Analysis
-
max time kernel
150s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 10:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
382b620c651d04179b699c6a03f88082da2e72508ab75f301955264cfd92d246_NeikiAnalytics.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
382b620c651d04179b699c6a03f88082da2e72508ab75f301955264cfd92d246_NeikiAnalytics.exe
-
Size
78KB
-
MD5
bc54936727de39b29b9292143573a770
-
SHA1
62a800f13f20a87127dd6a38d22c1fdcdfadee5c
-
SHA256
382b620c651d04179b699c6a03f88082da2e72508ab75f301955264cfd92d246
-
SHA512
3155f2c6ad7499a56cd28962b588f10fc873ac3defa6513709ef7fcd667e248cad16c48c8b42eb5e43494b304c91740aa6246baad4b69d119cb94f5b069018fe
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIYgC/KSLJEd2aQ:ymb3NkkiQ3mdBjFI3eFC/Q
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral2/memory/4544-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4488-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1812-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1592-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4264-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2616-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3264-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3028-68-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1968-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3044-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3376-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1248-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1424-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2480-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4800-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1264-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1216-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3116-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4016-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1008-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1796-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3028-2754-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
nththb.exevjvdj.exelrrrllf.exe1xrlrrl.exe3bhbtt.exebnhbnt.exe7pjdp.exepjdpd.exerrrfxrl.exenttbtt.exenbhhhb.exedjppj.exe1jjdv.exebnbthb.exe5tthbt.exe3vpjd.exexrxxffr.exe5xfxxxx.exebtttnn.exettbbtt.exe7djdv.exexllfxfx.exexrxxxxf.exebtbbhh.exejvvdv.exexlxrxxx.exetttnhn.exe1hnhbb.exe5jjjv.exe3xfxllf.exellffxxr.exe9nttnn.exedppjd.exe1vvvp.exeflrrlrl.exe3rrrlll.exehhthbh.exennbtnn.exerrxrfrl.exebtbbbt.exethhbnn.exepvppd.exe1vjdv.exexlrlxxr.exexrlfxxr.exebbbthb.exenhnhtt.exejvvdd.exedpjvp.exexllfxxr.exebttnhb.exenhhtnb.exedpppj.exepppvj.exexrfrllx.exeflxrlfx.exelfrllfx.exettbbhh.exehtnthb.exepdpdp.exexxflffx.exerffxrrl.exe1bbthb.exejvpvp.exepid