Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 10:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
General
-
Target
334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe
-
Size
54KB
-
MD5
149492700fbf4e3143a21e08136b0050
-
SHA1
58fb980f99257a95a934688796049b2b10a4650f
-
SHA256
334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe
-
SHA512
d97a07f808358b0b985f8b6b284ebdaece16002724808af379d7434709faf4f8ff870e88b10da7614a8f710aae70e004864d61dd57152aa16b147d3c8aba4705
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIFM:ymb3NkkiQ3mdBjFIFM
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral1/memory/1192-7-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1192-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2040-20-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2312-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2780-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2756-82-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2756-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2764-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2620-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2328-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1792-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1952-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-155-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/284-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1080-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1532-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/296-217-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2736-227-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2796-235-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1824-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2004-299-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
pjvdp.exelfxfrrf.exenbtthh.exepjdjp.exepjdpv.exellxflrx.exenhttbb.exeddjjj.exedpvvj.exelxffrxf.exenhnthh.exejjppd.exe3vjjj.exerrflxfr.exefrllrrr.exehbtthh.exe1nbbnt.exevvjjj.exexlfrxfl.exexxlrxff.exebtthnt.exennbbnt.exe5jjjp.exejdppj.exelffxlrf.exehbthnb.exennnntb.exe3pjjj.exepdvdd.exeflxxflr.exetntbtt.exetnbhtb.exedvjjj.exelxrxxxl.exe9ffflrf.exennhhtb.exejjvdp.exejjdjp.exevpddj.exe3fxlxfl.exe7rflrrr.exe1tbhtn.exehhhhht.exe5pvdd.exepjjjv.exe7lrxllf.exe1xxfxxl.exefflflrf.exebbhhhb.exenhntbt.exejdvvv.exedvpjp.exepjpvd.exerlllflx.exerlxxrrl.exe5nhbbt.exethhbhn.exevpjjv.exedvddp.exe1vpjj.exelfrrrxl.exetnnnnn.exe1tnbnt.exe1nhtth.exepid process 2040 pjvdp.exe 2312 lfxfrrf.exe 2780 nbtthh.exe 2644 pjdjp.exe 2696 pjdpv.exe 2816 llxflrx.exe 2756 nhttbb.exe 2764 ddjjj.exe 2620 dpvvj.exe 2328 lxffrxf.exe 1792 nhnthh.exe 1952 jjppd.exe 2044 3vjjj.exe 2024 rrflxfr.exe 2216 frllrrr.exe 2460 hbtthh.exe 