Analysis
-
max time kernel
129s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ad9f4326ab37b131a40b8cfb1ff34160_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ad9f4326ab37b131a40b8cfb1ff34160_NeikiAnalytics.exe
-
Size
59KB
-
MD5
ad9f4326ab37b131a40b8cfb1ff34160
-
SHA1
131e8050998db775a03dbb3a237c8c8b5abf1cbf
-
SHA256
3f10aec19278d2bc78a69f76ed534a8e2cc5b7a2a604e43a33e6a2f965423a05
-
SHA512
e77a85d157d85751a2c1096e9e9c532659fb2480d66919922dca3e82697bb6f6d1e072b9f2cdfd82453e992246a6b91964622ca1ad5573a5822ad925d8116755
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIsIms8:ymb3NkkiQ3mdBjFIsIF8
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/4192-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2096-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4392-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3028-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/208-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4624-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1516-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3156-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1704-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3276-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4064-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2088-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3440-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/536-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4620-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/468-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1228-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1732-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4488-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/888-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4808-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1072-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/556-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4400-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
44204.exeo248440.exenbbnht.exek44880.exeu626448.exedpdpp.exe242266.exe4604482.exe864826.exe1lfxxxr.exefxrlflf.exe2248226.exeq06822.exe7tnhhh.exe6066000.exe4204882.exe84086.exetnbhht.exe408646.exejjdvj.exe06822.exepjvpd.exedvpdd.exe824404.exe4620886.exevdvjp.exe9nnthh.exennnhtn.exe1hhbnn.exenhnnbt.exejppjv.exe68840.exedvjjj.exe62864.exe42260.exejvdpd.exevjjpp.exennnhbh.exe46024.exebttnnn.exe464000.exe44042.exew80662.exe266222.exedddvp.exe4608484.exe880826.exerfrrflx.exeu840484.exepvppv.exebthhbn.exerllrflf.exebnhhbb.exethhtnh.exem2820.exe286048.exe8600848.exe1bnhhb.exehnttbb.exedvpjv.exevjjvj.exe246624.exe620422.exe9ppjv.exepid process 4400 44204.exe 556 o248440.exe 1072 nbbnht.exe 4808 k44880.exe 