Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 00:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
438c2c204bd3f478410246581267f670_NeikiAnalytics.exe
Resource
win7-20240215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
438c2c204bd3f478410246581267f670_NeikiAnalytics.exe
-
Size
392KB
-
MD5
438c2c204bd3f478410246581267f670
-
SHA1
e2b3127f3943ce753ca784376a528a7b254e2ae7
-
SHA256
2f3d907b14c46a0531a6f82dd56768aeb78fc86e8960a451981be95d0d9b7c82
-
SHA512
75eefc596cbd27a84e5e376d37fdaf40e6c21d69cb2bf838260327f9ed117e5d367e4086d3d5da61a391745b88ae61e80ac9289315cd058aa1d6c3126ffd2a44
-
SSDEEP
6144:n3C9BRIG0asYFm71mPfkVB8dKwaO5CVwOV:n3C9uYA7okVqdKwaO5CV3
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
resource yara_rule behavioral2/memory/1856-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/228-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4928-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1204-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4876-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/380-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/732-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/552-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1480-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3620-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3828-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5044-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3084-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/456-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2824-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3424-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1188-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2336-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3716-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4224-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1140-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4912-128-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3252-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4788-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4108-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4716-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4828-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 228 20482.exe 4928 44226.exe 4828 tnbtnt.exe 552 686020.exe 4876 82488.exe 1204 4060400.exe 380 xrffffl.exe 732 rflfxrl.exe 4716 6868882.exe 1480 nnhbtt.exe 3524 jjvjd.exe 3620 e24088.exe 4108 6622868.exe 4788 1hhhbh.exe 3828 042804.exe 5044 htbthb.exe 3252 244626.exe 4912 bhhhbn.exe 3084 thbbtn.exe 456 606448.exe 1140 c404882.exe 2824 8002222.exe 3812 lflfxxx.exe 4224 4042424.exe 3424 8062604.exe 2680 i648882.exe 3716 2260448.exe 2336 hntnbh.exe 1188 5xffxxx.exe 1472 7jvpv.exe 3444 9ppjd.exe 1692 i248822.exe 2292 8488626.exe 984 k42266.exe 4336 w08662.exe 32 64048.exe 852 42260.exe 2732 thhbtt.exe 1636 262688.exe 1308 6660006.exe 4288 8462666.exe 4876 rrrlllf.exe 4580 bhbbbt.exe 4976 0228488.exe 3012 xxxxrxx.exe 4816 4684888.exe 3048 0468680.exe 1480 bhnhnb.exe 2988 2060444.exe 4908 264248.exe 5032 w06268.exe 2840 8666600.exe 1148 04024.exe 5044 nnhhhb.exe 2788 rlrlffx.exe 2472 tbtbhh.exe 2620 42660.exe 2072 thtbbb.exe 3200 2804606.exe 456 vvdvp.exe 1176 824462.exe 2052 tbbhhn.exe 2676 s2428.exe 1168 4060482.exe -
resource yara_rule