Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 19:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1dd150b2e16628bf3a2e0f665ed74590_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
1dd150b2e16628bf3a2e0f665ed74590_NeikiAnalytics.exe
-
Size
122KB
-
MD5
1dd150b2e16628bf3a2e0f665ed74590
-
SHA1
4e36b3da46ad656e13d09768c271b1c836d2d242
-
SHA256
a5bf35b082de71c42a8a99b9245a84d71d874ac754db166300774dd43d10cb18
-
SHA512
12aad920e6b3245497b27f5d0ff7427806e262c44c6f8b7b678454024dabe53a031287ab1b527b673f9fdac1c0edb895ba5fa2e9173176772604028043906bc7
-
SSDEEP
3072:ymb3NkkiQ3mdBjFWXkj7afoHvmQ+EZMYX90Ifcmt:n3C9BRW0j/uVEZFmIkS
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral2/memory/2876-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4700-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3128-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5016-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4488-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2252-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3572-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/432-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3556-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2176-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1408-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1084-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3728-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3184-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4280-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/396-131-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/60-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1636-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5080-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3148-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4400-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/900-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4044-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
bhbhhn.exe9jpdp.exexllxllx.exexxxlfxl.exettnnht.exejvdvd.exelrllxfx.exehtnnbn.exejpdvd.exe1flfxxl.exebttnhh.exe1vpjv.exe9flflfr.exe9hbnhn.exexfxlfrl.exenhbtnh.exepdjdv.exeflrffxf.exelxxfxfl.exetthhht.exejvjpj.exexrrlxxr.exenhnhbh.exennthbt.exepjdvp.exexrllxrl.exenttnbh.exedvpvj.exe9ffxllx.exelxfrlfx.exehbhnbh.exehbhbtn.exedvpjv.exexrxxlll.exetntnhh.exejdvpj.exevpjvj.exefxxxxxr.exe3thbhh.exedppjd.exedvdvp.exelffrrxr.exe5ntnhb.exenthnht.exeddjpp.exexrrlllr.exenhnbhb.exepdvdv.exepdjdd.exerfrlfxr.exefxrllrx.exe3bnbth.exeddddv.exe1dvpp.exexfxlrlr.exerrfrllr.exetntnbh.exe7pjdp.exepppvp.exellllxll.exehbttnh.exethhtht.exeppvpj.exedpdvj.exepid process 4700 bhbhhn.exe 5016 9jpdp.exe 3128 xllxllx.exe 4076 xxxlfxl.exe 3720 