Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 13:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
546cae22c7e3802d36bb7b16fee89d377cf8278bae31e031b38cf47acaed590c_NeikiAnalytics.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
546cae22c7e3802d36bb7b16fee89d377cf8278bae31e031b38cf47acaed590c_NeikiAnalytics.exe
-
Size
127KB
-
MD5
511e0d8284b4c30420f6c9eeffedd6c0
-
SHA1
ca1dcbbde8cbf8ea366b443e45b6c31ea1f8002d
-
SHA256
546cae22c7e3802d36bb7b16fee89d377cf8278bae31e031b38cf47acaed590c
-
SHA512
85b9f12defdfc05b9c61e413ae6c28d44448e74cd15176ff68d5749b0f6a52fffa8174ba264007199f78312a9b8bbed41a61144d90dfceccc48d8246ab4fc537
-
SSDEEP
3072:ymb3NkkiQ3mdBjFWXkj7afodnmm9Ao98h3dktX4/J3:n3C9BRW0j/tmm9nwytI9
Malware Config
Signatures
-
Detect Blackmoon payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/668-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2912-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2392-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1736-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1736-40-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2088-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1824-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2424-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2176-163-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/824-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2300-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2020-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1696-225-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1344-243-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-261-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1232-270-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2296-288-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
xdprjnx.exepfvjlj.exepdprhd.exetvxph.exephnnnv.exendrxph.exehttdhb.exedlxbbl.exexfrljpf.exeblhfppr.exexfphdjf.exexhjjb.exedhfvhjv.exetxljfl.exeffvphdv.exedtlhbdf.exedxbrrf.exejrhbp.exefbjvvj.exeprfplrj.exevnnbff.exevvvvxlv.exevftxlxt.exefjrvnl.exevrvthr.exettxflhl.exedljxvl.exefldnbfb.exevfprr.exefphnnbr.exendfxxr.exevhfdt.exebfvpdr.exexpvlvvp.exerphvpdv.exetvfljbn.exepxjbfrb.exefjnvnd.exehttjhd.exefhnbv.exexvblnj.exetrfnxxp.exednbjb.exebjlvh.exerjhxx.exehhlhhtt.exetjjtlbv.exebflrjnl.exetxbft.exenlhln.exepllbbf.exebffdf.exelphhdv.exevdvxv.exehrphrr.exejbhrtb.exeljhldf.exexffxn.exetjxdtnr.exeljntln.exehnjxhnd.exehbvpdvd.exepplddhj.exeddbfrdd.exepid