Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
013476cf69d05e30cd4ac57e1a186510_NeikiAnalytics.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
013476cf69d05e30cd4ac57e1a186510_NeikiAnalytics.exe
-
Size
68KB
-
MD5
013476cf69d05e30cd4ac57e1a186510
-
SHA1
d1e131827271b56a0d52579d45ee1c8e7b1c372b
-
SHA256
0e1a2abd58879a0df696f7f481d9ba0718716ce051816b98b89383895ae5db6e
-
SHA512
3f6fb17ec2e7cc97be0a3b629a54211803601b1e30e095ce72e84cb5921377d70fd601c047add5fbe21d74bb0080eed1ec6289ac8c95737bd718b1401fd0e930
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89V:ymb3NkkiQ3mdBjFIvl358nLA89V
Malware Config
Signatures
-
Detect Blackmoon payload 21 IoCs
Processes:
resource yara_rule behavioral1/memory/2112-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1032-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2516-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2864-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2692-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2708-68-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2708-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2420-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2960-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1656-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2816-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1652-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1432-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2652-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1236-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2056-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2968-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2252-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2260-260-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1424-287-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1884-296-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
pjvpj.exedvjvj.exe7hntbb.exe9jjjp.exerxlrllr.exelffrrlx.exenhtthn.exe1nnnbb.exevdjdj.exefxrrflx.exetnbntn.exehbhhtt.exevpjjj.exepjdpd.exe1xllrxf.exefxfrlrl.exe3nbbbb.exe5vjdv.exe5pjpv.exefxrrxfx.exennhtbh.exe5tntbb.exedddjv.exe5vpvp.exelxfflll.exefrllxfr.exetnnthh.exe9tthnt.exeppddj.exefxfxxfr.exeffxfxrx.exebthhtb.exenhhhnt.exevpddp.exelxxlxrr.exebhhtht.exebtnttt.exe1ddvd.exevjvdp.exepjdpv.exelffllxx.exe7bhntb.exebhhhbh.exe9pppv.exejdpvd.exedvjpd.exelfllrlx.exehtbhtb.exethbhtt.exe3ppjv.exerxxfxxl.exebtbhhn.exe1tnnnt.exehbbntt.exeddjdd.exexxrxxlr.exe9xxxlrf.exenhttbb.exejdvdv.exedvjpd.exe3fflxxr.exerrxfxxl.exennnnbh.exe3nbbhh.exepid