Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 20:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b197561305b5d0d81936568344229e0_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
0b197561305b5d0d81936568344229e0_NeikiAnalytics.exe
-
Size
55KB
-
MD5
0b197561305b5d0d81936568344229e0
-
SHA1
ed43c6508dce4dad6697df5a27660a0d4abb8cd6
-
SHA256
43ee29e67a23093436b15fc4b30767d8e5e1117e46fddbb595ed3768cd000ff0
-
SHA512
4bd600b94f4e3aaf8a947d7960b49accc0960171570a2accebf62746cce7c173bbdbea981997b29db160d4e0ecc4e75052baec3198b3897fc52b7c0ad745dc2a
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIfEVp:ymb3NkkiQ3mdBjFI0
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2292-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2276-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3032-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2512-42-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3064-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3064-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2364-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2424-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1904-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1924-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1984-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/936-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1716-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2164-224-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1060-242-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3060-305-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
hjbfxb.exeljbtx.exeljpflbf.exejvxpnr.exenpphjd.exehxbbp.exevlhdx.exehhfjvb.exerxhrt.exehbxrdl.exefllfjtj.exendfvxvb.exerjnfh.exexppffj.exeldprhxr.exeprftbjf.exejtvjrd.exevhfjlhf.exedtdtp.exenbrbbn.exebhplxdj.exethhjn.exevhvvnn.exenfnnv.exenxxltpf.exelhnnnj.exevpxthv.exexldjdr.exeljttthf.exedhtvv.exedxjnjfh.exenrjnpj.exefbvtlrp.exebffxltv.exeptplxnl.exexdxhn.exenpftt.exetvhdt.exevfpbbr.exerhprlrf.exehhpvjv.exebrhvjrb.exehdltp.exerxrtx.exettvhjp.exerthvjph.exevnttph.exefplpn.exebjhxt.exetjnnp.exendvflr.exebjpxpr.exebbvlpt.exextffx.exepjjpnbp.exefdlxx.exenprln.exeljxxv.exexpflhn.exenffhnf.exefjxth.exepjtrbvj.exejvdlp.exetbvpv.exepid process 2276 hjbfxb.exe 3032 ljbtx.exe 2512 ljpflbf.exe 2772 jvxpnr.exe 2680 npphjd.exe 3064 hxbbp.exe 2364 vlhdx.exe 2840 hhfjvb.exe 1160 rxhrt.exe 2424 hbxrdl.exe 2580 fllfjtj.exe 1904 ndfvxvb.exe 1924 rjnfh.exe 2256 xppffj.exe 1984 ldprhxr.exe 752 prftbjf.exe 936 jtvjrd.exe 1748 vhfjlhf.exe 2728 dtdtp.exe 1716 nbrbbn.exe 2780 bhplxdj.exe 2164 thhjn.exe 3020 