Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2024 05:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
af2a27c3d5efcaf8942cbb19b0fb4f90_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
af2a27c3d5efcaf8942cbb19b0fb4f90_NeikiAnalytics.exe
-
Size
95KB
-
MD5
af2a27c3d5efcaf8942cbb19b0fb4f90
-
SHA1
5cc2bbbeb2e266560faf74ae092ef1e3d7b94d3a
-
SHA256
9947a477fa2ccf4083670bf169b974debcdaf2b15af5a97f893517a049cfd167
-
SHA512
fc32aa175892388881d2d29395df96ff6ac3fdabedc88b8dacae02900db22798cd4cae8975ea4d519582d689b736510b9ae071165ccd5ae4ee6cc6e660fef8b5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDo73XH/YP1HFrJximAAxS1rj/2C8:ymb3NkkiQ3mdBjFo73PYP1lri3K8GwyX
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/4516-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4516-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2308-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4664-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4664-27-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3664-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2096-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3720-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1872-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2232-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4396-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1876-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3236-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4248-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4120-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4428-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4944-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1144-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3476-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1412-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2728-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4392-104-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/656-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4024-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3828-66-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3828-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1588-17-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
040488.exe80606.exexrrllll.exe2084804.exe28220.exebbnnnb.exevpvvd.exejpvpd.exedvvpd.exevjpjd.exebhhbhh.exe266482.exehhbttn.exe64440.exe4866662.exepjpjj.exelxllfll.exe84488.exe6400444.exe60228.exe6002622.exepvvjd.exetnnbhh.exe24004.exejppjd.exe64408.exe1nhbtt.exellrrxxf.exes4060.exe406044.exe2004880.exe9xfxffl.exe828866.exe82000.exe60886.exebnttbb.exefxrlffx.exe688266.exe28400.exefrxlffx.exedjpvv.exe9rrlffx.exe4660004.exejvdjv.exe8088204.exe7xlfxxx.exeddddv.exe66888.exe8422282.exe82266.exe5tbntt.exethbthh.exe486666.exee46044.exe62826.exe8200000.exennnnhh.exe9xfxxxr.exe3rxxrxr.exe880044.exedvjjv.exem4420.exelflfxrl.exe22264.exepid