process 668 xdprjnx.exe 2392 pfvjlj.exe 1736 pdprhd.exe 2748 tvxph.exe 2088 phnnnv.exe 1824 ndrxph.exe 2600 httdhb.exe 2556 dlxbbl.exe 2568 xfrljpf.exe 2904 blhfppr.exe 2440 xfphdjf.exe 2552 xhjjb.exe 2424 dhfvhjv.exe 2828 txljfl.exe 2384 ffvphdv.exe 2176 dtlhbdf.exe 824 dxbrrf.exe 2292 jrhbp.exe 2300 fbjvvj.exe 2020 prfplrj.exe 1940 vnnbff.exe 280 vvvvxlv.exe 1696 vftxlxt.exe 828 fjrvnl.exe 1344 vrvthr.exe 1992 ttxflhl.exe 2740 dljxvl.exe 1232 fldnbfb.exe 2700 vfprr.exe 2296 fphnnbr.exe 2080 ndfxxr.exe 2932 vhfdt.exe 780 bfvpdr.exe 868 xpvlvvp.exe 1608 rphvpdv.exe 2272 tvfljbn.exe 2796 pxjbfrb.exe 2896 fjnvnd.exe 1576 httjhd.exe 2816 fhnbv.exe 2668 xvblnj.exe 2892 trfnxxp.exe 2988 dnbjb.exe 2660 bjlvh.exe 2524 rjhxx.exe 2572 hhlhhtt.exe 2616 tjjtlbv.exe 2584 bflrjnl.exe 2468 txbft.exe 2552 nlhln.exe 2428 pllbbf.exe 1704 bffdf.exe 2844 lphhdv.exe 2060 vdvxv.exe 2176 hrphrr.exe 1924 jbhrtb.exe 1216 ljhldf.exe 1564 xffxn.exe 932 tjxdtnr.exe 1624 ljntln.exe 1940 hnjxhnd.exe 280 hbvpdvd.exe 1376 pplddhj.exe 1324 ddbfrdd.exe -
Processes:
resource yara_rule behavioral1/memory/668-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2912-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2392-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1736-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2088-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1824-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2556-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2556-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2556-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2176-163-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/824-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2300-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2020-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1696-225-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1344-243-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-261-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1232-270-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2296-288-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