vhvvnn.exe 1060 nfnnv.exe 980 nxxltpf.exe 1560 lhnnnj.exe 1484 vpxthv.exe 2960 xldjdr.exe 2308 ljttthf.exe 2892 dhtvv.exe 3060 dxjnjfh.exe 2440 nrjnpj.exe 2292 fbvtlrp.exe 1132 bffxltv.exe 3032 ptplxnl.exe 2504 xdxhn.exe 2660 npftt.exe 2628 tvhdt.exe 2480 vfpbbr.exe 2644 rhprlrf.exe 2520 hhpvjv.exe 2492 brhvjrb.exe 2420 hdltp.exe 2368 rxrtx.exe 2476 ttvhjp.exe 564 rthvjph.exe 2560 vnttph.exe 2424 fplpn.exe 2564 bjhxt.exe 1772 tjnnp.exe 1136 ndvflr.exe 1252 bjpxpr.exe 636 bbvlpt.exe 2180 xtffx.exe 1172 pjjpnbp.exe 932 fdlxx.exe 2812 nprln.exe 2852 ljxxv.exe 524 xpflhn.exe 2768 nffhnf.exe 1988 fjxth.exe 2232 pjtrbvj.exe 3008 jvdlp.exe 1968 tbvpv.exe -
Processes:
resource yara_rule behavioral1/memory/2292-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2292-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2276-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3032-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2512-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2512-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3064-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2364-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1904-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1924-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1984-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/936-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1716-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2164-224-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1060-242-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-305-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0b197561305b5d0d81936568344229e0_NeikiAnalytics.exehjbfxb.exeljbtx.exeljpflbf.exejvxpnr.exenpphjd.exehxbbp.exevlhdx.exehhfjvb.exerxhrt.exehbxrdl.exefllfjtj.exendfvxvb.exerjnfh.exexppffj.exeldprhxr.exedescription pid process target process PID 2292 wrote to memory of 2276 2292 0b197561305b5d0d81936568344229e0_NeikiAnalytics.exe hjbfxb.exe PID 2292 wrote to memory of 2276 2292 0b197561305b5d0d81936568344229e0_NeikiAnalytics.exe hjbfxb.exe PID 2292 wrote to memory of 2276 2292 0b197561305b5d0d81936568344229e0_NeikiAnalytics.exe hjbfxb.exe PID 2292 wrote to memory of 2276 2292 0b197561305b5d0d81936568344229e0_NeikiAnalytics.exe hjbfxb.exe PID 2276 wrote to memory of 3032 2276 hjbfxb.exe ljbtx.exe PID 2276 wrote to memory of 3032 2276 hjbfxb.exe ljbtx.exe PID 2276 wrote to memory of 3032 2276 hjbfxb.exe ljbtx.exe PID 2276 wrote to memory of 3032 2276 hjbfxb.exe ljbtx.exe PID 3032 wrote to memory of 2512 3032 ljbtx.exe ljpflbf.exe PID 3032 wrote to memory of 2512 3032 ljbtx.exe ljpflbf.exe