Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 09:44
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
483a72b7874a17167dbcff1eec2d65d1d9f15b405de41b2863e9d677ae2e10af_NeikiAnalytics.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
483a72b7874a17167dbcff1eec2d65d1d9f15b405de41b2863e9d677ae2e10af_NeikiAnalytics.exe
-
Size
134KB
-
MD5
691fa633bdc21f641ea3196d809ca0a0
-
SHA1
73b6ae277413dd1509c2b2e3dd1545c0adcf5c22
-
SHA256
483a72b7874a17167dbcff1eec2d65d1d9f15b405de41b2863e9d677ae2e10af
-
SHA512
929fd5786149f57c0356e4c2b8709da18d8b463bad4eccfc85162e43d3fdb4a39e10603db05b487640119d50c7e6c2b14ef52171a76dee7fded09f32fd4bff84
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73HUoMsAbrF3BTUwFB:n3C9BRo7HCsAbhxYo
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2364-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2972-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-29-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2208-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2644-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2456-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2756-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-76-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2460-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2088-110-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1744-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2232-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2332-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2820-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1460-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/776-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2100-281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
xrffxxl.exeflflxlf.exetnntnb.exe9vdvd.exe7nbthh.exe7bhhbn.exeppjvj.exelxllxxr.exebbthnt.exennbhtb.exe1vppj.exexrflrrx.exellxrfll.exetthntb.exejdpjv.exejjpdj.exefxfrflx.exe1lfrffr.exehbhhnt.exejjdjv.exerrrxffl.exe7rffxxl.exehtnhnt.exepjdpv.exe7xxlxlx.exexrlxfff.exedvdpv.exeppdjd.exe3fxxrxl.exerrfxlrr.exettnbnb.exevjjpd.exedvjvd.exefxrllrf.exerlfxlrf.exennhnbh.exentnbtb.exedvpvj.exevppvp.exefrlflrf.exexxrrlxl.exettbhtt.exepdvdp.exeddddj.exe5rffrfl.exeflrrfxl.exetnthtt.exebbbbhh.exe9jjpd.exejppdv.exerlffrrf.exerlxflxf.exehbhhtt.exeththhn.exedvddp.exevpdpj.exexrllfxl.exexxllrrx.exe3httbb.exenbnhbb.exejppvd.exedvppv.exefrflrrx.exeflfrxrr.exepid process 