Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
41cf6d3d5ae3f3911c585899d83c11a0_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
41cf6d3d5ae3f3911c585899d83c11a0_NeikiAnalytics.exe
-
Size
95KB
-
MD5
41cf6d3d5ae3f3911c585899d83c11a0
-
SHA1
3bb81b588658334f4946e1ee7379171f18af1ed8
-
SHA256
d48b612702ea376f482c86d9bf9929074298d3accf5e9ae493f084ea52e169aa
-
SHA512
d58d848f6ade83620ab5b1de3e013eb1f0ec1caed9421251896f2b000b251cf4b8e631a2a0b193e46c6d36de07fd7a442bb912ce14c8f7dd38c14b91f900c188
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIS7/b9EUeWpEC3alBlwtn8BLnna:ymb3NkkiQ3mdBjFIi/REUZnKlbnvy
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/4364-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2796-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1648-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3972-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2672-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1448-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1620-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1388-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3640-42-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3640-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4604-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3036-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4368-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4692-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1128-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4072-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2668-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/640-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3616-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1964-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1780-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2288-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4840-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4724-175-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/552-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3944-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/624-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
40868.exe424866.exe7vvpd.exeppvvv.exe480622.exem4280.exe24068.exedjvdd.exe24664.exelrlfxfx.exe46666.exevdvpj.exevjjjv.exelxlfxfx.exe826600.exe20042.exe684822.exeg0448.exedvpjd.exenhtbbh.exek04868.exe6200000.exerfffffx.exerxfffrx.exebhntnn.exe84888.exevpjdd.exe028260.exexxrlfxr.exethtnth.exe028422.exe2600488.exelllfxrl.exennnbth.exellrrrff.exea0600.exejddvp.exe4288844.exevdvvp.exes2888.exe642882.exe444628.exepjpvv.exe0684444.exe4028882.exeppvvd.exellxxrrr.exe828880.exeu628666.exe88440.exec066444.exexrrlfff.exe2662288.exe0444888.exejdjpp.exe8404440.exefrlfrfx.exethhhhb.exelxxrllf.exebnthbt.exe4000488.exevvjvp.exelllfxrr.exe86826.exepid process 2796 40868.exe 1648 424866.exe 3972 7vvpd.exe 2672 ppvvv.exe 3640 480622.exe 1448 m4280.exe 1388 24068.exe 1620 djvdd.exe 4604 24664.exe 3036 lrlfxfx.exe 4368 46666.exe 4692 vdvpj.exe 1128 vjjjv.exe 4072 lxlfxfx.exe 5108 826600.exe 2668 20042.exe 4896 684822.exe 640 g0448.exe 5028 dvpjd.exe 3616 nhtbbh.exe 1964 k04868.exe 1780 6200000.exe 2288 rfffffx.exe 4840 rxfffrx.exe 3216 bhntnn.exe 4724 84888.exe 2176 vpjdd.exe 552 028260.exe 3980 xxrlfxr.exe 3944 thtnth.exe 624 028422.exe 3624 2600488.exe 2432 lllfxrl.exe 4872 nnnbth.exe 4684 llrrrff.exe 4580 a0600.exe 4512 jddvp.exe 3344 4288844.exe 4740 vdvvp.exe 1716 s2888.exe 5068 642882.exe 216 444628.exe 1768 pjpvv.exe 1176 0684444.exe 3640 4028882.exe 920 ppvvd.exe 508 llxxrrr.exe 1980 828880.exe 3868 u628666.exe 408 88440.exe 2388 c066444.exe 3456 xrrlfff.exe 2072 2662288.exe 3160 0444888.exe 4100 jdjpp.exe 4008 8404440.exe 4960 frlfrfx.exe 1400 thhhhb.exe 116 lxxrllf.exe 3396 bnthbt.exe 3060 4000488.exe 2136 vvjvp.exe 532 lllfxrr.exe 980 86826.exe -