PID 3032 wrote to memory of 2512 3032 ljbtx.exe ljpflbf.exe PID 3032 wrote to memory of 2512 3032 ljbtx.exe ljpflbf.exe PID 2512 wrote to memory of 2772 2512 ljpflbf.exe jvxpnr.exe PID 2512 wrote to memory of 2772 2512 ljpflbf.exe jvxpnr.exe PID 2512 wrote to memory of 2772 2512 ljpflbf.exe jvxpnr.exe PID 2512 wrote to memory of 2772 2512 ljpflbf.exe jvxpnr.exe PID 2772 wrote to memory of 2680 2772 jvxpnr.exe npphjd.exe PID 2772 wrote to memory of 2680 2772 jvxpnr.exe npphjd.exe PID 2772 wrote to memory of 2680 2772 jvxpnr.exe npphjd.exe PID 2772 wrote to memory of 2680 2772 jvxpnr.exe npphjd.exe PID 2680 wrote to memory of 3064 2680 npphjd.exe hxbbp.exe PID 2680 wrote to memory of 3064 2680 npphjd.exe hxbbp.exe PID 2680 wrote to memory of 3064 2680 npphjd.exe hxbbp.exe PID 2680 wrote to memory of 3064 2680 npphjd.exe hxbbp.exe PID 3064 wrote to memory of 2364 3064 hxbbp.exe vlhdx.exe PID 3064 wrote to memory of 2364 3064 hxbbp.exe vlhdx.exe PID 3064 wrote to memory of 2364 3064 hxbbp.exe vlhdx.exe PID 3064 wrote to memory of 2364 3064 hxbbp.exe vlhdx.exe PID 2364 wrote to memory of 2840 2364 vlhdx.exe hhfjvb.exe PID 2364 wrote to memory of 2840 2364 vlhdx.exe hhfjvb.exe PID 2364 wrote to memory of 2840 2364 vlhdx.exe hhfjvb.exe PID 2364 wrote to memory of 2840 2364 vlhdx.exe hhfjvb.exe PID 2840 wrote to memory of 1160 2840 hhfjvb.exe rxhrt.exe PID 2840 wrote to memory of 1160 2840 hhfjvb.exe rxhrt.exe PID 2840 wrote to memory of 1160 2840 hhfjvb.exe rxhrt.exe PID 2840 wrote to memory of 1160 2840 hhfjvb.exe rxhrt.exe PID 1160 wrote to memory of 2424 1160 rxhrt.exe hbxrdl.exe PID 1160 wrote to memory of 2424 1160 rxhrt.exe hbxrdl.exe PID 1160 wrote to memory of 2424 1160 rxhrt.exe hbxrdl.exe PID 1160 wrote to memory of 2424 1160 rxhrt.exe hbxrdl.exe PID 2424 wrote to memory of 2580 2424 hbxrdl.exe fllfjtj.exe PID 2424 wrote to memory of 2580 2424 hbxrdl.exe fllfjtj.exe PID 2424 wrote to memory of 2580 2424 hbxrdl.exe fllfjtj.exe PID 2424 wrote to memory of 2580 2424 hbxrdl.exe fllfjtj.exe PID 2580 wrote to memory of 1904 2580 fllfjtj.exe ndfvxvb.exe PID 2580 wrote to memory of 1904 2580 fllfjtj.exe ndfvxvb.exe PID 2580 wrote to memory of 1904 2580 fllfjtj.exe ndfvxvb.exe PID 2580 wrote to memory of 1904 2580 fllfjtj.exe ndfvxvb.exe PID 1904 wrote to memory of 1924 1904 ndfvxvb.exe rjnfh.exe PID 1904 wrote to memory of 1924 1904 ndfvxvb.exe rjnfh.exe PID 1904 wrote to memory of 1924 1904 ndfvxvb.exe rjnfh.exe PID 1904 wrote to memory of 1924 1904 ndfvxvb.exe rjnfh.exe PID 1924 wrote to memory of 2256 1924 rjnfh.exe xppffj.exe PID 1924 wrote to memory of 2256 1924 rjnfh.exe xppffj.exe