Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 13:51
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
59648bc9eb4e7382d41979c144f60516f48e2f30c15d6552f2bcfc1867811204_NeikiAnalytics.exe
Resource
win7-20231129-en
5 signatures
150 seconds
General
-
Target
59648bc9eb4e7382d41979c144f60516f48e2f30c15d6552f2bcfc1867811204_NeikiAnalytics.exe
-
Size
460KB
-
MD5
fc6ab1b7c01336c4d55dc6394d651800
-
SHA1
89739d10cfc6865506e7303c6bef1ef6085b2a24
-
SHA256
59648bc9eb4e7382d41979c144f60516f48e2f30c15d6552f2bcfc1867811204
-
SHA512
71bde284502dcc4957153c9f4bf237105483d0460552c35cd628c750dbba8b1f256d023befccd7ae6e9efaa7fc577d3d1a62f3c25a91251e6ee80e5aaaad8eb4
-
SSDEEP
6144:n3C9BRo7tvnJ9Fywhk/TJTaYvMmr3C9BRo7tvnJ9Fywhk/Tkuz:n3C9ytvn8whkbJTaFmr3C9ytvn8whkbT
Malware Config
Signatures
-
Detect Blackmoon payload 28 IoCs
Processes:
resource yara_rule behavioral2/memory/896-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2004-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/436-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1124-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4840-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2052-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4148-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4920-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1968-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4116-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3184-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1244-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1976-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3456-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2616-81-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2616-80-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2268-74-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2268-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2892-67-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2892-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/412-59-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/412-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4400-53-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4400-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/60-45-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/60-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4484-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2444-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3ppjd.exerxxrllf.exefrrfxrf.exe5nnhbb.exevppjj.exerflfxxr.exennnnht.exe3ntntt.exejddvj.exelfxxrrr.exexfxxrfx.exe7tbttt.exe3jdvp.exe9vvdv.exelxlffrr.exenttnbt.exetthhtt.exepvdvp.exefxxrlrl.exehtbtnn.exebnnhbn.exe7jjdv.exexflrfxr.exelxfxrrl.exettbnnn.exeppjjd.exe9vvjd.exefxlxlll.exehtbbtn.exettnhbt.exevpjdv.exelffrlfr.exe5tbnnh.exebbttnn.exevddvv.exerxxrlfr.exelfrlllf.exetbhtnh.exebthbbt.exe1vvjd.exerffrllf.exelrllfxf.exebntnhb.exe7pvjd.exejdjjv.exe1llxrlf.exe5bhbtt.exebttnhh.exe9vvvj.exelrrrllf.exexrfxrfx.exentbnnn.exedpvpp.exejvpdv.exe3frfffl.exe1bbttn.exennhbtt.exevvpjp.exefrxrlfx.exelfxrlfx.exehbbtnh.exepvvjd.exepjdjd.exexxffxxx.exepid process 2004 3ppjd.exe 436 rxxrllf.exe 2444 frrfxrf.exe 4484 5nnhbb.exe 60 vppjj.exe 4400 rflfxxr.exe 412 nnnnht.exe 2892 3ntntt.exe 2268 jddvj.exe 2616 lfxxrrr.exe 3896 xfxxrfx.exe 4968 7tbttt.exe 1012 3jdvp.exe 4276 9vvdv.exe 816 lxlffrr.exe 1692 nttnbt.exe 3456 tthhtt.exe 1976 pvdvp.exe 1244 fxxrlrl.exe 3184 htbtnn.exe 2264 bnnhbn.exe 4116 7jjdv.exe 1968 xflrfxr.exe 1864 lxfxrrl.exe 4920 ttbnnn.exe 4148 ppjjd.exe 1124 9vvjd.exe 544 fxlxlll.exe 2052 htbbtn.exe 4840 ttnhbt.exe 4880 vpjdv.exe 3600 lffrlfr.exe 3120 5tbnnh.exe 568 bbttnn.exe 1120 vddvv.exe 4552 rxxrlfr.exe 3320 lfrlllf.exe 3920 tbhtnh.exe 3804 bthbbt.exe 4472 1vvjd.exe 1700 rffrllf.exe 1468 lrllfxf.exe 1672 bntnhb.exe 4340 7pvjd.exe 4704 jdjjv.exe 4560 1llxrlf.exe 5112 5bhbtt.exe 548 bttnhh.exe 1500 9vvvj.exe 1140 lrrrllf.exe 2468 xrfxrfx.exe 2940 ntbnnn.exe 1152 dpvpp.exe 4932 jvpdv.exe 1308 3frfffl.exe 2268 1bbttn.exe 2616 nnhbtt.exe 5056 vvpjp.exe 876 frxrlfx.exe 2700 lfxrlfx.exe 4156 hbbtnh.exe 3904 pvvjd.exe 3740 pjdjd.exe 2776 xxffxxx.exe -
Processes:
resource yara_rule behavioral2/memory/896-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2004-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/436-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1124-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4840-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2052-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4148-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4920-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1968-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4116-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3184-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1244-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1976-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3456-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2616-80-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2268-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2892-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/412-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4400-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/60-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4484-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2444-24-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
