Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 03:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7de60b5e7b88211a00e69a09585b4950_NeikiAnalytics.exe
Resource
win7-20240508-en
5 signatures
150 seconds
General
-
Target
7de60b5e7b88211a00e69a09585b4950_NeikiAnalytics.exe
-
Size
965KB
-
MD5
7de60b5e7b88211a00e69a09585b4950
-
SHA1
00dea446b2aa84ce0478d394f7c813c74f8bb76e
-
SHA256
9976bb75ff6a7815946aef4e4b625285545373fd96da73973d47b6b63e9468e6
-
SHA512
3a9d77616068edf5b10f943023aa7673dd3b5689197993680b3e65eda6647183a49ba2429090d896d9fa33085a0bd37aa68b229f43c5a052377294de9320ba9c
-
SSDEEP
12288:n3C9yMo+S0L9xRnoq7H9xqYL04iVypNKvzcMwdBS3b3aoqYveXVadBlHD+CURPO6:SgD4bhoqLDqYLagB6Wj1+Cysn
Malware Config
Signatures
-
Detect Blackmoon payload 27 IoCs
Processes:
resource yara_rule behavioral2/memory/3260-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2288-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/384-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4100-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/552-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4940-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4992-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1348-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5016-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3540-86-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1164-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3976-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4348-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1112-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2968-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3496-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2952-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4344-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3140-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4736-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1260-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4592-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3036-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3092-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/724-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1236-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