ttnnht.exe 4488 jvdvd.exe 2252 lrllxfx.exe 3572 htnnbn.exe 432 jpdvd.exe 3556 1flfxxl.exe 2176 bttnhh.exe 1408 1vpjv.exe 1084 9flflfr.exe 3980 9hbnhn.exe 3728 xfxlfrl.exe 3184 nhbtnh.exe 4280 pdjdv.exe 4568 flrffxf.exe 396 lxxfxfl.exe 60 tthhht.exe 1636 jvjpj.exe 5080 xrrlxxr.exe 964 nhnhbh.exe 3636 nnthbt.exe 3148 pjdvp.exe 4400 xrllxrl.exe 900 nttnbh.exe 4616 dvpvj.exe 3944 9ffxllx.exe 764 lxfrlfx.exe 4044 hbhnbh.exe 4512 hbhbtn.exe 4348 dvpjv.exe 2196 xrxxlll.exe 2232 tntnhh.exe 3812 jdvpj.exe 2924 vpjvj.exe 4056 fxxxxxr.exe 2920 3thbhh.exe 2980 dppjd.exe 5072 dvdvp.exe 1992 lffrrxr.exe 3960 5ntnhb.exe 2256 nthnht.exe 2148 ddjpp.exe 3136 xrrlllr.exe 3228 nhnbhb.exe 2332 pdvdv.exe 4716 pdjdd.exe 1460 rfrlfxr.exe 4048 fxrllrx.exe 1296 3bnbth.exe 1560 ddddv.exe 2052 1dvpp.exe 4332 xfxlrlr.exe 2192 rrfrllr.exe 632 tntnbh.exe 4504 7pjdp.exe 60 pppvp.exe 3452 llllxll.exe 4492 hbttnh.exe 916 thhtht.exe 2916 ppvpj.exe 2264 dpdvj.exe -
Processes:
resource yara_rule behavioral2/memory/2876-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4700-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3128-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5016-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4488-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4488-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2252-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3572-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/432-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2176-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1408-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1084-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3728-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3184-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4280-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/396-131-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/60-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1636-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5080-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3148-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4400-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/900-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4044-202-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1dd150b2e16628bf3a2e0f665ed74590_NeikiAnalytics.exebhbhhn.exe9jpdp.exexllxllx.exexxxlfxl.exettnnht.exejvdvd.exelrllxfx.exehtnnbn.exejpdvd.exe1flfxxl.exebttnhh.exe1vpjv.exe9flflfr.exe9hbnhn.exexfxlfrl.exenhbtnh.exepdjdv.exeflrffxf.exelxxfxfl.exetthhht.exejvjpj.exedescription pid process target process PID 2876 wrote to memory of 4700 2876 1dd150b2e16628bf3a2e0f665ed74590_NeikiAnalytics.exe bhbhhn.exe PID 2876 wrote to memory of 4700 