59648bc9eb4e7382d41979c144f60516f48e2f30c15d6552f2bcfc1867811204_NeikiAnalytics.exe3ppjd.exerxxrllf.exefrrfxrf.exe5nnhbb.exevppjj.exerflfxxr.exennnnht.exe3ntntt.exejddvj.exelfxxrrr.exexfxxrfx.exe7tbttt.exe3jdvp.exe9vvdv.exelxlffrr.exenttnbt.exetthhtt.exepvdvp.exefxxrlrl.exehtbtnn.exebnnhbn.exedescription pid process target process PID 896 wrote to memory of 2004 896 59648bc9eb4e7382d41979c144f60516f48e2f30c15d6552f2bcfc1867811204_NeikiAnalytics.exe 3ppjd.exe PID 896 wrote to memory of 2004 896 59648bc9eb4e7382d41979c144f60516f48e2f30c15d6552f2bcfc1867811204_NeikiAnalytics.exe 3ppjd.exe PID 896 wrote to memory of 2004 896 59648bc9eb4e7382d41979c144f60516f48e2f30c15d6552f2bcfc1867811204_NeikiAnalytics.exe 3ppjd.exe PID 2004 wrote to memory of 436 2004 3ppjd.exe rxxrllf.exe PID 2004 wrote to memory of 436 2004 3ppjd.exe rxxrllf.exe PID 2004 wrote to memory of 436 2004 3ppjd.exe rxxrllf.exe PID 436 wrote to memory of 2444 436 rxxrllf.exe frrfxrf.exe PID 436 wrote to memory of 2444 436 rxxrllf.exe frrfxrf.exe PID 436 wrote to memory of 2444 436 rxxrllf.exe frrfxrf.exe PID 2444 wrote to memory of 4484 2444 frrfxrf.exe 5nnhbb.exe PID 2444 wrote to memory of 4484 2444 frrfxrf.exe 5nnhbb.exe PID 2444 wrote to memory of 4484 2444 frrfxrf.exe 5nnhbb.exe PID 4484 wrote to memory of 60 4484 5nnhbb.exe vppjj.exe PID 4484 wrote to memory of 60 4484 5nnhbb.exe vppjj.exe PID 4484 wrote to memory of 60 4484 5nnhbb.exe vppjj.exe PID 60 wrote to memory of 4400 60 vppjj.exe rflfxxr.exe PID 60 wrote to memory of 4400 60 vppjj.exe rflfxxr.exe PID 60 wrote to memory of 4400 60 vppjj.exe rflfxxr.exe PID 4400 wrote to memory of 412 4400 rflfxxr.exe nnnnht.exe PID 4400 wrote to memory of 412 4400 rflfxxr.exe nnnnht.exe PID 4400 wrote to memory of 412 4400 rflfxxr.exe nnnnht.exe PID 412 wrote to memory of 2892 412 nnnnht.exe 3ntntt.exe PID 412 wrote to memory of 2892 412 nnnnht.exe 3ntntt.exe PID 412 wrote to memory of 2892 412 nnnnht.exe 3ntntt.exe PID 2892 wrote to memory of 2268 2892 3ntntt.exe jddvj.exe PID 2892 wrote to memory of 2268 2892 3ntntt.exe jddvj.exe PID 2892 wrote to memory of 2268 2892 3ntntt.exe jddvj.exe PID 2268 wrote to memory of 2616 2268 jddvj.exe lfxxrrr.exe PID 2268 wrote to memory of 2616 2268 jddvj.exe lfxxrrr.exe