Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 19:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1e10e90fc9d132c6122b095d0a05f6b0_NeikiAnalytics.exe
Resource
win7-20240419-en
windows7-x64
5 signatures
150 seconds
General
-
Target
1e10e90fc9d132c6122b095d0a05f6b0_NeikiAnalytics.exe
-
Size
64KB
-
MD5
1e10e90fc9d132c6122b095d0a05f6b0
-
SHA1
eeeb35c18a18f25203006f325637222606236319
-
SHA256
21e282b7686b5f3a68476b84a594406417bf73e9f8db6d846ea2c1e98e1da692
-
SHA512
01e30fd2c67326322efd2d637f79c8fa49a80c3bd9be0c643080d8aa0d7f14bb31039333b44faab5553cdda7dca02e763e2b85819586bda6030ba5b51df4c770
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND0yUuYp+5C8+Luvq:ymb3NkkiQ3mdBjF0yMl9
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral2/memory/2040-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2200-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2200-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/536-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5028-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2996-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/464-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3228-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/804-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/936-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2676-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4956-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4384-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3160-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2044-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/400-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4760-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2404-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1504-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2292-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3456-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3872-173-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4852-185-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ttnhhb.exepvvdj.exejppdv.exeffrrxxr.exenhntnt.exebhbtnh.exejjjpd.exefrxlffx.exelfflrrr.exeththhn.exejvjdd.exevvjpv.exelxxllfx.exebnbtnn.exedvdpv.exexrfxffl.exe9tbttt.exedjjvj.exejdvdj.exellrxxxx.exebbtbnt.exe5djdd.exeppjvj.exerrllrrr.exevpjpv.exepdjdd.exexrrlrrl.exehhbtbb.exejvjjd.exelfxlrfl.exexfrrffr.exenhhhbb.exe5vvjj.exejdpjp.exexxfrrlf.exeththht.exetnbhtb.exepdddp.exerlflfxf.exebttntt.exehntnbb.exejvpjd.exejjjpj.exe5xxrlfr.exehtbtnb.exejdppp.exe5vvpj.exelxxxfff.exefxlfxlx.exebnbhtt.exetbhbhn.exevvpdv.exe1rrrlll.exehtnhtn.exe7jjdd.exelfxxrxr.exefflrxxl.exe1ttnnn.exepdvjp.exe3rrfxxr.exellfffrr.exenthhbb.exevvjvp.exevvjjj.exepid process 536 