Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 12:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
4cf292b0df810581c0863705d8f9d0a4ef13b08ca456578327033acef1028eb1_NeikiAnalytics.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
4cf292b0df810581c0863705d8f9d0a4ef13b08ca456578327033acef1028eb1_NeikiAnalytics.exe
-
Size
61KB
-
MD5
ca532b8560b6fea5ec26248d2e5bc8f0
-
SHA1
1b37ae385043044b487c41b61e9ef831613507de
-
SHA256
4cf292b0df810581c0863705d8f9d0a4ef13b08ca456578327033acef1028eb1
-
SHA512
76bd380f8d2e7abf0c0730718eb871da8be3a21cf711e52c82b3d20249e4e4295ba64ad6c19c9432cf519cf5cd420839a5cd46447af8f6043fcc399f3f1e4f9f
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIug6bV:ymb3NkkiQ3mdBjFIugW
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/3224-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3224-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4924-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/848-34-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3508-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/848-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/436-48-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2168-21-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1688-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3040-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5092-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1988-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2268-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4836-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/816-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1980-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2304-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4896-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3324-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2616-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2588-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4268-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1048-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1224-193-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2924-199-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3648-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
tbbnht.exe7xxlxrl.exeffxfxrx.exe9bhhbt.exehnbtnh.exe5ddpp.exepjjdv.exethbnbh.exevjdvp.exedjpvp.exerllfrfx.exebntthb.exetbhhbb.exe1dvpv.exerlxxlfl.exetnntnh.exe7htbbb.exedvvjd.exe7rxrrrr.exetnbbnh.exethhttn.exejpjpp.exexlfxrxr.exetbbbtt.exebbnhbt.exejdvpj.exelxfxllf.exebnnhhb.exethhttn.exejdppv.exerrlffxr.exe1rfffff.exenbtbbb.exepjdvd.exevjjvd.exenttbbb.exepdvpp.exefrllrxx.exelfrrlff.exe1tbttt.exetbhhhn.exe5ddjd.exedjvpp.exelxlfllf.exehnnbbb.exetnbtbb.exe1jdjj.exe1rrrfff.exennnhtn.exevvpjj.exejjvpv.exe3ffxxlr.exebtbbnh.exehbhbbh.exe7ppvp.exe5ppjv.exerxfxxxl.exefrfxxrr.exe3nbthh.exebntbbh.exejjjjj.exedvdvv.exexxxfxxx.exelxfllll.exepid process 4924 tbbnht.exe 2168 7xxlxrl.exe 848 ffxfxrx.exe 3508 9bhhbt.exe 2688 hnbtnh.exe 436 5ddpp.exe 1688 pjjdv.exe 3040 thbnbh.exe 5092 vjdvp.exe 1988 djpvp.exe 5084 rllfrfx.exe 2268 bntthb.exe 4836 tbhhbb.exe 816 1dvpv.exe 1980 rlxxlfl.exe 2304 tnntnh.exe 4016 7htbbb.exe 4896 dvvjd.exe 4040 7rxrrrr.exe 2076 tnbbnh.exe 3324 thhttn.exe 2616 jpjpp.exe 3984 xlfxrxr.exe 2588 tbbbtt.exe 4268 bbnhbt.exe 1596 jdvpj.exe 1048 lxfxllf.exe 116 bnnhhb.exe 1224 thhttn.exe 2924 jdppv.exe 3648 rrlffxr.exe 4572 1rfffff.exe 4960 nbtbbb.exe 3836 pjdvd.exe 2644 vjjvd.exe 2280 nttbbb.exe 876 pdvpp.exe 316 frllrxx.exe 4492 lfrrlff.exe 4320 1tbttt.exe 2228 tbhhhn.exe 3612 5ddjd.exe 536 djvpp.exe 1376 lxlfllf.exe 740 hnnbbb.exe 2688 tnbtbb.exe 3800 1jdjj.exe 5024 1rrrfff.exe 2396 nnnhtn.exe 3812 vvpjj.exe 3604 jjvpv.exe 1704 3ffxxlr.exe 2060 btbbnh.exe 3392 hbhbbh.exe 5100 7ppvp.exe 64 5ppjv.exe 444 rxfxxxl.exe 4884 frfxxrr.exe 3160 3nbthh.exe 2200 bntbbh.exe 1888 jjjjj.exe 2056 dvdvv.exe 2516 xxxfxxx.exe 1264 lxfllll.exe -
Processes:
resource yara_rule behavioral2/memory/3224-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3224-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4924-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3508-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/848-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/436-48-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2168-21-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4924-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4924-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1688-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3040-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5092-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1988-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2268-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4836-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/816-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1980-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2304-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4896-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3324-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2616-