Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29/06/2024, 15:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b1b7c999f1949ff9be45f94301553bd8e8ffd8f56485d99c97934085b90748c6_NeikiAnalytics.exe
Resource
win7-20240611-en
5 signatures
150 seconds
General
-
Target
b1b7c999f1949ff9be45f94301553bd8e8ffd8f56485d99c97934085b90748c6_NeikiAnalytics.exe
-
Size
229KB
-
MD5
a52eebb1c6d3430458c6366141dc8e80
-
SHA1
00e3791e1aca4d3d7f307243b4c84a6672eea9bf
-
SHA256
b1b7c999f1949ff9be45f94301553bd8e8ffd8f56485d99c97934085b90748c6
-
SHA512
b69cf4b4e588df8de4c18f9591e5fc69a2565fa9a4eef3ceaea7b99e597467c85fa3ae6d48df0181e08a4aef806a9770fdab67209dbe7630d0ed5d94cdd1b6b9
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xLn/c1N4:n3C9BRo7MlrWKo+lxKk16
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
resource yara_rule behavioral1/memory/2432-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2292-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1648-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2820-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2852-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-87-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2864-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2500-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1600-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3020-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1348-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/480-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1604-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2496-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1748-276-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2192-285-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 1648 1tntht.exe 2292 lflrrxf.exe 2668 4062642.exe 2820 ddjvp.exe 2324 04668.exe 2852 xxlrrrx.exe 2700 lrrfxxx.exe 2540 646244.exe 2864 5bntnh.exe 2500 6862220.exe 2196 44286.exe 1720 m0804.exe 1504 rrfxffr.exe 2724 c662402.exe 2904 htthtt.exe 1600 488862.exe 3020 i620620.exe 1348 hhhnbh.exe 1556 bnnnnh.exe 1724 608806.exe 480 3hbnbh.exe 1476 26402.exe 1604 ppdpd.exe 912 fxfrlrf.exe 2496 9ntnnt.exe 1744 c288402.exe 2184 3pddj.exe 1308 xxxflfr.exe 1748 rlflfrf.exe 2192 i422026.exe 2448 bbtthh.exe 2316 nhhthh.exe 2452 k04064.exe 1944 g6480.exe 1976 26408.exe 2272 9pdpv.exe 1680 c026662.exe 2404 a0284.exe 2832 tnhhhh.exe 2828 o428062.exe 2808 8688440.exe 2552 a6828.exe 2780 nbntbh.exe 2572 6060006.exe 2592 jvvvd.exe 2276 bbnhht.exe 2616 i466640.exe 2052 rrxffll.exe 3068 rlxxxxf.exe 1328 868400.exe 1420 226202.exe 1864 48028.exe 2728 604080.exe 2596 0468406.exe 2996 04808.exe 3008 hbntbb.exe 1732 886488.exe 1776 g2028.exe 1424 hbbbnb.exe 600 hbnnbb.exe 596 vdpvj.exe 792 6404006.exe 2128 rfrlrrx.exe 540 3lxrrrr.exe -