rxfxxrx.exe7hhtnn.exexxxllrl.exe5btnhh.exepvjjv.exehbhtnb.exejpvpp.exe5hhhbh.exevpvdd.exe7lrrxfl.exe5rxxrrl.exebtnbtt.exejjvvp.exerxxrlll.exelxxrlff.exe5btntt.exennnttt.exehhbttt.exebtbbtt.exebtbbbh.exe3djjd.exerlrrrrr.exepjvpv.exepjjjd.exentbbbn.exetnhbtn.exe7nhtnh.exellffxrl.exetnbnnn.exevpjjj.exe7dddd.exe1rrlfxr.exevdpjp.exepdjdd.exebbbbnt.exejdppj.exe9fxfxxf.exe5nnntt.exepppvv.exelflfxll.exebbhbtb.exedpjjv.exexrlfxfx.exenhnnnn.exepjpdd.exerlxrrrf.exevvdvv.exelxlrllf.exepddjp.exennntht.exedjpjp.exe3rxrrrr.exehthtnn.exepjjdd.exe7nnnhn.exe7ddvv.exelxlffff.exebnnnnn.exepddjp.exerfrxxff.exebbbbbb.exepdjvd.exeflfxxxx.exehnhnnt.exepid process 2288 rxfxxrx.exe 384 7hhtnn.exe 4100 xxxllrl.exe 552 5btnhh.exe 1192 pvjjv.exe 4940 hbhtnb.exe 4992 jpvpp.exe 2664 5hhhbh.exe 5016 vpvdd.exe 1348 7lrrxfl.exe 4576 5rxxrrl.exe 3540 btnbtt.exe 1164 jjvvp.exe 4348 rxxrlll.exe 3976 lxxrlff.exe 1112 5btntt.exe 2968 nnnttt.exe 3496 hhbttt.exe 2952 btbbtt.exe 4344 btbbbh.exe 3140 3djjd.exe 4736 rlrrrrr.exe 1260 pjvpv.exe 3656 pjjjd.exe 4592 ntbbbn.exe 3036 tnhbtn.exe 4616 7nhtnh.exe 3092 llffxrl.exe 724 tnbnnn.exe 3220 vpjjj.exe 1236 7dddd.exe 1788 1rrlfxr.exe 1476 vdpjp.exe 2616 pdjdd.exe 4804 bbbbnt.exe 3088 jdppj.exe 4100 9fxfxxf.exe 4512 5nnntt.exe 552 pppvv.exe 2696 lflfxll.exe 1692 bbhbtb.exe 2892 dpjjv.exe 1928 xrlfxfx.exe 4900 nhnnnn.exe 1512 pjpdd.exe 1388 rlxrrrf.exe 1820 vvdvv.exe 4904 lxlrllf.exe 5084 pddjp.exe 4548 nnntht.exe 1620 djpjp.exe 1724 3rxrrrr.exe 1528 hthtnn.exe 1112 pjjdd.exe 3016 7nnnhn.exe 4980 7ddvv.exe 4680 lxlffff.exe 408 bnnnnn.exe 4048 pddjp.exe 4532 rfrxxff.exe 2812 bbbbbb.exe 3124 pdjvd.exe 1260 flfxxxx.exe 4224 hnhnnt.exe -
Processes:
resource yara_rule behavioral2/memory/3260-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2288-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/384-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4100-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/552-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4940-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4992-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1348-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1348-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5016-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3540-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1164-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3976-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4348-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1112-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2968-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3496-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2952-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3140-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