process 4544 nththb.exe 2972 vjvdj.exe 1812 lrrrllf.exe 1592 1xrlrrl.exe 4264 3bhbtt.exe 2616 bnhbnt.exe 2164 7pjdp.exe 3264 pjdpd.exe 3028 rrrfxrl.exe 1968 nttbtt.exe 3044 nbhhhb.exe 3376 djppj.exe 1248 1jjdv.exe 1424 bnbthb.exe 2480 5tthbt.exe 4800 3vpjd.exe 4592 xrxxffr.exe 1264 5xfxxxx.exe 2928 btttnn.exe 3384 ttbbtt.exe 1216 7djdv.exe 3116 xllfxfx.exe 2832 xrxxxxf.exe 2920 btbbhh.exe 4016 jvvdv.exe 4680 xlxrxxx.exe 1008 tttnhn.exe 1796 1hnhbb.exe 2936 5jjjv.exe 1932 3xfxllf.exe 4396 llffxxr.exe 1236 9nttnn.exe 936 dppjd.exe 1608 1vvvp.exe 924 flrrlrl.exe 2080 3rrrlll.exe 3476 hhthbh.exe 4356 nnbtnn.exe 1644 rrxrfrl.exe 4644 btbbbt.exe 1980 thhbnn.exe 2972 pvppd.exe 4036 1vjdv.exe 3328 xlrlxxr.exe 1400 xrlfxxr.exe 3020 bbbthb.exe 4408 nhnhtt.exe 4316 jvvdd.exe 1372 dpjvp.exe 452 xllfxxr.exe 1744 bttnhb.exe 4712 nhhtnb.exe 5064 dpppj.exe 4716 pppvj.exe 1732 xrfrllx.exe 1248 flxrlfx.exe 1424 lfrllfx.exe 2440 ttbbhh.exe 4604 htnthb.exe 1156 pdpdp.exe 4428 xxflffx.exe 1844 rffxrrl.exe 1976 1bbthb.exe 5100 jvpvp.exe -
Processes:
resource yara_rule behavioral2/memory/4544-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4488-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1812-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1592-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4264-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2616-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3264-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1968-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3044-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3376-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1248-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1424-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2480-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4800-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1264-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1216-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3116-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4016-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1008-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1796-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3028-2754-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