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2588-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4268-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1048-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1224-193-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2924-199-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3648-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4cf292b0df810581c0863705d8f9d0a4ef13b08ca456578327033acef1028eb1_NeikiAnalytics.exetbbnht.exe7xxlxrl.exeffxfxrx.exe9bhhbt.exehnbtnh.exe5ddpp.exepjjdv.exethbnbh.exevjdvp.exedjpvp.exerllfrfx.exebntthb.exetbhhbb.exe1dvpv.exerlxxlfl.exetnntnh.exe7htbbb.exedvvjd.exe7rxrrrr.exetnbbnh.exethhttn.exedescription pid process target process PID 3224 wrote to memory of 4924 3224 4cf292b0df810581c0863705d8f9d0a4ef13b08ca456578327033acef1028eb1_NeikiAnalytics.exe tbbnht.exe PID 3224 wrote to memory of 4924 3224 4cf292b0df810581c0863705d8f9d0a4ef13b08ca456578327033acef1028eb1_NeikiAnalytics.exe tbbnht.exe PID 3224 wrote to memory of 4924 3224 4cf292b0df810581c0863705d8f9d0a4ef13b08ca456578327033acef1028eb1_NeikiAnalytics.exe tbbnht.exe PID 4924 wrote to memory of 2168 4924 tbbnht.exe 7xxlxrl.exe PID 4924 wrote to memory of 2168 4924 tbbnht.exe 7xxlxrl.exe PID 4924 wrote to memory of 2168 4924 tbbnht.exe 7xxlxrl.exe PID 2168 wrote to memory of 848 2168 7xxlxrl.exe ffxfxrx.exe PID 2168 wrote to memory of 848 2168 7xxlxrl.exe ffxfxrx.exe PID 2168 wrote to memory of 848 2168 7xxlxrl.exe ffxfxrx.exe PID 848 wrote to memory of 3508 848 ffxfxrx.exe 9bhhbt.exe PID 848 wrote to memory of 3508 848 ffxfxrx.exe 9bhhbt.exe PID 848 wrote to memory of 3508 848 ffxfxrx.exe 9bhhbt.exe PID 3508 wrote to memory of 2688 3508 9bhhbt.exe hnbtnh.exe PID 3508 wrote to memory of 2688 3508 9bhhbt.exe hnbtnh.exe PID 3508 wrote to memory of 2688 3508 9bhhbt.exe hnbtnh.exe PID 2688 wrote to memory of 436 2688 hnbtnh.exe 5ddpp.exe PID 2688 wrote to memory of 436 2688 hnbtnh.exe 5ddpp.exe PID 2688 wrote to memory of 436 2688 hnbtnh.exe 5ddpp.exe PID 436 wrote to memory of 1688 436 5ddpp.exe pjjdv.exe PID 436 wrote to memory of 1688 436 5ddpp.exe pjjdv.exe PID 436 wrote to memory of 1688 436 5ddpp.exe pjjdv.exe PID 1688 wrote to memory of 3040 1688 pjjdv.exe thbnbh.exe PID 1688 wrote to memory of 3040 1688 pjjdv.exe thbnbh.exe PID 1688 wrote to memory of 3040 1688 pjjdv.exe thbnbh.exe PID 3040 wrote to memory of 5092 3040 thbnbh.exe vjdvp.exe PID 3040 wrote to memory of 5092 3040 thbnbh.exe vjdvp.exe PID 3040 wrote to memory of 5092 3040 thbnbh.exe vjdvp.exe PID 5092 wrote to memory of 1988 5092 