Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 07:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
cdbec3753467486a7fdbb6b24dfbee30_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
cdbec3753467486a7fdbb6b24dfbee30_NeikiAnalytics.exe
-
Size
61KB
-
MD5
cdbec3753467486a7fdbb6b24dfbee30
-
SHA1
1cce7764fa2e06f53a913f5ffcde459359d9bc12
-
SHA256
db4bac3d9b169ae4a272700aa57f4ef1bd50ddfa481b6c5eb15eebb0871dc1a3
-
SHA512
0f5a991a63eeb6bf96abded5e4c29cdd4461701c0cc76eb553a8481e2a204f481101d19d7572d275cd8b63fa280e6e0dfc9179ff4762a9c7d00b5981ed7b4d3e
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvAEaFJLL:ymb3NkkiQ3mdBjFIvAvL
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/2104-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3960-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1684-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4464-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1164-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3640-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1448-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2576-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/688-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4792-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1576-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3456-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2444-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1172-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3528-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4008-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3660-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1680-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2300-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/980-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2800-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4988-167-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1332-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3980-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2308-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
pvpjv.exehnbhbb.exe4644864.exe840488.exettnbtn.exe28042.exexrlxlxr.exellxxrrl.exe208488.exedvvvd.exe02044.exelxlfxff.exeffllllr.exe6882660.exe646448.exe426048.exe202402.exellxfrxf.exe88004.exe20420.exe40482.exeo848822.exetttnhh.exek88860.exe6866284.exew80284.exe268266.exe60226.exe2882604.exe4866226.exedvdjv.exedpjdp.exejjpjp.exehnhhhh.exebbtnhh.exebtnnbb.exedvpjj.exelrflrll.exe0468424.exepdddp.exe26426.exe028680.exe66682.exe004602.exe888648.exe26226.exelxlxlxl.exedvvpj.exexfffxfr.exe886288.exe20688.exe884426.exebtnnnn.exe086280.exee28866.exe20420.exe9rfrfxf.exe200442.exe84026.exebhbnth.exehnnbnt.exe464006.exe686226.exennbttn.exepid