Processes:
resource yara_rule behavioral2/memory/4364-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2796-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1648-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3972-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2672-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1448-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1620-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1388-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3640-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4604-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4604-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4604-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3036-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4368-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4692-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1128-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4072-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2668-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/640-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3616-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1964-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1780-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2288-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4840-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4724-175-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/552-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3944-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/624-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
41cf6d3d5ae3f3911c585899d83c11a0_NeikiAnalytics.exe40868.exe424866.exe7vvpd.exeppvvv.exe480622.exem4280.exe24068.exedjvdd.exe24664.exelrlfxfx.exe46666.exevdvpj.exevjjjv.exelxlfxfx.exe826600.exe20042.exe684822.exeg0448.exedvpjd.exenhtbbh.exek04868.exedescription pid process target process PID 4364 wrote to memory of 2796 4364 41cf6d3d5ae3f3911c585899d83c11a0_NeikiAnalytics.exe 40868.exe PID 4364 wrote to memory of 2796 4364 41cf6d3d5ae3f3911c585899d83c11a0_NeikiAnalytics.exe 40868.exe PID 4364 wrote to memory of 2796 4364 41cf6d3d5ae3f3911c585899d83c11a0_NeikiAnalytics.exe 40868.exe PID 2796 wrote to memory of 1648 2796 40868.exe 424866.exe PID 2796 wrote to memory of 1648 2796 40868.exe 424866.exe PID 2796 wrote to memory of 1648 2796 40868.exe 424866.exe PID 1648 wrote to memory of 3972 1648 424866.exe 7vvpd.exe PID 1648 wrote to memory of 3972 1648 424866.exe 7vvpd.exe PID 1648 wrote to memory of 3972 1648 424866.exe 7vvpd.exe PID 3972 wrote to memory of 2672 3972 7vvpd.exe ppvvv.exe PID 3972 wrote to memory of 2672 3972 7vvpd.exe ppvvv.exe PID 3972 wrote to memory of 2672 3972 7vvpd.exe ppvvv.exe PID 2672 wrote to memory of 3640 2672 ppvvv.exe 480622.exe PID 2672 wrote to memory of 3640 2672 ppvvv.exe 480622.exe PID 2672 wrote to memory of 