Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 04:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe
-
Size
68KB
-
MD5
ac39b289bc71770f5d7242c48f8dbb70
-
SHA1
b4c166e5426a153ba2f93aa86274c62e43915fe7
-
SHA256
1f76c0949280ad24a805d3631e3b521857e992b87218a234862b9e6976298f79
-
SHA512
99fcbcf24c77e66998a2dfdc4212b8d05571df9cf811531608510f2fc51a5954d06c3caccc5baf65cd977cd810f011c29855f80eff3cb651d98524d9f16e2991
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89+b:ymb3NkkiQ3mdBjFIvl358nLA89K
Malware Config
Signatures
-
Detect Blackmoon payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/856-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1736-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2584-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2612-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1332-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2456-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2212-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2752-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1772-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2344-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2288-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-247-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/832-256-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1780-283-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1528-301-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
hnthhb.exe3pdpd.exexrxrxrx.exettnbnb.exe5vddp.exexxflfxl.exefxffrxf.exetntthh.exe3pdpj.exejjvjv.exexrxlfxl.exe5tnbht.exe3thnnt.exevjvpv.exellfffxf.exehhbhhn.exehbnnht.exepjjvv.exexxlrffx.exelxlrrxx.exettnthn.exe9vvjv.exevddpj.exelfrrrrx.exelfrrflr.exenttnnn.exeddjpj.exefxxxffr.exe1ntbnt.exebtbtnb.exe7jdjj.exe5llrfxl.exe7bnthb.exehbtthn.exe1jdjp.exe1pvvd.exefxllrxr.exennhhtn.exenhtbbb.exepjjvd.exevddvv.exellrrrrf.exe1fxxffl.exetnbhtn.exepjdjp.exevjvdd.exe9rrfrrx.exelllllrr.exentbtbh.exe3bnbhb.exejddpp.exeppdvp.exerxfrrxl.exebhntbn.exebhhtnh.exeddvdp.exejjpvj.exexrxxlrx.exexxfllfl.exetthntn.exejdvdp.exevjpdj.exeffxxflx.exefxxlrxf.exepid process 1736 hnthhb.exe 2908 3pdpd.exe 2584 xrxrxrx.exe 2612 ttnbnb.exe 1332 5vddp.exe 2496 xxflfxl.exe 2456 fxffrxf.exe 2212 tntthh.exe 2904 3pdpj.exe 2752 jjvjv.exe 3000 xrxlfxl.exe 1304 5tnbht.exe 1772 3thnnt.exe 2420 vjvpv.exe 2344 llfffxf.exe 2516 hhbhhn.exe 2288 hbnnht.exe 1324 pjjvv.exe 2300 xxlrffx.exe 2440 lxlrrxx.exe 2840 ttnthn.exe 592 9vvjv.exe 1044 vddpj.exe 2216 lfrrrrx.exe 2332 lfrrflr.exe 832 nttnnn.exe 1088 ddjpj.exe 1288 fxxxffr.exe 1780 1ntbnt.exe 