ttnhhb.exe 2200 pvvdj.exe 464 jppdv.exe 5028 ffrrxxr.exe 2996 nhntnt.exe 3228 bhbtnh.exe 804 jjjpd.exe 936 frxlffx.exe 2676 lfflrrr.exe 4956 ththhn.exe 4384 jvjdd.exe 4104 vvjpv.exe 4248 lxxllfx.exe 3160 bnbtnn.exe 1596 dvdpv.exe 2044 xrfxffl.exe 400 9tbttt.exe 4760 djjvj.exe 2404 jdvdj.exe 3932 llrxxxx.exe 1504 bbtbnt.exe 588 5djdd.exe 2292 ppjvj.exe 3456 rrllrrr.exe 5056 vpjpv.exe 3872 pdjdd.exe 3260 xrrlrrl.exe 4852 hhbtbb.exe 4440 jvjjd.exe 3820 lfxlrfl.exe 1192 xfrrffr.exe 1724 nhhhbb.exe 540 5vvjj.exe 2500 jdpjp.exe 1260 xxfrrlf.exe 2544 ththht.exe 4924 tnbhtb.exe 4196 pdddp.exe 1420 rlflfxf.exe 4180 bttntt.exe 1512 hntnbb.exe 3576 jvpjd.exe 4184 jjjpj.exe 2240 5xxrlfr.exe 3860 htbtnb.exe 3888 jdppp.exe 1220 5vvpj.exe 2136 lxxxfff.exe 3304 fxlfxlx.exe 3348 bnbhtt.exe 4760 tbhbhn.exe 3556 vvpdv.exe 2644 1rrrlll.exe 1440 htnhtn.exe 3600 7jjdd.exe 4844 lfxxrxr.exe 2452 fflrxxl.exe 4480 1ttnnn.exe 2948 pdvjp.exe 2672 3rrfxxr.exe 4988 llfffrr.exe 4852 nthhbb.exe 880 vvjvp.exe 4564 vvjjj.exe -
Processes:
resource yara_rule behavioral2/memory/2040-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2200-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/536-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5028-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2996-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/464-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3228-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/804-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/936-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2676-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2676-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4956-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4384-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3160-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2044-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/400-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4760-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2404-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1504-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2292-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3456-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3872-173-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4852-185-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1e10e90fc9d132c6122b095d0a05f6b0_NeikiAnalytics.exettnhhb.exepvvdj.exejppdv.exeffrrxxr.exenhntnt.exebhbtnh.exejjjpd.exefrxlffx.exelfflrrr.exeththhn.exejvjdd.exevvjpv.exelxxllfx.exebnbtnn.exedvdpv.exexrfxffl.exe9tbttt.exedjjvj.exejdvdj.exellrxxxx.exebbtbnt.exedescription pid process target process PID 2040 wrote to memory of 536 2040 1e10e90fc9d132c6122b095d0a05f6b0_NeikiAnalytics.exe