process 4464 pvpjv.exe 1684 hnbhbb.exe 3960 4644864.exe 1164 840488.exe 3640 ttnbtn.exe 1448 28042.exe 2576 xrlxlxr.exe 2200 llxxrrl.exe 688 208488.exe 4792 dvvvd.exe 1576 02044.exe 3456 lxlfxff.exe 2444 ffllllr.exe 1172 6882660.exe 3528 646448.exe 4008 426048.exe 3660 202402.exe 3976 llxfrxf.exe 1680 88004.exe 4408 20420.exe 2300 40482.exe 980 o848822.exe 2800 tttnhh.exe 1756 k88860.exe 4988 6866284.exe 5004 w80284.exe 1332 268266.exe 2124 60226.exe 3980 2882604.exe 2308 4866226.exe 4596 dvdjv.exe 2204 dpjdp.exe 4188 jjpjp.exe 1144 hnhhhh.exe 2484 bbtnhh.exe 4500 btnnbb.exe 4376 dvpjj.exe 228 lrflrll.exe 3004 0468424.exe 3372 pdddp.exe 3540 26426.exe 3972 028680.exe 4740 66682.exe 3712 004602.exe 2580 888648.exe 1280 26226.exe 1816 lxlxlxl.exe 4676 dvvpj.exe 944 xfffxfr.exe 4324 886288.exe 2972 20688.exe 628 884426.exe 5100 btnnnn.exe 1584 086280.exe 436 e28866.exe 5108 20420.exe 3672 9rfrfxf.exe 4100 200442.exe 3488 84026.exe 640 bhbnth.exe 880 hnnbnt.exe 5028 464006.exe 4408 686226.exe 672 nnbttn.exe -
Processes:
resource yara_rule behavioral2/memory/2104-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1164-30-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3960-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1684-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4464-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1164-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3640-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2576-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/688-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4792-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1576-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3456-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2444-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1172-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3528-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4008-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3660-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1680-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2300-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/980-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2800-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4988-167-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1332-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3980-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2308-197-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cdbec3753467486a7fdbb6b24dfbee30_NeikiAnalytics.exepvpjv.exehnbhbb.exe4644864.exe840488.exettnbtn.exe28042.exexrlxlxr.exellxxrrl.exe208488.exedvvvd.exe02044.exelxlfxff.exeffllllr.exe6882660.exe646448.exe426048.exe202402.exellxfrxf.exe88004.exe20420.exe40482.exedescription