Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 12:19
Behavioral task
behavioral1
Sample
51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68_NeikiAnalytics.exe
Resource
win7-20240508-en
6 signatures
150 seconds
General
-
Target
51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68_NeikiAnalytics.exe
-
Size
490KB
-
MD5
37e987ffea04fe20d32c1e84786951a0
-
SHA1
7d1f3cc72269f3a10e34e64958bb45bcd5efd943
-
SHA256
51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68
-
SHA512
602ce8b0c832b8c5cf72ce551d93a9d3bb31548afa0fd8be58cef8b2e225b2fce8ed00a0ad52e748d84e36be7f4a502d42c0884767ad62c6afd3b36dfdaf24c3
-
SSDEEP
6144:n3C9BRo7tvnJ9oH0IRgZvjkUo7tvnJ9oH0IiVByq9CPobNVtg:n3C9ytvngQjgtvngSV3CPobNVtg
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral1/memory/3008-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2588-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2784-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1752-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2404-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2488-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2968-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/352-97-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2840-115-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1584-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2204-133-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1540-151-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/900-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2464-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1224-169-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2316-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/264-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2236-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/788-214-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2060-223-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/688-241-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/676-250-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/944-268-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
btbhbb.exepjddj.exelllffll.exebbhttt.exepvdpj.exetbbtth.exevvvdd.exebbbhbh.exelfxlxlr.exe5bbtbt.exedjpdv.exelrxffxr.exe5pvjd.exeffxllxr.exepvjdv.exerxfxflf.exedpvvd.exexfffxrx.exelrrllrl.exeffxfrfr.exerxlflfl.exexxxlrfx.exebhntnt.exetbtnhh.exe9rrfxfr.exe1ppdd.exexxxlfxx.exettbtnb.exedpdvd.exe5bhbhn.exepvjdv.exethhbtn.exejvvdv.exebntbth.exeddppv.exelxfrxff.exehtnbtn.exehtttbn.exennhbhn.exellfrrxl.exenhbnbh.exexxrxlrl.exetbnttt.exe1vjjj.exe1tthbh.exejpjpd.exelxrrxfl.exenbbtnb.exeddjvp.exefxrfxlx.exethnnth.exennthnb.exevvppd.exerrlrlrf.exe3thbht.exejvpdp.exefrxxxrx.exehnthbn.exepppjj.exellflrrf.exehhhhtt.exebhnhnn.exe5vvjd.exefllrfll.exepid process 2692 btbhbb.exe 2588 pjddj.exe 2752 lllffll.exe 2784 bbhttt.exe 1752 pvdpj.exe 2404 tbbtth.exe 2488 vvvdd.exe 2968 bbbhbh.exe 352 lfxlxlr.exe 2728 5bbtbt.exe 2840 djpdv.exe 1584 lrxffxr.exe 2204 5pvjd.exe 900 ffxllxr.exe 1540 pvjdv.exe 2464 rxfxflf.exe 1224 dpvvd.exe 2316 xfffxrx.exe 2940 lrrllrl.exe 264 ffxfrfr.exe 2236 rxlflfl.exe 788 xxxlrfx.exe 2060 bhntnt.exe 2344 tbtnhh.exe 688 9rrfxfr.exe 676 1ppdd.exe 2076 xxxlfxx.exe 944 ttbtnb.exe 2900 dpdvd.exe 2368 5bhbhn.exe 1740 pvjdv.exe 892 thhbtn.exe 2164 jvvdv.exe 2400 bntbth.exe 2800 ddppv.exe 2676 lxfrxff.exe 2636 htnbtn.exe 2864 htttbn.exe 2784 nnhbhn.exe 1752 llfrrxl.exe 2644 nhbnbh.exe 2552 xxrxlrl.exe 2488 tbnttt.exe 1596 1vjjj.exe 3000 1tthbh.exe 2824 jpjpd.exe 1368 lxrrxfl.exe 1780 nbbtnb.exe 1124 ddjvp.exe 2188 fxrfxlx.exe 1792 thnnth.exe 900 nnthnb.exe 2192 vvppd.exe 1416 rrlrlrf.exe 1688 3thbht.exe 2020 jvpdp.exe 1348 frxxxrx.exe 344 hnthbn.exe 1920 pppjj.exe 768 llflrrf.exe 592 hhhhtt.exe 332 bhnhnn.exe 2888 5vvjd.exe 2880 fllrfll.exe -
Processes:
resource yara_rule behavioral1/memory/3008-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2588-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2784-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1752-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2404-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2488-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/352-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2840-115-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1584-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2204-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1540-151-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/900-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2464-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1224-169-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2316-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/264-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2236-205-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/788-214-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2060-223-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/688-241-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/676-250-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/944-268-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68_NeikiAnalytics.exebtbhbb.exepjddj.exelllffll.exebbhttt.exepvdpj.exetbbtth.exevvvdd.exebbbhbh.exelfxlxlr.exe5bbtbt.exedjpdv.exelrxffxr.exe5pvjd.exeffxllxr.exepvjdv.exedescription