Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 02:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
74d38a19512bb52aabec58d437595be0_NeikiAnalytics.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
74d38a19512bb52aabec58d437595be0_NeikiAnalytics.exe
-
Size
89KB
-
MD5
74d38a19512bb52aabec58d437595be0
-
SHA1
d67724f15ab00ee5fce41a725a6fdca9b2a427d3
-
SHA256
6074548346ab0e8ac394553459b35e5676d54b39213748c92de8d375c48da86e
-
SHA512
35a90f2ff237eea08bf3015b920a0adb0e16483bc1b85ad7972425dbf3973def6b9c67c330e08f2d37630d6b481a4acf86b44ea3b897afc4a8100a18d81578c2
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDISoFGDvPGB1haZJOzU:ymb3NkkiQ3mdBjFIk7+czl
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/3592-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3932-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4728-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4900-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1628-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4568-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4324-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1320-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3828-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3220-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2012-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2592-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3408-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4340-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2312-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1080-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4516-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1708-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/908-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5052-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3916-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4936-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2392-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2628-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3176-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
5flflff.exexrrrlll.exe9nnnnn.exepjvjd.exe7lxlrrr.exelxfxxlx.exe5bbbbt.exejddvp.exehnhbtb.exevjpjd.exeddppp.exefffffff.exehhtbbh.exejvvvv.exe1ffrlll.exexxfffff.exetntnhb.exevdjjp.exelrrlflf.exe3llfrrl.exejdddv.exejvjdv.exefrxlxrx.exenhtnbb.exevjdvp.exexlfrlfr.exennbtbh.exe5nthtt.exe5dvvj.exedpppd.exerrrrrrr.exetntntb.exe9pppj.exe3xxxrff.exe9dpjd.exe1vddv.exefrxrllf.exe7tnnhh.exejdddv.exejjjvp.exexrxxrxf.exe7bhhbb.exetttnnn.exeppdpp.exe5xffrxx.exe1xrllfl.exenhttbb.exe1pddd.exerlrlrff.exentttbb.exe9bhhbh.exe1dvvv.exeffxfffx.exebhtnnn.exebtntnh.exe1pdjd.exerlfxrlf.exexfrllfr.exetnbbhh.exedvddd.exerlffxrl.exehnttnt.exedjpvj.exe5jjpj.exepid process 3932 5flflff.exe 4568 xrrrlll.exe 4728 9nnnnn.exe 1628 pjvjd.exe 4900 7lxlrrr.exe 