3640 2672 ppvvv.exe 480622.exe PID 3640 wrote to memory of 1448 3640 480622.exe m4280.exe PID 3640 wrote to memory of 1448 3640 480622.exe m4280.exe PID 3640 wrote to memory of 1448 3640 480622.exe m4280.exe PID 1448 wrote to memory of 1388 1448 m4280.exe 24068.exe PID 1448 wrote to memory of 1388 1448 m4280.exe 24068.exe PID 1448 wrote to memory of 1388 1448 m4280.exe 24068.exe PID 1388 wrote to memory of 1620 1388 24068.exe djvdd.exe PID 1388 wrote to memory of 1620 1388 24068.exe djvdd.exe PID 1388 wrote to memory of 1620 1388 24068.exe djvdd.exe PID 1620 wrote to memory of 4604 1620 djvdd.exe 24664.exe PID 1620 wrote to memory of 4604 1620 djvdd.exe 24664.exe PID 1620 wrote to memory of 4604 1620 djvdd.exe 24664.exe PID 4604 wrote to memory of 3036 4604 24664.exe lrlfxfx.exe PID 4604 wrote to memory of 3036 4604 24664.exe lrlfxfx.exe PID 4604 wrote to memory of 3036 4604 24664.exe lrlfxfx.exe PID 3036 wrote to memory of 4368 3036 lrlfxfx.exe 46666.exe PID 3036 wrote to memory of 4368 3036 lrlfxfx.exe 46666.exe PID 3036 wrote to memory of 4368 3036 lrlfxfx.exe 46666.exe PID 4368 wrote to memory of 4692 4368 46666.exe vdvpj.exe PID 4368 wrote to memory of 4692 4368 46666.exe vdvpj.exe PID 4368 wrote to memory of 4692 4368 46666.exe vdvpj.exe PID 4692 wrote to memory of 1128 4692 vdvpj.exe vjjjv.exe PID 4692 wrote to memory of 1128 4692 vdvpj.exe vjjjv.exe PID 4692 wrote to memory of 1128 4692 vdvpj.exe vjjjv.exe PID 1128 wrote to memory of 4072 1128 vjjjv.exe lxlfxfx.exe PID 1128 wrote to memory of 4072 1128 vjjjv.exe lxlfxfx.exe PID 1128 wrote to memory of 4072 1128 vjjjv.exe lxlfxfx.exe PID 4072 wrote to memory of 5108 4072 lxlfxfx.exe 826600.exe PID 4072 wrote to memory of 5108 4072 lxlfxfx.exe 826600.exe PID 4072 wrote to memory of 5108 4072 lxlfxfx.exe 826600.exe PID 5108 wrote to memory of 2668 5108 826600.exe 20042.exe PID 5108 wrote to memory of 2668 5108 826600.exe 20042.exe PID 5108 wrote to memory of 2668 5108 826600.exe 20042.exe PID 2668 wrote to memory of 4896 2668 20042.exe 684822.exe PID 2668 wrote to memory of 4896 2668 20042.exe 684822.exe PID 2668 wrote to memory of 4896 2668 20042.exe 684822.exe PID 4896 wrote to memory of 640 4896 684822.exe g0448.exe PID 4896 wrote to memory of 640 4896 684822.exe g0448.exe PID 4896 wrote to memory of 640 4896 684822.exe g0448.exe PID 640 wrote to memory of 5028 640 g0448.exe dvpjd.exe PID 640 wrote to memory of 5028 640 g0448.exe dvpjd.exe PID 640 wrote to memory of 5028 640 g0448.exe dvpjd.exe PID 5028 wrote to memory of 3616 5028 dvpjd.exe nhtbbh.exe PID 5028 wrote to memory of 3616 5028 dvpjd.exe nhtbbh.exe PID 5028 wrote to memory of 3616 5028 dvpjd.exe nhtbbh.exe PID 3616 wrote to memory of 1964 3616 nhtbbh.exe k04868.exe PID 3616 wrote to memory of 1964 3616 nhtbbh.exe k04868.exe PID 3616 wrote to memory of 1964 3616 nhtbbh.exe k04868.exe PID 1964 wrote to memory of 1780 1964 k04868.exe 6200000.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41cf6d3d5ae3f3911c585899d83c11a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\41cf6d3d5ae3f3911c585899d83c11a0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
\??\c:\40868.exec:\40868.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
\??\c:\424866.exec:\424866.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\7vvpd.exec:\7vvpd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
\??\c:\ppvvv.exec:\ppvvv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