546cae22c7e3802d36bb7b16fee89d377cf8278bae31e031b38cf47acaed590c_NeikiAnalytics.exexdprjnx.exepfvjlj.exepdprhd.exetvxph.exephnnnv.exendrxph.exehttdhb.exedlxbbl.exexfrljpf.exeblhfppr.exexfphdjf.exexhjjb.exedhfvhjv.exetxljfl.exeffvphdv.exedescription pid process target process PID 2912 wrote to memory of 668 2912 546cae22c7e3802d36bb7b16fee89d377cf8278bae31e031b38cf47acaed590c_NeikiAnalytics.exe xdprjnx.exe PID 2912 wrote to memory of 668 2912 546cae22c7e3802d36bb7b16fee89d377cf8278bae31e031b38cf47acaed590c_NeikiAnalytics.exe xdprjnx.exe PID 2912 wrote to memory of 668 2912 546cae22c7e3802d36bb7b16fee89d377cf8278bae31e031b38cf47acaed590c_NeikiAnalytics.exe xdprjnx.exe PID 2912 wrote to memory of 668 2912 546cae22c7e3802d36bb7b16fee89d377cf8278bae31e031b38cf47acaed590c_NeikiAnalytics.exe xdprjnx.exe PID 668 wrote to memory of 2392 668 xdprjnx.exe pfvjlj.exe PID 668 wrote to memory of 2392 668 xdprjnx.exe pfvjlj.exe PID 668 wrote to memory of 2392 668 xdprjnx.exe pfvjlj.exe PID 668 wrote to memory of 2392 668 xdprjnx.exe pfvjlj.exe PID 2392 wrote to memory of 1736 2392 pfvjlj.exe pdprhd.exe PID 2392 wrote to memory of 1736 2392 pfvjlj.exe pdprhd.exe PID 2392 wrote to memory of 1736 2392 pfvjlj.exe pdprhd.exe PID 2392 wrote to memory of 1736 2392 pfvjlj.exe pdprhd.exe PID 1736 wrote to memory of 2748 1736 pdprhd.exe tvxph.exe PID 1736 wrote to memory of 2748 1736 pdprhd.exe tvxph.exe PID 1736 wrote to memory of 2748 1736 pdprhd.exe tvxph.exe PID 1736 wrote to memory of 2748 1736 pdprhd.exe tvxph.exe PID 2748 wrote to memory of 2088 2748 tvxph.exe phnnnv.exe PID 2748 wrote to memory of 2088 2748 tvxph.exe phnnnv.exe PID 2748 wrote to memory of 2088 2748 tvxph.exe phnnnv.exe PID 2748 wrote to memory of 2088 2748 tvxph.exe phnnnv.exe PID 2088 wrote to memory of 1824 2088 phnnnv.exe ndrxph.exe PID 2088 wrote to memory of 1824 2088 phnnnv.exe ndrxph.exe PID 2088 wrote to memory of 1824 2088 phnnnv.exe ndrxph.exe PID 2088 wrote to memory of 1824 2088 phnnnv.exe ndrxph.exe PID 1824 wrote to memory of 2600 1824 ndrxph.exe httdhb.exe PID 1824 wrote to memory of 2600 1824 ndrxph.exe httdhb.exe PID 1824 wrote to memory of 2600 1824 ndrxph.exe httdhb.exe PID 1824 wrote to memory of 2600 1824 ndrxph.exe httdhb.exe PID 2600 wrote to memory of 2556 2600 httdhb.exe dlxbbl.exe PID 2600 wrote to memory of 2556 2600 httdhb.exe dlxbbl.exe PID 2600 wrote to memory of 2556 2600 httdhb.exe dlxbbl.exe PID 2600 wrote to memory of 2556 2600 httdhb.exe dlxbbl.exe PID 2556 wrote to memory of 2568 2556 dlxbbl.exe xfrljpf.exe PID 2556 wrote to memory of 2568 2556 dlxbbl.exe xfrljpf.exe PID 2556 wrote to memory of 2568 2556 dlxbbl.exe xfrljpf.exe PID 2556 wrote to memory of 2568 2556 dlxbbl.exe xfrljpf.exe PID 2568 wrote to memory of 2904 2568 xfrljpf.exe blhfppr.exe PID 2568 wrote to