ttnhhb.exe PID 2040 wrote to memory of 536 2040 1e10e90fc9d132c6122b095d0a05f6b0_NeikiAnalytics.exe ttnhhb.exe PID 2040 wrote to memory of 536 2040 1e10e90fc9d132c6122b095d0a05f6b0_NeikiAnalytics.exe ttnhhb.exe PID 536 wrote to memory of 2200 536 ttnhhb.exe pvvdj.exe PID 536 wrote to memory of 2200 536 ttnhhb.exe pvvdj.exe PID 536 wrote to memory of 2200 536 ttnhhb.exe pvvdj.exe PID 2200 wrote to memory of 464 2200 pvvdj.exe jppdv.exe PID 2200 wrote to memory of 464 2200 pvvdj.exe jppdv.exe PID 2200 wrote to memory of 464 2200 pvvdj.exe jppdv.exe PID 464 wrote to memory of 5028 464 jppdv.exe ffrrxxr.exe PID 464 wrote to memory of 5028 464 jppdv.exe ffrrxxr.exe PID 464 wrote to memory of 5028 464 jppdv.exe ffrrxxr.exe PID 5028 wrote to memory of 2996 5028 ffrrxxr.exe nhntnt.exe PID 5028 wrote to memory of 2996 5028 ffrrxxr.exe nhntnt.exe PID 5028 wrote to memory of 2996 5028 ffrrxxr.exe nhntnt.exe PID 2996 wrote to memory of 3228 2996 nhntnt.exe bhbtnh.exe PID 2996 wrote to memory of 3228 2996 nhntnt.exe bhbtnh.exe PID 2996 wrote to memory of 3228 2996 nhntnt.exe bhbtnh.exe PID 3228 wrote to memory of 804 3228 bhbtnh.exe jjjpd.exe PID 3228 wrote to memory of 804 3228 bhbtnh.exe jjjpd.exe PID 3228 wrote to memory of 804 3228 bhbtnh.exe jjjpd.exe PID 804 wrote to memory of 936 804 jjjpd.exe frxlffx.exe PID 804 wrote to memory of 936 804 jjjpd.exe frxlffx.exe PID 804 wrote to memory of 936 804 jjjpd.exe frxlffx.exe PID 936 wrote to memory of 2676 936 frxlffx.exe lfflrrr.exe PID 936 wrote to memory of 2676 936 frxlffx.exe lfflrrr.exe PID 936 wrote to memory of 2676 936 frxlffx.exe lfflrrr.exe PID 2676 wrote to memory of 4956 2676 lfflrrr.exe ththhn.exe PID 2676 wrote to memory of 4956 2676 lfflrrr.exe ththhn.exe PID 2676 wrote to memory of 4956 2676 lfflrrr.exe ththhn.exe PID 4956 wrote to memory of 4384 4956 ththhn.exe jvjdd.exe PID 4956 wrote to memory of 4384 4956 ththhn.exe jvjdd.exe PID 4956 wrote to memory of 4384 4956 ththhn.exe jvjdd.exe PID 4384 wrote to memory of 4104 4384 jvjdd.exe vvjpv.exe PID 4384 wrote to memory of 4104 4384 jvjdd.exe vvjpv.exe PID 4384 wrote to memory of 4104 4384 jvjdd.exe vvjpv.exe PID 4104 wrote to memory of 4248 4104 vvjpv.exe lxxllfx.exe PID 4104 wrote to memory of 4248 4104 vvjpv.exe lxxllfx.exe PID 4104 wrote to memory of 4248 4104 vvjpv.exe lxxllfx.exe PID 4248 wrote to memory of 3160 4248 lxxllfx.exe bnbtnn.exe PID 4248 wrote to memory of 3160 4248 lxxllfx.exe bnbtnn.exe PID 4248 wrote to memory of 3160 4248 lxxllfx.exe bnbtnn.exe PID 3160 wrote to memory of 1596 3160 bnbtnn.exe dvdpv.exe PID 3160 wrote to memory of 1596 3160 bnbtnn.exe dvdpv.exe PID 3160 wrote to memory of 1596 3160 bnbtnn.exe dvdpv.exe PID 1596 wrote to memory of 2044 1596 dvdpv.exe