Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 10:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
491fc6143d8987ce5f395429657954f5a4655b202a7e3a7672430c1fa44007c3_NeikiAnalytics.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
General
-
Target
491fc6143d8987ce5f395429657954f5a4655b202a7e3a7672430c1fa44007c3_NeikiAnalytics.exe
-
Size
58KB
-
MD5
5a2e422c5a90318ed7b69b7310d1d950
-
SHA1
9001acba197208c9b0597f15358c87d206bf922b
-
SHA256
491fc6143d8987ce5f395429657954f5a4655b202a7e3a7672430c1fa44007c3
-
SHA512
ec06b1ca389864fee7ffa2ee33ad690098b806b7aa1bbffb5ebc31b2f14da86a7f380cd0e2d43d39534e9eee6bd987e070add58e71002d227780be013f9753bf
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIF+AV:ymb3NkkiQ3mdBjFIF+AV
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/2220-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2328-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2328-20-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2564-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2672-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2628-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2548-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2156-96-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/948-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2832-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1692-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2708-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/640-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1456-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2568-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/592-204-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-222-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/664-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1428-258-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-276-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
hbhntb.exejpdjp.exelfxxrxf.exentttnt.exevvvjp.exerrrlxrx.exe7frffrx.exebnhhnn.exevvppj.exejdvdp.exexrlxffl.exe9ffflrf.exebtnthn.exepvdvd.exedpdvd.exexrfflff.exenhnntn.exe1btbtt.exe5jvvd.exelflxllr.exehbnbnt.exenhtbbh.exeddvjv.exexrlrxfl.exelxlrffr.exe7bhhbn.exennthbh.exe1vpvp.exerflrrff.exelffrxxl.exetttbth.exe1tthnt.exedvdjv.exepjvvd.exerrrlxxr.exehhbnbh.exebbtnhn.exedvjpj.exedddvd.exelllrrfr.exe5flffrl.exennntnn.exehhntbb.exepjppd.exeddvjj.exexrrxlrr.exexxrrrxl.exehthbnn.exe5bttbb.exe5vjdv.exedpdvd.exejdpdj.exexrxxrxr.exe3lflfrl.exenthhhb.exe1hbhtb.exepvvjj.exedjpvp.exelxllllr.exe1lllllr.exe1nhbbt.exebbbtnt.exe1vvdv.exepjpvj.exepid