2416 btbtnb.exe 1528 7jdjj.exe 2396 5llrfxl.exe 1616 7bnthb.exe 1760 hbtthn.exe 2796 1jdjp.exe 2744 1pvvd.exe 2580 fxllrxr.exe 2816 nnhhtn.exe 2588 nhtbbb.exe 2988 pjjvd.exe 2736 vddvv.exe 2496 llrrrrf.exe 2500 1fxxffl.exe 2164 tnbhtn.exe 2700 pjdjp.exe 2788 vjvdd.exe 2752 9rrfrrx.exe 1596 lllllrr.exe 2248 ntbtbh.exe 320 3bnbhb.exe 908 jddpp.exe 2184 ppdvp.exe 2344 rxfrrxl.exe 1956 bhntbn.exe 644 bhhtnh.exe 1532 ddvdp.exe 2308 jjpvj.exe 2692 xrxxlrx.exe 1328 xxfllfl.exe 608 tthntn.exe 2552 jdvdp.exe 1508 vjpdj.exe 1792 ffxxflx.exe 1812 fxxlrxf.exe -
Processes:
resource yara_rule behavioral1/memory/856-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1332-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1332-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1332-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1332-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2456-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2212-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2752-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1772-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2344-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2288-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-247-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/832-256-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1780-283-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1528-301-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exehnthhb.exe3pdpd.exexrxrxrx.exettnbnb.exe5vddp.exexxflfxl.exefxffrxf.exetntthh.exe3pdpj.exejjvjv.exexrxlfxl.exe5tnbht.exe3thnnt.exevjvpv.exellfffxf.exedescription pid process target process PID 856 wrote to memory of 1736 856 ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe hnthhb.exe PID 856 wrote to memory of 1736 856 ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe hnthhb.exe PID 856 wrote to memory of 1736 856 ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe hnthhb.exe PID 856 wrote to memory of 1736 856 ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe hnthhb.exe PID 1736 wrote to memory of 2908 1736 hnthhb.exe 3pdpd.exe PID 1736 wrote to memory of 2908 1736 hnthhb.exe 3pdpd.exe PID 1736 wrote to memory of 2908 1736 hnthhb.exe 3pdpd.exe PID 1736 wrote to memory of 2908 1736 hnthhb.exe 3pdpd.exe PID 2908 wrote to memory of 2584 2908 3pdpd.exe xrxrxrx.exe PID 2908 wrote to memory of 2584 2908 3pdpd.exe xrxrxrx.exe PID 2908 wrote to memory of 2584 2908 3pdpd.exe xrxrxrx.exe PID 2908 wrote to memory of 2584 2908 3pdpd.exe xrxrxrx.exe PID 2584 wrote to memory of 2612 2584 