Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
19-05-2024 18:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
18144e103e775e56884312eda2167950_NeikiAnalytics.exe
Resource
win7-20240220-en
windows7-x64
5 signatures
150 seconds
General
-
Target
18144e103e775e56884312eda2167950_NeikiAnalytics.exe
-
Size
62KB
-
MD5
18144e103e775e56884312eda2167950
-
SHA1
49915d38a1c1044b88ce7b18e8832c0a154ca66d
-
SHA256
7e4a438753c2f5c2d0ed898823744aea98dcab116951756e0f3e2346483d4700
-
SHA512
a63fdb41d8f76a1a4f112ce110ab9285383eb688b79328ec2848c2fe8f80201c9b3e834eaf9401fa31737a150d31ad09471328a0112c96d72ae39a0adf5d494e
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIug6b9FFl:ymb3NkkiQ3mdBjFIugqr
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/1740-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2928-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2924-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2156-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2676-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2804-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2592-72-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2568-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2600-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2768-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1652-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1700-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/928-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1224-187-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1924-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1496-215-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2084-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1880-259-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1560-277-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1640-304-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
hbhbbt.exepjpvd.exejpddd.exe3rxxlxf.exe3lrrrrl.exehtthnh.exevdjvp.exelxllfxx.exe5xxffff.exetnttbb.exe5bhntn.exevjpdd.exe7pvvp.exefrlllff.exenbbnnt.exentbttn.exevddpp.exe3jppp.exe7frlrrf.exelxlllff.exebhnhbb.exenhnbnh.exe7pdpj.exefrxfxll.exerxffxll.exethnnhb.exe9nnnht.exejppjv.exejppdv.exefrxrlll.exe5lrrrrr.exe3nthhb.exehttnnb.exe3pdvp.exevjpdj.exe5lrrrrr.exelrrlfxr.exefrrllfl.exe9nttth.exebntbtt.exevdpjj.exepdjjj.exevjpjj.exelrfflfr.exe9ttnhh.exe5nnhbt.exe9dpdj.exepdjdd.exe3flxfxx.exe1xfxrlr.exefrxrrll.exe3ntntt.exebhhhbt.exe3ppdv.exejvjjj.exepjpjj.exe5rlrrll.exenbnntn.exe5nhhbt.exejvddj.exe3vdvp.exefrxrrlf.exexlrrrrr.exe5bhhbt.exepid process 2928 hbhbbt.exe 2924 pjpvd.exe 2156 jpddd.exe 2676 3rxxlxf.exe 2804 3lrrrrl.exe 2592 