process 2328 hbhntb.exe 2564 jpdjp.exe 2672 lfxxrxf.exe 2628 ntttnt.exe 2744 vvvjp.exe 2496 rrrlxrx.exe 2432 7frffrx.exe 2548 bnhhnn.exe 2156 vvppj.exe 948 jdvdp.exe 2832 xrlxffl.exe 708 9ffflrf.exe 1692 btnthn.exe 1636 pvdvd.exe 2708 dpdvd.exe 640 xrfflff.exe 1456 nhnntn.exe 2864 1btbtt.exe 2064 5jvvd.exe 2568 lflxllr.exe 592 hbnbnt.exe 1248 nhtbbh.exe 2908 ddvjv.exe 664 xrlrxfl.exe 1596 lxlrffr.exe 1672 7bhhbn.exe 1428 nnthbh.exe 2316 1vpvp.exe 2552 rflrrff.exe 2260 lffrxxl.exe 1064 tttbth.exe 2224 1tthnt.exe 2352 dvdjv.exe 2248 pjvvd.exe 1612 rrrlxxr.exe 2372 hhbnbh.exe 2688 bbtnhn.exe 2676 dvjpj.exe 3064 dddvd.exe 2904 lllrrfr.exe 2608 5flffrl.exe 2472 nnntnn.exe 2488 hhntbb.exe 2768 pjppd.exe 1236 ddvjj.exe 2176 xrrxlrr.exe 2356 xxrrrxl.exe 856 hthbnn.exe 2832 5bttbb.exe 2460 5vjdv.exe 1692 dpdvd.exe 2700 jdpdj.exe 1648 xrxxrxr.exe 1576 3lflfrl.exe 2992 nthhhb.exe 1456 1hbhtb.exe 2264 pvvjj.exe 1220 djpvp.exe 2916 lxllllr.exe 268 1lllllr.exe 1448 1nhbbt.exe 1508 bbbtnt.exe 528 1vvdv.exe 2096 pjpvj.exe -
Processes:
resource yara_rule behavioral1/memory/2220-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2328-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2564-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2672-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2548-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2156-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/948-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2832-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1692-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2708-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/640-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1456-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-204-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-222-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/664-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1428-258-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-276-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