xrxrxrx.exe ttnbnb.exe PID 2584 wrote to memory of 2612 2584 xrxrxrx.exe ttnbnb.exe PID 2584 wrote to memory of 2612 2584 xrxrxrx.exe ttnbnb.exe PID 2584 wrote to memory of 2612 2584 xrxrxrx.exe ttnbnb.exe PID 2612 wrote to memory of 1332 2612 ttnbnb.exe 5vddp.exe PID 2612 wrote to memory of 1332 2612 ttnbnb.exe 5vddp.exe PID 2612 wrote to memory of 1332 2612 ttnbnb.exe 5vddp.exe PID 2612 wrote to memory of 1332 2612 ttnbnb.exe 5vddp.exe PID 1332 wrote to memory of 2496 1332 5vddp.exe xxflfxl.exe PID 1332 wrote to memory of 2496 1332 5vddp.exe xxflfxl.exe PID 1332 wrote to memory of 2496 1332 5vddp.exe xxflfxl.exe PID 1332 wrote to memory of 2496 1332 5vddp.exe xxflfxl.exe PID 2496 wrote to memory of 2456 2496 xxflfxl.exe fxffrxf.exe PID 2496 wrote to memory of 2456 2496 xxflfxl.exe fxffrxf.exe PID 2496 wrote to memory of 2456 2496 xxflfxl.exe fxffrxf.exe PID 2496 wrote to memory of 2456 2496 xxflfxl.exe fxffrxf.exe PID 2456 wrote to memory of 2212 2456 fxffrxf.exe tntthh.exe PID 2456 wrote to memory of 2212 2456 fxffrxf.exe tntthh.exe PID 2456 wrote to memory of 2212 2456 fxffrxf.exe tntthh.exe PID 2456 wrote to memory of 2212 2456 fxffrxf.exe tntthh.exe PID 2212 wrote to memory of 2904 2212 tntthh.exe 3pdpj.exe PID 2212 wrote to memory of 2904 2212 tntthh.exe 3pdpj.exe PID 2212 wrote to memory of 2904 2212 tntthh.exe 3pdpj.exe PID 2212 wrote to memory of 2904 2212 tntthh.exe 3pdpj.exe PID 2904 wrote to memory of 2752 2904 3pdpj.exe jjvjv.exe PID 2904 wrote to memory of 2752 2904 3pdpj.exe jjvjv.exe PID 2904 wrote to memory of 2752 2904 3pdpj.exe jjvjv.exe PID 2904 wrote to memory of 2752 2904 3pdpj.exe jjvjv.exe PID 2752 wrote to memory of 3000 2752 jjvjv.exe xrxlfxl.exe PID 2752 wrote to memory of 3000 2752 jjvjv.exe xrxlfxl.exe PID 2752 wrote to memory of 3000 2752 jjvjv.exe xrxlfxl.exe PID 2752 wrote to memory of 3000 2752 jjvjv.exe xrxlfxl.exe PID 3000 wrote to memory of 1304 3000 xrxlfxl.exe 5tnbht.exe PID 3000 wrote to memory of 1304 3000 xrxlfxl.exe 5tnbht.exe PID 3000 wrote to memory of 1304 3000 xrxlfxl.exe 5tnbht.exe PID 3000 wrote to memory of 1304 3000 xrxlfxl.exe 5tnbht.exe PID 1304 wrote to memory of 1772 1304 5tnbht.exe 3thnnt.exe PID 1304 wrote to memory of 1772 1304 5tnbht.exe 3thnnt.exe PID 1304 wrote to memory of 1772 1304 5tnbht.exe 3thnnt.exe PID 1304 wrote to memory of 1772 1304 5tnbht.exe 3thnnt.exe PID 1772 wrote to memory of 2420 1772 3thnnt.exe vjvpv.exe PID 1772 wrote to memory of 2420 1772 3thnnt.exe vjvpv.exe PID 1772 wrote to memory of 2420 1772 3thnnt.exe vjvpv.exe PID 1772 wrote to memory of 2420 1772 3thnnt.exe vjvpv.exe PID 