memory of 2904 2568 xfrljpf.exe blhfppr.exe PID 2568 wrote to memory of 2904 2568 xfrljpf.exe blhfppr.exe PID 2568 wrote to memory of 2904 2568 xfrljpf.exe blhfppr.exe PID 2904 wrote to memory of 2440 2904 blhfppr.exe xfphdjf.exe PID 2904 wrote to memory of 2440 2904 blhfppr.exe xfphdjf.exe PID 2904 wrote to memory of 2440 2904 blhfppr.exe xfphdjf.exe PID 2904 wrote to memory of 2440 2904 blhfppr.exe xfphdjf.exe PID 2440 wrote to memory of 2552 2440 xfphdjf.exe xhjjb.exe PID 2440 wrote to memory of 2552 2440 xfphdjf.exe xhjjb.exe PID 2440 wrote to memory of 2552 2440 xfphdjf.exe xhjjb.exe PID 2440 wrote to memory of 2552 2440 xfphdjf.exe xhjjb.exe PID 2552 wrote to memory of 2424 2552 xhjjb.exe dhfvhjv.exe PID 2552 wrote to memory of 2424 2552 xhjjb.exe dhfvhjv.exe PID 2552 wrote to memory of 2424 2552 xhjjb.exe dhfvhjv.exe PID 2552 wrote to memory of 2424 2552 xhjjb.exe dhfvhjv.exe PID 2424 wrote to memory of 2828 2424 dhfvhjv.exe txljfl.exe PID 2424 wrote to memory of 2828 2424 dhfvhjv.exe txljfl.exe PID 2424 wrote to memory of 2828 2424 dhfvhjv.exe txljfl.exe PID 2424 wrote to memory of 2828 2424 dhfvhjv.exe txljfl.exe PID 2828 wrote to memory of 2384 2828 txljfl.exe ffvphdv.exe PID 2828 wrote to memory of 2384 2828 txljfl.exe ffvphdv.exe PID 2828 wrote to memory of 2384 2828 txljfl.exe ffvphdv.exe PID 2828 wrote to memory of 2384 2828 txljfl.exe ffvphdv.exe PID 2384 wrote to memory of 2176 2384 ffvphdv.exe dtlhbdf.exe PID 2384 wrote to memory of 2176 2384 ffvphdv.exe dtlhbdf.exe PID 2384 wrote to memory of 2176 2384 ffvphdv.exe dtlhbdf.exe PID 2384 wrote to memory of 2176 2384 ffvphdv.exe dtlhbdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\546cae22c7e3802d36bb7b16fee89d377cf8278bae31e031b38cf47acaed590c_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\546cae22c7e3802d36bb7b16fee89d377cf8278bae31e031b38cf47acaed590c_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\xdprjnx.exec:\xdprjnx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pfvjlj.exec:\pfvjlj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdprhd.exec:\pdprhd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tvxph.exec:\tvxph.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\phnnnv.exec:\phnnnv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ndrxph.exec:\ndrxph.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\httdhb.exec:\httdhb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dlxbbl.exec:\dlxbbl.