491fc6143d8987ce5f395429657954f5a4655b202a7e3a7672430c1fa44007c3_NeikiAnalytics.exehbhntb.exejpdjp.exelfxxrxf.exentttnt.exevvvjp.exerrrlxrx.exe7frffrx.exebnhhnn.exevvppj.exejdvdp.exexrlxffl.exe9ffflrf.exebtnthn.exepvdvd.exedpdvd.exedescription pid process target process PID 2220 wrote to memory of 2328 2220 491fc6143d8987ce5f395429657954f5a4655b202a7e3a7672430c1fa44007c3_NeikiAnalytics.exe hbhntb.exe PID 2220 wrote to memory of 2328 2220 491fc6143d8987ce5f395429657954f5a4655b202a7e3a7672430c1fa44007c3_NeikiAnalytics.exe hbhntb.exe PID 2220 wrote to memory of 2328 2220 491fc6143d8987ce5f395429657954f5a4655b202a7e3a7672430c1fa44007c3_NeikiAnalytics.exe hbhntb.exe PID 2220 wrote to memory of 2328 2220 491fc6143d8987ce5f395429657954f5a4655b202a7e3a7672430c1fa44007c3_NeikiAnalytics.exe hbhntb.exe PID 2328 wrote to memory of 2564 2328 hbhntb.exe jpdjp.exe PID 2328 wrote to memory of 2564 2328 hbhntb.exe jpdjp.exe PID 2328 wrote to memory of 2564 2328 hbhntb.exe jpdjp.exe PID 2328 wrote to memory of 2564 2328 hbhntb.exe jpdjp.exe PID 2564 wrote to memory of 2672 2564 jpdjp.exe lfxxrxf.exe PID 2564 wrote to memory of 2672 2564 jpdjp.exe lfxxrxf.exe PID 2564 wrote to memory of 2672 2564 jpdjp.exe lfxxrxf.exe PID 2564 wrote to memory of 2672 2564 jpdjp.exe lfxxrxf.exe PID 2672 wrote to memory of 2628 2672 lfxxrxf.exe ntttnt.exe PID 2672 wrote to memory of 2628 2672 lfxxrxf.exe ntttnt.exe PID 2672 wrote to memory of 2628 2672 lfxxrxf.exe ntttnt.exe PID 2672 wrote to memory of 2628 2672 lfxxrxf.exe ntttnt.exe PID 2628 wrote to memory of 2744 2628 ntttnt.exe vvvjp.exe PID 2628 wrote to memory of 2744 2628 ntttnt.exe vvvjp.exe PID 2628 wrote to memory of 2744 2628 ntttnt.exe vvvjp.exe PID 2628 wrote to memory of 2744 2628 ntttnt.exe vvvjp.exe PID 2744 wrote to memory of 2496 2744 vvvjp.exe rrrlxrx.exe PID 2744 wrote to memory of 2496 2744 vvvjp.exe rrrlxrx.exe PID 2744 wrote to memory of 2496 2744 vvvjp.exe rrrlxrx.exe PID 2744 wrote to memory of 2496 2744 vvvjp.exe rrrlxrx.exe PID 2496 wrote to memory of 2432 2496 rrrlxrx.exe 7frffrx.exe PID 2496 wrote to memory of 2432 2496 rrrlxrx.exe 7frffrx.exe PID 2496 wrote to memory of 2432 2496 rrrlxrx.exe 7frffrx.exe PID 2496 wrote to memory of 2432 2496 rrrlxrx.exe 7frffrx.exe PID 2432 wrote to memory of 2548 2432 7frffrx.exe bnhhnn.exe PID 2432 wrote to memory of 2548 2432 7frffrx.exe bnhhnn.exe PID 2432 wrote to memory of 2548 2432 7frffrx.exe bnhhnn.exe PID 2432 wrote to memory of 2548 2432 7frffrx.exe bnhhnn.exe PID 2548 wrote to memory of 2156 2548 bnhhnn.exe vvppj.exe PID 2548 wrote to memory of 2156 2548 bnhhnn.exe vvppj.exe PID 2548 wrote to memory of 2156 2548 bnhhnn.exe vvppj.exe PID 2548 wrote to memory of 2156 2548 bnhhnn.exe vvppj.exe PID 2156 wrote