2420 wrote to memory of 2344 2420 vjvpv.exe llfffxf.exe PID 2420 wrote to memory of 2344 2420 vjvpv.exe llfffxf.exe PID 2420 wrote to memory of 2344 2420 vjvpv.exe llfffxf.exe PID 2420 wrote to memory of 2344 2420 vjvpv.exe llfffxf.exe PID 2344 wrote to memory of 2516 2344 llfffxf.exe hhbhhn.exe PID 2344 wrote to memory of 2516 2344 llfffxf.exe hhbhhn.exe PID 2344 wrote to memory of 2516 2344 llfffxf.exe hhbhhn.exe PID 2344 wrote to memory of 2516 2344 llfffxf.exe hhbhhn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ac39b289bc71770f5d7242c48f8dbb70_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\hnthhb.exec:\hnthhb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1736 -
\??\c:\3pdpd.exec:\3pdpd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
\??\c:\xrxrxrx.exec:\xrxrxrx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\ttnbnb.exec:\ttnbnb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\5vddp.exec:\5vddp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
\??\c:\xxflfxl.exec:\xxflfxl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
\??\c:\fxffrxf.exec:\fxffrxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\tntthh.exec:\tntthh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
\??\c:\3pdpj.exec:\3pdpj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\jjvjv.exec:\jjvjv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
\??\c:\xrxlfxl.exec:\xrxlfxl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\5tnbht.exec:\5tnbht.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1304 -
\??\c:\3thnnt.exec:\3thnnt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
\??\c:\vjvpv.exec:\vjvpv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\llfffxf.exec:\llfffxf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2344 -
\??\c:\hhbhhn.exec:\hhbhhn.exe17⤵
- Executes dropped EXE
PID:2516 -
\??\c:\hbnnht.exec:\hbnnht.exe18⤵
- Executes dropped EXE
PID:2288 -
\??\c:\pjjvv.exec:\pjjvv.exe19⤵
- Executes dropped EXE
PID:1324 -
\??\c:\xxlrffx.exec:\xxlrffx.exe20⤵
- Executes dropped EXE
PID:2300 -
\??\c:\lxlrrxx.exec:\lxlrrxx.exe21⤵
- Executes dropped EXE
PID:2440 -
\??\c:\ttnthn.exec:\ttnthn.exe22⤵
- Executes dropped EXE
PID:2840 -
\??\c:\9vvjv.exec:\9vvjv.exe23⤵
- Executes dropped EXE
PID:592 -
\??\c:\vddpj.exec:\vddpj.exe24⤵
- Executes dropped EXE
PID:1044 -
\??\c:\lfrrrrx.exec:\lfrrrrx.exe25⤵
- Executes dropped EXE
PID:2216 -
\??\c:\lfrrflr.exec:\lfrrflr.exe26⤵
- Executes dropped EXE
PID:2332 -
\??\c:\nttnnn.exec:\nttnnn.exe27⤵
- Executes dropped EXE
PID:832 -
\??\c:\ddjpj.exec:\ddjpj.exe28⤵
- Executes dropped EXE
PID:1088 -