pid process target process PID 3008 wrote to memory of 2692 3008 51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68_NeikiAnalytics.exe btbhbb.exe PID 3008 wrote to memory of 2692 3008 51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68_NeikiAnalytics.exe btbhbb.exe PID 3008 wrote to memory of 2692 3008 51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68_NeikiAnalytics.exe btbhbb.exe PID 3008 wrote to memory of 2692 3008 51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68_NeikiAnalytics.exe btbhbb.exe PID 2692 wrote to memory of 2588 2692 btbhbb.exe pjddj.exe PID 2692 wrote to memory of 2588 2692 btbhbb.exe pjddj.exe PID 2692 wrote to memory of 2588 2692 btbhbb.exe pjddj.exe PID 2692 wrote to memory of 2588 2692 btbhbb.exe pjddj.exe PID 2588 wrote to memory of 2752 2588 pjddj.exe lllffll.exe PID 2588 wrote to memory of 2752 2588 pjddj.exe lllffll.exe PID 2588 wrote to memory of 2752 2588 pjddj.exe lllffll.exe PID 2588 wrote to memory of 2752 2588 pjddj.exe lllffll.exe PID 2752 wrote to memory of 2784 2752 lllffll.exe bbhttt.exe PID 2752 wrote to memory of 2784 2752 lllffll.exe bbhttt.exe PID 2752 wrote to memory of 2784 2752 lllffll.exe bbhttt.exe PID 2752 wrote to memory of 2784 2752 lllffll.exe bbhttt.exe PID 2784 wrote to memory of 1752 2784 bbhttt.exe pvdpj.exe PID 2784 wrote to memory of 1752 2784 bbhttt.exe pvdpj.exe PID 2784 wrote to memory of 1752 2784 bbhttt.exe pvdpj.exe PID 2784 wrote to memory of 1752 2784 bbhttt.exe pvdpj.exe PID 1752 wrote to memory of 2404 1752 pvdpj.exe tbbtth.exe PID 1752 wrote to memory of 2404 1752 pvdpj.exe tbbtth.exe PID 1752 wrote to memory of 2404 1752 pvdpj.exe tbbtth.exe PID 1752 wrote to memory of 2404 1752 pvdpj.exe tbbtth.exe PID 2404 wrote to memory of 2488 2404 tbbtth.exe vvvdd.exe PID 2404 wrote to memory of 2488 2404 tbbtth.exe vvvdd.exe PID 2404 wrote to memory of 2488 2404 tbbtth.exe vvvdd.exe PID 2404 wrote to memory of 2488 2404 tbbtth.exe vvvdd.exe PID 2488 wrote to memory of 2968 2488 vvvdd.exe bbbhbh.exe PID 2488 wrote to memory of 2968 2488 vvvdd.exe bbbhbh.exe PID 2488 wrote to memory of 2968 2488 vvvdd.exe bbbhbh.exe PID 2488 wrote