2876 1dd150b2e16628bf3a2e0f665ed74590_NeikiAnalytics.exe bhbhhn.exe PID 2876 wrote to memory of 4700 2876 1dd150b2e16628bf3a2e0f665ed74590_NeikiAnalytics.exe bhbhhn.exe PID 4700 wrote to memory of 5016 4700 bhbhhn.exe 9jpdp.exe PID 4700 wrote to memory of 5016 4700 bhbhhn.exe 9jpdp.exe PID 4700 wrote to memory of 5016 4700 bhbhhn.exe 9jpdp.exe PID 5016 wrote to memory of 3128 5016 9jpdp.exe xllxllx.exe PID 5016 wrote to memory of 3128 5016 9jpdp.exe xllxllx.exe PID 5016 wrote to memory of 3128 5016 9jpdp.exe xllxllx.exe PID 3128 wrote to memory of 4076 3128 xllxllx.exe xxxlfxl.exe PID 3128 wrote to memory of 4076 3128 xllxllx.exe xxxlfxl.exe PID 3128 wrote to memory of 4076 3128 xllxllx.exe xxxlfxl.exe PID 4076 wrote to memory of 3720 4076 xxxlfxl.exe ttnnht.exe PID 4076 wrote to memory of 3720 4076 xxxlfxl.exe ttnnht.exe PID 4076 wrote to memory of 3720 4076 xxxlfxl.exe ttnnht.exe PID 3720 wrote to memory of 4488 3720 ttnnht.exe jvdvd.exe PID 3720 wrote to memory of 4488 3720 ttnnht.exe jvdvd.exe PID 3720 wrote to memory of 4488 3720 ttnnht.exe jvdvd.exe PID 4488 wrote to memory of 2252 4488 jvdvd.exe lrllxfx.exe PID 4488 wrote to memory of 2252 4488 jvdvd.exe lrllxfx.exe PID 4488 wrote to memory of 2252 4488 jvdvd.exe lrllxfx.exe PID 2252 wrote to memory of 3572 2252 lrllxfx.exe htnnbn.exe PID 2252 wrote to memory of 3572 2252 lrllxfx.exe htnnbn.exe PID 2252 wrote to memory of 3572 2252 lrllxfx.exe htnnbn.exe PID 3572 wrote to memory of 432 3572 htnnbn.exe jpdvd.exe PID 3572 wrote to memory of 432 3572 htnnbn.exe jpdvd.exe PID 3572 wrote to memory of 432 3572 htnnbn.exe jpdvd.exe PID 432 wrote to memory of 3556 432 jpdvd.exe 1flfxxl.exe PID 432 wrote to memory of 3556 432 jpdvd.exe 1flfxxl.exe PID 432 wrote to memory of 3556 432 jpdvd.exe 1flfxxl.exe PID 3556 wrote to memory of 2176 3556 1flfxxl.exe bttnhh.exe PID 3556 wrote to memory of 2176 3556 1flfxxl.exe bttnhh.exe PID 3556 wrote to memory of 2176 3556 1flfxxl.exe bttnhh.exe PID 2176 wrote to memory of 1408 2176 bttnhh.exe 1vpjv.exe PID 2176 wrote to memory of 1408 2176 bttnhh.exe 1vpjv.exe PID 2176 wrote to memory of 1408 2176 bttnhh.exe 1vpjv.exe PID 1408 wrote to memory of 1084 1408 1vpjv.exe 9flflfr.exe PID 1408 wrote to memory of 1084 1408 1vpjv.exe 9flflfr.exe PID 1408 wrote to memory of 1084 1408 1vpjv.exe 9flflfr.exe PID 1084 wrote to memory of 3980 1084 9flflfr.exe 9hbnhn.exe PID 1084 wrote to memory of 3980 1084 9flflfr.exe 9hbnhn.exe PID 1084 wrote to memory of 3980 1084 9flflfr.exe 9hbnhn.exe PID 3980 wrote to memory of 3728 3980 9hbnhn.exe xfxlfrl.exe PID 3980 wrote to memory of 3728 3980 9hbnhn.exe xfxlfrl.exe PID 3980 wrote to memory of 3728 3980 9hbnhn.exe xfxlfrl.exe PID 3728 wrote to memory of 3184 3728 xfxlfrl.exe nhbtnh.exe PID 3728 wrote