Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-05-2024 05:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
be4da7fede33970820b42f6502ed21e0_NeikiAnalytics.exe
Resource
win7-20240220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
be4da7fede33970820b42f6502ed21e0_NeikiAnalytics.exe
-
Size
78KB
-
MD5
be4da7fede33970820b42f6502ed21e0
-
SHA1
417b7d1c16fc6304591afb998f3891e51baacdd1
-
SHA256
a1ded71c9a5f66be94cc3137dac3f5c318eaa3e7c3a3e6624af1460b99d32c68
-
SHA512
ea00478f57339f144e6ba4b679eee6bc38306066241cccbe7d1b47f557ad1e46f959570cb1a904283ec973acf6985ff78388b6e9cd1773807ff9370616ffd11a
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIgJb31HgxGc+gmvZW6DWfRy:ymb3NkkiQ3mdBjFIUb31HgxL+gmvZW6j
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/2868-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2924-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2508-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1952-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2464-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2468-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1692-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1732-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1344-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2188-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2880-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1984-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1832-203-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/324-211-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1848-239-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/880-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ddjjp.exe9xflfff.exe9thbnt.exejdjpv.exelfxfrxr.exehtthbh.exejjjvp.exexflxfrx.exerxrllrx.exetnhthn.exepjdvv.exerfrflrr.exebtnbht.exehtbbnn.exeddvpv.exerxxxrxf.exefxrxflx.exe7nnnnb.exeddvjd.exeddpjp.exefxlxlxf.exettnhnt.exebhhhth.exe7vpjv.exefflfrxx.exexxflxfx.exevvpvj.exejdpdj.exerxlrlrl.exetbhbbt.exeppdpj.exerrxllrf.exelrxrxxf.exebnttnt.exebbnbbn.exeddjvp.exe5jjdd.exerrfflrx.exetnbbnn.exebhbhbh.exeppjpj.exelrfrrrf.exeffxrrfl.exe9bbnbh.exe7nhhbb.exedddjj.exejjdjp.exefxrlxxr.exelfxrflr.exennntht.exevddpj.exejjvdv.exeppvdv.exefxrllll.exebtnbnn.exellrrxlr.exe7xrrlrf.exe5tthbn.exebththh.exevppvd.exedvppd.exerlfflll.exetnhtbh.exebnntnh.exepid process 2924 ddjjp.exe 2508 9xflfff.exe 2624 9thbnt.exe 2680 jdjpv.exe 1952 lfxfrxr.exe 2572 htthbh.exe 2416 jjjvp.exe 2464 xflxfrx.exe 2468 rxrllrx.exe 2712 tnhthn.exe 2780 pjdvv.exe 1692 rfrflrr.exe 1732 btnbht.exe 1344 htbbnn.exe 2372 ddvpv.exe 2188 rxxxrxf.exe 2880 fxrxflx.exe 1984 