4736-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1260-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4592-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3036-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3092-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/724-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1236-201-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7de60b5e7b88211a00e69a09585b4950_NeikiAnalytics.exerxfxxrx.exe7hhtnn.exexxxllrl.exe5btnhh.exepvjjv.exehbhtnb.exejpvpp.exe5hhhbh.exevpvdd.exe7lrrxfl.exe5rxxrrl.exebtnbtt.exejjvvp.exerxxrlll.exelxxrlff.exe5btntt.exennnttt.exehhbttt.exebtbbtt.exebtbbbh.exe3djjd.exedescription pid process target process PID 3260 wrote to memory of 2288 3260 7de60b5e7b88211a00e69a09585b4950_NeikiAnalytics.exe rxfxxrx.exe PID 3260 wrote to memory of 2288 3260 7de60b5e7b88211a00e69a09585b4950_NeikiAnalytics.exe rxfxxrx.exe PID 3260 wrote to memory of 2288 3260 7de60b5e7b88211a00e69a09585b4950_NeikiAnalytics.exe rxfxxrx.exe PID 2288 wrote to memory of 384 2288 rxfxxrx.exe 7hhtnn.exe PID 2288 wrote to memory of 384 2288 rxfxxrx.exe 7hhtnn.exe PID 2288 wrote to memory of 384 2288 rxfxxrx.exe 7hhtnn.exe PID 384 wrote to memory of 4100 384 7hhtnn.exe xxxllrl.exe PID 384 wrote to memory of 4100 384 7hhtnn.exe xxxllrl.exe PID 384 wrote to memory of 4100 384 7hhtnn.exe xxxllrl.exe PID 4100 wrote to memory of 552 4100 xxxllrl.exe 5btnhh.exe PID 4100 wrote to memory of 552 4100 xxxllrl.exe 5btnhh.exe PID 4100 wrote to memory of 552 4100 xxxllrl.exe 5btnhh.exe PID 552 wrote to memory of 1192 552 5btnhh.exe pvjjv.exe PID 552 wrote to memory of 1192 552 5btnhh.exe pvjjv.exe PID 552 wrote to memory of 1192 552 5btnhh.exe pvjjv.exe PID 1192 wrote to memory of 4940 1192 pvjjv.exe hbhtnb.exe PID 1192 wrote to memory of 4940 1192 pvjjv.exe hbhtnb.exe PID 1192 wrote to memory of 4940 1192 pvjjv.exe hbhtnb.exe PID 4940 wrote to memory of 4992 4940 hbhtnb.exe jpvpp.exe PID 4940 wrote to memory of 4992 4940 hbhtnb.exe jpvpp.exe PID 4940 wrote to memory of 4992 4940 hbhtnb.exe jpvpp.exe PID 4992 wrote to memory of 2664 4992 jpvpp.exe 5hhhbh.exe PID 4992 wrote to memory of 2664 4992 jpvpp.exe 5hhhbh.exe PID 4992 wrote to memory of 2664 4992 jpvpp.exe 5hhhbh.exe PID 2664 wrote to memory of 5016 2664 5hhhbh.exe vpvdd.exe PID 2664 wrote to memory of 5016 2664 5hhhbh.exe vpvdd.exe PID 2664 wrote to memory of 5016 2664 5hhhbh.exe vpvdd.exe PID 5016 wrote to memory of 1348 5016 vpvdd.exe 7lrrxfl.exe PID 5016 wrote to memory of 1348 5016 vpvdd.exe 7lrrxfl.exe PID 