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfrljpf.exec:\xfrljpf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\blhfppr.exec:\blhfppr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfphdjf.exec:\xfphdjf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xhjjb.exec:\xhjjb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dhfvhjv.exec:\dhfvhjv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\txljfl.exec:\txljfl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ffvphdv.exec:\ffvphdv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dtlhbdf.exec:\dtlhbdf.exe17⤵
- Executes dropped EXE
-
\??\c:\dxbrrf.exec:\dxbrrf.exe18⤵
- Executes dropped EXE
-
\??\c:\jrhbp.exec:\jrhbp.exe19⤵
- Executes dropped EXE
-
\??\c:\fbjvvj.exec:\fbjvvj.exe20⤵
- Executes dropped EXE
-
\??\c:\prfplrj.exec:\prfplrj.exe21⤵
- Executes dropped EXE
-
\??\c:\vnnbff.exec:\vnnbff.exe22⤵
- Executes dropped EXE
-
\??\c:\vvvvxlv.exec:\vvvvxlv.exe23⤵
- Executes dropped EXE
-
\??\c:\vftxlxt.exec:\vftxlxt.exe24⤵
- Executes dropped EXE
-
\??\c:\fjrvnl.exec:\fjrvnl.exe25⤵
- Executes dropped EXE
-
\??\c:\vrvthr.exec:\vrvthr.exe26⤵
- Executes dropped EXE
-
\??\c:\ttxflhl.exec:\ttxflhl.exe27⤵
- Executes dropped EXE
-
\??\c:\dljxvl.exec:\dljxvl.exe28⤵
- Executes dropped EXE
-
\??\c:\fldnbfb.exec:\fldnbfb.exe29⤵
- Executes dropped EXE
-
\??\c:\vfprr.exec:\vfprr.exe30⤵
- Executes dropped EXE
-
\??\c:\fphnnbr.exec:\fphnnbr.exe31⤵
- Executes dropped EXE
-
\??\c:\ndfxxr.exec:\ndfxxr.exe32⤵
- Executes dropped EXE
-
\??\c:\vhfdt.exec:\vhfdt.exe33⤵
- Executes dropped EXE
-
\??\c:\bfvpdr.exec:\bfvpdr.exe34⤵
- Executes dropped EXE
-
\??\c:\xpvlvvp.exec:\xpvlvvp.exe35⤵
- Executes dropped EXE
-
\??\c:\rphvpdv.exec:\rphvpdv.exe36⤵
- Executes dropped EXE
-
\??\c:\tvfljbn.exec:\tvfljbn.exe37⤵
- Executes dropped EXE
-
\??\c:\pxjbfrb.exec:\pxjbfrb.exe38⤵
- Executes dropped EXE
-
\??\c:\fjnvnd.exec:\fjnvnd.exe39⤵
- Executes dropped EXE
-
\??\c:\httjhd.exec:\httjhd.exe40⤵
- Executes dropped EXE
-
\??\c:\fhnbv.exec:\fhnbv.exe41⤵
- Executes dropped EXE
-
\??\c:\xvblnj.exec:\xvblnj.exe42⤵
- Executes dropped EXE
-
\??\c:\trfnxxp.exec:\trfnxxp.exe43⤵
- Executes dropped EXE
-
\??\c:\dnbjb.exec:\dnbjb.exe44⤵
- Executes dropped EXE
-
\??\c:\bjlvh.exec:\bjlvh.exe45⤵
- Executes dropped EXE
-
\??\c:\rjhxx.exec:\rjhxx.exe46⤵
- Executes dropped EXE
-
\??\c:\hhlhhtt.exec:\hhlhhtt.exe47⤵
- Executes dropped EXE
-
\??\c:\tjjtlbv.exec:\tjjtlbv.exe48⤵
- Executes dropped EXE
-
\??\c:\bflrjnl.exec:\bflrjnl.exe49⤵
- Executes dropped EXE