7nnnnb.exe 1896 ddvjd.exe 1832 ddpjp.exe 324 fxlxlxf.exe 1404 ttnhnt.exe 1704 bhhhth.exe 1848 7vpjv.exe 2116 fflfrxx.exe 880 xxflxfx.exe 1608 vvpvj.exe 2096 jdpdj.exe 3024 rxlrlrl.exe 1936 tbhbbt.exe 1928 ppdpj.exe 2268 rrxllrf.exe 2540 lrxrxxf.exe 2616 bnttnt.exe 1516 bbnbbn.exe 2684 ddjvp.exe 1948 5jjdd.exe 2420 rrfflrx.exe 2440 tnbbnn.exe 2400 bhbhbh.exe 2572 ppjpj.exe 2328 lrfrrrf.exe 1556 ffxrrfl.exe 2640 9bbnbh.exe 2724 7nhhbb.exe 2720 dddjj.exe 1360 jjdjp.exe 804 fxrlxxr.exe 832 lfxrflr.exe 1880 nnntht.exe 1344 vddpj.exe 1348 jjvdv.exe 2028 ppvdv.exe 2216 fxrllll.exe 2864 btnbnn.exe 1904 llrrxlr.exe 2228 7xrrlrf.exe 668 5tthbn.exe 2064 bththh.exe 972 vppvd.exe 1404 dvppd.exe 840 rlfflll.exe 612 tnhtbh.exe 892 bnntnh.exe -
Processes:
resource yara_rule behavioral1/memory/2868-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2508-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1952-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2464-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2468-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1692-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1732-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1344-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2188-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2880-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1984-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1832-203-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/324-211-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1848-239-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/880-257-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
be4da7fede33970820b42f6502ed21e0_NeikiAnalytics.exeddjjp.exe9xflfff.exe9thbnt.exejdjpv.exelfxfrxr.exehtthbh.exejjjvp.exexflxfrx.exerxrllrx.exetnhthn.exepjdvv.exerfrflrr.exebtnbht.exehtbbnn.exeddvpv.exedescription pid process target process PID 2868 wrote to memory of 2924 2868 be4da7fede33970820b42f6502ed21e0_NeikiAnalytics.exe ddjjp.exe PID 2868 wrote to memory of 2924 2868 be4da7fede33970820b42f6502ed21e0_NeikiAnalytics.exe ddjjp.exe PID 2868 wrote to memory of 2924 2868 be4da7fede33970820b42f6502ed21e0_NeikiAnalytics.exe ddjjp.exe PID 2868 wrote to memory of 2924 2868 be4da7fede33970820b42f6502ed21e0_NeikiAnalytics.exe ddjjp.exe PID 2924 wrote to memory of 2508 2924 ddjjp.exe 9xflfff.exe PID 2924 wrote to memory of 2508 2924 ddjjp.exe 9xflfff.exe PID 2924 wrote to memory of 2508 2924 ddjjp.exe 9xflfff.exe PID 2924 wrote to memory of 2508 2924 ddjjp.exe 9xflfff.exe PID 2508 wrote to memory of 2624 2508 9xflfff.exe 9thbnt.exe PID 2508 wrote to memory of 