888 u626448.exe 4488 dpdpp.exe 2096 242266.exe 4392 4604482.exe 3028 864826.exe 4892 1lfxxxr.exe 1732 fxrlflf.exe 1228 2248226.exe 468 q06822.exe 4620 7tnhhh.exe 208 6066000.exe 4624 4204882.exe 536 84086.exe 4696 tnbhht.exe 1620 408646.exe 3440 jjdvj.exe 2088 06822.exe 4244 pjvpd.exe 4064 dvpdd.exe 1516 824404.exe 1288 4620886.exe 2020 vdvjp.exe 3372 9nnthh.exe 3276 nnnhtn.exe 4968 1hhbnn.exe 3156 nhnnbt.exe 1704 jppjv.exe 4832 68840.exe 1484 dvjjj.exe 2220 62864.exe 4688 42260.exe 4888 jvdpd.exe 1052 vjjpp.exe 1604 nnnhbh.exe 3832 46024.exe 1980 bttnnn.exe 3044 464000.exe 4692 44042.exe 696 w80662.exe 3068 266222.exe 2312 dddvp.exe 3912 4608484.exe 720 880826.exe 3408 rfrrflx.exe 116 u840484.exe 1880 pvppv.exe 3960 bthhbn.exe 4884 rllrflf.exe 2000 bnhhbb.exe 1964 thhtnh.exe 4756 m2820.exe 916 286048.exe 4612 8600848.exe 1868 1bnhhb.exe 2840 hnttbb.exe 2320 dvpjv.exe 2572 vjjvj.exe 1660 246624.exe 5056 620422.exe 1344 9ppjv.exe -
Processes:
resource yara_rule behavioral2/memory/4192-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4392-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3028-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/208-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4624-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1516-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3156-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1704-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3276-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4064-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2088-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3440-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/536-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4620-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/468-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1228-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1732-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4488-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/888-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4808-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1072-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1072-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/556-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4400-12-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ad9f4326ab37b131a40b8cfb1ff34160_NeikiAnalytics.exe44204.exeo248440.exenbbnht.exek44880.exeu626448.exedpdpp.exe242266.exe4604482.exe864826.exe1lfxxxr.exefxrlflf.exe2248226.exeq06822.exe7tnhhh.exe6066000.exe4204882.exe84086.exetnbhht.exe408646.exejjdvj.exe06822.exedescription pid process target process PID 4192 wrote to memory of 4400 4192 ad9f4326ab37b131a40b8cfb1ff34160_NeikiAnalytics.exe 