5016 wrote to memory of 1348 5016 vpvdd.exe 7lrrxfl.exe PID 1348 wrote to memory of 4576 1348 7lrrxfl.exe 5rxxrrl.exe PID 1348 wrote to memory of 4576 1348 7lrrxfl.exe 5rxxrrl.exe PID 1348 wrote to memory of 4576 1348 7lrrxfl.exe 5rxxrrl.exe PID 4576 wrote to memory of 3540 4576 5rxxrrl.exe btnbtt.exe PID 4576 wrote to memory of 3540 4576 5rxxrrl.exe btnbtt.exe PID 4576 wrote to memory of 3540 4576 5rxxrrl.exe btnbtt.exe PID 3540 wrote to memory of 1164 3540 btnbtt.exe jjvvp.exe PID 3540 wrote to memory of 1164 3540 btnbtt.exe jjvvp.exe PID 3540 wrote to memory of 1164 3540 btnbtt.exe jjvvp.exe PID 1164 wrote to memory of 4348 1164 jjvvp.exe rxxrlll.exe PID 1164 wrote to memory of 4348 1164 jjvvp.exe rxxrlll.exe PID 1164 wrote to memory of 4348 1164 jjvvp.exe rxxrlll.exe PID 4348 wrote to memory of 3976 4348 rxxrlll.exe lxxrlff.exe PID 4348 wrote to memory of 3976 4348 rxxrlll.exe lxxrlff.exe PID 4348 wrote to memory of 3976 4348 rxxrlll.exe lxxrlff.exe PID 3976 wrote to memory of 1112 3976 lxxrlff.exe 5btntt.exe PID 3976 wrote to memory of 1112 3976 lxxrlff.exe 5btntt.exe PID 3976 wrote to memory of 1112 3976 lxxrlff.exe 5btntt.exe PID 1112 wrote to memory of 2968 1112 5btntt.exe nnnttt.exe PID 1112 wrote to memory of 2968 1112 5btntt.exe nnnttt.exe PID 1112 wrote to memory of 2968 1112 5btntt.exe nnnttt.exe PID 2968 wrote to memory of 3496 2968 nnnttt.exe hhbttt.exe PID 2968 wrote to memory of 3496 2968 nnnttt.exe hhbttt.exe PID 2968 wrote to memory of 3496 2968 nnnttt.exe hhbttt.exe PID 3496 wrote to memory of 2952 3496 hhbttt.exe btbbtt.exe PID 3496 wrote to memory of 2952 3496 hhbttt.exe btbbtt.exe PID 3496 wrote to memory of 2952 3496 hhbttt.exe btbbtt.exe PID 2952 wrote to memory of 4344 2952 btbbtt.exe btbbbh.exe PID 2952 wrote to memory of 4344 2952 btbbtt.exe btbbbh.exe PID 2952 wrote to memory of 4344 2952 btbbtt.exe btbbbh.exe PID 4344 wrote to memory of 3140 4344 btbbbh.exe 3djjd.exe PID 4344 wrote to memory of 3140 4344 btbbbh.exe 3djjd.exe PID 4344 wrote to memory of 3140 4344 btbbbh.exe 3djjd.exe PID 3140 wrote to memory of 4736 3140 3djjd.exe rlrrrrr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7de60b5e7b88211a00e69a09585b4950_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7de60b5e7b88211a00e69a09585b4950_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\rxfxxrx.exec:\rxfxxrx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7hhtnn.exec:\7hhtnn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xxxllrl.exec:\xxxllrl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5btnhh.exec:\5btnhh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvjjv.exec:\pvjjv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbhtnb.exec:\hbhtnb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpvpp.exec:\jpvpp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5hhhbh.exec:\5hhhbh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpvdd.exec:\vpvdd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7lrrxfl.exec:\7lrrxfl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5rxxrrl.exec:\5rxxrrl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btnbtt.exec:\btnbtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjvvp.exec:\jjvvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxxrlll.exec:\rxxrlll.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxxrlff.exec:\lxxrlff.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5btntt.exec:\5btntt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnnttt.exec:\nnnttt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhbttt.exec:\hhbttt.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btbbtt.exec:\btbbtt.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btbbbh.exec:\btbbbh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3djjd.exec:\3djjd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlrrrrr.exec:\rlrrrrr.exe23⤵
- Executes dropped EXE
-
\??\c:\pjvpv.exec:\pjvpv.exe24⤵
- Executes dropped EXE
-
\??\c:\pjjjd.exec:\pjjjd.exe25⤵
- Executes dropped EXE
-
\??\c:\ntbbbn.exec:\ntbbbn.exe26⤵
- Executes dropped EXE
-
\??\c:\tnhbtn.exec:\tnhbtn.exe27⤵
- Executes dropped EXE
-
\??\c:\7nhtnh.exec:\7nhtnh.exe28⤵
- Executes dropped EXE
-
\??\c:\llffxrl.exec:\llffxrl.exe29⤵
- Executes dropped EXE
-
\??\c:\tnbnnn.exec:\tnbnnn.exe30⤵
- Executes dropped EXE
-
\??\c:\vpjjj.exec:\vpjjj.exe31⤵
- Executes dropped EXE
-
\??\c:\7dddd.exec:\7dddd.exe32⤵
- Executes dropped EXE
-
\??\c:\1rrlfxr.exec:\1rrlfxr.exe33⤵
- Executes dropped EXE
-
\??\c:\vdpjp.exec:\vdpjp.exe34⤵
- Executes dropped EXE
-
\??\c:\pdjdd.exec:\pdjdd.exe35⤵
- Executes dropped EXE
-
\??\c:\bbbbnt.exec:\bbbbnt.exe36⤵
- Executes dropped EXE
-
\??\c:\jdppj.exec:\jdppj.exe37⤵
- Executes dropped EXE
-
\??\c:\9fxfxxf.exec:\9fxfxxf.exe38⤵
- Executes dropped EXE
-
\??\c:\5nnntt.exec:\5nnntt.exe39⤵
- Executes dropped EXE
-
\??\c:\pppvv.exec:\pppvv.exe40⤵
- Executes dropped EXE
-
\??\c:\lflfxll.exec:\lflfxll.exe41⤵
- Executes dropped EXE
-
\??\c:\bbhbtb.exec:\bbhbtb.exe42⤵
- Executes dropped EXE
-
\??\c:\dpjjv.exec:\dpjjv.exe43⤵
- Executes dropped EXE
-
\??\c:\xrlfxfx.exec:\xrlfxfx.exe44⤵
- Executes dropped EXE
-