process 2308 040488.exe 1588 80606.exe 4664 xrrllll.exe 2096 2084804.exe 3664 28220.exe 3720 bbnnnb.exe 1872 vpvvd.exe 3828 jpvpd.exe 4024 dvvpd.exe 2232 vjpjd.exe 2352 bhhbhh.exe 656 266482.exe 2712 hhbttn.exe 4392 64440.exe 2728 4866662.exe 1412 pjpjj.exe 3476 lxllfll.exe 1144 84488.exe 4944 6400444.exe 4428 60228.exe 4396 6002622.exe 1036 pvvjd.exe 4120 tnnbhh.exe 4248 24004.exe 2860 jppjd.exe 4732 64408.exe 3236 1nhbtt.exe 3580 llrrxxf.exe 1592 s4060.exe 4972 406044.exe 1876 2004880.exe 224 9xfxffl.exe 5032 828866.exe 4600 82000.exe 4912 60886.exe 2152 bnttbb.exe 2000 fxrlffx.exe 1844 688266.exe 1588 28400.exe 3700 frxlffx.exe 4860 djpvv.exe 3496 9rrlffx.exe 4924 4660004.exe 688 jvdjv.exe 4340 8088204.exe 1604 7xlfxxx.exe 2232 ddddv.exe 3452 66888.exe 4744 8422282.exe 2660 82266.exe 5084 5tbntt.exe 3112 thbthh.exe 2312 486666.exe 2728 e46044.exe 1828 62826.exe 1240 8200000.exe 3416 nnnnhh.exe 1144 9xfxxxr.exe 4040 3rxxrxr.exe 4100 880044.exe 2472 dvjjv.exe 4636 m4420.exe 2736 lflfxrl.exe 4088 22264.exe -
Processes:
resource yara_rule behavioral2/memory/4516-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4516-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2308-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4664-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3664-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3720-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3720-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1872-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2232-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4396-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1876-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3236-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4248-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4120-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4428-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4944-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1144-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3476-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1412-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2728-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4392-104-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/656-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4024-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3828-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3720-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1588-17-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