PID 1924 wrote to memory of 2256 1924 rjnfh.exe xppffj.exe PID 1924 wrote to memory of 2256 1924 rjnfh.exe xppffj.exe PID 2256 wrote to memory of 1984 2256 xppffj.exe ldprhxr.exe PID 2256 wrote to memory of 1984 2256 xppffj.exe ldprhxr.exe PID 2256 wrote to memory of 1984 2256 xppffj.exe ldprhxr.exe PID 2256 wrote to memory of 1984 2256 xppffj.exe ldprhxr.exe PID 1984 wrote to memory of 752 1984 ldprhxr.exe prftbjf.exe PID 1984 wrote to memory of 752 1984 ldprhxr.exe prftbjf.exe PID 1984 wrote to memory of 752 1984 ldprhxr.exe prftbjf.exe PID 1984 wrote to memory of 752 1984 ldprhxr.exe prftbjf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b197561305b5d0d81936568344229e0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\0b197561305b5d0d81936568344229e0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
\??\c:\hjbfxb.exec:\hjbfxb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
\??\c:\ljbtx.exec:\ljbtx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3032 -
\??\c:\ljpflbf.exec:\ljpflbf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2512 -
\??\c:\jvxpnr.exec:\jvxpnr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\npphjd.exec:\npphjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\hxbbp.exec:\hxbbp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\vlhdx.exec:\vlhdx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\hhfjvb.exec:\hhfjvb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
\??\c:\rxhrt.exec:\rxhrt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
\??\c:\hbxrdl.exec:\hbxrdl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\fllfjtj.exec:\fllfjtj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\ndfvxvb.exec:\ndfvxvb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
\??\c:\rjnfh.exec:\rjnfh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\xppffj.exec:\xppffj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2256 -
\??\c:\ldprhxr.exec:\ldprhxr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
\??\c:\prftbjf.exec:\prftbjf.exe17⤵
- Executes dropped EXE
PID:752 -
\??\c:\jtvjrd.exec:\jtvjrd.exe18⤵
- Executes dropped EXE
PID:936 -
\??\c:\vhfjlhf.exec:\vhfjlhf.exe19⤵
- Executes dropped EXE
PID:1748 -
\??\c:\dtdtp.exec:\dtdtp.exe20⤵
- Executes dropped EXE
PID:2728 -
\??\c:\nbrbbn.exec:\nbrbbn.exe21⤵
- Executes dropped EXE
PID:1716 -
\??\c:\bhplxdj.exec:\bhplxdj.exe22⤵
- Executes dropped EXE
PID:2780 -
\??\c:\thhjn.exec:\thhjn.exe23⤵
- Executes dropped EXE
PID:2164 -
\??\c:\vhvvnn.exec:\vhvvnn.exe24⤵
- Executes dropped EXE
PID:3020 -
\??\c:\nfnnv.exec:\nfnnv.exe25⤵
- Executes dropped EXE
PID:1060 -
\??\c:\nxxltpf.exec:\nxxltpf.exe26⤵