to memory of 3184 3728 xfxlfrl.exe nhbtnh.exe PID 3728 wrote to memory of 3184 3728 xfxlfrl.exe nhbtnh.exe PID 3184 wrote to memory of 4280 3184 nhbtnh.exe pdjdv.exe PID 3184 wrote to memory of 4280 3184 nhbtnh.exe pdjdv.exe PID 3184 wrote to memory of 4280 3184 nhbtnh.exe pdjdv.exe PID 4280 wrote to memory of 4568 4280 pdjdv.exe flrffxf.exe PID 4280 wrote to memory of 4568 4280 pdjdv.exe flrffxf.exe PID 4280 wrote to memory of 4568 4280 pdjdv.exe flrffxf.exe PID 4568 wrote to memory of 396 4568 flrffxf.exe lxxfxfl.exe PID 4568 wrote to memory of 396 4568 flrffxf.exe lxxfxfl.exe PID 4568 wrote to memory of 396 4568 flrffxf.exe lxxfxfl.exe PID 396 wrote to memory of 60 396 lxxfxfl.exe tthhht.exe PID 396 wrote to memory of 60 396 lxxfxfl.exe tthhht.exe PID 396 wrote to memory of 60 396 lxxfxfl.exe tthhht.exe PID 60 wrote to memory of 1636 60 tthhht.exe jvjpj.exe PID 60 wrote to memory of 1636 60 tthhht.exe jvjpj.exe PID 60 wrote to memory of 1636 60 tthhht.exe jvjpj.exe PID 1636 wrote to memory of 5080 1636 jvjpj.exe xrrlxxr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dd150b2e16628bf3a2e0f665ed74590_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1dd150b2e16628bf3a2e0f665ed74590_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\bhbhhn.exec:\bhbhhn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4700 -
\??\c:\9jpdp.exec:\9jpdp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
\??\c:\xllxllx.exec:\xllxllx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
\??\c:\xxxlfxl.exec:\xxxlfxl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
\??\c:\ttnnht.exec:\ttnnht.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\jvdvd.exec:\jvdvd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\lrllxfx.exec:\lrllxfx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\htnnbn.exec:\htnnbn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
\??\c:\jpdvd.exec:\jpdvd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432 -
\??\c:\1flfxxl.exec:\1flfxxl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3556 -
\??\c:\bttnhh.exec:\bttnhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
\??\c:\1vpjv.exec:\1vpjv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1408 -
\??\c:\9flflfr.exec:\9flflfr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1084 -
\??\c:\9hbnhn.exec:\9hbnhn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3980 -
\??\c:\xfxlfrl.exec:\xfxlfrl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
\??\c:\nhbtnh.exec:\nhbtnh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
\??\c:\pdjdv.exec:\pdjdv.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4280 -
\??\c:\flrffxf.exec:\flrffxf.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4568 -