xrfxffl.exe PID 1596 wrote to memory of 2044 1596 dvdpv.exe xrfxffl.exe PID 1596 wrote to memory of 2044 1596 dvdpv.exe xrfxffl.exe PID 2044 wrote to memory of 400 2044 xrfxffl.exe 9tbttt.exe PID 2044 wrote to memory of 400 2044 xrfxffl.exe 9tbttt.exe PID 2044 wrote to memory of 400 2044 xrfxffl.exe 9tbttt.exe PID 400 wrote to memory of 4760 400 9tbttt.exe djjvj.exe PID 400 wrote to memory of 4760 400 9tbttt.exe djjvj.exe PID 400 wrote to memory of 4760 400 9tbttt.exe djjvj.exe PID 4760 wrote to memory of 2404 4760 djjvj.exe jdvdj.exe PID 4760 wrote to memory of 2404 4760 djjvj.exe jdvdj.exe PID 4760 wrote to memory of 2404 4760 djjvj.exe jdvdj.exe PID 2404 wrote to memory of 3932 2404 jdvdj.exe llrxxxx.exe PID 2404 wrote to memory of 3932 2404 jdvdj.exe llrxxxx.exe PID 2404 wrote to memory of 3932 2404 jdvdj.exe llrxxxx.exe PID 3932 wrote to memory of 1504 3932 llrxxxx.exe bbtbnt.exe PID 3932 wrote to memory of 1504 3932 llrxxxx.exe bbtbnt.exe PID 3932 wrote to memory of 1504 3932 llrxxxx.exe bbtbnt.exe PID 1504 wrote to memory of 588 1504 bbtbnt.exe 5djdd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e10e90fc9d132c6122b095d0a05f6b0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1e10e90fc9d132c6122b095d0a05f6b0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
\??\c:\ttnhhb.exec:\ttnhhb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\pvvdj.exec:\pvvdj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
\??\c:\jppdv.exec:\jppdv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
\??\c:\ffrrxxr.exec:\ffrrxxr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\nhntnt.exec:\nhntnt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
\??\c:\bhbtnh.exec:\bhbtnh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
\??\c:\jjjpd.exec:\jjjpd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:804 -
\??\c:\frxlffx.exec:\frxlffx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:936 -
\??\c:\lfflrrr.exec:\lfflrrr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
\??\c:\ththhn.exec:\ththhn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4956 -
\??\c:\jvjdd.exec:\jvjdd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4384 -
\??\c:\vvjpv.exec:\vvjpv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
\??\c:\lxxllfx.exec:\lxxllfx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4248 -
\??\c:\bnbtnn.exec:\bnbtnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3160 -
\??\c:\dvdpv.exec:\dvdpv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1596 -
\??\c:\xrfxffl.exec:\xrfxffl.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\9tbttt.exec:\9tbttt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
\??\c:\djjvj.exec:\djjvj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4760 -