- Executes dropped EXE
PID:980 -
\??\c:\lhnnnj.exec:\lhnnnj.exe27⤵
- Executes dropped EXE
PID:1560 -
\??\c:\vpxthv.exec:\vpxthv.exe28⤵
- Executes dropped EXE
PID:1484 -
\??\c:\xldjdr.exec:\xldjdr.exe29⤵
- Executes dropped EXE
PID:2960 -
\??\c:\ljttthf.exec:\ljttthf.exe30⤵
- Executes dropped EXE
PID:2308 -
\??\c:\dhtvv.exec:\dhtvv.exe31⤵
- Executes dropped EXE
PID:2892 -
\??\c:\dxjnjfh.exec:\dxjnjfh.exe32⤵
- Executes dropped EXE
PID:3060 -
\??\c:\nrjnpj.exec:\nrjnpj.exe33⤵
- Executes dropped EXE
PID:2440 -
\??\c:\fbvtlrp.exec:\fbvtlrp.exe34⤵
- Executes dropped EXE
PID:2292 -
\??\c:\bffxltv.exec:\bffxltv.exe35⤵
- Executes dropped EXE
PID:1132 -
\??\c:\ptplxnl.exec:\ptplxnl.exe36⤵
- Executes dropped EXE
PID:3032 -
\??\c:\xdxhn.exec:\xdxhn.exe37⤵
- Executes dropped EXE
PID:2504 -
\??\c:\npftt.exec:\npftt.exe38⤵
- Executes dropped EXE
PID:2660 -
\??\c:\tvhdt.exec:\tvhdt.exe39⤵
- Executes dropped EXE
PID:2628 -
\??\c:\vfpbbr.exec:\vfpbbr.exe40⤵
- Executes dropped EXE
PID:2480 -
\??\c:\rhprlrf.exec:\rhprlrf.exe41⤵
- Executes dropped EXE
PID:2644 -
\??\c:\hhpvjv.exec:\hhpvjv.exe42⤵
- Executes dropped EXE
PID:2520 -
\??\c:\brhvjrb.exec:\brhvjrb.exe43⤵
- Executes dropped EXE
PID:2492 -
\??\c:\hdltp.exec:\hdltp.exe44⤵
- Executes dropped EXE
PID:2420 -
\??\c:\rxrtx.exec:\rxrtx.exe45⤵
- Executes dropped EXE
PID:2368 -
\??\c:\ttvhjp.exec:\ttvhjp.exe46⤵
- Executes dropped EXE
PID:2476 -
\??\c:\rthvjph.exec:\rthvjph.exe47⤵
- Executes dropped EXE
PID:564 -
\??\c:\vnttph.exec:\vnttph.exe48⤵
- Executes dropped EXE
PID:2560 -
\??\c:\fplpn.exec:\fplpn.exe49⤵
- Executes dropped EXE
PID:2424 -
\??\c:\bjhxt.exec:\bjhxt.exe50⤵
- Executes dropped EXE
PID:2564 -
\??\c:\tjnnp.exec:\tjnnp.exe51⤵
- Executes dropped EXE
PID:1772 -
\??\c:\ndvflr.exec:\ndvflr.exe52⤵
- Executes dropped EXE
PID:1136 -
\??\c:\bjpxpr.exec:\bjpxpr.exe53⤵
- Executes dropped EXE
PID:1252 -
\??\c:\bbvlpt.exec:\bbvlpt.exe54⤵
- Executes dropped EXE
PID:636 -
\??\c:\xtffx.exec:\xtffx.exe55⤵
- Executes dropped EXE
PID:2180 -
\??\c:\pjjpnbp.exec:\pjjpnbp.exe56⤵
- Executes dropped EXE
PID:1172 -
\??\c:\fdlxx.exec:\fdlxx.exe57⤵
- Executes dropped EXE
PID:932 -
\??\c:\nprln.exec:\nprln.exe58⤵
- Executes dropped EXE
PID:2812 -
\??\c:\ljxxv.exec:\ljxxv.exe59⤵
- Executes dropped EXE
PID:2852 -
\??\c:\xpflhn.exec:\xpflhn.exe60⤵
- Executes dropped EXE
PID:524 -
\??\c:\nffhnf.exec:\nffhnf.exe61⤵
- Executes dropped EXE
PID:2768 -
\??\c:\fjxth.exec:\fjxth.exe62⤵
- Executes dropped EXE
PID:1988 -
\??\c:\pjtrbvj.exec:\pjtrbvj.exe63⤵
- Executes dropped EXE
PID:2232 -
\??\c:\jvdlp.exec:\jvdlp.exe64⤵
- Executes dropped EXE
PID:3008 -
\??\c:\tbvpv.exec:\tbvpv.exe65⤵