\??\c:\fxxxffr.exec:\fxxxffr.exe29⤵
- Executes dropped EXE
PID:1288 -
\??\c:\1ntbnt.exec:\1ntbnt.exe30⤵
- Executes dropped EXE
PID:1780 -
\??\c:\btbtnb.exec:\btbtnb.exe31⤵
- Executes dropped EXE
PID:2416 -
\??\c:\7jdjj.exec:\7jdjj.exe32⤵
- Executes dropped EXE
PID:1528 -
\??\c:\5llrfxl.exec:\5llrfxl.exe33⤵
- Executes dropped EXE
PID:2396 -
\??\c:\7bnthb.exec:\7bnthb.exe34⤵
- Executes dropped EXE
PID:1616 -
\??\c:\hbtthn.exec:\hbtthn.exe35⤵
- Executes dropped EXE
PID:1760 -
\??\c:\1jdjp.exec:\1jdjp.exe36⤵
- Executes dropped EXE
PID:2796 -
\??\c:\1pvvd.exec:\1pvvd.exe37⤵
- Executes dropped EXE
PID:2744 -
\??\c:\fxllrxr.exec:\fxllrxr.exe38⤵
- Executes dropped EXE
PID:2580 -
\??\c:\nnhhtn.exec:\nnhhtn.exe39⤵
- Executes dropped EXE
PID:2816 -
\??\c:\nhtbbb.exec:\nhtbbb.exe40⤵
- Executes dropped EXE
PID:2588 -
\??\c:\pjjvd.exec:\pjjvd.exe41⤵
- Executes dropped EXE
PID:2988 -
\??\c:\vddvv.exec:\vddvv.exe42⤵
- Executes dropped EXE
PID:2736 -
\??\c:\llrrrrf.exec:\llrrrrf.exe43⤵
- Executes dropped EXE
PID:2496 -
\??\c:\1fxxffl.exec:\1fxxffl.exe44⤵
- Executes dropped EXE
PID:2500 -
\??\c:\tnbhtn.exec:\tnbhtn.exe45⤵
- Executes dropped EXE
PID:2164 -
\??\c:\pjdjp.exec:\pjdjp.exe46⤵
- Executes dropped EXE
PID:2700 -
\??\c:\vjvdd.exec:\vjvdd.exe47⤵
- Executes dropped EXE
PID:2788 -
\??\c:\9rrfrrx.exec:\9rrfrrx.exe48⤵
- Executes dropped EXE
PID:2752 -
\??\c:\lllllrr.exec:\lllllrr.exe49⤵
- Executes dropped EXE
PID:1596 -
\??\c:\ntbtbh.exec:\ntbtbh.exe50⤵
- Executes dropped EXE
PID:2248 -
\??\c:\3bnbhb.exec:\3bnbhb.exe51⤵
- Executes dropped EXE
PID:320 -
\??\c:\jddpp.exec:\jddpp.exe52⤵
- Executes dropped EXE
PID:908 -
\??\c:\ppdvp.exec:\ppdvp.exe53⤵
- Executes dropped EXE
PID:2184 -
\??\c:\rxfrrxl.exec:\rxfrrxl.exe54⤵
- Executes dropped EXE
PID:2344 -
\??\c:\bhntbn.exec:\bhntbn.exe55⤵
- Executes dropped EXE
PID:1956 -
\??\c:\bhhtnh.exec:\bhhtnh.exe56⤵
- Executes dropped EXE
PID:644 -
\??\c:\ddvdp.exec:\ddvdp.exe57⤵
- Executes dropped EXE
PID:1532 -
\??\c:\jjpvj.exec:\jjpvj.exe58⤵
- Executes dropped EXE
PID:2308 -
\??\c:\xrxxlrx.exec:\xrxxlrx.exe59⤵
- Executes dropped EXE
PID:2692 -
\??\c:\xxfllfl.exec:\xxfllfl.exe60⤵
- Executes dropped EXE
PID:1328 -
\??\c:\tthntn.exec:\tthntn.exe61⤵
- Executes dropped EXE
PID:608 -
\??\c:\jdvdp.exec:\jdvdp.exe62⤵
- Executes dropped EXE
PID:2552 -
\??\c:\vjpdj.exec:\vjpdj.exe63⤵
- Executes dropped EXE
PID:1508 -
\??\c:\ffxxflx.exec:\ffxxflx.exe64⤵
- Executes dropped EXE
PID:1792 -
\??\c:\fxxlrxf.exec:\fxxlrxf.exe65⤵
- Executes dropped EXE
PID:1812 -
\??\c:\5ththn.exec:\5ththn.exe66⤵PID:1392
-
\??\c:\bbnthn.exec:\bbnthn.exe67⤵PID:1116
-