htthnh.exe 2568 vdjvp.exe 2480 lxllfxx.exe 2600 5xxffff.exe 2416 tnttbb.exe 2772 5bhntn.exe 2768 vjpdd.exe 2744 7pvvp.exe 1652 frlllff.exe 2320 nbbnnt.exe 1700 ntbttn.exe 928 vddpp.exe 1224 3jppp.exe 1452 7frlrrf.exe 1924 lxlllff.exe 1496 bhnhbb.exe 1948 nhnbnh.exe 2084 7pdpj.exe 676 frxfxll.exe 2152 rxffxll.exe 1880 thnnhb.exe 920 9nnnht.exe 1560 jppjv.exe 2120 jppdv.exe 2972 frxrlll.exe 1640 5lrrrrr.exe 2192 3nthhb.exe 2200 httnnb.exe 2360 3pdvp.exe 3024 vjpdj.exe 2716 5lrrrrr.exe 2976 lrrlfxr.exe 2648 frrllfl.exe 2572 9nttth.exe 2756 bntbtt.exe 2700 vdpjj.exe 2428 pdjjj.exe 2884 vjpjj.exe 2432 lrfflfr.exe 2888 9ttnhh.exe 2892 5nnhbt.exe 1796 9dpdj.exe 1332 pdjdd.exe 2364 3flxfxx.exe 2168 1xfxrlr.exe 2004 frxrrll.exe 1596 3ntntt.exe 1600 bhhhbt.exe 1700 3ppdv.exe 2872 jvjjj.exe 648 pjpjj.exe 2020 5rlrrll.exe 1928 nbnntn.exe 1924 5nhhbt.exe 2820 jvddj.exe 2292 3vdvp.exe 2816 frxrrlf.exe 2748 xlrrrrr.exe 452 5bhhbt.exe -
Processes:
resource yara_rule behavioral1/memory/1740-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2928-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2924-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2156-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2676-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2600-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1652-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1700-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/928-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1224-187-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1924-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1496-215-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1880-259-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1560-277-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1640-304-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
18144e103e775e56884312eda2167950_NeikiAnalytics.exehbhbbt.exepjpvd.exejpddd.exe3rxxlxf.exe3lrrrrl.exehtthnh.exevdjvp.exelxllfxx.exe5xxffff.exetnttbb.exe5bhntn.exevjpdd.exe7pvvp.exefrlllff.exenbbnnt.exedescription pid process target process PID 1740 wrote to memory of 2928 1740 18144e103e775e56884312eda2167950_NeikiAnalytics.exe hbhbbt.exe PID 1740 wrote to memory of 2928 1740 18144e103e775e56884312eda2167950_NeikiAnalytics.exe hbhbbt.exe PID 1740 wrote to memory of 2928 1740 18144e103e775e56884312eda2167950_NeikiAnalytics.exe hbhbbt.exe PID 1740 wrote to memory of 2928 1740 18144e103e775e56884312eda2167950_NeikiAnalytics.exe hbhbbt.exe PID 2928 wrote to memory of 2924 2928 hbhbbt.exe pjpvd.exe PID 2928 wrote to memory of 2924 2928 hbhbbt.exe pjpvd.exe PID 2928 wrote to memory of 2924 2928 