Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 22:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
94c87f8280a995d344a9d2804acc9800_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
94c87f8280a995d344a9d2804acc9800_NeikiAnalytics.exe
-
Size
306KB
-
MD5
94c87f8280a995d344a9d2804acc9800
-
SHA1
dec986ba3560807e7a10bf5e1a6cd89fe8f8dbf9
-
SHA256
fa50db68e1f2afaf540cc2253d7443e6cbda069c89c242fe36056eb7b0318c8b
-
SHA512
609739a941340da8dd17060d85a7730ed7a4c9274c111447a0f92da8b97a8dd6a8d2efd1d29419bc78bee9314f3ac4c917e4b5c052231b0c8c4d00262a0b1b8a
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo7LAIRUohDLS0k+sLiiBVS0ILlMcGGW7sRCl9eM7:n3C9BRo/AIuunS3+sOiBVSXxMxTsm9e+
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/856-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2620-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/572-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1880-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1068-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1500-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/944-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2304-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2296-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1260-222-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2312-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3060-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1292-249-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1608-303-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
nvpbnnb.exethddhll.exehlpnpr.exevfpxnxj.exetrhhtnv.exehjvhvp.exenxbbx.exevhjfvrt.exejljhht.exexljrlb.exednjhrp.exepndtx.exevbffvjf.exethnvvvx.exefnptn.exebvlblpp.exebllvtfn.exelhlxbl.exevbvjhp.exevrnll.exepvpxhl.exelhrxd.exepjbxvv.exedfjtrt.exelnxhj.exefjdhd.exefrhrl.exetdbnh.exenjhpvt.exernflpvx.exepthhlld.exepxtblbl.exetfnpnpb.exerpjrvhl.exehbttld.exelvjtxbn.exeptvfrft.exejxldvdp.exejbrxfb.exebhdrxt.exelblph.exenxffdf.exehflxxtf.exelvfbnnx.exehhphx.exefhpxx.exexhbfjn.exefdtfn.exexnjrrx.exejflxl.exexvprlpp.exehtjrn.exevvddtr.exevvrpld.exeptfxx.exedljvnvd.exejndtl.exeblpjf.exepxdbxpd.exendnhhjx.exexdpvhx.exepdvvh.exeldhnfnt.exeppnjv.exepid process 872 nvpbnnb.exe 2864 thddhll.exe 2620 hlpnpr.exe 2528 vfpxnxj.exe 2672 trhhtnv.exe 2828 hjvhvp.exe 2424 nxbbx.exe 2836 vhjfvrt.exe 572 jljhht.exe 1880 xljrlb.exe 2608 dnjhrp.exe 2604 pndtx.exe 1068 vbffvjf.exe 1500 thnvvvx.exe 2240 fnptn.exe 2960 bvlblpp.exe 1644 bllvtfn.exe 944 lhlxbl.exe 2304 vbvjhp.exe 2296 vrnll.exe 588 pvpxhl.exe 1260 lhrxd.exe 2312 pjbxvv.exe 3060 dfjtrt.exe 1292 lnxhj.exe 1532 fjdhd.exe 