af2a27c3d5efcaf8942cbb19b0fb4f90_NeikiAnalytics.exe040488.exe80606.exexrrllll.exe2084804.exe28220.exebbnnnb.exevpvvd.exejpvpd.exedvvpd.exevjpjd.exebhhbhh.exe266482.exehhbttn.exe64440.exe4866662.exepjpjj.exelxllfll.exe84488.exe6400444.exe60228.exe6002622.exedescription pid process target process PID 4516 wrote to memory of 2308 4516 af2a27c3d5efcaf8942cbb19b0fb4f90_NeikiAnalytics.exe 040488.exe PID 4516 wrote to memory of 2308 4516 af2a27c3d5efcaf8942cbb19b0fb4f90_NeikiAnalytics.exe 040488.exe PID 4516 wrote to memory of 2308 4516 af2a27c3d5efcaf8942cbb19b0fb4f90_NeikiAnalytics.exe 040488.exe PID 2308 wrote to memory of 1588 2308 040488.exe 28400.exe PID 2308 wrote to memory of 1588 2308 040488.exe 28400.exe PID 2308 wrote to memory of 1588 2308 040488.exe 28400.exe PID 1588 wrote to memory of 4664 1588 80606.exe xrrllll.exe PID 1588 wrote to memory of 4664 1588 80606.exe xrrllll.exe PID 1588 wrote to memory of 4664 1588 80606.exe xrrllll.exe PID 4664 wrote to memory of 2096 4664 xrrllll.exe 2084804.exe PID 4664 wrote to memory of 2096 4664 xrrllll.exe 2084804.exe PID 4664 wrote to memory of 2096 4664 xrrllll.exe 2084804.exe PID 2096 wrote to memory of 3664 2096 2084804.exe 28220.exe PID 2096 wrote to memory of 3664 2096 2084804.exe 28220.exe PID 2096 wrote to memory of 3664 2096 2084804.exe 28220.exe PID 3664 wrote to memory of 3720 3664 28220.exe bbnnnb.exe PID 3664 wrote to memory of 3720 3664 28220.exe bbnnnb.exe PID 3664 wrote to memory of 3720 3664 28220.exe bbnnnb.exe PID 3720 wrote to memory of 1872 3720 bbnnnb.exe vpvvd.exe PID 3720 wrote to memory of 1872 3720 bbnnnb.exe vpvvd.exe PID 3720 wrote to memory of 1872 3720 bbnnnb.exe vpvvd.exe PID 1872 wrote to memory of 3828 1872 vpvvd.exe jpvpd.exe PID 1872 wrote to memory of 3828 1872 vpvvd.exe jpvpd.exe PID 1872 wrote to memory of 3828 1872 vpvvd.exe jpvpd.exe PID 3828 wrote to memory of 4024 3828 jpvpd.exe dvvpd.exe PID 3828 wrote to memory of 4024 3828 jpvpd.exe dvvpd.exe PID 3828 wrote to memory of 4024 3828 jpvpd.exe dvvpd.exe PID 4024 wrote to memory of 2232 4024 dvvpd.exe vjpjd.exe PID 4024 wrote to memory of 2232 4024 dvvpd.exe vjpjd.exe PID 4024 wrote to memory of 2232 4024 dvvpd.exe vjpjd.exe PID 2232 wrote to memory of 2352 2232 vjpjd.exe jdvjv.exe PID 2232 wrote to memory of 2352 2232 vjpjd.exe jdvjv.exe PID 2232 wrote to memory of 2352 2232 vjpjd.exe jdvjv.exe PID 2352 wrote to memory of 656 2352 bhhbhh.exe 266482.exe PID 2352 wrote to memory of 656 2352 bhhbhh.exe 266482.exe PID 2352 wrote to memory of 656 2352 bhhbhh.exe 266482.exe PID 656 wrote to memory of 2712 656 266482.exe hhbttn.exe PID 656 wrote to memory of 2712 656 266482.exe hhbttn.exe PID 656 wrote to memory of 2712 656 266482.exe hhbttn.exe PID 2712 wrote to memory of 4392 2712 hhbttn.exe 64440.exe PID 2712 wrote to memory of 4392 2712 hhbttn.exe 64440.exe PID 2712 wrote to memory of 4392 2712 