resource yara_rule behavioral1/memory/2432-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2292-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1648-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2500-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1600-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3020-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1348-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/480-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1604-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1748-276-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2192-285-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1648 2432 b1b7c999f1949ff9be45f94301553bd8e8ffd8f56485d99c97934085b90748c6_NeikiAnalytics.exe 28 PID 2432 wrote to memory of 1648 2432 b1b7c999f1949ff9be45f94301553bd8e8ffd8f56485d99c97934085b90748c6_NeikiAnalytics.exe 28 PID 2432 wrote to memory of 1648 2432 b1b7c999f1949ff9be45f94301553bd8e8ffd8f56485d99c97934085b90748c6_NeikiAnalytics.exe 28 PID 2432 wrote to memory of 1648 2432 b1b7c999f1949ff9be45f94301553bd8e8ffd8f56485d99c97934085b90748c6_NeikiAnalytics.exe 28 PID 1648 wrote to memory of 2292 1648 1tntht.exe 29 PID 1648 wrote to memory of 2292 1648 1tntht.exe 29 PID 1648 wrote to memory of 2292 1648 1tntht.exe 29 PID 1648 wrote to memory of 2292 1648 1tntht.exe 29 PID 2292 wrote to memory of 2668 2292 lflrrxf.exe 30 PID 2292 wrote to memory of 2668 2292 lflrrxf.exe 30 PID 2292 wrote to memory of 2668 2292 lflrrxf.exe 30 PID 2292 wrote to memory of 2668 2292 lflrrxf.exe 30 PID 2668 wrote to memory of 2820 2668 4062642.exe 31 PID 2668 wrote to memory of 2820 2668 4062642.exe 31 PID 2668 wrote to memory of 2820 2668 4062642.exe 31 PID 2668 wrote to memory of 2820 2668 4062642.exe 31 PID 2820 wrote to memory of 2324 2820 ddjvp.exe 32 PID 2820 wrote to memory of 2324 2820 ddjvp.exe 32 PID 2820 wrote to memory of 2324 2820 ddjvp.exe 32 PID 2820 wrote to memory of 2324 2820 ddjvp.exe 32 PID 2324 wrote to memory of 2852 2324 04668.exe 33 PID 2324 wrote to memory of 2852 2324 04668.exe 33 PID 2324 wrote to memory of 2852 2324 04668.exe 33 PID 2324 wrote to memory of 2852 2324 04668.exe 33 PID 2852 wrote to memory of 2700 2852 xxlrrrx.exe 34 PID 2852 wrote to memory of 2700 2852 xxlrrrx.exe 34 PID 2852 wrote to memory of 2700 2852 xxlrrrx.exe 34 PID 2852 wrote to memory of 2700 2852 xxlrrrx.exe 34 PID 2700 wrote to memory of 2540 2700 lrrfxxx.exe 35 PID 2700 wrote to memory of 2540 2700 lrrfxxx.exe 35 PID 2700 wrote to memory of 2540 2700 lrrfxxx.exe 35 PID 2700 wrote to memory of 2540 2700 lrrfxxx.exe 35 PID 2540 wrote to memory of 2864 2540 646244.exe 36 PID 2540 wrote to memory of 2864 2540 646244.exe 36 PID 2540 wrote to memory of 2864 2540 646244.exe 36 PID 2540 wrote to memory of 2864 2540 646244.exe 36 PID 2864 wrote to memory of 2500 2864 5bntnh.exe 37 PID 2864 wrote to memory of 2500 2864 5bntnh.exe 37 PID 2864 wrote to memory of 2500 2864 5bntnh.exe 