1804 frhrl.exe 1892 tdbnh.exe 704 njhpvt.exe 2148 rnflpvx.exe 1608 pthhlld.exe 1320 pxtblbl.exe 1408 tfnpnpb.exe 2272 rpjrvhl.exe 1640 hbttld.exe 2980 lvjtxbn.exe 2916 ptvfrft.exe 2624 jxldvdp.exe 2684 jbrxfb.exe 2584 bhdrxt.exe 2888 lblph.exe 2680 nxffdf.exe 2468 hflxxtf.exe 2932 lvfbnnx.exe 2544 hhphx.exe 3048 fhpxx.exe 956 xhbfjn.exe 2740 fdtfn.exe 2716 xnjrrx.exe 1992 jflxl.exe 2180 xvprlpp.exe 2232 htjrn.exe 1636 vvddtr.exe 2240 vvrpld.exe 2184 ptfxx.exe 1576 dljvnvd.exe 1836 jndtl.exe 2152 blpjf.exe 468 pxdbxpd.exe 2920 ndnhhjx.exe 3004 xdpvhx.exe 2948 pdvvh.exe 1688 ldhnfnt.exe 1156 ppnjv.exe -
Processes:
resource yara_rule behavioral1/memory/856-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/856-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2620-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2620-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/572-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1880-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1068-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1500-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/944-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2304-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1260-222-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2312-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3060-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1292-249-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1608-303-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
94c87f8280a995d344a9d2804acc9800_NeikiAnalytics.exenvpbnnb.exethddhll.exehlpnpr.exevfpxnxj.exetrhhtnv.exehjvhvp.exenxbbx.exevhjfvrt.exejljhht.exexljrlb.exednjhrp.exepndtx.exevbffvjf.exethnvvvx.exefnptn.exedescription pid process target process PID 856 wrote to memory of 872 856 94c87f8280a995d344a9d2804acc9800_NeikiAnalytics.exe nvpbnnb.exe PID 856 wrote to memory of 872 856 94c87f8280a995d344a9d2804acc9800_NeikiAnalytics.exe nvpbnnb.exe PID 856 wrote to memory of 872 856 94c87f8280a995d344a9d2804acc9800_NeikiAnalytics.exe nvpbnnb.exe PID 856 wrote to memory of 872 856 94c87f8280a995d344a9d2804acc9800_NeikiAnalytics.exe nvpbnnb.exe PID 872 wrote to memory of 2864 872 nvpbnnb.exe thddhll.exe PID 872 wrote to memory of 2864 872 nvpbnnb.exe thddhll.exe PID 872 wrote to memory of 2864 872 nvpbnnb.exe thddhll.exe PID 872 wrote to memory of 2864 872 nvpbnnb.exe thddhll.exe PID 2864 wrote to memory of 2620 2864 thddhll.exe hlpnpr.exe PID 2864 wrote to memory of 2620 2864 thddhll.exe hlpnpr.exe PID 2864 wrote to memory of 2620 2864 thddhll.exe hlpnpr.exe PID 2864 wrote to memory