2208 xrffxxl.exe 2416 flflxlf.exe 2972 tnntnb.exe 2644 9vdvd.exe 2456 7nbthh.exe 2756 7bhhbn.exe 2720 ppjvj.exe 2460 lxllxxr.exe 2836 bbthnt.exe 2088 nnbhtb.exe 2692 1vppj.exe 1608 xrflrrx.exe 1476 llxrfll.exe 2340 tthntb.exe 2696 jdpjv.exe 1744 jjpdj.exe 2784 fxfrflx.exe 3048 1lfrffr.exe 2232 hbhhnt.exe 2332 jjdjv.exe 2060 rrrxffl.exe 2820 7rffxxl.exe 880 htnhnt.exe 1460 pjdpv.exe 1972 7xxlxlx.exe 776 xrlxfff.exe 2976 dvdpv.exe 2132 ppdjd.exe 2100 3fxxrxl.exe 2996 rrfxlrr.exe 884 ttnbnb.exe 2148 vjjpd.exe 2388 dvjvd.exe 2640 fxrllrf.exe 2228 rlfxlrf.exe 1588 nnhnbh.exe 3000 ntnbtb.exe 2556 dvpvj.exe 2584 vppvp.exe 2596 frlflrf.exe 2752 xxrrlxl.exe 2728 ttbhtt.exe 2504 pdvdp.exe 2524 ddddj.exe 2952 5rffrfl.exe 2836 flrrfxl.exe 2672 tnthtt.exe 772 bbbbhh.exe 320 9jjpd.exe 1860 jppdv.exe 1308 rlffrrf.exe 944 rlxflxf.exe 2780 hbhhtt.exe 1536 ththhn.exe 1440 dvddp.exe 2968 vpdpj.exe 3048 xrllfxl.exe 1816 xxllrrx.exe 2252 3httbb.exe 784 nbnhbb.exe 1248 jppvd.exe 584 dvppv.exe 1800 frflrrx.exe 1916 flfrxrr.exe -
Processes:
resource yara_rule behavioral1/memory/2364-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2972-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2644-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2456-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2756-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2460-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2088-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1744-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2232-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2332-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1460-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/776-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-263-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2100-281-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
483a72b7874a17167dbcff1eec2d65d1d9f15b405de41b2863e9d677ae2e10af_NeikiAnalytics.exexrffxxl.exeflflxlf.exetnntnb.exe9vdvd.exe7nbthh.exe7bhhbn.exeppjvj.exelxllxxr.exebbthnt.exennbhtb.exe1vppj.exexrflrrx.exellxrfll.exetthntb.exejdpjv.exedescription pid process target process PID 2364 wrote to memory of 2208 2364 483a72b7874a17167dbcff1eec2d65d1d9f15b405de41b2863e9d677ae2e10af_NeikiAnalytics.exe xrffxxl.exe PID 2364 wrote to memory of 2208 2364 483a72b7874a17167dbcff1eec2d65d1d9f15b405de41b2863e9d677ae2e10af_NeikiAnalytics.exe xrffxxl.exe