680 1nbbnt.exe 284 vvjjj.exe 1080 xlfrxfl.exe 1532 xxlrxff.exe 1616 btthnt.exe 296 nnbbnt.exe 2736 5jjjp.exe 2796 jdppj.exe 884 lffxlrf.exe 1824 hbthnb.exe 1640 nnnntb.exe 3044 3pjjj.exe 1304 pdvdd.exe 584 flxxflr.exe 2004 tntbtt.exe 2064 tnbhtb.exe 2464 dvjjj.exe 1700 lxrxxxl.exe 1220 9ffflrf.exe 2880 nnhhtb.exe 2920 jjvdp.exe 3004 jjdjp.exe 2648 vpddj.exe 2652 3fxlxfl.exe 2596 7rflrrr.exe 2636 1tbhtn.exe 2500 hhhhht.exe 2672 5pvdd.exe 2568 pjjjv.exe 2180 7lrxllf.exe 1960 1xxfxxl.exe 1288 fflflrf.exe 2220 bbhhhb.exe 2160 nhntbt.exe 1732 jdvvv.exe 2428 dvpjp.exe 2416 pjpvd.exe 304 rlllflx.exe 1500 rlxxrrl.exe 1896 5nhbbt.exe 2468 thhbhn.exe 1080 vpjjv.exe 624 dvddp.exe 2484 1vpjj.exe 1136 lfrrrxl.exe 1180 tnnnnn.exe 2736 1tnbnt.exe 2796 1nhtth.exe -
Processes:
resource yara_rule behavioral1/memory/1192-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2040-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2312-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2780-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2764-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2620-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2328-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1792-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1952-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-155-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/284-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1080-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1532-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/296-217-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2736-227-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2796-235-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1824-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2004-299-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exepjvdp.exelfxfrrf.exenbtthh.exepjdjp.exepjdpv.exellxflrx.exenhttbb.exeddjjj.exedpvvj.exelxffrxf.exenhnthh.exejjppd.exe3vjjj.exerrflxfr.exefrllrrr.exedescription pid process target process PID 1192 wrote to memory of 2040 1192 334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe pjvdp.exe PID 1192 wrote to memory of 2040 1192 334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe pjvdp.exe PID 1192 wrote to memory of 2040 1192 334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe pjvdp.exe PID 1192 wrote to memory of 2040 1192 334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe pjvdp.exe PID 2040 wrote to memory of 2312 2040 pjvdp.exe lfxfrrf.exe PID 2040 wrote to memory of 2312 2040 pjvdp.exe lfxfrrf.exe PID 2040 wrote to memory of 2312 2040 pjvdp.exe lfxfrrf.exe PID 2040 wrote to memory of 2312 2040 pjvdp.exe lfxfrrf.exe PID 2312 wrote to memory of 2780 2312 lfxfrrf.exe