:\ffxxrxl.exec:\ffxxrxl.exe173⤵PID:1364
-
\??\c:\btnthb.exec:\btnthb.exe174⤵PID:2336
-
\??\c:\hbbbnn.exec:\hbbbnn.exe175⤵PID:1716
-
\??\c:\pdjjj.exec:\pdjjj.exe176⤵PID:1480
-
\??\c:\pvjjp.exec:\pvjjp.exe177⤵PID:472
-
\??\c:\rflxllx.exec:\rflxllx.exe178⤵PID:1768
-
\??\c:\rrlrxfr.exec:\rrlrxfr.exe179⤵PID:2044
-
\??\c:\nhtbnt.exec:\nhtbnt.exe180⤵PID:2716
-
\??\c:\ttntht.exec:\ttntht.exe181⤵PID:2808
-
\??\c:\jjdjd.exec:\jjdjd.exe182⤵PID:2720
-
\??\c:\9dppp.exec:\9dppp.exe183⤵PID:2696
-
\??\c:\1lxxxxx.exec:\1lxxxxx.exe184⤵PID:324
-
\??\c:\3lflrrx.exec:\3lflrrx.exe185⤵PID:588
-
\??\c:\3btntb.exec:\3btntb.exe186⤵PID:1812
-
\??\c:\dvpdp.exec:\dvpdp.exe187⤵PID:1548
-
\??\c:\pjvvp.exec:\pjvvp.exe188⤵PID:792
-
\??\c:\llfflrf.exec:\llfflrf.exe189⤵PID:2904
-
\??\c:\fxllxxf.exec:\fxllxxf.exe190⤵PID:892
-
\??\c:\tnnbnt.exec:\tnnbnt.exe191⤵PID:2784
-
\??\c:\thbbhb.exec:\thbbhb.exe192⤵PID:276
-
\??\c:\1pdjv.exec:\1pdjv.exe193⤵PID:864
-
\??\c:\3pjvd.exec:\3pjvd.exe194⤵PID:3036
-
\??\c:\7ffrllf.exec:\7ffrllf.exe195⤵PID:1120
-
\??\c:\thbbtt.exec:\thbbtt.exe196⤵PID:2100
-
\??\c:\pjvvj.exec:\pjvvj.exe197⤵PID:2256
-
\??\c:\1djjj.exec:\1djjj.exe198⤵PID:896
-
\??\c:\xffxrlr.exec:\xffxrlr.exe199⤵PID:1908
-
\??\c:\9rlfflr.exec:\9rlfflr.exe200⤵PID:2856
-
\??\c:\tntbhn.exec:\tntbhn.exe201⤵PID:1540
-
\??\c:\vjppp.exec:\vjppp.exe202⤵PID:2652
-
\??\c:\3pddd.exec:\3pddd.exe203⤵PID:2948
-
\??\c:\5rrrrrx.exec:\5rrrrrx.exe204⤵PID:2752
-
\??\c:\nhthnb.exec:\nhthnb.exe205⤵PID:1744
-
\??\c:\hhhnbb.exec:\hhhnbb.exe206⤵PID:2912
-
\??\c:\djvdv.exec:\djvdv.exe207⤵PID:2636
-
\??\c:\lxxxfll.exec:\lxxxfll.exe208⤵PID:2416
-
\??\c:\9rxllll.exec:\9rxllll.exe209⤵PID:2488
-
\??\c:\bhtntn.exec:\bhtntn.exe210⤵PID:3040
-
\??\c:\9thnbb.exec:\9thnbb.exe211⤵PID:1244
-
\??\c:\hthntt.exec:\hthntt.exe212⤵PID:1564
-
\??\c:\pdvdv.exec:\pdvdv.exe213⤵PID:1388
-
\??\c:\lrlflrx.exec:\lrlflrx.exe214⤵PID:320
-
\??\c:\xxxrfrx.exec:\xxxrfrx.exe215⤵PID:1776
-
\??\c:\hhthbt.exec:\hhthbt.exe216⤵PID:1488
-
\??\c:\jdpdv.exec:\jdpdv.exe217⤵PID:2328
-
\??\c:\dppjp.exec:\dppjp.exe218⤵PID:1568
-
\??\c:\3flrrfx.exec:\3flrrfx.exe219⤵PID:1556
-
\??\c:\hnbthh.exec:\hnbthh.exe220⤵PID:2476
-
\??\c:\bntthn.exec:\bntthn.exe221⤵PID:500
-
\??\c:\pjjdj.exec:\pjjdj.exe222⤵PID:1692
-
\??\c:\3vvpj.exec:\3vvpj.exe223⤵PID:2712
-
\??\c:\1rflflf.exec:\1rflflf.exe224⤵PID:1932
-
\??\c:\lffrxfx.exec:\lffrxfx.exe225⤵PID:2272
-
\??\c:\3ttbbh.exec:\3ttbbh.exe226⤵PID:2512
-
\??\c:\bbthth.exec:\bbthth.exe227⤵PID:1728
-
\??\c:\vjvvp.exec:\vjvvp.exe228⤵PID:1760
-
\??\c:\5fxxrff.exec:\5fxxrff.exe229⤵PID:1736
-
\??\c:\rrlxfxl.exec:\rrlxfxl.exe230⤵PID:1916
-
\??\c:\btbhht.exec:\btbhht.exe231⤵PID:2152
-
\??\c:\hbtnht.exec:\hbtnht.exe232⤵PID:912
-
\??\c:\ddjdd.exec:\ddjdd.exe233⤵PID:1956
-
\??\c:\jpjjp.exec:\jpjjp.exe234⤵PID:2004
-
\??\c:\fxfflxf.exec:\fxfflxf.exe235⤵PID:2064
-
\??\c:\rrflffx.exec:\rrflffx.exe236⤵PID:2216
-
\??\c:\hbntbn.exec:\hbntbn.exe237⤵PID:2212
-
\??\c:\bhntbn.exec:\bhntbn.exe238⤵PID:1904
-
\??\c:\pjjvj.exec:\pjjvj.exe239⤵PID:2736
-
\??\c:\vjvvd.exec:\vjvvd.exe240⤵PID:2740
-
\??\c:\rxllrfl.exec:\rxllrfl.exe241⤵PID:896
-
\??\c:\rxrrxxf.exec:\rxrrxxf.exe242⤵PID:2700