hhbttn.exe 64440.exe PID 4392 wrote to memory of 2728 4392 64440.exe 4866662.exe PID 4392 wrote to memory of 2728 4392 64440.exe 4866662.exe PID 4392 wrote to memory of 2728 4392 64440.exe 4866662.exe PID 2728 wrote to memory of 1412 2728 4866662.exe pjpjj.exe PID 2728 wrote to memory of 1412 2728 4866662.exe pjpjj.exe PID 2728 wrote to memory of 1412 2728 4866662.exe pjpjj.exe PID 1412 wrote to memory of 3476 1412 pjpjj.exe lxllfll.exe PID 1412 wrote to memory of 3476 1412 pjpjj.exe lxllfll.exe PID 1412 wrote to memory of 3476 1412 pjpjj.exe lxllfll.exe PID 3476 wrote to memory of 1144 3476 lxllfll.exe 84488.exe PID 3476 wrote to memory of 1144 3476 lxllfll.exe 84488.exe PID 3476 wrote to memory of 1144 3476 lxllfll.exe 84488.exe PID 1144 wrote to memory of 4944 1144 84488.exe 6400444.exe PID 1144 wrote to memory of 4944 1144 84488.exe 6400444.exe PID 1144 wrote to memory of 4944 1144 84488.exe 6400444.exe PID 4944 wrote to memory of 4428 4944 6400444.exe 60228.exe PID 4944 wrote to memory of 4428 4944 6400444.exe 60228.exe PID 4944 wrote to memory of 4428 4944 6400444.exe 60228.exe PID 4428 wrote to memory of 4396 4428 60228.exe 6002622.exe PID 4428 wrote to memory of 4396 4428 60228.exe 6002622.exe PID 4428 wrote to memory of 4396 4428 60228.exe 6002622.exe PID 4396 wrote to memory of 1036 4396 6002622.exe pvvjd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af2a27c3d5efcaf8942cbb19b0fb4f90_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\af2a27c3d5efcaf8942cbb19b0fb4f90_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
\??\c:\040488.exec:\040488.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
\??\c:\80606.exec:\80606.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
\??\c:\xrrllll.exec:\xrrllll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664 -
\??\c:\2084804.exec:\2084804.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\28220.exec:\28220.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3664 -
\??\c:\bbnnnb.exec:\bbnnnb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
\??\c:\vpvvd.exec:\vpvvd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
\??\c:\jpvpd.exec:\jpvpd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
\??\c:\dvvpd.exec:\dvvpd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
\??\c:\vjpjd.exec:\vjpjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\bhhbhh.exec:\bhhbhh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2352 -
\??\c:\266482.exec:\266482.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:656 -
\??\c:\hhbttn.exec:\hhbttn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\64440.exec:\64440.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
\??\c:\4866662.exec:\4866662.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\pjpjj.exec:\pjpjj.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1412 -