\??\c:\480622.exec:\480622.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
\??\c:\m4280.exec:\m4280.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\24068.exec:\24068.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\djvdd.exec:\djvdd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
\??\c:\24664.exec:\24664.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
\??\c:\lrlfxfx.exec:\lrlfxfx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\46666.exec:\46666.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
\??\c:\vdvpj.exec:\vdvpj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4692 -
\??\c:\vjjjv.exec:\vjjjv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1128 -
\??\c:\lxlfxfx.exec:\lxlfxfx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
\??\c:\826600.exec:\826600.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
\??\c:\20042.exec:\20042.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
\??\c:\684822.exec:\684822.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
\??\c:\g0448.exec:\g0448.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
\??\c:\dvpjd.exec:\dvpjd.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
\??\c:\nhtbbh.exec:\nhtbbh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
\??\c:\k04868.exec:\k04868.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
\??\c:\6200000.exec:\6200000.exe23⤵
- Executes dropped EXE
PID:1780 -
\??\c:\rfffffx.exec:\rfffffx.exe24⤵
- Executes dropped EXE
PID:2288 -
\??\c:\rxfffrx.exec:\rxfffrx.exe25⤵
- Executes dropped EXE
PID:4840 -
\??\c:\bhntnn.exec:\bhntnn.exe26⤵
- Executes dropped EXE
PID:3216 -
\??\c:\84888.exec:\84888.exe27⤵
- Executes dropped EXE
PID:4724 -
\??\c:\vpjdd.exec:\vpjdd.exe28⤵
- Executes dropped EXE
PID:2176 -
\??\c:\028260.exec:\028260.exe29⤵
- Executes dropped EXE
PID:552 -
\??\c:\xxrlfxr.exec:\xxrlfxr.exe30⤵
- Executes dropped EXE
PID:3980 -
\??\c:\thtnth.exec:\thtnth.exe31⤵
- Executes dropped EXE
PID:3944 -
\??\c:\028422.exec:\028422.exe32⤵
- Executes dropped EXE
PID:624 -
\??\c:\2600488.exec:\2600488.exe33⤵
- Executes dropped EXE
PID:3624 -
\??\c:\lllfxrl.exec:\lllfxrl.exe34⤵
- Executes dropped EXE
PID:2432 -
\??\c:\nnnbth.exec:\nnnbth.exe35⤵
- Executes dropped EXE
PID:4872 -
\??\c:\llrrrff.exec:\llrrrff.exe36⤵
- Executes dropped EXE
PID:4684 -
\??\c:\a0600.exec:\a0600.exe37⤵
- Executes dropped EXE
PID:4580 -
\??\c:\jddvp.exec:\jddvp.exe38⤵
- Executes dropped EXE
PID:4512 -
\??\c:\4288844.exec:\4288844.exe39⤵
- Executes dropped EXE
PID:3344 -
\??\c:\vdvvp.exec:\vdvvp.exe40⤵
- Executes dropped EXE
PID:4740 -
\??\c:\s2888.exec:\s2888.exe41⤵
- Executes dropped EXE
PID:1716 -
\??\c:\642882.exec:\642882.exe42⤵
- Executes dropped EXE
PID:5068 -
\??\c:\444628.exec:\444628.exe43⤵
- Executes dropped EXE
PID:216 -
\??\c:\pjpvv.exec:\pjpvv.exe44⤵
- Executes dropped EXE
PID:1768 -
\??\c:\0684444.exec:\0684444.exe45⤵
- Executes dropped EXE
PID:1176 -
\??\c:\4028882.exec:\4028882.exe46⤵
- Executes dropped EXE
PID:3640 -
\??\c:\ppvvd.exec:\ppvvd.exe47⤵
- Executes dropped EXE
PID:920 -
\??\c:\llxxrrr.exec:\llxxrrr.exe48⤵
- Executes dropped EXE
PID:508 -
\??\c:\828880.exec:\828880.exe49⤵
- Executes dropped EXE
PID:1980 -
\??\c:\u628666.exec:\u628666.exe50⤵
- Executes dropped EXE
PID:3868 -
\??\c:\88440.exec:\88440.exe51⤵
- Executes dropped EXE
PID:408 -
\??\c:\c066444.exec:\c066444.exe52⤵
- Executes dropped EXE
PID:2388 -
\??\c:\xrrlfff.exec:\xrrlfff.exe53⤵