to memory of 948 2156 vvppj.exe jdvdp.exe PID 2156 wrote to memory of 948 2156 vvppj.exe jdvdp.exe PID 2156 wrote to memory of 948 2156 vvppj.exe jdvdp.exe PID 2156 wrote to memory of 948 2156 vvppj.exe jdvdp.exe PID 948 wrote to memory of 2832 948 jdvdp.exe xrlxffl.exe PID 948 wrote to memory of 2832 948 jdvdp.exe xrlxffl.exe PID 948 wrote to memory of 2832 948 jdvdp.exe xrlxffl.exe PID 948 wrote to memory of 2832 948 jdvdp.exe xrlxffl.exe PID 2832 wrote to memory of 708 2832 xrlxffl.exe 9ffflrf.exe PID 2832 wrote to memory of 708 2832 xrlxffl.exe 9ffflrf.exe PID 2832 wrote to memory of 708 2832 xrlxffl.exe 9ffflrf.exe PID 2832 wrote to memory of 708 2832 xrlxffl.exe 9ffflrf.exe PID 708 wrote to memory of 1692 708 9ffflrf.exe btnthn.exe PID 708 wrote to memory of 1692 708 9ffflrf.exe btnthn.exe PID 708 wrote to memory of 1692 708 9ffflrf.exe btnthn.exe PID 708 wrote to memory of 1692 708 9ffflrf.exe btnthn.exe PID 1692 wrote to memory of 1636 1692 btnthn.exe pvdvd.exe PID 1692 wrote to memory of 1636 1692 btnthn.exe pvdvd.exe PID 1692 wrote to memory of 1636 1692 btnthn.exe pvdvd.exe PID 1692 wrote to memory of 1636 1692 btnthn.exe pvdvd.exe PID 1636 wrote to memory of 2708 1636 pvdvd.exe dpdvd.exe PID 1636 wrote to memory of 2708 1636 pvdvd.exe dpdvd.exe PID 1636 wrote to memory of 2708 1636 pvdvd.exe dpdvd.exe PID 1636 wrote to memory of 2708 1636 pvdvd.exe dpdvd.exe PID 2708 wrote to memory of 640 2708 dpdvd.exe xrfflff.exe PID 2708 wrote to memory of 640 2708 dpdvd.exe xrfflff.exe PID 2708 wrote to memory of 640 2708 dpdvd.exe xrfflff.exe PID 2708 wrote to memory of 640 2708 dpdvd.exe xrfflff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\491fc6143d8987ce5f395429657954f5a4655b202a7e3a7672430c1fa44007c3_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\491fc6143d8987ce5f395429657954f5a4655b202a7e3a7672430c1fa44007c3_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\hbhntb.exec:\hbhntb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpdjp.exec:\jpdjp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfxxrxf.exec:\lfxxrxf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ntttnt.exec:\ntttnt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvvjp.exec:\vvvjp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrrlxrx.exec:\rrrlxrx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7frffrx.exec:\7frffrx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnhhnn.exec:\bnhhnn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvppj.exec:\vvppj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdvdp.exec:\jdvdp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrlxffl.exec:\xrlxffl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9ffflrf.exec:\9ffflrf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btnthn.exec:\btnthn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvdvd.exec:\pvdvd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpdvd.exec:\dpdvd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrfflff.exec:\xrfflff.exe17⤵
- Executes dropped EXE
-
\??\c:\nhnntn.exec:\nhnntn.exe18⤵
- Executes dropped EXE
-
\??\c:\1btbtt.exec:\1btbtt.exe19⤵
- Executes dropped EXE
-
\??\c:\5jvvd.exec:\5jvvd.exe20⤵
- Executes dropped EXE
-
\??\c:\lflxllr.exec:\lflxllr.exe21⤵
- Executes dropped EXE
-
\??\c:\hbnbnt.exec:\hbnbnt.exe22⤵
- Executes dropped EXE
-
\??\c:\nhtbbh.exec:\nhtbbh.exe23⤵
- Executes dropped EXE
-
\??\c:\ddvjv.exec:\ddvjv.exe24⤵
- Executes dropped EXE
-
\??\c:\xrlrxfl.exec:\xrlrxfl.exe25⤵
- Executes dropped EXE
-
\??\c:\lxlrffr.exec:\lxlrffr.exe26⤵
- Executes dropped EXE
-
\??\c:\7bhhbn.exec:\7bhhbn.exe27⤵
- Executes dropped EXE
-
\??\c:\nnthbh.exec:\nnthbh.exe28⤵
- Executes dropped EXE
-
\??\c:\1vpvp.exec:\1vpvp.exe29⤵
- Executes dropped EXE
-
\??\c:\rflrrff.exec:\rflrrff.exe30⤵
- Executes dropped EXE
-
\??\c:\lffrxxl.exec:\lffrxxl.exe31⤵
- Executes dropped EXE
-
\??\c:\tttbth.exec:\tttbth.exe32⤵
- Executes dropped EXE
-
\??\c:\1tthnt.exec:\1tthnt.exe33⤵
- Executes dropped EXE
-
\??\c:\dvdjv.exec:\dvdjv.exe34⤵
- Executes dropped EXE
-
\??\c:\pjvvd.exec:\pjvvd.exe35⤵
- Executes dropped EXE
-
\??\c:\rrrlxxr.exec:\rrrlxxr.exe36⤵
- Executes dropped EXE
-
\??\c:\hhbnbh.exec:\hhbnbh.exe37⤵
- Executes dropped EXE
-
\??\c:\bbtnhn.exec:\bbtnhn.exe38⤵
- Executes dropped EXE
-
\??\c:\dvjpj.exec:\dvjpj.exe39⤵
- Executes dropped EXE
-
\??\c:\dddvd.exec:\dddvd.exe40⤵
- Executes dropped EXE
-
\??\c:\lllrrfr.exec:\lllrrfr.exe41⤵
- Executes dropped EXE
-
\??\c:\5flffrl.exec:\5flffrl.exe42⤵
- Executes dropped EXE
-
\??\c:\nnntnn.exec:\nnntnn.exe43⤵
- Executes dropped EXE
-
\??\c:\hhntbb.exec:\hhntbb.exe44⤵
- Executes dropped EXE
-
\??\c:\pjppd.exec:\pjppd.exe45⤵
- Executes dropped EXE
-
\??\c:\ddvjj.exec:\ddvjj.exe46⤵
- Executes dropped EXE
-
\??\c:\xrrxlrr.exec:\xrrxlrr.exe47⤵
- Executes dropped EXE
-
\??\c:\xxrrrxl.exec:\xxrrrxl.exe48⤵
- Executes dropped EXE
-
\??\c:\hthbnn.exec:\hthbnn.exe49⤵
- Executes dropped EXE
-