nbtthh.exe PID 2312 wrote to memory of 2780 2312 lfxfrrf.exe nbtthh.exe PID 2312 wrote to memory of 2780 2312 lfxfrrf.exe nbtthh.exe PID 2312 wrote to memory of 2780 2312 lfxfrrf.exe nbtthh.exe PID 2780 wrote to memory of 2644 2780 nbtthh.exe pjdjp.exe PID 2780 wrote to memory of 2644 2780 nbtthh.exe pjdjp.exe PID 2780 wrote to memory of 2644 2780 nbtthh.exe pjdjp.exe PID 2780 wrote to memory of 2644 2780 nbtthh.exe pjdjp.exe PID 2644 wrote to memory of 2696 2644 pjdjp.exe pjdpv.exe PID 2644 wrote to memory of 2696 2644 pjdjp.exe pjdpv.exe PID 2644 wrote to memory of 2696 2644 pjdjp.exe pjdpv.exe PID 2644 wrote to memory of 2696 2644 pjdjp.exe pjdpv.exe PID 2696 wrote to memory of 2816 2696 pjdpv.exe llxflrx.exe PID 2696 wrote to memory of 2816 2696 pjdpv.exe llxflrx.exe PID 2696 wrote to memory of 2816 2696 pjdpv.exe llxflrx.exe PID 2696 wrote to memory of 2816 2696 pjdpv.exe llxflrx.exe PID 2816 wrote to memory of 2756 2816 llxflrx.exe nhttbb.exe PID 2816 wrote to memory of 2756 2816 llxflrx.exe nhttbb.exe PID 2816 wrote to memory of 2756 2816 llxflrx.exe nhttbb.exe PID 2816 wrote to memory of 2756 2816 llxflrx.exe nhttbb.exe PID 2756 wrote to memory of 2764 2756 nhttbb.exe ddjjj.exe PID 2756 wrote to memory of 2764 2756 nhttbb.exe ddjjj.exe PID 2756 wrote to memory of 2764 2756 nhttbb.exe ddjjj.exe PID 2756 wrote to memory of 2764 2756 nhttbb.exe ddjjj.exe PID 2764 wrote to memory of 2620 2764 ddjjj.exe dpvvj.exe PID 2764 wrote to memory of 2620 2764 ddjjj.exe dpvvj.exe PID 2764 wrote to memory of 2620 2764 ddjjj.exe dpvvj.exe PID 2764 wrote to memory of 2620 2764 ddjjj.exe dpvvj.exe PID 2620 wrote to memory of 2328 2620 dpvvj.exe lxffrxf.exe PID 2620 wrote to memory of 2328 2620 dpvvj.exe lxffrxf.exe PID 2620 wrote to memory of 2328 2620 dpvvj.exe lxffrxf.exe PID 2620 wrote to memory of 2328 2620 dpvvj.exe lxffrxf.exe PID 2328 wrote to memory of 1792 2328 lxffrxf.exe nhnthh.exe PID 2328 wrote to memory of 1792 2328 lxffrxf.exe nhnthh.exe PID 2328 wrote to memory of 1792 2328 lxffrxf.exe nhnthh.exe PID 2328 wrote to memory of 1792 2328 lxffrxf.exe nhnthh.exe PID 1792 wrote to memory of 1952 1792 nhnthh.exe jjppd.exe PID 1792 wrote to memory of 1952 1792 nhnthh.exe jjppd.exe PID 1792 wrote to memory of 1952 1792 nhnthh.exe jjppd.exe PID 1792 wrote to memory of 1952 1792 nhnthh.exe jjppd.exe PID 1952 wrote to memory of 2044 1952 jjppd.exe 3vjjj.exe PID 1952 wrote to memory of 2044 1952 jjppd.exe 3vjjj.exe PID 1952 wrote to memory of 2044 1952 jjppd.exe 3vjjj.exe PID 1952 wrote to memory of 2044 1952 jjppd.exe 3vjjj.exe PID 2044 wrote to memory of 2024 2044 3vjjj.exe rrflxfr.exe PID 2044 wrote to memory of 2024 2044 3vjjj.exe rrflxfr.exe PID 2044 wrote to memory of 2024 2044 3vjjj.exe rrflxfr.exe PID 2044 wrote to memory