2624 2508 9xflfff.exe 9thbnt.exe PID 2508 wrote to memory of 2624 2508 9xflfff.exe 9thbnt.exe PID 2508 wrote to memory of 2624 2508 9xflfff.exe 9thbnt.exe PID 2624 wrote to memory of 2680 2624 9thbnt.exe jdjpv.exe PID 2624 wrote to memory of 2680 2624 9thbnt.exe jdjpv.exe PID 2624 wrote to memory of 2680 2624 9thbnt.exe jdjpv.exe PID 2624 wrote to memory of 2680 2624 9thbnt.exe jdjpv.exe PID 2680 wrote to memory of 1952 2680 jdjpv.exe lfxfrxr.exe PID 2680 wrote to memory of 1952 2680 jdjpv.exe lfxfrxr.exe PID 2680 wrote to memory of 1952 2680 jdjpv.exe lfxfrxr.exe PID 2680 wrote to memory of 1952 2680 jdjpv.exe lfxfrxr.exe PID 1952 wrote to memory of 2572 1952 lfxfrxr.exe htthbh.exe PID 1952 wrote to memory of 2572 1952 lfxfrxr.exe htthbh.exe PID 1952 wrote to memory of 2572 1952 lfxfrxr.exe htthbh.exe PID 1952 wrote to memory of 2572 1952 lfxfrxr.exe htthbh.exe PID 2572 wrote to memory of 2416 2572 htthbh.exe jjjvp.exe PID 2572 wrote to memory of 2416 2572 htthbh.exe jjjvp.exe PID 2572 wrote to memory of 2416 2572 htthbh.exe jjjvp.exe PID 2572 wrote to memory of 2416 2572 htthbh.exe jjjvp.exe PID 2416 wrote to memory of 2464 2416 jjjvp.exe xflxfrx.exe PID 2416 wrote to memory of 2464 2416 jjjvp.exe xflxfrx.exe PID 2416 wrote to memory of 2464 2416 jjjvp.exe xflxfrx.exe PID 2416 wrote to memory of 2464 2416 jjjvp.exe xflxfrx.exe PID 2464 wrote to memory of 2468 2464 xflxfrx.exe rxrllrx.exe PID 2464 wrote to memory of 2468 2464 xflxfrx.exe rxrllrx.exe PID 2464 wrote to memory of 2468 2464 xflxfrx.exe rxrllrx.exe PID 2464 wrote to memory of 2468 2464 xflxfrx.exe rxrllrx.exe PID 2468 wrote to memory of 2712 2468 rxrllrx.exe tnhthn.exe PID 2468 wrote to memory of 2712 2468 rxrllrx.exe tnhthn.exe PID 2468 wrote to memory of 2712 2468 rxrllrx.exe tnhthn.exe PID 2468 wrote to memory of 2712 2468 rxrllrx.exe tnhthn.exe PID 2712 wrote to memory of 2780 2712 tnhthn.exe pjdvv.exe PID 2712 wrote to memory of 2780 2712 tnhthn.exe pjdvv.exe PID 2712 wrote to memory of 2780 2712 tnhthn.exe pjdvv.exe PID 2712 wrote to memory of 2780 2712 tnhthn.exe pjdvv.exe PID 2780 wrote to memory of 1692 2780 pjdvv.exe rfrflrr.exe PID 2780 wrote to memory of 1692 2780 pjdvv.exe rfrflrr.exe PID 2780 wrote to memory of 1692 2780 pjdvv.exe rfrflrr.exe PID 2780 wrote to memory of 1692 2780 pjdvv.exe rfrflrr.exe PID 1692 wrote to memory of 1732 1692 rfrflrr.exe btnbht.exe PID 1692 wrote to memory of 1732 1692 rfrflrr.exe btnbht.exe PID 1692 wrote to memory of 1732 1692 rfrflrr.exe btnbht.exe PID 1692 wrote to memory of 1732 1692 rfrflrr.exe btnbht.exe PID 1732 wrote to memory of 1344 1732 btnbht.exe htbbnn.exe PID 1732 wrote to memory