process 2112 pjvpj.exe 2516 dvjvj.exe 2864 7hntbb.exe 2692 9jjjp.exe 2708 rxlrllr.exe 2420 lffrrlx.exe 2960 nhtthn.exe 1656 1nnnbb.exe 2752 vdjdj.exe 2816 fxrrflx.exe 1440 tnbntn.exe 1652 hbhhtt.exe 1432 vpjjj.exe 2652 pjdpd.exe 2748 1xllrxf.exe 1236 fxfrlrl.exe 2056 3nbbbb.exe 2968 5vjdv.exe 2020 5pjpv.exe 2252 fxrrxfx.exe 1000 nnhtbh.exe 2868 5tntbb.exe 1804 dddjv.exe 916 5vpvp.exe 1672 lxfflll.exe 2260 frllxfr.exe 1624 tnnthh.exe 2900 9tthnt.exe 1424 ppddj.exe 1884 fxfxxfr.exe 1516 ffxfxrx.exe 1872 bthhtb.exe 2616 nhhhnt.exe 2548 vpddp.exe 2700 lxxlxrr.exe 2440 bhhtht.exe 2448 btnttt.exe 2364 1ddvd.exe 2584 vjvdp.exe 2484 pjdpv.exe 1612 lffllxx.exe 2576 7bhntb.exe 2776 bhhhbh.exe 2760 9pppv.exe 2636 jdpvd.exe 1552 dvjpd.exe 1784 lfllrlx.exe 2380 htbhtb.exe 2644 thbhtt.exe 2392 3ppjv.exe 1168 rxxfxxl.exe 2036 btbhhn.exe 1132 1tnnnt.exe 2196 hbbntt.exe 1856 ddjdd.exe 1928 xxrxxlr.exe 1724 9xxxlrf.exe 576 nhttbb.exe 808 jdvdv.exe 1104 dvjpd.exe 556 3fflxxr.exe 2376 rrxfxxl.exe 2140 nnnnbh.exe 2160 3nbbhh.exe -
Processes:
resource yara_rule behavioral1/memory/2112-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1032-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2516-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2692-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2708-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2420-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2960-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1656-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2816-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1652-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1432-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2652-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1236-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2056-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2968-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2252-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2260-260-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1424-287-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1884-296-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