behavioral2/memory/1856-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/228-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4928-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1204-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4876-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/380-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/732-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/552-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1480-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3620-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3828-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5044-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3084-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/456-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2824-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3424-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1188-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2336-185-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3716-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4224-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1140-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4912-128-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3252-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4788-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4108-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4716-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4828-24-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 228 1856 438c2c204bd3f478410246581267f670_NeikiAnalytics.exe 83 PID 1856 wrote to memory of 228 1856 438c2c204bd3f478410246581267f670_NeikiAnalytics.exe 83 PID 1856 wrote to memory of 228 1856 438c2c204bd3f478410246581267f670_NeikiAnalytics.exe 83 PID 228 wrote to memory of 4928 228 20482.exe 84 PID 228 wrote to memory of 4928 228 20482.exe 84 PID 228 wrote to memory of 4928 228 20482.exe 84 PID 4928 wrote to memory of 4828 4928 44226.exe 85 PID 4928 wrote to memory of 4828 4928 44226.exe 85 PID 4928 wrote to memory of 4828 4928 44226.exe 85 PID 4828 wrote to memory of 552 4828 tnbtnt.exe 86 PID 4828 wrote to memory of 552 4828 tnbtnt.exe 86 PID 4828 wrote to memory of 552 4828 tnbtnt.exe 86 PID 552 wrote to memory of 4876 552 686020.exe 128 PID 552 wrote to memory of 4876 552 686020.exe 128 PID 552 wrote to memory of 4876 552 686020.exe 128 PID 4876 wrote to memory of 1204 4876 82488.exe 89 PID 4876 wrote to memory of 1204 4876 82488.exe 89 PID 4876 wrote to memory of 1204 4876 82488.exe 89 PID 1204 wrote to memory of 380 1204 4060400.exe 90 PID 1204 wrote to memory of 380 1204 4060400.exe 90 PID 1204 wrote to memory of 380 1204 4060400.exe 90 PID 380 wrote to memory of 732 380 xrffffl.exe 91 PID 380 wrote to memory of 732 380 xrffffl.exe 91 PID 380 wrote to memory of 732 380 xrffffl.exe 91 PID 732 wrote to memory of 4716 732 rflfxrl.exe 92 PID 732 wrote to memory of 4716 732 rflfxrl.exe 92 PID 732 wrote to memory of 4716 732 rflfxrl.exe 92 PID 4716 wrote to memory of 1480 4716 6868882.exe 134 PID 4716 wrote to memory of 1480 4716 6868882.exe 134 PID 4716 wrote to memory of 1480 4716 6868882.exe 134 PID 1480 wrote to memory of 3524 1480 nnhbtt.exe 95 PID 1480 wrote to memory of 3524 1480 nnhbtt.exe 95 PID 1480 wrote to memory of 3524 1480 nnhbtt.exe 95 PID 3524 wrote to memory of 3620 3524 jjvjd.exe 96 PID 3524 wrote to memory of 3620 3524 jjvjd.exe 96 PID 3524 wrote to memory of 3620 3524 jjvjd.exe 96 PID 3620 wrote to memory of 4108 3620 e24088.exe 97 PID 3620 wrote to memory of 4108 3620 e24088.exe 97 PID 3620 wrote to memory of 4108 3620 e24088.exe 97 PID 4108 wrote to memory of 4788 4108 6622868.exe 98 PID 4108 wrote to memory of 4788 4108 6622868.exe 98 PID 4108 wrote to memory of 4788 4108 6622868.exe 98 PID 4788 wrote to memory of 3828 4788 1hhhbh.exe 99 PID 4788 wrote to memory of 3828 4788 1hhhbh.exe 99 PID 4788 wrote to memory of 3828 4788 1hhhbh.exe 99 PID 3828 wrote to memory of 5044 3828 042804.exe 141 PID 3828 wrote to memory of 5044 3828 042804.exe 141 PID 3828 wrote to memory of 5044 3828 042804.exe 141 PID 5044 wrote to memory of 3252 5044 htbthb.exe 101 PID 5044 wrote to memory of 3252 5044 htbthb.exe 101 PID 5044 wrote to memory of 3252 5044 htbthb.exe 101 PID 3252 wrote to memory of 4912 3252 244626.exe 221 PID 3252 wrote to memory of 4912 3252 244626.exe 221 PID 3252 wrote to memory of 4912 3252 244626.exe 221 PID 4912 wrote to memory of 3084 4912 bhhhbn.exe 103 PID 4912 wrote to memory of 3084 4912 bhhhbn.exe 103 PID 4912 wrote to memory of 3084 4912 bhhhbn.exe 103 PID 3084 wrote to memory of 456 3084 thbbtn.exe 189 PID 3084 wrote to memory of 456 3084 thbbtn.exe 189 PID 3084 wrote to memory of 456 3084 thbbtn.exe 189 PID 456 wrote to memory of 1140 456 606448.exe 106 PID 456 wrote to memory of 1140 456 606448.exe 106 PID 456 wrote to memory of 1140 456 606448.exe 106 PID 1140 wrote to memory of 2824 1140 c404882.