of 2620 2864 thddhll.exe hlpnpr.exe PID 2620 wrote to memory of 2528 2620 hlpnpr.exe vfpxnxj.exe PID 2620 wrote to memory of 2528 2620 hlpnpr.exe vfpxnxj.exe PID 2620 wrote to memory of 2528 2620 hlpnpr.exe vfpxnxj.exe PID 2620 wrote to memory of 2528 2620 hlpnpr.exe vfpxnxj.exe PID 2528 wrote to memory of 2672 2528 vfpxnxj.exe trhhtnv.exe PID 2528 wrote to memory of 2672 2528 vfpxnxj.exe trhhtnv.exe PID 2528 wrote to memory of 2672 2528 vfpxnxj.exe trhhtnv.exe PID 2528 wrote to memory of 2672 2528 vfpxnxj.exe trhhtnv.exe PID 2672 wrote to memory of 2828 2672 trhhtnv.exe hjvhvp.exe PID 2672 wrote to memory of 2828 2672 trhhtnv.exe hjvhvp.exe PID 2672 wrote to memory of 2828 2672 trhhtnv.exe hjvhvp.exe PID 2672 wrote to memory of 2828 2672 trhhtnv.exe hjvhvp.exe PID 2828 wrote to memory of 2424 2828 hjvhvp.exe nxbbx.exe PID 2828 wrote to memory of 2424 2828 hjvhvp.exe nxbbx.exe PID 2828 wrote to memory of 2424 2828 hjvhvp.exe nxbbx.exe PID 2828 wrote to memory of 2424 2828 hjvhvp.exe nxbbx.exe PID 2424 wrote to memory of 2836 2424 nxbbx.exe vhjfvrt.exe PID 2424 wrote to memory of 2836 2424 nxbbx.exe vhjfvrt.exe PID 2424 wrote to memory of 2836 2424 nxbbx.exe vhjfvrt.exe PID 2424 wrote to memory of 2836 2424 nxbbx.exe vhjfvrt.exe PID 2836 wrote to memory of 572 2836 vhjfvrt.exe jljhht.exe PID 2836 wrote to memory of 572 2836 vhjfvrt.exe jljhht.exe PID 2836 wrote to memory of 572 2836 vhjfvrt.exe jljhht.exe PID 2836 wrote to memory of 572 2836 vhjfvrt.exe jljhht.exe PID 572 wrote to memory of 1880 572 jljhht.exe xljrlb.exe PID 572 wrote to memory of 1880 572 jljhht.exe xljrlb.exe PID 572 wrote to memory of 1880 572 jljhht.exe xljrlb.exe PID 572 wrote to memory of 1880 572 jljhht.exe xljrlb.exe PID 1880 wrote to memory of 2608 1880 xljrlb.exe dnjhrp.exe PID 1880 wrote to memory of 2608 1880 xljrlb.exe dnjhrp.exe PID 1880 wrote to memory of 2608 1880 xljrlb.exe dnjhrp.exe PID 1880 wrote to memory of 2608 1880 xljrlb.exe dnjhrp.exe PID 2608 wrote to memory of 2604 2608 dnjhrp.exe pndtx.exe PID 2608 wrote to memory of 2604 2608 dnjhrp.exe pndtx.exe PID 2608 wrote to memory of 2604 2608 dnjhrp.exe pndtx.exe PID 2608 wrote to memory of 2604 2608 dnjhrp.exe pndtx.exe PID 2604 wrote to memory of 1068 2604 pndtx.exe vbffvjf.exe PID 2604 wrote to memory of 1068 2604 pndtx.exe vbffvjf.exe PID 2604 wrote to memory of 1068 2604 pndtx.exe vbffvjf.exe PID 2604 wrote to memory of 1068 2604 pndtx.exe vbffvjf.exe PID 1068 wrote to memory of 1500 1068 vbffvjf.exe thnvvvx.exe PID 1068 wrote to memory of 1500 1068 vbffvjf.exe thnvvvx.exe PID 1068 wrote to memory of 1500 1068 vbffvjf.exe thnvvvx.exe PID 1068 