Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 05:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1f5a6139b8d726144ea46cfdaaea98f0_NeikiAnalytics.exe
Resource
win7-20240508-en
5 signatures
150 seconds
General
-
Target
1f5a6139b8d726144ea46cfdaaea98f0_NeikiAnalytics.exe
-
Size
268KB
-
MD5
1f5a6139b8d726144ea46cfdaaea98f0
-
SHA1
cf47d1193620d6ea2a0c21c40d04746890bd1e6a
-
SHA256
a2b6055562d456c7a9af72a8651833ca64f33c9dccdb7dec9140de7829d1d746
-
SHA512
c6befa5ed2fe2444105a6208385fef3c2f94e04a7c0b1a3e2379885a7b5f3a48ebff24067f552f0d36b256d8d0b228ab546dffbc6b46415d28984063eaa48250
-
SSDEEP
3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmPzTkV2y/QTa9RBZydZbf83pnzgmmIMy:n3C9BRIG0asYFm71mPfkVB8dKwaWm4s
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/616-7-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1708-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/616-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2688-52-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2892-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2560-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1484-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1412-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2596-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2256-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/568-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2920-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/264-220-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/972-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/776-246-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2292-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
tntbhn.exerrfrfrx.exebbthtb.exepvddd.exerlxfllr.exejdvvd.exe1lfxrxf.exellflflx.exepjppj.exe7rlrflr.exe9bbbnn.exe3dvdv.exe1frffrf.exenhthnt.exevpdjv.exe7xllllx.exebthntb.exehhttbh.exefxlflfl.exehbntbh.exedvjdd.exevpdpj.exe7frrllr.exe5jdpj.exe3frrrrx.exefxrfxxf.exejvppd.exexrlxlrf.exe3hbtbb.exejjdpd.exeffxflxf.exe5tnnhn.exeppjvj.exefxrxfrl.exebbtbnn.exe7dvvj.exepppdv.exerrlfllf.exethtbhn.exebbntnn.exedpdjj.exepppvp.exe3lfllxf.exetthhnt.exe3jvdd.exe9pjvd.exexlxlrfl.exenhtnbb.exenhbbnt.exevpdjp.exexrxxfxl.exelfxfflr.exe7bhhnb.exebbttbt.exedvjjp.exeddpdv.exelfrxflx.exenhntbb.exe9bbntt.exepdpvv.exellxflrl.exelllxrff.exennbhnt.exetthntt.exepid process 1708 tntbhn.exe 2680 rrfrfrx.exe 2336 bbthtb.exe 2688 pvddd.exe 2892 rlxfllr.exe 2748 jdvvd.exe 2608 1lfxrxf.exe 2560 llflflx.exe 2996 pjppj.exe 2964 7rlrflr.exe 1484 9bbbnn.exe 1412 3dvdv.exe 2016 1frffrf.exe 1948 nhthnt.exe 2596 vpdjv.exe 2256 7xllllx.exe 752 bthntb.exe 568 hhttbh.exe 1676 fxlflfl.exe 1312 hbntbh.exe 2920 dvjdd.exe 264 vpdpj.exe 972 7frrllr.exe 544 5jdpj.exe 776 3frrrrx.exe 284 fxrfxxf.exe 1852 jvppd.exe 3020 xrlxlrf.exe 2292 3hbtbb.exe 1372 jjdpd.exe 1796 ffxflxf.exe 1512 5tnnhn.exe 1804 ppjvj.exe 2216 fxrxfrl.exe 2644 bbtbnn.exe 2696 7dvvj.exe 2652 pppdv.exe 2504 rrlfllf.exe 2768 thtbhn.exe 2892 bbntnn.exe 2776 dpdjj.exe 2516 pppvp.exe 1624 3lfllxf.exe 2572 tthhnt.exe 2948 3jvdd.exe 2272 9pjvd.exe 2092 xlxlrfl.exe 2744 nhtnbb.exe 2828 nhbbnt.exe 316 vpdjp.exe 880 xrxxfxl.exe 2820 lfxfflr.exe 2856 7bhhnb.exe 2256 bbttbt.exe 1664 dvjjp.exe 2244 ddpdv.exe 2084 lfrxflx.exe 1764 nhntbb.exe 2844 9bbntt.exe 1792 pdpvv.exe 268 llxflrl.exe 2740 lllxrff.exe 1968 nnbhnt.exe 1696 tthntt.exe -