pid process target process PID 2104 wrote to memory of 4464 2104 cdbec3753467486a7fdbb6b24dfbee30_NeikiAnalytics.exe pvpjv.exe PID 2104 wrote to memory of 4464 2104 cdbec3753467486a7fdbb6b24dfbee30_NeikiAnalytics.exe pvpjv.exe PID 2104 wrote to memory of 4464 2104 cdbec3753467486a7fdbb6b24dfbee30_NeikiAnalytics.exe pvpjv.exe PID 4464 wrote to memory of 1684 4464 pvpjv.exe hnbhbb.exe PID 4464 wrote to memory of 1684 4464 pvpjv.exe hnbhbb.exe PID 4464 wrote to memory of 1684 4464 pvpjv.exe hnbhbb.exe PID 1684 wrote to memory of 3960 1684 hnbhbb.exe 4644864.exe PID 1684 wrote to memory of 3960 1684 hnbhbb.exe 4644864.exe PID 1684 wrote to memory of 3960 1684 hnbhbb.exe 4644864.exe PID 3960 wrote to memory of 1164 3960 4644864.exe 840488.exe PID 3960 wrote to memory of 1164 3960 4644864.exe 840488.exe PID 3960 wrote to memory of 1164 3960 4644864.exe 840488.exe PID 1164 wrote to memory of 3640 1164 840488.exe ttnbtn.exe PID 1164 wrote to memory of 3640 1164 840488.exe ttnbtn.exe PID 1164 wrote to memory of 3640 1164 840488.exe ttnbtn.exe PID 3640 wrote to memory of 1448 3640 ttnbtn.exe 28042.exe PID 3640 wrote to memory of 1448 3640 ttnbtn.exe 28042.exe PID 3640 wrote to memory of 1448 3640 ttnbtn.exe 28042.exe PID 1448 wrote to memory of 2576 1448 28042.exe xrlxlxr.exe PID 1448 wrote to memory of 2576 1448 28042.exe xrlxlxr.exe PID 1448 wrote to memory of 2576 1448 28042.exe xrlxlxr.exe PID 2576 wrote to memory of 2200 2576 xrlxlxr.exe llxxrrl.exe PID 2576 wrote to memory of 2200 2576 xrlxlxr.exe llxxrrl.exe PID 2576 wrote to memory of 2200 2576 xrlxlxr.exe llxxrrl.exe PID 2200 wrote to memory of 688 2200 llxxrrl.exe 208488.exe PID 2200 wrote to memory of 688 2200 llxxrrl.exe 208488.exe PID 2200 wrote to memory of 688 2200 llxxrrl.exe 208488.exe PID 688 wrote to memory of 4792 688 208488.exe dvvvd.exe PID 688 wrote to memory of 4792 688 208488.exe dvvvd.exe PID 688 wrote to memory of 4792 688 208488.exe dvvvd.exe PID 4792 wrote to memory of 1576 4792 dvvvd.exe 02044.exe PID 4792 wrote to memory of 1576 4792 dvvvd.exe 02044.exe PID 4792 wrote to memory of 1576 4792 dvvvd.exe 02044.exe PID 1576 wrote to memory of 3456 1576 02044.exe lxlfxff.exe PID 1576 wrote to memory of 3456 1576 02044.exe lxlfxff.exe PID 1576 wrote to memory of 3456 1576 02044.exe lxlfxff.exe PID 3456 wrote to memory of 2444 3456 lxlfxff.exe ffllllr.exe PID 3456 wrote to memory of 2444 3456 lxlfxff.exe ffllllr.exe PID 3456 wrote to memory of 2444 3456 lxlfxff.exe ffllllr.exe PID 2444 wrote to memory of 1172 2444 ffllllr.exe 6882660.exe PID 2444 wrote to memory of 1172 2444 ffllllr.exe 6882660.exe PID 2444 wrote to memory of 1172 2444 ffllllr.exe 6882660.exe PID 1172 wrote to memory of 3528 1172 6882660.exe 646448.exe PID 1172 wrote to memory of 3528 1172 6882660.exe 