\??\c:\nhnnnn.exec:\nhnnnn.exe45⤵
- Executes dropped EXE
-
\??\c:\pjpdd.exec:\pjpdd.exe46⤵
- Executes dropped EXE
-
\??\c:\rlxrrrf.exec:\rlxrrrf.exe47⤵
- Executes dropped EXE
-
\??\c:\vvdvv.exec:\vvdvv.exe48⤵
- Executes dropped EXE
-
\??\c:\lxlrllf.exec:\lxlrllf.exe49⤵
- Executes dropped EXE
-
\??\c:\pddjp.exec:\pddjp.exe50⤵
- Executes dropped EXE
-
\??\c:\nnntht.exec:\nnntht.exe51⤵
- Executes dropped EXE
-
\??\c:\djpjp.exec:\djpjp.exe52⤵
- Executes dropped EXE
-
\??\c:\3rxrrrr.exec:\3rxrrrr.exe53⤵
- Executes dropped EXE
-
\??\c:\hthtnn.exec:\hthtnn.exe54⤵
- Executes dropped EXE
-
\??\c:\pjjdd.exec:\pjjdd.exe55⤵
- Executes dropped EXE
-
\??\c:\7nnnhn.exec:\7nnnhn.exe56⤵
- Executes dropped EXE
-
\??\c:\7ddvv.exec:\7ddvv.exe57⤵
- Executes dropped EXE
-
\??\c:\lxlffff.exec:\lxlffff.exe58⤵
- Executes dropped EXE
-
\??\c:\bnnnnn.exec:\bnnnnn.exe59⤵
- Executes dropped EXE
-
\??\c:\pddjp.exec:\pddjp.exe60⤵
- Executes dropped EXE
-
\??\c:\rfrxxff.exec:\rfrxxff.exe61⤵
- Executes dropped EXE
-
\??\c:\bbbbbb.exec:\bbbbbb.exe62⤵
- Executes dropped EXE
-
\??\c:\pdjvd.exec:\pdjvd.exe63⤵
- Executes dropped EXE
-
\??\c:\flfxxxx.exec:\flfxxxx.exe64⤵
- Executes dropped EXE
-
\??\c:\hnhnnt.exec:\hnhnnt.exe65⤵
- Executes dropped EXE
-
\??\c:\5fxxlrf.exec:\5fxxlrf.exe66⤵
-
\??\c:\ntbttn.exec:\ntbttn.exe67⤵
-
\??\c:\jjpjj.exec:\jjpjj.exe68⤵
-
\??\c:\xlfrlrr.exec:\xlfrlrr.exe69⤵
-
\??\c:\dpjjv.exec:\dpjjv.exe70⤵
-
\??\c:\xfxrxfl.exec:\xfxrxfl.exe71⤵
-
\??\c:\nbbtnh.exec:\nbbtnh.exe72⤵
-
\??\c:\jdvpj.exec:\jdvpj.exe73⤵
-
\??\c:\rlrlffx.exec:\rlrlffx.exe74⤵
-
\??\c:\hbbbtt.exec:\hbbbtt.exe75⤵
-
\??\c:\rrxrrxx.exec:\rrxrrxx.exe76⤵
-
\??\c:\bhnhbb.exec:\bhnhbb.exe77⤵
-
\??\c:\djpvv.exec:\djpvv.exe78⤵
-
\??\c:\9nnhhh.exec:\9nnhhh.exe79⤵
-
\??\c:\jdvvp.exec:\jdvvp.exe80⤵
-
\??\c:\xxrllrx.exec:\xxrllrx.exe81⤵
-
\??\c:\djvpj.exec:\djvpj.exe82⤵
-
\??\c:\xxxfxlf.exec:\xxxfxlf.exe83⤵
-
\??\c:\nhtnhh.exec:\nhtnhh.exe84⤵
-
\??\c:\pvjdd.exec:\pvjdd.exe85⤵
-
\??\c:\thnnhh.exec:\thnnhh.exe86⤵
-
\??\c:\pjvvp.exec:\pjvvp.exe87⤵
-
\??\c:\5xrrlrl.exec:\5xrrlrl.exe88⤵
-
\??\c:\bbhbtt.exec:\bbhbtt.exe89⤵
-
\??\c:\djjdd.exec:\djjdd.exe90⤵
-
\??\c:\htbbtn.exec:\htbbtn.exe91⤵
-
\??\c:\vpdjd.exec:\vpdjd.exe92⤵
-
\??\c:\frlrlff.exec:\frlrlff.exe93⤵
-
\??\c:\htbttb.exec:\htbttb.exe94⤵
-
\??\c:\xrllxrl.exec:\xrllxrl.exe95⤵
-
\??\c:\hntttb.exec:\hntttb.exe96⤵
-
\??\c:\9jjdv.exec:\9jjdv.exe97⤵
-
\??\c:\flxrrrr.exec:\flxrrrr.exe98⤵
-
\??\c:\vvvvv.exec:\vvvvv.exe99⤵
-
\??\c:\lfrrrxl.exec:\lfrrrxl.exe100⤵
-
\??\c:\5nbbtn.exec:\5nbbtn.exe101⤵
-
\??\c:\xlffxff.exec:\xlffxff.exe102⤵
-