\??\c:\jdvdj.exec:\jdvdj.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
\??\c:\llrxxxx.exec:\llrxxxx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
\??\c:\bbtbnt.exec:\bbtbnt.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\5djdd.exec:\5djdd.exe23⤵
- Executes dropped EXE
PID:588 -
\??\c:\ppjvj.exec:\ppjvj.exe24⤵
- Executes dropped EXE
PID:2292 -
\??\c:\rrllrrr.exec:\rrllrrr.exe25⤵
- Executes dropped EXE
PID:3456 -
\??\c:\vpjpv.exec:\vpjpv.exe26⤵
- Executes dropped EXE
PID:5056 -
\??\c:\pdjdd.exec:\pdjdd.exe27⤵
- Executes dropped EXE
PID:3872 -
\??\c:\xrrlrrl.exec:\xrrlrrl.exe28⤵
- Executes dropped EXE
PID:3260 -
\??\c:\hhbtbb.exec:\hhbtbb.exe29⤵
- Executes dropped EXE
PID:4852 -
\??\c:\jvjjd.exec:\jvjjd.exe30⤵
- Executes dropped EXE
PID:4440 -
\??\c:\lfxlrfl.exec:\lfxlrfl.exe31⤵
- Executes dropped EXE
PID:3820 -
\??\c:\xfrrffr.exec:\xfrrffr.exe32⤵
- Executes dropped EXE
PID:1192 -
\??\c:\nhhhbb.exec:\nhhhbb.exe33⤵
- Executes dropped EXE
PID:1724 -
\??\c:\5vvjj.exec:\5vvjj.exe34⤵
- Executes dropped EXE
PID:540 -
\??\c:\jdpjp.exec:\jdpjp.exe35⤵
- Executes dropped EXE
PID:2500 -
\??\c:\xxfrrlf.exec:\xxfrrlf.exe36⤵
- Executes dropped EXE
PID:1260 -
\??\c:\ththht.exec:\ththht.exe37⤵
- Executes dropped EXE
PID:2544 -
\??\c:\tnbhtb.exec:\tnbhtb.exe38⤵
- Executes dropped EXE
PID:4924 -
\??\c:\pdddp.exec:\pdddp.exe39⤵
- Executes dropped EXE
PID:4196 -
\??\c:\rlflfxf.exec:\rlflfxf.exe40⤵
- Executes dropped EXE
PID:1420 -
\??\c:\bttntt.exec:\bttntt.exe41⤵
- Executes dropped EXE
PID:4180 -
\??\c:\hntnbb.exec:\hntnbb.exe42⤵
- Executes dropped EXE
PID:1512 -
\??\c:\jvpjd.exec:\jvpjd.exe43⤵
- Executes dropped EXE
PID:3576 -
\??\c:\jjjpj.exec:\jjjpj.exe44⤵
- Executes dropped EXE
PID:4184 -
\??\c:\5xxrlfr.exec:\5xxrlfr.exe45⤵
- Executes dropped EXE
PID:2240 -
\??\c:\htbtnb.exec:\htbtnb.exe46⤵
- Executes dropped EXE
PID:3860 -
\??\c:\jdppp.exec:\jdppp.exe47⤵
- Executes dropped EXE
PID:3888 -
\??\c:\5vvpj.exec:\5vvpj.exe48⤵
- Executes dropped EXE
PID:1220 -
\??\c:\lxxxfff.exec:\lxxxfff.exe49⤵
- Executes dropped EXE
PID:2136 -
\??\c:\fxlfxlx.exec:\fxlfxlx.exe50⤵
- Executes dropped EXE
PID:3304 -
\??\c:\bnbhtt.exec:\bnbhtt.exe51⤵
- Executes dropped EXE
PID:3348 -
\??\c:\tbhbhn.exec:\tbhbhn.exe52⤵
- Executes dropped EXE
PID:4760 -
\??\c:\vvpdv.exec:\vvpdv.exe53⤵
- Executes dropped EXE
PID:3556 -
\??\c:\1rrrlll.exec:\1rrrlll.exe54⤵
- Executes dropped EXE
PID:2644 -
\??\c:\htnhtn.exec:\htnhtn.exe55⤵
- Executes dropped EXE
PID:1440 -
\??\c:\7jjdd.exec:\7jjdd.exe56⤵
- Executes dropped EXE
PID:3600 -
\??\c:\lfxxrxr.exec:\lfxxrxr.exe57⤵
- Executes dropped EXE
PID:4844 -
\??\c:\fflrxxl.exec:\fflrxxl.exe58⤵
- Executes dropped EXE
PID:2452 -
\??\c:\1ttnnn.exec:\1ttnnn.exe59⤵
- Executes dropped EXE
PID:4480 -
\??\c:\pdvjp.exec:\pdvjp.exe60⤵