646448.exe PID 1172 wrote to memory of 3528 1172 6882660.exe 646448.exe PID 3528 wrote to memory of 4008 3528 646448.exe 426048.exe PID 3528 wrote to memory of 4008 3528 646448.exe 426048.exe PID 3528 wrote to memory of 4008 3528 646448.exe 426048.exe PID 4008 wrote to memory of 3660 4008 426048.exe 202402.exe PID 4008 wrote to memory of 3660 4008 426048.exe 202402.exe PID 4008 wrote to memory of 3660 4008 426048.exe 202402.exe PID 3660 wrote to memory of 3976 3660 202402.exe llxfrxf.exe PID 3660 wrote to memory of 3976 3660 202402.exe llxfrxf.exe PID 3660 wrote to memory of 3976 3660 202402.exe llxfrxf.exe PID 3976 wrote to memory of 1680 3976 llxfrxf.exe 88004.exe PID 3976 wrote to memory of 1680 3976 llxfrxf.exe 88004.exe PID 3976 wrote to memory of 1680 3976 llxfrxf.exe 88004.exe PID 1680 wrote to memory of 4408 1680 88004.exe 20420.exe PID 1680 wrote to memory of 4408 1680 88004.exe 20420.exe PID 1680 wrote to memory of 4408 1680 88004.exe 20420.exe PID 4408 wrote to memory of 2300 4408 20420.exe 40482.exe PID 4408 wrote to memory of 2300 4408 20420.exe 40482.exe PID 4408 wrote to memory of 2300 4408 20420.exe 40482.exe PID 2300 wrote to memory of 980 2300 40482.exe o848822.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdbec3753467486a7fdbb6b24dfbee30_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\cdbec3753467486a7fdbb6b24dfbee30_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\pvpjv.exec:\pvpjv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464 -
\??\c:\hnbhbb.exec:\hnbhbb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
\??\c:\4644864.exec:\4644864.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3960 -
\??\c:\840488.exec:\840488.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
\??\c:\ttnbtn.exec:\ttnbtn.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
\??\c:\28042.exec:\28042.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\xrlxlxr.exec:\xrlxlxr.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
\??\c:\llxxrrl.exec:\llxxrrl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
\??\c:\208488.exec:\208488.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
\??\c:\dvvvd.exec:\dvvvd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
\??\c:\02044.exec:\02044.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1576 -
\??\c:\lxlfxff.exec:\lxlfxff.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3456 -
\??\c:\ffllllr.exec:\ffllllr.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
\??\c:\6882660.exec:\6882660.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
\??\c:\646448.exec:\646448.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
\??\c:\426048.exec:\426048.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4008 -
\??\c:\202402.exec:\202402.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