to memory of 2968 2488 vvvdd.exe bbbhbh.exe PID 2968 wrote to memory of 352 2968 bbbhbh.exe lfxlxlr.exe PID 2968 wrote to memory of 352 2968 bbbhbh.exe lfxlxlr.exe PID 2968 wrote to memory of 352 2968 bbbhbh.exe lfxlxlr.exe PID 2968 wrote to memory of 352 2968 bbbhbh.exe lfxlxlr.exe PID 352 wrote to memory of 2728 352 lfxlxlr.exe 5bbtbt.exe PID 352 wrote to memory of 2728 352 lfxlxlr.exe 5bbtbt.exe PID 352 wrote to memory of 2728 352 lfxlxlr.exe 5bbtbt.exe PID 352 wrote to memory of 2728 352 lfxlxlr.exe 5bbtbt.exe PID 2728 wrote to memory of 2840 2728 5bbtbt.exe djpdv.exe PID 2728 wrote to memory of 2840 2728 5bbtbt.exe djpdv.exe PID 2728 wrote to memory of 2840 2728 5bbtbt.exe djpdv.exe PID 2728 wrote to memory of 2840 2728 5bbtbt.exe djpdv.exe PID 2840 wrote to memory of 1584 2840 djpdv.exe lrxffxr.exe PID 2840 wrote to memory of 1584 2840 djpdv.exe lrxffxr.exe PID 2840 wrote to memory of 1584 2840 djpdv.exe lrxffxr.exe PID 2840 wrote to memory of 1584 2840 djpdv.exe lrxffxr.exe PID 1584 wrote to memory of 2204 1584 lrxffxr.exe 5pvjd.exe PID 1584 wrote to memory of 2204 1584 lrxffxr.exe 5pvjd.exe PID 1584 wrote to memory of 2204 1584 lrxffxr.exe 5pvjd.exe PID 1584 wrote to memory of 2204 1584 lrxffxr.exe 5pvjd.exe PID 2204 wrote to memory of 900 2204 5pvjd.exe ffxllxr.exe PID 2204 wrote to memory of 900 2204 5pvjd.exe ffxllxr.exe PID 2204 wrote to memory of 900 2204 5pvjd.exe ffxllxr.exe PID 2204 wrote to memory of 900 2204 5pvjd.exe ffxllxr.exe PID 900 wrote to memory of 1540 900 ffxllxr.exe pvjdv.exe PID 900 wrote to memory of 1540 900 ffxllxr.exe pvjdv.exe PID 900 wrote to memory of 1540 900 ffxllxr.exe pvjdv.exe PID 900 wrote to memory of 1540 900 ffxllxr.exe pvjdv.exe PID 1540 wrote to memory of 2464 1540 pvjdv.exe rxfxflf.exe PID 1540 wrote to memory of 2464 1540 pvjdv.exe rxfxflf.exe PID 1540 wrote to memory of 2464 1540 pvjdv.exe rxfxflf.exe PID 1540 wrote to memory of 2464 1540 pvjdv.exe rxfxflf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\51c6e6ca3d4ddcc3a809c64f2fbc08c35e2851946017cf57f7dc1e60a3d77a68_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\btbhbb.exec:\btbhbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjddj.exec:\pjddj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lllffll.exec:\lllffll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbhttt.exec:\bbhttt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvdpj.exec:\pvdpj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tbbtth.exec:\tbbtth.