of 1344 1732 btnbht.exe htbbnn.exe PID 1732 wrote to memory of 1344 1732 btnbht.exe htbbnn.exe PID 1732 wrote to memory of 1344 1732 btnbht.exe htbbnn.exe PID 1344 wrote to memory of 2372 1344 htbbnn.exe ddvpv.exe PID 1344 wrote to memory of 2372 1344 htbbnn.exe ddvpv.exe PID 1344 wrote to memory of 2372 1344 htbbnn.exe ddvpv.exe PID 1344 wrote to memory of 2372 1344 htbbnn.exe ddvpv.exe PID 2372 wrote to memory of 2188 2372 ddvpv.exe rxxxrxf.exe PID 2372 wrote to memory of 2188 2372 ddvpv.exe rxxxrxf.exe PID 2372 wrote to memory of 2188 2372 ddvpv.exe rxxxrxf.exe PID 2372 wrote to memory of 2188 2372 ddvpv.exe rxxxrxf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be4da7fede33970820b42f6502ed21e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\be4da7fede33970820b42f6502ed21e0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
\??\c:\ddjjp.exec:\ddjjp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\9xflfff.exec:\9xflfff.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\9thbnt.exec:\9thbnt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\jdjpv.exec:\jdjpv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\lfxfrxr.exec:\lfxfrxr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
\??\c:\htthbh.exec:\htthbh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\jjjvp.exec:\jjjvp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\xflxfrx.exec:\xflxfrx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\rxrllrx.exec:\rxrllrx.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\tnhthn.exec:\tnhthn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\pjdvv.exec:\pjdvv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2780 -
\??\c:\rfrflrr.exec:\rfrflrr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\btnbht.exec:\btnbht.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
\??\c:\htbbnn.exec:\htbbnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1344 -
\??\c:\ddvpv.exec:\ddvpv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\rxxxrxf.exec:\rxxxrxf.exe17⤵
- Executes dropped EXE
PID:2188 -
\??\c:\fxrxflx.exec:\fxrxflx.exe18⤵
- Executes dropped EXE
PID:2880 -
\??\c:\7nnnnb.exec:\7nnnnb.exe19⤵
- Executes dropped EXE
PID:1984 -
\??\c:\ddvjd.exec:\ddvjd.exe20⤵
- Executes dropped EXE
PID:1896 -
\??\c:\ddpjp.exec:\ddpjp.exe21⤵
- Executes dropped EXE
PID:1832 -
\??\c:\fxlxlxf.exec:\fxlxlxf.exe22⤵
- Executes dropped EXE
PID:324 -
\??\c:\ttnhnt.exec:\ttnhnt.exe23⤵
- Executes dropped EXE
PID:1404 -
\??\c:\bhhhth.exec:\bhhhth.exe24⤵
- Executes dropped EXE
PID:1704 -
\??\c:\7vpjv.exec:\7vpjv.exe25⤵
- Executes dropped EXE
PID:1848 -
\??\c:\fflfrxx.exec:\fflfrxx.exe26⤵