vjdvp.exe djpvp.exe PID 5092 wrote to memory of 1988 5092 vjdvp.exe djpvp.exe PID 5092 wrote to memory of 1988 5092 vjdvp.exe djpvp.exe PID 1988 wrote to memory of 5084 1988 djpvp.exe rllfrfx.exe PID 1988 wrote to memory of 5084 1988 djpvp.exe rllfrfx.exe PID 1988 wrote to memory of 5084 1988 djpvp.exe rllfrfx.exe PID 5084 wrote to memory of 2268 5084 rllfrfx.exe bntthb.exe PID 5084 wrote to memory of 2268 5084 rllfrfx.exe bntthb.exe PID 5084 wrote to memory of 2268 5084 rllfrfx.exe bntthb.exe PID 2268 wrote to memory of 4836 2268 bntthb.exe tbhhbb.exe PID 2268 wrote to memory of 4836 2268 bntthb.exe tbhhbb.exe PID 2268 wrote to memory of 4836 2268 bntthb.exe tbhhbb.exe PID 4836 wrote to memory of 816 4836 tbhhbb.exe 1dvpv.exe PID 4836 wrote to memory of 816 4836 tbhhbb.exe 1dvpv.exe PID 4836 wrote to memory of 816 4836 tbhhbb.exe 1dvpv.exe PID 816 wrote to memory of 1980 816 1dvpv.exe rlxxlfl.exe PID 816 wrote to memory of 1980 816 1dvpv.exe rlxxlfl.exe PID 816 wrote to memory of 1980 816 1dvpv.exe rlxxlfl.exe PID 1980 wrote to memory of 2304 1980 rlxxlfl.exe tnntnh.exe PID 1980 wrote to memory of 2304 1980 rlxxlfl.exe tnntnh.exe PID 1980 wrote to memory of 2304 1980 rlxxlfl.exe tnntnh.exe PID 2304 wrote to memory of 4016 2304 tnntnh.exe 7htbbb.exe PID 2304 wrote to memory of 4016 2304 tnntnh.exe 7htbbb.exe PID 2304 wrote to memory of 4016 2304 tnntnh.exe 7htbbb.exe PID 4016 wrote to memory of 4896 4016 7htbbb.exe dvvjd.exe PID 4016 wrote to memory of 4896 4016 7htbbb.exe dvvjd.exe PID 4016 wrote to memory of 4896 4016 7htbbb.exe dvvjd.exe PID 4896 wrote to memory of 4040 4896 dvvjd.exe 7rxrrrr.exe PID 4896 wrote to memory of 4040 4896 dvvjd.exe 7rxrrrr.exe PID 4896 wrote to memory of 4040 4896 dvvjd.exe 7rxrrrr.exe PID 4040 wrote to memory of 2076 4040 7rxrrrr.exe tnbbnh.exe PID 4040 wrote to memory of 2076 4040 7rxrrrr.exe tnbbnh.exe PID 4040 wrote to memory of 2076 4040 7rxrrrr.exe tnbbnh.exe PID 2076 wrote to memory of 3324 2076 tnbbnh.exe thhttn.exe PID 2076 wrote to memory of 3324 2076 tnbbnh.exe thhttn.exe PID 2076 wrote to memory of 3324 2076 tnbbnh.exe thhttn.exe PID 3324 wrote to memory of 2616 3324 thhttn.exe jpjpp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cf292b0df810581c0863705d8f9d0a4ef13b08ca456578327033acef1028eb1_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\4cf292b0df810581c0863705d8f9d0a4ef13b08ca456578327033acef1028eb1_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\tbbnht.exec:\tbbnht.