wrote to memory of 1500 1068 vbffvjf.exe thnvvvx.exe PID 1500 wrote to memory of 2240 1500 thnvvvx.exe fnptn.exe PID 1500 wrote to memory of 2240 1500 thnvvvx.exe fnptn.exe PID 1500 wrote to memory of 2240 1500 thnvvvx.exe fnptn.exe PID 1500 wrote to memory of 2240 1500 thnvvvx.exe fnptn.exe PID 2240 wrote to memory of 2960 2240 fnptn.exe bvlblpp.exe PID 2240 wrote to memory of 2960 2240 fnptn.exe bvlblpp.exe PID 2240 wrote to memory of 2960 2240 fnptn.exe bvlblpp.exe PID 2240 wrote to memory of 2960 2240 fnptn.exe bvlblpp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94c87f8280a995d344a9d2804acc9800_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\94c87f8280a995d344a9d2804acc9800_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:856 -
\??\c:\nvpbnnb.exec:\nvpbnnb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
\??\c:\thddhll.exec:\thddhll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\hlpnpr.exec:\hlpnpr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\vfpxnxj.exec:\vfpxnxj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
\??\c:\trhhtnv.exec:\trhhtnv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\hjvhvp.exec:\hjvhvp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\nxbbx.exec:\nxbbx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2424 -
\??\c:\vhjfvrt.exec:\vhjfvrt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2836 -
\??\c:\jljhht.exec:\jljhht.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
\??\c:\xljrlb.exec:\xljrlb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
\??\c:\dnjhrp.exec:\dnjhrp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
\??\c:\pndtx.exec:\pndtx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
\??\c:\vbffvjf.exec:\vbffvjf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1068 -
\??\c:\thnvvvx.exec:\thnvvvx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
\??\c:\fnptn.exec:\fnptn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
\??\c:\bvlblpp.exec:\bvlblpp.exe17⤵
- Executes dropped EXE
PID:2960 -
\??\c:\bllvtfn.exec:\bllvtfn.exe18⤵
- Executes dropped EXE
PID:1644 -
\??\c:\lhlxbl.exec:\lhlxbl.exe19⤵
- Executes dropped EXE
PID:944 -
\??\c:\vbvjhp.exec:\vbvjhp.exe20⤵
- Executes dropped EXE
PID:2304 -
\??\c:\vrnll.exec:\vrnll.exe21⤵
- Executes dropped EXE
PID:2296 -
\??\c:\pvpxhl.exec:\pvpxhl.exe22⤵
- Executes dropped EXE
PID:588 -
\??\c:\lhrxd.exec:\lhrxd.exe23⤵
- Executes dropped EXE
PID:1260 -
\??\c:\pjbxvv.exec:\pjbxvv.exe24⤵
- Executes dropped EXE
PID:2312 -
\??\c:\dfjtrt.exec:\dfjtrt.exe25⤵
- Executes dropped EXE
PID:3060 -
\??\c:\lnxhj.exec:\lnxhj.exe26⤵
- Executes dropped EXE
PID:1292 -