\??\c:\5bttbb.exec:\5bttbb.exe50⤵
- Executes dropped EXE
-
\??\c:\5vjdv.exec:\5vjdv.exe51⤵
- Executes dropped EXE
-
\??\c:\dpdvd.exec:\dpdvd.exe52⤵
- Executes dropped EXE
-
\??\c:\jdpdj.exec:\jdpdj.exe53⤵
- Executes dropped EXE
-
\??\c:\xrxxrxr.exec:\xrxxrxr.exe54⤵
- Executes dropped EXE
-
\??\c:\3lflfrl.exec:\3lflfrl.exe55⤵
- Executes dropped EXE
-
\??\c:\nthhhb.exec:\nthhhb.exe56⤵
- Executes dropped EXE
-
\??\c:\1hbhtb.exec:\1hbhtb.exe57⤵
- Executes dropped EXE
-
\??\c:\pvvjj.exec:\pvvjj.exe58⤵
- Executes dropped EXE
-
\??\c:\djpvp.exec:\djpvp.exe59⤵
- Executes dropped EXE
-
\??\c:\lxllllr.exec:\lxllllr.exe60⤵
- Executes dropped EXE
-
\??\c:\1lllllr.exec:\1lllllr.exe61⤵
- Executes dropped EXE
-
\??\c:\1nhbbt.exec:\1nhbbt.exe62⤵
- Executes dropped EXE
-
\??\c:\bbbtnt.exec:\bbbtnt.exe63⤵
- Executes dropped EXE
-
\??\c:\1vvdv.exec:\1vvdv.exe64⤵
- Executes dropped EXE
-
\??\c:\pjpvj.exec:\pjpvj.exe65⤵
- Executes dropped EXE
-
\??\c:\9flfllf.exec:\9flfllf.exe66⤵
-
\??\c:\lrfrxxx.exec:\lrfrxxx.exe67⤵
-
\??\c:\nhbtbh.exec:\nhbtbh.exe68⤵
-
\??\c:\tnhbnt.exec:\tnhbnt.exe69⤵
-
\??\c:\jjdjv.exec:\jjdjv.exe70⤵
-
\??\c:\ppvvj.exec:\ppvvj.exe71⤵
-
\??\c:\xfrxlrx.exec:\xfrxlrx.exe72⤵
-
\??\c:\7lxlflx.exec:\7lxlflx.exe73⤵
-
\??\c:\nntthn.exec:\nntthn.exe74⤵
-
\??\c:\3bthnt.exec:\3bthnt.exe75⤵
-
\??\c:\3pvpj.exec:\3pvpj.exe76⤵
-
\??\c:\3dvjp.exec:\3dvjp.exe77⤵
-
\??\c:\1fxfllx.exec:\1fxfllx.exe78⤵
-
\??\c:\rlfrfrf.exec:\rlfrfrf.exe79⤵
-
\??\c:\tnbbhh.exec:\tnbbhh.exe80⤵
-
\??\c:\nnntnn.exec:\nnntnn.exe81⤵
-
\??\c:\dvdpj.exec:\dvdpj.exe82⤵
-
\??\c:\vpdjp.exec:\vpdjp.exe83⤵
-
\??\c:\3llflrf.exec:\3llflrf.exe84⤵
-
\??\c:\ffxxrxl.exec:\ffxxrxl.exe85⤵
-
\??\c:\rffrlrr.exec:\rffrlrr.exe86⤵
-
\??\c:\hbtbnb.exec:\hbtbnb.exe87⤵
-
\??\c:\nnntht.exec:\nnntht.exe88⤵
-
\??\c:\ppdjp.exec:\ppdjp.exe89⤵
-
\??\c:\ppjjv.exec:\ppjjv.exe90⤵
-
\??\c:\lrflflx.exec:\lrflflx.exe91⤵
-
\??\c:\9rlrlrl.exec:\9rlrlrl.exe92⤵
-
\??\c:\bthhtt.exec:\bthhtt.exe93⤵
-
\??\c:\nbhnht.exec:\nbhnht.exe94⤵
-
\??\c:\7nhbtb.exec:\7nhbtb.exe95⤵
-
\??\c:\3vppd.exec:\3vppd.exe96⤵
-
\??\c:\dppvj.exec:\dppvj.exe97⤵
-
\??\c:\llxxxxf.exec:\llxxxxf.exe98⤵
-
\??\c:\xrlfxxf.exec:\xrlfxxf.exe99⤵
-
\??\c:\thnbht.exec:\thnbht.exe100⤵
-
\??\c:\hhnntb.exec:\hhnntb.exe101⤵
-
\??\c:\1jvpd.exec:\1jvpd.exe102⤵
-
\??\c:\7dpjj.exec:\7dpjj.exe103⤵
-
\??\c:\xrxxxfl.exec:\xrxxxfl.exe104⤵
-
\??\c:\xxxlfrl.exec:\xxxlfrl.exe105⤵
-
\??\c:\5lrrxfl.exec:\5lrrxfl.exe106⤵
-
\??\c:\1bbhbn.exec:\1bbhbn.exe107⤵
-
\??\c:\1bhntt.exec:\1bhntt.exe108⤵