\??\c:\lxllfll.exec:\lxllfll.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3476 -
\??\c:\84488.exec:\84488.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
\??\c:\6400444.exec:\6400444.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
\??\c:\60228.exec:\60228.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
\??\c:\6002622.exec:\6002622.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
\??\c:\pvvjd.exec:\pvvjd.exe23⤵
- Executes dropped EXE
PID:1036 -
\??\c:\tnnbhh.exec:\tnnbhh.exe24⤵
- Executes dropped EXE
PID:4120 -
\??\c:\24004.exec:\24004.exe25⤵
- Executes dropped EXE
PID:4248 -
\??\c:\jppjd.exec:\jppjd.exe26⤵
- Executes dropped EXE
PID:2860 -
\??\c:\64408.exec:\64408.exe27⤵
- Executes dropped EXE
PID:4732 -
\??\c:\1nhbtt.exec:\1nhbtt.exe28⤵
- Executes dropped EXE
PID:3236 -
\??\c:\llrrxxf.exec:\llrrxxf.exe29⤵
- Executes dropped EXE
PID:3580 -
\??\c:\s4060.exec:\s4060.exe30⤵
- Executes dropped EXE
PID:1592 -
\??\c:\406044.exec:\406044.exe31⤵
- Executes dropped EXE
PID:4972 -
\??\c:\2004880.exec:\2004880.exe32⤵
- Executes dropped EXE
PID:1876 -
\??\c:\9xfxffl.exec:\9xfxffl.exe33⤵
- Executes dropped EXE
PID:224 -
\??\c:\828866.exec:\828866.exe34⤵
- Executes dropped EXE
PID:5032 -
\??\c:\82000.exec:\82000.exe35⤵
- Executes dropped EXE
PID:4600 -
\??\c:\60886.exec:\60886.exe36⤵
- Executes dropped EXE
PID:4912 -
\??\c:\bnttbb.exec:\bnttbb.exe37⤵
- Executes dropped EXE
PID:2152 -
\??\c:\fxrlffx.exec:\fxrlffx.exe38⤵
- Executes dropped EXE
PID:2000 -
\??\c:\688266.exec:\688266.exe39⤵
- Executes dropped EXE
PID:1844 -
\??\c:\28400.exec:\28400.exe40⤵
- Executes dropped EXE
PID:1588 -
\??\c:\frxlffx.exec:\frxlffx.exe41⤵
- Executes dropped EXE
PID:3700 -
\??\c:\djpvv.exec:\djpvv.exe42⤵
- Executes dropped EXE
PID:4860 -
\??\c:\9rrlffx.exec:\9rrlffx.exe43⤵
- Executes dropped EXE
PID:3496 -
\??\c:\4660004.exec:\4660004.exe44⤵
- Executes dropped EXE
PID:4924 -
\??\c:\jvdjv.exec:\jvdjv.exe45⤵
- Executes dropped EXE
PID:688 -
\??\c:\8088204.exec:\8088204.exe46⤵
- Executes dropped EXE
PID:4340 -
\??\c:\7xlfxxx.exec:\7xlfxxx.exe47⤵
- Executes dropped EXE
PID:1604 -
\??\c:\ddddv.exec:\ddddv.exe48⤵
- Executes dropped EXE
PID:2232 -
\??\c:\66888.exec:\66888.exe49⤵
- Executes dropped EXE
PID:3452 -
\??\c:\8422282.exec:\8422282.exe50⤵
- Executes dropped EXE
PID:4744 -
\??\c:\82266.exec:\82266.exe51⤵
- Executes dropped EXE
PID:2660 -
\??\c:\5tbntt.exec:\5tbntt.exe52⤵
- Executes dropped EXE
PID:5084 -
\??\c:\thbthh.exec:\thbthh.exe53⤵
- Executes dropped EXE
PID:3112 -
\??\c:\486666.exec:\486666.exe54⤵
- Executes dropped EXE
PID:2312 -
\??\c:\e46044.exec:\e46044.exe55⤵
- Executes dropped EXE
PID:2728 -
\??\c:\62826.exec:\62826.exe56⤵
- Executes dropped EXE
PID:1828 -
\??\c:\8200000.exec:\8200000.exe57⤵
- Executes dropped EXE