013476cf69d05e30cd4ac57e1a186510_NeikiAnalytics.exepjvpj.exedvjvj.exe7hntbb.exe9jjjp.exerxlrllr.exelffrrlx.exenhtthn.exe1nnnbb.exevdjdj.exefxrrflx.exetnbntn.exehbhhtt.exevpjjj.exepjdpd.exe1xllrxf.exedescription pid process target process PID 1032 wrote to memory of 2112 1032 013476cf69d05e30cd4ac57e1a186510_NeikiAnalytics.exe pjvpj.exe PID 1032 wrote to memory of 2112 1032 013476cf69d05e30cd4ac57e1a186510_NeikiAnalytics.exe pjvpj.exe PID 1032 wrote to memory of 2112 1032 013476cf69d05e30cd4ac57e1a186510_NeikiAnalytics.exe pjvpj.exe PID 1032 wrote to memory of 2112 1032 013476cf69d05e30cd4ac57e1a186510_NeikiAnalytics.exe pjvpj.exe PID 2112 wrote to memory of 2516 2112 pjvpj.exe dvjvj.exe PID 2112 wrote to memory of 2516 2112 pjvpj.exe dvjvj.exe PID 2112 wrote to memory of 2516 2112 pjvpj.exe dvjvj.exe PID 2112 wrote to memory of 2516 2112 pjvpj.exe dvjvj.exe PID 2516 wrote to memory of 2864 2516 dvjvj.exe 7hntbb.exe PID 2516 wrote to memory of 2864 2516 dvjvj.exe 7hntbb.exe PID 2516 wrote to memory of 2864 2516 dvjvj.exe 7hntbb.exe PID 2516 wrote to memory of 2864 2516 dvjvj.exe 7hntbb.exe PID 2864 wrote to memory of 2692 2864 7hntbb.exe 9jjjp.exe PID 2864 wrote to memory of 2692 2864 7hntbb.exe 9jjjp.exe PID 2864 wrote to memory of 2692 2864 7hntbb.exe 9jjjp.exe PID 2864 wrote to memory of 2692 2864 7hntbb.exe 9jjjp.exe PID 2692 wrote to memory of 2708 2692 9jjjp.exe rxlrllr.exe PID 2692 wrote to memory of 2708 2692 9jjjp.exe rxlrllr.exe PID 2692 wrote to memory of 2708 2692 9jjjp.exe rxlrllr.exe PID 2692 wrote to memory of 2708 2692 9jjjp.exe rxlrllr.exe PID 2708 wrote to memory of 2420 2708 rxlrllr.exe lffrrlx.exe PID 2708 wrote to memory of 2420 2708 rxlrllr.exe lffrrlx.exe PID 2708 wrote to memory of 2420 2708 rxlrllr.exe lffrrlx.exe PID 2708 wrote to memory of 2420 2708 rxlrllr.exe lffrrlx.exe PID 2420 wrote to memory of 2960 2420 lffrrlx.exe nhtthn.exe PID 2420 wrote to memory of 2960 2420 lffrrlx.exe nhtthn.exe PID 2420 wrote to memory of 2960 2420 lffrrlx.exe nhtthn.exe PID 2420 wrote to memory of 2960 2420 lffrrlx.exe nhtthn.exe PID 2960 wrote to memory of 1656 2960 nhtthn.exe 1nnnbb.exe PID 2960 wrote to memory of 1656 2960 nhtthn.exe 1nnnbb.exe PID 2960 wrote to memory of 1656 2960 nhtthn.exe 1nnnbb.exe PID 2960 wrote to memory of 1656 2960 nhtthn.exe 1nnnbb.exe PID 1656 wrote to memory of 2752 1656 1nnnbb.exe vdjdj.exe PID 1656 wrote to memory of 2752 1656 1nnnbb.exe vdjdj.exe PID 1656 wrote to memory of 2752 1656 1nnnbb.exe vdjdj.exe PID 1656 wrote to memory of 2752 1656 1nnnbb.exe vdjdj.exe PID 2752 wrote to memory of 2816 2752 vdjdj.exe