- Executes dropped EXE
PID:1968 -
\??\c:\xfjhpl.exec:\xfjhpl.exe66⤵PID:1304
-
\??\c:\jtvth.exec:\jtvth.exe67⤵PID:1624
-
\??\c:\drdfhp.exec:\drdfhp.exe68⤵PID:1964
-
\??\c:\bfjhp.exec:\bfjhp.exe69⤵PID:1932
-
\??\c:\tbbxrxn.exec:\tbbxrxn.exe70⤵PID:2220
-
\??\c:\vlhpv.exec:\vlhpv.exe71⤵PID:856
-
\??\c:\dxpxxp.exec:\dxpxxp.exe72⤵PID:2876
-
\??\c:\pvvxpt.exec:\pvvxpt.exe73⤵PID:2096
-
\??\c:\nphflx.exec:\nphflx.exe74⤵PID:2304
-
\??\c:\nthrnb.exec:\nthrnb.exe75⤵PID:3060
-
\??\c:\dtddvbv.exec:\dtddvbv.exe76⤵PID:1072
-
\??\c:\xpbntp.exec:\xpbntp.exe77⤵PID:2276
-
\??\c:\hjhrr.exec:\hjhrr.exe78⤵PID:1132
-
\??\c:\bfltnn.exec:\bfltnn.exe79⤵PID:1584
-
\??\c:\tjtplnb.exec:\tjtplnb.exe80⤵PID:1612
-
\??\c:\hblnv.exec:\hblnv.exe81⤵PID:2636
-
\??\c:\hfrtj.exec:\hfrtj.exe82⤵PID:2676
-
\??\c:\jvhvp.exec:\jvhvp.exe83⤵PID:2148
-
\??\c:\xbhnd.exec:\xbhnd.exe84⤵PID:2524
-
\??\c:\bnrtpl.exec:\bnrtpl.exe85⤵PID:2412
-
\??\c:\nfttr.exec:\nfttr.exe86⤵PID:2244
-
\??\c:\txhhlj.exec:\txhhlj.exe87⤵PID:2432
-
\??\c:\hxfpvdt.exec:\hxfpvdt.exe88⤵PID:2364
-
\??\c:\vplfnh.exec:\vplfnh.exe89⤵PID:1156
-
\??\c:\rpjdxdf.exec:\rpjdxdf.exe90⤵PID:2336
-
\??\c:\pjlhtbn.exec:\pjlhtbn.exe91⤵PID:2568
-
\??\c:\tvpdtnd.exec:\tvpdtnd.exe92⤵PID:2580
-
\??\c:\dvjbx.exec:\dvjbx.exe93⤵PID:1928
-
\??\c:\tlpdtp.exec:\tlpdtp.exe94⤵PID:1712
-
\??\c:\fjtfh.exec:\fjtfh.exe95⤵PID:2188
-
\??\c:\lhnxlj.exec:\lhnxlj.exe96⤵PID:1252
-
\??\c:\rvltxp.exec:\rvltxp.exe97⤵PID:944
-
\??\c:\fvnjnd.exec:\fvnjnd.exe98⤵PID:1984
-
\??\c:\xprdxr.exec:\xprdxr.exe99⤵PID:2224
-
\??\c:\xrvvhj.exec:\xrvvhj.exe100⤵PID:1280
-
\??\c:\tjbnpx.exec:\tjbnpx.exe101⤵PID:1628
-
\??\c:\vhpdf.exec:\vhpdf.exe102⤵PID:1636
-
\??\c:\xxxbvp.exec:\xxxbvp.exe103⤵PID:2852
-
\??\c:\dbfrjt.exec:\dbfrjt.exe104⤵PID:592
-
\??\c:\htpdth.exec:\htpdth.exe105⤵PID:572
-
\??\c:\bpnltp.exec:\bpnltp.exe106⤵PID:808
-
\??\c:\jddnjlh.exec:\jddnjlh.exe107⤵PID:956
-
\??\c:\hvvvnnv.exec:\hvvvnnv.exe108⤵PID:784
-
\??\c:\pftbll.exec:\pftbll.exe109⤵PID:1632
-
\??\c:\fxvfhp.exec:\fxvfhp.exe110⤵PID:1200
-
\??\c:\ftnfplr.exec:\ftnfplr.exe111⤵PID:1944
-
\??\c:\pdbdfld.exec:\pdbdfld.exe112⤵PID:1964
-
\??\c:\vhhplj.exec:\vhhplj.exe113⤵PID:2076
-
\??\c:\xdjdd.exec:\xdjdd.exe114⤵PID:2220
-
\??\c:\fdxrd.exec:\fdxrd.exe115⤵PID:856
-
\??\c:\nnvph.exec:\nnvph.exe116⤵PID:268
-
\??\c:\hpvrphj.exec:\hpvrphj.exe117⤵PID:1700
-
\??\c:\vbdhnf.exec:\vbdhnf.exe118⤵PID:2304
-
\??\c:\vhhnr.exec:\vhhnr.exe119⤵PID:3060
-
\??\c:\jnjbf.exec:\jnjbf.exe120⤵PID:1072
-
\??\c:\jpdjr.exec:\jpdjr.exe121⤵PID:2924
-
\??\c:\npjhhbh.exec:\npjhhbh.exe122⤵PID:1132
-
\??\c:\ttxnd.exec:\ttxnd.exe123⤵PID:2504
-
\??\c:\tthfbdp.exec:\tthfbdp.exe124⤵PID:1604
-