1320 lxfxxlx.exe 4324 5bbbbt.exe 3828 jddvp.exe 3220 hnhbtb.exe 2012 vjpjd.exe 2592 ddppp.exe 3408 fffffff.exe 4348 hhtbbh.exe 4340 jvvvv.exe 2312 1ffrlll.exe 1080 xxfffff.exe 4032 tntnhb.exe 4516 vdjjp.exe 1708 lrrlflf.exe 908 3llfrrl.exe 5052 jdddv.exe 3916 jvjdv.exe 1888 frxlxrx.exe 4936 nhtnbb.exe 1988 vjdvp.exe 2392 xlfrlfr.exe 2628 nnbtbh.exe 4016 5nthtt.exe 232 5dvvj.exe 3176 dpppd.exe 2424 rrrrrrr.exe 3504 tntntb.exe 3568 9pppj.exe 4436 3xxxrff.exe 1808 9dpjd.exe 624 1vddv.exe 2348 frxrllf.exe 628 7tnnhh.exe 2928 jdddv.exe 2520 jjjvp.exe 3868 xrxxrxf.exe 4620 7bhhbb.exe 3760 tttnnn.exe 3932 ppdpp.exe 3588 5xffrxx.exe 208 1xrllfl.exe 224 nhttbb.exe 2656 1pddd.exe 3580 rlrlrff.exe 1492 ntttbb.exe 2720 9bhhbh.exe 3556 1dvvv.exe 3088 ffxfffx.exe 3416 bhtnnn.exe 2012 btntnh.exe 3384 1pdjd.exe 1036 rlfxrlf.exe 3436 xfrllfr.exe 4348 tnbbhh.exe 3772 dvddd.exe 2312 rlffxrl.exe 4592 hnttnt.exe 1804 djpvj.exe 1876 5jjpj.exe -
Processes:
resource yara_rule behavioral2/memory/3592-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3932-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4728-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4900-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1628-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4568-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4324-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1320-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3828-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3220-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2012-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2592-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3408-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4340-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2312-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1080-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4516-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1708-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/908-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5052-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3916-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4936-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2392-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2628-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3176-196-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
74d38a19512bb52aabec58d437595be0_NeikiAnalytics.exe5flflff.exexrrrlll.exe9nnnnn.exepjvjd.exe7lxlrrr.exelxfxxlx.exe5bbbbt.exejddvp.exehnhbtb.exevjpjd.exeddppp.exefffffff.exehhtbbh.exejvvvv.exe1ffrlll.exexxfffff.exetntnhb.exevdjjp.exelrrlflf.exe3llfrrl.exejdddv.exedescription pid process target process PID 3592 wrote to memory of 3932 3592 74d38a19512bb52aabec58d437595be0_NeikiAnalytics.exe 5flflff.exe PID 3592 wrote to memory of 3932 3592 