-
\??\c:\txbft.exec:\txbft.exe50⤵
- Executes dropped EXE
-
\??\c:\nlhln.exec:\nlhln.exe51⤵
- Executes dropped EXE
-
\??\c:\pllbbf.exec:\pllbbf.exe52⤵
- Executes dropped EXE
-
\??\c:\bffdf.exec:\bffdf.exe53⤵
- Executes dropped EXE
-
\??\c:\lphhdv.exec:\lphhdv.exe54⤵
- Executes dropped EXE
-
\??\c:\vdvxv.exec:\vdvxv.exe55⤵
- Executes dropped EXE
-
\??\c:\hrphrr.exec:\hrphrr.exe56⤵
- Executes dropped EXE
-
\??\c:\jbhrtb.exec:\jbhrtb.exe57⤵
- Executes dropped EXE
-
\??\c:\ljhldf.exec:\ljhldf.exe58⤵
- Executes dropped EXE
-
\??\c:\xffxn.exec:\xffxn.exe59⤵
- Executes dropped EXE
-
\??\c:\tjxdtnr.exec:\tjxdtnr.exe60⤵
- Executes dropped EXE
-
\??\c:\ljntln.exec:\ljntln.exe61⤵
- Executes dropped EXE
-
\??\c:\hnjxhnd.exec:\hnjxhnd.exe62⤵
- Executes dropped EXE
-
\??\c:\hbvpdvd.exec:\hbvpdvd.exe63⤵
- Executes dropped EXE
-
\??\c:\pplddhj.exec:\pplddhj.exe64⤵
- Executes dropped EXE
-
\??\c:\ddbfrdd.exec:\ddbfrdd.exe65⤵
- Executes dropped EXE
-
\??\c:\xvxft.exec:\xvxft.exe66⤵
-
\??\c:\fjxfb.exec:\fjxfb.exe67⤵
-
\??\c:\tvnhxl.exec:\tvnhxl.exe68⤵
-
\??\c:\ddnjnnb.exec:\ddnjnnb.exe69⤵
-
\??\c:\rdxrrpd.exec:\rdxrrpd.exe70⤵
-
\??\c:\prlpnrf.exec:\prlpnrf.exe71⤵
-
\??\c:\dnrrh.exec:\dnrrh.exe72⤵
-
\??\c:\lvjfhj.exec:\lvjfhj.exe73⤵
-
\??\c:\pndld.exec:\pndld.exe74⤵
-
\??\c:\dvftnh.exec:\dvftnh.exe75⤵
-
\??\c:\phhbvvd.exec:\phhbvvd.exe76⤵
-
\??\c:\jjdbvx.exec:\jjdbvx.exe77⤵
-
\??\c:\rlvddf.exec:\rlvddf.exe78⤵
-
\??\c:\tnflt.exec:\tnflt.exe79⤵
-
\??\c:\dfrvdvh.exec:\dfrvdvh.exe80⤵
-
\??\c:\hjpxptn.exec:\hjpxptn.exe81⤵
-
\??\c:\hnxdbpt.exec:\hnxdbpt.exe82⤵
-
\??\c:\pvpnrlx.exec:\pvpnrlx.exe83⤵
-
\??\c:\hnlntxd.exec:\hnlntxd.exe84⤵
-
\??\c:\dtfht.exec:\dtfht.exe85⤵
-
\??\c:\xvpxjv.exec:\xvpxjv.exe86⤵
-
\??\c:\rbvndn.exec:\rbvndn.exe87⤵
-
\??\c:\fhprl.exec:\fhprl.exe88⤵
-
\??\c:\npftjx.exec:\npftjx.exe89⤵
-
\??\c:\vxjjjhh.exec:\vxjjjhh.exe90⤵
-
\??\c:\blvhpph.exec:\blvhpph.exe91⤵
-
\??\c:\jpnjjdn.exec:\jpnjjdn.exe92⤵
-
\??\c:\xjxvr.exec:\xjxvr.exe93⤵
-
\??\c:\ljfhfbl.exec:\ljfhfbl.exe94⤵
-
\??\c:\ndfpth.exec:\ndfpth.exe95⤵
-
\??\c:\fvnnfbd.exec:\fvnnfbd.exe96⤵
-
\??\c:\tbvptrb.exec:\tbvptrb.exe97⤵
-
\??\c:\npthrl.exec:\npthrl.exe98⤵
-
\??\c:\rtpdbnr.exec:\rtpdbnr.exe99⤵
-
\??\c:\nbfxj.exec:\nbfxj.exe100⤵
-
\??\c:\hbhbfnr.exec:\hbhbfnr.exe101⤵
-
\??\c:\djtrfr.exec:\djtrfr.exe102⤵
-
\??\c:\tlfpv.exec:\tlfpv.exe103⤵
-
\??\c:\fltrb.exec:\fltrb.exe104⤵
-
\??\c:\jhnbnvn.exec:\jhnbnvn.exe105⤵
-
\??\c:\dxjdpj.exec:\dxjdpj.exe106⤵
-
\??\c:\rvdjb.exec:\rvdjb.exe107⤵