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvvdd.exec:\vvvdd.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbbhbh.exec:\bbbhbh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfxlxlr.exec:\lfxlxlr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5bbtbt.exec:\5bbtbt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djpdv.exec:\djpdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrxffxr.exec:\lrxffxr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5pvjd.exec:\5pvjd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ffxllxr.exec:\ffxllxr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvjdv.exec:\pvjdv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxfxflf.exec:\rxfxflf.exe17⤵
- Executes dropped EXE
-
\??\c:\dpvvd.exec:\dpvvd.exe18⤵
- Executes dropped EXE
-
\??\c:\xfffxrx.exec:\xfffxrx.exe19⤵
- Executes dropped EXE
-
\??\c:\lrrllrl.exec:\lrrllrl.exe20⤵
- Executes dropped EXE
-
\??\c:\ffxfrfr.exec:\ffxfrfr.exe21⤵
- Executes dropped EXE
-
\??\c:\rxlflfl.exec:\rxlflfl.exe22⤵
- Executes dropped EXE
-
\??\c:\xxxlrfx.exec:\xxxlrfx.exe23⤵
- Executes dropped EXE
-
\??\c:\bhntnt.exec:\bhntnt.exe24⤵
- Executes dropped EXE
-
\??\c:\tbtnhh.exec:\tbtnhh.exe25⤵
- Executes dropped EXE
-
\??\c:\9rrfxfr.exec:\9rrfxfr.exe26⤵
- Executes dropped EXE
-
\??\c:\1ppdd.exec:\1ppdd.exe27⤵
- Executes dropped EXE
-
\??\c:\xxxlfxx.exec:\xxxlfxx.exe28⤵
- Executes dropped EXE
-
\??\c:\ttbtnb.exec:\ttbtnb.exe29⤵
- Executes dropped EXE
-
\??\c:\dpdvd.exec:\dpdvd.exe30⤵
- Executes dropped EXE
-
\??\c:\5bhbhn.exec:\5bhbhn.exe31⤵
- Executes dropped EXE
-
\??\c:\pvjdv.exec:\pvjdv.exe32⤵
- Executes dropped EXE
-
\??\c:\thhbtn.exec:\thhbtn.exe33⤵
- Executes dropped EXE
-
\??\c:\jvvdv.exec:\jvvdv.exe34⤵
- Executes dropped EXE
-
\??\c:\frlrrxl.exec:\frlrrxl.exe35⤵
-
\??\c:\bntbth.exec:\bntbth.exe36⤵
- Executes dropped EXE
-
\??\c:\ddppv.exec:\ddppv.exe37⤵
- Executes dropped EXE
-
\??\c:\lxfrxff.exec:\lxfrxff.exe38⤵
- Executes dropped EXE
-
\??\c:\htnbtn.exec:\htnbtn.exe39⤵
- Executes dropped EXE
-
\??\c:\htttbn.exec:\htttbn.exe40⤵
- Executes dropped EXE
-
\??\c:\nnhbhn.exec:\nnhbhn.exe41⤵
- Executes dropped EXE
-
\??\c:\llfrrxl.exec:\llfrrxl.exe42⤵
- Executes dropped EXE
-
\??\c:\nhbnbh.exec:\nhbnbh.exe43⤵
- Executes dropped EXE
-
\??\c:\xxrxlrl.exec:\xxrxlrl.exe44⤵
- Executes dropped EXE
-
\??\c:\tbnttt.exec:\tbnttt.exe45⤵
- Executes dropped EXE
-
\??\c:\1vjjj.exec:\1vjjj.exe46⤵
- Executes dropped EXE
-
\??\c:\1tthbh.exec:\1tthbh.exe47⤵
- Executes dropped EXE
-
\??\c:\jpjpd.exec:\jpjpd.exe48⤵