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7xxlxrl.exec:\7xxlxrl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ffxfxrx.exec:\ffxfxrx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9bhhbt.exec:\9bhhbt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hnbtnh.exec:\hnbtnh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5ddpp.exec:\5ddpp.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjjdv.exec:\pjjdv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\thbnbh.exec:\thbnbh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjdvp.exec:\vjdvp.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djpvp.exec:\djpvp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rllfrfx.exec:\rllfrfx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bntthb.exec:\bntthb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tbhhbb.exec:\tbhhbb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1dvpv.exec:\1dvpv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlxxlfl.exec:\rlxxlfl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnntnh.exec:\tnntnh.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7htbbb.exec:\7htbbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvvjd.exec:\dvvjd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7rxrrrr.exec:\7rxrrrr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnbbnh.exec:\tnbbnh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\thhttn.exec:\thhttn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpjpp.exec:\jpjpp.exe23⤵
- Executes dropped EXE
-
\??\c:\xlfxrxr.exec:\xlfxrxr.exe24⤵
- Executes dropped EXE
-
\??\c:\tbbbtt.exec:\tbbbtt.exe25⤵
- Executes dropped EXE
-
\??\c:\bbnhbt.exec:\bbnhbt.exe26⤵
- Executes dropped EXE
-
\??\c:\jdvpj.exec:\jdvpj.exe27⤵
- Executes dropped EXE
-
\??\c:\lxfxllf.exec:\lxfxllf.exe28⤵
- Executes dropped EXE
-
\??\c:\bnnhhb.exec:\bnnhhb.exe29⤵
- Executes dropped EXE
-
\??\c:\thhttn.exec:\thhttn.exe30⤵
- Executes dropped EXE
-
\??\c:\jdppv.exec:\jdppv.exe31⤵
- Executes dropped EXE
-
\??\c:\rrlffxr.exec:\rrlffxr.exe32⤵
- Executes dropped EXE
-
\??\c:\1rfffff.exec:\1rfffff.exe33⤵
- Executes dropped EXE
-
\??\c:\nbtbbb.exec:\nbtbbb.exe34⤵
- Executes dropped EXE
-
\??\c:\pjdvd.exec:\pjdvd.exe35⤵
- Executes dropped EXE
-
\??\c:\vjjvd.exec:\vjjvd.exe36⤵
- Executes dropped EXE
-
\??\c:\nttbbb.exec:\nttbbb.exe37⤵
- Executes dropped EXE
-
\??\c:\pdvpp.exec:\pdvpp.exe38⤵
- Executes dropped EXE
-
\??\c:\frllrxx.exec:\frllrxx.exe39⤵
- Executes dropped EXE
-
\??\c:\lfrrlff.exec:\lfrrlff.exe40⤵
- Executes dropped EXE
-
\??\c:\1tbttt.exec:\1tbttt.exe41⤵
- Executes dropped EXE
-
\??\c:\tbhhhn.exec:\tbhhhn.exe42⤵
- Executes dropped EXE
-
\??\c:\5ddjd.exec:\5ddjd.exe43⤵
- Executes dropped EXE
-