of 2024 2044 3vjjj.exe rrflxfr.exe PID 2024 wrote to memory of 2216 2024 rrflxfr.exe frllrrr.exe PID 2024 wrote to memory of 2216 2024 rrflxfr.exe frllrrr.exe PID 2024 wrote to memory of 2216 2024 rrflxfr.exe frllrrr.exe PID 2024 wrote to memory of 2216 2024 rrflxfr.exe frllrrr.exe PID 2216 wrote to memory of 2460 2216 frllrrr.exe hbtthh.exe PID 2216 wrote to memory of 2460 2216 frllrrr.exe hbtthh.exe PID 2216 wrote to memory of 2460 2216 frllrrr.exe hbtthh.exe PID 2216 wrote to memory of 2460 2216 frllrrr.exe hbtthh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\334a0d91274e5f9970460c5c7da9c4802d388610e1d14ec685d475d586ed66fe_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\pjvdp.exec:\pjvdp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfxfrrf.exec:\lfxfrrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbtthh.exec:\nbtthh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjdjp.exec:\pjdjp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjdpv.exec:\pjdpv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\llxflrx.exec:\llxflrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhttbb.exec:\nhttbb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddjjj.exec:\ddjjj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpvvj.exec:\dpvvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxffrxf.exec:\lxffrxf.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhnthh.exec:\nhnthh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjppd.exec:\jjppd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3vjjj.exec:\3vjjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrflxfr.exec:\rrflxfr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frllrrr.exec:\frllrrr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbtthh.exec:\hbtthh.exe17⤵
- Executes dropped EXE
-
\??\c:\1nbbnt.exec:\1nbbnt.exe18⤵
- Executes dropped EXE
-
\??\c:\vvjjj.exec:\vvjjj.exe19⤵
- Executes dropped EXE
-
\??\c:\xlfrxfl.exec:\xlfrxfl.exe20⤵
- Executes dropped EXE
-
\??\c:\xxlrxff.exec:\xxlrxff.exe21⤵
- Executes dropped EXE
-
\??\c:\btthnt.exec:\btthnt.exe22⤵
- Executes dropped EXE
-
\??\c:\nnbbnt.exec:\nnbbnt.exe23⤵
- Executes dropped EXE
-
\??\c:\5jjjp.exec:\5jjjp.exe24⤵
- Executes dropped EXE
-
\??\c:\jdppj.exec:\jdppj.exe25⤵
- Executes dropped EXE
-
\??\c:\lffxlrf.exec:\lffxlrf.exe26⤵
- Executes dropped EXE
-
\??\c:\hbthnb.exec:\hbthnb.exe27⤵
- Executes dropped EXE
-
\??\c:\nnnntb.exec:\nnnntb.exe28⤵
- Executes dropped EXE
-
\??\c:\3pjjj.exec:\3pjjj.exe29⤵
- Executes dropped EXE
-
\??\c:\pdvdd.exec:\pdvdd.exe30⤵
- Executes dropped EXE
-
\??\c:\flxxflr.exec:\flxxflr.exe31⤵
- Executes dropped EXE
-
\??\c:\tntbtt.exec:\tntbtt.exe32⤵
- Executes dropped EXE
-
\??\c:\tnbhtb.exec:\tnbhtb.exe33⤵
- Executes dropped EXE
-
\??\c:\dvjjj.exec:\dvjjj.exe34⤵