\??\c:\lxxfxfl.exec:\lxxfxfl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:396 -
\??\c:\tthhht.exec:\tthhht.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
\??\c:\jvjpj.exec:\jvjpj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1636 -
\??\c:\xrrlxxr.exec:\xrrlxxr.exe23⤵
- Executes dropped EXE
PID:5080 -
\??\c:\nhnhbh.exec:\nhnhbh.exe24⤵
- Executes dropped EXE
PID:964 -
\??\c:\nnthbt.exec:\nnthbt.exe25⤵
- Executes dropped EXE
PID:3636 -
\??\c:\pjdvp.exec:\pjdvp.exe26⤵
- Executes dropped EXE
PID:3148 -
\??\c:\xrllxrl.exec:\xrllxrl.exe27⤵
- Executes dropped EXE
PID:4400 -
\??\c:\nttnbh.exec:\nttnbh.exe28⤵
- Executes dropped EXE
PID:900 -
\??\c:\dvpvj.exec:\dvpvj.exe29⤵
- Executes dropped EXE
PID:4616 -
\??\c:\9ffxllx.exec:\9ffxllx.exe30⤵
- Executes dropped EXE
PID:3944 -
\??\c:\lxfrlfx.exec:\lxfrlfx.exe31⤵
- Executes dropped EXE
PID:764 -
\??\c:\hbhnbh.exec:\hbhnbh.exe32⤵
- Executes dropped EXE
PID:4044 -
\??\c:\hbhbtn.exec:\hbhbtn.exe33⤵
- Executes dropped EXE
PID:4512 -
\??\c:\dvpjv.exec:\dvpjv.exe34⤵
- Executes dropped EXE
PID:4348 -
\??\c:\xrxxlll.exec:\xrxxlll.exe35⤵
- Executes dropped EXE
PID:2196 -
\??\c:\tntnhh.exec:\tntnhh.exe36⤵
- Executes dropped EXE
PID:2232 -
\??\c:\jdvpj.exec:\jdvpj.exe37⤵
- Executes dropped EXE
PID:3812 -
\??\c:\vpjvj.exec:\vpjvj.exe38⤵
- Executes dropped EXE
PID:2924 -
\??\c:\fxxxxxr.exec:\fxxxxxr.exe39⤵
- Executes dropped EXE
PID:4056 -
\??\c:\3thbhh.exec:\3thbhh.exe40⤵
- Executes dropped EXE
PID:2920 -
\??\c:\dppjd.exec:\dppjd.exe41⤵
- Executes dropped EXE
PID:2980 -
\??\c:\dvdvp.exec:\dvdvp.exe42⤵
- Executes dropped EXE
PID:5072 -
\??\c:\lffrrxr.exec:\lffrrxr.exe43⤵
- Executes dropped EXE
PID:1992 -
\??\c:\5ntnhb.exec:\5ntnhb.exe44⤵
- Executes dropped EXE
PID:3960 -
\??\c:\nthnht.exec:\nthnht.exe45⤵
- Executes dropped EXE
PID:2256 -
\??\c:\ddjpp.exec:\ddjpp.exe46⤵
- Executes dropped EXE
PID:2148 -
\??\c:\xrrlllr.exec:\xrrlllr.exe47⤵
- Executes dropped EXE
PID:3136 -
\??\c:\nhnbhb.exec:\nhnbhb.exe48⤵
- Executes dropped EXE
PID:3228 -
\??\c:\pdvdv.exec:\pdvdv.exe49⤵
- Executes dropped EXE
PID:2332 -
\??\c:\pdjdd.exec:\pdjdd.exe50⤵
- Executes dropped EXE
PID:4716 -
\??\c:\rfrlfxr.exec:\rfrlfxr.exe51⤵
- Executes dropped EXE
PID:1460 -
\??\c:\fxrllrx.exec:\fxrllrx.exe52⤵
- Executes dropped EXE
PID:4048 -
\??\c:\3bnbth.exec:\3bnbth.exe53⤵
- Executes dropped EXE
PID:1296 -
\??\c:\ddddv.exec:\ddddv.exe54⤵
- Executes dropped EXE
PID:1560 -
\??\c:\1dvpp.exec:\1dvpp.exe55⤵
- Executes dropped EXE
PID:2052 -
\??\c:\xfxlrlr.exec:\xfxlrlr.exe56⤵
- Executes dropped EXE
PID:4332 -
\??\c:\rrfrllr.exec:\rrfrllr.exe57⤵
- Executes dropped EXE
PID:2192 -
\??\c:\tntnbh.exec:\tntnbh.exe58⤵
- Executes dropped EXE
PID:632 -
\??\c:\7pjdp.exec:\7pjdp.exe59⤵
- Executes dropped EXE
PID:4504 -
\??\c:\pppvp.exec:\pppvp.exe60⤵