74d38a19512bb52aabec58d437595be0_NeikiAnalytics.exe 5flflff.exe PID 3592 wrote to memory of 3932 3592 74d38a19512bb52aabec58d437595be0_NeikiAnalytics.exe 5flflff.exe PID 3932 wrote to memory of 4568 3932 5flflff.exe xrrrlll.exe PID 3932 wrote to memory of 4568 3932 5flflff.exe xrrrlll.exe PID 3932 wrote to memory of 4568 3932 5flflff.exe xrrrlll.exe PID 4568 wrote to memory of 4728 4568 xrrrlll.exe 9nnnnn.exe PID 4568 wrote to memory of 4728 4568 xrrrlll.exe 9nnnnn.exe PID 4568 wrote to memory of 4728 4568 xrrrlll.exe 9nnnnn.exe PID 4728 wrote to memory of 1628 4728 9nnnnn.exe pjvjd.exe PID 4728 wrote to memory of 1628 4728 9nnnnn.exe pjvjd.exe PID 4728 wrote to memory of 1628 4728 9nnnnn.exe pjvjd.exe PID 1628 wrote to memory of 4900 1628 pjvjd.exe 7lxlrrr.exe PID 1628 wrote to memory of 4900 1628 pjvjd.exe 7lxlrrr.exe PID 1628 wrote to memory of 4900 1628 pjvjd.exe 7lxlrrr.exe PID 4900 wrote to memory of 1320 4900 7lxlrrr.exe lxfxxlx.exe PID 4900 wrote to memory of 1320 4900 7lxlrrr.exe lxfxxlx.exe PID 4900 wrote to memory of 1320 4900 7lxlrrr.exe lxfxxlx.exe PID 1320 wrote to memory of 4324 1320 lxfxxlx.exe 5bbbbt.exe PID 1320 wrote to memory of 4324 1320 lxfxxlx.exe 5bbbbt.exe PID 1320 wrote to memory of 4324 1320 lxfxxlx.exe 5bbbbt.exe PID 4324 wrote to memory of 3828 4324 5bbbbt.exe jddvp.exe PID 4324 wrote to memory of 3828 4324 5bbbbt.exe jddvp.exe PID 4324 wrote to memory of 3828 4324 5bbbbt.exe jddvp.exe PID 3828 wrote to memory of 3220 3828 jddvp.exe hnhbtb.exe PID 3828 wrote to memory of 3220 3828 jddvp.exe hnhbtb.exe PID 3828 wrote to memory of 3220 3828 jddvp.exe hnhbtb.exe PID 3220 wrote to memory of 2012 3220 hnhbtb.exe vjpjd.exe PID 3220 wrote to memory of 2012 3220 hnhbtb.exe vjpjd.exe PID 3220 wrote to memory of 2012 3220 hnhbtb.exe vjpjd.exe PID 2012 wrote to memory of 2592 2012 vjpjd.exe ddppp.exe PID 2012 wrote to memory of 2592 2012 vjpjd.exe ddppp.exe PID 2012 wrote to memory of 2592 2012 vjpjd.exe ddppp.exe PID 2592 wrote to memory of 3408 2592 ddppp.exe fffffff.exe PID 2592 wrote to memory of 3408 2592 ddppp.exe fffffff.exe PID 2592 wrote to memory of 3408 2592 ddppp.exe fffffff.exe PID 3408 wrote to memory of 4348 3408 fffffff.exe hhtbbh.exe PID 3408 wrote to memory of 4348 3408 fffffff.exe hhtbbh.exe PID 3408 wrote to memory of 4348 3408 fffffff.exe hhtbbh.exe PID 4348 wrote to memory of 4340 4348 hhtbbh.exe jvvvv.exe PID 4348 wrote to memory of 4340 4348 hhtbbh.exe jvvvv.exe PID 4348 wrote to memory of 4340 4348 hhtbbh.exe jvvvv.exe PID 4340 wrote to memory of 2312 4340 jvvvv.exe 1ffrlll.exe PID 4340 wrote to memory of 2312 4340 jvvvv.exe 1ffrlll.exe PID 4340 wrote to memory of 2312 4340 jvvvv.exe 1ffrlll.exe PID 2312 wrote to memory of 1080 2312 1ffrlll.exe xxfffff.exe PID 2312 wrote to memory of 1080 2312 1ffrlll.exe xxfffff.exe PID 2312 wrote to memory of 1080 2312 1ffrlll.exe xxfffff.exe PID 1080 wrote to memory of 4032 1080 xxfffff.exe tntnhb.exe