hbhbbt.exe pjpvd.exe PID 2928 wrote to memory of 2924 2928 hbhbbt.exe pjpvd.exe PID 2924 wrote to memory of 2156 2924 pjpvd.exe jpddd.exe PID 2924 wrote to memory of 2156 2924 pjpvd.exe jpddd.exe PID 2924 wrote to memory of 2156 2924 pjpvd.exe jpddd.exe PID 2924 wrote to memory of 2156 2924 pjpvd.exe jpddd.exe PID 2156 wrote to memory of 2676 2156 jpddd.exe 3rxxlxf.exe PID 2156 wrote to memory of 2676 2156 jpddd.exe 3rxxlxf.exe PID 2156 wrote to memory of 2676 2156 jpddd.exe 3rxxlxf.exe PID 2156 wrote to memory of 2676 2156 jpddd.exe 3rxxlxf.exe PID 2676 wrote to memory of 2804 2676 3rxxlxf.exe 3lrrrrl.exe PID 2676 wrote to memory of 2804 2676 3rxxlxf.exe 3lrrrrl.exe PID 2676 wrote to memory of 2804 2676 3rxxlxf.exe 3lrrrrl.exe PID 2676 wrote to memory of 2804 2676 3rxxlxf.exe 3lrrrrl.exe PID 2804 wrote to memory of 2592 2804 3lrrrrl.exe htthnh.exe PID 2804 wrote to memory of 2592 2804 3lrrrrl.exe htthnh.exe PID 2804 wrote to memory of 2592 2804 3lrrrrl.exe htthnh.exe PID 2804 wrote to memory of 2592 2804 3lrrrrl.exe htthnh.exe PID 2592 wrote to memory of 2568 2592 htthnh.exe vdjvp.exe PID 2592 wrote to memory of 2568 2592 htthnh.exe vdjvp.exe PID 2592 wrote to memory of 2568 2592 htthnh.exe vdjvp.exe PID 2592 wrote to memory of 2568 2592 htthnh.exe vdjvp.exe PID 2568 wrote to memory of 2480 2568 vdjvp.exe lxllfxx.exe PID 2568 wrote to memory of 2480 2568 vdjvp.exe lxllfxx.exe PID 2568 wrote to memory of 2480 2568 vdjvp.exe lxllfxx.exe PID 2568 wrote to memory of 2480 2568 vdjvp.exe lxllfxx.exe PID 2480 wrote to memory of 2600 2480 lxllfxx.exe 5xxffff.exe PID 2480 wrote to memory of 2600 2480 lxllfxx.exe 5xxffff.exe PID 2480 wrote to memory of 2600 2480 lxllfxx.exe 5xxffff.exe PID 2480 wrote to memory of 2600 2480 lxllfxx.exe 5xxffff.exe PID 2600 wrote to memory of 2416 2600 5xxffff.exe tnttbb.exe PID 2600 wrote to memory of 2416 2600 5xxffff.exe tnttbb.exe PID 2600 wrote to memory of 2416 2600 5xxffff.exe tnttbb.exe PID 2600 wrote to memory of 2416 2600 5xxffff.exe tnttbb.exe PID 2416 wrote to memory of 2772 2416 tnttbb.exe 5bhntn.exe PID 2416 wrote to memory of 2772 2416 tnttbb.exe 5bhntn.exe PID 2416 wrote to memory of 2772 2416 tnttbb.exe 5bhntn.exe PID 2416 wrote to memory of 2772 2416 tnttbb.exe 5bhntn.exe PID 2772 wrote to memory of 2768 2772 5bhntn.exe vjpdd.exe PID 2772 wrote to memory of 2768 2772 5bhntn.exe vjpdd.exe PID 2772 wrote to memory of 2768 2772 5bhntn.exe vjpdd.exe PID 2772 wrote to memory of 2768 2772 5bhntn.exe vjpdd.exe PID 2768 wrote to memory of 2744 2768 vjpdd.exe 7pvvp.exe PID 2768 wrote to memory of 2744 2768 vjpdd.exe 7pvvp.exe PID 2768 wrote to memory of 2744 2768 vjpdd.exe 7pvvp.exe PID 2768 wrote to