\??\c:\fjdhd.exec:\fjdhd.exe27⤵
- Executes dropped EXE
PID:1532 -
\??\c:\frhrl.exec:\frhrl.exe28⤵
- Executes dropped EXE
PID:1804 -
\??\c:\tdbnh.exec:\tdbnh.exe29⤵
- Executes dropped EXE
PID:1892 -
\??\c:\njhpvt.exec:\njhpvt.exe30⤵
- Executes dropped EXE
PID:704 -
\??\c:\rnflpvx.exec:\rnflpvx.exe31⤵
- Executes dropped EXE
PID:2148 -
\??\c:\pthhlld.exec:\pthhlld.exe32⤵
- Executes dropped EXE
PID:1608 -
\??\c:\pxtblbl.exec:\pxtblbl.exe33⤵
- Executes dropped EXE
PID:1320 -
\??\c:\tfnpnpb.exec:\tfnpnpb.exe34⤵
- Executes dropped EXE
PID:1408 -
\??\c:\dnfnhp.exec:\dnfnhp.exe35⤵PID:856
-
\??\c:\rpjrvhl.exec:\rpjrvhl.exe36⤵
- Executes dropped EXE
PID:2272 -
\??\c:\hbttld.exec:\hbttld.exe37⤵
- Executes dropped EXE
PID:1640 -
\??\c:\lvjtxbn.exec:\lvjtxbn.exe38⤵
- Executes dropped EXE
PID:2980 -
\??\c:\ptvfrft.exec:\ptvfrft.exe39⤵
- Executes dropped EXE
PID:2916 -
\??\c:\jxldvdp.exec:\jxldvdp.exe40⤵
- Executes dropped EXE
PID:2624 -
\??\c:\jbrxfb.exec:\jbrxfb.exe41⤵
- Executes dropped EXE
PID:2684 -
\??\c:\bhdrxt.exec:\bhdrxt.exe42⤵
- Executes dropped EXE
PID:2584 -
\??\c:\lblph.exec:\lblph.exe43⤵
- Executes dropped EXE
PID:2888 -
\??\c:\nxffdf.exec:\nxffdf.exe44⤵
- Executes dropped EXE
PID:2680 -
\??\c:\hflxxtf.exec:\hflxxtf.exe45⤵
- Executes dropped EXE
PID:2468 -
\??\c:\lvfbnnx.exec:\lvfbnnx.exe46⤵
- Executes dropped EXE
PID:2932 -
\??\c:\hhphx.exec:\hhphx.exe47⤵
- Executes dropped EXE
PID:2544 -
\??\c:\fhpxx.exec:\fhpxx.exe48⤵
- Executes dropped EXE
PID:3048 -
\??\c:\xhbfjn.exec:\xhbfjn.exe49⤵
- Executes dropped EXE
PID:956 -
\??\c:\fdtfn.exec:\fdtfn.exe50⤵
- Executes dropped EXE
PID:2740 -
\??\c:\xnjrrx.exec:\xnjrrx.exe51⤵
- Executes dropped EXE
PID:2716 -
\??\c:\jflxl.exec:\jflxl.exe52⤵
- Executes dropped EXE
PID:1992 -
\??\c:\xvprlpp.exec:\xvprlpp.exe53⤵
- Executes dropped EXE
PID:2180 -
\??\c:\htjrn.exec:\htjrn.exe54⤵
- Executes dropped EXE
PID:2232 -
\??\c:\vvddtr.exec:\vvddtr.exe55⤵
- Executes dropped EXE
PID:1636 -
\??\c:\vvrpld.exec:\vvrpld.exe56⤵
- Executes dropped EXE
PID:2240 -
\??\c:\ptfxx.exec:\ptfxx.exe57⤵
- Executes dropped EXE
PID:2184 -
\??\c:\dljvnvd.exec:\dljvnvd.exe58⤵
- Executes dropped EXE
PID:1576 -
\??\c:\jndtl.exec:\jndtl.exe59⤵
- Executes dropped EXE
PID:1836 -
\??\c:\blpjf.exec:\blpjf.exe60⤵
- Executes dropped EXE
PID:2152 -
\??\c:\pxdbxpd.exec:\pxdbxpd.exe61⤵
- Executes dropped EXE
PID:468 -
\??\c:\ndnhhjx.exec:\ndnhhjx.exe62⤵
- Executes dropped EXE
PID:2920 -
\??\c:\xdpvhx.exec:\xdpvhx.exe63⤵
- Executes dropped EXE
PID:3004 -
\??\c:\pdvvh.exec:\pdvvh.exe64⤵
- Executes dropped EXE
PID:2948 -
\??\c:\ldhnfnt.exec:\ldhnfnt.exe65⤵
- Executes dropped EXE
PID:1688 -