fxrrflx.exe PID 2752 wrote to memory of 2816 2752 vdjdj.exe fxrrflx.exe PID 2752 wrote to memory of 2816 2752 vdjdj.exe fxrrflx.exe PID 2752 wrote to memory of 2816 2752 vdjdj.exe fxrrflx.exe PID 2816 wrote to memory of 1440 2816 fxrrflx.exe tnbntn.exe PID 2816 wrote to memory of 1440 2816 fxrrflx.exe tnbntn.exe PID 2816 wrote to memory of 1440 2816 fxrrflx.exe tnbntn.exe PID 2816 wrote to memory of 1440 2816 fxrrflx.exe tnbntn.exe PID 1440 wrote to memory of 1652 1440 tnbntn.exe hbhhtt.exe PID 1440 wrote to memory of 1652 1440 tnbntn.exe hbhhtt.exe PID 1440 wrote to memory of 1652 1440 tnbntn.exe hbhhtt.exe PID 1440 wrote to memory of 1652 1440 tnbntn.exe hbhhtt.exe PID 1652 wrote to memory of 1432 1652 hbhhtt.exe vpjjj.exe PID 1652 wrote to memory of 1432 1652 hbhhtt.exe vpjjj.exe PID 1652 wrote to memory of 1432 1652 hbhhtt.exe vpjjj.exe PID 1652 wrote to memory of 1432 1652 hbhhtt.exe vpjjj.exe PID 1432 wrote to memory of 2652 1432 vpjjj.exe pjdpd.exe PID 1432 wrote to memory of 2652 1432 vpjjj.exe pjdpd.exe PID 1432 wrote to memory of 2652 1432 vpjjj.exe pjdpd.exe PID 1432 wrote to memory of 2652 1432 vpjjj.exe pjdpd.exe PID 2652 wrote to memory of 2748 2652 pjdpd.exe 1xllrxf.exe PID 2652 wrote to memory of 2748 2652 pjdpd.exe 1xllrxf.exe PID 2652 wrote to memory of 2748 2652 pjdpd.exe 1xllrxf.exe PID 2652 wrote to memory of 2748 2652 pjdpd.exe 1xllrxf.exe PID 2748 wrote to memory of 1236 2748 1xllrxf.exe fxfrlrl.exe PID 2748 wrote to memory of 1236 2748 1xllrxf.exe fxfrlrl.exe PID 2748 wrote to memory of 1236 2748 1xllrxf.exe fxfrlrl.exe PID 2748 wrote to memory of 1236 2748 1xllrxf.exe fxfrlrl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\013476cf69d05e30cd4ac57e1a186510_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\013476cf69d05e30cd4ac57e1a186510_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\pjvpj.exec:\pjvpj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvjvj.exec:\dvjvj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7hntbb.exec:\7hntbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9jjjp.exec:\9jjjp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxlrllr.exec:\rxlrllr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lffrrlx.exec:\lffrrlx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhtthn.exec:\nhtthn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1nnnbb.exec:\1nnnbb.