- Executes dropped EXE
-
\??\c:\lxrrxfl.exec:\lxrrxfl.exe49⤵
- Executes dropped EXE
-
\??\c:\nbbtnb.exec:\nbbtnb.exe50⤵
- Executes dropped EXE
-
\??\c:\ddjvp.exec:\ddjvp.exe51⤵
- Executes dropped EXE
-
\??\c:\fxrfxlx.exec:\fxrfxlx.exe52⤵
- Executes dropped EXE
-
\??\c:\thnnth.exec:\thnnth.exe53⤵
- Executes dropped EXE
-
\??\c:\nnthnb.exec:\nnthnb.exe54⤵
- Executes dropped EXE
-
\??\c:\vvppd.exec:\vvppd.exe55⤵
- Executes dropped EXE
-
\??\c:\rrlrlrf.exec:\rrlrlrf.exe56⤵
- Executes dropped EXE
-
\??\c:\3thbht.exec:\3thbht.exe57⤵
- Executes dropped EXE
-
\??\c:\jvpdp.exec:\jvpdp.exe58⤵
- Executes dropped EXE
-
\??\c:\frxxxrx.exec:\frxxxrx.exe59⤵
- Executes dropped EXE
-
\??\c:\hnthbn.exec:\hnthbn.exe60⤵
- Executes dropped EXE
-
\??\c:\pppjj.exec:\pppjj.exe61⤵
- Executes dropped EXE
-
\??\c:\llflrrf.exec:\llflrrf.exe62⤵
- Executes dropped EXE
-
\??\c:\hhhhtt.exec:\hhhhtt.exe63⤵
- Executes dropped EXE
-
\??\c:\bhnhnn.exec:\bhnhnn.exe64⤵
- Executes dropped EXE
-
\??\c:\5vvjd.exec:\5vvjd.exe65⤵
- Executes dropped EXE
-
\??\c:\fllrfll.exec:\fllrfll.exe66⤵
- Executes dropped EXE
-
\??\c:\nhhthn.exec:\nhhthn.exe67⤵
-
\??\c:\ddpvv.exec:\ddpvv.exe68⤵
-
\??\c:\flrrrlx.exec:\flrrrlx.exe69⤵
-
\??\c:\nnhtbn.exec:\nnhtbn.exe70⤵
-
\??\c:\dddpv.exec:\dddpv.exe71⤵
-
\??\c:\pjddp.exec:\pjddp.exe72⤵
-
\??\c:\ntnhtt.exec:\ntnhtt.exe73⤵
-
\??\c:\hntnnh.exec:\hntnnh.exe74⤵
-
\??\c:\ddvjd.exec:\ddvjd.exe75⤵
-
\??\c:\bhhhbh.exec:\bhhhbh.exe76⤵
-
\??\c:\nbnntt.exec:\nbnntt.exe77⤵
-
\??\c:\ppddd.exec:\ppddd.exe78⤵
-
\??\c:\9fxlflx.exec:\9fxlflx.exe79⤵
-
\??\c:\nhbthh.exec:\nhbthh.exe80⤵
-
\??\c:\3httbb.exec:\3httbb.exe81⤵
-
\??\c:\vvpdp.exec:\vvpdp.exe82⤵
-
\??\c:\xlrfxxf.exec:\xlrfxxf.exe83⤵
-
\??\c:\nbtnnn.exec:\nbtnnn.exe84⤵
-
\??\c:\ddvdv.exec:\ddvdv.exe85⤵
-
\??\c:\5rrxlxf.exec:\5rrxlxf.exe86⤵
-
\??\c:\hnhtbn.exec:\hnhtbn.exe87⤵
-
\??\c:\nnnbhn.exec:\nnnbhn.exe88⤵
-
\??\c:\pjjdp.exec:\pjjdp.exe89⤵
-
\??\c:\7flrfrf.exec:\7flrfrf.exe90⤵
-
\??\c:\nbnntn.exec:\nbnntn.exe91⤵
-
\??\c:\jddvp.exec:\jddvp.exe92⤵
-
\??\c:\pvvvv.exec:\pvvvv.exe93⤵
-
\??\c:\nhbbnn.exec:\nhbbnn.exe94⤵
-
\??\c:\jdvjp.exec:\jdvjp.exe95⤵
-
\??\c:\pjjvj.exec:\pjjvj.exe96⤵
-
\??\c:\jvvdp.exec:\jvvdp.exe97⤵
-
\??\c:\7lfflxr.exec:\7lfflxr.exe98⤵
-
\??\c:\nnbnhb.exec:\nnbnhb.exe99⤵
-
\??\c:\jppjv.exec:\jppjv.exe100⤵
-
\??\c:\1xrlxfr.exec:\1xrlxfr.exe101⤵
-
\??\c:\bntnnh.exec:\bntnnh.exe102⤵
-
\??\c:\9tbntb.exec:\9tbntb.exe103⤵
-
\??\c:\7ppvp.exec:\7ppvp.exe104⤵
-
\??\c:\3rrfxlf.exec:\3rrfxlf.exe105⤵
-