PID:1240 -
\??\c:\nnnnhh.exec:\nnnnhh.exe58⤵
- Executes dropped EXE
PID:3416 -
\??\c:\9xfxxxr.exec:\9xfxxxr.exe59⤵
- Executes dropped EXE
PID:1144 -
\??\c:\3rxxrxr.exec:\3rxxrxr.exe60⤵
- Executes dropped EXE
PID:4040 -
\??\c:\880044.exec:\880044.exe61⤵
- Executes dropped EXE
PID:4100 -
\??\c:\dvjjv.exec:\dvjjv.exe62⤵
- Executes dropped EXE
PID:2472 -
\??\c:\m4420.exec:\m4420.exe63⤵
- Executes dropped EXE
PID:4636 -
\??\c:\lflfxrl.exec:\lflfxrl.exe64⤵
- Executes dropped EXE
PID:2736 -
\??\c:\22264.exec:\22264.exe65⤵
- Executes dropped EXE
PID:4088 -
\??\c:\hbhbhb.exec:\hbhbhb.exe66⤵PID:4780
-
\??\c:\3rlxrfx.exec:\3rlxrfx.exe67⤵PID:2040
-
\??\c:\ddpvd.exec:\ddpvd.exe68⤵PID:4320
-
\??\c:\tnhbnn.exec:\tnhbnn.exe69⤵PID:4032
-
\??\c:\k66082.exec:\k66082.exe70⤵PID:3236
-
\??\c:\26200.exec:\26200.exe71⤵PID:592
-
\??\c:\jvdvp.exec:\jvdvp.exe72⤵PID:1712
-
\??\c:\680400.exec:\680400.exe73⤵PID:4236
-
\??\c:\06820.exec:\06820.exe74⤵PID:2216
-
\??\c:\1ddvd.exec:\1ddvd.exe75⤵PID:1768
-
\??\c:\82040.exec:\82040.exe76⤵PID:5024
-
\??\c:\668862.exec:\668862.exe77⤵PID:4356
-
\??\c:\lrlfxfx.exec:\lrlfxfx.exe78⤵PID:3908
-
\??\c:\lxxrlff.exec:\lxxrlff.exe79⤵PID:536
-
\??\c:\pjdpj.exec:\pjdpj.exe80⤵PID:4600
-
\??\c:\vddjd.exec:\vddjd.exe81⤵PID:2076
-
\??\c:\bnnnhh.exec:\bnnnhh.exe82⤵PID:1340
-
\??\c:\2444448.exec:\2444448.exe83⤵PID:3572
-
\??\c:\xfxrlll.exec:\xfxrlll.exe84⤵PID:780
-
\??\c:\jpdvd.exec:\jpdvd.exe85⤵PID:464
-
\??\c:\q26200.exec:\q26200.exe86⤵PID:1232
-
\??\c:\jdddv.exec:\jdddv.exe87⤵PID:3172
-
\??\c:\8848688.exec:\8848688.exe88⤵PID:2408
-
\??\c:\3lxrrrx.exec:\3lxrrrx.exe89⤵PID:3664
-
\??\c:\46882.exec:\46882.exe90⤵PID:3456
-
\??\c:\9nbbtn.exec:\9nbbtn.exe91⤵PID:1584
-
\??\c:\htbtnn.exec:\htbtnn.exe92⤵PID:4556
-
\??\c:\0288682.exec:\0288682.exe93⤵PID:1536
-
\??\c:\00242.exec:\00242.exe94⤵PID:4240
-
\??\c:\jdvjv.exec:\jdvjv.exe95⤵PID:2352
-
\??\c:\2888488.exec:\2888488.exe96⤵PID:428
-
\??\c:\866204.exec:\866204.exe97⤵PID:4760
-
\??\c:\9hbbtt.exec:\9hbbtt.exe98⤵PID:2712
-
\??\c:\o442008.exec:\o442008.exe99⤵PID:4776
-
\??\c:\o408204.exec:\o408204.exe100⤵PID:5056
-
\??\c:\rrfrxfl.exec:\rrfrxfl.exe101⤵PID:992
-
\??\c:\00620.exec:\00620.exe102⤵PID:4900
-
\??\c:\406262.exec:\406262.exe103⤵PID:3476
-
\??\c:\m8604.exec:\m8604.exe104⤵PID:2732
-
\??\c:\xflfrxf.exec:\xflfrxf.exe105⤵PID:1028
-
\??\c:\xffxrrl.exec:\xffxrrl.exe106⤵PID:3704
-
\??\c:\68882.exec:\68882.exe107⤵PID:4200
-
\??\c:\a0044.exec:\a0044.exe108⤵PID:4396
-
\??\c:\u464428.exec:\u464428.exe109⤵PID:4636
-
\??\c:\vvpjd.exec:\vvpjd.exe110⤵PID:2376
-
\??\c:\5thbnt.exec:\5thbnt.exe111⤵PID:3660
-
\??\c:\5dddv.exec:\5dddv.exe112⤵PID:4780
-
\??\c:\lxxlxxl.exec:\lxxlxxl.exe113⤵PID:2040
-
\??\c:\8884804.exec:\8884804.exe114⤵PID:4320
-
\??\c:\rrxlxxf.exec:\rrxlxxf.exe115⤵PID:2464
-
\??\c:\288600.exec:\288600.exe116⤵PID:2672