PID 2268 wrote to memory of 2616 2268 jddvj.exe lfxxrrr.exe PID 2616 wrote to memory of 3896 2616 lfxxrrr.exe xfxxrfx.exe PID 2616 wrote to memory of 3896 2616 lfxxrrr.exe xfxxrfx.exe PID 2616 wrote to memory of 3896 2616 lfxxrrr.exe xfxxrfx.exe PID 3896 wrote to memory of 4968 3896 xfxxrfx.exe 7tbttt.exe PID 3896 wrote to memory of 4968 3896 xfxxrfx.exe 7tbttt.exe PID 3896 wrote to memory of 4968 3896 xfxxrfx.exe 7tbttt.exe PID 4968 wrote to memory of 1012 4968 7tbttt.exe 3jdvp.exe PID 4968 wrote to memory of 1012 4968 7tbttt.exe 3jdvp.exe PID 4968 wrote to memory of 1012 4968 7tbttt.exe 3jdvp.exe PID 1012 wrote to memory of 4276 1012 3jdvp.exe 9vvdv.exe PID 1012 wrote to memory of 4276 1012 3jdvp.exe 9vvdv.exe PID 1012 wrote to memory of 4276 1012 3jdvp.exe 9vvdv.exe PID 4276 wrote to memory of 816 4276 9vvdv.exe lxlffrr.exe PID 4276 wrote to memory of 816 4276 9vvdv.exe lxlffrr.exe PID 4276 wrote to memory of 816 4276 9vvdv.exe lxlffrr.exe PID 816 wrote to memory of 1692 816 lxlffrr.exe nttnbt.exe PID 816 wrote to memory of 1692 816 lxlffrr.exe nttnbt.exe PID 816 wrote to memory of 1692 816 lxlffrr.exe nttnbt.exe PID 1692 wrote to memory of 3456 1692 nttnbt.exe tthhtt.exe PID 1692 wrote to memory of 3456 1692 nttnbt.exe tthhtt.exe PID 1692 wrote to memory of 3456 1692 nttnbt.exe tthhtt.exe PID 3456 wrote to memory of 1976 3456 tthhtt.exe pvdvp.exe PID 3456 wrote to memory of 1976 3456 tthhtt.exe pvdvp.exe PID 3456 wrote to memory of 1976 3456 tthhtt.exe pvdvp.exe PID 1976 wrote to memory of 1244 1976 pvdvp.exe thhbtn.exe PID 1976 wrote to memory of 1244 1976 pvdvp.exe thhbtn.exe PID 1976 wrote to memory of 1244 1976 pvdvp.exe thhbtn.exe PID 1244 wrote to memory of 3184 1244 fxxrlrl.exe htbtnn.exe PID 1244 wrote to memory of 3184 1244 fxxrlrl.exe htbtnn.exe PID 1244 wrote to memory of 3184 1244 fxxrlrl.exe htbtnn.exe PID 3184 wrote to memory of 2264 3184 htbtnn.exe bnnhbn.exe PID 3184 wrote to memory of 2264 3184 htbtnn.exe bnnhbn.exe PID 3184 wrote to memory of 2264 3184 htbtnn.exe bnnhbn.exe PID 2264 wrote to memory of 4116 2264 bnnhbn.exe 7jjdv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59648bc9eb4e7382d41979c144f60516f48e2f30c15d6552f2bcfc1867811204_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\59648bc9eb4e7382d41979c144f60516f48e2f30c15d6552f2bcfc1867811204_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\3ppjd.exec:\3ppjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxxrllf.exec:\rxxrllf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frrfxrf.exec:\frrfxrf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5nnhbb.exec:\5nnhbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vppjj.exec:\vppjj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rflfxxr.exec:\rflfxxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnnnht.exec:\nnnnht.