- Executes dropped EXE
PID:2948 -
\??\c:\3rrfxxr.exec:\3rrfxxr.exe61⤵
- Executes dropped EXE
PID:2672 -
\??\c:\llfffrr.exec:\llfffrr.exe62⤵
- Executes dropped EXE
PID:4988 -
\??\c:\nthhbb.exec:\nthhbb.exe63⤵
- Executes dropped EXE
PID:4852 -
\??\c:\vvjvp.exec:\vvjvp.exe64⤵
- Executes dropped EXE
PID:880 -
\??\c:\vvjjj.exec:\vvjjj.exe65⤵
- Executes dropped EXE
PID:4564 -
\??\c:\5lxrllf.exec:\5lxrllf.exe66⤵PID:4744
-
\??\c:\nnbhbh.exec:\nnbhbh.exe67⤵PID:3100
-
\??\c:\pvvjv.exec:\pvvjv.exe68⤵PID:2856
-
\??\c:\dvvpj.exec:\dvvpj.exe69⤵PID:1112
-
\??\c:\xrffrlx.exec:\xrffrlx.exe70⤵PID:4968
-
\??\c:\lfxfrfl.exec:\lfxfrfl.exe71⤵PID:4924
-
\??\c:\nhhhbb.exec:\nhhhbb.exe72⤵PID:2152
-
\??\c:\nnhbtt.exec:\nnhbtt.exe73⤵PID:4932
-
\??\c:\3pppd.exec:\3pppd.exe74⤵PID:2784
-
\??\c:\vpvjd.exec:\vpvjd.exe75⤵PID:4508
-
\??\c:\rfxrlfx.exec:\rfxrlfx.exe76⤵PID:2088
-
\??\c:\hhtnhb.exec:\hhtnhb.exe77⤵PID:1524
-
\??\c:\hnhbtt.exec:\hnhbtt.exe78⤵PID:4176
-
\??\c:\7pvjd.exec:\7pvjd.exe79⤵PID:3400
-
\??\c:\7vdjv.exec:\7vdjv.exe80⤵PID:3888
-
\??\c:\xxfllll.exec:\xxfllll.exe81⤵PID:4728
-
\??\c:\fxfflff.exec:\fxfflff.exe82⤵PID:428
-
\??\c:\bbhntt.exec:\bbhntt.exe83⤵PID:3312
-
\??\c:\bnnhbb.exec:\bnnhbb.exe84⤵PID:2324
-
\??\c:\dpvvj.exec:\dpvvj.exe85⤵PID:1568
-
\??\c:\7vddv.exec:\7vddv.exe86⤵PID:4752
-
\??\c:\flxlxxr.exec:\flxlxxr.exe87⤵PID:4692
-
\??\c:\hbtnbb.exec:\hbtnbb.exe88⤵PID:4236
-
\??\c:\tnnnnt.exec:\tnnnnt.exe89⤵PID:2780
-
\??\c:\pjjvd.exec:\pjjvd.exe90⤵PID:232
-
\??\c:\fxrlfxr.exec:\fxrlfxr.exe91⤵PID:4792
-
\??\c:\3rfxllf.exec:\3rfxllf.exe92⤵PID:3564
-
\??\c:\ttthbh.exec:\ttthbh.exe93⤵PID:1124
-
\??\c:\9thnnb.exec:\9thnnb.exe94⤵PID:5036
-
\??\c:\ddvvv.exec:\ddvvv.exe95⤵PID:2672
-
\??\c:\djpjd.exec:\djpjd.exe96⤵PID:4988
-
\??\c:\fxlfxxr.exec:\fxlfxxr.exe97⤵PID:4852
-
\??\c:\llfffxx.exec:\llfffxx.exe98⤵PID:3812
-
\??\c:\9hhbtn.exec:\9hhbtn.exe99⤵PID:4788
-
\??\c:\dpdjj.exec:\dpdjj.exe100⤵PID:1968
-
\??\c:\5vvdd.exec:\5vvdd.exe101⤵PID:5028
-
\??\c:\fxfxxfx.exec:\fxfxxfx.exe102⤵PID:4064
-
\??\c:\tnhhbh.exec:\tnhhbh.exe103⤵PID:4676
-
\??\c:\7hhbbb.exec:\7hhbbb.exe104⤵PID:2176
-
\??\c:\jppjj.exec:\jppjj.exe105⤵PID:936
-
\??\c:\1lfxlrl.exec:\1lfxlrl.exe106⤵PID:2320
-
\??\c:\3nhbbb.exec:\3nhbbb.exe107⤵PID:4932
-
\??\c:\thnhhn.exec:\thnhhn.exe108⤵PID:4780
-
\??\c:\jjdvp.exec:\jjdvp.exe109⤵PID:4384
-
\??\c:\rrfxxlf.exec:\rrfxxlf.exe110⤵PID:4492
-
\??\c:\rflxlxx.exec:\rflxlxx.exe111⤵PID:3160
-
\??\c:\1nbtnt.exec:\1nbtnt.exe112⤵PID:3708
-
\??\c:\nbttnn.exec:\nbttnn.exe113⤵PID:400
-
\??\c:\pddvj.exec:\pddvj.exe114⤵PID:3304
-
\??\c:\pjjdv.exec:\pjjdv.exe115⤵PID:1100
-
\??\c:\5xfxxff.exec:\5xfxxff.exe116⤵PID:1996
-
\??\c:\5rlfrlf.exec:\5rlfrlf.exe117⤵PID:4040
-
\??\c:\dpjdv.exec:\dpjdv.exe118⤵PID:4752
-
\??\c:\jpdjv.exec:\jpdjv.exe119⤵PID:3600