37 PID 2864 wrote to memory of 2500 2864 5bntnh.exe 37 PID 2500 wrote to memory of 2196 2500 6862220.exe 38 PID 2500 wrote to memory of 2196 2500 6862220.exe 38 PID 2500 wrote to memory of 2196 2500 6862220.exe 38 PID 2500 wrote to memory of 2196 2500 6862220.exe 38 PID 2196 wrote to memory of 1720 2196 44286.exe 39 PID 2196 wrote to memory of 1720 2196 44286.exe 39 PID 2196 wrote to memory of 1720 2196 44286.exe 39 PID 2196 wrote to memory of 1720 2196 44286.exe 39 PID 1720 wrote to memory of 1504 1720 m0804.exe 40 PID 1720 wrote to memory of 1504 1720 m0804.exe 40 PID 1720 wrote to memory of 1504 1720 m0804.exe 40 PID 1720 wrote to memory of 1504 1720 m0804.exe 40 PID 1504 wrote to memory of 2724 1504 rrfxffr.exe 41 PID 1504 wrote to memory of 2724 1504 rrfxffr.exe 41 PID 1504 wrote to memory of 2724 1504 rrfxffr.exe 41 PID 1504 wrote to memory of 2724 1504 rrfxffr.exe 41 PID 2724 wrote to memory of 2904 2724 c662402.exe 42 PID 2724 wrote to memory of 2904 2724 c662402.exe 42 PID 2724 wrote to memory of 2904 2724 c662402.exe 42 PID 2724 wrote to memory of 2904 2724 c662402.exe 42 PID 2904 wrote to memory of 1600 2904 htthtt.exe 43 PID 2904 wrote to memory of 1600 2904 htthtt.exe 43 PID 2904 wrote to memory of 1600 2904 htthtt.exe 43 PID 2904 wrote to memory of 1600 2904 htthtt.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1b7c999f1949ff9be45f94301553bd8e8ffd8f56485d99c97934085b90748c6_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\b1b7c999f1949ff9be45f94301553bd8e8ffd8f56485d99c97934085b90748c6_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
\??\c:\1tntht.exec:\1tntht.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\lflrrxf.exec:\lflrrxf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
\??\c:\4062642.exec:\4062642.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\ddjvp.exec:\ddjvp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\04668.exec:\04668.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\xxlrrrx.exec:\xxlrrrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2852 -
\??\c:\lrrfxxx.exec:\lrrfxxx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2700 -
\??\c:\646244.exec:\646244.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\5bntnh.exec:\5bntnh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
\??\c:\6862220.exec:\6862220.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2500 -
\??\c:\44286.exec:\44286.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2196 -
\??\c:\m0804.exec:\m0804.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\rrfxffr.exec:\rrfxffr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\c662402.exec:\c662402.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\htthtt.exec:\htthtt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\488862.exec:\488862.exe17⤵
- Executes dropped EXE
PID:1600 -
\??\c:\i620620.exec:\i620620.exe18⤵
- Executes dropped EXE