\??\c:\llxfrxf.exec:\llxfrxf.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3976 -
\??\c:\88004.exec:\88004.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\20420.exec:\20420.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
\??\c:\40482.exec:\40482.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
\??\c:\o848822.exec:\o848822.exe23⤵
- Executes dropped EXE
PID:980 -
\??\c:\tttnhh.exec:\tttnhh.exe24⤵
- Executes dropped EXE
PID:2800 -
\??\c:\k88860.exec:\k88860.exe25⤵
- Executes dropped EXE
PID:1756 -
\??\c:\6866284.exec:\6866284.exe26⤵
- Executes dropped EXE
PID:4988 -
\??\c:\w80284.exec:\w80284.exe27⤵
- Executes dropped EXE
PID:5004 -
\??\c:\268266.exec:\268266.exe28⤵
- Executes dropped EXE
PID:1332 -
\??\c:\60226.exec:\60226.exe29⤵
- Executes dropped EXE
PID:2124 -
\??\c:\2882604.exec:\2882604.exe30⤵
- Executes dropped EXE
PID:3980 -
\??\c:\4866226.exec:\4866226.exe31⤵
- Executes dropped EXE
PID:2308 -
\??\c:\dvdjv.exec:\dvdjv.exe32⤵
- Executes dropped EXE
PID:4596 -
\??\c:\dpjdp.exec:\dpjdp.exe33⤵
- Executes dropped EXE
PID:2204 -
\??\c:\jjpjp.exec:\jjpjp.exe34⤵
- Executes dropped EXE
PID:4188 -
\??\c:\hnhhhh.exec:\hnhhhh.exe35⤵
- Executes dropped EXE
PID:1144 -
\??\c:\bbtnhh.exec:\bbtnhh.exe36⤵
- Executes dropped EXE
PID:2484 -
\??\c:\btnnbb.exec:\btnnbb.exe37⤵
- Executes dropped EXE
PID:4500 -
\??\c:\dvpjj.exec:\dvpjj.exe38⤵
- Executes dropped EXE
PID:4376 -
\??\c:\lrflrll.exec:\lrflrll.exe39⤵
- Executes dropped EXE
PID:228 -
\??\c:\0468424.exec:\0468424.exe40⤵
- Executes dropped EXE
PID:3004 -
\??\c:\pdddp.exec:\pdddp.exe41⤵
- Executes dropped EXE
PID:3372 -
\??\c:\26426.exec:\26426.exe42⤵
- Executes dropped EXE
PID:3540 -
\??\c:\028680.exec:\028680.exe43⤵
- Executes dropped EXE
PID:3972 -
\??\c:\66682.exec:\66682.exe44⤵
- Executes dropped EXE
PID:4740 -
\??\c:\004602.exec:\004602.exe45⤵
- Executes dropped EXE
PID:3712 -
\??\c:\888648.exec:\888648.exe46⤵
- Executes dropped EXE
PID:2580 -
\??\c:\26226.exec:\26226.exe47⤵
- Executes dropped EXE
PID:1280 -
\??\c:\lxlxlxl.exec:\lxlxlxl.exe48⤵
- Executes dropped EXE
PID:1816 -
\??\c:\dvvpj.exec:\dvvpj.exe49⤵
- Executes dropped EXE
PID:4676 -
\??\c:\xfffxfr.exec:\xfffxfr.exe50⤵
- Executes dropped EXE
PID:944 -
\??\c:\886288.exec:\886288.exe51⤵
- Executes dropped EXE
PID:4324 -
\??\c:\20688.exec:\20688.exe52⤵
- Executes dropped EXE
PID:2972 -
\??\c:\884426.exec:\884426.exe53⤵
- Executes dropped EXE
PID:628 -
\??\c:\btnnnn.exec:\btnnnn.exe54⤵
- Executes dropped EXE
PID:5100 -
\??\c:\086280.exec:\086280.exe55⤵
- Executes dropped EXE
PID:1584 -
\??\c:\e28866.exec:\e28866.exe56⤵
- Executes dropped EXE
PID:436 -
\??\c:\20420.exec:\20420.exe57⤵
- Executes dropped EXE
PID:5108 -
\??\c:\9rfrfxf.exec:\9rfrfxf.exe58⤵
- Executes dropped EXE
PID:3672 -