memory of 2744 2768 vjpdd.exe 7pvvp.exe PID 2744 wrote to memory of 1652 2744 7pvvp.exe frlllff.exe PID 2744 wrote to memory of 1652 2744 7pvvp.exe frlllff.exe PID 2744 wrote to memory of 1652 2744 7pvvp.exe frlllff.exe PID 2744 wrote to memory of 1652 2744 7pvvp.exe frlllff.exe PID 1652 wrote to memory of 2320 1652 frlllff.exe nbbnnt.exe PID 1652 wrote to memory of 2320 1652 frlllff.exe nbbnnt.exe PID 1652 wrote to memory of 2320 1652 frlllff.exe nbbnnt.exe PID 1652 wrote to memory of 2320 1652 frlllff.exe nbbnnt.exe PID 2320 wrote to memory of 1700 2320 nbbnnt.exe ntbttn.exe PID 2320 wrote to memory of 1700 2320 nbbnnt.exe ntbttn.exe PID 2320 wrote to memory of 1700 2320 nbbnnt.exe ntbttn.exe PID 2320 wrote to memory of 1700 2320 nbbnnt.exe ntbttn.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18144e103e775e56884312eda2167950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\18144e103e775e56884312eda2167950_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
\??\c:\hbhbbt.exec:\hbhbbt.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2928 -
\??\c:\pjpvd.exec:\pjpvd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
\??\c:\jpddd.exec:\jpddd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
\??\c:\3rxxlxf.exec:\3rxxlxf.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\3lrrrrl.exec:\3lrrrrl.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\htthnh.exec:\htthnh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\vdjvp.exec:\vdjvp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
\??\c:\lxllfxx.exec:\lxllfxx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
\??\c:\5xxffff.exec:\5xxffff.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
\??\c:\tnttbb.exec:\tnttbb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2416 -
\??\c:\5bhntn.exec:\5bhntn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
\??\c:\vjpdd.exec:\vjpdd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\7pvvp.exec:\7pvvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\frlllff.exec:\frlllff.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1652 -
\??\c:\nbbnnt.exec:\nbbnnt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
\??\c:\ntbttn.exec:\ntbttn.exe17⤵
- Executes dropped EXE
PID:1700 -
\??\c:\vddpp.exec:\vddpp.exe18⤵
- Executes dropped EXE
PID:928 -
\??\c:\3jppp.exec:\3jppp.exe19⤵
- Executes dropped EXE
PID:1224 -
\??\c:\7frlrrf.exec:\7frlrrf.exe20⤵
- Executes dropped EXE
PID:1452 -
\??\c:\lxlllff.exec:\lxlllff.exe21⤵
- Executes dropped EXE
PID:1924 -
\??\c:\bhnhbb.exec:\bhnhbb.exe22⤵
- Executes dropped EXE
PID:1496 -
\??\c:\nhnbnh.exec:\nhnbnh.exe23⤵
- Executes dropped EXE
PID:1948 -
\??\c:\7pdpj.exec:\7pdpj.exe24⤵