-
\??\c:\lpltltj.exec:\lpltltj.exe108⤵
-
\??\c:\trnxn.exec:\trnxn.exe109⤵
-
\??\c:\dnvfdn.exec:\dnvfdn.exe110⤵
-
\??\c:\nlxfp.exec:\nlxfp.exe111⤵
-
\??\c:\nrtbvvd.exec:\nrtbvvd.exe112⤵
-
\??\c:\jdtnfxt.exec:\jdtnfxt.exe113⤵
-
\??\c:\lxdfhv.exec:\lxdfhv.exe114⤵
-
\??\c:\ptjbftn.exec:\ptjbftn.exe115⤵
-
\??\c:\jrdfl.exec:\jrdfl.exe116⤵
-
\??\c:\hxtllt.exec:\hxtllt.exe117⤵
-
\??\c:\xbvjxjt.exec:\xbvjxjt.exe118⤵
-
\??\c:\ddlrl.exec:\ddlrl.exe119⤵
-
\??\c:\dhpjjf.exec:\dhpjjf.exe120⤵
-
\??\c:\jxdxj.exec:\jxdxj.exe121⤵
-
\??\c:\hbflf.exec:\hbflf.exe122⤵
-
\??\c:\vpfpj.exec:\vpfpj.exe123⤵
-
\??\c:\rfjvp.exec:\rfjvp.exe124⤵
-
\??\c:\nlhtd.exec:\nlhtd.exe125⤵
-
\??\c:\rnptldd.exec:\rnptldd.exe126⤵
-
\??\c:\ttfflv.exec:\ttfflv.exe127⤵
-
\??\c:\htftv.exec:\htftv.exe128⤵
-
\??\c:\lvffd.exec:\lvffd.exe129⤵
-
\??\c:\vtlrftb.exec:\vtlrftb.exe130⤵
-
\??\c:\bnjhnp.exec:\bnjhnp.exe131⤵
-
\??\c:\xlbnv.exec:\xlbnv.exe132⤵
-
\??\c:\dbnfv.exec:\dbnfv.exe133⤵
-
\??\c:\btptvbd.exec:\btptvbd.exe134⤵
-
\??\c:\rbhprvf.exec:\rbhprvf.exe135⤵
-
\??\c:\bxrxxdv.exec:\bxrxxdv.exe136⤵
-
\??\c:\rtbtvvn.exec:\rtbtvvn.exe137⤵
-
\??\c:\ddjvtf.exec:\ddjvtf.exe138⤵
-
\??\c:\vpfbn.exec:\vpfbn.exe139⤵
-
\??\c:\bhpnnrn.exec:\bhpnnrn.exe140⤵
-
\??\c:\lrvrvr.exec:\lrvrvr.exe141⤵
-
\??\c:\bbbxfpx.exec:\bbbxfpx.exe142⤵
-
\??\c:\nxbnt.exec:\nxbnt.exe143⤵
-
\??\c:\jtrnfdp.exec:\jtrnfdp.exe144⤵
-
\??\c:\vddftrn.exec:\vddftrn.exe145⤵
-
\??\c:\plxvvpj.exec:\plxvvpj.exe146⤵
-
\??\c:\tftpx.exec:\tftpx.exe147⤵
-
\??\c:\xrdfnbx.exec:\xrdfnbx.exe148⤵
-
\??\c:\xjbvb.exec:\xjbvb.exe149⤵
-
\??\c:\jvtfnx.exec:\jvtfnx.exe150⤵
-
\??\c:\jfbfvfx.exec:\jfbfvfx.exe151⤵
-
\??\c:\ldrxljf.exec:\ldrxljf.exe152⤵
-
\??\c:\ptbhhln.exec:\ptbhhln.exe153⤵
-
\??\c:\vvjvdv.exec:\vvjvdv.exe154⤵
-
\??\c:\fldtp.exec:\fldtp.exe155⤵
-
\??\c:\xrfbtf.exec:\xrfbtf.exe156⤵
-
\??\c:\hdjln.exec:\hdjln.exe157⤵
-
\??\c:\bjdlxdx.exec:\bjdlxdx.exe158⤵
-
\??\c:\tnnxhxb.exec:\tnnxhxb.exe159⤵
-
\??\c:\lbjtj.exec:\lbjtj.exe160⤵
-
\??\c:\jttft.exec:\jttft.exe161⤵
-
\??\c:\hvnnl.exec:\hvnnl.exe162⤵
-
\??\c:\vjfvd.exec:\vjfvd.exe163⤵
-
\??\c:\rdfxrt.exec:\rdfxrt.exe164⤵
-
\??\c:\nltvdr.exec:\nltvdr.exe165⤵
-
\??\c:\jvnnbvt.exec:\jvnnbvt.exe166⤵
-
\??\c:\dhnnnpb.exec:\dhnnnpb.exe167⤵
-
\??\c:\hnhnhd.exec:\hnhnhd.exe168⤵
-
\??\c:\nnllb.exec:\nnllb.exe169⤵
-
\??\c:\rdxtdt.exec:\rdxtdt.exe170⤵
-
\??\c:\rlpfnjd.exec:\rlpfnjd.exe171⤵
-
\??\c:\jxtdnpj.exec:\jxtdnpj.exe172⤵
-
\??\c:\ptfjvjn.exec:\ptfjvjn.exe173⤵
-
\??\c:\njxnr.exec:\njxnr.exe174⤵