PID:3020 -
\??\c:\hhhnbh.exec:\hhhnbh.exe19⤵
- Executes dropped EXE
PID:1348 -
\??\c:\bnnnnh.exec:\bnnnnh.exe20⤵
- Executes dropped EXE
PID:1556 -
\??\c:\608806.exec:\608806.exe21⤵
- Executes dropped EXE
PID:1724 -
\??\c:\3hbnbh.exec:\3hbnbh.exe22⤵
- Executes dropped EXE
PID:480 -
\??\c:\26402.exec:\26402.exe23⤵
- Executes dropped EXE
PID:1476 -
\??\c:\ppdpd.exec:\ppdpd.exe24⤵
- Executes dropped EXE
PID:1604 -
\??\c:\fxfrlrf.exec:\fxfrlrf.exe25⤵
- Executes dropped EXE
PID:912 -
\??\c:\9ntnnt.exec:\9ntnnt.exe26⤵
- Executes dropped EXE
PID:2496 -
\??\c:\c288402.exec:\c288402.exe27⤵
- Executes dropped EXE
PID:1744 -
\??\c:\3pddj.exec:\3pddj.exe28⤵
- Executes dropped EXE
PID:2184 -
\??\c:\xxxflfr.exec:\xxxflfr.exe29⤵
- Executes dropped EXE
PID:1308 -
\??\c:\rlflfrf.exec:\rlflfrf.exe30⤵
- Executes dropped EXE
PID:1748 -
\??\c:\i422026.exec:\i422026.exe31⤵
- Executes dropped EXE
PID:2192 -
\??\c:\bbtthh.exec:\bbtthh.exe32⤵
- Executes dropped EXE
PID:2448 -
\??\c:\nhhthh.exec:\nhhthh.exe33⤵
- Executes dropped EXE
PID:2316 -
\??\c:\k04064.exec:\k04064.exe34⤵
- Executes dropped EXE
PID:2452 -
\??\c:\g6480.exec:\g6480.exe35⤵
- Executes dropped EXE
PID:1944 -
\??\c:\26408.exec:\26408.exe36⤵
- Executes dropped EXE
PID:1976 -
\??\c:\9pdpv.exec:\9pdpv.exe37⤵
- Executes dropped EXE
PID:2272 -
\??\c:\c026662.exec:\c026662.exe38⤵
- Executes dropped EXE
PID:1680 -
\??\c:\a0284.exec:\a0284.exe39⤵
- Executes dropped EXE
PID:2404 -
\??\c:\tnhhhh.exec:\tnhhhh.exe40⤵
- Executes dropped EXE
PID:2832 -
\??\c:\o428062.exec:\o428062.exe41⤵
- Executes dropped EXE
PID:2828 -
\??\c:\8688440.exec:\8688440.exe42⤵
- Executes dropped EXE
PID:2808 -
\??\c:\a6828.exec:\a6828.exe43⤵
- Executes dropped EXE
PID:2552 -
\??\c:\nbntbh.exec:\nbntbh.exe44⤵
- Executes dropped EXE
PID:2780 -
\??\c:\6060006.exec:\6060006.exe45⤵
- Executes dropped EXE
PID:2572 -
\??\c:\jvvvd.exec:\jvvvd.exe46⤵
- Executes dropped EXE
PID:2592 -
\??\c:\bbnhht.exec:\bbnhht.exe47⤵
- Executes dropped EXE
PID:2276 -
\??\c:\i466640.exec:\i466640.exe48⤵
- Executes dropped EXE
PID:2616 -
\??\c:\rrxffll.exec:\rrxffll.exe49⤵
- Executes dropped EXE
PID:2052 -
\??\c:\rlxxxxf.exec:\rlxxxxf.exe50⤵
- Executes dropped EXE
PID:3068 -
\??\c:\868400.exec:\868400.exe51⤵
- Executes dropped EXE
PID:1328 -
\??\c:\226202.exec:\226202.exe52⤵
- Executes dropped EXE
PID:1420 -
\??\c:\48028.exec:\48028.exe53⤵
- Executes dropped EXE
PID:1864 -
\??\c:\604080.exec:\604080.exe54⤵
- Executes dropped EXE
PID:2728 -
\??\c:\0468406.exec:\0468406.exe55⤵
- Executes dropped EXE
PID:2596 -
\??\c:\04808.exec:\04808.exe56⤵
- Executes dropped EXE
PID:2996 -
\??\c:\hbntbb.exec:\hbntbb.exe57⤵
- Executes dropped EXE
PID:3008 -
\??\c:\886488.exec:\886488.exe58⤵
- Executes dropped EXE
PID:1732 -
\??\c:\g2028.exec:\g2028.exe59⤵
- Executes dropped EXE
PID:1776 -
\??\c:\hbbbnb.exec:\hbbbnb.exe60⤵
- Executes dropped EXE
PID:1424 -
\??\c:\hbnnbb.exec:\hbnnbb.exe61⤵