- Executes dropped EXE
-
\??\c:\jdpvd.exec:\jdpvd.exe35⤵
-
\??\c:\lxrxxxl.exec:\lxrxxxl.exe36⤵
- Executes dropped EXE
-
\??\c:\9ffflrf.exec:\9ffflrf.exe37⤵
- Executes dropped EXE
-
\??\c:\nnhhtb.exec:\nnhhtb.exe38⤵
- Executes dropped EXE
-
\??\c:\jjvdp.exec:\jjvdp.exe39⤵
- Executes dropped EXE
-
\??\c:\jjdjp.exec:\jjdjp.exe40⤵
- Executes dropped EXE
-
\??\c:\vpddj.exec:\vpddj.exe41⤵
- Executes dropped EXE
-
\??\c:\3fxlxfl.exec:\3fxlxfl.exe42⤵
- Executes dropped EXE
-
\??\c:\7rflrrr.exec:\7rflrrr.exe43⤵
- Executes dropped EXE
-
\??\c:\1tbhtn.exec:\1tbhtn.exe44⤵
- Executes dropped EXE
-
\??\c:\hhhhht.exec:\hhhhht.exe45⤵
- Executes dropped EXE
-
\??\c:\5pvdd.exec:\5pvdd.exe46⤵
- Executes dropped EXE
-
\??\c:\pjjjv.exec:\pjjjv.exe47⤵
- Executes dropped EXE
-
\??\c:\7lrxllf.exec:\7lrxllf.exe48⤵
- Executes dropped EXE
-
\??\c:\1xxfxxl.exec:\1xxfxxl.exe49⤵
- Executes dropped EXE
-
\??\c:\fflflrf.exec:\fflflrf.exe50⤵
- Executes dropped EXE
-
\??\c:\bbhhhb.exec:\bbhhhb.exe51⤵
- Executes dropped EXE
-
\??\c:\nhntbt.exec:\nhntbt.exe52⤵
- Executes dropped EXE
-
\??\c:\jdvvv.exec:\jdvvv.exe53⤵
- Executes dropped EXE
-
\??\c:\dvpjp.exec:\dvpjp.exe54⤵
- Executes dropped EXE
-
\??\c:\pjpvd.exec:\pjpvd.exe55⤵
- Executes dropped EXE
-
\??\c:\rlllflx.exec:\rlllflx.exe56⤵
- Executes dropped EXE
-
\??\c:\rlxxrrl.exec:\rlxxrrl.exe57⤵
- Executes dropped EXE
-
\??\c:\5nhbbt.exec:\5nhbbt.exe58⤵
- Executes dropped EXE
-
\??\c:\thhbhn.exec:\thhbhn.exe59⤵
- Executes dropped EXE
-
\??\c:\vpjjv.exec:\vpjjv.exe60⤵
- Executes dropped EXE
-
\??\c:\dvddp.exec:\dvddp.exe61⤵
- Executes dropped EXE
-
\??\c:\1vpjj.exec:\1vpjj.exe62⤵
- Executes dropped EXE
-
\??\c:\lfrrrxl.exec:\lfrrrxl.exe63⤵
- Executes dropped EXE
-
\??\c:\tnnnnn.exec:\tnnnnn.exe64⤵
- Executes dropped EXE
-
\??\c:\1tnbnt.exec:\1tnbnt.exe65⤵
- Executes dropped EXE
-
\??\c:\1nhtth.exec:\1nhtth.exe66⤵
- Executes dropped EXE
-
\??\c:\pjddv.exec:\pjddv.exe67⤵
-
\??\c:\1rlrrxf.exec:\1rlrrxf.exe68⤵
-
\??\c:\9lflrxf.exec:\9lflrxf.exe69⤵
-
\??\c:\xlrrrrx.exec:\xlrrrrx.exe70⤵
-
\??\c:\hhbtnb.exec:\hhbtnb.exe71⤵
-
\??\c:\thhhhh.exec:\thhhhh.exe72⤵
-
\??\c:\9jddj.exec:\9jddj.exe73⤵
-
\??\c:\dvvvd.exec:\dvvvd.exe74⤵
-
\??\c:\1fffflr.exec:\1fffflr.exe75⤵
-
\??\c:\lxrlllr.exec:\lxrlllr.exe76⤵
-
\??\c:\thttbb.exec:\thttbb.exe77⤵
-
\??\c:\5hntht.exec:\5hntht.exe78⤵
-
\??\c:\5nhhhb.exec:\5nhhhb.exe79⤵
-
\??\c:\vvdjp.exec:\vvdjp.exe80⤵
-
\??\c:\1vjpv.exec:\1vjpv.exe81⤵
-
\??\c:\rllxlfl.exec:\rllxlfl.exe82⤵
-
\??\c:\xxrrxxf.exec:\xxrrxxf.exe83⤵
-
\??\c:\nbtbnn.exec:\nbtbnn.exe84⤵
-
\??\c:\5ththn.exec:\5ththn.exe85⤵
-
\??\c:\7djdj.exec:\7djdj.exe86⤵
-
\??\c:\pjddj.exec:\pjddj.exe87⤵
-
\??\c:\3rflrrx.exec:\3rflrrx.exe88⤵
-
\??\c:\3rxlxxl.exec:\3rxlxxl.exe89⤵
-
\??\c:\hbhhbb.exec:\hbhhbb.exe90⤵
-