382b620c651d04179b699c6a03f88082da2e72508ab75f301955264cfd92d246_NeikiAnalytics.exenththb.exevjvdj.exelrrrllf.exe1xrlrrl.exe3bhbtt.exebnhbnt.exe7pjdp.exepjdpd.exerrrfxrl.exenttbtt.exenbhhhb.exedjppj.exe1jjdv.exebnbthb.exe5tthbt.exe3vpjd.exexrxxffr.exe5xfxxxx.exebtttnn.exettbbtt.exe7djdv.exedescription pid process target process PID 4488 wrote to memory of 4544 4488 382b620c651d04179b699c6a03f88082da2e72508ab75f301955264cfd92d246_NeikiAnalytics.exe nththb.exe PID 4488 wrote to memory of 4544 4488 382b620c651d04179b699c6a03f88082da2e72508ab75f301955264cfd92d246_NeikiAnalytics.exe nththb.exe PID 4488 wrote to memory of 4544 4488 382b620c651d04179b699c6a03f88082da2e72508ab75f301955264cfd92d246_NeikiAnalytics.exe nththb.exe PID 4544 wrote to memory of 2972 4544 nththb.exe vjvdj.exe PID 4544 wrote to memory of 2972 4544 nththb.exe vjvdj.exe PID 4544 wrote to memory of 2972 4544 nththb.exe vjvdj.exe PID 2972 wrote to memory of 1812 2972 vjvdj.exe lrrrllf.exe PID 2972 wrote to memory of 1812 2972 vjvdj.exe lrrrllf.exe PID 2972 wrote to memory of 1812 2972 vjvdj.exe lrrrllf.exe PID 1812 wrote to memory of 1592 1812 lrrrllf.exe 1xrlrrl.exe PID 1812 wrote to memory of 1592 1812 lrrrllf.exe 1xrlrrl.exe PID 1812 wrote to memory of 1592 1812 lrrrllf.exe 1xrlrrl.exe PID 1592 wrote to memory of 4264 1592 1xrlrrl.exe 3bhbtt.exe PID 1592 wrote to memory of 4264 1592 1xrlrrl.exe 3bhbtt.exe PID 1592 wrote to memory of 4264 1592 1xrlrrl.exe 3bhbtt.exe PID 4264 wrote to memory of 2616 4264 3bhbtt.exe bnhbnt.exe PID 4264 wrote to memory of 2616 4264 3bhbtt.exe bnhbnt.exe PID 4264 wrote to memory of 2616 4264 3bhbtt.exe bnhbnt.exe PID 2616 wrote to memory of 2164 2616 bnhbnt.exe 7pjdp.exe PID 2616 wrote to memory of 2164 2616 bnhbnt.exe 7pjdp.exe PID 2616 wrote to memory of 2164 2616 bnhbnt.exe 7pjdp.exe PID 2164 wrote to memory of 3264 2164 7pjdp.exe pjdpd.exe PID 2164 wrote to memory of 3264 2164 7pjdp.exe pjdpd.exe PID 2164 wrote to memory of 3264 2164 7pjdp.exe pjdpd.exe PID 3264 wrote to memory of 3028 3264 pjdpd.exe rrrfxrl.exe PID 3264 wrote to memory of 3028 3264 pjdpd.exe rrrfxrl.exe PID 3264 wrote to memory of 3028 3264 pjdpd.exe rrrfxrl.exe PID 3028 wrote to memory of 1968 3028 rrrfxrl.exe nttbtt.exe PID 3028 wrote to memory of 1968 3028 rrrfxrl.exe nttbtt.exe PID 3028 wrote to memory of 1968 3028 rrrfxrl.exe nttbtt.exe PID 1968 wrote to memory of 3044 1968 nttbtt.exe nbhhhb.exe PID 1968 wrote to memory of 3044 1968 nttbtt.exe nbhhhb.exe PID 1968 wrote to memory of 3044 1968 nttbtt.exe