-
\??\c:\rlfxrlf.exec:\rlfxrlf.exe120⤵PID:4844
-
\??\c:\nhhbbb.exec:\nhhbbb.exe121⤵PID:2780
-
\??\c:\pjpjd.exec:\pjpjd.exe122⤵PID:232
-
\??\c:\3ffffrl.exec:\3ffffrl.exe123⤵PID:4792
-
\??\c:\tbbttt.exec:\tbbttt.exe124⤵PID:4404
-
\??\c:\pjvvp.exec:\pjvvp.exe125⤵PID:3816
-
\??\c:\9jjvj.exec:\9jjvj.exe126⤵PID:5036
-
\??\c:\5fxxrrr.exec:\5fxxrrr.exe127⤵PID:4004
-
\??\c:\rfrlllf.exec:\rfrlllf.exe128⤵PID:880
-
\??\c:\9htbht.exec:\9htbht.exe129⤵PID:3580
-
\??\c:\vjdpd.exec:\vjdpd.exe130⤵PID:1724
-
\??\c:\pdjpv.exec:\pdjpv.exe131⤵PID:5092
-
\??\c:\frrlfff.exec:\frrlfff.exe132⤵PID:2392
-
\??\c:\frrlffx.exec:\frrlffx.exe133⤵PID:2544
-
\??\c:\ttbnhb.exec:\ttbnhb.exe134⤵PID:4068
-
\??\c:\dvvpj.exec:\dvvpj.exe135⤵PID:804
-
\??\c:\jddvp.exec:\jddvp.exe136⤵PID:1384
-
\??\c:\rfllllr.exec:\rfllllr.exe137⤵PID:4180
-
\??\c:\xxrxrrr.exec:\xxrxrrr.exe138⤵PID:1812
-
\??\c:\tntntn.exec:\tntntn.exe139⤵PID:3092
-
\??\c:\5nnhbn.exec:\5nnhbn.exe140⤵PID:216
-
\??\c:\jddjj.exec:\jddjj.exe141⤵PID:2396
-
\??\c:\dpjvp.exec:\dpjvp.exe142⤵PID:1780
-
\??\c:\xxxrrlf.exec:\xxxrrlf.exe143⤵PID:744
-
\??\c:\llrrxxr.exec:\llrrxxr.exe144⤵PID:4104
-
\??\c:\1nnnnn.exec:\1nnnnn.exe145⤵PID:3556
-
\??\c:\nbbbtn.exec:\nbbbtn.exe146⤵PID:3404
-
\??\c:\dpjdd.exec:\dpjdd.exe147⤵PID:2472
-
\??\c:\djpdd.exec:\djpdd.exe148⤵PID:4844
-
\??\c:\lfxrlff.exec:\lfxrlff.exe149⤵PID:2156
-
\??\c:\lxfxrrl.exec:\lxfxrrl.exe150⤵PID:3564
-
\??\c:\btnnhb.exec:\btnnhb.exe151⤵PID:4404
-
\??\c:\bbthnh.exec:\bbthnh.exe152⤵PID:4444
-
\??\c:\jjvpd.exec:\jjvpd.exe153⤵PID:4340
-
\??\c:\ppvvd.exec:\ppvvd.exe154⤵PID:1192
-
\??\c:\fxxlrxl.exec:\fxxlrxl.exe155⤵PID:540
-
\??\c:\bttnbb.exec:\bttnbb.exe156⤵PID:1968
-
\??\c:\bttnnh.exec:\bttnnh.exe157⤵PID:1260
-
\??\c:\pdjdj.exec:\pdjdj.exe158⤵PID:4064
-
\??\c:\9pdvv.exec:\9pdvv.exe159⤵PID:3228
-
\??\c:\xlrrllf.exec:\xlrrllf.exe160⤵PID:664
-
\??\c:\xxxrllf.exec:\xxxrllf.exe161⤵PID:1904
-
\??\c:\nhttbt.exec:\nhttbt.exe162⤵PID:4932
-
\??\c:\bththb.exec:\bththb.exe163⤵PID:3040
-
\??\c:\1ddvd.exec:\1ddvd.exe164⤵PID:4248
-
\??\c:\dvdvv.exec:\dvdvv.exe165⤵PID:3792
-
\??\c:\5xxlffr.exec:\5xxlffr.exe166⤵PID:2304
-
\??\c:\rlllffr.exec:\rlllffr.exe167⤵PID:3304
-
\??\c:\tnnnhb.exec:\tnnnhb.exe168⤵PID:1100
-
\??\c:\rxrrxfx.exec:\rxrrxfx.exe169⤵PID:4236
-
\??\c:\rxxxfrx.exec:\rxxxfrx.exe170⤵PID:3404
-
\??\c:\hthnhb.exec:\hthnhb.exe171⤵PID:5096
-
\??\c:\7bbtnn.exec:\7bbtnn.exe172⤵PID:1504
-
\??\c:\3pvpj.exec:\3pvpj.exe173⤵PID:1720
-
\??\c:\pvppj.exec:\pvppj.exe174⤵PID:2568
-
\??\c:\xrfxlfl.exec:\xrfxlfl.exe175⤵PID:4404
-
\??\c:\xxllxxf.exec:\xxllxxf.exe176⤵PID:4444
-
\??\c:\tnbttn.exec:\tnbttn.exe177⤵PID:3820
-
\??\c:\nhnhbb.exec:\nhnhbb.exe178⤵PID:4452
-
\??\c:\jpvvd.exec:\jpvvd.exe179⤵PID:4788
-
\??\c:\jvdvj.exec:\jvdvj.exe180⤵PID:3956
-