44204.exe PID 4192 wrote to memory of 4400 4192 ad9f4326ab37b131a40b8cfb1ff34160_NeikiAnalytics.exe 44204.exe PID 4192 wrote to memory of 4400 4192 ad9f4326ab37b131a40b8cfb1ff34160_NeikiAnalytics.exe 44204.exe PID 4400 wrote to memory of 556 4400 44204.exe o248440.exe PID 4400 wrote to memory of 556 4400 44204.exe o248440.exe PID 4400 wrote to memory of 556 4400 44204.exe o248440.exe PID 556 wrote to memory of 1072 556 o248440.exe nbbnht.exe PID 556 wrote to memory of 1072 556 o248440.exe nbbnht.exe PID 556 wrote to memory of 1072 556 o248440.exe nbbnht.exe PID 1072 wrote to memory of 4808 1072 nbbnht.exe 8226004.exe PID 1072 wrote to memory of 4808 1072 nbbnht.exe 8226004.exe PID 1072 wrote to memory of 4808 1072 nbbnht.exe 8226004.exe PID 4808 wrote to memory of 888 4808 k44880.exe 2404822.exe PID 4808 wrote to memory of 888 4808 k44880.exe 2404822.exe PID 4808 wrote to memory of 888 4808 k44880.exe 2404822.exe PID 888 wrote to memory of 4488 888 u626448.exe dpdpp.exe PID 888 wrote to memory of 4488 888 u626448.exe dpdpp.exe PID 888 wrote to memory of 4488 888 u626448.exe dpdpp.exe PID 4488 wrote to memory of 2096 4488 dpdpp.exe 242266.exe PID 4488 wrote to memory of 2096 4488 dpdpp.exe 242266.exe PID 4488 wrote to memory of 2096 4488 dpdpp.exe 242266.exe PID 2096 wrote to memory of 4392 2096 242266.exe 4604482.exe PID 2096 wrote to memory of 4392 2096 242266.exe 4604482.exe PID 2096 wrote to memory of 4392 2096 242266.exe 4604482.exe PID 4392 wrote to memory of 3028 4392 4604482.exe 864826.exe PID 4392 wrote to memory of 3028 4392 4604482.exe 864826.exe PID 4392 wrote to memory of 3028 4392 4604482.exe 864826.exe PID 3028 wrote to memory of 4892 3028 864826.exe 208200.exe PID 3028 wrote to memory of 4892 3028 864826.exe 208200.exe PID 3028 wrote to memory of 4892 3028 864826.exe 208200.exe PID 4892 wrote to memory of 1732 4892 1lfxxxr.exe ddjvv.exe PID 4892 wrote to memory of 1732 4892 1lfxxxr.exe ddjvv.exe PID 4892 wrote to memory of 1732 4892 1lfxxxr.exe ddjvv.exe PID 1732 wrote to memory of 1228 1732 fxrlflf.exe 2064408.exe PID 1732 wrote to memory of 1228 1732 fxrlflf.exe 2064408.exe PID 1732 wrote to memory of 1228 1732 fxrlflf.exe 2064408.exe PID 1228 wrote to memory of 468 1228 2248226.exe q06822.exe PID 1228 wrote to memory of 468 1228 2248226.exe q06822.exe PID 1228 wrote to memory of 468 1228 2248226.exe q06822.exe PID 468 wrote to memory of 4620 468 q06822.exe 7tnhhh.exe PID 468 wrote to memory of 4620 468 q06822.exe 7tnhhh.exe PID 468 wrote to memory of 4620 468 q06822.exe 7tnhhh.exe PID 4620 wrote to memory of 208 4620 7tnhhh.exe o286042.exe PID 4620 wrote to memory of 208 4620 7tnhhh.exe o286042.exe PID 4620 wrote to memory of 208 4620 7tnhhh.exe o286042.exe PID 208 wrote to memory