\??\c:\hnhhtb.exec:\hnhhtb.exe106⤵
-
\??\c:\vpppj.exec:\vpppj.exe107⤵
-
\??\c:\3jjvv.exec:\3jjvv.exe108⤵
-
\??\c:\lffxrxl.exec:\lffxrxl.exe109⤵
-
\??\c:\9ntbbb.exec:\9ntbbb.exe110⤵
-
\??\c:\pvvpp.exec:\pvvpp.exe111⤵
-
\??\c:\1ppdp.exec:\1ppdp.exe112⤵
-
\??\c:\flllxlf.exec:\flllxlf.exe113⤵
-
\??\c:\nnnnbh.exec:\nnnnbh.exe114⤵
-
\??\c:\jjdjj.exec:\jjdjj.exe115⤵
-
\??\c:\dpddp.exec:\dpddp.exe116⤵
-
\??\c:\lrrrxlr.exec:\lrrrxlr.exe117⤵
-
\??\c:\ntntht.exec:\ntntht.exe118⤵
-
\??\c:\djdvv.exec:\djdvv.exe119⤵
-
\??\c:\xxrfxlx.exec:\xxrfxlx.exe120⤵
-
\??\c:\frlxrxl.exec:\frlxrxl.exe121⤵
-
\??\c:\ttthbh.exec:\ttthbh.exe122⤵
-
\??\c:\pjvvd.exec:\pjvvd.exe123⤵
-
\??\c:\lrflflr.exec:\lrflflr.exe124⤵
-
\??\c:\bbbhtt.exec:\bbbhtt.exe125⤵
-
\??\c:\pvdvv.exec:\pvdvv.exe126⤵
-
\??\c:\7lflrlx.exec:\7lflrlx.exe127⤵
-
\??\c:\7xrxrxr.exec:\7xrxrxr.exe128⤵
-
\??\c:\htnbnt.exec:\htnbnt.exe129⤵
-
\??\c:\jjpjp.exec:\jjpjp.exe130⤵
-
\??\c:\xrlfflx.exec:\xrlfflx.exe131⤵
-
\??\c:\htnnht.exec:\htnnht.exe132⤵
-
\??\c:\vjddp.exec:\vjddp.exe133⤵
-
\??\c:\3lxxfrf.exec:\3lxxfrf.exe134⤵
-
\??\c:\fflfxff.exec:\fflfxff.exe135⤵
-
\??\c:\5nhtbn.exec:\5nhtbn.exe136⤵
-
\??\c:\pvvjv.exec:\pvvjv.exe137⤵
-
\??\c:\lxrlrxx.exec:\lxrlrxx.exe138⤵
-
\??\c:\tbthhn.exec:\tbthhn.exe139⤵
-
\??\c:\djjpp.exec:\djjpp.exe140⤵
-
\??\c:\vjvpd.exec:\vjvpd.exe141⤵
-
\??\c:\flxxlxf.exec:\flxxlxf.exe142⤵
-
\??\c:\hthbbn.exec:\hthbbn.exe143⤵
-
\??\c:\pvdjd.exec:\pvdjd.exe144⤵
-
\??\c:\llxlrxl.exec:\llxlrxl.exe145⤵
-
\??\c:\bhhtht.exec:\bhhtht.exe146⤵
-
\??\c:\ttnbnb.exec:\ttnbnb.exe147⤵
-
\??\c:\dpjdj.exec:\dpjdj.exe148⤵
-
\??\c:\7lfrxfr.exec:\7lfrxfr.exe149⤵
-
\??\c:\tbhtht.exec:\tbhtht.exe150⤵
-
\??\c:\jjvjd.exec:\jjvjd.exe151⤵
-
\??\c:\7ddjp.exec:\7ddjp.exe152⤵
-
\??\c:\xxrrfrx.exec:\xxrrfrx.exe153⤵
-
\??\c:\5thhnn.exec:\5thhnn.exe154⤵
-
\??\c:\ddvdp.exec:\ddvdp.exe155⤵
-
\??\c:\llfrrfr.exec:\llfrrfr.exe156⤵
-
\??\c:\hhhtnb.exec:\hhhtnb.exe157⤵
-
\??\c:\5nhntb.exec:\5nhntb.exe158⤵
-
\??\c:\vdpvj.exec:\vdpvj.exe159⤵
-
\??\c:\xrrrxxr.exec:\xrrrxxr.exe160⤵
-
\??\c:\lrlxlrf.exec:\lrlxlrf.exe161⤵
-
\??\c:\5tntnb.exec:\5tntnb.exe162⤵
-
\??\c:\pvvjv.exec:\pvvjv.exe163⤵
-
\??\c:\rxrrlxl.exec:\rxrrlxl.exe164⤵
-
\??\c:\1thhth.exec:\1thhth.exe165⤵
-
\??\c:\7nntnb.exec:\7nntnb.exe166⤵
-
\??\c:\jjjvd.exec:\jjjvd.exe167⤵
-
\??\c:\flflflr.exec:\flflflr.exe168⤵
-
\??\c:\ttnbhn.exec:\ttnbhn.exe169⤵
-
\??\c:\1jjvv.exec:\1jjvv.exe170⤵
-
\??\c:\jvpvj.exec:\jvpvj.exe171⤵
-
\??\c:\5rlxrxx.exec:\5rlxrxx.exe172⤵
-
\??\c:\tbnbhb.exec:\tbnbhb.exe173⤵