- Executes dropped EXE
PID:2116 -
\??\c:\xxflxfx.exec:\xxflxfx.exe27⤵
- Executes dropped EXE
PID:880 -
\??\c:\vvpvj.exec:\vvpvj.exe28⤵
- Executes dropped EXE
PID:1608 -
\??\c:\jdpdj.exec:\jdpdj.exe29⤵
- Executes dropped EXE
PID:2096 -
\??\c:\rxlrlrl.exec:\rxlrlrl.exe30⤵
- Executes dropped EXE
PID:3024 -
\??\c:\tbhbbt.exec:\tbhbbt.exe31⤵
- Executes dropped EXE
PID:1936 -
\??\c:\ppdpj.exec:\ppdpj.exe32⤵
- Executes dropped EXE
PID:1928 -
\??\c:\rrxllrf.exec:\rrxllrf.exe33⤵
- Executes dropped EXE
PID:2268 -
\??\c:\lrxrxxf.exec:\lrxrxxf.exe34⤵
- Executes dropped EXE
PID:2540 -
\??\c:\bnttnt.exec:\bnttnt.exe35⤵
- Executes dropped EXE
PID:2616 -
\??\c:\bbnbbn.exec:\bbnbbn.exe36⤵
- Executes dropped EXE
PID:1516 -
\??\c:\ddjvp.exec:\ddjvp.exe37⤵
- Executes dropped EXE
PID:2684 -
\??\c:\5jjdd.exec:\5jjdd.exe38⤵
- Executes dropped EXE
PID:1948 -
\??\c:\rrfflrx.exec:\rrfflrx.exe39⤵
- Executes dropped EXE
PID:2420 -
\??\c:\tnbbnn.exec:\tnbbnn.exe40⤵
- Executes dropped EXE
PID:2440 -
\??\c:\bhbhbh.exec:\bhbhbh.exe41⤵
- Executes dropped EXE
PID:2400 -
\??\c:\ppjpj.exec:\ppjpj.exe42⤵
- Executes dropped EXE
PID:2572 -
\??\c:\lrfrrrf.exec:\lrfrrrf.exe43⤵
- Executes dropped EXE
PID:2328 -
\??\c:\ffxrrfl.exec:\ffxrrfl.exe44⤵
- Executes dropped EXE
PID:1556 -
\??\c:\9bbnbh.exec:\9bbnbh.exe45⤵
- Executes dropped EXE
PID:2640 -
\??\c:\7nhhbb.exec:\7nhhbb.exe46⤵
- Executes dropped EXE
PID:2724 -
\??\c:\dddjj.exec:\dddjj.exe47⤵
- Executes dropped EXE
PID:2720 -
\??\c:\jjdjp.exec:\jjdjp.exe48⤵
- Executes dropped EXE
PID:1360 -
\??\c:\fxrlxxr.exec:\fxrlxxr.exe49⤵
- Executes dropped EXE
PID:804 -
\??\c:\lfxrflr.exec:\lfxrflr.exe50⤵
- Executes dropped EXE
PID:832 -
\??\c:\nnntht.exec:\nnntht.exe51⤵
- Executes dropped EXE
PID:1880 -
\??\c:\vddpj.exec:\vddpj.exe52⤵
- Executes dropped EXE
PID:1344 -
\??\c:\jjvdv.exec:\jjvdv.exe53⤵
- Executes dropped EXE
PID:1348 -
\??\c:\ppvdv.exec:\ppvdv.exe54⤵
- Executes dropped EXE
PID:2028 -
\??\c:\fxrllll.exec:\fxrllll.exe55⤵
- Executes dropped EXE
PID:2216 -
\??\c:\btnbnn.exec:\btnbnn.exe56⤵
- Executes dropped EXE
PID:2864 -
\??\c:\llrrxlr.exec:\llrrxlr.exe57⤵
- Executes dropped EXE
PID:1904 -
\??\c:\7xrrlrf.exec:\7xrrlrf.exe58⤵
- Executes dropped EXE
PID:2228 -
\??\c:\5tthbn.exec:\5tthbn.exe59⤵
- Executes dropped EXE
PID:668 -
\??\c:\bththh.exec:\bththh.exe60⤵
- Executes dropped EXE
PID:2064 -
\??\c:\vppvd.exec:\vppvd.exe61⤵
- Executes dropped EXE
PID:972 -
\??\c:\dvppd.exec:\dvppd.exe62⤵
- Executes dropped EXE
PID:1404 -
\??\c:\rlfflll.exec:\rlfflll.exe63⤵
- Executes dropped EXE
PID:840 -
\??\c:\tnhtbh.exec:\tnhtbh.exe64⤵
- Executes dropped EXE
PID:612 -
\??\c:\bnntnh.exec:\bnntnh.exe65⤵