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3ntntt.exec:\3ntntt.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jddvj.exec:\jddvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfxxrrr.exec:\lfxxrrr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfxxrfx.exec:\xfxxrfx.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7tbttt.exec:\7tbttt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3jdvp.exec:\3jdvp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9vvdv.exec:\9vvdv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxlffrr.exec:\lxlffrr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nttnbt.exec:\nttnbt.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tthhtt.exec:\tthhtt.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvdvp.exec:\pvdvp.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxxrlrl.exec:\fxxrlrl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\htbtnn.exec:\htbtnn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnnhbn.exec:\bnnhbn.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7jjdv.exec:\7jjdv.exe23⤵
- Executes dropped EXE
-
\??\c:\xflrfxr.exec:\xflrfxr.exe24⤵
- Executes dropped EXE
-
\??\c:\lxfxrrl.exec:\lxfxrrl.exe25⤵
- Executes dropped EXE
-
\??\c:\ttbnnn.exec:\ttbnnn.exe26⤵
- Executes dropped EXE
-
\??\c:\ppjjd.exec:\ppjjd.exe27⤵
- Executes dropped EXE
-
\??\c:\9vvjd.exec:\9vvjd.exe28⤵
- Executes dropped EXE
-
\??\c:\fxlxlll.exec:\fxlxlll.exe29⤵
- Executes dropped EXE
-
\??\c:\htbbtn.exec:\htbbtn.exe30⤵
- Executes dropped EXE
-
\??\c:\ttnhbt.exec:\ttnhbt.exe31⤵
- Executes dropped EXE
-
\??\c:\vpjdv.exec:\vpjdv.exe32⤵
- Executes dropped EXE
-
\??\c:\lffrlfr.exec:\lffrlfr.exe33⤵
- Executes dropped EXE
-
\??\c:\5tbnnh.exec:\5tbnnh.exe34⤵
- Executes dropped EXE
-
\??\c:\bbttnn.exec:\bbttnn.exe35⤵
- Executes dropped EXE
-
\??\c:\vddvv.exec:\vddvv.exe36⤵
- Executes dropped EXE
-
\??\c:\rxxrlfr.exec:\rxxrlfr.exe37⤵
- Executes dropped EXE
-
\??\c:\lfrlllf.exec:\lfrlllf.exe38⤵
- Executes dropped EXE
-
\??\c:\tbhtnh.exec:\tbhtnh.exe39⤵
- Executes dropped EXE
-
\??\c:\bthbbt.exec:\bthbbt.exe40⤵
- Executes dropped EXE
-
\??\c:\1vvjd.exec:\1vvjd.exe41⤵
- Executes dropped EXE
-
\??\c:\rffrllf.exec:\rffrllf.exe42⤵
- Executes dropped EXE
-
\??\c:\lrllfxf.exec:\lrllfxf.exe43⤵
- Executes dropped EXE
-
\??\c:\bntnhb.exec:\bntnhb.exe44⤵
- Executes dropped EXE