PID 1080 wrote to memory of 4032 1080 xxfffff.exe tntnhb.exe PID 1080 wrote to memory of 4032 1080 xxfffff.exe tntnhb.exe PID 4032 wrote to memory of 4516 4032 tntnhb.exe vdjjp.exe PID 4032 wrote to memory of 4516 4032 tntnhb.exe vdjjp.exe PID 4032 wrote to memory of 4516 4032 tntnhb.exe vdjjp.exe PID 4516 wrote to memory of 1708 4516 vdjjp.exe lrrlflf.exe PID 4516 wrote to memory of 1708 4516 vdjjp.exe lrrlflf.exe PID 4516 wrote to memory of 1708 4516 vdjjp.exe lrrlflf.exe PID 1708 wrote to memory of 908 1708 lrrlflf.exe 3llfrrl.exe PID 1708 wrote to memory of 908 1708 lrrlflf.exe 3llfrrl.exe PID 1708 wrote to memory of 908 1708 lrrlflf.exe 3llfrrl.exe PID 908 wrote to memory of 5052 908 3llfrrl.exe jdddv.exe PID 908 wrote to memory of 5052 908 3llfrrl.exe jdddv.exe PID 908 wrote to memory of 5052 908 3llfrrl.exe jdddv.exe PID 5052 wrote to memory of 3916 5052 jdddv.exe jvjdv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74d38a19512bb52aabec58d437595be0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\74d38a19512bb52aabec58d437595be0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\5flflff.exec:\5flflff.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrrrlll.exec:\xrrrlll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9nnnnn.exec:\9nnnnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjvjd.exec:\pjvjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7lxlrrr.exec:\7lxlrrr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxfxxlx.exec:\lxfxxlx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5bbbbt.exec:\5bbbbt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jddvp.exec:\jddvp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hnhbtb.exec:\hnhbtb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjpjd.exec:\vjpjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddppp.exec:\ddppp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fffffff.exec:\fffffff.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhtbbh.exec:\hhtbbh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvvvv.exec:\jvvvv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1ffrlll.exec:\1ffrlll.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxfffff.exec:\xxfffff.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tntnhb.exec:\tntnhb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vdjjp.exec:\vdjjp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrrlflf.exec:\lrrlflf.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3llfrrl.exec:\3llfrrl.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdddv.exec:\jdddv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvjdv.exec:\jvjdv.exe23⤵
- Executes dropped EXE
-
\??\c:\frxlxrx.exec:\frxlxrx.exe24⤵
- Executes dropped EXE
-
\??\c:\nhtnbb.exec:\nhtnbb.exe25⤵
- Executes dropped EXE
-
\??\c:\vjdvp.exec:\vjdvp.exe26⤵
- Executes dropped EXE
-
\??\c:\xlfrlfr.exec:\xlfrlfr.exe27⤵
- Executes dropped EXE