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vdjdj.exec:\vdjdj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxrrflx.exec:\fxrrflx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnbntn.exec:\tnbntn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbhhtt.exec:\hbhhtt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpjjj.exec:\vpjjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjdpd.exec:\pjdpd.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1xllrxf.exec:\1xllrxf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxfrlrl.exec:\fxfrlrl.exe17⤵
- Executes dropped EXE
-
\??\c:\3nbbbb.exec:\3nbbbb.exe18⤵
- Executes dropped EXE
-
\??\c:\5vjdv.exec:\5vjdv.exe19⤵
- Executes dropped EXE
-
\??\c:\5pjpv.exec:\5pjpv.exe20⤵
- Executes dropped EXE
-
\??\c:\fxrrxfx.exec:\fxrrxfx.exe21⤵
- Executes dropped EXE
-
\??\c:\nnhtbh.exec:\nnhtbh.exe22⤵
- Executes dropped EXE
-
\??\c:\5tntbb.exec:\5tntbb.exe23⤵
- Executes dropped EXE
-
\??\c:\dddjv.exec:\dddjv.exe24⤵
- Executes dropped EXE
-
\??\c:\5vpvp.exec:\5vpvp.exe25⤵
- Executes dropped EXE
-
\??\c:\lxfflll.exec:\lxfflll.exe26⤵
- Executes dropped EXE
-
\??\c:\frllxfr.exec:\frllxfr.exe27⤵
- Executes dropped EXE
-
\??\c:\tnnthh.exec:\tnnthh.exe28⤵
- Executes dropped EXE
-
\??\c:\9tthnt.exec:\9tthnt.exe29⤵
- Executes dropped EXE
-
\??\c:\ppddj.exec:\ppddj.exe30⤵
- Executes dropped EXE
-
\??\c:\fxfxxfr.exec:\fxfxxfr.exe31⤵
- Executes dropped EXE
-
\??\c:\ffxfxrx.exec:\ffxfxrx.exe32⤵
- Executes dropped EXE
-
\??\c:\bthhtb.exec:\bthhtb.exe33⤵
- Executes dropped EXE
-
\??\c:\nhhhnt.exec:\nhhhnt.exe34⤵
- Executes dropped EXE
-
\??\c:\vpddp.exec:\vpddp.exe35⤵
- Executes dropped EXE
-
\??\c:\lxxlxrr.exec:\lxxlxrr.exe36⤵
- Executes dropped EXE
-
\??\c:\bhhtht.exec:\bhhtht.exe37⤵
- Executes dropped EXE
-
\??\c:\btnttt.exec:\btnttt.exe38⤵
- Executes dropped EXE
-
\??\c:\1ddvd.exec:\1ddvd.exe39⤵
- Executes dropped EXE
-
\??\c:\vjvdp.exec:\vjvdp.exe40⤵
- Executes dropped EXE
-
\??\c:\pjdpv.exec:\pjdpv.exe41⤵
- Executes dropped EXE
-
\??\c:\lffllxx.exec:\lffllxx.exe42⤵
- Executes dropped EXE
-
\??\c:\7bhntb.exec:\7bhntb.exe43⤵
- Executes dropped EXE
-
\??\c:\bhhhbh.exec:\bhhhbh.exe44⤵
- Executes dropped EXE
-
\??\c:\9pppv.exec:\9pppv.exe45⤵
- Executes dropped EXE
-
\??\c:\jdpvd.exec:\jdpvd.exe46⤵
- Executes dropped EXE
-
\??\c:\dvjpd.exec:\dvjpd.exe47⤵
- Executes dropped EXE
-
\??\c:\lfllrlx.exec:\lfllrlx.exe48⤵
- Executes dropped EXE
-
\??\c:\htbhtb.exec:\htbhtb.exe49⤵
- Executes dropped EXE
-
\??\c:\thbhtt.exec:\thbhtt.exe50⤵
- Executes dropped EXE
-