-
\??\c:\frlfrlf.exec:\frlfrlf.exe117⤵PID:3260
-
\??\c:\nnttth.exec:\nnttth.exe118⤵PID:1068
-
\??\c:\tntbnb.exec:\tntbnb.exe119⤵PID:2616
-
\??\c:\tnnbtt.exec:\tnnbtt.exe120⤵PID:4972
-
\??\c:\4404606.exec:\4404606.exe121⤵PID:1920
-
\??\c:\dvvjd.exec:\dvvjd.exe122⤵PID:368
-
\??\c:\dvpjv.exec:\dvpjv.exe123⤵PID:3820
-
\??\c:\u826664.exec:\u826664.exe124⤵PID:1096
-
\??\c:\htttnn.exec:\htttnn.exe125⤵PID:788
-
\??\c:\60220.exec:\60220.exe126⤵PID:1136
-
\??\c:\tnhbnn.exec:\tnhbnn.exe127⤵PID:2896
-
\??\c:\fxfllff.exec:\fxfllff.exe128⤵PID:2164
-
\??\c:\48060.exec:\48060.exe129⤵PID:1844
-
\??\c:\84084.exec:\84084.exe130⤵PID:3468
-
\??\c:\8442888.exec:\8442888.exe131⤵PID:3240
-
\??\c:\406080.exec:\406080.exe132⤵PID:2096
-
\??\c:\lllfrrl.exec:\lllfrrl.exe133⤵PID:3980
-
\??\c:\8400666.exec:\8400666.exe134⤵PID:3224
-
\??\c:\dvddd.exec:\dvddd.exe135⤵PID:2756
-
\??\c:\8246006.exec:\8246006.exe136⤵PID:4528
-
\??\c:\pjjdv.exec:\pjjdv.exe137⤵PID:5060
-
\??\c:\8626062.exec:\8626062.exe138⤵PID:1604
-
\??\c:\djvvp.exec:\djvvp.exe139⤵PID:1536
-
\??\c:\262200.exec:\262200.exe140⤵PID:964
-
\??\c:\jvvdv.exec:\jvvdv.exe141⤵PID:5080
-
\??\c:\42482.exec:\42482.exe142⤵PID:2660
-
\??\c:\0406466.exec:\0406466.exe143⤵PID:4760
-
\??\c:\thnhbb.exec:\thnhbb.exe144⤵PID:1520
-
\??\c:\bhhbtt.exec:\bhhbtt.exe145⤵PID:4776
-
\??\c:\vdvpj.exec:\vdvpj.exe146⤵PID:4392
-
\??\c:\bnnhtt.exec:\bnnhtt.exe147⤵PID:992
-
\??\c:\rllfxrr.exec:\rllfxrr.exe148⤵PID:1240
-
\??\c:\7frrffl.exec:\7frrffl.exe149⤵PID:3476
-
\??\c:\nhttbh.exec:\nhttbh.exe150⤵PID:1444
-
\??\c:\2404044.exec:\2404044.exe151⤵PID:3652
-
\??\c:\fllfxrl.exec:\fllfxrl.exe152⤵PID:1744
-
\??\c:\7vdvp.exec:\7vdvp.exe153⤵PID:4200
-
\??\c:\268868.exec:\268868.exe154⤵PID:4364
-
\??\c:\bhnnhh.exec:\bhnnhh.exe155⤵PID:1772
-
\??\c:\2028624.exec:\2028624.exe156⤵PID:2288
-
\??\c:\e66822.exec:\e66822.exe157⤵PID:3564
-
\??\c:\828224.exec:\828224.exe158⤵PID:1384
-
\??\c:\48444.exec:\48444.exe159⤵PID:3024
-
\??\c:\5vjpp.exec:\5vjpp.exe160⤵PID:3520
-
\??\c:\9djdp.exec:\9djdp.exe161⤵PID:3084
-
\??\c:\440666.exec:\440666.exe162⤵PID:5016
-
\??\c:\btnnnn.exec:\btnnnn.exe163⤵PID:4904
-
\??\c:\rlrxllf.exec:\rlrxllf.exe164⤵PID:3872
-
\??\c:\9hnnhn.exec:\9hnnhn.exe165⤵PID:856
-
\??\c:\nbbhbb.exec:\nbbhbb.exe166⤵PID:4872
-
\??\c:\s6840.exec:\s6840.exe167⤵PID:4504
-
\??\c:\llrfrrl.exec:\llrfrrl.exe168⤵PID:4516
-
\??\c:\pjvpj.exec:\pjvpj.exe169⤵PID:4452
-
\??\c:\7vjjp.exec:\7vjjp.exe170⤵PID:2880
-
\??\c:\00044.exec:\00044.exe171⤵PID:5072
-
\??\c:\0048488.exec:\0048488.exe172⤵PID:4664
-
\??\c:\nhbnbt.exec:\nhbnbt.exe173⤵PID:3656
-
\??\c:\3frrllr.exec:\3frrllr.exe174⤵PID:2648
-
\??\c:\xrxrrrr.exec:\xrxrrrr.exe175⤵PID:3740
-
\??\c:\bnnhbn.exec:\bnnhbn.exe176⤵PID:1396
-
\??\c:\o404888.exec:\o404888.exe177⤵PID:3720
-
\??\c:\jjpjd.exec:\jjpjd.exe178⤵PID:2304
-