PID 2364 wrote to memory of 2208 2364 483a72b7874a17167dbcff1eec2d65d1d9f15b405de41b2863e9d677ae2e10af_NeikiAnalytics.exe xrffxxl.exe PID 2364 wrote to memory of 2208 2364 483a72b7874a17167dbcff1eec2d65d1d9f15b405de41b2863e9d677ae2e10af_NeikiAnalytics.exe xrffxxl.exe PID 2208 wrote to memory of 2416 2208 xrffxxl.exe flflxlf.exe PID 2208 wrote to memory of 2416 2208 xrffxxl.exe flflxlf.exe PID 2208 wrote to memory of 2416 2208 xrffxxl.exe flflxlf.exe PID 2208 wrote to memory of 2416 2208 xrffxxl.exe flflxlf.exe PID 2416 wrote to memory of 2972 2416 flflxlf.exe tnntnb.exe PID 2416 wrote to memory of 2972 2416 flflxlf.exe tnntnb.exe PID 2416 wrote to memory of 2972 2416 flflxlf.exe tnntnb.exe PID 2416 wrote to memory of 2972 2416 flflxlf.exe tnntnb.exe PID 2972 wrote to memory of 2644 2972 tnntnb.exe 9vdvd.exe PID 2972 wrote to memory of 2644 2972 tnntnb.exe 9vdvd.exe PID 2972 wrote to memory of 2644 2972 tnntnb.exe 9vdvd.exe PID 2972 wrote to memory of 2644 2972 tnntnb.exe 9vdvd.exe PID 2644 wrote to memory of 2456 2644 9vdvd.exe 7nbthh.exe PID 2644 wrote to memory of 2456 2644 9vdvd.exe 7nbthh.exe PID 2644 wrote to memory of 2456 2644 9vdvd.exe 7nbthh.exe PID 2644 wrote to memory of 2456 2644 9vdvd.exe 7nbthh.exe PID 2456 wrote to memory of 2756 2456 7nbthh.exe 7bhhbn.exe PID 2456 wrote to memory of 2756 2456 7nbthh.exe 7bhhbn.exe PID 2456 wrote to memory of 2756 2456 7nbthh.exe 7bhhbn.exe PID 2456 wrote to memory of 2756 2456 7nbthh.exe 7bhhbn.exe PID 2756 wrote to memory of 2720 2756 7bhhbn.exe ppjvj.exe PID 2756 wrote to memory of 2720 2756 7bhhbn.exe ppjvj.exe PID 2756 wrote to memory of 2720 2756 7bhhbn.exe ppjvj.exe PID 2756 wrote to memory of 2720 2756 7bhhbn.exe ppjvj.exe PID 2720 wrote to memory of 2460 2720 ppjvj.exe lxllxxr.exe PID 2720 wrote to memory of 2460 2720 ppjvj.exe lxllxxr.exe PID 2720 wrote to memory of 2460 2720 ppjvj.exe lxllxxr.exe PID 2720 wrote to memory of 2460 2720 ppjvj.exe lxllxxr.exe PID 2460 wrote to memory of 2836 2460 lxllxxr.exe bbthnt.exe PID 2460 wrote to memory of 2836 2460 lxllxxr.exe bbthnt.exe PID 2460 wrote to memory of 2836 2460 lxllxxr.exe bbthnt.exe PID 2460 wrote to memory of 2836 2460 lxllxxr.exe bbthnt.exe PID 2836 wrote to memory of 2088 2836 bbthnt.exe nnbhtb.exe PID 2836 wrote to memory of 2088 2836 bbthnt.exe nnbhtb.exe PID 2836 wrote to memory of 2088 2836 bbthnt.exe nnbhtb.exe PID 2836 wrote to memory of 2088 2836 bbthnt.exe nnbhtb.exe