\??\c:\ppnjv.exec:\ppnjv.exe66⤵
- Executes dropped EXE
PID:1156 -
\??\c:\hxdljpv.exec:\hxdljpv.exe67⤵PID:1808
-
\??\c:\pxhrrt.exec:\pxhrrt.exe68⤵PID:1076
-
\??\c:\fvhdlpf.exec:\fvhdlpf.exe69⤵PID:1532
-
\??\c:\nfnxt.exec:\nfnxt.exe70⤵PID:1888
-
\??\c:\hvfjxxr.exec:\hvfjxxr.exe71⤵PID:564
-
\??\c:\fvbxnlv.exec:\fvbxnlv.exe72⤵PID:544
-
\??\c:\llfnlt.exec:\llfnlt.exe73⤵PID:704
-
\??\c:\pntjrd.exec:\pntjrd.exe74⤵PID:2392
-
\??\c:\rrbrnfp.exec:\rrbrnfp.exe75⤵PID:1768
-
\??\c:\hxfnvx.exec:\hxfnvx.exe76⤵PID:2340
-
\??\c:\rdhxr.exec:\rdhxr.exe77⤵PID:1320
-
\??\c:\bjnnh.exec:\bjnnh.exe78⤵PID:1668
-
\??\c:\fljrjp.exec:\fljrjp.exe79⤵PID:2112
-
\??\c:\rddpp.exec:\rddpp.exe80⤵PID:872
-
\??\c:\jdpxvhh.exec:\jdpxvhh.exe81⤵PID:2640
-
\??\c:\jbdlpj.exec:\jbdlpj.exe82⤵PID:2764
-
\??\c:\xbhbvx.exec:\xbhbvx.exe83⤵PID:2704
-
\??\c:\jbvlx.exec:\jbvlx.exe84⤵PID:2528
-
\??\c:\bdhld.exec:\bdhld.exe85⤵PID:2156
-
\??\c:\tdlnfvt.exec:\tdlnfvt.exe86⤵PID:2720
-
\??\c:\hvrdx.exec:\hvrdx.exe87⤵PID:2480
-
\??\c:\brjvp.exec:\brjvp.exe88⤵PID:2476
-
\??\c:\dvxxjnn.exec:\dvxxjnn.exe89⤵PID:2472
-
\??\c:\vddtpt.exec:\vddtpt.exe90⤵PID:2836
-
\??\c:\npvxhdv.exec:\npvxhdv.exe91⤵PID:1336
-
\??\c:\ttdbb.exec:\ttdbb.exe92⤵PID:572
-
\??\c:\tnpbphj.exec:\tnpbphj.exe93⤵PID:2708
-
\??\c:\flnlvln.exec:\flnlvln.exe94⤵PID:2212
-
\??\c:\fphpp.exec:\fphpp.exe95⤵PID:2860
-
\??\c:\txptdlx.exec:\txptdlx.exe96⤵PID:1444
-
\??\c:\hbhpx.exec:\hbhpx.exe97⤵PID:1820
-
\??\c:\jxrft.exec:\jxrft.exe98⤵PID:2224
-
\??\c:\nrjnxvj.exec:\nrjnxvj.exe99⤵PID:764
-
\??\c:\hnfvd.exec:\hnfvd.exe100⤵PID:1656
-
\??\c:\jftpjd.exec:\jftpjd.exe101⤵PID:1700
-
\??\c:\rxrrn.exec:\rxrrn.exe102⤵PID:3032
-
\??\c:\jpvtj.exec:\jpvtj.exe103⤵PID:2216
-
\??\c:\hpblh.exec:\hpblh.exe104⤵PID:2536
-
\??\c:\hdvtfr.exec:\hdvtfr.exe105⤵PID:2904
-
\??\c:\vtrpj.exec:\vtrpj.exe106⤵PID:2300
-
\??\c:\thprn.exec:\thprn.exe107⤵PID:2188
-
\??\c:\fxbnnl.exec:\fxbnnl.exe108⤵PID:3068
-
\??\c:\vfrnlx.exec:\vfrnlx.exe109⤵PID:1120
-
\??\c:\xbtvjx.exec:\xbtvjx.exe110⤵PID:2044
-
\??\c:\xrjhtd.exec:\xrjhtd.exe111⤵PID:1528
-
\??\c:\dlntb.exec:\dlntb.exe112⤵PID:1288
-
\??\c:\npvxhn.exec:\npvxhn.exe113⤵PID:2992
-
\??\c:\tlhvfxn.exec:\tlhvfxn.exe114⤵PID:1844
-
\??\c:\xhndlld.exec:\xhndlld.exe115⤵PID:1832
-
\??\c:\vlrrvt.exec:\vlrrvt.exe116⤵PID:2768
-
\??\c:\dvjnh.exec:\dvjnh.exe117⤵PID:704
-
\??\c:\fnxbrl.exec:\fnxbrl.exe118⤵PID:3028
-
\??\c:\hrlbhbn.exec:\hrlbhbn.exe119⤵PID:2140
-
\??\c:\rdtrtjh.exec:\rdtrtjh.exe120⤵PID:2364
-
\??\c:\vnjbh.exec:\vnjbh.exe121⤵PID:1596
-
\??\c:\nhfrt.exec:\nhfrt.exe122⤵PID:2612
-
\??\c:\xrhfn.exec:\xrhfn.exe123⤵PID:3012
-
\??\c:\jjthp.exec:\jjthp.exe124⤵PID:2912
-