\??\c:\djvpp.exec:\djvpp.exe44⤵
- Executes dropped EXE
-
\??\c:\lxlfllf.exec:\lxlfllf.exe45⤵
- Executes dropped EXE
-
\??\c:\hnnbbb.exec:\hnnbbb.exe46⤵
- Executes dropped EXE
-
\??\c:\tnbtbb.exec:\tnbtbb.exe47⤵
- Executes dropped EXE
-
\??\c:\1jdjj.exec:\1jdjj.exe48⤵
- Executes dropped EXE
-
\??\c:\1rrrfff.exec:\1rrrfff.exe49⤵
- Executes dropped EXE
-
\??\c:\nnnhtn.exec:\nnnhtn.exe50⤵
- Executes dropped EXE
-
\??\c:\vvpjj.exec:\vvpjj.exe51⤵
- Executes dropped EXE
-
\??\c:\jjvpv.exec:\jjvpv.exe52⤵
- Executes dropped EXE
-
\??\c:\3ffxxlr.exec:\3ffxxlr.exe53⤵
- Executes dropped EXE
-
\??\c:\btbbnh.exec:\btbbnh.exe54⤵
- Executes dropped EXE
-
\??\c:\hbhbbh.exec:\hbhbbh.exe55⤵
- Executes dropped EXE
-
\??\c:\7ppvp.exec:\7ppvp.exe56⤵
- Executes dropped EXE
-
\??\c:\5ppjv.exec:\5ppjv.exe57⤵
- Executes dropped EXE
-
\??\c:\rxfxxxl.exec:\rxfxxxl.exe58⤵
- Executes dropped EXE
-
\??\c:\frfxxrr.exec:\frfxxrr.exe59⤵
- Executes dropped EXE
-
\??\c:\3nbthh.exec:\3nbthh.exe60⤵
- Executes dropped EXE
-
\??\c:\bntbbh.exec:\bntbbh.exe61⤵
- Executes dropped EXE
-
\??\c:\jjjjj.exec:\jjjjj.exe62⤵
- Executes dropped EXE
-
\??\c:\dvdvv.exec:\dvdvv.exe63⤵
- Executes dropped EXE
-
\??\c:\xxxfxxx.exec:\xxxfxxx.exe64⤵
- Executes dropped EXE
-
\??\c:\lxfllll.exec:\lxfllll.exe65⤵
- Executes dropped EXE
-
\??\c:\nhnnnn.exec:\nhnnnn.exe66⤵
-
\??\c:\3hnthh.exec:\3hnthh.exe67⤵
-
\??\c:\1vvpj.exec:\1vvpj.exe68⤵
-
\??\c:\vppjp.exec:\vppjp.exe69⤵
-
\??\c:\7xxxlrr.exec:\7xxxlrr.exe70⤵
-
\??\c:\fffrfff.exec:\fffrfff.exe71⤵
-
\??\c:\3hnhbb.exec:\3hnhbb.exe72⤵
-
\??\c:\hhnhnh.exec:\hhnhnh.exe73⤵
-
\??\c:\ppddp.exec:\ppddp.exe74⤵
-
\??\c:\5vddj.exec:\5vddj.exe75⤵
-
\??\c:\9rrlllf.exec:\9rrlllf.exe76⤵
-
\??\c:\xxrllll.exec:\xxrllll.exe77⤵
-
\??\c:\7nttnh.exec:\7nttnh.exe78⤵
-
\??\c:\hhnhhh.exec:\hhnhhh.exe79⤵
-
\??\c:\pjppj.exec:\pjppj.exe80⤵
-
\??\c:\pjvvv.exec:\pjvvv.exe81⤵
-
\??\c:\7xrllll.exec:\7xrllll.exe82⤵
-
\??\c:\ffffxxl.exec:\ffffxxl.exe83⤵
-
\??\c:\tnnntn.exec:\tnnntn.exe84⤵
-
\??\c:\jjdvp.exec:\jjdvp.exe85⤵
-
\??\c:\1flrrlr.exec:\1flrrlr.exe86⤵
-
\??\c:\fxxxxfx.exec:\fxxxxfx.exe87⤵
-
\??\c:\9bnnbb.exec:\9bnnbb.exe88⤵
-
\??\c:\jvdvp.exec:\jvdvp.exe89⤵
-
\??\c:\jppjj.exec:\jppjj.exe90⤵
-
\??\c:\1xlfxff.exec:\1xlfxff.exe91⤵
-
\??\c:\rlrrlll.exec:\rlrrlll.exe92⤵
-
\??\c:\tthbth.exec:\tthbth.exe93⤵
-
\??\c:\5tbttb.exec:\5tbttb.exe94⤵
-
\??\c:\dddvp.exec:\dddvp.exe95⤵
-
\??\c:\ppjjd.exec:\ppjjd.exe96⤵
-
\??\c:\fxfxrrl.exec:\fxfxrrl.exe97⤵
-
\??\c:\7lxxrrl.exec:\7lxxrrl.exe98⤵
-
\??\c:\hhnntn.exec:\hhnntn.exe99⤵
-
\??\c:\5tttnt.exec:\5tttnt.exe100⤵
-
\??\c:\vjvpv.exec:\vjvpv.exe101⤵