- Executes dropped EXE
PID:2084 -
\??\c:\frxfxll.exec:\frxfxll.exe25⤵
- Executes dropped EXE
PID:676 -
\??\c:\rxffxll.exec:\rxffxll.exe26⤵
- Executes dropped EXE
PID:2152 -
\??\c:\thnnhb.exec:\thnnhb.exe27⤵
- Executes dropped EXE
PID:1880 -
\??\c:\9nnnht.exec:\9nnnht.exe28⤵
- Executes dropped EXE
PID:920 -
\??\c:\jppjv.exec:\jppjv.exe29⤵
- Executes dropped EXE
PID:1560 -
\??\c:\jppdv.exec:\jppdv.exe30⤵
- Executes dropped EXE
PID:2120 -
\??\c:\frxrlll.exec:\frxrlll.exe31⤵
- Executes dropped EXE
PID:2972 -
\??\c:\5lrrrrr.exec:\5lrrrrr.exe32⤵
- Executes dropped EXE
PID:1640 -
\??\c:\3nthhb.exec:\3nthhb.exe33⤵
- Executes dropped EXE
PID:2192 -
\??\c:\httnnb.exec:\httnnb.exe34⤵
- Executes dropped EXE
PID:2200 -
\??\c:\3pdvp.exec:\3pdvp.exe35⤵
- Executes dropped EXE
PID:2360 -
\??\c:\vjpdj.exec:\vjpdj.exe36⤵
- Executes dropped EXE
PID:3024 -
\??\c:\5lrrrrr.exec:\5lrrrrr.exe37⤵
- Executes dropped EXE
PID:2716 -
\??\c:\lrrlfxr.exec:\lrrlfxr.exe38⤵
- Executes dropped EXE
PID:2976 -
\??\c:\frrllfl.exec:\frrllfl.exe39⤵
- Executes dropped EXE
PID:2648 -
\??\c:\9nttth.exec:\9nttth.exe40⤵
- Executes dropped EXE
PID:2572 -
\??\c:\bntbtt.exec:\bntbtt.exe41⤵
- Executes dropped EXE
PID:2756 -
\??\c:\vdpjj.exec:\vdpjj.exe42⤵
- Executes dropped EXE
PID:2700 -
\??\c:\pdjjj.exec:\pdjjj.exe43⤵
- Executes dropped EXE
PID:2428 -
\??\c:\vjpjj.exec:\vjpjj.exe44⤵
- Executes dropped EXE
PID:2884 -
\??\c:\lrfflfr.exec:\lrfflfr.exe45⤵
- Executes dropped EXE
PID:2432 -
\??\c:\9ttnhh.exec:\9ttnhh.exe46⤵
- Executes dropped EXE
PID:2888 -
\??\c:\5nnhbt.exec:\5nnhbt.exe47⤵
- Executes dropped EXE
PID:2892 -
\??\c:\9dpdj.exec:\9dpdj.exe48⤵
- Executes dropped EXE
PID:1796 -
\??\c:\pdjdd.exec:\pdjdd.exe49⤵
- Executes dropped EXE
PID:1332 -
\??\c:\3flxfxx.exec:\3flxfxx.exe50⤵
- Executes dropped EXE
PID:2364 -
\??\c:\1xfxrlr.exec:\1xfxrlr.exe51⤵
- Executes dropped EXE
PID:2168 -
\??\c:\frxrrll.exec:\frxrrll.exe52⤵
- Executes dropped EXE
PID:2004 -
\??\c:\3ntntt.exec:\3ntntt.exe53⤵
- Executes dropped EXE
PID:1596 -
\??\c:\bhhhbt.exec:\bhhhbt.exe54⤵
- Executes dropped EXE
PID:1600 -
\??\c:\3ppdv.exec:\3ppdv.exe55⤵
- Executes dropped EXE
PID:1700 -
\??\c:\jvjjj.exec:\jvjjj.exe56⤵
- Executes dropped EXE
PID:2872 -
\??\c:\pjpjj.exec:\pjpjj.exe57⤵
- Executes dropped EXE
PID:648 -
\??\c:\5rlrrll.exec:\5rlrrll.exe58⤵
- Executes dropped EXE
PID:2020 -
\??\c:\nbnntn.exec:\nbnntn.exe59⤵
- Executes dropped EXE
PID:1928 -
\??\c:\5nhhbt.exec:\5nhhbt.exe60⤵
- Executes dropped EXE
PID:1924 -
\??\c:\jvddj.exec:\jvddj.exe61⤵
- Executes dropped EXE
PID:2820 -
\??\c:\3vdvp.exec:\3vdvp.exe62⤵
- Executes dropped EXE
PID:2292 -
\??\c:\frxrrlf.exec:\frxrrlf.exe63⤵
- Executes dropped EXE
PID:2816 -