-
\??\c:\7pvjd.exec:\7pvjd.exe45⤵
- Executes dropped EXE
-
\??\c:\jdjjv.exec:\jdjjv.exe46⤵
- Executes dropped EXE
-
\??\c:\1llxrlf.exec:\1llxrlf.exe47⤵
- Executes dropped EXE
-
\??\c:\5bhbtt.exec:\5bhbtt.exe48⤵
- Executes dropped EXE
-
\??\c:\bttnhh.exec:\bttnhh.exe49⤵
- Executes dropped EXE
-
\??\c:\9vvvj.exec:\9vvvj.exe50⤵
- Executes dropped EXE
-
\??\c:\lrrrllf.exec:\lrrrllf.exe51⤵
- Executes dropped EXE
-
\??\c:\xrfxrfx.exec:\xrfxrfx.exe52⤵
- Executes dropped EXE
-
\??\c:\ntbnnn.exec:\ntbnnn.exe53⤵
- Executes dropped EXE
-
\??\c:\dpvpp.exec:\dpvpp.exe54⤵
- Executes dropped EXE
-
\??\c:\jvpdv.exec:\jvpdv.exe55⤵
- Executes dropped EXE
-
\??\c:\3frfffl.exec:\3frfffl.exe56⤵
- Executes dropped EXE
-
\??\c:\1bbttn.exec:\1bbttn.exe57⤵
- Executes dropped EXE
-
\??\c:\nnhbtt.exec:\nnhbtt.exe58⤵
- Executes dropped EXE
-
\??\c:\vvpjp.exec:\vvpjp.exe59⤵
- Executes dropped EXE
-
\??\c:\frxrlfx.exec:\frxrlfx.exe60⤵
- Executes dropped EXE
-
\??\c:\lfxrlfx.exec:\lfxrlfx.exe61⤵
- Executes dropped EXE
-
\??\c:\hbbtnh.exec:\hbbtnh.exe62⤵
- Executes dropped EXE
-
\??\c:\pvvjd.exec:\pvvjd.exe63⤵
- Executes dropped EXE
-
\??\c:\pjdjd.exec:\pjdjd.exe64⤵
- Executes dropped EXE
-
\??\c:\xxffxxx.exec:\xxffxxx.exe65⤵
- Executes dropped EXE
-
\??\c:\btnhtn.exec:\btnhtn.exe66⤵
-
\??\c:\thhbtn.exec:\thhbtn.exe67⤵
-
\??\c:\5vdvj.exec:\5vdvj.exe68⤵
-
\??\c:\lrrrlll.exec:\lrrrlll.exe69⤵
-
\??\c:\nbhtnt.exec:\nbhtnt.exe70⤵
-
\??\c:\nbhbtt.exec:\nbhbtt.exe71⤵
-
\??\c:\jjjpj.exec:\jjjpj.exe72⤵
-
\??\c:\lrxrllf.exec:\lrxrllf.exe73⤵
-
\??\c:\5hhbbb.exec:\5hhbbb.exe74⤵
-
\??\c:\nbbnhn.exec:\nbbnhn.exe75⤵
-
\??\c:\flxxrrl.exec:\flxxrrl.exe76⤵
-
\??\c:\3hnnhb.exec:\3hnnhb.exe77⤵
-
\??\c:\frrlfxr.exec:\frrlfxr.exe78⤵
-
\??\c:\nntnhb.exec:\nntnhb.exe79⤵
-
\??\c:\pjpvj.exec:\pjpvj.exe80⤵
-
\??\c:\dddpj.exec:\dddpj.exe81⤵
-
\??\c:\lxxxffl.exec:\lxxxffl.exe82⤵
-
\??\c:\tntnnn.exec:\tntnnn.exe83⤵
-
\??\c:\jvpjj.exec:\jvpjj.exe84⤵
-
\??\c:\pjpjd.exec:\pjpjd.exe85⤵
-
\??\c:\7xfxrff.exec:\7xfxrff.exe86⤵
-
\??\c:\btnhbb.exec:\btnhbb.exe87⤵
-
\??\c:\vpvjd.exec:\vpvjd.exe88⤵
-
\??\c:\1ffrxrl.exec:\1ffrxrl.exe89⤵
-
\??\c:\nnbttb.exec:\nnbttb.exe90⤵
-
\??\c:\vjjjd.exec:\vjjjd.exe91⤵
-
\??\c:\9lrllll.exec:\9lrllll.exe92⤵
-
\??\c:\ntnnhb.exec:\ntnnhb.exe93⤵
-
\??\c:\dpvvp.exec:\dpvvp.exe94⤵
-
\??\c:\jjvjd.exec:\jjvjd.exe95⤵
-
\??\c:\lflfxxx.exec:\lflfxxx.exe96⤵
-
\??\c:\htnhhh.exec:\htnhhh.exe97⤵
-
\??\c:\vppjd.exec:\vppjd.exe98⤵
-
\??\c:\fxxrrlr.exec:\fxxrrlr.exe99⤵
-
\??\c:\pvvpj.exec:\pvvpj.exe100⤵
-
\??\c:\vvpvv.exec:\vvpvv.exe101⤵
-
\??\c:\7ffxfxf.exec:\7ffxfxf.exe102⤵
-