-
\??\c:\xfrvbxr.exec:\xfrvbxr.exe175⤵
-
\??\c:\tdllxj.exec:\tdllxj.exe176⤵
-
\??\c:\dfxpxf.exec:\dfxpxf.exe177⤵
-
\??\c:\jfdrbbt.exec:\jfdrbbt.exe178⤵
-
\??\c:\ntffvjj.exec:\ntffvjj.exe179⤵
-
\??\c:\nrjpt.exec:\nrjpt.exe180⤵
-
\??\c:\bxvrjff.exec:\bxvrjff.exe181⤵
-
\??\c:\btxvvdh.exec:\btxvvdh.exe182⤵
-
\??\c:\pnfvd.exec:\pnfvd.exe183⤵
-
\??\c:\xrtpfp.exec:\xrtpfp.exe184⤵
-
\??\c:\bjxjlnx.exec:\bjxjlnx.exe185⤵
-
\??\c:\xtlxh.exec:\xtlxh.exe186⤵
-
\??\c:\fprhbv.exec:\fprhbv.exe187⤵
-
\??\c:\ddvff.exec:\ddvff.exe188⤵
-
\??\c:\trxpvbn.exec:\trxpvbn.exe189⤵
-
\??\c:\bllnn.exec:\bllnn.exe190⤵
-
\??\c:\jbxvlh.exec:\jbxvlh.exe191⤵
-
\??\c:\ptdhh.exec:\ptdhh.exe192⤵
-
\??\c:\btbjrpr.exec:\btbjrpr.exe193⤵
-
\??\c:\fdnnf.exec:\fdnnf.exe194⤵
-
\??\c:\njddfx.exec:\njddfx.exe195⤵
-
\??\c:\tvrfn.exec:\tvrfn.exe196⤵
-
\??\c:\tldlnt.exec:\tldlnt.exe197⤵
-
\??\c:\ndbrrtj.exec:\ndbrrtj.exe198⤵
-
\??\c:\xvbddxn.exec:\xvbddxn.exe199⤵
-
\??\c:\xnvrvp.exec:\xnvrvp.exe200⤵
-
\??\c:\xpfxht.exec:\xpfxht.exe201⤵
-
\??\c:\rbbhtt.exec:\rbbhtt.exe202⤵
-
\??\c:\fhnlntr.exec:\fhnlntr.exe203⤵
-
\??\c:\hltjh.exec:\hltjh.exe204⤵
-
\??\c:\xvlhnrp.exec:\xvlhnrp.exe205⤵
-
\??\c:\nplhpn.exec:\nplhpn.exe206⤵
-
\??\c:\njvnpv.exec:\njvnpv.exe207⤵
-
\??\c:\hvlxfht.exec:\hvlxfht.exe208⤵
-
\??\c:\ldhxnj.exec:\ldhxnj.exe209⤵
-
\??\c:\hnlhl.exec:\hnlhl.exe210⤵
-
\??\c:\ldtxdxr.exec:\ldtxdxr.exe211⤵
-
\??\c:\vdnxbtn.exec:\vdnxbtn.exe212⤵
-
\??\c:\hjvhpt.exec:\hjvhpt.exe213⤵
-
\??\c:\jpfrvfj.exec:\jpfrvfj.exe214⤵
-
\??\c:\bhfpbhd.exec:\bhfpbhd.exe215⤵
-
\??\c:\vfrfh.exec:\vfrfh.exe216⤵
-
\??\c:\tffff.exec:\tffff.exe217⤵
-
\??\c:\fxfdb.exec:\fxfdb.exe218⤵
-
\??\c:\phjrdl.exec:\phjrdl.exe219⤵
-
\??\c:\dpthn.exec:\dpthn.exe220⤵
-
\??\c:\ffhbjvd.exec:\ffhbjvd.exe221⤵
-
\??\c:\vxbtx.exec:\vxbtx.exe222⤵
-
\??\c:\fpfjf.exec:\fpfjf.exe223⤵
-
\??\c:\flpft.exec:\flpft.exe224⤵
-
\??\c:\tjhvl.exec:\tjhvl.exe225⤵
-
\??\c:\bnlpfd.exec:\bnlpfd.exe226⤵
-
\??\c:\jdpjdx.exec:\jdpjdx.exe227⤵
-
\??\c:\dlnjjv.exec:\dlnjjv.exe228⤵
-
\??\c:\pbhdphd.exec:\pbhdphd.exe229⤵
-
\??\c:\tjvhhr.exec:\tjvhhr.exe230⤵
-
\??\c:\hpxljj.exec:\hpxljj.exe231⤵
-
\??\c:\jbhvpj.exec:\jbhvpj.exe232⤵
-
\??\c:\xjdrhtj.exec:\xjdrhtj.exe233⤵
-
\??\c:\vbtndnx.exec:\vbtndnx.exe234⤵
-
\??\c:\pjvxt.exec:\pjvxt.exe235⤵
-
\??\c:\rfltd.exec:\rfltd.exe236⤵
-
\??\c:\vdnjn.exec:\vdnjn.exe237⤵
-
\??\c:\hvlhtlv.exec:\hvlhtlv.exe238⤵
-
\??\c:\fxvfp.exec:\fxvfp.exe239⤵
-
\??\c:\phrrl.exec:\phrrl.exe240⤵
-
\??\c:\rdnpll.exec:\rdnpll.exe241⤵