-
\??\c:\5jppv.exec:\5jppv.exe109⤵
-
\??\c:\pdjjj.exec:\pdjjj.exe110⤵
-
\??\c:\9llrflr.exec:\9llrflr.exe111⤵
-
\??\c:\7rlrffx.exec:\7rlrffx.exe112⤵
-
\??\c:\bhbbhh.exec:\bhbbhh.exe113⤵
-
\??\c:\hhbnth.exec:\hhbnth.exe114⤵
-
\??\c:\dvpvv.exec:\dvpvv.exe115⤵
-
\??\c:\3vjjp.exec:\3vjjp.exe116⤵
-
\??\c:\1vjvd.exec:\1vjvd.exe117⤵
-
\??\c:\rlfrfrf.exec:\rlfrfrf.exe118⤵
-
\??\c:\ffxlrrl.exec:\ffxlrrl.exe119⤵
-
\??\c:\nhnbbh.exec:\nhnbbh.exe120⤵
-
\??\c:\nhnthn.exec:\nhnthn.exe121⤵
-
\??\c:\1nnbnt.exec:\1nnbnt.exe122⤵
-
\??\c:\vvpvp.exec:\vvpvp.exe123⤵
-
\??\c:\vvvdp.exec:\vvvdp.exe124⤵
-
\??\c:\xlxlffx.exec:\xlxlffx.exe125⤵
-
\??\c:\xrrrlrf.exec:\xrrrlrf.exe126⤵
-
\??\c:\7hbbnt.exec:\7hbbnt.exe127⤵
-
\??\c:\bthhhh.exec:\bthhhh.exe128⤵
-
\??\c:\3tntht.exec:\3tntht.exe129⤵
-
\??\c:\5vvpd.exec:\5vvpd.exe130⤵
-
\??\c:\pjdpv.exec:\pjdpv.exe131⤵
-
\??\c:\lflrfxl.exec:\lflrfxl.exe132⤵
-
\??\c:\rxrfrlx.exec:\rxrfrlx.exe133⤵
-
\??\c:\nhtbhn.exec:\nhtbhn.exe134⤵
-
\??\c:\9thhtb.exec:\9thhtb.exe135⤵
-
\??\c:\hhhbnb.exec:\hhhbnb.exe136⤵
-
\??\c:\9jddv.exec:\9jddv.exe137⤵
-
\??\c:\jvppd.exec:\jvppd.exe138⤵
-
\??\c:\9lfxxfl.exec:\9lfxxfl.exe139⤵
-
\??\c:\9frlrlx.exec:\9frlrlx.exe140⤵
-
\??\c:\bnnnbb.exec:\bnnnbb.exe141⤵
-
\??\c:\nhhnhn.exec:\nhhnhn.exe142⤵
-
\??\c:\pdjpp.exec:\pdjpp.exe143⤵
-
\??\c:\1jddd.exec:\1jddd.exe144⤵
-
\??\c:\xflfffl.exec:\xflfffl.exe145⤵
-
\??\c:\lrffxll.exec:\lrffxll.exe146⤵
-
\??\c:\btbntn.exec:\btbntn.exe147⤵
-
\??\c:\bbnhnb.exec:\bbnhnb.exe148⤵
-
\??\c:\hnnbth.exec:\hnnbth.exe149⤵
-
\??\c:\5ppvd.exec:\5ppvd.exe150⤵
-
\??\c:\dvvpd.exec:\dvvpd.exe151⤵
-
\??\c:\vjvjv.exec:\vjvjv.exe152⤵
-
\??\c:\lfxflrf.exec:\lfxflrf.exe153⤵
-
\??\c:\5frfrrx.exec:\5frfrrx.exe154⤵
-
\??\c:\9hthtb.exec:\9hthtb.exe155⤵
-
\??\c:\bbhtnt.exec:\bbhtnt.exe156⤵
-
\??\c:\5pdjj.exec:\5pdjj.exe157⤵
-
\??\c:\7djjj.exec:\7djjj.exe158⤵
-
\??\c:\3fxxfxl.exec:\3fxxfxl.exe159⤵
-
\??\c:\xrfrxxr.exec:\xrfrxxr.exe160⤵
-
\??\c:\frfxxxx.exec:\frfxxxx.exe161⤵
-
\??\c:\thtbbh.exec:\thtbbh.exe162⤵
-
\??\c:\7nhhnt.exec:\7nhhnt.exe163⤵
-
\??\c:\jjjvd.exec:\jjjvd.exe164⤵
-
\??\c:\dpvpp.exec:\dpvpp.exe165⤵
-
\??\c:\lffxffl.exec:\lffxffl.exe166⤵
-
\??\c:\1frllfl.exec:\1frllfl.exe167⤵
-
\??\c:\rllxflr.exec:\rllxflr.exe168⤵
-
\??\c:\htbthh.exec:\htbthh.exe169⤵
-
\??\c:\9tbbhn.exec:\9tbbhn.exe170⤵
-
\??\c:\pjjjp.exec:\pjjjp.exe171⤵
-
\??\c:\dppjp.exec:\dppjp.exe172⤵
-
\??\c:\fxrlfxx.exec:\fxrlfxx.exe173⤵
-
\??\c:\5flxlxl.exec:\5flxlxl.exe174⤵
-