\??\c:\9bhtbn.exec:\9bhtbn.exe103⤵
-
\??\c:\vvvpv.exec:\vvvpv.exe104⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe105⤵
-
\??\c:\1xxrlll.exec:\1xxrlll.exe106⤵
-
\??\c:\tnhhbb.exec:\tnhhbb.exe107⤵
-
\??\c:\7jjdv.exec:\7jjdv.exe108⤵
-
\??\c:\vjpdv.exec:\vjpdv.exe109⤵
-
\??\c:\3xxxrrl.exec:\3xxxrrl.exe110⤵
-
\??\c:\ttbtnn.exec:\ttbtnn.exe111⤵
-
\??\c:\ddjdv.exec:\ddjdv.exe112⤵
-
\??\c:\5vdvp.exec:\5vdvp.exe113⤵
-
\??\c:\7hbbtt.exec:\7hbbtt.exe114⤵
-
\??\c:\5ntnhh.exec:\5ntnhh.exe115⤵
-
\??\c:\dvddv.exec:\dvddv.exe116⤵
-
\??\c:\llffxlf.exec:\llffxlf.exe117⤵
-
\??\c:\ntnhhh.exec:\ntnhhh.exe118⤵
-
\??\c:\dvpvj.exec:\dvpvj.exe119⤵
-
\??\c:\jjpjp.exec:\jjpjp.exe120⤵
-
\??\c:\btnhbb.exec:\btnhbb.exe121⤵
-
\??\c:\pjvpj.exec:\pjvpj.exe122⤵
-
\??\c:\frrxllr.exec:\frrxllr.exe123⤵
-
\??\c:\xrllffx.exec:\xrllffx.exe124⤵
-
\??\c:\nntnhb.exec:\nntnhb.exe125⤵
-
\??\c:\vvjpd.exec:\vvjpd.exe126⤵
-
\??\c:\rfxxrrl.exec:\rfxxrrl.exe127⤵
-
\??\c:\3rrlfxx.exec:\3rrlfxx.exe128⤵
-
\??\c:\7btnbb.exec:\7btnbb.exe129⤵
-
\??\c:\jvpdp.exec:\jvpdp.exe130⤵
-
\??\c:\fxlxrlf.exec:\fxlxrlf.exe131⤵
-
\??\c:\nhhbtn.exec:\nhhbtn.exe132⤵
-
\??\c:\5dpjd.exec:\5dpjd.exe133⤵
-
\??\c:\rxrlllf.exec:\rxrlllf.exe134⤵
-
\??\c:\3tnhbt.exec:\3tnhbt.exe135⤵
-
\??\c:\hnnhtb.exec:\hnnhtb.exe136⤵
-
\??\c:\jdvpj.exec:\jdvpj.exe137⤵
-
\??\c:\rrxxxxr.exec:\rrxxxxr.exe138⤵
-
\??\c:\hhhhtt.exec:\hhhhtt.exe139⤵
-
\??\c:\9jdpj.exec:\9jdpj.exe140⤵
-
\??\c:\fffxrll.exec:\fffxrll.exe141⤵
-
\??\c:\7rrrxfr.exec:\7rrrxfr.exe142⤵
-
\??\c:\vjjdv.exec:\vjjdv.exe143⤵
-
\??\c:\frlfrrr.exec:\frlfrrr.exe144⤵
-
\??\c:\xffxrrl.exec:\xffxrrl.exe145⤵
-
\??\c:\tbhhbh.exec:\tbhhbh.exe146⤵
-
\??\c:\9dpjp.exec:\9dpjp.exe147⤵
-
\??\c:\ppvpj.exec:\ppvpj.exe148⤵
-
\??\c:\nnhbtt.exec:\nnhbtt.exe149⤵
-
\??\c:\1vjpv.exec:\1vjpv.exe150⤵
-
\??\c:\1dddv.exec:\1dddv.exe151⤵
-
\??\c:\xxrfxfr.exec:\xxrfxfr.exe152⤵
-
\??\c:\9ntnhb.exec:\9ntnhb.exe153⤵
-
\??\c:\bhbhbb.exec:\bhbhbb.exe154⤵
-
\??\c:\pjjjd.exec:\pjjjd.exe155⤵
-
\??\c:\rrxlfrr.exec:\rrxlfrr.exe156⤵
-
\??\c:\nbhtnn.exec:\nbhtnn.exe157⤵
-
\??\c:\5jdvp.exec:\5jdvp.exe158⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe159⤵
-
\??\c:\3flrrrr.exec:\3flrrrr.exe160⤵
-
\??\c:\nhtnbt.exec:\nhtnbt.exe161⤵
-
\??\c:\vvdpp.exec:\vvdpp.exe162⤵
-
\??\c:\pjjdd.exec:\pjjdd.exe163⤵
-
\??\c:\lxxrlll.exec:\lxxrlll.exe164⤵
-
\??\c:\nhhhbb.exec:\nhhhbb.exe165⤵
-
\??\c:\dvjdj.exec:\dvjdj.exe166⤵
-
\??\c:\7rrrrrl.exec:\7rrrrrl.exe167⤵
-
\??\c:\7rxxlxr.exec:\7rxxlxr.exe168⤵
-
\??\c:\1hnhtb.exec:\1hnhtb.exe169⤵
-
\??\c:\pvvdv.exec:\pvvdv.exe170⤵
-
\??\c:\9lrlflf.exec:\9lrlflf.exe171⤵
-