-
\??\c:\nnbtbh.exec:\nnbtbh.exe28⤵
- Executes dropped EXE
-
\??\c:\5nthtt.exec:\5nthtt.exe29⤵
- Executes dropped EXE
-
\??\c:\5dvvj.exec:\5dvvj.exe30⤵
- Executes dropped EXE
-
\??\c:\dpppd.exec:\dpppd.exe31⤵
- Executes dropped EXE
-
\??\c:\rrrrrrr.exec:\rrrrrrr.exe32⤵
- Executes dropped EXE
-
\??\c:\tntntb.exec:\tntntb.exe33⤵
- Executes dropped EXE
-
\??\c:\9pppj.exec:\9pppj.exe34⤵
- Executes dropped EXE
-
\??\c:\3xxxrff.exec:\3xxxrff.exe35⤵
- Executes dropped EXE
-
\??\c:\9dpjd.exec:\9dpjd.exe36⤵
- Executes dropped EXE
-
\??\c:\1vddv.exec:\1vddv.exe37⤵
- Executes dropped EXE
-
\??\c:\frxrllf.exec:\frxrllf.exe38⤵
- Executes dropped EXE
-
\??\c:\7tnnhh.exec:\7tnnhh.exe39⤵
- Executes dropped EXE
-
\??\c:\jdddv.exec:\jdddv.exe40⤵
- Executes dropped EXE
-
\??\c:\jjjvp.exec:\jjjvp.exe41⤵
- Executes dropped EXE
-
\??\c:\xrxxrxf.exec:\xrxxrxf.exe42⤵
- Executes dropped EXE
-
\??\c:\7bhhbb.exec:\7bhhbb.exe43⤵
- Executes dropped EXE
-
\??\c:\tttnnn.exec:\tttnnn.exe44⤵
- Executes dropped EXE
-
\??\c:\ppdpp.exec:\ppdpp.exe45⤵
- Executes dropped EXE
-
\??\c:\5xffrxx.exec:\5xffrxx.exe46⤵
- Executes dropped EXE
-
\??\c:\1xrllfl.exec:\1xrllfl.exe47⤵
- Executes dropped EXE
-
\??\c:\nhttbb.exec:\nhttbb.exe48⤵
- Executes dropped EXE
-
\??\c:\1pddd.exec:\1pddd.exe49⤵
- Executes dropped EXE
-
\??\c:\rlrlrff.exec:\rlrlrff.exe50⤵
- Executes dropped EXE
-
\??\c:\ntttbb.exec:\ntttbb.exe51⤵
- Executes dropped EXE
-
\??\c:\9bhhbh.exec:\9bhhbh.exe52⤵
- Executes dropped EXE
-
\??\c:\1dvvv.exec:\1dvvv.exe53⤵
- Executes dropped EXE
-
\??\c:\ffxfffx.exec:\ffxfffx.exe54⤵
- Executes dropped EXE
-
\??\c:\bhtnnn.exec:\bhtnnn.exe55⤵
- Executes dropped EXE
-
\??\c:\btntnh.exec:\btntnh.exe56⤵
- Executes dropped EXE
-
\??\c:\1pdjd.exec:\1pdjd.exe57⤵
- Executes dropped EXE
-
\??\c:\rlfxrlf.exec:\rlfxrlf.exe58⤵
- Executes dropped EXE
-
\??\c:\xfrllfr.exec:\xfrllfr.exe59⤵
- Executes dropped EXE
-
\??\c:\tnbbhh.exec:\tnbbhh.exe60⤵
- Executes dropped EXE
-
\??\c:\dvddd.exec:\dvddd.exe61⤵
- Executes dropped EXE
-
\??\c:\rlffxrl.exec:\rlffxrl.exe62⤵
- Executes dropped EXE
-
\??\c:\hnttnt.exec:\hnttnt.exe63⤵
- Executes dropped EXE
-
\??\c:\djpvj.exec:\djpvj.exe64⤵
- Executes dropped EXE
-
\??\c:\5jjpj.exec:\5jjpj.exe65⤵
- Executes dropped EXE
-
\??\c:\rlfxllf.exec:\rlfxllf.exe66⤵
-
\??\c:\xfrxlrf.exec:\xfrxlrf.exe67⤵
-
\??\c:\3bbbtn.exec:\3bbbtn.exe68⤵
-
\??\c:\tnbtbb.exec:\tnbtbb.exe69⤵
-
\??\c:\ppdvv.exec:\ppdvv.exe70⤵
-
\??\c:\rlffrrr.exec:\rlffrrr.exe71⤵
-
\??\c:\btthhb.exec:\btthhb.exe72⤵
-
\??\c:\jvdvv.exec:\jvdvv.exe73⤵
-
\??\c:\jpjjd.exec:\jpjjd.exe74⤵
-
\??\c:\xlxrffx.exec:\xlxrffx.exe75⤵
-
\??\c:\flxrllf.exec:\flxrllf.exe76⤵
-
\??\c:\9thhtt.exec:\9thhtt.exe77⤵
-
\??\c:\tbhhbh.exec:\tbhhbh.exe78⤵
-
\??\c:\5pvvj.exec:\5pvvj.exe79⤵
-
\??\c:\7rxxrlr.exec:\7rxxrlr.exe80⤵
-
\??\c:\bnhbtn.exec:\bnhbtn.exe81⤵
-
\??\c:\pjjdv.exec:\pjjdv.exe82⤵
-
\??\c:\vpvvp.exec:\vpvvp.exe83⤵
-