PID 2088 wrote to memory of 2692 2088 nnbhtb.exe 1vppj.exe PID 2088 wrote to memory of 2692 2088 nnbhtb.exe 1vppj.exe PID 2088 wrote to memory of 2692 2088 nnbhtb.exe 1vppj.exe PID 2088 wrote to memory of 2692 2088 nnbhtb.exe 1vppj.exe PID 2692 wrote to memory of 1608 2692 1vppj.exe xrflrrx.exe PID 2692 wrote to memory of 1608 2692 1vppj.exe xrflrrx.exe PID 2692 wrote to memory of 1608 2692 1vppj.exe xrflrrx.exe PID 2692 wrote to memory of 1608 2692 1vppj.exe xrflrrx.exe PID 1608 wrote to memory of 1476 1608 xrflrrx.exe llxrfll.exe PID 1608 wrote to memory of 1476 1608 xrflrrx.exe llxrfll.exe PID 1608 wrote to memory of 1476 1608 xrflrrx.exe llxrfll.exe PID 1608 wrote to memory of 1476 1608 xrflrrx.exe llxrfll.exe PID 1476 wrote to memory of 2340 1476 llxrfll.exe tthntb.exe PID 1476 wrote to memory of 2340 1476 llxrfll.exe tthntb.exe PID 1476 wrote to memory of 2340 1476 llxrfll.exe tthntb.exe PID 1476 wrote to memory of 2340 1476 llxrfll.exe tthntb.exe PID 2340 wrote to memory of 2696 2340 tthntb.exe jdpjv.exe PID 2340 wrote to memory of 2696 2340 tthntb.exe jdpjv.exe PID 2340 wrote to memory of 2696 2340 tthntb.exe jdpjv.exe PID 2340 wrote to memory of 2696 2340 tthntb.exe jdpjv.exe PID 2696 wrote to memory of 1744 2696 jdpjv.exe jjpdj.exe PID 2696 wrote to memory of 1744 2696 jdpjv.exe jjpdj.exe PID 2696 wrote to memory of 1744 2696 jdpjv.exe jjpdj.exe PID 2696 wrote to memory of 1744 2696 jdpjv.exe jjpdj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\483a72b7874a17167dbcff1eec2d65d1d9f15b405de41b2863e9d677ae2e10af_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\483a72b7874a17167dbcff1eec2d65d1d9f15b405de41b2863e9d677ae2e10af_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\xrffxxl.exec:\xrffxxl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\flflxlf.exec:\flflxlf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnntnb.exec:\tnntnb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9vdvd.exec:\9vdvd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7nbthh.exec:\7nbthh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7bhhbn.exec:\7bhhbn.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ppjvj.exec:\ppjvj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxllxxr.exec:\lxllxxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbthnt.exec:\bbthnt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnbhtb.exec:\nnbhtb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1vppj.exec:\1vppj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrflrrx.exec:\xrflrrx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\llxrfll.exec:\llxrfll.