- Executes dropped EXE
PID:60 -
\??\c:\llllxll.exec:\llllxll.exe61⤵
- Executes dropped EXE
PID:3452 -
\??\c:\hbttnh.exec:\hbttnh.exe62⤵
- Executes dropped EXE
PID:4492 -
\??\c:\thhtht.exec:\thhtht.exe63⤵
- Executes dropped EXE
PID:916 -
\??\c:\ppvpj.exec:\ppvpj.exe64⤵
- Executes dropped EXE
PID:2916 -
\??\c:\dpdvj.exec:\dpdvj.exe65⤵
- Executes dropped EXE
PID:2264 -
\??\c:\llxrxxr.exec:\llxrxxr.exe66⤵PID:5056
-
\??\c:\htnhtt.exec:\htnhtt.exe67⤵PID:888
-
\??\c:\tnnhth.exec:\tnnhth.exe68⤵PID:1900
-
\??\c:\vjjdj.exec:\vjjdj.exe69⤵PID:4616
-
\??\c:\frfxllf.exec:\frfxllf.exe70⤵PID:336
-
\??\c:\xlrfxxr.exec:\xlrfxxr.exe71⤵PID:2528
-
\??\c:\tbbttt.exec:\tbbttt.exe72⤵PID:4160
-
\??\c:\dpvjv.exec:\dpvjv.exe73⤵PID:4368
-
\??\c:\vjpjv.exec:\vjpjv.exe74⤵PID:1852
-
\??\c:\xllxlxr.exec:\xllxlxr.exe75⤵PID:2876
-
\??\c:\rfllxrl.exec:\rfllxrl.exe76⤵PID:2196
-
\??\c:\nntnbt.exec:\nntnbt.exe77⤵PID:2900
-
\??\c:\htbtnn.exec:\htbtnn.exe78⤵PID:4988
-
\??\c:\jvdpp.exec:\jvdpp.exe79⤵PID:1424
-
\??\c:\frfffff.exec:\frfffff.exe80⤵PID:4804
-
\??\c:\fxrlrlx.exec:\fxrlrlx.exe81⤵PID:3720
-
\??\c:\5bnnnb.exec:\5bnnnb.exe82⤵PID:4812
-
\??\c:\nbbbbh.exec:\nbbbbh.exe83⤵PID:4688
-
\??\c:\pddjj.exec:\pddjj.exe84⤵PID:3236
-
\??\c:\vjdvj.exec:\vjdvj.exe85⤵PID:760
-
\??\c:\5xfrffl.exec:\5xfrffl.exe86⤵PID:2620
-
\??\c:\ntnnbb.exec:\ntnnbb.exe87⤵PID:432
-
\??\c:\thtnhb.exec:\thtnhb.exe88⤵PID:4300
-
\??\c:\jpvjj.exec:\jpvjj.exe89⤵PID:4676
-
\??\c:\lrxflxl.exec:\lrxflxl.exe90⤵PID:2608
-
\??\c:\rxxrflx.exec:\rxxrflx.exe91⤵PID:1448
-
\??\c:\bnnnhn.exec:\bnnnhn.exe92⤵PID:1084
-
\??\c:\tbnnnb.exec:\tbnnnb.exe93⤵PID:3740
-
\??\c:\jdvjv.exec:\jdvjv.exe94⤵PID:2536
-
\??\c:\3vpjd.exec:\3vpjd.exe95⤵PID:728
-
\??\c:\xlxxfff.exec:\xlxxfff.exe96⤵PID:3080
-
\??\c:\rfflfxr.exec:\rfflfxr.exe97⤵PID:3408
-
\??\c:\httnnh.exec:\httnnh.exe98⤵PID:4280
-
\??\c:\vdvpj.exec:\vdvpj.exe99⤵PID:4560
-
\??\c:\dvddd.exec:\dvddd.exe100⤵PID:2076
-
\??\c:\fxrlflf.exec:\fxrlflf.exe101⤵PID:2520
-
\??\c:\rxfxrlf.exec:\rxfxrlf.exe102⤵PID:2068
-
\??\c:\tnhhbt.exec:\tnhhbt.exe103⤵PID:3108
-
\??\c:\pjjdv.exec:\pjjdv.exe104⤵PID:208
-
\??\c:\pdvpj.exec:\pdvpj.exe105⤵PID:2200
-
\??\c:\rflrlrf.exec:\rflrlrf.exe106⤵PID:2152
-
\??\c:\tnhnhh.exec:\tnhnhh.exe107⤵PID:5008
-
\??\c:\bhttnn.exec:\bhttnn.exe108⤵PID:3224
-
\??\c:\7jpjp.exec:\7jpjp.exe109⤵PID:2892
-
\??\c:\5ppjv.exec:\5ppjv.exe110⤵PID:2580
-
\??\c:\fxxrffx.exec:\fxxrffx.exe111⤵PID:4848
-
\??\c:\xfxrllf.exec:\xfxrllf.exe112⤵PID:4896
-
\??\c:\bnbthn.exec:\bnbthn.exe113⤵PID:4948
-
\??\c:\nnhbnb.exec:\nnhbnb.exe114⤵PID:452
-
\??\c:\jvvjp.exec:\jvvjp.exe115⤵PID:1852
-
\??\c:\tbhthb.exec:\tbhthb.exe116⤵PID:1732
-
\??\c:\thtnnh.exec:\thtnnh.exe117⤵PID:2196
-
\??\c:\vjjdp.exec:\vjjdp.exe118⤵PID:2900
-
\??\c:\1lrlrlr.exec:\1lrlrlr.exe119⤵PID:3988
-