of 4624 208 6066000.exe 4204882.exe PID 208 wrote to memory of 4624 208 6066000.exe 4204882.exe PID 208 wrote to memory of 4624 208 6066000.exe 4204882.exe PID 4624 wrote to memory of 536 4624 4204882.exe 84086.exe PID 4624 wrote to memory of 536 4624 4204882.exe 84086.exe PID 4624 wrote to memory of 536 4624 4204882.exe 84086.exe PID 536 wrote to memory of 4696 536 84086.exe tnbhht.exe PID 536 wrote to memory of 4696 536 84086.exe tnbhht.exe PID 536 wrote to memory of 4696 536 84086.exe tnbhht.exe PID 4696 wrote to memory of 1620 4696 tnbhht.exe 7xrlrfx.exe PID 4696 wrote to memory of 1620 4696 tnbhht.exe 7xrlrfx.exe PID 4696 wrote to memory of 1620 4696 tnbhht.exe 7xrlrfx.exe PID 1620 wrote to memory of 3440 1620 408646.exe jjdvj.exe PID 1620 wrote to memory of 3440 1620 408646.exe jjdvj.exe PID 1620 wrote to memory of 3440 1620 408646.exe jjdvj.exe PID 3440 wrote to memory of 2088 3440 jjdvj.exe 6824626.exe PID 3440 wrote to memory of 2088 3440 jjdvj.exe 6824626.exe PID 3440 wrote to memory of 2088 3440 jjdvj.exe 6824626.exe PID 2088 wrote to memory of 4244 2088 06822.exe llfxrrx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad9f4326ab37b131a40b8cfb1ff34160_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ad9f4326ab37b131a40b8cfb1ff34160_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
\??\c:\44204.exec:\44204.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
\??\c:\o248440.exec:\o248440.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
\??\c:\nbbnht.exec:\nbbnht.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
\??\c:\k44880.exec:\k44880.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4808 -
\??\c:\u626448.exec:\u626448.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:888 -
\??\c:\dpdpp.exec:\dpdpp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\242266.exec:\242266.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\4604482.exec:\4604482.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
\??\c:\864826.exec:\864826.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\1lfxxxr.exec:\1lfxxxr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
\??\c:\fxrlflf.exec:\fxrlflf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
\??\c:\2248226.exec:\2248226.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
\??\c:\q06822.exec:\q06822.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:468 -
\??\c:\7tnhhh.exec:\7tnhhh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4620 -
\??\c:\6066000.exec:\6066000.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:208 -
\??\c:\4204882.exec:\4204882.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
\??\c:\84086.exec:\84086.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:536 -