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tthntb.exec:\tthntb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdpjv.exec:\jdpjv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjpdj.exec:\jjpdj.exe17⤵
- Executes dropped EXE
-
\??\c:\fxfrflx.exec:\fxfrflx.exe18⤵
- Executes dropped EXE
-
\??\c:\1lfrffr.exec:\1lfrffr.exe19⤵
- Executes dropped EXE
-
\??\c:\hbhhnt.exec:\hbhhnt.exe20⤵
- Executes dropped EXE
-
\??\c:\jjdjv.exec:\jjdjv.exe21⤵
- Executes dropped EXE
-
\??\c:\rrrxffl.exec:\rrrxffl.exe22⤵
- Executes dropped EXE
-
\??\c:\7rffxxl.exec:\7rffxxl.exe23⤵
- Executes dropped EXE
-
\??\c:\htnhnt.exec:\htnhnt.exe24⤵
- Executes dropped EXE
-
\??\c:\pjdpv.exec:\pjdpv.exe25⤵
- Executes dropped EXE
-
\??\c:\7xxlxlx.exec:\7xxlxlx.exe26⤵
- Executes dropped EXE
-
\??\c:\xrlxfff.exec:\xrlxfff.exe27⤵
- Executes dropped EXE
-
\??\c:\dvdpv.exec:\dvdpv.exe28⤵
- Executes dropped EXE
-
\??\c:\ppdjd.exec:\ppdjd.exe29⤵
- Executes dropped EXE
-
\??\c:\3fxxrxl.exec:\3fxxrxl.exe30⤵
- Executes dropped EXE
-
\??\c:\rrfxlrr.exec:\rrfxlrr.exe31⤵
- Executes dropped EXE
-
\??\c:\ttnbnb.exec:\ttnbnb.exe32⤵
- Executes dropped EXE
-
\??\c:\vjjpd.exec:\vjjpd.exe33⤵
- Executes dropped EXE
-
\??\c:\dvjvd.exec:\dvjvd.exe34⤵
- Executes dropped EXE
-
\??\c:\fxrllrf.exec:\fxrllrf.exe35⤵
- Executes dropped EXE
-
\??\c:\rlfxlrf.exec:\rlfxlrf.exe36⤵
- Executes dropped EXE
-
\??\c:\nnhnbh.exec:\nnhnbh.exe37⤵
- Executes dropped EXE
-
\??\c:\ntnbtb.exec:\ntnbtb.exe38⤵
- Executes dropped EXE
-
\??\c:\dvpvj.exec:\dvpvj.exe39⤵
- Executes dropped EXE
-
\??\c:\vppvp.exec:\vppvp.exe40⤵
- Executes dropped EXE
-
\??\c:\frlflrf.exec:\frlflrf.exe41⤵
- Executes dropped EXE
-
\??\c:\xxrrlxl.exec:\xxrrlxl.exe42⤵
- Executes dropped EXE
-
\??\c:\ttbhtt.exec:\ttbhtt.exe43⤵
- Executes dropped EXE
-
\??\c:\pdvdp.exec:\pdvdp.exe44⤵
- Executes dropped EXE
-
\??\c:\ddddj.exec:\ddddj.exe45⤵
- Executes dropped EXE
-
\??\c:\5rffrfl.exec:\5rffrfl.exe46⤵
- Executes dropped EXE
-
\??\c:\flrrfxl.exec:\flrrfxl.exe47⤵
- Executes dropped EXE
-
\??\c:\tnthtt.exec:\tnthtt.exe48⤵
- Executes dropped EXE
-
\??\c:\bbbbhh.exec:\bbbbhh.exe49⤵
- Executes dropped EXE
-
\??\c:\9jjpd.exec:\9jjpd.exe50⤵
- Executes dropped EXE
-
\??\c:\jppdv.exec:\jppdv.exe51⤵
- Executes dropped EXE
-