- Executes dropped EXE
PID:892 -
\??\c:\jjvpv.exec:\jjvpv.exe66⤵PID:2072
-
\??\c:\djjdj.exec:\djjdj.exe67⤵PID:844
-
\??\c:\3fffllr.exec:\3fffllr.exe68⤵PID:1608
-
\??\c:\9bhbht.exec:\9bhbht.exe69⤵PID:288
-
\??\c:\btbbbt.exec:\btbbbt.exe70⤵PID:1416
-
\??\c:\pjddv.exec:\pjddv.exe71⤵PID:1532
-
\??\c:\pddjp.exec:\pddjp.exe72⤵PID:2296
-
\??\c:\1frrfff.exec:\1frrfff.exe73⤵PID:2868
-
\??\c:\rlrfflr.exec:\rlrfflr.exe74⤵PID:2904
-
\??\c:\hbttbb.exec:\hbttbb.exe75⤵PID:2508
-
\??\c:\5nhnbh.exec:\5nhnbh.exe76⤵PID:2304
-
\??\c:\jdddp.exec:\jdddp.exe77⤵PID:2552
-
\??\c:\jdjjv.exec:\jdjjv.exe78⤵PID:2608
-
\??\c:\5lfxllf.exec:\5lfxllf.exe79⤵PID:1028
-
\??\c:\1fflxlf.exec:\1fflxlf.exe80⤵PID:2516
-
\??\c:\hhtttb.exec:\hhtttb.exe81⤵PID:2652
-
\??\c:\btbbtb.exec:\btbbtb.exe82⤵PID:2448
-
\??\c:\vpjpv.exec:\vpjpv.exe83⤵PID:2888
-
\??\c:\lrxxlrr.exec:\lrxxlrr.exe84⤵PID:1588
-
\??\c:\fxrlfrx.exec:\fxrlfrx.exe85⤵PID:2660
-
\??\c:\7tbtnt.exec:\7tbtnt.exe86⤵PID:2384
-
\??\c:\djjjd.exec:\djjjd.exe87⤵PID:2772
-
\??\c:\jvjdp.exec:\jvjdp.exe88⤵PID:1536
-
\??\c:\flrlrlx.exec:\flrlrlx.exe89⤵PID:1196
-
\??\c:\nbhhht.exec:\nbhhht.exe90⤵PID:1692
-
\??\c:\1nnbnn.exec:\1nnbnn.exe91⤵PID:1732
-
\??\c:\djppp.exec:\djppp.exe92⤵PID:2788
-
\??\c:\vjjdj.exec:\vjjdj.exe93⤵PID:1192
-
\??\c:\rrlxrll.exec:\rrlxrll.exe94⤵PID:2016
-
\??\c:\rrflrfx.exec:\rrflrfx.exe95⤵PID:2372
-
\??\c:\hbthbh.exec:\hbthbh.exe96⤵PID:1760
-
\??\c:\hhbthn.exec:\hhbthn.exe97⤵PID:2204
-
\??\c:\jvddp.exec:\jvddp.exe98⤵PID:1628
-
\??\c:\dvvdv.exec:\dvvdv.exe99⤵PID:2240
-
\??\c:\rlxxxfr.exec:\rlxxxfr.exe100⤵PID:336
-
\??\c:\xxrlflx.exec:\xxrlflx.exe101⤵PID:324
-
\??\c:\ntnbnn.exec:\ntnbnn.exe102⤵PID:544
-
\??\c:\5tnhhh.exec:\5tnhhh.exe103⤵PID:1188
-
\??\c:\dddpv.exec:\dddpv.exe104⤵PID:1972
-
\??\c:\ddvvj.exec:\ddvvj.exe105⤵PID:2944
-
\??\c:\flxxxlr.exec:\flxxxlr.exe106⤵PID:3048
-
\??\c:\rxxfrlr.exec:\rxxfrlr.exe107⤵PID:1912
-
\??\c:\tttntt.exec:\tttntt.exe108⤵PID:2988
-
\??\c:\jjpdj.exec:\jjpdj.exe109⤵PID:2480
-
\??\c:\3jpvd.exec:\3jpvd.exe110⤵PID:1208
-
\??\c:\xlxrrll.exec:\xlxrrll.exe111⤵PID:1596
-
\??\c:\xrrfrlx.exec:\xrrfrlx.exe112⤵PID:1976
-
\??\c:\hbthbt.exec:\hbthbt.exe113⤵PID:2152
-
\??\c:\tbhtnh.exec:\tbhtnh.exe114⤵PID:2704
-
\??\c:\djjdj.exec:\djjdj.exe115⤵PID:2976
-
\??\c:\3jdjv.exec:\3jdjv.exe116⤵PID:2540
-
\??\c:\rlrxrfx.exec:\rlrxrfx.exe117⤵PID:2548
-
\??\c:\frllllx.exec:\frllllx.exe118⤵PID:1516
-
\??\c:\hthnbb.exec:\hthnbb.exe119⤵PID:2808
-
\??\c:\ddppp.exec:\ddppp.exe120⤵PID:2696
-
\??\c:\vjddv.exec:\vjddv.exe121⤵PID:2632
-
\??\c:\rrflrrf.exec:\rrflrrf.exe122⤵PID:2440
-
\??\c:\1rffllr.exec:\1rffllr.exe123⤵PID:2292
-
\??\c:\3hbhnb.exec:\3hbhnb.exe124⤵PID:2896
-