\??\c:\3ppjv.exec:\3ppjv.exe51⤵
- Executes dropped EXE
-
\??\c:\rxxfxxl.exec:\rxxfxxl.exe52⤵
- Executes dropped EXE
-
\??\c:\btbhhn.exec:\btbhhn.exe53⤵
- Executes dropped EXE
-
\??\c:\1tnnnt.exec:\1tnnnt.exe54⤵
- Executes dropped EXE
-
\??\c:\hbbntt.exec:\hbbntt.exe55⤵
- Executes dropped EXE
-
\??\c:\ddjdd.exec:\ddjdd.exe56⤵
- Executes dropped EXE
-
\??\c:\xxrxxlr.exec:\xxrxxlr.exe57⤵
- Executes dropped EXE
-
\??\c:\9xxxlrf.exec:\9xxxlrf.exe58⤵
- Executes dropped EXE
-
\??\c:\nhttbb.exec:\nhttbb.exe59⤵
- Executes dropped EXE
-
\??\c:\jdvdv.exec:\jdvdv.exe60⤵
- Executes dropped EXE
-
\??\c:\dvjpd.exec:\dvjpd.exe61⤵
- Executes dropped EXE
-
\??\c:\3fflxxr.exec:\3fflxxr.exe62⤵
- Executes dropped EXE
-
\??\c:\rrxfxxl.exec:\rrxfxxl.exe63⤵
- Executes dropped EXE
-
\??\c:\nnnnbh.exec:\nnnnbh.exe64⤵
- Executes dropped EXE
-
\??\c:\3nbbhh.exec:\3nbbhh.exe65⤵
- Executes dropped EXE
-
\??\c:\pvjdj.exec:\pvjdj.exe66⤵
-
\??\c:\1dvvd.exec:\1dvvd.exe67⤵
-
\??\c:\lxlrrlx.exec:\lxlrrlx.exe68⤵
-
\??\c:\1hntth.exec:\1hntth.exe69⤵
-
\??\c:\nhnnnh.exec:\nhnnnh.exe70⤵
-
\??\c:\dvvvj.exec:\dvvvj.exe71⤵
-
\??\c:\7fflrfr.exec:\7fflrfr.exe72⤵
-
\??\c:\frxffxl.exec:\frxffxl.exe73⤵
-
\??\c:\xxlfrxr.exec:\xxlfrxr.exe74⤵
-
\??\c:\5bhttt.exec:\5bhttt.exe75⤵
-
\??\c:\jvppv.exec:\jvppv.exe76⤵
-
\??\c:\dpdjp.exec:\dpdjp.exe77⤵
-
\??\c:\fxlxrxf.exec:\fxlxrxf.exe78⤵
-
\??\c:\bttnbb.exec:\bttnbb.exe79⤵
-
\??\c:\5hthnt.exec:\5hthnt.exe80⤵
-
\??\c:\vpdjd.exec:\vpdjd.exe81⤵
-
\??\c:\pjdjp.exec:\pjdjp.exe82⤵
-
\??\c:\ffrllrx.exec:\ffrllrx.exe83⤵
-
\??\c:\xxrxrrf.exec:\xxrxrrf.exe84⤵
-
\??\c:\bhttnn.exec:\bhttnn.exe85⤵
-
\??\c:\nntbhh.exec:\nntbhh.exe86⤵
-
\??\c:\jdvvj.exec:\jdvvj.exe87⤵
-
\??\c:\pppvj.exec:\pppvj.exe88⤵
-
\??\c:\llflrlx.exec:\llflrlx.exe89⤵
-
\??\c:\1fllrrf.exec:\1fllrrf.exe90⤵
-
\??\c:\nnthht.exec:\nnthht.exe91⤵
-
\??\c:\1jvdp.exec:\1jvdp.exe92⤵
-
\??\c:\pjjvp.exec:\pjjvp.exe93⤵
-
\??\c:\3fxxffr.exec:\3fxxffr.exe94⤵
-
\??\c:\llffrrf.exec:\llffrrf.exe95⤵
-
\??\c:\xlxrrxf.exec:\xlxrrxf.exe96⤵
-
\??\c:\hbhnbh.exec:\hbhnbh.exe97⤵
-
\??\c:\vpdvj.exec:\vpdvj.exe98⤵
-
\??\c:\1vvvd.exec:\1vvvd.exe99⤵
-
\??\c:\rlflrrf.exec:\rlflrrf.exe100⤵
-
\??\c:\fxfrffr.exec:\fxfrffr.exe101⤵
-
\??\c:\3nhbnb.exec:\3nhbnb.exe102⤵
-
\??\c:\hnhthn.exec:\hnhthn.exe103⤵
-
\??\c:\vjpvv.exec:\vjpvv.exe104⤵
-
\??\c:\dvpvp.exec:\dvpvp.exe105⤵
-
\??\c:\lfxfllx.exec:\lfxfllx.exe106⤵
-
\??\c:\5xlxrrx.exec:\5xlxrrx.exe107⤵
-
\??\c:\rlfrlrl.exec:\rlfrlrl.exe108⤵
-