\??\c:\rlffrrf.exec:\rlffrrf.exe52⤵
- Executes dropped EXE
-
\??\c:\rlxflxf.exec:\rlxflxf.exe53⤵
- Executes dropped EXE
-
\??\c:\hbhhtt.exec:\hbhhtt.exe54⤵
- Executes dropped EXE
-
\??\c:\ththhn.exec:\ththhn.exe55⤵
- Executes dropped EXE
-
\??\c:\dvddp.exec:\dvddp.exe56⤵
- Executes dropped EXE
-
\??\c:\vpdpj.exec:\vpdpj.exe57⤵
- Executes dropped EXE
-
\??\c:\xrllfxl.exec:\xrllfxl.exe58⤵
- Executes dropped EXE
-
\??\c:\xxllrrx.exec:\xxllrrx.exe59⤵
- Executes dropped EXE
-
\??\c:\3httbb.exec:\3httbb.exe60⤵
- Executes dropped EXE
-
\??\c:\nbnhbb.exec:\nbnhbb.exe61⤵
- Executes dropped EXE
-
\??\c:\jppvd.exec:\jppvd.exe62⤵
- Executes dropped EXE
-
\??\c:\dvppv.exec:\dvppv.exe63⤵
- Executes dropped EXE
-
\??\c:\frflrrx.exec:\frflrrx.exe64⤵
- Executes dropped EXE
-
\??\c:\flfrxrr.exec:\flfrxrr.exe65⤵
- Executes dropped EXE
-
\??\c:\bbthnb.exec:\bbthnb.exe66⤵
-
\??\c:\5bhnbh.exec:\5bhnbh.exe67⤵
-
\??\c:\vjdvj.exec:\vjdvj.exe68⤵
-
\??\c:\1vjjp.exec:\1vjjp.exe69⤵
-
\??\c:\rlrffrr.exec:\rlrffrr.exe70⤵
-
\??\c:\5lxxrxx.exec:\5lxxrxx.exe71⤵
-
\??\c:\bntthh.exec:\bntthh.exe72⤵
-
\??\c:\nhhthn.exec:\nhhthn.exe73⤵
-
\??\c:\ddpdp.exec:\ddpdp.exe74⤵
-
\??\c:\ppjvp.exec:\ppjvp.exe75⤵
-
\??\c:\xrxflrf.exec:\xrxflrf.exe76⤵
-
\??\c:\ffxlfrf.exec:\ffxlfrf.exe77⤵
-
\??\c:\nbtbhb.exec:\nbtbhb.exe78⤵
-
\??\c:\tnbhnn.exec:\tnbhnn.exe79⤵
-
\??\c:\ddvjv.exec:\ddvjv.exe80⤵
-
\??\c:\rlffflf.exec:\rlffflf.exe81⤵
-
\??\c:\lfxxffl.exec:\lfxxffl.exe82⤵
-
\??\c:\9httnt.exec:\9httnt.exe83⤵
-
\??\c:\btthnn.exec:\btthnn.exe84⤵
-
\??\c:\7dvdv.exec:\7dvdv.exe85⤵
-
\??\c:\dpjpd.exec:\dpjpd.exe86⤵
-
\??\c:\7rxlrxf.exec:\7rxlrxf.exe87⤵
-
\??\c:\xrxlfxl.exec:\xrxlfxl.exe88⤵
-
\??\c:\hbtthn.exec:\hbtthn.exe89⤵
-
\??\c:\jdvjp.exec:\jdvjp.exe90⤵
-
\??\c:\vjpdj.exec:\vjpdj.exe91⤵
-
\??\c:\xxlllff.exec:\xxlllff.exe92⤵
-
\??\c:\htbbtb.exec:\htbbtb.exe93⤵
-
\??\c:\hthhbb.exec:\hthhbb.exe94⤵
-
\??\c:\9vjdp.exec:\9vjdp.exe95⤵
-
\??\c:\vjpjv.exec:\vjpjv.exe96⤵
-
\??\c:\frlxfxx.exec:\frlxfxx.exe97⤵
-
\??\c:\1fllrxx.exec:\1fllrxx.exe98⤵
-
\??\c:\hntttn.exec:\hntttn.exe99⤵
-
\??\c:\pdpdj.exec:\pdpdj.exe100⤵
-
\??\c:\jvjjv.exec:\jvjjv.exe101⤵
-
\??\c:\rrxflfl.exec:\rrxflfl.exe102⤵
-
\??\c:\7lxffff.exec:\7lxffff.exe103⤵
-
\??\c:\tnbhbb.exec:\tnbhbb.exe104⤵
-
\??\c:\dvpjp.exec:\dvpjp.exe105⤵
-
\??\c:\vvdvd.exec:\vvdvd.exe106⤵
-
\??\c:\xrllffr.exec:\xrllffr.exe107⤵
-
\??\c:\hntnbh.exec:\hntnbh.exe108⤵
-
\??\c:\1nbnhh.exec:\1nbnhh.exe109⤵
-