\??\c:\lvrfh.exec:\lvrfh.exe125⤵PID:2632
-
\??\c:\fvrdhpl.exec:\fvrdhpl.exe126⤵PID:2676
-
\??\c:\rnfjd.exec:\rnfjd.exe127⤵PID:2548
-
\??\c:\vnrprnv.exec:\vnrprnv.exe128⤵PID:2732
-
\??\c:\xxvbdxf.exec:\xxvbdxf.exe129⤵PID:2596
-
\??\c:\lhldxb.exec:\lhldxb.exe130⤵PID:2592
-
\??\c:\jpxrxj.exec:\jpxrxj.exe131⤵PID:2680
-
\??\c:\hxdxnf.exec:\hxdxnf.exe132⤵PID:2488
-
\??\c:\pbnldxp.exec:\pbnldxp.exe133⤵PID:2496
-
\??\c:\frnbt.exec:\frnbt.exe134⤵PID:2836
-
\??\c:\xlnrbd.exec:\xlnrbd.exe135⤵PID:1336
-
\??\c:\djpjnt.exec:\djpjnt.exe136⤵PID:2668
-
\??\c:\bddfrjb.exec:\bddfrjb.exe137⤵PID:2712
-
\??\c:\lbrrj.exec:\lbrrj.exe138⤵PID:2856
-
\??\c:\jrffh.exec:\jrffh.exe139⤵PID:1980
-
\??\c:\jptpxtv.exec:\jptpxtv.exe140⤵PID:1372
-
\??\c:\dtpppt.exec:\dtpppt.exe141⤵PID:1048
-
\??\c:\jbjfvtr.exec:\jbjfvtr.exe142⤵PID:2248
-
\??\c:\nhdnr.exec:\nhdnr.exe143⤵PID:1176
-
\??\c:\pfnrvv.exec:\pfnrvv.exe144⤵PID:2184
-
\??\c:\jtndp.exec:\jtndp.exe145⤵PID:2320
-
\??\c:\bfhrvf.exec:\bfhrvf.exe146⤵PID:2284
-
\??\c:\lrxtd.exec:\lrxtd.exe147⤵PID:2216
-
\??\c:\rftlxft.exec:\rftlxft.exe148⤵PID:2308
-
\??\c:\tdvdt.exec:\tdvdt.exe149⤵PID:528
-
\??\c:\dxtpt.exec:\dxtpt.exe150⤵PID:304
-
\??\c:\fxjtblv.exec:\fxjtblv.exe151⤵PID:1712
-
\??\c:\dhvjjfx.exec:\dhvjjfx.exe152⤵PID:2976
-
\??\c:\hnnpvj.exec:\hnnpvj.exe153⤵PID:1828
-
\??\c:\njhdr.exec:\njhdr.exe154⤵PID:1960
-
\??\c:\fhbnt.exec:\fhbnt.exe155⤵PID:1808
-
\??\c:\tpnvnpp.exec:\tpnvnpp.exe156⤵PID:1972
-
\??\c:\jjbhlb.exec:\jjbhlb.exe157⤵PID:640
-
\??\c:\ptpfn.exec:\ptpfn.exe158⤵PID:968
-
\??\c:\dvxxb.exec:\dvxxb.exe159⤵PID:544
-
\??\c:\tfxlhh.exec:\tfxlhh.exe160⤵PID:952
-
\??\c:\bxvflb.exec:\bxvflb.exe161⤵PID:2392
-
\??\c:\pltbxj.exec:\pltbxj.exe162⤵PID:884
-
\??\c:\bptvl.exec:\bptvl.exe163⤵PID:2400
-
\??\c:\xhrdt.exec:\xhrdt.exe164⤵PID:1592
-
\??\c:\hnjjhn.exec:\hnjjhn.exe165⤵PID:856
-
\??\c:\jvbfjj.exec:\jvbfjj.exe166⤵PID:2116
-
\??\c:\dhlrn.exec:\dhlrn.exe167⤵PID:2564
-
\??\c:\pnhrn.exec:\pnhrn.exe168⤵PID:2652
-
\??\c:\rxbrpjl.exec:\rxbrpjl.exe169⤵PID:2916
-
\??\c:\dfjffhj.exec:\dfjffhj.exe170⤵PID:2540
-
\??\c:\lhtxt.exec:\lhtxt.exe171⤵PID:1776
-
\??\c:\vlpnrhv.exec:\vlpnrhv.exe172⤵PID:2396
-
\??\c:\vfjvfn.exec:\vfjvfn.exe173⤵PID:2724
-
\??\c:\hdldl.exec:\hdldl.exe174⤵PID:2440
-
\??\c:\ftdln.exec:\ftdln.exe175⤵PID:2424
-
\??\c:\vfdhpj.exec:\vfdhpj.exe176⤵PID:1084
-
\??\c:\xhtxjv.exec:\xhtxjv.exe177⤵PID:1732
-
\??\c:\pblvll.exec:\pblvll.exe178⤵PID:1868
-
\??\c:\rxrlx.exec:\rxrlx.exe179⤵PID:2984
-
\??\c:\jfhth.exec:\jfhth.exe180⤵PID:2832
-
\??\c:\hbjvhjv.exec:\hbjvhjv.exe181⤵PID:1512
-
\??\c:\jppvj.exec:\jppvj.exe182⤵PID:1984
-
\??\c:\lpnblhn.exec:\lpnblhn.exe183⤵PID:1428
-