\??\c:\7rxrffr.exec:\7rxrffr.exe120⤵PID:1424
-
\??\c:\tthttt.exec:\tthttt.exe121⤵PID:4804
-
\??\c:\nhhbnh.exec:\nhhbnh.exe122⤵PID:3720
-
\??\c:\pdjdp.exec:\pdjdp.exe123⤵PID:4052
-
\??\c:\jvjdv.exec:\jvjdv.exe124⤵PID:4288
-
\??\c:\xflfxrl.exec:\xflfxrl.exe125⤵PID:2256
-
\??\c:\ththbt.exec:\ththbt.exe126⤵PID:3512
-
\??\c:\5tthtt.exec:\5tthtt.exe127⤵PID:4476
-
\??\c:\jvjdp.exec:\jvjdp.exe128⤵PID:2204
-
\??\c:\jjpjv.exec:\jjpjv.exe129⤵PID:624
-
\??\c:\lrlfrlx.exec:\lrlfrlx.exe130⤵PID:4980
-
\??\c:\hbhtbt.exec:\hbhtbt.exe131⤵PID:4716
-
\??\c:\hhnhnn.exec:\hhnhnn.exe132⤵PID:3336
-
\??\c:\dvvpd.exec:\dvvpd.exe133⤵PID:4048
-
\??\c:\3vvpj.exec:\3vvpj.exe134⤵PID:3276
-
\??\c:\llrlrrl.exec:\llrlrrl.exe135⤵PID:4852
-
\??\c:\btttnn.exec:\btttnn.exe136⤵PID:2408
-
\??\c:\bhhnht.exec:\bhhnht.exe137⤵PID:1516
-
\??\c:\ddvdd.exec:\ddvdd.exe138⤵PID:3860
-
\??\c:\fllxrlf.exec:\fllxrlf.exe139⤵PID:2512
-
\??\c:\xrfrrlr.exec:\xrfrrlr.exe140⤵PID:2100
-
\??\c:\nbbnhb.exec:\nbbnhb.exe141⤵PID:3872
-
\??\c:\tnnhtn.exec:\tnnhtn.exe142⤵PID:3208
-
\??\c:\dvpjv.exec:\dvpjv.exe143⤵PID:4416
-
\??\c:\vpvdp.exec:\vpvdp.exe144⤵PID:3708
-
\??\c:\lxxrlfx.exec:\lxxrlfx.exe145⤵PID:3368
-
\??\c:\rlfrlll.exec:\rlfrlll.exe146⤵PID:2376
-
\??\c:\tbbtnb.exec:\tbbtnb.exe147⤵PID:1900
-
\??\c:\htbnhn.exec:\htbnhn.exe148⤵PID:2892
-
\??\c:\jdpjv.exec:\jdpjv.exe149⤵PID:764
-
\??\c:\vjjpj.exec:\vjjpj.exe150⤵PID:3776
-
\??\c:\fxxfrfx.exec:\fxxfrfx.exe151⤵PID:4948
-
\??\c:\xfllllr.exec:\xfllllr.exe152⤵PID:3020
-
\??\c:\9nntnn.exec:\9nntnn.exe153⤵PID:3488
-
\??\c:\bntbhh.exec:\bntbhh.exe154⤵PID:3112
-
\??\c:\dppjd.exec:\dppjd.exe155⤵PID:1276
-
\??\c:\fffxrrl.exec:\fffxrrl.exe156⤵PID:4936
-
\??\c:\3rxxffl.exec:\3rxxffl.exe157⤵PID:1992
-
\??\c:\hbnhnn.exec:\hbnhnn.exe158⤵PID:4688
-
\??\c:\ntnhhh.exec:\ntnhhh.exe159⤵PID:3572
-
\??\c:\jddpp.exec:\jddpp.exe160⤵PID:3940
-
\??\c:\lxffxxx.exec:\lxffxxx.exe161⤵PID:1332
-
\??\c:\5xxrllf.exec:\5xxrllf.exe162⤵PID:2204
-
\??\c:\hbthbh.exec:\hbthbh.exe163⤵PID:3212
-
\??\c:\btbnhh.exec:\btbnhh.exe164⤵PID:4872
-
\??\c:\vjjjv.exec:\vjjjv.exe165⤵PID:1100
-
\??\c:\lfrlffx.exec:\lfrlffx.exe166⤵PID:4968
-
\??\c:\nntbtn.exec:\nntbtn.exe167⤵PID:4464
-
\??\c:\3bbtbb.exec:\3bbtbb.exe168⤵PID:1124
-
\??\c:\pjjjp.exec:\pjjjp.exe169⤵PID:656
-
\??\c:\ffffxxx.exec:\ffffxxx.exe170⤵PID:2408
-
\??\c:\rlxlrrx.exec:\rlxlrrx.exe171⤵PID:3448
-
\??\c:\bthnbb.exec:\bthnbb.exe172⤵PID:4292
-
\??\c:\jjjvv.exec:\jjjvv.exe173⤵PID:2512
-
\??\c:\5rlxxlf.exec:\5rlxxlf.exe174⤵PID:4040
-
\??\c:\lflffff.exec:\lflffff.exe175⤵PID:3108
-
\??\c:\hthbbb.exec:\hthbbb.exe176⤵PID:916
-
\??\c:\hhhhbb.exec:\hhhhbb.exe177⤵PID:4416
-
\??\c:\pjjvv.exec:\pjjvv.exe178⤵PID:2576
-
\??\c:\xxxfrrr.exec:\xxxfrrr.exe179⤵PID:888
-
\??\c:\xlllfxr.exec:\xlllfxr.exe180⤵PID:3944
-
\??\c:\thhtnh.exec:\thhtnh.exe181⤵PID:4572