\??\c:\xlrrrrr.exec:\xlrrrrr.exe64⤵
- Executes dropped EXE
PID:2748 -
\??\c:\5bhhbt.exec:\5bhhbt.exe65⤵
- Executes dropped EXE
PID:452 -
\??\c:\7bbbtn.exec:\7bbbtn.exe66⤵PID:1300
-
\??\c:\9vdjv.exec:\9vdjv.exe67⤵PID:1392
-
\??\c:\pddpp.exec:\pddpp.exe68⤵PID:1876
-
\??\c:\flrfxll.exec:\flrfxll.exe69⤵PID:1840
-
\??\c:\lrlflff.exec:\lrlflff.exe70⤵PID:1720
-
\??\c:\tnhnhn.exec:\tnhnhn.exe71⤵PID:1520
-
\??\c:\9nthht.exec:\9nthht.exe72⤵PID:1776
-
\??\c:\9bnnnn.exec:\9bnnnn.exe73⤵PID:1208
-
\??\c:\dppjd.exec:\dppjd.exe74⤵PID:292
-
\??\c:\pdjpv.exec:\pdjpv.exe75⤵PID:1624
-
\??\c:\xrxfrxl.exec:\xrxfrxl.exe76⤵PID:2612
-
\??\c:\nnbbnn.exec:\nnbbnn.exe77⤵PID:2924
-
\??\c:\9bttbn.exec:\9bttbn.exe78⤵PID:1756
-
\??\c:\1pddj.exec:\1pddj.exe79⤵PID:2156
-
\??\c:\5djvv.exec:\5djvv.exe80⤵PID:2656
-
\??\c:\vjdjv.exec:\vjdjv.exe81⤵PID:2584
-
\??\c:\fxffrrx.exec:\fxffrrx.exe82⤵PID:2776
-
\??\c:\7xfflff.exec:\7xfflff.exe83⤵PID:2592
-
\??\c:\7nbtnh.exec:\7nbtnh.exe84⤵PID:2468
-
\??\c:\bbnnbb.exec:\bbnnbb.exe85⤵PID:2596
-
\??\c:\jddpv.exec:\jddpv.exe86⤵PID:2444
-
\??\c:\vjjpv.exec:\vjjpv.exe87⤵PID:1688
-
\??\c:\9rfxxrr.exec:\9rfxxrr.exe88⤵PID:3044
-
\??\c:\1ttbhh.exec:\1ttbhh.exe89⤵PID:2416
-
\??\c:\7bhnht.exec:\7bhnht.exe90⤵PID:2724
-
\??\c:\btnntt.exec:\btnntt.exe91⤵PID:2260
-
\??\c:\djpvp.exec:\djpvp.exe92⤵PID:2324
-
\??\c:\vpppv.exec:\vpppv.exe93⤵PID:2744
-
\??\c:\rxxxxlf.exec:\rxxxxlf.exe94⤵PID:1664
-
\??\c:\rfrrxrr.exec:\rfrrxrr.exe95⤵PID:1988
-
\??\c:\xfxfrxl.exec:\xfxfrxl.exe96⤵PID:336
-
\??\c:\9htbhn.exec:\9htbhn.exe97⤵PID:892
-
\??\c:\9htntb.exec:\9htntb.exe98⤵PID:2788
-
\??\c:\9dvdp.exec:\9dvdp.exe99⤵PID:2524
-
\??\c:\pdjdd.exec:\pdjdd.exe100⤵PID:1116
-
\??\c:\ppvpd.exec:\ppvpd.exe101⤵PID:2088
-
\??\c:\frlfxrx.exec:\frlfxrx.exe102⤵PID:588
-
\??\c:\rlxlrrx.exec:\rlxlrrx.exe103⤵PID:2632
-
\??\c:\tnhhtt.exec:\tnhhtt.exe104⤵PID:1104
-
\??\c:\nhtnnn.exec:\nhtnnn.exe105⤵PID:2516
-
\??\c:\dpvvv.exec:\dpvvv.exe106⤵PID:676
-
\??\c:\jvjjv.exec:\jvjjv.exe107⤵PID:412
-
\??\c:\1vjjp.exec:\1vjjp.exe108⤵PID:280
-
\??\c:\lfxllrx.exec:\lfxllrx.exe109⤵PID:952
-
\??\c:\3xlrxrx.exec:\3xlrxrx.exe110⤵PID:1320
-
\??\c:\1nhhnn.exec:\1nhhnn.exe111⤵PID:2132
-
\??\c:\ttbtnh.exec:\ttbtnh.exe112⤵PID:1524
-
\??\c:\dvpvj.exec:\dvpvj.exe113⤵PID:1708
-
\??\c:\pjvvv.exec:\pjvvv.exe114⤵PID:2036
-
\??\c:\jdjjv.exec:\jdjjv.exe115⤵PID:1640
-
\??\c:\frfxxrx.exec:\frfxxrx.exe116⤵PID:1824
-
\??\c:\xrllrrf.exec:\xrllrrf.exe117⤵PID:2784
-
\??\c:\nbnhnn.exec:\nbnhnn.exe118⤵PID:2360
-
\??\c:\3htnnn.exec:\3htnnn.exe119⤵PID:2540
-
\??\c:\jvppj.exec:\jvppj.exe120⤵PID:3068
-
\??\c:\jdppv.exec:\jdppv.exe121⤵PID:2696
-
\??\c:\7djdd.exec:\7djdd.exe122⤵PID:2564
-
\??\c:\frfrrll.exec:\frfrrll.exe123⤵PID:2584