\??\c:\tnbhht.exec:\tnbhht.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4696 -
\??\c:\408646.exec:\408646.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
\??\c:\jjdvj.exec:\jjdvj.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\06822.exec:\06822.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\pjvpd.exec:\pjvpd.exe23⤵
- Executes dropped EXE
PID:4244 -
\??\c:\dvpdd.exec:\dvpdd.exe24⤵
- Executes dropped EXE
PID:4064 -
\??\c:\824404.exec:\824404.exe25⤵
- Executes dropped EXE
PID:1516 -
\??\c:\4620886.exec:\4620886.exe26⤵
- Executes dropped EXE
PID:1288 -
\??\c:\vdvjp.exec:\vdvjp.exe27⤵
- Executes dropped EXE
PID:2020 -
\??\c:\9nnthh.exec:\9nnthh.exe28⤵
- Executes dropped EXE
PID:3372 -
\??\c:\nnnhtn.exec:\nnnhtn.exe29⤵
- Executes dropped EXE
PID:3276 -
\??\c:\1hhbnn.exec:\1hhbnn.exe30⤵
- Executes dropped EXE
PID:4968 -
\??\c:\nhnnbt.exec:\nhnnbt.exe31⤵
- Executes dropped EXE
PID:3156 -
\??\c:\jppjv.exec:\jppjv.exe32⤵
- Executes dropped EXE
PID:1704 -
\??\c:\68840.exec:\68840.exe33⤵
- Executes dropped EXE
PID:4832 -
\??\c:\dvjjj.exec:\dvjjj.exe34⤵
- Executes dropped EXE
PID:1484 -
\??\c:\62864.exec:\62864.exe35⤵
- Executes dropped EXE
PID:2220 -
\??\c:\42260.exec:\42260.exe36⤵
- Executes dropped EXE
PID:4688 -
\??\c:\jvdpd.exec:\jvdpd.exe37⤵
- Executes dropped EXE
PID:4888 -
\??\c:\vjjpp.exec:\vjjpp.exe38⤵
- Executes dropped EXE
PID:1052 -
\??\c:\nnnhbh.exec:\nnnhbh.exe39⤵
- Executes dropped EXE
PID:1604 -
\??\c:\46024.exec:\46024.exe40⤵
- Executes dropped EXE
PID:3832 -
\??\c:\bttnnn.exec:\bttnnn.exe41⤵
- Executes dropped EXE
PID:1980 -
\??\c:\464000.exec:\464000.exe42⤵
- Executes dropped EXE
PID:3044 -
\??\c:\44042.exec:\44042.exe43⤵
- Executes dropped EXE
PID:4692 -
\??\c:\w80662.exec:\w80662.exe44⤵
- Executes dropped EXE
PID:696 -
\??\c:\266222.exec:\266222.exe45⤵
- Executes dropped EXE
PID:3068 -
\??\c:\dddvp.exec:\dddvp.exe46⤵
- Executes dropped EXE
PID:2312 -
\??\c:\4608484.exec:\4608484.exe47⤵
- Executes dropped EXE
PID:3912 -
\??\c:\880826.exec:\880826.exe48⤵
- Executes dropped EXE
PID:720 -
\??\c:\rfrrflx.exec:\rfrrflx.exe49⤵
- Executes dropped EXE
PID:3408 -
\??\c:\u840484.exec:\u840484.exe50⤵
- Executes dropped EXE
PID:116 -
\??\c:\pvppv.exec:\pvppv.exe51⤵
- Executes dropped EXE
PID:1880 -
\??\c:\bthhbn.exec:\bthhbn.exe52⤵
- Executes dropped EXE
PID:3960 -
\??\c:\rllrflf.exec:\rllrflf.exe53⤵
- Executes dropped EXE
PID:4884 -
\??\c:\bnhhbb.exec:\bnhhbb.exe54⤵
- Executes dropped EXE
PID:2000 -
\??\c:\thhtnh.exec:\thhtnh.exe55⤵
- Executes dropped EXE
PID:1964 -
\??\c:\m2820.exec:\m2820.exe56⤵
- Executes dropped EXE
PID:4756 -
\??\c:\286048.exec:\286048.exe57⤵
- Executes dropped EXE
PID:916 -
\??\c:\8600848.exec:\8600848.exe58⤵
- Executes dropped EXE
PID:4612 -
\??\c:\1bnhhb.exec:\1bnhhb.exe59⤵
- Executes dropped EXE
PID:1868 -