\??\c:\hhxvpn.exec:\hhxvpn.exe125⤵PID:2636
-
\??\c:\jfnnffp.exec:\jfnnffp.exe126⤵PID:2628
-
\??\c:\bflpbh.exec:\bflpbh.exe127⤵PID:2772
-
\??\c:\htxvvx.exec:\htxvvx.exe128⤵PID:2488
-
\??\c:\plbnrjp.exec:\plbnrjp.exe129⤵PID:2412
-
\??\c:\bxfdhv.exec:\bxfdhv.exe130⤵PID:3064
-
\??\c:\xbdhlv.exec:\xbdhlv.exe131⤵PID:2432
-
\??\c:\pxnfpjn.exec:\pxnfpjn.exe132⤵PID:2364
-
\??\c:\dhbrvr.exec:\dhbrvr.exe133⤵PID:1156
-
\??\c:\pfnpb.exec:\pfnpb.exe134⤵PID:2336
-
\??\c:\bdtjl.exec:\bdtjl.exe135⤵PID:2424
-
\??\c:\fjjfbjf.exec:\fjjfbjf.exe136⤵PID:2580
-
\??\c:\nvrlpbj.exec:\nvrlpbj.exe137⤵PID:1948
-
\??\c:\jrhnbp.exec:\jrhnbp.exe138⤵PID:1712
-
\??\c:\hbljrvn.exec:\hbljrvn.exe139⤵PID:1728
-
\??\c:\rnnhhpl.exec:\rnnhhpl.exe140⤵PID:1252
-
\??\c:\pljfj.exec:\pljfj.exe141⤵PID:944
-
\??\c:\bfnxp.exec:\bfnxp.exe142⤵PID:1984
-
\??\c:\bnrhdjh.exec:\bnrhdjh.exe143⤵PID:2328
-
\??\c:\xxxhv.exec:\xxxhv.exe144⤵PID:1280
-
\??\c:\hpdltxd.exec:\hpdltxd.exe145⤵PID:1628
-
\??\c:\bprtljl.exec:\bprtljl.exe146⤵PID:1636
-
\??\c:\pphltbt.exec:\pphltbt.exe147⤵PID:2536
-
\??\c:\xphnll.exec:\xphnll.exe148⤵PID:2984
-
\??\c:\tvtvnr.exec:\tvtvnr.exe149⤵PID:2768
-
\??\c:\rljjpft.exec:\rljjpft.exe150⤵PID:1988
-
\??\c:\xvtllhv.exec:\xvtllhv.exe151⤵PID:956
-
\??\c:\vpdnhnt.exec:\vpdnhnt.exe152⤵PID:784
-
\??\c:\fpdtvnp.exec:\fpdtvnp.exe153⤵PID:1844
-
\??\c:\bdfdt.exec:\bdfdt.exe154⤵PID:1200
-
\??\c:\rlnrf.exec:\rlnrf.exe155⤵PID:1048
-
\??\c:\vpdfxd.exec:\vpdfxd.exe156⤵PID:1964
-
\??\c:\jptbb.exec:\jptbb.exe157⤵PID:1652
-
\??\c:\ftflp.exec:\ftflp.exe158⤵PID:880
-
\??\c:\ldpthd.exec:\ldpthd.exe159⤵PID:1196
-
\??\c:\xrxhtn.exec:\xrxhtn.exe160⤵PID:268
-
\??\c:\xpvbdx.exec:\xpvbdx.exe161⤵PID:1700
-
\??\c:\rxvxrjx.exec:\rxvxrjx.exe162⤵PID:2304
-
\??\c:\nbntdv.exec:\nbntdv.exe163⤵PID:3060
-
\??\c:\pxbhlt.exec:\pxbhlt.exe164⤵PID:2896
-
\??\c:\ptblftl.exec:\ptblftl.exe165⤵PID:2052
-
\??\c:\ndpxtn.exec:\ndpxtn.exe166⤵PID:2484
-
\??\c:\tlrlnvv.exec:\tlrlnvv.exe167⤵PID:2672
-
\??\c:\vbbrdfj.exec:\vbbrdfj.exe168⤵PID:1096
-
\??\c:\tvnttn.exec:\tvnttn.exe169⤵PID:2636
-
\??\c:\bnrhthd.exec:\bnrhthd.exe170⤵PID:2676
-
\??\c:\vnbxdbj.exec:\vnbxdbj.exe171⤵PID:2384
-
\??\c:\xxbxhtx.exec:\xxbxhtx.exe172⤵PID:2488
-
\??\c:\prhlf.exec:\prhlf.exe173⤵PID:2412
-
\??\c:\xfpppxf.exec:\xfpppxf.exe174⤵PID:3064
-
\??\c:\drfpdx.exec:\drfpdx.exe175⤵PID:2432
-
\??\c:\nnrlxdj.exec:\nnrlxdj.exe176⤵PID:2364
-
\??\c:\rhdhlpb.exec:\rhdhlpb.exe177⤵PID:2544
-
\??\c:\vfjlj.exec:\vfjlj.exe178⤵PID:2336
-
\??\c:\njlljbd.exec:\njlljbd.exe179⤵PID:1128
-
\??\c:\nlpbl.exec:\nlpbl.exe180⤵PID:2580
-
\??\c:\rhvndv.exec:\rhvndv.exe181⤵PID:1948
-
\??\c:\fnpfntp.exec:\fnpfntp.exe182⤵PID:1712
-