\??\c:\7hbhnt.exec:\7hbhnt.exe91⤵
-
\??\c:\jjvdd.exec:\jjvdd.exe92⤵
-
\??\c:\dvpvv.exec:\dvpvv.exe93⤵
-
\??\c:\xlxlrrx.exec:\xlxlrrx.exe94⤵
-
\??\c:\3lfrlxl.exec:\3lfrlxl.exe95⤵
-
\??\c:\ththnb.exec:\ththnb.exe96⤵
-
\??\c:\hnthbh.exec:\hnthbh.exe97⤵
-
\??\c:\jdvjj.exec:\jdvjj.exe98⤵
-
\??\c:\vvvvp.exec:\vvvvp.exe99⤵
-
\??\c:\lfxlllr.exec:\lfxlllr.exe100⤵
-
\??\c:\xrrxllf.exec:\xrrxllf.exe101⤵
-
\??\c:\bbbhtt.exec:\bbbhtt.exe102⤵
-
\??\c:\hhbbtt.exec:\hhbbtt.exe103⤵
-
\??\c:\jvjdd.exec:\jvjdd.exe104⤵
-
\??\c:\jjdvd.exec:\jjdvd.exe105⤵
-
\??\c:\lfrrrxf.exec:\lfrrrxf.exe106⤵
-
\??\c:\rlxlrrf.exec:\rlxlrrf.exe107⤵
-
\??\c:\lfrfflr.exec:\lfrfflr.exe108⤵
-
\??\c:\tnhhtb.exec:\tnhhtb.exe109⤵
-
\??\c:\vvdpd.exec:\vvdpd.exe110⤵
-
\??\c:\vvvdp.exec:\vvvdp.exe111⤵
-
\??\c:\vpvvd.exec:\vpvvd.exe112⤵
-
\??\c:\lfflflx.exec:\lfflflx.exe113⤵
-
\??\c:\fffrxxl.exec:\fffrxxl.exe114⤵
-
\??\c:\btnhtb.exec:\btnhtb.exe115⤵
-
\??\c:\hbtbtt.exec:\hbtbtt.exe116⤵
-
\??\c:\1jvjp.exec:\1jvjp.exe117⤵
-
\??\c:\pppdd.exec:\pppdd.exe118⤵
-
\??\c:\rfxxrrx.exec:\rfxxrrx.exe119⤵
-
\??\c:\1lfllxl.exec:\1lfllxl.exe120⤵
-
\??\c:\fxlrfxl.exec:\fxlrfxl.exe121⤵
-
\??\c:\btttnt.exec:\btttnt.exe122⤵
-
\??\c:\ttbhth.exec:\ttbhth.exe123⤵
-
\??\c:\vpjjp.exec:\vpjjp.exe124⤵
-
\??\c:\dvdjv.exec:\dvdjv.exe125⤵
-
\??\c:\3fxxflx.exec:\3fxxflx.exe126⤵
-
\??\c:\9flrfxf.exec:\9flrfxf.exe127⤵
-
\??\c:\bbtbnn.exec:\bbtbnn.exe128⤵
-
\??\c:\nhbhnt.exec:\nhbhnt.exe129⤵
-
\??\c:\pjjpp.exec:\pjjpp.exe130⤵
-
\??\c:\vjvpp.exec:\vjvpp.exe131⤵
-
\??\c:\jdvpd.exec:\jdvpd.exe132⤵
-
\??\c:\rlxxxxf.exec:\rlxxxxf.exe133⤵
-
\??\c:\hthnbb.exec:\hthnbb.exe134⤵
-
\??\c:\dvjjd.exec:\dvjjd.exe135⤵
-
\??\c:\vjdjj.exec:\vjdjj.exe136⤵
-
\??\c:\9vjjp.exec:\9vjjp.exe137⤵
-
\??\c:\rfrrrrr.exec:\rfrrrrr.exe138⤵
-
\??\c:\fxrrffr.exec:\fxrrffr.exe139⤵
-
\??\c:\bthnnn.exec:\bthnnn.exe140⤵
-
\??\c:\tnhhnt.exec:\tnhhnt.exe141⤵
-
\??\c:\ddjpv.exec:\ddjpv.exe142⤵
-
\??\c:\pjdjv.exec:\pjdjv.exe143⤵
-
\??\c:\rlxlrxf.exec:\rlxlrxf.exe144⤵
-
\??\c:\rlxflfr.exec:\rlxflfr.exe145⤵
-
\??\c:\1bthbh.exec:\1bthbh.exe146⤵
-
\??\c:\bbnnbt.exec:\bbnnbt.exe147⤵
-
\??\c:\hbttbb.exec:\hbttbb.exe148⤵
-
\??\c:\pdjjj.exec:\pdjjj.exe149⤵
-
\??\c:\pdjpp.exec:\pdjpp.exe150⤵
-
\??\c:\jvjdd.exec:\jvjdd.exe151⤵
-
\??\c:\xrlrrrx.exec:\xrlrrrx.exe152⤵
-
\??\c:\fxllxxl.exec:\fxllxxl.exe153⤵
-
\??\c:\nhthnn.exec:\nhthnn.exe154⤵
-
\??\c:\nhhnnn.exec:\nhhnnn.exe155⤵
-
\??\c:\pjppp.exec:\pjppp.exe156⤵
-
\??\c:\dpddj.exec:\dpddj.exe157⤵
-
\??\c:\1pjjp.exec:\1pjjp.exe158⤵
-
\??\c:\lxllrrx.exec:\lxllrrx.exe159⤵
-
\??\c:\3rfxlrx.exec:\3rfxlrx.exe160⤵
-
\??\c:\tntbhh.exec:\tntbhh.exe161⤵
-
\??\c:\bnbbnn.exec:\bnbbnn.exe162⤵
-
\??\c:\jdvdd.exec:\jdvdd.exe163⤵
-
\??\c:\djddd.exec:\djddd.exe164⤵
-
\??\c:\lfrrrrx.exec:\lfrrrrx.exe165⤵
-
\??\c:\fxlxfff.exec:\fxlxfff.exe166⤵