\??\c:\hnttbb.exec:\hnttbb.exe60⤵
- Executes dropped EXE
PID:2840 -
\??\c:\dvpjv.exec:\dvpjv.exe61⤵
- Executes dropped EXE
PID:2320 -
\??\c:\vjjvj.exec:\vjjvj.exe62⤵
- Executes dropped EXE
PID:2572 -
\??\c:\246624.exec:\246624.exe63⤵
- Executes dropped EXE
PID:1660 -
\??\c:\620422.exec:\620422.exe64⤵
- Executes dropped EXE
PID:5056 -
\??\c:\9ppjv.exec:\9ppjv.exe65⤵
- Executes dropped EXE
PID:1344 -
\??\c:\884826.exec:\884826.exe66⤵PID:764
-
\??\c:\bnhbnn.exec:\bnhbnn.exe67⤵PID:2796
-
\??\c:\djjdd.exec:\djjdd.exe68⤵PID:4760
-
\??\c:\lrrxxxl.exec:\lrrxxxl.exe69⤵PID:1712
-
\??\c:\tbnhnn.exec:\tbnhnn.exe70⤵PID:3276
-
\??\c:\nnnbhh.exec:\nnnbhh.exe71⤵PID:4152
-
\??\c:\4248222.exec:\4248222.exe72⤵PID:4968
-
\??\c:\i686048.exec:\i686048.exe73⤵PID:4136
-
\??\c:\68660.exec:\68660.exe74⤵PID:1488
-
\??\c:\880646.exec:\880646.exe75⤵PID:3612
-
\??\c:\nbnnnb.exec:\nbnnnb.exe76⤵PID:3548
-
\??\c:\866048.exec:\866048.exe77⤵PID:4560
-
\??\c:\26260.exec:\26260.exe78⤵PID:4780
-
\??\c:\24042.exec:\24042.exe79⤵PID:4344
-
\??\c:\ddjjd.exec:\ddjjd.exe80⤵PID:1140
-
\??\c:\2404222.exec:\2404222.exe81⤵PID:4400
-
\??\c:\rrrlfff.exec:\rrrlfff.exe82⤵PID:556
-
\??\c:\044486.exec:\044486.exe83⤵PID:5096
-
\??\c:\8226004.exec:\8226004.exe84⤵PID:4808
-
\??\c:\2404822.exec:\2404822.exe85⤵PID:888
-
\??\c:\224822.exec:\224822.exe86⤵PID:2348
-
\??\c:\vpjjd.exec:\vpjjd.exe87⤵PID:696
-
\??\c:\62482.exec:\62482.exe88⤵PID:3208
-
\??\c:\9hhbbb.exec:\9hhbbb.exe89⤵PID:2312
-
\??\c:\882222.exec:\882222.exe90⤵PID:3912
-
\??\c:\thnnhh.exec:\thnnhh.exe91⤵PID:720
-
\??\c:\vpjjj.exec:\vpjjj.exe92⤵PID:2252
-
\??\c:\ddjvv.exec:\ddjvv.exe93⤵PID:1732
-
\??\c:\62686.exec:\62686.exe94⤵PID:3312
-
\??\c:\44266.exec:\44266.exe95⤵PID:3960
-
\??\c:\48442.exec:\48442.exe96⤵PID:4884
-
\??\c:\m4666.exec:\m4666.exe97⤵PID:1176
-
\??\c:\o248260.exec:\o248260.exe98⤵PID:4940
-
\??\c:\tbhbtn.exec:\tbhbtn.exe99⤵PID:4404
-
\??\c:\btnhbt.exec:\btnhbt.exe100⤵PID:916
-
\??\c:\28608.exec:\28608.exe101⤵PID:768
-
\??\c:\dvpdj.exec:\dvpdj.exe102⤵PID:1816
-
\??\c:\xlrrrxf.exec:\xlrrrxf.exe103⤵PID:2088
-
\??\c:\hnhnnt.exec:\hnhnnt.exe104⤵PID:4772
-
\??\c:\i604226.exec:\i604226.exe105⤵PID:2572
-
\??\c:\06884.exec:\06884.exe106⤵PID:1660
-
\??\c:\rxfxrrl.exec:\rxfxrrl.exe107⤵PID:3076
-
\??\c:\htnntt.exec:\htnntt.exe108⤵PID:1288
-
\??\c:\464806.exec:\464806.exe109⤵PID:3240
-
\??\c:\4088440.exec:\4088440.exe110⤵PID:2796
-
\??\c:\vdpvd.exec:\vdpvd.exe111⤵PID:1568
-
\??\c:\o004882.exec:\o004882.exe112⤵PID:1836
-
\??\c:\8086462.exec:\8086462.exe113⤵PID:3276
-
\??\c:\1ddvp.exec:\1ddvp.exe114⤵PID:396
-
\??\c:\dvjjd.exec:\dvjjd.exe115⤵PID:4368
-
\??\c:\dpddv.exec:\dpddv.exe116⤵PID:5020
-
\??\c:\ttbhht.exec:\ttbhht.exe117⤵PID:4832
-
\??\c:\o480846.exec:\o480846.exe118⤵PID:2260
-
\??\c:\828402.exec:\828402.exe119⤵PID:1484