-
\??\c:\btnbnt.exec:\btnbnt.exe182⤵PID:2892
-
\??\c:\5vvpj.exec:\5vvpj.exe183⤵PID:4368
-
\??\c:\lfxxxxx.exec:\lfxxxxx.exe184⤵PID:448
-
\??\c:\fxxxrxl.exec:\fxxxrxl.exe185⤵PID:1484
-
\??\c:\ntnhbt.exec:\ntnhbt.exe186⤵PID:3020
-
\??\c:\pdjdd.exec:\pdjdd.exe187⤵PID:672
-
\??\c:\5jjjj.exec:\5jjjj.exe188⤵PID:4912
-
\??\c:\xffxrlf.exec:\xffxrlf.exe189⤵PID:3720
-
\??\c:\xrfflrr.exec:\xrfflrr.exe190⤵PID:4540
-
\??\c:\bhnnhb.exec:\bhnnhb.exe191⤵PID:4288
-
\??\c:\nnttnn.exec:\nnttnn.exe192⤵PID:5108
-
\??\c:\ppddd.exec:\ppddd.exe193⤵PID:3512
-
\??\c:\jpdvp.exec:\jpdvp.exe194⤵PID:3136
-
\??\c:\fxllflf.exec:\fxllflf.exe195⤵PID:3152
-
\??\c:\5rrllll.exec:\5rrllll.exe196⤵PID:624
-
\??\c:\ntbhbn.exec:\ntbhbn.exe197⤵PID:4904
-
\??\c:\jddjj.exec:\jddjj.exe198⤵PID:4716
-
\??\c:\jdvjd.exec:\jdvjd.exe199⤵PID:3336
-
\??\c:\lflfllr.exec:\lflfllr.exe200⤵PID:4048
-
\??\c:\ffrrrrr.exec:\ffrrrrr.exe201⤵PID:3276
-
\??\c:\tnhnht.exec:\tnhnht.exe202⤵PID:2356
-
\??\c:\dvvdp.exec:\dvvdp.exe203⤵PID:4644
-
\??\c:\frrrrff.exec:\frrrrff.exe204⤵PID:1244
-
\??\c:\rffffxl.exec:\rffffxl.exe205⤵PID:1476
-
\??\c:\nnhhbb.exec:\nnhhbb.exe206⤵PID:700
-
\??\c:\jpvvp.exec:\jpvvp.exe207⤵PID:60
-
\??\c:\jjjdv.exec:\jjjdv.exe208⤵PID:3552
-
\??\c:\xxxrxxf.exec:\xxxrxxf.exe209⤵PID:3636
-
\??\c:\rxflxxx.exec:\rxflxxx.exe210⤵PID:916
-
\??\c:\ntntbt.exec:\ntntbt.exe211⤵PID:3368
-
\??\c:\pjppv.exec:\pjppv.exe212⤵PID:2576
-
\??\c:\ppjpv.exec:\ppjpv.exe213⤵PID:1028
-
\??\c:\xlrlrrf.exec:\xlrlrrf.exe214⤵PID:4752
-
\??\c:\xlxxrrl.exec:\xlxxrrl.exe215⤵PID:4364
-
\??\c:\htbttt.exec:\htbttt.exe216⤵PID:2640
-
\??\c:\1jdvj.exec:\1jdvj.exe217⤵PID:4948
-
\??\c:\9vjjv.exec:\9vjjv.exe218⤵PID:1536
-
\??\c:\7rlfxxx.exec:\7rlfxxx.exe219⤵PID:3812
-
\??\c:\xlrlflf.exec:\xlrlflf.exe220⤵PID:1424
-
\??\c:\btnnnh.exec:\btnnnh.exe221⤵PID:4016
-
\??\c:\jjvpp.exec:\jjvpp.exe222⤵PID:2256
-
\??\c:\pppjj.exec:\pppjj.exe223⤵PID:4528
-
\??\c:\rffxxfx.exec:\rffxxfx.exe224⤵PID:3232
-
\??\c:\3xxrrrl.exec:\3xxrrrl.exe225⤵PID:2176
-
\??\c:\3tbttt.exec:\3tbttt.exe226⤵PID:2608
-
\??\c:\9nnhbb.exec:\9nnhbb.exe227⤵PID:3152
-
\??\c:\7vddj.exec:\7vddj.exe228⤵PID:4840
-
\??\c:\pdjpj.exec:\pdjpj.exe229⤵PID:1100
-
\??\c:\fxffxrf.exec:\fxffxrf.exe230⤵PID:3336
-
\??\c:\ffxffff.exec:\ffxffff.exe231⤵PID:3080
-
\??\c:\nbbbtt.exec:\nbbbtt.exe232⤵PID:1412
-
\??\c:\nnhbbb.exec:\nnhbbb.exe233⤵PID:2820
-
\??\c:\jpddd.exec:\jpddd.exe234⤵PID:4644
-
\??\c:\flrllll.exec:\flrllll.exe235⤵PID:1244
-
\??\c:\frrlfxl.exec:\frrlfxl.exe236⤵PID:1476
-
\??\c:\hnbnnn.exec:\hnbnnn.exe237⤵PID:2512
-
\??\c:\hthhnt.exec:\hthhnt.exe238⤵PID:4040
-
\??\c:\dpddd.exec:\dpddd.exe239⤵PID:3108
-
\??\c:\rfrrfrl.exec:\rfrrfrl.exe240⤵PID:4548
-
\??\c:\rlffllf.exec:\rlffllf.exe241⤵PID:388
-
\??\c:\thhnhh.exec:\thhnhh.exe242⤵PID:2796