-
\??\c:\rfrxflr.exec:\rfrxflr.exe167⤵
-
\??\c:\5nnbhn.exec:\5nnbhn.exe168⤵
-
\??\c:\hbnthn.exec:\hbnthn.exe169⤵
-
\??\c:\pjvdd.exec:\pjvdd.exe170⤵
-
\??\c:\vppdj.exec:\vppdj.exe171⤵
-
\??\c:\1rxxrlf.exec:\1rxxrlf.exe172⤵
-
\??\c:\9xfrlrl.exec:\9xfrlrl.exe173⤵
-
\??\c:\btbbbt.exec:\btbbbt.exe174⤵
-
\??\c:\5nhbnn.exec:\5nhbnn.exe175⤵
-
\??\c:\nhnttb.exec:\nhnttb.exe176⤵
-
\??\c:\vpddj.exec:\vpddj.exe177⤵
-
\??\c:\3pjdp.exec:\3pjdp.exe178⤵
-
\??\c:\lfrrrxf.exec:\lfrrrxf.exe179⤵
-
\??\c:\frfxlfl.exec:\frfxlfl.exe180⤵
-
\??\c:\7lxxlrf.exec:\7lxxlrf.exe181⤵
-
\??\c:\bnhttn.exec:\bnhttn.exe182⤵
-
\??\c:\tnbtbb.exec:\tnbtbb.exe183⤵
-
\??\c:\pdpvd.exec:\pdpvd.exe184⤵
-
\??\c:\dvjjp.exec:\dvjjp.exe185⤵
-
\??\c:\dpvvv.exec:\dpvvv.exe186⤵
-
\??\c:\rfrrffr.exec:\rfrrffr.exe187⤵
-
\??\c:\3lfflll.exec:\3lfflll.exe188⤵
-
\??\c:\5thbnh.exec:\5thbnh.exe189⤵
-
\??\c:\bttttb.exec:\bttttb.exe190⤵
-
\??\c:\7pvvv.exec:\7pvvv.exe191⤵
-
\??\c:\9vpjj.exec:\9vpjj.exe192⤵
-
\??\c:\5jvvp.exec:\5jvvp.exe193⤵
-
\??\c:\5rxxfxx.exec:\5rxxfxx.exe194⤵
-
\??\c:\rlxxfll.exec:\rlxxfll.exe195⤵
-
\??\c:\btnhbt.exec:\btnhbt.exe196⤵
-
\??\c:\1bttnn.exec:\1bttnn.exe197⤵
-
\??\c:\dpvpv.exec:\dpvpv.exe198⤵
-
\??\c:\5jpjj.exec:\5jpjj.exe199⤵
-
\??\c:\jvjdj.exec:\jvjdj.exe200⤵
-
\??\c:\xrfrrxf.exec:\xrfrrxf.exe201⤵
-
\??\c:\lxxffll.exec:\lxxffll.exe202⤵
-
\??\c:\nhntbh.exec:\nhntbh.exe203⤵
-
\??\c:\hthbhh.exec:\hthbhh.exe204⤵
-
\??\c:\nhbhnt.exec:\nhbhnt.exe205⤵
-
\??\c:\jvjdd.exec:\jvjdd.exe206⤵
-
\??\c:\dvdjj.exec:\dvdjj.exe207⤵
-
\??\c:\rfrrrxf.exec:\rfrrrxf.exe208⤵
-
\??\c:\5lflrll.exec:\5lflrll.exe209⤵
-
\??\c:\rlrfffr.exec:\rlrfffr.exe210⤵
-
\??\c:\9bbbhh.exec:\9bbbhh.exe211⤵
-
\??\c:\7thttb.exec:\7thttb.exe212⤵
-
\??\c:\dpvdv.exec:\dpvdv.exe213⤵
-
\??\c:\pdppp.exec:\pdppp.exe214⤵
-
\??\c:\lxlxxrr.exec:\lxlxxrr.exe215⤵
-
\??\c:\fxlrllr.exec:\fxlrllr.exe216⤵
-
\??\c:\5htnnn.exec:\5htnnn.exe217⤵
-
\??\c:\7ttttt.exec:\7ttttt.exe218⤵
-
\??\c:\tnbbbb.exec:\tnbbbb.exe219⤵
-
\??\c:\9jjjp.exec:\9jjjp.exe220⤵
-
\??\c:\vjvpp.exec:\vjvpp.exe221⤵
-
\??\c:\frfffxr.exec:\frfffxr.exe222⤵
-
\??\c:\7frrrxx.exec:\7frrrxx.exe223⤵
-
\??\c:\htbhnh.exec:\htbhnh.exe224⤵
-
\??\c:\5ttbbb.exec:\5ttbbb.exe225⤵
-
\??\c:\dpvvv.exec:\dpvvv.exe226⤵
-
\??\c:\djvvj.exec:\djvvj.exe227⤵
-
\??\c:\pdppv.exec:\pdppv.exe228⤵
-
\??\c:\rfxxfxf.exec:\rfxxfxf.exe229⤵
-
\??\c:\nhnnnn.exec:\nhnnnn.exe230⤵
-
\??\c:\pdjvv.exec:\pdjvv.exe231⤵
-
\??\c:\5jvpd.exec:\5jvpd.exe232⤵
-
\??\c:\3vvpj.exec:\3vvpj.exe233⤵
-
\??\c:\7rrrxrx.exec:\7rrrxrx.exe234⤵
-
\??\c:\frlflll.exec:\frlflll.exe235⤵
-
\??\c:\nbbttn.exec:\nbbttn.exe236⤵
-
\??\c:\tnntbt.exec:\tnntbt.exe237⤵
-
\??\c:\vppjp.exec:\vppjp.exe238⤵
-
\??\c:\pdpvv.exec:\pdpvv.exe239⤵
-
\??\c:\vjdjp.exec:\vjdjp.exe240⤵
-
\??\c:\rxrllrr.exec:\rxrllrr.exe241⤵