\??\c:\84000.exec:\84000.exe179⤵PID:4528
-
\??\c:\rxlfrrx.exec:\rxlfrrx.exe180⤵PID:2524
-
\??\c:\9ffxrrl.exec:\9ffxrrl.exe181⤵PID:1604
-
\??\c:\jdjdj.exec:\jdjdj.exe182⤵PID:1288
-
\??\c:\8000448.exec:\8000448.exe183⤵PID:656
-
\??\c:\vvddv.exec:\vvddv.exe184⤵PID:3644
-
\??\c:\htthtt.exec:\htthtt.exe185⤵PID:2712
-
\??\c:\4042662.exec:\4042662.exe186⤵PID:4760
-
\??\c:\8244440.exec:\8244440.exe187⤵PID:1520
-
\??\c:\280044.exec:\280044.exe188⤵PID:2884
-
\??\c:\1bhhbn.exec:\1bhhbn.exe189⤵PID:4948
-
\??\c:\k22046.exec:\k22046.exe190⤵PID:4900
-
\??\c:\fxxrlff.exec:\fxxrlff.exe191⤵PID:2256
-
\??\c:\tnnbtt.exec:\tnnbtt.exe192⤵PID:2732
-
\??\c:\flrlfff.exec:\flrlfff.exe193⤵PID:3704
-
\??\c:\0400000.exec:\0400000.exe194⤵PID:1524
-
\??\c:\440048.exec:\440048.exe195⤵PID:768
-
\??\c:\hhtbtt.exec:\hhtbtt.exe196⤵PID:3132
-
\??\c:\3nbthh.exec:\3nbthh.exe197⤵PID:848
-
\??\c:\8462666.exec:\8462666.exe198⤵PID:2056
-
\??\c:\88246.exec:\88246.exe199⤵PID:3444
-
\??\c:\dpvpv.exec:\dpvpv.exe200⤵PID:8
-
\??\c:\0688666.exec:\0688666.exe201⤵PID:4236
-
\??\c:\5nnhnn.exec:\5nnhnn.exe202⤵PID:4692
-
\??\c:\86600.exec:\86600.exe203⤵PID:4440
-
\??\c:\frflffx.exec:\frflffx.exe204⤵PID:2476
-
\??\c:\866048.exec:\866048.exe205⤵PID:368
-
\??\c:\4204440.exec:\4204440.exe206⤵PID:1096
-
\??\c:\ffxrrll.exec:\ffxrrll.exe207⤵PID:4456
-
\??\c:\nhhnnb.exec:\nhhnnb.exe208⤵PID:3528
-
\??\c:\444482.exec:\444482.exe209⤵PID:1588
-
\??\c:\7pvpd.exec:\7pvpd.exe210⤵PID:4576
-
\??\c:\vjdvj.exec:\vjdvj.exe211⤵PID:3172
-
\??\c:\m4042.exec:\m4042.exe212⤵PID:3740
-
\??\c:\62826.exec:\62826.exe213⤵PID:2756
-
\??\c:\0846648.exec:\0846648.exe214⤵PID:3720
-
\??\c:\208222.exec:\208222.exe215⤵PID:2944
-
\??\c:\28024.exec:\28024.exe216⤵PID:4528
-
\??\c:\1btntn.exec:\1btntn.exe217⤵PID:2524
-
\??\c:\jppjv.exec:\jppjv.exe218⤵PID:1604
-
\??\c:\ppdvj.exec:\ppdvj.exe219⤵PID:1516
-
\??\c:\022046.exec:\022046.exe220⤵PID:1940
-
\??\c:\20648.exec:\20648.exe221⤵PID:1964
-
\??\c:\dvvpj.exec:\dvvpj.exe222⤵PID:3344
-
\??\c:\s2228.exec:\s2228.exe223⤵PID:752
-
\??\c:\xffrllf.exec:\xffrllf.exe224⤵PID:1520
-
\??\c:\4286260.exec:\4286260.exe225⤵PID:2884
-
\??\c:\vvdjv.exec:\vvdjv.exe226⤵PID:3100
-
\??\c:\86048.exec:\86048.exe227⤵PID:1608
-
\??\c:\vjjdv.exec:\vjjdv.exe228⤵PID:1848
-
\??\c:\62848.exec:\62848.exe229⤵PID:3652
-
\??\c:\6804222.exec:\6804222.exe230⤵PID:1744
-
\??\c:\q62260.exec:\q62260.exe231⤵PID:984
-
\??\c:\pjddv.exec:\pjddv.exe232⤵PID:1772
-
\??\c:\bbbhbb.exec:\bbbhbb.exe233⤵PID:1160
-
\??\c:\dpvpd.exec:\dpvpd.exe234⤵PID:3580
-
\??\c:\thhbnh.exec:\thhbnh.exe235⤵PID:2672
-
\??\c:\xrrrfll.exec:\xrrrfll.exe236⤵PID:1236
-
\??\c:\20660.exec:\20660.exe237⤵PID:2616
-
\??\c:\64262.exec:\64262.exe238⤵PID:4692
-
\??\c:\624882.exec:\624882.exe239⤵PID:3908
-
\??\c:\6682228.exec:\6682228.exe240⤵PID:3820
-
\??\c:\8208608.exec:\8208608.exe241⤵PID:2896
-