- Executes dropped EXE
PID:600 -
\??\c:\vdpvj.exec:\vdpvj.exe62⤵
- Executes dropped EXE
PID:596 -
\??\c:\6404006.exec:\6404006.exe63⤵
- Executes dropped EXE
PID:792 -
\??\c:\rfrlrrx.exec:\rfrlrrx.exe64⤵
- Executes dropped EXE
PID:2128 -
\??\c:\3lxrrrr.exec:\3lxrrrr.exe65⤵
- Executes dropped EXE
PID:540 -
\??\c:\vpjpp.exec:\vpjpp.exe66⤵PID:2140
-
\??\c:\tnhtbh.exec:\tnhtbh.exe67⤵PID:2408
-
\??\c:\thbnnn.exec:\thbnnn.exe68⤵PID:288
-
\??\c:\k44424.exec:\k44424.exe69⤵PID:1744
-
\??\c:\fxlrflx.exec:\fxlrflx.exe70⤵PID:1872
-
\??\c:\dddpd.exec:\dddpd.exe71⤵PID:2200
-
\??\c:\vdddd.exec:\vdddd.exe72⤵PID:2356
-
\??\c:\042080.exec:\042080.exe73⤵PID:1748
-
\??\c:\486284.exec:\486284.exe74⤵PID:568
-
\??\c:\608628.exec:\608628.exe75⤵PID:1020
-
\??\c:\rlxfxff.exec:\rlxfxff.exe76⤵PID:2148
-
\??\c:\260646.exec:\260646.exe77⤵PID:1544
-
\??\c:\0802840.exec:\0802840.exe78⤵PID:1640
-
\??\c:\jdjpv.exec:\jdjpv.exe79⤵PID:1648
-
\??\c:\268468.exec:\268468.exe80⤵PID:1572
-
\??\c:\808084.exec:\808084.exe81⤵PID:1996
-
\??\c:\a6446.exec:\a6446.exe82⤵PID:2796
-
\??\c:\9jddp.exec:\9jddp.exe83⤵PID:2404
-
\??\c:\9jpdp.exec:\9jpdp.exe84⤵PID:2688
-
\??\c:\82840.exec:\82840.exe85⤵PID:2776
-
\??\c:\vpjjp.exec:\vpjjp.exe86⤵PID:1612
-
\??\c:\fflfxxl.exec:\fflfxxl.exe87⤵PID:2640
-
\??\c:\468806.exec:\468806.exe88⤵PID:2528
-
\??\c:\xfrfxrr.exec:\xfrfxrr.exe89⤵PID:2696
-
\??\c:\fflxrff.exec:\fflxrff.exe90⤵PID:1672
-
\??\c:\ntnntt.exec:\ntnntt.exe91⤵PID:2104
-
\??\c:\e82806.exec:\e82806.exe92⤵PID:2616
-
\??\c:\frffrrx.exec:\frffrrx.exe93⤵PID:2264
-
\??\c:\lfxlrxf.exec:\lfxlrxf.exe94⤵PID:2924
-
\??\c:\826666.exec:\826666.exe95⤵PID:1652
-
\??\c:\jvpjv.exec:\jvpjv.exe96⤵PID:1420
-
\??\c:\lrflllr.exec:\lrflllr.exe97⤵PID:1504
-
\??\c:\tntbhn.exec:\tntbhn.exe98⤵PID:2484
-
\??\c:\9lxrxrx.exec:\9lxrxrx.exe99⤵PID:1600
-
\??\c:\lfrlrxl.exec:\lfrlrxl.exe100⤵PID:1688
-
\??\c:\btnthn.exec:\btnthn.exe101⤵PID:316
-
\??\c:\rflflxf.exec:\rflflxf.exe102⤵PID:1132
-
\??\c:\0428020.exec:\0428020.exe103⤵PID:1592
-
\??\c:\q68226.exec:\q68226.exe104⤵PID:264
-
\??\c:\8640006.exec:\8640006.exe105⤵PID:336
-
\??\c:\6024666.exec:\6024666.exe106⤵PID:2336
-
\??\c:\pdvvd.exec:\pdvvd.exe107⤵PID:1048
-
\??\c:\nhbbhh.exec:\nhbbhh.exe108⤵PID:1604
-
\??\c:\ppdvd.exec:\ppdvd.exe109⤵PID:912
-
\??\c:\hthbnh.exec:\hthbnh.exe110⤵PID:2068
-
\??\c:\2426040.exec:\2426040.exe111⤵PID:1708
-
\??\c:\tnhtbn.exec:\tnhtbn.exe112⤵PID:1712
-
\??\c:\9nnnhh.exec:\9nnnhh.exe113⤵PID:2184
-
\??\c:\86802.exec:\86802.exe114⤵PID:2000
-
\??\c:\dppjj.exec:\dppjj.exe115⤵PID:1876
-
\??\c:\428282.exec:\428282.exe116⤵PID:2948
-
\??\c:\xxfllxr.exec:\xxfllxr.exe117⤵PID:2328
-
\??\c:\dppvd.exec:\dppvd.exe118⤵PID:2020
-
\??\c:\btbbtt.exec:\btbbtt.exe119⤵PID:1848
-
\??\c:\jdpjd.exec:\jdpjd.exe120⤵PID:2452
-
\??\c:\g4002.exec:\g4002.exe121⤵PID:948
-
\??\c:\pvjjj.exec:\pvjjj.exe122⤵PID:2380
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-