\??\c:\rxfxrrr.exec:\rxfxrrr.exe84⤵
-
\??\c:\xllfxxx.exec:\xllfxxx.exe85⤵
-
\??\c:\bnhnhb.exec:\bnhnhb.exe86⤵
-
\??\c:\5vjvd.exec:\5vjvd.exe87⤵
-
\??\c:\xrlxxxl.exec:\xrlxxxl.exe88⤵
-
\??\c:\lflllfx.exec:\lflllfx.exe89⤵
-
\??\c:\5bbbtt.exec:\5bbbtt.exe90⤵
-
\??\c:\httnbb.exec:\httnbb.exe91⤵
-
\??\c:\dppjd.exec:\dppjd.exe92⤵
-
\??\c:\rrlxxff.exec:\rrlxxff.exe93⤵
-
\??\c:\lrxlfff.exec:\lrxlfff.exe94⤵
-
\??\c:\btthtt.exec:\btthtt.exe95⤵
-
\??\c:\pppvp.exec:\pppvp.exe96⤵
-
\??\c:\3rxlffx.exec:\3rxlffx.exe97⤵
-
\??\c:\nnnnnn.exec:\nnnnnn.exe98⤵
-
\??\c:\bnnnhh.exec:\bnnnhh.exe99⤵
-
\??\c:\dppjd.exec:\dppjd.exe100⤵
-
\??\c:\rrxrfrr.exec:\rrxrfrr.exe101⤵
-
\??\c:\5ntttn.exec:\5ntttn.exe102⤵
-
\??\c:\bbtthh.exec:\bbtthh.exe103⤵
-
\??\c:\jpjjp.exec:\jpjjp.exe104⤵
-
\??\c:\lxllrrf.exec:\lxllrrf.exe105⤵
-
\??\c:\tbbbhb.exec:\tbbbhb.exe106⤵
-
\??\c:\5hhhhn.exec:\5hhhhn.exe107⤵
-
\??\c:\5ddpj.exec:\5ddpj.exe108⤵
-
\??\c:\fxlfrrx.exec:\fxlfrrx.exe109⤵
-
\??\c:\rrlfffx.exec:\rrlfffx.exe110⤵
-
\??\c:\hbhhhh.exec:\hbhhhh.exe111⤵
-
\??\c:\7htnbb.exec:\7htnbb.exe112⤵
-
\??\c:\vppjp.exec:\vppjp.exe113⤵
-
\??\c:\tbnnht.exec:\tbnnht.exe114⤵
-
\??\c:\hhnhtt.exec:\hhnhtt.exe115⤵
-
\??\c:\9vddv.exec:\9vddv.exe116⤵
-
\??\c:\djjdd.exec:\djjdd.exe117⤵
-
\??\c:\7llxrrl.exec:\7llxrrl.exe118⤵
-
\??\c:\rxfrfxl.exec:\rxfrfxl.exe119⤵
-
\??\c:\htbbth.exec:\htbbth.exe120⤵
-
\??\c:\3bnhbb.exec:\3bnhbb.exe121⤵
-
\??\c:\9jddd.exec:\9jddd.exe122⤵
-
\??\c:\jdddv.exec:\jdddv.exe123⤵
-
\??\c:\9xlflrl.exec:\9xlflrl.exe124⤵
-
\??\c:\bntnht.exec:\bntnht.exe125⤵
-
\??\c:\bntnhh.exec:\bntnhh.exe126⤵
-
\??\c:\lrrlfxx.exec:\lrrlfxx.exe127⤵
-
\??\c:\httttt.exec:\httttt.exe128⤵
-
\??\c:\vppjj.exec:\vppjj.exe129⤵
-
\??\c:\xlrllll.exec:\xlrllll.exe130⤵
-
\??\c:\rrllfff.exec:\rrllfff.exe131⤵
-
\??\c:\7ntbbn.exec:\7ntbbn.exe132⤵
-
\??\c:\vdvpj.exec:\vdvpj.exe133⤵
-
\??\c:\pdpjd.exec:\pdpjd.exe134⤵
-
\??\c:\rffrrxx.exec:\rffrrxx.exe135⤵
-
\??\c:\vdpjp.exec:\vdpjp.exe136⤵
-
\??\c:\flfflrf.exec:\flfflrf.exe137⤵
-
\??\c:\tbttnh.exec:\tbttnh.exe138⤵
-
\??\c:\fxrrxxl.exec:\fxrrxxl.exe139⤵
-
\??\c:\nnhhbb.exec:\nnhhbb.exe140⤵
-
\??\c:\7bhtnn.exec:\7bhtnn.exe141⤵
-
\??\c:\3djjp.exec:\3djjp.exe142⤵
-
\??\c:\5xllfll.exec:\5xllfll.exe143⤵
-
\??\c:\1bhbnn.exec:\1bhbnn.exe144⤵
-
\??\c:\5nnnbb.exec:\5nnnbb.exe145⤵
-
\??\c:\pjjdp.exec:\pjjdp.exe146⤵
-
\??\c:\jpjdv.exec:\jpjdv.exe147⤵
-
\??\c:\fxxrrll.exec:\fxxrrll.exe148⤵
-
\??\c:\9ntthh.exec:\9ntthh.exe149⤵
-
\??\c:\vdddv.exec:\vdddv.exe150⤵
-
\??\c:\9vvvp.exec:\9vvvp.exe151⤵
-
\??\c:\fflrxrr.exec:\fflrxrr.exe152⤵
-
\??\c:\3hnhhh.exec:\3hnhhh.exe153⤵
-
\??\c:\btbtbb.exec:\btbtbb.exe154⤵
-
\??\c:\ppvpp.exec:\ppvpp.exe155⤵
-
\??\c:\djvpj.exec:\djvpj.exe156⤵
-
\??\c:\lrrxxlr.exec:\lrrxxlr.exe157⤵
-
\??\c:\rlrxrrr.exec:\rlrxrrr.exe158⤵
-
\??\c:\tnhtnb.exec:\tnhtnb.exe159⤵
-
\??\c:\9pvvp.exec:\9pvvp.exe160⤵
-
\??\c:\lfrlflf.exec:\lfrlflf.exe161⤵
-
\??\c:\rlxxrrr.exec:\rlxxrrr.exe162⤵
-