\??\c:\5bntbh.exec:\5bntbh.exe175⤵
-
\??\c:\hbhnnn.exec:\hbhnnn.exe176⤵
-
\??\c:\3pvpj.exec:\3pvpj.exe177⤵
-
\??\c:\9jvjv.exec:\9jvjv.exe178⤵
-
\??\c:\7xlrrxl.exec:\7xlrrxl.exe179⤵
-
\??\c:\rfrrxrf.exec:\rfrrxrf.exe180⤵
-
\??\c:\1tnbth.exec:\1tnbth.exe181⤵
-
\??\c:\bbbnth.exec:\bbbnth.exe182⤵
-
\??\c:\hbbntb.exec:\hbbntb.exe183⤵
-
\??\c:\1vjdp.exec:\1vjdp.exe184⤵
-
\??\c:\ddvpj.exec:\ddvpj.exe185⤵
-
\??\c:\rlffflr.exec:\rlffflr.exe186⤵
-
\??\c:\xrxfrxl.exec:\xrxfrxl.exe187⤵
-
\??\c:\thnnbb.exec:\thnnbb.exe188⤵
-
\??\c:\tthhtt.exec:\tthhtt.exe189⤵
-
\??\c:\1bnhhn.exec:\1bnhhn.exe190⤵
-
\??\c:\pdjjj.exec:\pdjjj.exe191⤵
-
\??\c:\jdpdj.exec:\jdpdj.exe192⤵
-
\??\c:\3rxrrrf.exec:\3rxrrrf.exe193⤵
-
\??\c:\llfxrxf.exec:\llfxrxf.exe194⤵
-
\??\c:\tbthnt.exec:\tbthnt.exe195⤵
-
\??\c:\hhtnhn.exec:\hhtnhn.exe196⤵
-
\??\c:\jjdvd.exec:\jjdvd.exe197⤵
-
\??\c:\jvjpv.exec:\jvjpv.exe198⤵
-
\??\c:\lxllrrf.exec:\lxllrrf.exe199⤵
-
\??\c:\lfrfrrx.exec:\lfrfrrx.exe200⤵
-
\??\c:\nhhtbn.exec:\nhhtbn.exe201⤵
-
\??\c:\tthbnn.exec:\tthbnn.exe202⤵
-
\??\c:\thbbhh.exec:\thbbhh.exe203⤵
-
\??\c:\dvvdv.exec:\dvvdv.exe204⤵
-
\??\c:\jvpjv.exec:\jvpjv.exe205⤵
-
\??\c:\rfxrrlx.exec:\rfxrrlx.exe206⤵
-
\??\c:\9fflrrl.exec:\9fflrrl.exe207⤵
-
\??\c:\xxrlrrx.exec:\xxrlrrx.exe208⤵
-
\??\c:\httnhh.exec:\httnhh.exe209⤵
-
\??\c:\hbbbnn.exec:\hbbbnn.exe210⤵
-
\??\c:\dddjp.exec:\dddjp.exe211⤵
-
\??\c:\3jddp.exec:\3jddp.exe212⤵
-
\??\c:\lfxfllf.exec:\lfxfllf.exe213⤵
-
\??\c:\xrrrflr.exec:\xrrrflr.exe214⤵
-
\??\c:\tnbtbb.exec:\tnbtbb.exe215⤵
-
\??\c:\nbhnnn.exec:\nbhnnn.exe216⤵
-
\??\c:\thnhnh.exec:\thnhnh.exe217⤵
-
\??\c:\vjvdd.exec:\vjvdd.exe218⤵
-
\??\c:\dpvpd.exec:\dpvpd.exe219⤵
-
\??\c:\xrrxxxx.exec:\xrrxxxx.exe220⤵
-
\??\c:\9fffrlr.exec:\9fffrlr.exe221⤵
-
\??\c:\xrfflrr.exec:\xrfflrr.exe222⤵
-
\??\c:\hhnbnt.exec:\hhnbnt.exe223⤵
-
\??\c:\rrfllfl.exec:\rrfllfl.exe224⤵
-
\??\c:\rfrlffl.exec:\rfrlffl.exe225⤵
-
\??\c:\nnhhnh.exec:\nnhhnh.exe226⤵
-
\??\c:\thbthb.exec:\thbthb.exe227⤵
-
\??\c:\tbhhnn.exec:\tbhhnn.exe228⤵
-
\??\c:\vjvvj.exec:\vjvvj.exe229⤵
-
\??\c:\3vpvv.exec:\3vpvv.exe230⤵
-
\??\c:\flfxfrr.exec:\flfxfrr.exe231⤵
-
\??\c:\rlrxrxf.exec:\rlrxrxf.exe232⤵
-
\??\c:\nnbtnb.exec:\nnbtnb.exe233⤵
-
\??\c:\3tnhnb.exec:\3tnhnb.exe234⤵
-
\??\c:\7jdjv.exec:\7jdjv.exe235⤵
-
\??\c:\jppjv.exec:\jppjv.exe236⤵
-
\??\c:\pddvv.exec:\pddvv.exe237⤵
-
\??\c:\xrxrfxl.exec:\xrxrfxl.exe238⤵
-
\??\c:\xrlrlxr.exec:\xrlrlxr.exe239⤵
-
\??\c:\nbhtbb.exec:\nbhtbb.exe240⤵
-
\??\c:\nhbbtn.exec:\nhbbtn.exe241⤵