\??\c:\200442.exec:\200442.exe59⤵
- Executes dropped EXE
PID:4100 -
\??\c:\84026.exec:\84026.exe60⤵
- Executes dropped EXE
PID:3488 -
\??\c:\bhbnth.exec:\bhbnth.exe61⤵
- Executes dropped EXE
PID:640 -
\??\c:\hnnbnt.exec:\hnnbnt.exe62⤵
- Executes dropped EXE
PID:880 -
\??\c:\464006.exec:\464006.exe63⤵
- Executes dropped EXE
PID:5028 -
\??\c:\686226.exec:\686226.exe64⤵
- Executes dropped EXE
PID:4408 -
\??\c:\nnbttn.exec:\nnbttn.exe65⤵
- Executes dropped EXE
PID:672 -
\??\c:\006222.exec:\006222.exe66⤵PID:4492
-
\??\c:\vvvpj.exec:\vvvpj.exe67⤵PID:2288
-
\??\c:\jjdvp.exec:\jjdvp.exe68⤵PID:1724
-
\??\c:\6248662.exec:\6248662.exe69⤵PID:392
-
\??\c:\62260.exec:\62260.exe70⤵PID:2568
-
\??\c:\62660.exec:\62660.exe71⤵PID:2164
-
\??\c:\62882.exec:\62882.exe72⤵PID:4640
-
\??\c:\8860804.exec:\8860804.exe73⤵PID:4852
-
\??\c:\hhhbbb.exec:\hhhbbb.exe74⤵PID:3580
-
\??\c:\jpdvj.exec:\jpdvj.exe75⤵PID:2380
-
\??\c:\jvvpj.exec:\jvvpj.exe76⤵PID:3452
-
\??\c:\462428.exec:\462428.exe77⤵PID:1544
-
\??\c:\rflrllf.exec:\rflrllf.exe78⤵PID:4952
-
\??\c:\2220662.exec:\2220662.exe79⤵PID:912
-
\??\c:\6448826.exec:\6448826.exe80⤵PID:2952
-
\??\c:\28466.exec:\28466.exe81⤵PID:2148
-
\??\c:\hnnnhb.exec:\hnnnhb.exe82⤵PID:4512
-
\??\c:\xxxxrxf.exec:\xxxxrxf.exe83⤵PID:3952
-
\??\c:\268804.exec:\268804.exe84⤵PID:2492
-
\??\c:\640088.exec:\640088.exe85⤵PID:3188
-
\??\c:\2240664.exec:\2240664.exe86⤵PID:3004
-
\??\c:\2260448.exec:\2260448.exe87⤵PID:3540
-
\??\c:\204262.exec:\204262.exe88⤵PID:4548
-
\??\c:\dppjj.exec:\dppjj.exe89⤵PID:4740
-
\??\c:\lrxrlxf.exec:\lrxrlxf.exe90⤵PID:3712
-
\??\c:\xrxxxff.exec:\xrxxxff.exe91⤵PID:768
-
\??\c:\4664222.exec:\4664222.exe92⤵PID:4668
-
\??\c:\pvdpj.exec:\pvdpj.exe93⤵PID:1620
-
\??\c:\nbhhbb.exec:\nbhhbb.exe94⤵PID:2700
-
\??\c:\9ttnhh.exec:\9ttnhh.exe95⤵PID:4676
-
\??\c:\k06088.exec:\k06088.exe96⤵PID:1980
-
\??\c:\84026.exec:\84026.exe97⤵PID:2396
-
\??\c:\1bnnbb.exec:\1bnnbb.exe98⤵PID:4616
-
\??\c:\tnhbbt.exec:\tnhbbt.exe99⤵PID:3668
-
\??\c:\7nbtbb.exec:\7nbtbb.exe100⤵PID:5052
-
\??\c:\httnnh.exec:\httnnh.exe101⤵PID:1808
-
\??\c:\ttttbh.exec:\ttttbh.exe102⤵PID:2444
-
\??\c:\20222.exec:\20222.exe103⤵PID:968
-
\??\c:\62442.exec:\62442.exe104⤵PID:4928
-
\??\c:\628000.exec:\628000.exe105⤵PID:2980
-
\??\c:\0844462.exec:\0844462.exe106⤵PID:4404
-
\??\c:\xxrfxxr.exec:\xxrfxxr.exe107⤵PID:2496
-
\??\c:\vppvp.exec:\vppvp.exe108⤵PID:3060
-
\??\c:\242806.exec:\242806.exe109⤵PID:1612
-
\??\c:\442684.exec:\442684.exe110⤵PID:532
-
\??\c:\e44666.exec:\e44666.exe111⤵PID:1272
-
\??\c:\llrrlxx.exec:\llrrlxx.exe112⤵PID:4700
-
\??\c:\rllfrlf.exec:\rllfrlf.exe113⤵PID:4840
-
\??\c:\htthtt.exec:\htthtt.exe114⤵PID:2384
-
\??\c:\bnbhbb.exec:\bnbhbb.exe115⤵PID:3500
-
\??\c:\5rlrrll.exec:\5rlrrll.exe116⤵PID:2164
-
\??\c:\xxxrfll.exec:\xxxrfll.exe117⤵PID:2124
-
\??\c:\020622.exec:\020622.exe118⤵PID:3304