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\438c2c204bd3f478410246581267f670_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\438c2c204bd3f478410246581267f670_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
\??\c:\20482.exec:\20482.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
\??\c:\44226.exec:\44226.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4928 -
\??\c:\tnbtnt.exec:\tnbtnt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
\??\c:\686020.exec:\686020.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
\??\c:\82488.exec:\82488.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
\??\c:\4060400.exec:\4060400.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
\??\c:\xrffffl.exec:\xrffffl.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
\??\c:\rflfxrl.exec:\rflfxrl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:732 -
\??\c:\6868882.exec:\6868882.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
\??\c:\nnhbtt.exec:\nnhbtt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1480 -
\??\c:\jjvjd.exec:\jjvjd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3524 -
\??\c:\e24088.exec:\e24088.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3620 -
\??\c:\6622868.exec:\6622868.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4108 -
\??\c:\1hhhbh.exec:\1hhhbh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
\??\c:\042804.exec:\042804.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
\??\c:\htbthb.exec:\htbthb.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
\??\c:\244626.exec:\244626.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3252 -
\??\c:\bhhhbn.exec:\bhhhbn.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
\??\c:\thbbtn.exec:\thbbtn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3084 -
\??\c:\606448.exec:\606448.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
\??\c:\c404882.exec:\c404882.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
\??\c:\8002222.exec:\8002222.exe23⤵
- Executes dropped EXE
PID:2824 -
\??\c:\lflfxxx.exec:\lflfxxx.exe24⤵
- Executes dropped EXE
PID:3812 -
\??\c:\4042424.exec:\4042424.exe25⤵
- Executes dropped EXE
PID:4224 -
\??\c:\8062604.exec:\8062604.exe26⤵
- Executes dropped EXE
PID:3424 -
\??\c:\i648882.exec:\i648882.exe27⤵
- Executes dropped EXE
PID:2680 -
\??\c:\2260448.exec:\2260448.exe28⤵
- Executes dropped EXE
PID:3716 -
\??\c:\hntnbh.exec:\hntnbh.exe29⤵
- Executes dropped EXE
PID:2336 -
\??\c:\5xffxxx.exec:\5xffxxx.exe30⤵
- Executes dropped EXE
PID:1188 -
\??\c:\7jvpv.exec:\7jvpv.exe31⤵
- Executes dropped EXE
PID:1472 -
\??\c:\9ppjd.exec:\9ppjd.exe32⤵
- Executes dropped EXE
PID:3444 -
\??\c:\i248822.exec:\i248822.exe33⤵
- Executes dropped EXE
PID:1692 -
\??\c:\8488626.exec:\8488626.exe34⤵
- Executes dropped EXE
PID:2292 -
\??\c:\k42266.exec:\k42266.exe35⤵
- Executes dropped EXE
PID:984 -
\??\c:\w08662.exec:\w08662.exe36⤵
- Executes dropped EXE
PID:4336 -
\??\c:\64048.exec:\64048.exe37⤵
- Executes dropped EXE
PID:32 -
\??\c:\42260.exec:\42260.exe38⤵
- Executes dropped EXE
PID:852 -
\??\c:\thhbtt.exec:\thhbtt.exe39⤵
- Executes dropped EXE
PID:2732 -
\??\c:\262688.exec:\262688.exe40⤵
- Executes dropped EXE
PID:1636 -
\??\c:\6660006.exec:\6660006.exe41⤵
- Executes dropped EXE
PID:1308 -
\??\c:\8462666.exec:\8462666.exe42⤵
- Executes dropped EXE
PID:4288 -
\??\c:\rrrlllf.exec:\rrrlllf.exe43⤵
- Executes dropped EXE
PID:4876 -
\??\c:\bhbbbt.exec:\bhbbbt.exe44⤵
- Executes dropped EXE
PID:4580 -
\??\c:\0228488.exec:\0228488.exe45⤵
- Executes dropped EXE