\??\c:\bnbnhn.exec:\bnbnhn.exe163⤵
-
\??\c:\dvjjp.exec:\dvjjp.exe164⤵
-
\??\c:\fxxrffx.exec:\fxxrffx.exe165⤵
-
\??\c:\xlllffx.exec:\xlllffx.exe166⤵
-
\??\c:\3btnhn.exec:\3btnhn.exe167⤵
-
\??\c:\bnnthh.exec:\bnnthh.exe168⤵
-
\??\c:\ppvvp.exec:\ppvvp.exe169⤵
-
\??\c:\lrrrfxx.exec:\lrrrfxx.exe170⤵
-
\??\c:\lxfxrrr.exec:\lxfxrrr.exe171⤵
-
\??\c:\5tbbbb.exec:\5tbbbb.exe172⤵
-
\??\c:\dpvvp.exec:\dpvvp.exe173⤵
-
\??\c:\rffxllf.exec:\rffxllf.exe174⤵
-
\??\c:\rrrrrff.exec:\rrrrrff.exe175⤵
-
\??\c:\9ntttt.exec:\9ntttt.exe176⤵
-
\??\c:\hhtbhh.exec:\hhtbhh.exe177⤵
-
\??\c:\pdjjd.exec:\pdjjd.exe178⤵
-
\??\c:\frrrlff.exec:\frrrlff.exe179⤵
-
\??\c:\xrffrxx.exec:\xrffrxx.exe180⤵
-
\??\c:\nnnnnn.exec:\nnnnnn.exe181⤵
-
\??\c:\9hnhbn.exec:\9hnhbn.exe182⤵
-
\??\c:\dpppj.exec:\dpppj.exe183⤵
-
\??\c:\lflxrlf.exec:\lflxrlf.exe184⤵
-
\??\c:\ntbbbb.exec:\ntbbbb.exe185⤵
-
\??\c:\7httnn.exec:\7httnn.exe186⤵
-
\??\c:\djpjd.exec:\djpjd.exe187⤵
-
\??\c:\9xxrffr.exec:\9xxrffr.exe188⤵
-
\??\c:\xrxrlfx.exec:\xrxrlfx.exe189⤵
-
\??\c:\bbnnhh.exec:\bbnnhh.exe190⤵
-
\??\c:\pjjvd.exec:\pjjvd.exe191⤵
-
\??\c:\jpddv.exec:\jpddv.exe192⤵
-
\??\c:\lxlfxxr.exec:\lxlfxxr.exe193⤵
-
\??\c:\tthnnn.exec:\tthnnn.exe194⤵
-
\??\c:\hhtnhb.exec:\hhtnhb.exe195⤵
-
\??\c:\pvvjp.exec:\pvvjp.exe196⤵
-
\??\c:\jjpjj.exec:\jjpjj.exe197⤵
-
\??\c:\rxfxrrl.exec:\rxfxrrl.exe198⤵
-
\??\c:\frffflf.exec:\frffflf.exe199⤵
-
\??\c:\nhbhtt.exec:\nhbhtt.exe200⤵
-
\??\c:\vvpvv.exec:\vvpvv.exe201⤵
-
\??\c:\vvvjd.exec:\vvvjd.exe202⤵
-
\??\c:\lllfllr.exec:\lllfllr.exe203⤵
-
\??\c:\rxxrflx.exec:\rxxrflx.exe204⤵
-
\??\c:\httnhh.exec:\httnhh.exe205⤵
-
\??\c:\7jdpv.exec:\7jdpv.exe206⤵
-
\??\c:\pvppj.exec:\pvppj.exe207⤵
-
\??\c:\9llfxlf.exec:\9llfxlf.exe208⤵
-
\??\c:\hbnnnn.exec:\hbnnnn.exe209⤵
-
\??\c:\3dddv.exec:\3dddv.exe210⤵
-
\??\c:\9vdvp.exec:\9vdvp.exe211⤵
-
\??\c:\xrxrlll.exec:\xrxrlll.exe212⤵
-
\??\c:\rlllxfx.exec:\rlllxfx.exe213⤵
-
\??\c:\thnnhh.exec:\thnnhh.exe214⤵
-
\??\c:\jdppj.exec:\jdppj.exe215⤵
-
\??\c:\vvdvp.exec:\vvdvp.exe216⤵
-
\??\c:\xllllrl.exec:\xllllrl.exe217⤵
-
\??\c:\tnbbnn.exec:\tnbbnn.exe218⤵
-
\??\c:\3tbhhh.exec:\3tbhhh.exe219⤵
-
\??\c:\djjdv.exec:\djjdv.exe220⤵
-
\??\c:\pdjdp.exec:\pdjdp.exe221⤵
-
\??\c:\lflfxxx.exec:\lflfxxx.exe222⤵
-
\??\c:\xlllxxx.exec:\xlllxxx.exe223⤵
-
\??\c:\hhhbth.exec:\hhhbth.exe224⤵
-
\??\c:\5vdvj.exec:\5vdvj.exe225⤵
-
\??\c:\jjddp.exec:\jjddp.exe226⤵
-
\??\c:\xflfxxx.exec:\xflfxxx.exe227⤵
-
\??\c:\lffxrrr.exec:\lffxrrr.exe228⤵
-
\??\c:\1hhhbh.exec:\1hhhbh.exe229⤵
-
\??\c:\jvvvp.exec:\jvvvp.exe230⤵
-
\??\c:\jjppj.exec:\jjppj.exe231⤵
-
\??\c:\rlrfrrf.exec:\rlrfrrf.exe232⤵
-
\??\c:\flxrllf.exec:\flxrllf.exe233⤵
-
\??\c:\3httnn.exec:\3httnn.exe234⤵
-
\??\c:\pdjjp.exec:\pdjjp.exe235⤵
-
\??\c:\vvvvj.exec:\vvvvj.exe236⤵
-
\??\c:\3rrlffx.exec:\3rrlffx.exe237⤵
-
\??\c:\tbbbtt.exec:\tbbbtt.exe238⤵
-
\??\c:\tbnnhh.exec:\tbnnhh.exe239⤵
-
\??\c:\ppppd.exec:\ppppd.exe240⤵
-
\??\c:\ddvvv.exec:\ddvvv.exe241⤵