\??\c:\llrxxxf.exec:\llrxxxf.exe181⤵PID:1112
-
\??\c:\frxrlrl.exec:\frxrlrl.exe182⤵PID:2544
-
\??\c:\nhnntt.exec:\nhnntt.exe183⤵PID:4676
-
\??\c:\nnbhnt.exec:\nnbhnt.exe184⤵PID:2368
-
\??\c:\jvdvd.exec:\jvdvd.exe185⤵PID:3576
-
\??\c:\1flfrrr.exec:\1flfrrr.exe186⤵PID:1812
-
\??\c:\xfxxxxx.exec:\xfxxxxx.exe187⤵PID:4384
-
\??\c:\9hnhbb.exec:\9hnhbb.exe188⤵PID:3996
-
\??\c:\jdppp.exec:\jdppp.exe189⤵PID:216
-
\??\c:\jjpvj.exec:\jjpvj.exe190⤵PID:2324
-
\??\c:\7rxrffx.exec:\7rxrffx.exe191⤵PID:2760
-
\??\c:\tnnhbb.exec:\tnnhbb.exe192⤵PID:3304
-
\??\c:\jpvpj.exec:\jpvpj.exe193⤵PID:2452
-
\??\c:\btbttn.exec:\btbttn.exe194⤵PID:2908
-
\??\c:\3jpjd.exec:\3jpjd.exe195⤵PID:992
-
\??\c:\ppdvp.exec:\ppdvp.exe196⤵PID:3856
-
\??\c:\rflxrlr.exec:\rflxrlr.exe197⤵PID:3720
-
\??\c:\tnnhbt.exec:\tnnhbt.exe198⤵PID:4616
-
\??\c:\dddvv.exec:\dddvv.exe199⤵PID:4440
-
\??\c:\xxfxrrr.exec:\xxfxrrr.exe200⤵PID:2416
-
\??\c:\hhnhbn.exec:\hhnhbn.exe201⤵PID:5060
-
\??\c:\pvppj.exec:\pvppj.exe202⤵PID:5048
-
\??\c:\pjjjd.exec:\pjjjd.exe203⤵PID:1724
-
\??\c:\xfrrxff.exec:\xfrrxff.exe204⤵PID:4656
-
\??\c:\nnhhbb.exec:\nnhhbb.exe205⤵PID:4460
-
\??\c:\3vjpd.exec:\3vjpd.exe206⤵PID:4152
-
\??\c:\rrlfrxx.exec:\rrlfrxx.exe207⤵PID:4536
-
\??\c:\xffxrrr.exec:\xffxrrr.exe208⤵PID:2676
-
\??\c:\hnhbnt.exec:\hnhbnt.exe209⤵PID:2668
-
\??\c:\ddjdv.exec:\ddjdv.exe210⤵PID:864
-
\??\c:\jjvvv.exec:\jjvvv.exe211⤵PID:3160
-
\??\c:\fxxfllx.exec:\fxxfllx.exe212⤵PID:2136
-
\??\c:\xrxxffx.exec:\xrxxffx.exe213⤵PID:2404
-
\??\c:\tnnhbb.exec:\tnnhbb.exe214⤵PID:2304
-
\??\c:\1hbthn.exec:\1hbthn.exe215⤵PID:4344
-
\??\c:\5jjdd.exec:\5jjdd.exe216⤵PID:4756
-
\??\c:\rlllfff.exec:\rlllfff.exe217⤵PID:1996
-
\??\c:\bhnhbt.exec:\bhnhbt.exe218⤵PID:3404
-
\??\c:\3ttnhh.exec:\3ttnhh.exe219⤵PID:5096
-
\??\c:\vjjdv.exec:\vjjdv.exe220⤵PID:1504
-
\??\c:\ffrlxrf.exec:\ffrlxrf.exe221⤵PID:3948
-
\??\c:\fxxlllf.exec:\fxxlllf.exe222⤵PID:5036
-
\??\c:\httnhh.exec:\httnhh.exe223⤵PID:1956
-
\??\c:\hnnbhn.exec:\hnnbhn.exe224⤵PID:3380
-
\??\c:\1djdv.exec:\1djdv.exe225⤵PID:2996
-
\??\c:\dvvpd.exec:\dvvpd.exe226⤵PID:3100
-
\??\c:\rlllfff.exec:\rlllfff.exe227⤵PID:3472
-
\??\c:\hbhhbb.exec:\hbhhbb.exe228⤵PID:4656
-
\??\c:\nhtbnt.exec:\nhtbnt.exe229⤵PID:4924
-
\??\c:\dvpvv.exec:\dvpvv.exe230⤵PID:936
-
\??\c:\vvvpp.exec:\vvvpp.exe231⤵PID:4580
-
\??\c:\5lffllx.exec:\5lffllx.exe232⤵PID:1196
-
\??\c:\bhnbnn.exec:\bhnbnn.exe233⤵PID:1812
-
\??\c:\nhtthb.exec:\nhtthb.exe234⤵PID:1760
-
\??\c:\dvddd.exec:\dvddd.exe235⤵PID:400
-
\??\c:\vpddd.exec:\vpddd.exe236⤵PID:684
-
\??\c:\frxrxxf.exec:\frxrxxf.exe237⤵PID:2324
-
\??\c:\hhtnbh.exec:\hhtnbh.exe238⤵PID:3456
-
\??\c:\hnnhbb.exec:\hnnhbb.exe239⤵PID:4236
-
\??\c:\jjdvp.exec:\jjdvp.exe240⤵PID:5008
-
\??\c:\jppjp.exec:\jppjp.exe241⤵PID:2948
-
\??\c:\xrflrxl.exec:\xrflrxl.exe242⤵PID:3464