\??\c:\nhtbbb.exec:\nhtbbb.exe125⤵PID:2672
-
\??\c:\pjpvp.exec:\pjpvp.exe126⤵PID:2636
-
\??\c:\vdjjp.exec:\vdjjp.exe127⤵PID:2736
-
\??\c:\lfrlrxf.exec:\lfrlrxf.exe128⤵PID:2644
-
\??\c:\5fllxrf.exec:\5fllxrf.exe129⤵PID:296
-
\??\c:\bntbhn.exec:\bntbhn.exe130⤵PID:2172
-
\??\c:\btnhhn.exec:\btnhhn.exe131⤵PID:2124
-
\??\c:\9hhbbn.exec:\9hhbbn.exe132⤵PID:112
-
\??\c:\3jjpv.exec:\3jjpv.exe133⤵PID:2176
-
\??\c:\3vddd.exec:\3vddd.exe134⤵PID:1344
-
\??\c:\fxffllr.exec:\fxffllr.exe135⤵PID:1248
-
\??\c:\rxrrxrf.exec:\rxrrxrf.exe136⤵PID:2880
-
\??\c:\jdvpv.exec:\jdvpv.exe137⤵PID:1984
-
\??\c:\9vvvd.exec:\9vvvd.exe138⤵PID:1240
-
\??\c:\rlxfrrr.exec:\rlxfrrr.exe139⤵PID:1884
-
\??\c:\xllrlxr.exec:\xllrlxr.exe140⤵PID:688
-
\??\c:\3bnbhh.exec:\3bnbhh.exe141⤵PID:1820
-
\??\c:\nbnttt.exec:\nbnttt.exe142⤵PID:1392
-
\??\c:\dpvpv.exec:\dpvpv.exe143⤵PID:348
-
\??\c:\vdddj.exec:\vdddj.exe144⤵PID:1140
-
\??\c:\fflfrlx.exec:\fflfrlx.exe145⤵PID:2200
-
\??\c:\3xlxxxx.exec:\3xlxxxx.exe146⤵PID:2960
-
\??\c:\thbntt.exec:\thbntt.exe147⤵PID:1900
-
\??\c:\hbttnn.exec:\hbttnn.exe148⤵PID:1664
-
\??\c:\jdpvj.exec:\jdpvj.exe149⤵PID:2084
-
\??\c:\pjpvd.exec:\pjpvd.exe150⤵PID:2096
-
\??\c:\xlxrxxx.exec:\xlxrxxx.exe151⤵PID:2380
-
\??\c:\lfxfxlf.exec:\lfxfxlf.exe152⤵PID:1916
-
\??\c:\tnnnbb.exec:\tnnnbb.exe153⤵PID:2796
-
\??\c:\9dvvv.exec:\9dvvv.exe154⤵PID:2588
-
\??\c:\1jvpp.exec:\1jvpp.exe155⤵PID:2952
-
\??\c:\lfrxfrf.exec:\lfrxfrf.exe156⤵PID:2544
-
\??\c:\lfrfrxl.exec:\lfrfrxl.exe157⤵PID:2592
-
\??\c:\7xrxllx.exec:\7xrxllx.exe158⤵PID:2524
-
\??\c:\hntnnh.exec:\hntnnh.exe159⤵PID:2688
-
\??\c:\bbtnnb.exec:\bbtnnb.exe160⤵PID:2708
-
\??\c:\ppvpj.exec:\ppvpj.exe161⤵PID:1952
-
\??\c:\3pdpd.exec:\3pdpd.exe162⤵PID:2432
-
\??\c:\lxflllf.exec:\lxflllf.exe163⤵PID:2408
-
\??\c:\rrlrrfr.exec:\rrlrrfr.exe164⤵PID:2892
-
\??\c:\hthtnn.exec:\hthtnn.exe165⤵PID:1564
-
\??\c:\nhnntn.exec:\nhnntn.exe166⤵PID:1064
-
\??\c:\3vppp.exec:\3vppp.exe167⤵PID:2576
-
\??\c:\ppdjd.exec:\ppdjd.exe168⤵PID:2724
-
\??\c:\5lxrxxf.exec:\5lxrxxf.exe169⤵PID:1528
-
\??\c:\xfxrllx.exec:\xfxrllx.exe170⤵PID:1584
-
\??\c:\httbhb.exec:\httbhb.exe171⤵PID:828
-
\??\c:\btttnb.exec:\btttnb.exe172⤵PID:1504
-
\??\c:\3pddd.exec:\3pddd.exe173⤵PID:1352
-
\??\c:\fflxrfx.exec:\fflxrfx.exe174⤵PID:1256
-
\??\c:\9rrfflr.exec:\9rrfflr.exe175⤵PID:2000
-
\??\c:\hbnnbt.exec:\hbnnbt.exe176⤵PID:2044
-
\??\c:\bntttt.exec:\bntttt.exe177⤵PID:2344
-
\??\c:\pjvjd.exec:\pjvjd.exe178⤵PID:1940
-
\??\c:\7dvjj.exec:\7dvjj.exe179⤵PID:2260
-
\??\c:\rlllxxl.exec:\rlllxxl.exe180⤵PID:1932
-
\??\c:\xrxxrlx.exec:\xrxxrlx.exe181⤵PID:896
-
\??\c:\3nhnht.exec:\3nhnht.exe182⤵PID:1388
-
\??\c:\pjpvp.exec:\pjpvp.exe183⤵PID:1748
-