\??\c:\tbntnn.exec:\tbntnn.exe103⤵
-
\??\c:\djjjp.exec:\djjjp.exe104⤵
-
\??\c:\rrrxllr.exec:\rrrxllr.exe105⤵
-
\??\c:\ppddv.exec:\ppddv.exe106⤵
-
\??\c:\ffrrrrx.exec:\ffrrrrx.exe107⤵
-
\??\c:\tthhhb.exec:\tthhhb.exe108⤵
-
\??\c:\pvdjp.exec:\pvdjp.exe109⤵
-
\??\c:\3lrrlrl.exec:\3lrrlrl.exe110⤵
-
\??\c:\nhbtnn.exec:\nhbtnn.exe111⤵
-
\??\c:\pppjj.exec:\pppjj.exe112⤵
-
\??\c:\lflllrl.exec:\lflllrl.exe113⤵
-
\??\c:\tnhbbb.exec:\tnhbbb.exe114⤵
-
\??\c:\9ddjp.exec:\9ddjp.exe115⤵
-
\??\c:\htbtnt.exec:\htbtnt.exe116⤵
-
\??\c:\9pvvp.exec:\9pvvp.exe117⤵
-
\??\c:\rfxrllf.exec:\rfxrllf.exe118⤵
-
\??\c:\nhhbbb.exec:\nhhbbb.exe119⤵
-
\??\c:\vpddj.exec:\vpddj.exe120⤵
-
\??\c:\xrxrrrr.exec:\xrxrrrr.exe121⤵
-
\??\c:\tthbtn.exec:\tthbtn.exe122⤵
-
\??\c:\jdvvp.exec:\jdvvp.exe123⤵
-
\??\c:\1llfxxr.exec:\1llfxxr.exe124⤵
-
\??\c:\jvjdd.exec:\jvjdd.exe125⤵
-
\??\c:\fxllrrx.exec:\fxllrrx.exe126⤵
-
\??\c:\bnbhhn.exec:\bnbhhn.exe127⤵
-
\??\c:\dppjd.exec:\dppjd.exe128⤵
-
\??\c:\ffflrxf.exec:\ffflrxf.exe129⤵
-
\??\c:\ttbttt.exec:\ttbttt.exe130⤵
-
\??\c:\jdpjp.exec:\jdpjp.exe131⤵
-
\??\c:\fxxxffl.exec:\fxxxffl.exe132⤵
-
\??\c:\hhnnhh.exec:\hhnnhh.exe133⤵
-
\??\c:\pvvpj.exec:\pvvpj.exe134⤵
-
\??\c:\xfrlffx.exec:\xfrlffx.exe135⤵
-
\??\c:\nhnhhh.exec:\nhnhhh.exe136⤵
-
\??\c:\pjppj.exec:\pjppj.exe137⤵
-
\??\c:\xrrrffx.exec:\xrrrffx.exe138⤵
-
\??\c:\1jvpj.exec:\1jvpj.exe139⤵
-
\??\c:\rffxrrl.exec:\rffxrrl.exe140⤵
-
\??\c:\nnnhhh.exec:\nnnhhh.exe141⤵
-
\??\c:\pvppv.exec:\pvppv.exe142⤵
-
\??\c:\rlfxrlf.exec:\rlfxrlf.exe143⤵
-
\??\c:\hbhbtt.exec:\hbhbtt.exe144⤵
-
\??\c:\djvpp.exec:\djvpp.exe145⤵
-
\??\c:\xlrrllx.exec:\xlrrllx.exe146⤵
-
\??\c:\7bbttt.exec:\7bbttt.exe147⤵
-
\??\c:\vpdvj.exec:\vpdvj.exe148⤵
-
\??\c:\flfffxl.exec:\flfffxl.exe149⤵
-
\??\c:\bnnnhh.exec:\bnnnhh.exe150⤵
-
\??\c:\pdddv.exec:\pdddv.exe151⤵
-
\??\c:\rlfxxrl.exec:\rlfxxrl.exe152⤵
-
\??\c:\bttnht.exec:\bttnht.exe153⤵
-
\??\c:\pjpjj.exec:\pjpjj.exe154⤵
-
\??\c:\fxffxxx.exec:\fxffxxx.exe155⤵
-
\??\c:\bbnhbt.exec:\bbnhbt.exe156⤵
-
\??\c:\ddjpd.exec:\ddjpd.exe157⤵
-
\??\c:\llrrlff.exec:\llrrlff.exe158⤵
-
\??\c:\thnnbb.exec:\thnnbb.exe159⤵
-
\??\c:\jjjjp.exec:\jjjjp.exe160⤵
-
\??\c:\rfrlffr.exec:\rfrlffr.exe161⤵
-
\??\c:\htbthh.exec:\htbthh.exe162⤵
-
\??\c:\jdpjd.exec:\jdpjd.exe163⤵
-
\??\c:\fflffff.exec:\fflffff.exe164⤵
-
\??\c:\hhthbt.exec:\hhthbt.exe165⤵
-
\??\c:\pjjdv.exec:\pjjdv.exe166⤵
-
\??\c:\lrxfxxx.exec:\lrxfxxx.exe167⤵
-
\??\c:\bnnhhb.exec:\bnnhhb.exe168⤵
-
\??\c:\vpppj.exec:\vpppj.exe169⤵
-
\??\c:\rxllfff.exec:\rxllfff.exe170⤵
-
\??\c:\nbhbbb.exec:\nbhbbb.exe171⤵
-
\??\c:\pjvjd.exec:\pjvjd.exe172⤵