\??\c:\hbnntn.exec:\hbnntn.exe109⤵
-
\??\c:\7hbhhn.exec:\7hbhhn.exe110⤵
-
\??\c:\pjppv.exec:\pjppv.exe111⤵
-
\??\c:\pjjjv.exec:\pjjjv.exe112⤵
-
\??\c:\fxrfffl.exec:\fxrfffl.exe113⤵
-
\??\c:\xrlrrxf.exec:\xrlrrxf.exe114⤵
-
\??\c:\bntthb.exec:\bntthb.exe115⤵
-
\??\c:\thbnnt.exec:\thbnnt.exe116⤵
-
\??\c:\dvpvd.exec:\dvpvd.exe117⤵
-
\??\c:\vpjpv.exec:\vpjpv.exe118⤵
-
\??\c:\1fxxlrf.exec:\1fxxlrf.exe119⤵
-
\??\c:\lfxflrf.exec:\lfxflrf.exe120⤵
-
\??\c:\hbnbtt.exec:\hbnbtt.exe121⤵
-
\??\c:\thbhtb.exec:\thbhtb.exe122⤵
-
\??\c:\7vjdp.exec:\7vjdp.exe123⤵
-
\??\c:\vvvjj.exec:\vvvjj.exe124⤵
-
\??\c:\rxlrrrx.exec:\rxlrrrx.exe125⤵
-
\??\c:\lfrrffl.exec:\lfrrffl.exe126⤵
-
\??\c:\hbntbh.exec:\hbntbh.exe127⤵
-
\??\c:\btbhtt.exec:\btbhtt.exe128⤵
-
\??\c:\pdjpj.exec:\pdjpj.exe129⤵
-
\??\c:\pdppv.exec:\pdppv.exe130⤵
-
\??\c:\7xrlrrx.exec:\7xrlrrx.exe131⤵
-
\??\c:\rfrrlll.exec:\rfrrlll.exe132⤵
-
\??\c:\bthntt.exec:\bthntt.exe133⤵
-
\??\c:\hbbnbh.exec:\hbbnbh.exe134⤵
-
\??\c:\hbtbnh.exec:\hbtbnh.exe135⤵
-
\??\c:\vvpdv.exec:\vvpdv.exe136⤵
-
\??\c:\xrrxlrr.exec:\xrrxlrr.exe137⤵
-
\??\c:\fxllrxl.exec:\fxllrxl.exe138⤵
-
\??\c:\lxffrrr.exec:\lxffrrr.exe139⤵
-
\??\c:\bnbnnt.exec:\bnbnnt.exe140⤵
-
\??\c:\bntnbh.exec:\bntnbh.exe141⤵
-
\??\c:\dpddd.exec:\dpddd.exe142⤵
-
\??\c:\vvdjp.exec:\vvdjp.exe143⤵
-
\??\c:\xfxfflr.exec:\xfxfflr.exe144⤵
-
\??\c:\flrfxlf.exec:\flrfxlf.exe145⤵
-
\??\c:\5hbttb.exec:\5hbttb.exe146⤵
-
\??\c:\tnbhnn.exec:\tnbhnn.exe147⤵
-
\??\c:\jvpvv.exec:\jvpvv.exe148⤵
-
\??\c:\5vdjv.exec:\5vdjv.exe149⤵
-
\??\c:\3llrffl.exec:\3llrffl.exe150⤵
-
\??\c:\lfxllrx.exec:\lfxllrx.exe151⤵
-
\??\c:\thtnnn.exec:\thtnnn.exe152⤵
-
\??\c:\3bnbhh.exec:\3bnbhh.exe153⤵
-
\??\c:\thtthn.exec:\thtthn.exe154⤵
-
\??\c:\vjvvp.exec:\vjvvp.exe155⤵
-
\??\c:\vpdjj.exec:\vpdjj.exe156⤵
-
\??\c:\llfrlxx.exec:\llfrlxx.exe157⤵
-
\??\c:\lxlfllx.exec:\lxlfllx.exe158⤵
-
\??\c:\7nbhtb.exec:\7nbhtb.exe159⤵
-
\??\c:\hbhhnh.exec:\hbhhnh.exe160⤵
-
\??\c:\3djjd.exec:\3djjd.exe161⤵
-
\??\c:\vpvdp.exec:\vpvdp.exe162⤵
-
\??\c:\lrxrrrl.exec:\lrxrrrl.exe163⤵
-
\??\c:\rrfxlfr.exec:\rrfxlfr.exe164⤵
-
\??\c:\9bhbtn.exec:\9bhbtn.exe165⤵
-
\??\c:\7bbhnn.exec:\7bbhnn.exe166⤵
-
\??\c:\dvddj.exec:\dvddj.exe167⤵
-
\??\c:\pdpvv.exec:\pdpvv.exe168⤵
-
\??\c:\pvjdj.exec:\pvjdj.exe169⤵
-
\??\c:\xlxfrxf.exec:\xlxfrxf.exe170⤵
-
\??\c:\xrrrffr.exec:\xrrrffr.exe171⤵
-
\??\c:\9xrflxf.exec:\9xrflxf.exe172⤵
-
\??\c:\bttthn.exec:\bttthn.exe173⤵
-
\??\c:\nhhnhh.exec:\nhhnhh.exe174⤵
-
\??\c:\dpddd.exec:\dpddd.exe175⤵