\??\c:\vjvvj.exec:\vjvvj.exe184⤵PID:1124
-
\??\c:\rfrlrrx.exec:\rfrlrrx.exe185⤵PID:1848
-
\??\c:\ddpdd.exec:\ddpdd.exe186⤵PID:1472
-
\??\c:\3lllflr.exec:\3lllflr.exe187⤵PID:608
-
\??\c:\xrlrxfx.exec:\xrlrxfx.exe188⤵PID:1492
-
\??\c:\hbtbnb.exec:\hbtbnb.exe189⤵PID:2112
-
\??\c:\7nbhhh.exec:\7nbhhh.exe190⤵PID:2816
-
\??\c:\pvvvd.exec:\pvvvd.exe191⤵PID:1716
-
\??\c:\pvdvd.exec:\pvdvd.exe192⤵PID:3024
-
\??\c:\fxllllr.exec:\fxllllr.exe193⤵PID:2936
-
\??\c:\9rxflll.exec:\9rxflll.exe194⤵PID:2920
-
\??\c:\nbtbnn.exec:\nbtbnn.exe195⤵PID:2904
-
\??\c:\jjpjd.exec:\jjpjd.exe196⤵PID:2340
-
\??\c:\ppdjj.exec:\ppdjj.exe197⤵PID:2956
-
\??\c:\vvvvp.exec:\vvvvp.exe198⤵PID:2604
-
\??\c:\rlxlffl.exec:\rlxlffl.exe199⤵PID:2964
-
\??\c:\frrxflr.exec:\frrxflr.exe200⤵PID:2500
-
\??\c:\tthhtn.exec:\tthhtn.exe201⤵PID:2324
-
\??\c:\dpdvd.exec:\dpdvd.exe202⤵PID:2452
-
\??\c:\fxlrxxf.exec:\fxlrxxf.exe203⤵PID:2448
-
\??\c:\xrxlxlr.exec:\xrxlxlr.exe204⤵PID:3068
-
\??\c:\hnhbnn.exec:\hnhbnn.exe205⤵PID:2520
-
\??\c:\hhttbb.exec:\hhttbb.exe206⤵PID:1564
-
\??\c:\ddvpv.exec:\ddvpv.exe207⤵PID:2732
-
\??\c:\fxlfrxl.exec:\fxlfrxl.exe208⤵PID:2384
-
\??\c:\1xrflrx.exec:\1xrflrx.exe209⤵PID:2724
-
\??\c:\bbttbn.exec:\bbttbn.exe210⤵PID:2284
-
\??\c:\hhtbnh.exec:\hhtbnh.exe211⤵PID:328
-
\??\c:\jdvdd.exec:\jdvdd.exe212⤵PID:2356
-
\??\c:\1dvpv.exec:\1dvpv.exe213⤵PID:2312
-
\??\c:\xxxlfrr.exec:\xxxlfrr.exe214⤵PID:2180
-
\??\c:\btbthn.exec:\btbthn.exe215⤵PID:2036
-
\??\c:\vvppj.exec:\vvppj.exe216⤵PID:2016
-
\??\c:\jdddp.exec:\jdddp.exe217⤵PID:2436
-
\??\c:\rlrfllx.exec:\rlrfllx.exe218⤵PID:1984
-
\??\c:\rlrlllr.exec:\rlrlllr.exe219⤵PID:2220
-
\??\c:\htnhtn.exec:\htnhtn.exe220⤵PID:2352
-
\??\c:\djvpp.exec:\djvpp.exe221⤵PID:688
-
\??\c:\vjpjd.exec:\vjpjd.exe222⤵PID:276
-
\??\c:\3lfxllx.exec:\3lfxllx.exe223⤵PID:1388
-
\??\c:\nnbbnh.exec:\nnbbnh.exe224⤵PID:544
-
\??\c:\bthbth.exec:\bthbth.exe225⤵PID:1708
-
\??\c:\pjppj.exec:\pjppj.exe226⤵PID:952
-
\??\c:\dvdjp.exec:\dvdjp.exe227⤵PID:1972
-
\??\c:\xxrxrxr.exec:\xxrxrxr.exe228⤵PID:1472
-
\??\c:\btbhnn.exec:\btbhnn.exe229⤵PID:2108
-
\??\c:\tnbnbb.exec:\tnbnbb.exe230⤵PID:2844
-
\??\c:\3hthbb.exec:\3hthbb.exe231⤵PID:2988
-
\??\c:\pjddp.exec:\pjddp.exe232⤵PID:1080
-
\??\c:\9pdpd.exec:\9pdpd.exe233⤵PID:2096
-
\??\c:\ffrrxlx.exec:\ffrrxlx.exe234⤵PID:3024
-
\??\c:\fxlxlrf.exec:\fxlxlrf.exe235⤵PID:1916
-
\??\c:\btbhhn.exec:\btbhhn.exe236⤵PID:1888
-
\??\c:\ttnhnb.exec:\ttnhnb.exe237⤵PID:2316
-
\??\c:\3pjjv.exec:\3pjjv.exe238⤵PID:2340
-
\??\c:\pdpjd.exec:\pdpjd.exe239⤵PID:2544
-
\??\c:\xxllrxf.exec:\xxllrxf.exe240⤵PID:1616
-
\??\c:\llffxlf.exec:\llffxlf.exe241⤵PID:2688
-
\??\c:\5ttnbh.exec:\5ttnbh.exe242⤵PID:2420