\??\c:\nnhhnn.exec:\nnhhnn.exe68⤵PID:1216
-
\??\c:\ddvdd.exec:\ddvdd.exe69⤵PID:2240
-
\??\c:\lfxlrfr.exec:\lfxlrfr.exe70⤵PID:2944
-
\??\c:\5lfrrrl.exec:\5lfrrrl.exe71⤵PID:2380
-
\??\c:\hbtbnn.exec:\hbtbnn.exe72⤵PID:1396
-
\??\c:\bbnbtb.exec:\bbnbtb.exe73⤵PID:1724
-
\??\c:\ddvvv.exec:\ddvvv.exe74⤵PID:2540
-
\??\c:\dvjdv.exec:\dvjdv.exe75⤵PID:2396
-
\??\c:\rlxrllf.exec:\rlxrllf.exe76⤵PID:2356
-
\??\c:\3fllfrx.exec:\3fllfrx.exe77⤵PID:2636
-
\??\c:\1tnthn.exec:\1tnthn.exe78⤵PID:3052
-
\??\c:\1hhntb.exec:\1hhntb.exe79⤵PID:2584
-
\??\c:\djdpp.exec:\djdpp.exe80⤵PID:2604
-
\??\c:\rrxxrrx.exec:\rrxxrrx.exe81⤵PID:2572
-
\??\c:\1frxllx.exec:\1frxllx.exe82⤵PID:2712
-
\??\c:\nbbbnt.exec:\nbbbnt.exe83⤵PID:2484
-
\??\c:\pjvvj.exec:\pjvvj.exe84⤵PID:2476
-
\??\c:\3jpjp.exec:\3jpjp.exe85⤵PID:2936
-
\??\c:\frxrfff.exec:\frxrfff.exe86⤵PID:500
-
\??\c:\lllrlxx.exec:\lllrlxx.exe87⤵PID:2640
-
\??\c:\htthtt.exec:\htthtt.exe88⤵PID:2544
-
\??\c:\hbnbtb.exec:\hbnbtb.exe89⤵PID:2264
-
\??\c:\vvjvv.exec:\vvjvv.exe90⤵PID:2752
-
\??\c:\lrxlrlf.exec:\lrxlrlf.exe91⤵PID:2304
-
\??\c:\xxxfxll.exec:\xxxfxll.exe92⤵PID:1972
-
\??\c:\hhtbbn.exec:\hhtbbn.exe93⤵PID:2376
-
\??\c:\vvvdd.exec:\vvvdd.exe94⤵PID:1976
-
\??\c:\dvpjj.exec:\dvpjj.exe95⤵PID:2644
-
\??\c:\flffrfl.exec:\flffrfl.exe96⤵PID:2524
-
\??\c:\tbbnnb.exec:\tbbnnb.exe97⤵PID:1800
-
\??\c:\thbnbt.exec:\thbnbt.exe98⤵PID:2244
-
\??\c:\3dppp.exec:\3dppp.exe99⤵PID:2084
-
\??\c:\llfxxxr.exec:\llfxxxr.exe100⤵PID:2092
-
\??\c:\xxffffx.exec:\xxffffx.exe101⤵PID:2440
-
\??\c:\hhbntn.exec:\hhbntn.exe102⤵PID:2436
-
\??\c:\bthhhh.exec:\bthhhh.exe103⤵PID:1188
-
\??\c:\9tnbhh.exec:\9tnbhh.exe104⤵PID:540
-
\??\c:\3jvpv.exec:\3jvpv.exe105⤵PID:1872
-
\??\c:\htnhht.exec:\htnhht.exe106⤵PID:1664
-
\??\c:\nnthhb.exec:\nnthhb.exe107⤵PID:2324
-
\??\c:\jdvdv.exec:\jdvdv.exe108⤵PID:624
-
\??\c:\jdddj.exec:\jdddj.exe109⤵PID:1696
-
\??\c:\lfrflxr.exec:\lfrflxr.exe110⤵PID:1216
-
\??\c:\lxrxffr.exec:\lxrxffr.exe111⤵PID:3048
-
\??\c:\7htbhh.exec:\7htbhh.exe112⤵PID:1004
-
\??\c:\1bbbnb.exec:\1bbbnb.exe113⤵PID:1864
-
\??\c:\pjddv.exec:\pjddv.exe114⤵PID:2036
-
\??\c:\vjdvv.exec:\vjdvv.exe115⤵PID:912
-
\??\c:\3fflrxf.exec:\3fflrxf.exe116⤵PID:2540
-
\??\c:\xlxllxr.exec:\xlxllxr.exe117⤵PID:2368
-
\??\c:\tnbhnt.exec:\tnbhnt.exe118⤵PID:1616
-
\??\c:\btnnnt.exec:\btnnnt.exe119⤵PID:2664
-
\??\c:\pjpdd.exec:\pjpdd.exe120⤵PID:2796
-
\??\c:\rffrlrx.exec:\rffrlrx.exe121⤵PID:2680
-
\??\c:\xrxlrrl.exec:\xrxlrrl.exe122⤵PID:2492
-
\??\c:\nhbhnb.exec:\nhbhnb.exe123⤵PID:2588
-
\??\c:\nhbbhn.exec:\nhbbhn.exe124⤵PID:2728
-
\??\c:\djvvd.exec:\djvvd.exe125⤵PID:2624
-
\??\c:\ppjvv.exec:\ppjvv.exe126⤵PID:2496