-
\??\c:\5jvjp.exec:\5jvjp.exe176⤵
-
\??\c:\ffrlrrf.exec:\ffrlrrf.exe177⤵
-
\??\c:\xlrrfxx.exec:\xlrrfxx.exe178⤵
-
\??\c:\btnthn.exec:\btnthn.exe179⤵
-
\??\c:\hbhnhn.exec:\hbhnhn.exe180⤵
-
\??\c:\btbbtb.exec:\btbbtb.exe181⤵
-
\??\c:\3pjpd.exec:\3pjpd.exe182⤵
-
\??\c:\ppddd.exec:\ppddd.exe183⤵
-
\??\c:\9lfflrf.exec:\9lfflrf.exe184⤵
-
\??\c:\7xfxffl.exec:\7xfxffl.exe185⤵
-
\??\c:\7nhthn.exec:\7nhthn.exe186⤵
-
\??\c:\jjvvv.exec:\jjvvv.exe187⤵
-
\??\c:\lfrfrfl.exec:\lfrfrfl.exe188⤵
-
\??\c:\5ffrllx.exec:\5ffrllx.exe189⤵
-
\??\c:\bhhbth.exec:\bhhbth.exe190⤵
-
\??\c:\nhbhnt.exec:\nhbhnt.exe191⤵
-
\??\c:\9jvvd.exec:\9jvvd.exe192⤵
-
\??\c:\jdpvv.exec:\jdpvv.exe193⤵
-
\??\c:\1xxlxfr.exec:\1xxlxfr.exe194⤵
-
\??\c:\3frxxfl.exec:\3frxxfl.exe195⤵
-
\??\c:\btbbht.exec:\btbbht.exe196⤵
-
\??\c:\tbhtnn.exec:\tbhtnn.exe197⤵
-
\??\c:\dvdpv.exec:\dvdpv.exe198⤵
-
\??\c:\jjjpj.exec:\jjjpj.exe199⤵
-
\??\c:\lfrrllx.exec:\lfrrllx.exe200⤵
-
\??\c:\9ttbnb.exec:\9ttbnb.exe201⤵
-
\??\c:\thntbh.exec:\thntbh.exe202⤵
-
\??\c:\7djvv.exec:\7djvv.exe203⤵
-
\??\c:\flllfxr.exec:\flllfxr.exe204⤵
-
\??\c:\frxflff.exec:\frxflff.exe205⤵
-
\??\c:\7hbtbh.exec:\7hbtbh.exe206⤵
-
\??\c:\djvvp.exec:\djvvp.exe207⤵
-
\??\c:\lfrrffr.exec:\lfrrffr.exe208⤵
-
\??\c:\xlrrxrx.exec:\xlrrxrx.exe209⤵
-
\??\c:\xrrrfff.exec:\xrrrfff.exe210⤵
-
\??\c:\tbhhhh.exec:\tbhhhh.exe211⤵
-
\??\c:\nttbhn.exec:\nttbhn.exe212⤵
-
\??\c:\dvjjp.exec:\dvjjp.exe213⤵
-
\??\c:\fflxlrr.exec:\fflxlrr.exe214⤵
-
\??\c:\9xrxxxf.exec:\9xrxxxf.exe215⤵
-
\??\c:\btntnt.exec:\btntnt.exe216⤵
-
\??\c:\thnbtb.exec:\thnbtb.exe217⤵
-
\??\c:\5djdp.exec:\5djdp.exe218⤵
-
\??\c:\pddjv.exec:\pddjv.exe219⤵
-
\??\c:\frxrxxf.exec:\frxrxxf.exe220⤵
-
\??\c:\rlrrffr.exec:\rlrrffr.exe221⤵
-
\??\c:\lflflrf.exec:\lflflrf.exe222⤵
-
\??\c:\hthhht.exec:\hthhht.exe223⤵
-
\??\c:\1pvvv.exec:\1pvvv.exe224⤵
-
\??\c:\pddjv.exec:\pddjv.exe225⤵
-
\??\c:\dvjpv.exec:\dvjpv.exe226⤵
-
\??\c:\frxflfr.exec:\frxflfr.exe227⤵
-
\??\c:\lxllrlx.exec:\lxllrlx.exe228⤵
-
\??\c:\bbbtbn.exec:\bbbtbn.exe229⤵
-
\??\c:\9nbhtt.exec:\9nbhtt.exe230⤵
-
\??\c:\9ppvv.exec:\9ppvv.exe231⤵
-
\??\c:\lfflffl.exec:\lfflffl.exe232⤵
-
\??\c:\xrxflfl.exec:\xrxflfl.exe233⤵
-
\??\c:\frflflx.exec:\frflflx.exe234⤵
-
\??\c:\tbhntb.exec:\tbhntb.exe235⤵
-
\??\c:\bntntb.exec:\bntntb.exe236⤵
-
\??\c:\dpddv.exec:\dpddv.exe237⤵
-
\??\c:\xxrlllx.exec:\xxrlllx.exe238⤵
-
\??\c:\rfllrlr.exec:\rfllrlr.exe239⤵
-
\??\c:\9bnntn.exec:\9bnntn.exe240⤵
-
\??\c:\5bhhtb.exec:\5bhhtb.exe241⤵