\??\c:\fbpnv.exec:\fbpnv.exe184⤵PID:2232
-
\??\c:\vtjhn.exec:\vtjhn.exe185⤵PID:2000
-
\??\c:\brnjv.exec:\brnjv.exe186⤵PID:2520
-
\??\c:\jftpb.exec:\jftpb.exe187⤵PID:1692
-
\??\c:\pnnjdv.exec:\pnnjdv.exe188⤵PID:1616
-
\??\c:\jpttdr.exec:\jpttdr.exe189⤵PID:2280
-
\??\c:\rxjplxp.exec:\rxjplxp.exe190⤵PID:1836
-
\??\c:\vtxxtnn.exec:\vtxxtnn.exe191⤵PID:324
-
\??\c:\jxjhj.exec:\jxjhj.exe192⤵PID:108
-
\??\c:\bvhxhjx.exec:\bvhxhjx.exe193⤵PID:2772
-
\??\c:\vnbhhlt.exec:\vnbhhlt.exe194⤵PID:1260
-
\??\c:\pbnpfxp.exec:\pbnpfxp.exe195⤵PID:436
-
\??\c:\ndpfvx.exec:\ndpfvx.exe196⤵PID:2860
-
\??\c:\vbjnpv.exec:\vbjnpv.exe197⤵PID:1392
-
\??\c:\pnvjxt.exec:\pnvjxt.exe198⤵PID:1800
-
\??\c:\dptvrn.exec:\dptvrn.exe199⤵PID:2196
-
\??\c:\jftbf.exec:\jftbf.exe200⤵PID:612
-
\??\c:\nnxddf.exec:\nnxddf.exe201⤵PID:1304
-
\??\c:\jvbnhrb.exec:\jvbnhrb.exe202⤵PID:2168
-
\??\c:\nnrhlr.exec:\nnrhlr.exe203⤵PID:3024
-
\??\c:\fjjtppn.exec:\fjjtppn.exe204⤵PID:2908
-
\??\c:\ltdbxx.exec:\ltdbxx.exe205⤵PID:1600
-
\??\c:\jrnhbp.exec:\jrnhbp.exe206⤵PID:1612
-
\??\c:\djrnd.exec:\djrnd.exe207⤵PID:1572
-
\??\c:\llvlbpv.exec:\llvlbpv.exe208⤵PID:1588
-
\??\c:\xxxvf.exec:\xxxvf.exe209⤵PID:2532
-
\??\c:\rftdnvn.exec:\rftdnvn.exe210⤵PID:1640
-
\??\c:\vfpvlhv.exec:\vfpvlhv.exe211⤵PID:2648
-
\??\c:\nvndd.exec:\nvndd.exe212⤵PID:2620
-
\??\c:\rjdxdtj.exec:\rjdxdtj.exe213⤵PID:2936
-
\??\c:\fpplhll.exec:\fpplhll.exe214⤵PID:2600
-
\??\c:\ptlbhnp.exec:\ptlbhnp.exe215⤵PID:1276
-
\??\c:\pbbrnl.exec:\pbbrnl.exe216⤵PID:2672
-
\??\c:\dvlpl.exec:\dvlpl.exe217⤵PID:2720
-
\??\c:\xdhlvl.exec:\xdhlvl.exe218⤵PID:2588
-
\??\c:\pxlxbxl.exec:\pxlxbxl.exe219⤵PID:1052
-
\??\c:\vjbtnbx.exec:\vjbtnbx.exe220⤵PID:2456
-
\??\c:\fvnfh.exec:\fvnfh.exe221⤵PID:2544
-
\??\c:\jhbfn.exec:\jhbfn.exe222⤵PID:836
-
\??\c:\tvfnp.exec:\tvfnp.exe223⤵PID:956
-
\??\c:\dnlbjtl.exec:\dnlbjtl.exe224⤵PID:2492
-
\??\c:\jjdbr.exec:\jjdbr.exe225⤵PID:2036
-
\??\c:\hpdvht.exec:\hpdvht.exe226⤵PID:1968
-
\??\c:\tnjbff.exec:\tnjbff.exe227⤵PID:2180
-
\??\c:\pvpxfj.exec:\pvpxfj.exe228⤵PID:2024
-
\??\c:\rjlbx.exec:\rjlbx.exe229⤵PID:852
-
\??\c:\vxjtn.exec:\vxjtn.exe230⤵PID:948
-
\??\c:\jvlxpdh.exec:\jvlxpdh.exe231⤵PID:1632
-
\??\c:\jnvhpp.exec:\jnvhpp.exe232⤵PID:2276
-
\??\c:\bpvfrh.exec:\bpvfrh.exe233⤵PID:2292
-
\??\c:\tftljnx.exec:\tftljnx.exe234⤵PID:2928
-
\??\c:\prhdj.exec:\prhdj.exe235⤵PID:2656
-
\??\c:\lxrfldp.exec:\lxrfldp.exe236⤵PID:588
-
\??\c:\bljfp.exec:\bljfp.exe237⤵PID:3064
-
\??\c:\hnnrnlv.exec:\hnnrnlv.exe238⤵PID:2964
-
\??\c:\vnthlbx.exec:\vnthlbx.exe239⤵PID:1852
-
\??\c:\lnvppn.exec:\lnvppn.exe240⤵PID:960
-
\??\c:\lrtjp.exec:\lrtjp.exe241⤵PID:1028
-
\??\c:\ppbfjv.exec:\ppbfjv.exe242⤵PID:1076