-
\??\c:\vvdjj.exec:\vvdjj.exe174⤵
-
\??\c:\vdjdd.exec:\vdjdd.exe175⤵
-
\??\c:\1llxrfl.exec:\1llxrfl.exe176⤵
-
\??\c:\1thntt.exec:\1thntt.exe177⤵
-
\??\c:\dvdjj.exec:\dvdjj.exe178⤵
-
\??\c:\djjpp.exec:\djjpp.exe179⤵
-
\??\c:\xfllllf.exec:\xfllllf.exe180⤵
-
\??\c:\nttnht.exec:\nttnht.exe181⤵
-
\??\c:\1vddd.exec:\1vddd.exe182⤵
-
\??\c:\jdpvj.exec:\jdpvj.exe183⤵
-
\??\c:\9frxrxl.exec:\9frxrxl.exe184⤵
-
\??\c:\nhbnth.exec:\nhbnth.exe185⤵
-
\??\c:\tnhnbb.exec:\tnhnbb.exe186⤵
-
\??\c:\dpdjp.exec:\dpdjp.exe187⤵
-
\??\c:\xfxlflf.exec:\xfxlflf.exe188⤵
-
\??\c:\xxxlxfx.exec:\xxxlxfx.exe189⤵
-
\??\c:\1hbnth.exec:\1hbnth.exe190⤵
-
\??\c:\jjpdp.exec:\jjpdp.exe191⤵
-
\??\c:\3jdpj.exec:\3jdpj.exe192⤵
-
\??\c:\llxfrxl.exec:\llxfrxl.exe193⤵
-
\??\c:\fxxflxl.exec:\fxxflxl.exe194⤵
-
\??\c:\3tnhhb.exec:\3tnhhb.exe195⤵
-
\??\c:\jdpdv.exec:\jdpdv.exe196⤵
-
\??\c:\djjpd.exec:\djjpd.exe197⤵
-
\??\c:\1rrxrfx.exec:\1rrxrfx.exe198⤵
-
\??\c:\bbnntn.exec:\bbnntn.exe199⤵
-
\??\c:\vvjdv.exec:\vvjdv.exe200⤵
-
\??\c:\rfxrlxf.exec:\rfxrlxf.exe201⤵
-
\??\c:\xfxlfrr.exec:\xfxlfrr.exe202⤵
-
\??\c:\5nhbth.exec:\5nhbth.exe203⤵
-
\??\c:\dpvvv.exec:\dpvvv.exe204⤵
-
\??\c:\vddvp.exec:\vddvp.exe205⤵
-
\??\c:\1llxxll.exec:\1llxxll.exe206⤵
-
\??\c:\hnhthn.exec:\hnhthn.exe207⤵
-
\??\c:\pvjpj.exec:\pvjpj.exe208⤵
-
\??\c:\jjvvp.exec:\jjvvp.exe209⤵
-
\??\c:\1rlrflf.exec:\1rlrflf.exe210⤵
-
\??\c:\3nnbnb.exec:\3nnbnb.exe211⤵
-
\??\c:\hhbhtb.exec:\hhbhtb.exe212⤵
-
\??\c:\vvvjv.exec:\vvvjv.exe213⤵
-
\??\c:\3jvpd.exec:\3jvpd.exe214⤵
-
\??\c:\lrrlfrr.exec:\lrrlfrr.exe215⤵
-
\??\c:\nnhbtb.exec:\nnhbtb.exe216⤵
-
\??\c:\pjjvv.exec:\pjjvv.exe217⤵
-
\??\c:\jdddv.exec:\jdddv.exe218⤵
-
\??\c:\xfllfrl.exec:\xfllfrl.exe219⤵
-
\??\c:\hhthbn.exec:\hhthbn.exe220⤵
-
\??\c:\thnnbn.exec:\thnnbn.exe221⤵
-
\??\c:\7vjvj.exec:\7vjvj.exe222⤵
-
\??\c:\xlxlflf.exec:\xlxlflf.exe223⤵
-
\??\c:\hbtnhb.exec:\hbtnhb.exe224⤵
-
\??\c:\tnhhtb.exec:\tnhhtb.exe225⤵
-
\??\c:\7pdvp.exec:\7pdvp.exe226⤵
-
\??\c:\jddjp.exec:\jddjp.exe227⤵
-
\??\c:\xxfxfrl.exec:\xxfxfrl.exe228⤵
-
\??\c:\1nnbbh.exec:\1nnbbh.exe229⤵
-
\??\c:\nnbthn.exec:\nnbthn.exe230⤵
-
\??\c:\jjjpd.exec:\jjjpd.exe231⤵
-
\??\c:\rxffrfx.exec:\rxffrfx.exe232⤵
-
\??\c:\frrllrl.exec:\frrllrl.exe233⤵
-
\??\c:\bbtnhn.exec:\bbtnhn.exe234⤵
-
\??\c:\pjvdp.exec:\pjvdp.exe235⤵
-
\??\c:\lfxfxlf.exec:\lfxfxlf.exe236⤵
-
\??\c:\btnbht.exec:\btnbht.exe237⤵
-
\??\c:\lrxrrfr.exec:\lrxrrfr.exe238⤵
-
\??\c:\hhbtnh.exec:\hhbtnh.exe239⤵
-
\??\c:\pdpjv.exec:\pdpjv.exe240⤵
-
\??\c:\hbbhht.exec:\hbbhht.exe241⤵