nbhhhb.exe PID 3044 wrote to memory of 3376 3044 nbhhhb.exe djppj.exe PID 3044 wrote to memory of 3376 3044 nbhhhb.exe djppj.exe PID 3044 wrote to memory of 3376 3044 nbhhhb.exe djppj.exe PID 3376 wrote to memory of 1248 3376 djppj.exe 1jjdv.exe PID 3376 wrote to memory of 1248 3376 djppj.exe 1jjdv.exe PID 3376 wrote to memory of 1248 3376 djppj.exe 1jjdv.exe PID 1248 wrote to memory of 1424 1248 1jjdv.exe bnbthb.exe PID 1248 wrote to memory of 1424 1248 1jjdv.exe bnbthb.exe PID 1248 wrote to memory of 1424 1248 1jjdv.exe bnbthb.exe PID 1424 wrote to memory of 2480 1424 bnbthb.exe 5tthbt.exe PID 1424 wrote to memory of 2480 1424 bnbthb.exe 5tthbt.exe PID 1424 wrote to memory of 2480 1424 bnbthb.exe 5tthbt.exe PID 2480 wrote to memory of 4800 2480 5tthbt.exe 3vpjd.exe PID 2480 wrote to memory of 4800 2480 5tthbt.exe 3vpjd.exe PID 2480 wrote to memory of 4800 2480 5tthbt.exe 3vpjd.exe PID 4800 wrote to memory of 4592 4800 3vpjd.exe xrxxffr.exe PID 4800 wrote to memory of 4592 4800 3vpjd.exe xrxxffr.exe PID 4800 wrote to memory of 4592 4800 3vpjd.exe xrxxffr.exe PID 4592 wrote to memory of 1264 4592 xrxxffr.exe 5xfxxxx.exe PID 4592 wrote to memory of 1264 4592 xrxxffr.exe 5xfxxxx.exe PID 4592 wrote to memory of 1264 4592 xrxxffr.exe 5xfxxxx.exe PID 1264 wrote to memory of 2928 1264 5xfxxxx.exe btttnn.exe PID 1264 wrote to memory of 2928 1264 5xfxxxx.exe btttnn.exe PID 1264 wrote to memory of 2928 1264 5xfxxxx.exe btttnn.exe PID 2928 wrote to memory of 3384 2928 btttnn.exe ttbbtt.exe PID 2928 wrote to memory of 3384 2928 btttnn.exe ttbbtt.exe PID 2928 wrote to memory of 3384 2928 btttnn.exe ttbbtt.exe PID 3384 wrote to memory of 1216 3384 ttbbtt.exe 7djdv.exe PID 3384 wrote to memory of 1216 3384 ttbbtt.exe 7djdv.exe PID 3384 wrote to memory of 1216 3384 ttbbtt.exe 7djdv.exe PID 1216 wrote to memory of 3116 1216 7djdv.exe xllfxfx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\382b620c651d04179b699c6a03f88082da2e72508ab75f301955264cfd92d246_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\382b620c651d04179b699c6a03f88082da2e72508ab75f301955264cfd92d246_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\nththb.exec:\nththb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjvdj.exec:\vjvdj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrrrllf.exec:\lrrrllf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1xrlrrl.exec:\1xrlrrl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3bhbtt.exec:\3bhbtt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnhbnt.exec:\bnhbnt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7pjdp.exec:\7pjdp.