-
\??\c:\ffrxxfr.exec:\ffrxxfr.exe127⤵PID:2212
-
\??\c:\lfrrfxf.exec:\lfrrfxf.exe128⤵PID:2164
-
\??\c:\nhntbh.exec:\nhntbh.exe129⤵PID:2700
-
\??\c:\3nhhhn.exec:\3nhhhn.exe130⤵PID:2788
-
\??\c:\dvjpv.exec:\dvjpv.exe131⤵PID:2348
-
\??\c:\5jddv.exec:\5jddv.exe132⤵PID:2280
-
\??\c:\lfxxlrx.exec:\lfxxlrx.exe133⤵PID:1476
-
\??\c:\xllllll.exec:\xllllll.exe134⤵PID:320
-
\??\c:\ttnbtt.exec:\ttnbtt.exe135⤵PID:2704
-
\??\c:\bbnnnn.exec:\bbnnnn.exe136⤵PID:2184
-
\??\c:\jpvpp.exec:\jpvpp.exe137⤵PID:2444
-
\??\c:\vpdjj.exec:\vpdjj.exe138⤵PID:2344
-
\??\c:\rrffrrf.exec:\rrffrrf.exe139⤵PID:644
-
\??\c:\ffflrxx.exec:\ffflrxx.exe140⤵PID:1532
-
\??\c:\bthhtb.exec:\bthhtb.exe141⤵PID:2948
-
\??\c:\btbtht.exec:\btbtht.exe142⤵PID:2308
-
\??\c:\pdpjv.exec:\pdpjv.exe143⤵PID:324
-
\??\c:\9djjj.exec:\9djjj.exe144⤵PID:608
-
\??\c:\lflfxrx.exec:\lflfxrx.exe145⤵PID:272
-
\??\c:\thbttn.exec:\thbttn.exe146⤵PID:2552
-
\??\c:\btbhtb.exec:\btbhtb.exe147⤵PID:924
-
\??\c:\vvpvv.exec:\vvpvv.exe148⤵PID:1812
-
\??\c:\pvjpv.exec:\pvjpv.exe149⤵PID:1392
-
\??\c:\lfrfxrx.exec:\lfrfxrx.exe150⤵PID:752
-
\??\c:\lxllrrx.exec:\lxllrrx.exe151⤵PID:2956
-
\??\c:\btnhnn.exec:\btnhnn.exe152⤵PID:1752
-
\??\c:\btbhhh.exec:\btbhhh.exe153⤵PID:1288
-
\??\c:\jdvdj.exec:\jdvdj.exe154⤵PID:2860
-
\??\c:\vdjvp.exec:\vdjvp.exe155⤵PID:1780
-
\??\c:\9rlxlxr.exec:\9rlxlxr.exe156⤵PID:1524
-
\??\c:\hbnnbb.exec:\hbnnbb.exe157⤵PID:1724
-
\??\c:\7djjj.exec:\7djjj.exe158⤵PID:2032
-
\??\c:\pjdvj.exec:\pjdvj.exe159⤵PID:2596
-
\??\c:\lfxxlrf.exec:\lfxxlrf.exe160⤵PID:2356
-
\??\c:\frxfxfr.exec:\frxfxfr.exe161⤵PID:2744
-
\??\c:\1thhhn.exec:\1thhhn.exe162⤵PID:2908
-
\??\c:\bhnhhh.exec:\bhnhhh.exe163⤵PID:2604
-
\??\c:\vvjvp.exec:\vvjvp.exe164⤵PID:2580
-
\??\c:\pjppp.exec:\pjppp.exe165⤵PID:2780
-
\??\c:\frlxllx.exec:\frlxllx.exe166⤵PID:2568
-
\??\c:\hhbbnb.exec:\hhbbnb.exe167⤵PID:2476
-
\??\c:\7bttnn.exec:\7bttnn.exe168⤵PID:2200
-
\??\c:\dddjd.exec:\dddjd.exe169⤵PID:2904
-
\??\c:\7pjjv.exec:\7pjjv.exe170⤵PID:292
-
\??\c:\xxflxfr.exec:\xxflxfr.exe171⤵PID:2544
-
\??\c:\xxfrfrl.exec:\xxfrfrl.exe172⤵PID:2264
-
\??\c:\htbbbb.exec:\htbbbb.exe173⤵PID:1600
-
\??\c:\1djjd.exec:\1djjd.exe174⤵PID:2280
-
\??\c:\9dvdv.exec:\9dvdv.exe175⤵PID:784
-
\??\c:\7rlflxl.exec:\7rlflxl.exe176⤵PID:2376
-
\??\c:\frxflfl.exec:\frxflfl.exe177⤵PID:1976
-
\??\c:\hbtbhh.exec:\hbtbhh.exe178⤵PID:2644
-
\??\c:\hbnnhn.exec:\hbnnhn.exe179⤵PID:1776
-
\??\c:\3pvdp.exec:\3pvdp.exe180⤵PID:2524
-
\??\c:\pjjpj.exec:\pjjpj.exe181⤵PID:2108
-
\??\c:\3lfllfr.exec:\3lfllfr.exe182⤵PID:2832
-
\??\c:\lxlxrxx.exec:\lxlxrxx.exe183⤵PID:2692
-
\??\c:\tntnhb.exec:\tntnhb.exe184⤵PID:2308
-