\??\c:\1jpvp.exec:\1jpvp.exe110⤵
-
\??\c:\jdpjj.exec:\jdpjj.exe111⤵
-
\??\c:\rfffrfr.exec:\rfffrfr.exe112⤵
-
\??\c:\9frlfll.exec:\9frlfll.exe113⤵
-
\??\c:\htbbbb.exec:\htbbbb.exe114⤵
-
\??\c:\pvdvd.exec:\pvdvd.exe115⤵
-
\??\c:\pdpvd.exec:\pdpvd.exe116⤵
-
\??\c:\rllrrxf.exec:\rllrrxf.exe117⤵
-
\??\c:\7lrxxrf.exec:\7lrxxrf.exe118⤵
-
\??\c:\ntbbhh.exec:\ntbbhh.exe119⤵
-
\??\c:\nhnbtn.exec:\nhnbtn.exe120⤵
-
\??\c:\pjdjv.exec:\pjdjv.exe121⤵
-
\??\c:\djvdp.exec:\djvdp.exe122⤵
-
\??\c:\xxxrxll.exec:\xxxrxll.exe123⤵
-
\??\c:\fllrlff.exec:\fllrlff.exe124⤵
-
\??\c:\1bthbn.exec:\1bthbn.exe125⤵
-
\??\c:\vpddj.exec:\vpddj.exe126⤵
-
\??\c:\3pjjp.exec:\3pjjp.exe127⤵
-
\??\c:\1rlxxxf.exec:\1rlxxxf.exe128⤵
-
\??\c:\rfxxffl.exec:\rfxxffl.exe129⤵
-
\??\c:\bbntnb.exec:\bbntnb.exe130⤵
-
\??\c:\hbttnt.exec:\hbttnt.exe131⤵
-
\??\c:\3pdpv.exec:\3pdpv.exe132⤵
-
\??\c:\7flrxlx.exec:\7flrxlx.exe133⤵
-
\??\c:\lxxlfrl.exec:\lxxlfrl.exe134⤵
-
\??\c:\ffrlflx.exec:\ffrlflx.exe135⤵
-
\??\c:\hhttbb.exec:\hhttbb.exe136⤵
-
\??\c:\hhnhnt.exec:\hhnhnt.exe137⤵
-
\??\c:\jvjjv.exec:\jvjjv.exe138⤵
-
\??\c:\ddpjd.exec:\ddpjd.exe139⤵
-
\??\c:\llxfrrf.exec:\llxfrrf.exe140⤵
-
\??\c:\fxfflll.exec:\fxfflll.exe141⤵
-
\??\c:\bthhht.exec:\bthhht.exe142⤵
-
\??\c:\1bnnbn.exec:\1bnnbn.exe143⤵
-
\??\c:\dpjvj.exec:\dpjvj.exe144⤵
-
\??\c:\5djdj.exec:\5djdj.exe145⤵
-
\??\c:\5rxlrxf.exec:\5rxlrxf.exe146⤵
-
\??\c:\xlrlrlr.exec:\xlrlrlr.exe147⤵
-
\??\c:\nhthbn.exec:\nhthbn.exe148⤵
-
\??\c:\nhnnnt.exec:\nhnnnt.exe149⤵
-
\??\c:\pjjjp.exec:\pjjjp.exe150⤵
-
\??\c:\3vvdv.exec:\3vvdv.exe151⤵
-
\??\c:\3xrfxlx.exec:\3xrfxlx.exe152⤵
-
\??\c:\hhhntn.exec:\hhhntn.exe153⤵
-
\??\c:\hhhhht.exec:\hhhhht.exe154⤵
-
\??\c:\rrrffxr.exec:\rrrffxr.exe155⤵
-
\??\c:\3rfxflr.exec:\3rfxflr.exe156⤵
-
\??\c:\hhhbth.exec:\hhhbth.exe157⤵
-
\??\c:\vvjvd.exec:\vvjvd.exe158⤵
-
\??\c:\jdpvd.exec:\jdpvd.exe159⤵
-
\??\c:\jjvdp.exec:\jjvdp.exe160⤵
-
\??\c:\1lfrxfr.exec:\1lfrxfr.exe161⤵
-
\??\c:\bbnbth.exec:\bbnbth.exe162⤵
-
\??\c:\hbnthn.exec:\hbnthn.exe163⤵
-
\??\c:\vpddp.exec:\vpddp.exe164⤵
-
\??\c:\pjdjv.exec:\pjdjv.exe165⤵
-
\??\c:\3llfrrl.exec:\3llfrrl.exe166⤵
-
\??\c:\1xxfxrf.exec:\1xxfxrf.exe167⤵
-
\??\c:\bhbnnn.exec:\bhbnnn.exe168⤵
-
\??\c:\hbbhhh.exec:\hbbhhh.exe169⤵
-
\??\c:\vjdpv.exec:\vjdpv.exe170⤵
-
\??\c:\vvpvj.exec:\vvpvj.exe171⤵
-
\??\c:\3lrflrf.exec:\3lrflrf.exe172⤵
-
\??\c:\nhhtnn.exec:\nhhtnn.exe173⤵
-
\??\c:\hhnbbn.exec:\hhnbbn.exe174⤵
-
\??\c:\jvddp.exec:\jvddp.exe175⤵
-