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjdpd.exec:\pjdpd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrrfxrl.exec:\rrrfxrl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nttbtt.exec:\nttbtt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbhhhb.exec:\nbhhhb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djppj.exec:\djppj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1jjdv.exec:\1jjdv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnbthb.exec:\bnbthb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5tthbt.exec:\5tthbt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3vpjd.exec:\3vpjd.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrxxffr.exec:\xrxxffr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5xfxxxx.exec:\5xfxxxx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btttnn.exec:\btttnn.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ttbbtt.exec:\ttbbtt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7djdv.exec:\7djdv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xllfxfx.exec:\xllfxfx.exe23⤵
- Executes dropped EXE
-
\??\c:\xrxxxxf.exec:\xrxxxxf.exe24⤵
- Executes dropped EXE
-
\??\c:\btbbhh.exec:\btbbhh.exe25⤵
- Executes dropped EXE
-
\??\c:\jvvdv.exec:\jvvdv.exe26⤵
- Executes dropped EXE
-
\??\c:\xlxrxxx.exec:\xlxrxxx.exe27⤵
- Executes dropped EXE
-
\??\c:\tttnhn.exec:\tttnhn.exe28⤵
- Executes dropped EXE
-
\??\c:\1hnhbb.exec:\1hnhbb.exe29⤵
- Executes dropped EXE
-
\??\c:\5jjjv.exec:\5jjjv.exe30⤵
- Executes dropped EXE
-
\??\c:\3xfxllf.exec:\3xfxllf.exe31⤵
- Executes dropped EXE
-
\??\c:\llffxxr.exec:\llffxxr.exe32⤵
- Executes dropped EXE
-
\??\c:\9nttnn.exec:\9nttnn.exe33⤵
- Executes dropped EXE
-
\??\c:\dppjd.exec:\dppjd.exe34⤵
- Executes dropped EXE
-
\??\c:\1vvvp.exec:\1vvvp.exe35⤵
- Executes dropped EXE
-
\??\c:\flrrlrl.exec:\flrrlrl.exe36⤵
- Executes dropped EXE
-
\??\c:\3rrrlll.exec:\3rrrlll.exe37⤵
- Executes dropped EXE
-
\??\c:\hhthbh.exec:\hhthbh.exe38⤵
- Executes dropped EXE
-
\??\c:\nnbtnn.exec:\nnbtnn.exe39⤵
- Executes dropped EXE
-
\??\c:\rrxrfrl.exec:\rrxrfrl.exe40⤵
- Executes dropped EXE
-
\??\c:\btbbbt.exec:\btbbbt.exe41⤵
- Executes dropped EXE
-
\??\c:\thhbnn.exec:\thhbnn.exe42⤵
- Executes dropped EXE
-
\??\c:\pvppd.exec:\pvppd.exe43⤵
- Executes dropped EXE
-
\??\c:\1vjdv.exec:\1vjdv.exe44⤵
- Executes dropped EXE
-
\??\c:\xlrlxxr.exec:\xlrlxxr.exe45⤵
- Executes dropped EXE
-
\??\c:\xrlfxxr.exec:\xrlfxxr.exe46⤵
- Executes dropped EXE