-
\??\c:\hnthhn.exec:\hnthhn.exe119⤵PID:1016
-
\??\c:\9rffxfx.exec:\9rffxfx.exe120⤵PID:3192
-
\??\c:\xrxrxxx.exec:\xrxrxxx.exe121⤵PID:2252
-
\??\c:\xrlfxff.exec:\xrlfxff.exe122⤵PID:4952
-
\??\c:\9tbbbn.exec:\9tbbbn.exe123⤵PID:1144
-
\??\c:\jvvpj.exec:\jvvpj.exe124⤵PID:4204
-
\??\c:\4264044.exec:\4264044.exe125⤵PID:1760
-
\??\c:\djppp.exec:\djppp.exe126⤵PID:4500
-
\??\c:\6444260.exec:\6444260.exe127⤵PID:228
-
\??\c:\20220.exec:\20220.exe128⤵PID:3844
-
\??\c:\2220260.exec:\2220260.exe129⤵PID:4120
-
\??\c:\a4048.exec:\a4048.exe130⤵PID:3004
-
\??\c:\jjjjv.exec:\jjjjv.exe131⤵PID:4268
-
\??\c:\nhhntn.exec:\nhhntn.exe132⤵PID:3620
-
\??\c:\rfxrxrf.exec:\rfxrxrf.exe133⤵PID:4804
-
\??\c:\u404882.exec:\u404882.exe134⤵PID:1536
-
\??\c:\840826.exec:\840826.exe135⤵PID:1620
-
\??\c:\dpvpv.exec:\dpvpv.exe136⤵PID:988
-
\??\c:\468088.exec:\468088.exe137⤵PID:2200
-
\??\c:\9rlfxrl.exec:\9rlfxrl.exe138⤵PID:1736
-
\??\c:\pjdvp.exec:\pjdvp.exe139⤵PID:3036
-
\??\c:\m4220.exec:\m4220.exe140⤵PID:4604
-
\??\c:\rffxffr.exec:\rffxffr.exe141⤵PID:2444
-
\??\c:\lxrxxrr.exec:\lxrxxrr.exe142⤵PID:2668
-
\??\c:\46888.exec:\46888.exe143⤵PID:1800
-
\??\c:\026886.exec:\026886.exe144⤵PID:2128
-
\??\c:\244488.exec:\244488.exe145⤵PID:4920
-
\??\c:\flrlxxx.exec:\flrlxxx.exe146⤵PID:2584
-
\??\c:\c844828.exec:\c844828.exe147⤵PID:4408
-
\??\c:\nhtthh.exec:\nhtthh.exe148⤵PID:892
-
\??\c:\jdjdj.exec:\jdjdj.exe149⤵PID:2836
-
\??\c:\66882.exec:\66882.exe150⤵PID:392
-
\??\c:\28000.exec:\28000.exe151⤵PID:464
-
\??\c:\688604.exec:\688604.exe152⤵PID:3340
-
\??\c:\xffxrrl.exec:\xffxrrl.exe153⤵PID:4904
-
\??\c:\hntnhh.exec:\hntnhh.exe154⤵PID:2164
-
\??\c:\8248262.exec:\8248262.exe155⤵PID:2124
-
\??\c:\1lfxfrl.exec:\1lfxfrl.exe156⤵PID:2380
-
\??\c:\60006.exec:\60006.exe157⤵PID:2204
-
\??\c:\s8060.exec:\s8060.exe158⤵PID:4832
-
\??\c:\2800026.exec:\2800026.exe159⤵PID:2252
-
\??\c:\0400482.exec:\0400482.exe160⤵PID:2812
-
\??\c:\2848226.exec:\2848226.exe161⤵PID:1144
-
\??\c:\266644.exec:\266644.exe162⤵PID:4580
-
\??\c:\ddvvv.exec:\ddvvv.exe163⤵PID:1760
-
\??\c:\pdjvv.exec:\pdjvv.exe164⤵PID:4040
-
\??\c:\fxfflxr.exec:\fxfflxr.exe165⤵PID:3508
-
\??\c:\600866.exec:\600866.exe166⤵PID:4068
-
\??\c:\rlfxrrl.exec:\rlfxrrl.exe167⤵PID:4264
-
\??\c:\vddvv.exec:\vddvv.exe168⤵PID:4548
-
\??\c:\880422.exec:\880422.exe169⤵PID:220
-
\??\c:\lfrrrrx.exec:\lfrrrrx.exe170⤵PID:768
-
\??\c:\hhbbtt.exec:\hhbbtt.exe171⤵PID:4016
-
\??\c:\bnnnbb.exec:\bnnnbb.exe172⤵PID:2700
-
\??\c:\htbtbb.exec:\htbtbb.exe173⤵PID:2264
-
\??\c:\82880.exec:\82880.exe174⤵PID:1980
-
\??\c:\402840.exec:\402840.exe175⤵PID:3028
-
\??\c:\04400.exec:\04400.exe176⤵PID:1808
-
\??\c:\9jjdd.exec:\9jjdd.exe177⤵PID:3160
-
\??\c:\pdjpd.exec:\pdjpd.exe178⤵PID:5108
-
\??\c:\82444.exec:\82444.exe179⤵PID:4928
-
\??\c:\jvvvd.exec:\jvvvd.exe180⤵PID:4940
-