-
\??\c:\xllrllf.exec:\xllrllf.exe173⤵
-
\??\c:\ntnntt.exec:\ntnntt.exe174⤵
-
\??\c:\jdpjd.exec:\jdpjd.exe175⤵
-
\??\c:\lfrlxxf.exec:\lfrlxxf.exe176⤵
-
\??\c:\hhbbtt.exec:\hhbbtt.exe177⤵
-
\??\c:\vdjdv.exec:\vdjdv.exe178⤵
-
\??\c:\fflllxx.exec:\fflllxx.exe179⤵
-
\??\c:\btbbhh.exec:\btbbhh.exe180⤵
-
\??\c:\jvvvp.exec:\jvvvp.exe181⤵
-
\??\c:\xxlrffx.exec:\xxlrffx.exe182⤵
-
\??\c:\tnbtnb.exec:\tnbtnb.exe183⤵
-
\??\c:\vvjdj.exec:\vvjdj.exe184⤵
-
\??\c:\rxrxrrl.exec:\rxrxrrl.exe185⤵
-
\??\c:\nntnhh.exec:\nntnhh.exe186⤵
-
\??\c:\1djpj.exec:\1djpj.exe187⤵
-
\??\c:\frxrllf.exec:\frxrllf.exe188⤵
-
\??\c:\bnbtth.exec:\bnbtth.exe189⤵
-
\??\c:\ddddj.exec:\ddddj.exe190⤵
-
\??\c:\xfllflr.exec:\xfllflr.exe191⤵
-
\??\c:\bbhbtt.exec:\bbhbtt.exe192⤵
-
\??\c:\vvvvp.exec:\vvvvp.exe193⤵
-
\??\c:\nbtnhb.exec:\nbtnhb.exe194⤵
-
\??\c:\vvjdd.exec:\vvjdd.exe195⤵
-
\??\c:\lrxxxrr.exec:\lrxxxrr.exe196⤵
-
\??\c:\tnhbnt.exec:\tnhbnt.exe197⤵
-
\??\c:\jjjjd.exec:\jjjjd.exe198⤵
-
\??\c:\bnnbbt.exec:\bnnbbt.exe199⤵
-
\??\c:\pjpjv.exec:\pjpjv.exe200⤵
-
\??\c:\fxffxxr.exec:\fxffxxr.exe201⤵
-
\??\c:\vdpvv.exec:\vdpvv.exe202⤵
-
\??\c:\lxxxrlf.exec:\lxxxrlf.exe203⤵
-
\??\c:\nhbtbb.exec:\nhbtbb.exe204⤵
-
\??\c:\pdjdd.exec:\pdjdd.exe205⤵
-
\??\c:\rrlfrrf.exec:\rrlfrrf.exe206⤵
-
\??\c:\bbbbtt.exec:\bbbbtt.exe207⤵
-
\??\c:\vvddv.exec:\vvddv.exe208⤵
-
\??\c:\xxxrlxx.exec:\xxxrlxx.exe209⤵
-
\??\c:\5ttbnt.exec:\5ttbnt.exe210⤵
-
\??\c:\dvjjd.exec:\dvjjd.exe211⤵
-
\??\c:\5lffxxx.exec:\5lffxxx.exe212⤵
-
\??\c:\vpppp.exec:\vpppp.exe213⤵
-
\??\c:\5fllrrr.exec:\5fllrrr.exe214⤵
-
\??\c:\hbbnhh.exec:\hbbnhh.exe215⤵
-
\??\c:\3vvvj.exec:\3vvvj.exe216⤵
-
\??\c:\rfrlxxr.exec:\rfrlxxr.exe217⤵
-
\??\c:\3hnhbh.exec:\3hnhbh.exe218⤵
-
\??\c:\vjjdv.exec:\vjjdv.exe219⤵
-
\??\c:\lxfxrrr.exec:\lxfxrrr.exe220⤵
-
\??\c:\tbtnhh.exec:\tbtnhh.exe221⤵
-
\??\c:\7jjdd.exec:\7jjdd.exe222⤵
-
\??\c:\1frrffr.exec:\1frrffr.exe223⤵
-
\??\c:\ddddv.exec:\ddddv.exe224⤵
-
\??\c:\lxlfrrx.exec:\lxlfrrx.exe225⤵
-
\??\c:\tntnhb.exec:\tntnhb.exe226⤵
-
\??\c:\jdpdd.exec:\jdpdd.exe227⤵
-
\??\c:\9bhhnt.exec:\9bhhnt.exe228⤵
-
\??\c:\pdvpd.exec:\pdvpd.exe229⤵
-
\??\c:\rfxlfxf.exec:\rfxlfxf.exe230⤵
-
\??\c:\thttbb.exec:\thttbb.exe231⤵
-
\??\c:\jdjjj.exec:\jdjjj.exe232⤵
-
\??\c:\fxfxfrx.exec:\fxfxfrx.exe233⤵
-
\??\c:\bbbbbb.exec:\bbbbbb.exe234⤵
-
\??\c:\ddjjd.exec:\ddjjd.exe235⤵
-
\??\c:\1rxrllf.exec:\1rxrllf.exe236⤵
-
\??\c:\nntntb.exec:\nntntb.exe237⤵
-
\??\c:\vppjd.exec:\vppjd.exe238⤵
-
\??\c:\rlxrxxl.exec:\rlxrxxl.exe239⤵
-
\??\c:\bnbbbt.exec:\bnbbbt.exe240⤵
-
\??\c:\xxfxlfx.exec:\xxfxlfx.exe241⤵