\??\c:\pjdpp.exec:\pjdpp.exe185⤵PID:2436
-
\??\c:\fxlllxx.exec:\fxlllxx.exe186⤵PID:1188
-
\??\c:\lxfffxr.exec:\lxfffxr.exe187⤵PID:1508
-
\??\c:\hhtbnb.exec:\hhtbnb.exe188⤵PID:1872
-
\??\c:\tttntb.exec:\tttntb.exe189⤵PID:1664
-
\??\c:\ddvvp.exec:\ddvvp.exe190⤵PID:1812
-
\??\c:\dppjd.exec:\dppjd.exe191⤵PID:2216
-
\??\c:\1rxxrxf.exec:\1rxxrxf.exe192⤵PID:2820
-
\??\c:\fxffrrf.exec:\fxffrrf.exe193⤵PID:920
-
\??\c:\fxxfrrx.exec:\fxxfrrx.exe194⤵PID:1752
-
\??\c:\tnnnnn.exec:\tnnnnn.exe195⤵PID:2008
-
\??\c:\vvjjj.exec:\vvjjj.exe196⤵PID:2860
-
\??\c:\jdppp.exec:\jdppp.exe197⤵PID:1864
-
\??\c:\vjvvd.exec:\vjvvd.exe198⤵PID:1524
-
\??\c:\xlxlxxf.exec:\xlxlxxf.exe199⤵PID:912
-
\??\c:\xlrfxff.exec:\xlrfxff.exe200⤵PID:2032
-
\??\c:\1nbbnt.exec:\1nbbnt.exe201⤵PID:1736
-
\??\c:\1hbbht.exec:\1hbbht.exe202⤵PID:2356
-
\??\c:\dvpjd.exec:\dvpjd.exe203⤵PID:2964
-
\??\c:\ppjvd.exec:\ppjvd.exe204⤵PID:2688
-
\??\c:\rlxflrx.exec:\rlxflrx.exe205⤵PID:2716
-
\??\c:\xrflrxr.exec:\xrflrxr.exe206⤵PID:2580
-
\??\c:\hbbnht.exec:\hbbnht.exe207⤵PID:2616
-
\??\c:\hhhntn.exec:\hhhntn.exe208⤵PID:2772
-
\??\c:\9pvjp.exec:\9pvjp.exe209⤵PID:2708
-
\??\c:\djjjj.exec:\djjjj.exe210⤵PID:2496
-
\??\c:\fflllll.exec:\fflllll.exe211⤵PID:2488
-
\??\c:\1xxlxfr.exec:\1xxlxfr.exe212⤵PID:2164
-
\??\c:\bnbhtn.exec:\bnbhtn.exe213⤵PID:1628
-
\??\c:\pdjjv.exec:\pdjjv.exe214⤵PID:2264
-
\??\c:\vpvjd.exec:\vpvjd.exe215⤵PID:1952
-
\??\c:\5flrxfl.exec:\5flrxfl.exe216⤵PID:2280
-
\??\c:\lllfrlx.exec:\lllfrlx.exe217⤵PID:2248
-
\??\c:\3hntbt.exec:\3hntbt.exe218⤵PID:2376
-
\??\c:\9nhtbh.exec:\9nhtbh.exe219⤵PID:1648
-
\??\c:\jvvpj.exec:\jvvpj.exe220⤵PID:908
-
\??\c:\7jdpd.exec:\7jdpd.exe221⤵PID:1636
-
\??\c:\rlxxfff.exec:\rlxxfff.exe222⤵PID:2524
-
\??\c:\rlllxfl.exec:\rlllxfl.exe223⤵PID:2288
-
\??\c:\1bnbtt.exec:\1bnbtt.exe224⤵PID:2832
-
\??\c:\btntnb.exec:\btntnb.exe225⤵PID:852
-
\??\c:\1jddd.exec:\1jddd.exe226⤵PID:532
-
\??\c:\vpjjv.exec:\vpjjv.exe227⤵PID:2208
-
\??\c:\rrrxllr.exec:\rrrxllr.exe228⤵PID:1188
-
\??\c:\3ffflrr.exec:\3ffflrr.exe229⤵PID:1928
-
\??\c:\lrlllrx.exec:\lrlllrx.exe230⤵PID:1872
-
\??\c:\tthtnh.exec:\tthtnh.exe231⤵PID:1676
-
\??\c:\thbbnn.exec:\thbbnn.exe232⤵PID:1664
-
\??\c:\vpvdd.exec:\vpvdd.exe233⤵PID:2848
-
\??\c:\pjvpp.exec:\pjvpp.exe234⤵PID:2216
-
\??\c:\5xxxffl.exec:\5xxxffl.exe235⤵PID:2000
-
\??\c:\lfxflfl.exec:\lfxflfl.exe236⤵PID:920
-
\??\c:\nhhbbt.exec:\nhhbbt.exe237⤵PID:1280
-
\??\c:\3tntbh.exec:\3tntbh.exe238⤵PID:2008
-
\??\c:\vpvvj.exec:\vpvvj.exe239⤵PID:2192
-
\??\c:\5vvdv.exec:\5vvdv.exe240⤵PID:1780
-
\??\c:\9xrrrrx.exec:\9xrrrrx.exe241⤵PID:2396
-
\??\c:\1xflxrf.exec:\1xflxrf.exe242⤵PID:912