-
\??\c:\vjvvp.exec:\vjvvp.exe120⤵PID:4500
-
\??\c:\0440242.exec:\0440242.exe121⤵PID:4472
-
\??\c:\46626.exec:\46626.exe122⤵PID:3232
-
\??\c:\2868048.exec:\2868048.exe123⤵PID:4184
-
\??\c:\dpppv.exec:\dpppv.exe124⤵PID:1980
-
\??\c:\xlxrlfx.exec:\xlxrlfx.exe125⤵PID:1072
-
\??\c:\btbttt.exec:\btbttt.exe126⤵PID:4692
-
\??\c:\2886604.exec:\2886604.exe127⤵PID:5052
-
\??\c:\k40482.exec:\k40482.exe128⤵PID:3700
-
\??\c:\8288660.exec:\8288660.exe129⤵PID:1076
-
\??\c:\7xlfxxf.exec:\7xlfxxf.exe130⤵PID:1968
-
\??\c:\pddvp.exec:\pddvp.exe131⤵PID:776
-
\??\c:\02808.exec:\02808.exe132⤵PID:2384
-
\??\c:\rllxxlr.exec:\rllxxlr.exe133⤵PID:1848
-
\??\c:\2064408.exec:\2064408.exe134⤵PID:1228
-
\??\c:\8084080.exec:\8084080.exe135⤵PID:3312
-
\??\c:\62226.exec:\62226.exe136⤵PID:4816
-
\??\c:\4866048.exec:\4866048.exe137⤵PID:4268
-
\??\c:\jvvpj.exec:\jvvpj.exe138⤵PID:1176
-
\??\c:\dvpdp.exec:\dvpdp.exe139⤵PID:924
-
\??\c:\vpjdp.exec:\vpjdp.exe140⤵PID:4404
-
\??\c:\m8826.exec:\m8826.exe141⤵PID:2412
-
\??\c:\7dvvp.exec:\7dvvp.exe142⤵PID:3624
-
\??\c:\m2864.exec:\m2864.exe143⤵PID:4972
-
\??\c:\4020600.exec:\4020600.exe144⤵PID:1740
-
\??\c:\1bbtnn.exec:\1bbtnn.exe145⤵PID:4836
-
\??\c:\vpdvp.exec:\vpdvp.exe146⤵PID:3644
-
\??\c:\nnnntb.exec:\nnnntb.exe147⤵PID:1660
-
\??\c:\lflrfxf.exec:\lflrfxf.exe148⤵PID:3076
-
\??\c:\i400606.exec:\i400606.exe149⤵PID:2020
-
\??\c:\60662.exec:\60662.exe150⤵PID:3240
-
\??\c:\2866004.exec:\2866004.exe151⤵PID:2796
-
\??\c:\02666.exec:\02666.exe152⤵PID:1568
-
\??\c:\06424.exec:\06424.exe153⤵PID:4960
-
\??\c:\vppjv.exec:\vppjv.exe154⤵PID:1236
-
\??\c:\q06022.exec:\q06022.exe155⤵PID:4532
-
\??\c:\bbbhht.exec:\bbbhht.exe156⤵PID:2224
-
\??\c:\xrrrfrl.exec:\xrrrfrl.exe157⤵PID:1768
-
\??\c:\9fffffx.exec:\9fffffx.exe158⤵PID:4328
-
\??\c:\4840422.exec:\4840422.exe159⤵PID:400
-
\??\c:\pjddv.exec:\pjddv.exe160⤵PID:4292
-
\??\c:\48668.exec:\48668.exe161⤵PID:4184
-
\??\c:\xxrlfff.exec:\xxrlfff.exe162⤵PID:2112
-
\??\c:\hbnhbb.exec:\hbnhbb.exe163⤵PID:4336
-
\??\c:\dpdvj.exec:\dpdvj.exe164⤵PID:2636
-
\??\c:\208200.exec:\208200.exe165⤵PID:4892
-
\??\c:\2682200.exec:\2682200.exe166⤵PID:840
-
\??\c:\vjvvd.exec:\vjvvd.exe167⤵PID:720
-
\??\c:\5hbhtt.exec:\5hbhtt.exe168⤵PID:4916
-
\??\c:\xxxlxfr.exec:\xxxlxfr.exe169⤵PID:1240
-
\??\c:\66444.exec:\66444.exe170⤵PID:1880
-
\??\c:\428266.exec:\428266.exe171⤵PID:2428
-
\??\c:\nhhhht.exec:\nhhhht.exe172⤵PID:3964
-
\??\c:\pjjjj.exec:\pjjjj.exe173⤵PID:4268
-
\??\c:\vdjjd.exec:\vdjjd.exe174⤵PID:212
-
\??\c:\2460826.exec:\2460826.exe175⤵PID:4056
-
\??\c:\pjdpp.exec:\pjdpp.exe176⤵PID:4340
-
\??\c:\flxlxxl.exec:\flxlxxl.exe177⤵PID:1816
-
\??\c:\q42626.exec:\q42626.exe178⤵PID:4244
-
\??\c:\280200.exec:\280200.exe179⤵PID:1644
-
\??\c:\86222.exec:\86222.exe180⤵PID:1876
-