-
\??\c:\bbbthb.exec:\bbbthb.exe47⤵
- Executes dropped EXE
-
\??\c:\nhnhtt.exec:\nhnhtt.exe48⤵
- Executes dropped EXE
-
\??\c:\jvvdd.exec:\jvvdd.exe49⤵
- Executes dropped EXE
-
\??\c:\dpjvp.exec:\dpjvp.exe50⤵
- Executes dropped EXE
-
\??\c:\xllfxxr.exec:\xllfxxr.exe51⤵
- Executes dropped EXE
-
\??\c:\bttnhb.exec:\bttnhb.exe52⤵
- Executes dropped EXE
-
\??\c:\nhhtnb.exec:\nhhtnb.exe53⤵
- Executes dropped EXE
-
\??\c:\dpppj.exec:\dpppj.exe54⤵
- Executes dropped EXE
-
\??\c:\pppvj.exec:\pppvj.exe55⤵
- Executes dropped EXE
-
\??\c:\xrfrllx.exec:\xrfrllx.exe56⤵
- Executes dropped EXE
-
\??\c:\flxrlfx.exec:\flxrlfx.exe57⤵
- Executes dropped EXE
-
\??\c:\lfrllfx.exec:\lfrllfx.exe58⤵
- Executes dropped EXE
-
\??\c:\ttbbhh.exec:\ttbbhh.exe59⤵
- Executes dropped EXE
-
\??\c:\htnthb.exec:\htnthb.exe60⤵
- Executes dropped EXE
-
\??\c:\pdpdp.exec:\pdpdp.exe61⤵
- Executes dropped EXE
-
\??\c:\xxflffx.exec:\xxflffx.exe62⤵
- Executes dropped EXE
-
\??\c:\rffxrrl.exec:\rffxrrl.exe63⤵
- Executes dropped EXE
-
\??\c:\1bbthb.exec:\1bbthb.exe64⤵
- Executes dropped EXE
-
\??\c:\jvpvp.exec:\jvpvp.exe65⤵
- Executes dropped EXE
-
\??\c:\fflllrr.exec:\fflllrr.exe66⤵
-
\??\c:\ffffrll.exec:\ffffrll.exe67⤵
-
\??\c:\thnnhn.exec:\thnnhn.exe68⤵
-
\??\c:\tbbbbn.exec:\tbbbbn.exe69⤵
-
\??\c:\9djdp.exec:\9djdp.exe70⤵
-
\??\c:\jdpjd.exec:\jdpjd.exe71⤵
-
\??\c:\rlxrffx.exec:\rlxrffx.exe72⤵
-
\??\c:\xflfxlf.exec:\xflfxlf.exe73⤵
-
\??\c:\1tbbhb.exec:\1tbbhb.exe74⤵
-
\??\c:\jvpjp.exec:\jvpjp.exe75⤵
-
\??\c:\jvdvj.exec:\jvdvj.exe76⤵
-
\??\c:\3pvjd.exec:\3pvjd.exe77⤵
-
\??\c:\9rxxrlf.exec:\9rxxrlf.exe78⤵
-
\??\c:\lfflxxr.exec:\lfflxxr.exe79⤵
-
\??\c:\bnnhbb.exec:\bnnhbb.exe80⤵
-
\??\c:\vpjdv.exec:\vpjdv.exe81⤵
-
\??\c:\9pvpp.exec:\9pvpp.exe82⤵
-
\??\c:\3rrfrrf.exec:\3rrfrrf.exe83⤵
-
\??\c:\9xrrfxr.exec:\9xrrfxr.exe84⤵
-
\??\c:\9nhbbb.exec:\9nhbbb.exe85⤵
-
\??\c:\hhhbbb.exec:\hhhbbb.exe86⤵
-
\??\c:\vjjjj.exec:\vjjjj.exe87⤵
-
\??\c:\xlfxrlr.exec:\xlfxrlr.exe88⤵
-
\??\c:\rllxrlf.exec:\rllxrlf.exe89⤵
-
\??\c:\1fxrffr.exec:\1fxrffr.exe90⤵
-
\??\c:\tbhbtn.exec:\tbhbtn.exe91⤵
-
\??\c:\hbbbtb.exec:\hbbbtb.exe92⤵
-
\??\c:\7jdvv.exec:\7jdvv.exe93⤵
-
\??\c:\dvjjd.exec:\dvjjd.exe94⤵
-
\??\c:\5lrlflf.exec:\5lrlflf.exe95⤵
-
\??\c:\5ttnhn.exec:\5ttnhn.exe96⤵
-
\??\c:\bhhtbt.exec:\bhhtbt.exe97⤵
-
\??\c:\5dvvj.exec:\5dvvj.exe98⤵
-
\??\c:\pdppj.exec:\pdppj.exe99⤵
-
\??\c:\hhbbtt.exec:\hhbbtt.exe100⤵
-
\??\c:\thnhtt.exec:\thnhtt.exe101⤵
-
\??\c:\1ppjp.exec:\1ppjp.exe102⤵
-
\??\c:\lrxlxxr.exec:\lrxlxxr.exe103⤵
-
\??\c:\rfxrllf.exec:\rfxrllf.exe104⤵