-
\??\c:\pdpjj.exec:\pdpjj.exe102⤵
-
\??\c:\tnnnhn.exec:\tnnnhn.exe103⤵
-
\??\c:\vpdjp.exec:\vpdjp.exe104⤵
-
\??\c:\pdjjd.exec:\pdjjd.exe105⤵
-
\??\c:\5xxxlll.exec:\5xxxlll.exe106⤵
-
\??\c:\xxlrlll.exec:\xxlrlll.exe107⤵
-
\??\c:\httbbb.exec:\httbbb.exe108⤵
-
\??\c:\tnhtbb.exec:\tnhtbb.exe109⤵
-
\??\c:\vpdvj.exec:\vpdvj.exe110⤵
-
\??\c:\rxxxxxx.exec:\rxxxxxx.exe111⤵
-
\??\c:\9lrrllr.exec:\9lrrllr.exe112⤵
-
\??\c:\hhhbhh.exec:\hhhbhh.exe113⤵
-
\??\c:\5hhbtt.exec:\5hhbtt.exe114⤵
-
\??\c:\7pdvd.exec:\7pdvd.exe115⤵
-
\??\c:\vpvvj.exec:\vpvvj.exe116⤵
-
\??\c:\xrrlxxx.exec:\xrrlxxx.exe117⤵
-
\??\c:\7nbtnb.exec:\7nbtnb.exe118⤵
-
\??\c:\thhhhn.exec:\thhhhn.exe119⤵
-
\??\c:\ttnhhn.exec:\ttnhhn.exe120⤵
-
\??\c:\pjvvp.exec:\pjvvp.exe121⤵
-
\??\c:\1ppdd.exec:\1ppdd.exe122⤵
-
\??\c:\9rfrlxr.exec:\9rfrlxr.exe123⤵
-
\??\c:\nbhbtt.exec:\nbhbtt.exe124⤵
-
\??\c:\tbbbht.exec:\tbbbht.exe125⤵
-
\??\c:\1ppvp.exec:\1ppvp.exe126⤵
-
\??\c:\fxrlffx.exec:\fxrlffx.exe127⤵
-
\??\c:\frxrrrl.exec:\frxrrrl.exe128⤵
-
\??\c:\nnbbhh.exec:\nnbbhh.exe129⤵
-
\??\c:\dpvpd.exec:\dpvpd.exe130⤵
-
\??\c:\5vvpj.exec:\5vvpj.exe131⤵
-
\??\c:\dvpjp.exec:\dvpjp.exe132⤵
-
\??\c:\frrxxff.exec:\frrxxff.exe133⤵
-
\??\c:\xrlfrrf.exec:\xrlfrrf.exe134⤵
-
\??\c:\hbhnnn.exec:\hbhnnn.exe135⤵
-
\??\c:\1jjpp.exec:\1jjpp.exe136⤵
-
\??\c:\ppjjj.exec:\ppjjj.exe137⤵
-
\??\c:\5frlxxx.exec:\5frlxxx.exe138⤵
-
\??\c:\rllfxxx.exec:\rllfxxx.exe139⤵
-
\??\c:\hbbttn.exec:\hbbttn.exe140⤵
-
\??\c:\tnnnhh.exec:\tnnnhh.exe141⤵
-
\??\c:\dvjdp.exec:\dvjdp.exe142⤵
-
\??\c:\5dpjv.exec:\5dpjv.exe143⤵
-
\??\c:\vdpjd.exec:\vdpjd.exe144⤵
-
\??\c:\rxfxrll.exec:\rxfxrll.exe145⤵
-
\??\c:\3ffxrrl.exec:\3ffxrrl.exe146⤵
-
\??\c:\tthbtt.exec:\tthbtt.exe147⤵
-
\??\c:\9vddv.exec:\9vddv.exe148⤵
-
\??\c:\3ppvp.exec:\3ppvp.exe149⤵
-
\??\c:\9lllxxx.exec:\9lllxxx.exe150⤵
-
\??\c:\lxfllll.exec:\lxfllll.exe151⤵
-
\??\c:\nhhhbn.exec:\nhhhbn.exe152⤵
-
\??\c:\nbbttt.exec:\nbbttt.exe153⤵
-
\??\c:\vdvvp.exec:\vdvvp.exe154⤵
-
\??\c:\5fllflf.exec:\5fllflf.exe155⤵
-
\??\c:\pjjdv.exec:\pjjdv.exe156⤵
-
\??\c:\vpvpp.exec:\vpvpp.exe157⤵
-
\??\c:\frlfxxr.exec:\frlfxxr.exe158⤵
-
\??\c:\1bhhbt.exec:\1bhhbt.exe159⤵
-
\??\c:\pvdpp.exec:\pvdpp.exe160⤵
-
\??\c:\9fllllf.exec:\9fllllf.exe161⤵
-
\??\c:\xflfxrf.exec:\xflfxrf.exe162⤵
-
\??\c:\9jjjd.exec:\9jjjd.exe163⤵
-
\??\c:\lfxxxxr.exec:\lfxxxxr.exe164⤵
-
\??\c:\5xrfrlx.exec:\5xrfrlx.exe165⤵
-
\??\c:\9ttthh.exec:\9ttthh.exe166⤵
-
\??\c:\dvvjp.exec:\dvvjp.exe167⤵
-
\??\c:\vjjvp.exec:\vjjvp.exe168⤵
-
\??\c:\thnhhh.exec:\thnhhh.exe169⤵
-
\??\c:\bbbthb.exec:\bbbthb.exe170⤵
-
\??\c:\dvvjj.exec:\dvvjj.exe171⤵
-