\??\c:\bttnhh.exec:\bttnhh.exe172⤵
-
\??\c:\3ddvv.exec:\3ddvv.exe173⤵
-
\??\c:\1lfrlfl.exec:\1lfrlfl.exe174⤵
-
\??\c:\thnbhb.exec:\thnbhb.exe175⤵
-
\??\c:\nhbtnb.exec:\nhbtnb.exe176⤵
-
\??\c:\xffxrrr.exec:\xffxrrr.exe177⤵
-
\??\c:\9fxfxxf.exec:\9fxfxxf.exe178⤵
-
\??\c:\hnhbtn.exec:\hnhbtn.exe179⤵
-
\??\c:\dddvj.exec:\dddvj.exe180⤵
-
\??\c:\xrrlfff.exec:\xrrlfff.exe181⤵
-
\??\c:\xllfxfx.exec:\xllfxfx.exe182⤵
-
\??\c:\1bbbhh.exec:\1bbbhh.exe183⤵
-
\??\c:\vjjjd.exec:\vjjjd.exe184⤵
-
\??\c:\lxrfrlx.exec:\lxrfrlx.exe185⤵
-
\??\c:\lffxlfl.exec:\lffxlfl.exe186⤵
-
\??\c:\1nnhbb.exec:\1nnhbb.exe187⤵
-
\??\c:\jdjdp.exec:\jdjdp.exe188⤵
-
\??\c:\9vdvd.exec:\9vdvd.exe189⤵
-
\??\c:\flflxlf.exec:\flflxlf.exe190⤵
-
\??\c:\pjpvp.exec:\pjpvp.exe191⤵
-
\??\c:\vjjdp.exec:\vjjdp.exe192⤵
-
\??\c:\rllfxxr.exec:\rllfxxr.exe193⤵
-
\??\c:\jvvpp.exec:\jvvpp.exe194⤵
-
\??\c:\rrxfxxx.exec:\rrxfxxx.exe195⤵
-
\??\c:\jddjd.exec:\jddjd.exe196⤵
-
\??\c:\lxxrffx.exec:\lxxrffx.exe197⤵
-
\??\c:\3hbbth.exec:\3hbbth.exe198⤵
-
\??\c:\5xxrrxr.exec:\5xxrrxr.exe199⤵
-
\??\c:\hbtnhh.exec:\hbtnhh.exe200⤵
-
\??\c:\bthtnh.exec:\bthtnh.exe201⤵
-
\??\c:\5jpjd.exec:\5jpjd.exe202⤵
-
\??\c:\9llxrxr.exec:\9llxrxr.exe203⤵
-
\??\c:\hthbtt.exec:\hthbtt.exe204⤵
-
\??\c:\7vdvp.exec:\7vdvp.exe205⤵
-
\??\c:\vvpjd.exec:\vvpjd.exe206⤵
-
\??\c:\1rlfxrl.exec:\1rlfxrl.exe207⤵
-
\??\c:\3tnnhh.exec:\3tnnhh.exe208⤵
-
\??\c:\nbnttn.exec:\nbnttn.exe209⤵
-
\??\c:\dvvpp.exec:\dvvpp.exe210⤵
-
\??\c:\xxrfxrf.exec:\xxrfxrf.exe211⤵
-
\??\c:\hhbnhb.exec:\hhbnhb.exe212⤵
-
\??\c:\bnnbtn.exec:\bnnbtn.exe213⤵
-
\??\c:\jjjpd.exec:\jjjpd.exe214⤵
-
\??\c:\rllfffx.exec:\rllfffx.exe215⤵
-
\??\c:\1hhhhh.exec:\1hhhhh.exe216⤵
-
\??\c:\hnnhbt.exec:\hnnhbt.exe217⤵
-
\??\c:\vjpjp.exec:\vjpjp.exe218⤵
-
\??\c:\ffrllfl.exec:\ffrllfl.exe219⤵
-
\??\c:\hntnhh.exec:\hntnhh.exe220⤵
-
\??\c:\jpvdd.exec:\jpvdd.exe221⤵
-
\??\c:\xrxrrrx.exec:\xrxrrrx.exe222⤵
-
\??\c:\llllllf.exec:\llllllf.exe223⤵
-
\??\c:\hhnnnt.exec:\hhnnnt.exe224⤵
-
\??\c:\dvvpj.exec:\dvvpj.exe225⤵
-
\??\c:\vdpvp.exec:\vdpvp.exe226⤵
-
\??\c:\7lrlfxx.exec:\7lrlfxx.exe227⤵
-
\??\c:\hnntbn.exec:\hnntbn.exe228⤵
-
\??\c:\5pjdv.exec:\5pjdv.exe229⤵
-
\??\c:\1xlrfrx.exec:\1xlrfrx.exe230⤵
-
\??\c:\lrxrlrx.exec:\lrxrlrx.exe231⤵
-
\??\c:\nnnnhh.exec:\nnnnhh.exe232⤵
-
\??\c:\5ppjd.exec:\5ppjd.exe233⤵
-
\??\c:\xlxrrll.exec:\xlxrrll.exe234⤵
-
\??\c:\xlxrlll.exec:\xlxrlll.exe235⤵
-
\??\c:\7nhhbb.exec:\7nhhbb.exe236⤵
-
\??\c:\vjpjd.exec:\vjpjd.exe237⤵
-
\??\c:\llrfxrl.exec:\llrfxrl.exe238⤵
-
\??\c:\xrlfllx.exec:\xrlfllx.exe239⤵
-
\??\c:\hhhbhb.exec:\hhhbhb.exe240⤵
-
\??\c:\vdpjv.exec:\vdpjv.exe241⤵