\??\c:\dntpbl.exec:\dntpbl.exe183⤵PID:1728
-
\??\c:\pjxldb.exec:\pjxldb.exe184⤵PID:752
-
\??\c:\bjbnj.exec:\bjbnj.exe185⤵PID:1100
-
\??\c:\vdfrvj.exec:\vdfrvj.exe186⤵PID:1984
-
\??\c:\fvvjx.exec:\fvvjx.exe187⤵PID:3012
-
\??\c:\xthdnrt.exec:\xthdnrt.exe188⤵PID:2740
-
\??\c:\ntpdpnb.exec:\ntpdpnb.exe189⤵PID:2956
-
\??\c:\xpbtnn.exec:\xpbtnn.exe190⤵PID:1636
-
\??\c:\pvxfht.exec:\pvxfht.exe191⤵PID:524
-
\??\c:\rlxpxrl.exec:\rlxpxrl.exe192⤵PID:2984
-
\??\c:\xdbnt.exec:\xdbnt.exe193⤵PID:2768
-
\??\c:\bnjdn.exec:\bnjdn.exe194⤵PID:1988
-
\??\c:\vfpvf.exec:\vfpvf.exe195⤵PID:240
-
\??\c:\dlnrrxh.exec:\dlnrrxh.exe196⤵PID:784
-
\??\c:\tthltp.exec:\tthltp.exe197⤵PID:1844
-
\??\c:\ffnhhpb.exec:\ffnhhpb.exe198⤵PID:1200
-
\??\c:\ddbpjn.exec:\ddbpjn.exe199⤵PID:1048
-
\??\c:\xjfhf.exec:\xjfhf.exe200⤵PID:1964
-
\??\c:\blntp.exec:\blntp.exe201⤵PID:2308
-
\??\c:\tfhtr.exec:\tfhtr.exe202⤵PID:2268
-
\??\c:\dnprhb.exec:\dnprhb.exe203⤵PID:2968
-
\??\c:\jpvvjd.exec:\jpvvjd.exe204⤵PID:3056
-
\??\c:\tblndl.exec:\tblndl.exe205⤵PID:1888
-
\??\c:\fbljpj.exec:\fbljpj.exe206⤵PID:2872
-
\??\c:\tfpxd.exec:\tfpxd.exe207⤵PID:2276
-
\??\c:\pdxdrf.exec:\pdxdrf.exe208⤵PID:2648
-
\??\c:\nvrftlj.exec:\nvrftlj.exe209⤵PID:1584
-
\??\c:\ddhdft.exec:\ddhdft.exe210⤵PID:2508
-
\??\c:\jblxppl.exec:\jblxppl.exe211⤵PID:2912
-
\??\c:\vbvbt.exec:\vbvbt.exe212⤵PID:2380
-
\??\c:\ftnlvlh.exec:\ftnlvlh.exe213⤵PID:2548
-
\??\c:\pxfrb.exec:\pxfrb.exe214⤵PID:2732
-
\??\c:\rlhbfb.exec:\rlhbfb.exe215⤵PID:2384
-
\??\c:\xpbhnp.exec:\xpbhnp.exe216⤵PID:2420
-
\??\c:\trhhf.exec:\trhhf.exe217⤵PID:1672
-
\??\c:\fhpvtr.exec:\fhpvtr.exe218⤵PID:2368
-
\??\c:\pxlxptx.exec:\pxlxptx.exe219⤵PID:2600
-
\??\c:\fdtxppd.exec:\fdtxppd.exe220⤵PID:564
-
\??\c:\lxhjxpp.exec:\lxhjxpp.exe221⤵PID:2568
-
\??\c:\hftfhf.exec:\hftfhf.exe222⤵PID:1668
-
\??\c:\tjlxp.exec:\tjlxp.exe223⤵PID:1916
-
\??\c:\nhdtxp.exec:\nhdtxp.exe224⤵PID:1904
-
\??\c:\hlrpddr.exec:\hlrpddr.exe225⤵PID:1976
-
\??\c:\bhfpf.exec:\bhfpf.exe226⤵PID:1472
-
\??\c:\lpvfd.exec:\lpvfd.exe227⤵PID:636
-
\??\c:\jdfhdh.exec:\jdfhdh.exe228⤵PID:2552
-
\??\c:\fvjftxh.exec:\fvjftxh.exe229⤵PID:1684
-
\??\c:\tvljfb.exec:\tvljfb.exe230⤵PID:2036
-
\??\c:\bfhtbj.exec:\bfhtbj.exe231⤵PID:932
-
\??\c:\lflpd.exec:\lflpd.exe232⤵PID:1504
-
\??\c:\jtpndrb.exec:\jtpndrb.exe233⤵PID:1716
-
\??\c:\jxrndx.exec:\jxrndx.exe234⤵PID:2936
-
\??\c:\rxdlh.exec:\rxdlh.exe235⤵PID:2044
-
\??\c:\tdvfbdf.exec:\tdvfbdf.exe236⤵PID:3004
-
\??\c:\xhrvtt.exec:\xhrvtt.exe237⤵PID:3020
-
\??\c:\rhflj.exec:\rhflj.exe238⤵PID:1060
-
\??\c:\njxppt.exec:\njxppt.exe239⤵PID:1184
-
\??\c:\tnvlr.exec:\tnvlr.exe240⤵PID:2808
-
\??\c:\blhhbb.exec:\blhhbb.exe241⤵PID:1908
-