-
\??\c:\nhhtnh.exec:\nhhtnh.exe105⤵
-
\??\c:\dvvpd.exec:\dvvpd.exe106⤵
-
\??\c:\dppjd.exec:\dppjd.exe107⤵
-
\??\c:\lxfxllx.exec:\lxfxllx.exe108⤵
-
\??\c:\bttnhh.exec:\bttnhh.exe109⤵
-
\??\c:\htbbbt.exec:\htbbbt.exe110⤵
-
\??\c:\jddpj.exec:\jddpj.exe111⤵
-
\??\c:\vjpjd.exec:\vjpjd.exe112⤵
-
\??\c:\vvjjp.exec:\vvjjp.exe113⤵
-
\??\c:\lfxrxxx.exec:\lfxrxxx.exe114⤵
-
\??\c:\xffffff.exec:\xffffff.exe115⤵
-
\??\c:\bnttnn.exec:\bnttnn.exe116⤵
-
\??\c:\vvpjj.exec:\vvpjj.exe117⤵
-
\??\c:\ddvvj.exec:\ddvvj.exe118⤵
-
\??\c:\xflffrl.exec:\xflffrl.exe119⤵
-
\??\c:\hbttnn.exec:\hbttnn.exe120⤵
-
\??\c:\nttthh.exec:\nttthh.exe121⤵
-
\??\c:\vvjvj.exec:\vvjvj.exe122⤵
-
\??\c:\1fxfxfl.exec:\1fxfxfl.exe123⤵
-
\??\c:\7hntbb.exec:\7hntbb.exe124⤵
-
\??\c:\3jjjd.exec:\3jjjd.exe125⤵
-
\??\c:\dvvdv.exec:\dvvdv.exe126⤵
-
\??\c:\rlrlxxr.exec:\rlrlxxr.exe127⤵
-
\??\c:\lxxxrxr.exec:\lxxxrxr.exe128⤵
-
\??\c:\9thbnh.exec:\9thbnh.exe129⤵
-
\??\c:\nnnnht.exec:\nnnnht.exe130⤵
-
\??\c:\7lrlllr.exec:\7lrlllr.exe131⤵
-
\??\c:\bbhbtn.exec:\bbhbtn.exe132⤵
-
\??\c:\3dddv.exec:\3dddv.exe133⤵
-
\??\c:\bbttnh.exec:\bbttnh.exe134⤵
-
\??\c:\jdddv.exec:\jdddv.exe135⤵
-
\??\c:\vpvpj.exec:\vpvpj.exe136⤵
-
\??\c:\3nhbtn.exec:\3nhbtn.exe137⤵
-
\??\c:\3djdj.exec:\3djdj.exe138⤵
-
\??\c:\dpvjd.exec:\dpvjd.exe139⤵
-
\??\c:\fxrlffr.exec:\fxrlffr.exe140⤵
-
\??\c:\xxxrxrx.exec:\xxxrxrx.exe141⤵
-
\??\c:\nnbbth.exec:\nnbbth.exe142⤵
-
\??\c:\nhhhhn.exec:\nhhhhn.exe143⤵
-
\??\c:\7jjdp.exec:\7jjdp.exe144⤵
-
\??\c:\ppppp.exec:\ppppp.exe145⤵
-
\??\c:\5xffffx.exec:\5xffffx.exe146⤵
-
\??\c:\rffffxr.exec:\rffffxr.exe147⤵
-
\??\c:\bbbttn.exec:\bbbttn.exe148⤵
-
\??\c:\tntbbb.exec:\tntbbb.exe149⤵
-
\??\c:\nhbtnn.exec:\nhbtnn.exe150⤵
-
\??\c:\1vjdv.exec:\1vjdv.exe151⤵
-
\??\c:\ddjdj.exec:\ddjdj.exe152⤵
-
\??\c:\xxffffl.exec:\xxffffl.exe153⤵
-
\??\c:\rlxrxxf.exec:\rlxrxxf.exe154⤵
-
\??\c:\nnbtnh.exec:\nnbtnh.exe155⤵
-
\??\c:\nhthhh.exec:\nhthhh.exe156⤵
-
\??\c:\5vpjj.exec:\5vpjj.exe157⤵
-
\??\c:\7tbtth.exec:\7tbtth.exe158⤵
-
\??\c:\thnbhh.exec:\thnbhh.exe159⤵
-
\??\c:\xlrlxrx.exec:\xlrlxrx.exe160⤵
-
\??\c:\3llrlll.exec:\3llrlll.exe161⤵
-
\??\c:\5tntnh.exec:\5tntnh.exe162⤵
-
\??\c:\7dvpd.exec:\7dvpd.exe163⤵
-
\??\c:\vppdv.exec:\vppdv.exe164⤵
-
\??\c:\nbhbbb.exec:\nbhbbb.exe165⤵
-
\??\c:\7hhtnn.exec:\7hhtnn.exe166⤵
-
\??\c:\7xrlxrr.exec:\7xrlxrr.exe167⤵
-
\??\c:\ppvvp.exec:\ppvvp.exe168⤵
-
\??\c:\9hhbth.exec:\9hhbth.exe169⤵
-
\??\c:\nnnhtt.exec:\nnnhtt.exe170⤵
-
\??\c:\djjjd.exec:\djjjd.exe171⤵
-
\??\c:\3jppp.exec:\3jppp.exe172⤵
-
\??\c:\3djdp.exec:\3djdp.exe173⤵