- Executes dropped EXE
PID:3456 -
\??\c:\2662288.exec:\2662288.exe54⤵
- Executes dropped EXE
PID:2072 -
\??\c:\0444888.exec:\0444888.exe55⤵
- Executes dropped EXE
PID:3160 -
\??\c:\jdjpp.exec:\jdjpp.exe56⤵
- Executes dropped EXE
PID:4100 -
\??\c:\8404440.exec:\8404440.exe57⤵
- Executes dropped EXE
PID:4008 -
\??\c:\frlfrfx.exec:\frlfrfx.exe58⤵
- Executes dropped EXE
PID:4960 -
\??\c:\thhhhb.exec:\thhhhb.exe59⤵
- Executes dropped EXE
PID:1400 -
\??\c:\lxxrllf.exec:\lxxrllf.exe60⤵
- Executes dropped EXE
PID:116 -
\??\c:\bnthbt.exec:\bnthbt.exe61⤵
- Executes dropped EXE
PID:3396 -
\??\c:\4000488.exec:\4000488.exe62⤵
- Executes dropped EXE
PID:3060 -
\??\c:\vvjvp.exec:\vvjvp.exe63⤵
- Executes dropped EXE
PID:2136 -
\??\c:\lllfxrr.exec:\lllfxrr.exe64⤵
- Executes dropped EXE
PID:532 -
\??\c:\86826.exec:\86826.exe65⤵
- Executes dropped EXE
PID:980 -
\??\c:\pdpjp.exec:\pdpjp.exe66⤵PID:2836
-
\??\c:\k44266.exec:\k44266.exe67⤵PID:4016
-
\??\c:\1jpjj.exec:\1jpjj.exe68⤵PID:1272
-
\??\c:\bnnhnh.exec:\bnnhnh.exe69⤵PID:2164
-
\??\c:\284804.exec:\284804.exe70⤵PID:3500
-
\??\c:\88260.exec:\88260.exe71⤵PID:4412
-
\??\c:\vjdvv.exec:\vjdvv.exe72⤵PID:464
-
\??\c:\006040.exec:\006040.exe73⤵PID:4640
-
\??\c:\40048.exec:\40048.exe74⤵PID:4568
-
\??\c:\26420.exec:\26420.exe75⤵PID:4996
-
\??\c:\u288222.exec:\u288222.exe76⤵PID:2204
-
\??\c:\8048262.exec:\8048262.exe77⤵PID:624
-
\??\c:\62444.exec:\62444.exe78⤵PID:4828
-
\??\c:\pjddj.exec:\pjddj.exe79⤵PID:2368
-
\??\c:\46204.exec:\46204.exe80⤵PID:4396
-
\??\c:\86608.exec:\86608.exe81⤵PID:1760
-
\??\c:\0404820.exec:\0404820.exe82⤵PID:4580
-
\??\c:\lxrxlxx.exec:\lxrxlxx.exe83⤵PID:4364
-
\??\c:\bnnnhn.exec:\bnnnhn.exe84⤵PID:3220
-
\??\c:\3djdj.exec:\3djdj.exe85⤵PID:3224
-
\??\c:\fxlflfx.exec:\fxlflfx.exe86⤵PID:1108
-
\??\c:\04008.exec:\04008.exe87⤵PID:3732
-
\??\c:\vvvvj.exec:\vvvvj.exe88⤵PID:216
-
\??\c:\hthbbt.exec:\hthbbt.exe89⤵PID:4804
-
\??\c:\g8482.exec:\g8482.exe90⤵PID:2264
-
\??\c:\9pvpv.exec:\9pvpv.exe91⤵PID:3640
-
\??\c:\6066482.exec:\6066482.exe92⤵PID:4344
-
\??\c:\4066660.exec:\4066660.exe93⤵PID:3304
-
\??\c:\0622268.exec:\0622268.exe94⤵PID:3772
-
\??\c:\60220.exec:\60220.exe95⤵PID:1252
-
\??\c:\a2866.exec:\a2866.exe96⤵PID:2232
-
\??\c:\84044.exec:\84044.exe97⤵PID:408
-
\??\c:\0006024.exec:\0006024.exe98⤵PID:4932
-
\??\c:\jjdvp.exec:\jjdvp.exe99⤵PID:2920
-
\??\c:\02288.exec:\02288.exe100⤵PID:4820
-
\??\c:\2682600.exec:\2682600.exe101⤵PID:3160
-
\??\c:\llllflf.exec:\llllflf.exe102⤵PID:4508
-
\??\c:\e04666.exec:\e04666.exe103⤵PID:2312
-
\??\c:\i248226.exec:\i248226.exe104⤵PID:4960
-
\??\c:\22228.exec:\22228.exe105⤵PID:1212
-
\??\c:\3ttnbb.exec:\3ttnbb.exe106⤵PID:116
-
\??\c:\ffffrlr.exec:\ffffrlr.exe107⤵PID:3396
-
\??\c:\006420.exec:\006420.exe108⤵PID:3060
-
\??\c:\jdvjd.exec:\jdvjd.exe109⤵PID:2136
-
\??\c:\fffrlrx.exec:\fffrlrx.exe110⤵PID:532
-
\??\c:\bhtnbh.exec:\bhtnbh.exe111⤵PID:980
-
\??\c:\606448.exec:\606448.exe112⤵PID:1660
-
\??\c:\vdjdd.exec:\vdjdd.exe113⤵PID:4016
-
\??\c:\lrxrrrl.exec:\lrxrrrl.exe114⤵PID:3728
-
\??\c:\vpjpp.exec:\vpjpp.exe115⤵PID:2176
-
\??\c:\vpjdp.exec:\vpjdp.exe116⤵PID:2112
-
\??\c:\44086.exec:\44086.exe117⤵PID:1840
-
\??\c:\jpdvv.exec:\jpdvv.exe118⤵PID:2308
-
\??\c:\8268202.exec:\8268202.exe119⤵PID:5060
-
\??\c:\jdddv.exec:\jdddv.exe120⤵PID:4996
-
\??\c:\0028222.exec:\0028222.exe121⤵PID:3104
-
\??\c:\1flfxxr.exec:\1flfxxr.exe122⤵PID:3624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-