-
\??\c:\rfrrxxf.exec:\rfrrxxf.exe124⤵PID:2212
-
\??\c:\bnbhhh.exec:\bnbhhh.exe125⤵PID:2504
-
\??\c:\nbbhbh.exec:\nbbhbh.exe126⤵PID:2332
-
\??\c:\9vjjv.exec:\9vjjv.exe127⤵PID:2568
-
\??\c:\5vvpp.exec:\5vvpp.exe128⤵PID:2528
-
\??\c:\lfrxllx.exec:\lfrxllx.exe129⤵PID:2208
-
\??\c:\lxfrlrx.exec:\lxfrlrx.exe130⤵PID:2760
-
\??\c:\7rrxlfr.exec:\7rrxlfr.exe131⤵PID:2764
-
\??\c:\1nbbbh.exec:\1nbbbh.exe132⤵PID:832
-
\??\c:\bthnhh.exec:\bthnhh.exe133⤵PID:784
-
\??\c:\jdppd.exec:\jdppd.exe134⤵PID:548
-
\??\c:\pjjpd.exec:\pjjpd.exe135⤵PID:1696
-
\??\c:\rfrrrrl.exec:\rfrrrrl.exe136⤵PID:1684
-
\??\c:\rlxxxfl.exec:\rlxxxfl.exe137⤵PID:540
-
\??\c:\hnbbbh.exec:\hnbbbh.exe138⤵PID:480
-
\??\c:\nnhnnn.exec:\nnhnnn.exe139⤵PID:604
-
\??\c:\nbbbnb.exec:\nbbbnb.exe140⤵PID:2144
-
\??\c:\ppdvv.exec:\ppdvv.exe141⤵PID:1784
-
\??\c:\djvpj.exec:\djvpj.exe142⤵PID:2908
-
\??\c:\xrflxxf.exec:\xrflxxf.exe143⤵PID:2412
-
\??\c:\rfllffl.exec:\rfllffl.exe144⤵PID:1396
-
\??\c:\9lfxxrf.exec:\9lfxxrf.exe145⤵PID:1780
-
\??\c:\7bbhbb.exec:\7bbhbb.exe146⤵PID:2084
-
\??\c:\bthnbb.exec:\bthnbb.exe147⤵PID:1356
-
\??\c:\1jjpj.exec:\1jjpj.exe148⤵PID:972
-
\??\c:\7pddd.exec:\7pddd.exe149⤵PID:992
-
\??\c:\jpdpp.exec:\jpdpp.exe150⤵PID:936
-
\??\c:\3xfrrlr.exec:\3xfrrlr.exe151⤵PID:868
-
\??\c:\1lrxfff.exec:\1lrxfff.exe152⤵PID:1060
-
\??\c:\7hhhtb.exec:\7hhhtb.exe153⤵PID:2196
-
\??\c:\tthbnn.exec:\tthbnn.exe154⤵PID:2044
-
\??\c:\dvddj.exec:\dvddj.exe155⤵PID:1760
-
\??\c:\dpvvd.exec:\dpvvd.exe156⤵PID:1208
-
\??\c:\vjppv.exec:\vjppv.exe157⤵PID:1628
-
\??\c:\lxfflrx.exec:\lxfflrx.exe158⤵PID:2248
-
\??\c:\rlfrrrx.exec:\rlfrrrx.exe159⤵PID:2920
-
\??\c:\httnbb.exec:\httnbb.exe160⤵PID:2536
-
\??\c:\tnthtb.exec:\tnthtb.exe161⤵PID:2680
-
\??\c:\nthbhn.exec:\nthbhn.exe162⤵PID:2676
-
\??\c:\jjjpp.exec:\jjjpp.exe163⤵PID:2976
-
\??\c:\dvddj.exec:\dvddj.exe164⤵PID:2708
-
\??\c:\xrlrxxl.exec:\xrlrxxl.exe165⤵PID:2436
-
\??\c:\7rrrffl.exec:\7rrrffl.exe166⤵PID:2484
-
\??\c:\fflxlxl.exec:\fflxlxl.exe167⤵PID:2700
-
\??\c:\1nbbtt.exec:\1nbbtt.exe168⤵PID:2428
-
\??\c:\ntbntt.exec:\ntbntt.exe169⤵PID:2936
-
\??\c:\dpvpp.exec:\dpvpp.exe170⤵PID:2636
-
\??\c:\dvjvj.exec:\dvjvj.exe171⤵PID:2740
-
\??\c:\fxflllr.exec:\fxflllr.exe172⤵PID:2316
-
\??\c:\9xrrxff.exec:\9xrrxff.exe173⤵PID:2772
-
\??\c:\frxrxxf.exec:\frxrxxf.exe174⤵PID:1332
-
\??\c:\nhhhtn.exec:\nhhhtn.exe175⤵PID:1448
-
\??\c:\ttbhtn.exec:\ttbhtn.exe176⤵PID:2256
-
\??\c:\dvjjv.exec:\dvjjv.exe177⤵PID:1804
-
\??\c:\rlflxxl.exec:\rlflxxl.exe178⤵PID:2176
-
\??\c:\3nhhtn.exec:\3nhhtn.exe179⤵PID:1068
-
\??\c:\tntbnn.exec:\tntbnn.exe180⤵PID:928
-
\??\c:\bnbbbb.exec:\bnbbbb.exe181⤵PID:2856
-
\??\c:\pdjjj.exec:\pdjjj.exe182⤵PID:1328
-