-
\??\c:\pdppp.exec:\pdppp.exe174⤵
-
\??\c:\3jjdv.exec:\3jjdv.exe175⤵
-
\??\c:\rllfxrr.exec:\rllfxrr.exe176⤵
-
\??\c:\nttnhh.exec:\nttnhh.exe177⤵
-
\??\c:\nbhbtn.exec:\nbhbtn.exe178⤵
-
\??\c:\vddvp.exec:\vddvp.exe179⤵
-
\??\c:\pddvp.exec:\pddvp.exe180⤵
-
\??\c:\llfxrrr.exec:\llfxrrr.exe181⤵
-
\??\c:\5llrlrr.exec:\5llrlrr.exe182⤵
-
\??\c:\ttnnhb.exec:\ttnnhb.exe183⤵
-
\??\c:\vdddp.exec:\vdddp.exe184⤵
-
\??\c:\vddvv.exec:\vddvv.exe185⤵
-
\??\c:\lxrlfxr.exec:\lxrlfxr.exe186⤵
-
\??\c:\lllllrx.exec:\lllllrx.exe187⤵
-
\??\c:\btttnh.exec:\btttnh.exe188⤵
-
\??\c:\7vjdv.exec:\7vjdv.exe189⤵
-
\??\c:\rlfxrrr.exec:\rlfxrrr.exe190⤵
-
\??\c:\flfrllf.exec:\flfrllf.exe191⤵
-
\??\c:\nthhhh.exec:\nthhhh.exe192⤵
-
\??\c:\3hnhbb.exec:\3hnhbb.exe193⤵
-
\??\c:\9vvvp.exec:\9vvvp.exe194⤵
-
\??\c:\fllxrrx.exec:\fllxrrx.exe195⤵
-
\??\c:\xlrrxff.exec:\xlrrxff.exe196⤵
-
\??\c:\ffxxffl.exec:\ffxxffl.exe197⤵
-
\??\c:\1ttnhh.exec:\1ttnhh.exe198⤵
-
\??\c:\3jjdp.exec:\3jjdp.exe199⤵
-
\??\c:\ppjpj.exec:\ppjpj.exe200⤵
-
\??\c:\fxxrffx.exec:\fxxrffx.exe201⤵
-
\??\c:\bbhttt.exec:\bbhttt.exe202⤵
-
\??\c:\hbtnhh.exec:\hbtnhh.exe203⤵
-
\??\c:\ppppj.exec:\ppppj.exe204⤵
-
\??\c:\pjppj.exec:\pjppj.exe205⤵
-
\??\c:\5xrlxxx.exec:\5xrlxxx.exe206⤵
-
\??\c:\bnnhbt.exec:\bnnhbt.exe207⤵
-
\??\c:\hnhtbb.exec:\hnhtbb.exe208⤵
-
\??\c:\3pvjv.exec:\3pvjv.exe209⤵
-
\??\c:\djpdv.exec:\djpdv.exe210⤵
-
\??\c:\3lfffxr.exec:\3lfffxr.exe211⤵
-
\??\c:\3lxfllr.exec:\3lxfllr.exe212⤵
-
\??\c:\btnnhb.exec:\btnnhb.exe213⤵
-
\??\c:\vddvv.exec:\vddvv.exe214⤵
-
\??\c:\3djjv.exec:\3djjv.exe215⤵
-
\??\c:\1xxrlff.exec:\1xxrlff.exe216⤵
-
\??\c:\xrxxlfl.exec:\xrxxlfl.exe217⤵
-
\??\c:\nntnhh.exec:\nntnhh.exe218⤵
-
\??\c:\tbbthb.exec:\tbbthb.exe219⤵
-
\??\c:\3pdvj.exec:\3pdvj.exe220⤵
-
\??\c:\vdvpj.exec:\vdvpj.exe221⤵
-
\??\c:\xxrlxrx.exec:\xxrlxrx.exe222⤵
-
\??\c:\7rfxrlf.exec:\7rfxrlf.exe223⤵
-
\??\c:\7ttnbb.exec:\7ttnbb.exe224⤵
-
\??\c:\nhbtnh.exec:\nhbtnh.exe225⤵
-
\??\c:\vpdvj.exec:\vpdvj.exe226⤵
-
\??\c:\jjjdv.exec:\jjjdv.exe227⤵
-
\??\c:\fllxllx.exec:\fllxllx.exe228⤵
-
\??\c:\ffxrffr.exec:\ffxrffr.exe229⤵
-
\??\c:\hhnbtn.exec:\hhnbtn.exe230⤵
-
\??\c:\hbhbhb.exec:\hbhbhb.exe231⤵
-
\??\c:\ddddv.exec:\ddddv.exe232⤵
-
\??\c:\ddvvp.exec:\ddvvp.exe233⤵
-
\??\c:\xlxlfxr.exec:\xlxlfxr.exe234⤵
-
\??\c:\fffxrlx.exec:\fffxrlx.exe235⤵
-
\??\c:\htbbnh.exec:\htbbnh.exe236⤵
-
\??\c:\7vjpd.exec:\7vjpd.exe237⤵
-
\??\c:\jppjd.exec:\jppjd.exe238⤵
-
\??\c:\lfxlffx.exec:\lfxlffx.exe239⤵
-
\??\c:\fxfxrrl.exec:\fxfxrrl.exe240⤵
-
\??\c:\tbbbtn.exec:\tbbbtn.exe241⤵