\??\c:\5vvvj.exec:\5vvvj.exe172⤵
-
\??\c:\ffllflf.exec:\ffllflf.exe173⤵
-
\??\c:\hhnbnh.exec:\hhnbnh.exe174⤵
-
\??\c:\pdjjj.exec:\pdjjj.exe175⤵
-
\??\c:\vvjvd.exec:\vvjvd.exe176⤵
-
\??\c:\lfffrrl.exec:\lfffrrl.exe177⤵
-
\??\c:\5llfrlf.exec:\5llfrlf.exe178⤵
-
\??\c:\7hhnhb.exec:\7hhnhb.exe179⤵
-
\??\c:\ttbbnh.exec:\ttbbnh.exe180⤵
-
\??\c:\7jjdp.exec:\7jjdp.exe181⤵
-
\??\c:\dvjdd.exec:\dvjdd.exe182⤵
-
\??\c:\frrffxr.exec:\frrffxr.exe183⤵
-
\??\c:\lflfrfr.exec:\lflfrfr.exe184⤵
-
\??\c:\nhnhhh.exec:\nhnhhh.exe185⤵
-
\??\c:\7hbtnh.exec:\7hbtnh.exe186⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe187⤵
-
\??\c:\5pvpv.exec:\5pvpv.exe188⤵
-
\??\c:\vdjdd.exec:\vdjdd.exe189⤵
-
\??\c:\lfxlfxr.exec:\lfxlfxr.exe190⤵
-
\??\c:\9tnbnt.exec:\9tnbnt.exe191⤵
-
\??\c:\nbnbtn.exec:\nbnbtn.exe192⤵
-
\??\c:\tttnhh.exec:\tttnhh.exe193⤵
-
\??\c:\pdvpd.exec:\pdvpd.exe194⤵
-
\??\c:\vdddv.exec:\vdddv.exe195⤵
-
\??\c:\rrlrflx.exec:\rrlrflx.exe196⤵
-
\??\c:\3lllfff.exec:\3lllfff.exe197⤵
-
\??\c:\1bnhbb.exec:\1bnhbb.exe198⤵
-
\??\c:\5hhbnn.exec:\5hhbnn.exe199⤵
-
\??\c:\3ppjv.exec:\3ppjv.exe200⤵
-
\??\c:\pjjdp.exec:\pjjdp.exe201⤵
-
\??\c:\lxfxrrl.exec:\lxfxrrl.exe202⤵
-
\??\c:\hhbbbb.exec:\hhbbbb.exe203⤵
-
\??\c:\jvvpj.exec:\jvvpj.exe204⤵
-
\??\c:\djjdv.exec:\djjdv.exe205⤵
-
\??\c:\rlxrrrx.exec:\rlxrrrx.exe206⤵
-
\??\c:\1xxxrxx.exec:\1xxxrxx.exe207⤵
-
\??\c:\hbbbbt.exec:\hbbbbt.exe208⤵
-
\??\c:\djvvj.exec:\djvvj.exe209⤵
-
\??\c:\rrrlxxr.exec:\rrrlxxr.exe210⤵
-
\??\c:\lfxxrrl.exec:\lfxxrrl.exe211⤵
-
\??\c:\1htnhh.exec:\1htnhh.exe212⤵
-
\??\c:\jdvjd.exec:\jdvjd.exe213⤵
-
\??\c:\djjvv.exec:\djjvv.exe214⤵
-
\??\c:\ffffxff.exec:\ffffxff.exe215⤵
-
\??\c:\9hhhbb.exec:\9hhhbb.exe216⤵
-
\??\c:\tbnnhh.exec:\tbnnhh.exe217⤵
-
\??\c:\5pvvp.exec:\5pvvp.exe218⤵
-
\??\c:\jdjjd.exec:\jdjjd.exe219⤵
-
\??\c:\frrlxfr.exec:\frrlxfr.exe220⤵
-
\??\c:\fxlfxxr.exec:\fxlfxxr.exe221⤵
-
\??\c:\htbbhh.exec:\htbbhh.exe222⤵
-
\??\c:\nbhhbb.exec:\nbhhbb.exe223⤵
-
\??\c:\9ddvp.exec:\9ddvp.exe224⤵
-
\??\c:\xxxrllf.exec:\xxxrllf.exe225⤵
-
\??\c:\xfrrllf.exec:\xfrrllf.exe226⤵
-
\??\c:\3hnhbh.exec:\3hnhbh.exe227⤵
-
\??\c:\btbhtt.exec:\btbhtt.exe228⤵
-
\??\c:\tntnhh.exec:\tntnhh.exe229⤵
-
\??\c:\pjppp.exec:\pjppp.exe230⤵
-
\??\c:\dpvdv.exec:\dpvdv.exe231⤵
-
\??\c:\flrrrxf.exec:\flrrrxf.exe232⤵
-
\??\c:\5frxxlf.exec:\5frxxlf.exe233⤵
-
\??\c:\httbbh.exec:\httbbh.exe234⤵
-
\??\c:\1hhbnn.exec:\1hhbnn.exe235⤵
-
\??\c:\9vvdv.exec:\9vvdv.exe236⤵
-
\??\c:\vdvvp.exec:\vdvvp.exe237⤵
-
\??\c:\1lrrrll.exec:\1lrrrll.exe238⤵
-
\??\c:\lrrrlll.exec:\lrrrlll.exe239⤵
-
\??\c:\9htnhh.exec:\9htnhh.exe240⤵
-
\??\c:\ntbbhn.exec:\ntbbhn.exe241⤵