\??\c:\ffrxflr.exec:\ffrxflr.exe183⤵PID:3064
-
\??\c:\xllrlff.exec:\xllrlff.exe184⤵PID:2080
-
\??\c:\tnhhbb.exec:\tnhhbb.exe185⤵PID:2280
-
\??\c:\bnttnh.exec:\bnttnh.exe186⤵PID:1948
-
\??\c:\tnhntb.exec:\tnhntb.exe187⤵PID:2292
-
\??\c:\pdjdd.exec:\pdjdd.exe188⤵PID:1872
-
\??\c:\3vpjj.exec:\3vpjj.exe189⤵PID:1016
-
\??\c:\frllrrx.exec:\frllrrx.exe190⤵PID:452
-
\??\c:\xlrxxfl.exec:\xlrxxfl.exe191⤵PID:656
-
\??\c:\nhnhtt.exec:\nhnhtt.exe192⤵PID:1020
-
\??\c:\tbnhhh.exec:\tbnhhh.exe193⤵PID:2116
-
\??\c:\pjdpd.exec:\pjdpd.exe194⤵PID:1444
-
\??\c:\jvddd.exec:\jvddd.exe195⤵PID:2132
-
\??\c:\xlfxlrl.exec:\xlfxlrl.exe196⤵PID:1520
-
\??\c:\rfxrrll.exec:\rfxrrll.exe197⤵PID:1168
-
\??\c:\bbnttb.exec:\bbnttb.exe198⤵PID:2852
-
\??\c:\hthtbb.exec:\hthtbb.exe199⤵PID:292
-
\??\c:\vpvjv.exec:\vpvjv.exe200⤵PID:1324
-
\??\c:\pdjjj.exec:\pdjjj.exe201⤵PID:2720
-
\??\c:\1xxflfl.exec:\1xxflfl.exe202⤵PID:2716
-
\??\c:\rlfrlrf.exec:\rlfrlrf.exe203⤵PID:2588
-
\??\c:\frllrlr.exec:\frllrlr.exe204⤵PID:2812
-
\??\c:\htnttt.exec:\htnttt.exe205⤵PID:2668
-
\??\c:\btbtbt.exec:\btbtbt.exe206⤵PID:2308
-
\??\c:\9jvvd.exec:\9jvvd.exe207⤵PID:2800
-
\??\c:\vpdpj.exec:\vpdpj.exe208⤵PID:2552
-
\??\c:\djddd.exec:\djddd.exe209⤵PID:2472
-
\??\c:\rfxrrlf.exec:\rfxrrlf.exe210⤵PID:1968
-
\??\c:\rlrllll.exec:\rlrllll.exe211⤵PID:820
-
\??\c:\tthhnb.exec:\tthhnb.exe212⤵PID:1964
-
\??\c:\btnhtb.exec:\btnhtb.exe213⤵PID:2496
-
\??\c:\ntbbtn.exec:\ntbbtn.exe214⤵PID:908
-
\??\c:\ppjjp.exec:\ppjjp.exe215⤵PID:2220
-
\??\c:\vdjvp.exec:\vdjvp.exe216⤵PID:2752
-
\??\c:\rlxlxlr.exec:\rlxlxlr.exe217⤵PID:788
-
\??\c:\lxxrlfl.exec:\lxxrlfl.exe218⤵PID:1260
-
\??\c:\9xrfrxf.exec:\9xrfrxf.exe219⤵PID:1984
-
\??\c:\bhnhhb.exec:\bhnhhb.exe220⤵PID:1988
-
\??\c:\tntbbb.exec:\tntbbb.exe221⤵PID:2236
-
\??\c:\vjjpv.exec:\vjjpv.exe222⤵PID:2216
-
\??\c:\9ppdv.exec:\9ppdv.exe223⤵PID:1516
-
\??\c:\jvdvv.exec:\jvdvv.exe224⤵PID:1508
-
\??\c:\rlfxrrf.exec:\rlfxrrf.exe225⤵PID:2932
-
\??\c:\1rfxrlr.exec:\1rfxrlr.exe226⤵PID:2128
-
\??\c:\9nhhnt.exec:\9nhhnt.exe227⤵PID:1492
-
\??\c:\9bhhnn.exec:\9bhhnn.exe228⤵PID:1412
-
\??\c:\jdjvd.exec:\jdjvd.exe229⤵PID:2516
-
\??\c:\vppdp.exec:\vppdp.exe230⤵PID:2152
-
\??\c:\jvjvj.exec:\jvjvj.exe231⤵PID:1268
-
\??\c:\1xllfff.exec:\1xllfff.exe232⤵PID:240
-
\??\c:\1rlrfff.exec:\1rlrfff.exe233⤵PID:2340
-
\??\c:\bhtbnn.exec:\bhtbnn.exe234⤵PID:2040
-
\??\c:\hbntbt.exec:\hbntbt.exe235⤵PID:708
-
\??\c:\tbhbbt.exec:\tbhbbt.exe236⤵PID:2228
-
\??\c:\jdpvj.exec:\jdpvj.exe237⤵PID:2972
-
\??\c:\rflflfl.exec:\rflflfl.exe238⤵PID:1616
-
\??\c:\nhtttb.exec:\nhtttb.exe239⤵PID:3040
-
\??\c:\tnthtn.exec:\tnthtn.exe240⤵PID:1744
-
\??\c:\bbnnnt.exec:\bbnnnt.exe241⤵PID:2248
-
\??\c:\jdpjj.exec:\jdpjj.exe242⤵PID:2172