\??\c:\068884.exec:\068884.exe181⤵PID:1600
-
\??\c:\3tthbh.exec:\3tthbh.exe182⤵PID:1964
-
\??\c:\42680.exec:\42680.exe183⤵PID:1612
-
\??\c:\jjjpp.exec:\jjjpp.exe184⤵PID:532
-
\??\c:\vpppp.exec:\vpppp.exe185⤵PID:2304
-
\??\c:\9btnnn.exec:\9btnnn.exe186⤵PID:1364
-
\??\c:\u240404.exec:\u240404.exe187⤵PID:4924
-
\??\c:\2248288.exec:\2248288.exe188⤵PID:2176
-
\??\c:\4662268.exec:\4662268.exe189⤵PID:4256
-
\??\c:\7jppv.exec:\7jppv.exe190⤵PID:3788
-
\??\c:\djpdj.exec:\djpdj.exe191⤵PID:5064
-
\??\c:\262288.exec:\262288.exe192⤵PID:4572
-
\??\c:\rllfxfl.exec:\rllfxfl.exe193⤵PID:1972
-
\??\c:\dpvjp.exec:\dpvjp.exe194⤵PID:1016
-
\??\c:\nnttbt.exec:\nnttbt.exe195⤵PID:4728
-
\??\c:\8440400.exec:\8440400.exe196⤵PID:4968
-
\??\c:\s6404.exec:\s6404.exe197⤵PID:4532
-
\??\c:\flrlllf.exec:\flrlllf.exe198⤵PID:4524
-
\??\c:\m8482.exec:\m8482.exe199⤵PID:4376
-
\??\c:\k64488.exec:\k64488.exe200⤵PID:4500
-
\??\c:\tnbtnn.exec:\tnbtnn.exe201⤵PID:1684
-
\??\c:\6848222.exec:\6848222.exe202⤵PID:2808
-
\??\c:\042288.exec:\042288.exe203⤵PID:4120
-
\??\c:\s4820.exec:\s4820.exe204⤵PID:4360
-
\??\c:\60206.exec:\60206.exe205⤵PID:4268
-
\??\c:\4806628.exec:\4806628.exe206⤵PID:3096
-
\??\c:\bnbthb.exec:\bnbthb.exe207⤵PID:2768
-
\??\c:\i022282.exec:\i022282.exe208⤵PID:1536
-
\??\c:\pvjjv.exec:\pvjjv.exe209⤵PID:1448
-
\??\c:\464028.exec:\464028.exe210⤵PID:3296
-
\??\c:\6642024.exec:\6642024.exe211⤵PID:4844
-
\??\c:\046882.exec:\046882.exe212⤵PID:1576
-
\??\c:\2242622.exec:\2242622.exe213⤵PID:4980
-
\??\c:\88448.exec:\88448.exe214⤵PID:3088
-
\??\c:\8288248.exec:\8288248.exe215⤵PID:3672
-
\??\c:\88444.exec:\88444.exe216⤵PID:1248
-
\??\c:\0880860.exec:\0880860.exe217⤵PID:1800
-
\??\c:\xlxrrrl.exec:\xlxrrrl.exe218⤵PID:4800
-
\??\c:\dpjdj.exec:\dpjdj.exe219⤵PID:2008
-
\??\c:\8608646.exec:\8608646.exe220⤵PID:2968
-
\??\c:\040444.exec:\040444.exe221⤵PID:2304
-
\??\c:\3xffxxx.exec:\3xffxxx.exe222⤵PID:2568
-
\??\c:\608404.exec:\608404.exe223⤵PID:1332
-
\??\c:\lxxrffr.exec:\lxxrffr.exe224⤵PID:4020
-
\??\c:\1pjdv.exec:\1pjdv.exe225⤵PID:2292
-
\??\c:\0844266.exec:\0844266.exe226⤵PID:5064
-
\??\c:\vdpjp.exec:\vdpjp.exe227⤵PID:4572
-
\??\c:\08644.exec:\08644.exe228⤵PID:1972
-
\??\c:\4848660.exec:\4848660.exe229⤵PID:2848
-
\??\c:\vvdjp.exec:\vvdjp.exe230⤵PID:2432
-
\??\c:\5lrrrlf.exec:\5lrrrlf.exe231⤵PID:4380
-
\??\c:\2428888.exec:\2428888.exe232⤵PID:3656
-
\??\c:\642428.exec:\642428.exe233⤵PID:3932
-
\??\c:\jjdjp.exec:\jjdjp.exe234⤵PID:3224
-
\??\c:\bttnbb.exec:\bttnbb.exe235⤵PID:5040
-
\??\c:\202666.exec:\202666.exe236⤵PID:3344
-
\??\c:\60068.exec:\60068.exe237⤵PID:1260
-
\??\c:\8240822.exec:\8240822.exe238⤵PID:2744
-
\??\c:\6288844.exec:\6288844.exe239⤵PID:4548
-
\??\c:\jjppv.exec:\jjppv.exe240⤵PID:2096
-
\??\c:\lrllxxx.exec:\lrllxxx.exe241⤵PID:1400
-
\??\c:\lrrfxrf.exec:\lrrfxrf.exe242⤵PID:688