\??\c:\pjvpv.exec:\pjvpv.exe176⤵
-
\??\c:\xfxrlrl.exec:\xfxrlrl.exe177⤵
-
\??\c:\fxxlrff.exec:\fxxlrff.exe178⤵
-
\??\c:\9tntbh.exec:\9tntbh.exe179⤵
-
\??\c:\nhthnt.exec:\nhthnt.exe180⤵
-
\??\c:\hhbhnb.exec:\hhbhnb.exe181⤵
-
\??\c:\vpvjd.exec:\vpvjd.exe182⤵
-
\??\c:\rlxffff.exec:\rlxffff.exe183⤵
-
\??\c:\rrrxxfr.exec:\rrrxxfr.exe184⤵
-
\??\c:\htntbh.exec:\htntbh.exe185⤵
-
\??\c:\5hhbtb.exec:\5hhbtb.exe186⤵
-
\??\c:\pvpdp.exec:\pvpdp.exe187⤵
-
\??\c:\dvddj.exec:\dvddj.exe188⤵
-
\??\c:\xrfrlxx.exec:\xrfrlxx.exe189⤵
-
\??\c:\hbnnnt.exec:\hbnnnt.exe190⤵
-
\??\c:\1nbnth.exec:\1nbnth.exe191⤵
-
\??\c:\7vpjv.exec:\7vpjv.exe192⤵
-
\??\c:\jdpdp.exec:\jdpdp.exe193⤵
-
\??\c:\1rxfrxf.exec:\1rxfrxf.exe194⤵
-
\??\c:\9rrrxrf.exec:\9rrrxrf.exe195⤵
-
\??\c:\bbhhtt.exec:\bbhhtt.exe196⤵
-
\??\c:\5dpdd.exec:\5dpdd.exe197⤵
-
\??\c:\9ddvj.exec:\9ddvj.exe198⤵
-
\??\c:\5xrxllr.exec:\5xrxllr.exe199⤵
-
\??\c:\7rxlxrf.exec:\7rxlxrf.exe200⤵
-
\??\c:\3nbhth.exec:\3nbhth.exe201⤵
-
\??\c:\hbhnhb.exec:\hbhnhb.exe202⤵
-
\??\c:\3vppv.exec:\3vppv.exe203⤵
-
\??\c:\dvddv.exec:\dvddv.exe204⤵
-
\??\c:\rfxrrlf.exec:\rfxrrlf.exe205⤵
-
\??\c:\3fxfflx.exec:\3fxfflx.exe206⤵
-
\??\c:\nhtnhh.exec:\nhtnhh.exe207⤵
-
\??\c:\7nttnn.exec:\7nttnn.exe208⤵
-
\??\c:\3jddj.exec:\3jddj.exe209⤵
-
\??\c:\3vvpd.exec:\3vvpd.exe210⤵
-
\??\c:\xlflflx.exec:\xlflflx.exe211⤵
-
\??\c:\1rrrflx.exec:\1rrrflx.exe212⤵
-
\??\c:\1nnthh.exec:\1nnthh.exe213⤵
-
\??\c:\7htthh.exec:\7htthh.exe214⤵
-
\??\c:\jdvvd.exec:\jdvvd.exe215⤵
-
\??\c:\pjvdp.exec:\pjvdp.exe216⤵
-
\??\c:\rfxxrrf.exec:\rfxxrrf.exe217⤵
-
\??\c:\9rrllfl.exec:\9rrllfl.exe218⤵
-
\??\c:\tnbbnh.exec:\tnbbnh.exe219⤵
-
\??\c:\htbbnn.exec:\htbbnn.exe220⤵
-
\??\c:\3jdpj.exec:\3jdpj.exe221⤵
-
\??\c:\pdvvv.exec:\pdvvv.exe222⤵
-
\??\c:\xxlflxl.exec:\xxlflxl.exe223⤵
-
\??\c:\fxllxxl.exec:\fxllxxl.exe224⤵
-
\??\c:\thtbnn.exec:\thtbnn.exe225⤵
-
\??\c:\5tnhth.exec:\5tnhth.exe226⤵
-
\??\c:\jddvj.exec:\jddvj.exe227⤵
-
\??\c:\vpppv.exec:\vpppv.exe228⤵
-
\??\c:\rlrxxfr.exec:\rlrxxfr.exe229⤵
-
\??\c:\fxllflx.exec:\fxllflx.exe230⤵
-
\??\c:\hnhtbb.exec:\hnhtbb.exe231⤵
-
\??\c:\ttbhbb.exec:\ttbhbb.exe232⤵
-
\??\c:\dpdvd.exec:\dpdvd.exe233⤵
-
\??\c:\dpdjd.exec:\dpdjd.exe234⤵
-
\??\c:\3xxrfff.exec:\3xxrfff.exe235⤵
-
\??\c:\nhnnbt.exec:\nhnnbt.exe236⤵
-
\??\c:\tbnhnh.exec:\tbnhnh.exe237⤵
-
\??\c:\9pjvp.exec:\9pjvp.exe238⤵
-
\??\c:\vppdj.exec:\vppdj.exe239⤵
-
\??\c:\lxxfrrx.exec:\lxxfrrx.exe240⤵
-
\??\c:\xxrxflx.exec:\xxrxflx.exe241⤵