PID:4976 -
\??\c:\xxxxrxx.exec:\xxxxrxx.exe46⤵
- Executes dropped EXE
PID:3012 -
\??\c:\4684888.exec:\4684888.exe47⤵
- Executes dropped EXE
PID:4816 -
\??\c:\0468680.exec:\0468680.exe48⤵
- Executes dropped EXE
PID:3048 -
\??\c:\bhnhnb.exec:\bhnhnb.exe49⤵
- Executes dropped EXE
PID:1480 -
\??\c:\2060444.exec:\2060444.exe50⤵
- Executes dropped EXE
PID:2988 -
\??\c:\264248.exec:\264248.exe51⤵
- Executes dropped EXE
PID:4908 -
\??\c:\w06268.exec:\w06268.exe52⤵
- Executes dropped EXE
PID:5032 -
\??\c:\8666600.exec:\8666600.exe53⤵
- Executes dropped EXE
PID:2840 -
\??\c:\04024.exec:\04024.exe54⤵
- Executes dropped EXE
PID:1148 -
\??\c:\nnhhhb.exec:\nnhhhb.exe55⤵
- Executes dropped EXE
PID:5044 -
\??\c:\rlrlffx.exec:\rlrlffx.exe56⤵
- Executes dropped EXE
PID:2788 -
\??\c:\tbtbhh.exec:\tbtbhh.exe57⤵
- Executes dropped EXE
PID:2472 -
\??\c:\42660.exec:\42660.exe58⤵
- Executes dropped EXE
PID:2620 -
\??\c:\thtbbb.exec:\thtbbb.exe59⤵
- Executes dropped EXE
PID:2072 -
\??\c:\2804606.exec:\2804606.exe60⤵
- Executes dropped EXE
PID:3200 -
\??\c:\vvdvp.exec:\vvdvp.exe61⤵
- Executes dropped EXE
PID:456 -
\??\c:\824462.exec:\824462.exe62⤵
- Executes dropped EXE
PID:1176 -
\??\c:\tbbhhn.exec:\tbbhhn.exe63⤵
- Executes dropped EXE
PID:2052 -
\??\c:\s2428.exec:\s2428.exe64⤵
- Executes dropped EXE
PID:2676 -
\??\c:\4060482.exec:\4060482.exe65⤵
- Executes dropped EXE
PID:1168 -
\??\c:\a8426.exec:\a8426.exe66⤵PID:840
-
\??\c:\lffxffx.exec:\lffxffx.exe67⤵PID:2516
-
\??\c:\4468224.exec:\4468224.exe68⤵PID:2744
-
\??\c:\6026224.exec:\6026224.exe69⤵PID:3948
-
\??\c:\7tnbtt.exec:\7tnbtt.exe70⤵PID:3484
-
\??\c:\20882.exec:\20882.exe71⤵PID:616
-
\??\c:\822604.exec:\822604.exe72⤵PID:4576
-
\??\c:\06604.exec:\06604.exe73⤵PID:1072
-
\??\c:\hbnhhn.exec:\hbnhhn.exe74⤵PID:4428
-
\??\c:\o060022.exec:\o060022.exe75⤵PID:1796
-
\??\c:\c686666.exec:\c686666.exe76⤵PID:4300
-
\??\c:\hnnbtn.exec:\hnnbtn.exe77⤵PID:468
-
\??\c:\tnntbh.exec:\tnntbh.exe78⤵PID:184
-
\??\c:\hnhnnb.exec:\hnhnnb.exe79⤵PID:976
-
\??\c:\2260448.exec:\2260448.exe80⤵PID:5060
-
\??\c:\tbbnht.exec:\tbbnht.exe81⤵PID:2656
-
\??\c:\tnntbh.exec:\tnntbh.exe82⤵PID:1552
-
\??\c:\8848664.exec:\8848664.exe83⤵PID:1436
-
\??\c:\bthhbn.exec:\bthhbn.exe84⤵PID:2300
-
\??\c:\rfrllrx.exec:\rfrllrx.exe85⤵PID:4836
-
\??\c:\8226246.exec:\8226246.exe86⤵PID:2848
-
\??\c:\2400226.exec:\2400226.exe87⤵PID:1384
-
\??\c:\468084.exec:\468084.exe88⤵PID:1756
-
\??\c:\864880.exec:\864880.exe89⤵PID:2544
-
\??\c:\vpvdd.exec:\vpvdd.exe90⤵PID:2044
-
\??\c:\nthhbt.exec:\nthhbt.exe91⤵PID:4680
-
\??\c:\ttbbbb.exec:\ttbbbb.exe92⤵PID:3664
-
\??\c:\vdvvp.exec:\vdvvp.exe93⤵PID:5032
-
\??\c:\2600604.exec:\2600604.exe94⤵PID:632
-
\??\c:\hnthnt.exec:\hnthnt.exe95⤵PID:2400
-
\??\c:\hhnnnn.exec:\hhnnnn.exe96⤵PID:796
-
\??\c:\04000.exec:\04000.exe97⤵PID:3552
-
\??\c:\pjvdp.exec:\pjvdp.exe98⤵PID:2072
-
\??\c:\pdvpj.exec:\pdvpj.exe99⤵PID:3200
-
\??\c:\0044846.exec:\0044846.exe100⤵PID:456
-
\??\c:\hhnnnn.exec:\hhnnnn.exe101⤵PID:2780
-
\??\c:\w66260.exec:\w66260.exe102⤵PID:3468
-
\??\c:\xlfrllx.exec:\xlfrllx.exe103⤵PID:3424
-
\??\c:\pvdpj.exec:\pvdpj.exe104⤵PID:3032
-
\??\c:\2246000.exec:\2246000.exe105⤵PID:4408
-
\??\c:\rrxxlrf.exec:\rrxxlrf.exe106⤵PID:2516
-
\??\c:\624486.exec:\624486.exe107⤵PID:1188
-
\??\c:\288822.exec:\288822.exe108⤵PID:5004
-
\??\c:\ttnhth.exec:\ttnhth.exe109⤵PID:4844
-
\??\c:\nhtnht.exec:\nhtnht.exe110⤵PID:948
-
\??\c:\rlxlrlr.exec:\rlxlrlr.exe111⤵PID:4576
-
\??\c:\a6822.exec:\a6822.exe112⤵PID:3768
-
\??\c:\6448260.exec:\6448260.exe113⤵PID:4428
-
\??\c:\rlfxrrl.exec:\rlfxrrl.exe114⤵PID:2364
-
\??\c:\8646824.exec:\8646824.exe115⤵PID:5108
-
\??\c:\lrxxrrl.exec:\lrxxrrl.exe116⤵PID:3128
-
\??\c:\jdjdd.exec:\jdjdd.exe117⤵PID:1832
-
\??\c:\xrxrrll.exec:\xrxrrll.exe118⤵PID:3764
-
\??\c:\xrrllfx.exec:\xrrllfx.exe119⤵PID:1400
-
\??\c:\604484.exec:\604484.exe120⤵PID:3920
-
\??\c:\pjdvp.exec:\pjdvp.exe121⤵PID:1552
-
\??\c:\402226.exec:\402226.exe122⤵PID:1436
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-