\??\c:\pvvpp.exec:\pvvpp.exe181⤵PID:2576
-
\??\c:\20840.exec:\20840.exe182⤵PID:1520
-
\??\c:\406686.exec:\406686.exe183⤵PID:1356
-
\??\c:\2480084.exec:\2480084.exe184⤵PID:3240
-
\??\c:\rxrrxxl.exec:\rxrrxxl.exe185⤵PID:2796
-
\??\c:\c848226.exec:\c848226.exe186⤵PID:1568
-
\??\c:\020240.exec:\020240.exe187⤵PID:1148
-
\??\c:\0460444.exec:\0460444.exe188⤵PID:2092
-
\??\c:\fxfxxrf.exec:\fxfxxrf.exe189⤵PID:4784
-
\??\c:\djjjv.exec:\djjjv.exe190⤵PID:4408
-
\??\c:\fxfxrrf.exec:\fxfxrrf.exe191⤵PID:3492
-
\??\c:\tnnnhn.exec:\tnnnhn.exe192⤵PID:556
-
\??\c:\tthhnh.exec:\tthhnh.exe193⤵PID:4432
-
\??\c:\vjvpp.exec:\vjvpp.exe194⤵PID:2952
-
\??\c:\frrlfrx.exec:\frrlfrx.exe195⤵PID:1072
-
\??\c:\64482.exec:\64482.exe196⤵PID:220
-
\??\c:\m2206.exec:\m2206.exe197⤵PID:2184
-
\??\c:\k60860.exec:\k60860.exe198⤵PID:952
-
\??\c:\4688260.exec:\4688260.exe199⤵PID:2908
-
\??\c:\00660.exec:\00660.exe200⤵PID:116
-
\??\c:\pjjpv.exec:\pjjpv.exe201⤵PID:2384
-
\??\c:\hbhtnh.exec:\hbhtnh.exe202⤵PID:3236
-
\??\c:\846048.exec:\846048.exe203⤵PID:1572
-
\??\c:\060686.exec:\060686.exe204⤵PID:208
-
\??\c:\8884280.exec:\8884280.exe205⤵PID:264
-
\??\c:\tbthnh.exec:\tbthnh.exe206⤵PID:4816
-
\??\c:\lxlfxxx.exec:\lxlfxxx.exe207⤵PID:4612
-
\??\c:\62624.exec:\62624.exe208⤵PID:2240
-
\??\c:\lfxrrrf.exec:\lfxrrrf.exe209⤵PID:4884
-
\??\c:\60260.exec:\60260.exe210⤵PID:4056
-
\??\c:\6426222.exec:\6426222.exe211⤵PID:4340
-
\??\c:\08860.exec:\08860.exe212⤵PID:1400
-
\??\c:\868826.exec:\868826.exe213⤵PID:2548
-
\??\c:\42862.exec:\42862.exe214⤵PID:1628
-
\??\c:\c660882.exec:\c660882.exe215⤵PID:3752
-
\??\c:\u886448.exec:\u886448.exe216⤵PID:3380
-
\??\c:\440482.exec:\440482.exe217⤵PID:1288
-
\??\c:\868226.exec:\868226.exe218⤵PID:3388
-
\??\c:\htbntt.exec:\htbntt.exe219⤵PID:3452
-
\??\c:\3ntnbb.exec:\3ntnbb.exe220⤵PID:2796
-
\??\c:\pjpdp.exec:\pjpdp.exe221⤵PID:3156
-
\??\c:\thnbht.exec:\thnbht.exe222⤵PID:1236
-
\??\c:\rxxrffx.exec:\rxxrffx.exe223⤵PID:2092
-
\??\c:\3hnbhh.exec:\3hnbhh.exe224⤵PID:5020
-
\??\c:\m0044.exec:\m0044.exe225⤵PID:3040
-
\??\c:\dvdvj.exec:\dvdvj.exe226⤵PID:4328
-
\??\c:\86608.exec:\86608.exe227⤵PID:400
-
\??\c:\20200.exec:\20200.exe228⤵PID:3044
-
\??\c:\i028626.exec:\i028626.exe229⤵PID:1604
-
\??\c:\fxfxrrl.exec:\fxfxrrl.exe230⤵PID:1072
-
\??\c:\6686222.exec:\6686222.exe231⤵PID:4224
-
\??\c:\88044.exec:\88044.exe232⤵PID:3016
-
\??\c:\lxrlxrl.exec:\lxrlxrl.exe233⤵PID:776
-
\??\c:\xrlfffx.exec:\xrlfffx.exe234⤵PID:2252
-
\??\c:\42264.exec:\42264.exe235⤵PID:1240
-
\??\c:\640826.exec:\640826.exe236⤵PID:2000
-
\??\c:\288200.exec:\288200.exe237⤵PID:3888
-
\??\c:\pppjd.exec:\pppjd.exe238⤵PID:4756
-
\??\c:\pppdv.exec:\pppdv.exe239⤵PID:2416
-
\??\c:\c282004.exec:\c282004.exe240⤵PID:4404
-
\??\c:\7xrlrfx.exec:\7xrlrfx.exe241⤵PID:1620
-
\??\c:\864668.exec:\864668.exe242⤵PID:3448