Processes:
resource yara_rule behavioral1/memory/1708-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/616-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2688-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2892-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-86-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1484-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1412-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2596-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/568-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2920-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/264-220-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/972-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/776-246-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2292-282-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1f5a6139b8d726144ea46cfdaaea98f0_NeikiAnalytics.exetntbhn.exerrfrfrx.exebbthtb.exepvddd.exerlxfllr.exejdvvd.exe1lfxrxf.exellflflx.exepjppj.exe7rlrflr.exe9bbbnn.exe3dvdv.exe1frffrf.exenhthnt.exevpdjv.exedescription pid process target process PID 616 wrote to memory of 1708 616 1f5a6139b8d726144ea46cfdaaea98f0_NeikiAnalytics.exe tntbhn.exe PID 616 wrote to memory of 1708 616 1f5a6139b8d726144ea46cfdaaea98f0_NeikiAnalytics.exe tntbhn.exe PID 616 wrote to memory of 1708 616 1f5a6139b8d726144ea46cfdaaea98f0_NeikiAnalytics.exe tntbhn.exe PID 616 wrote to memory of 1708 616 1f5a6139b8d726144ea46cfdaaea98f0_NeikiAnalytics.exe tntbhn.exe PID 1708 wrote to memory of 2680 1708 tntbhn.exe rrfrfrx.exe PID 1708 wrote to memory of 2680 1708 tntbhn.exe rrfrfrx.exe PID 1708 wrote to memory of 2680 1708 tntbhn.exe rrfrfrx.exe PID 1708 wrote to memory of 2680 1708 tntbhn.exe rrfrfrx.exe PID 2680 wrote to memory of 2336 2680 rrfrfrx.exe bbthtb.exe PID 2680 wrote to memory of 2336 2680 rrfrfrx.exe bbthtb.exe PID 2680 wrote to memory of 2336 2680 rrfrfrx.exe bbthtb.exe PID 2680 wrote to memory of 2336 2680 rrfrfrx.exe bbthtb.exe PID 2336 wrote to memory of 2688 2336 bbthtb.exe pvddd.exe PID 2336 wrote to memory of 2688 2336 bbthtb.exe pvddd.exe PID 2336 wrote to memory of 2688 2336 bbthtb.exe pvddd.exe PID 2336 wrote to memory of 2688 2336 bbthtb.exe pvddd.exe PID 2688 wrote to memory of 2892 2688 pvddd.exe rlxfllr.exe PID 2688 wrote to memory of 2892 2688 pvddd.exe rlxfllr.exe PID 2688 wrote to memory of 2892 2688 pvddd.exe rlxfllr.exe PID 2688 wrote to memory of 2892 2688 pvddd.exe rlxfllr.exe PID 2892 wrote to memory of 2748 2892 rlxfllr.exe jdvvd.exe PID 2892 wrote to memory of 2748 2892 rlxfllr.exe jdvvd.exe PID 2892 wrote to memory of 2748 2892 rlxfllr.exe jdvvd.exe PID 2892 wrote to memory of 2748 2892 rlxfllr.exe jdvvd.exe PID 2748 wrote to memory of 2608 2748 jdvvd.exe 1lfxrxf.exe PID 2748 wrote to memory of 2608 2748 jdvvd.exe 1lfxrxf.exe PID 2748 wrote to memory of 2608 2748 jdvvd.exe 1lfxrxf.exe PID 2748 wrote to memory of 2608 2748 jdvvd.exe 1lfxrxf.exe PID 2608 wrote to memory of 2560 2608 1lfxrxf.exe llflflx.exe PID 2608 wrote to memory of 2560 2608 1lfxrxf.exe llflflx.exe PID 2608 wrote to memory of 2560 2608 1lfxrxf.exe llflflx.exe PID 2608 wrote to memory of 2560 2608 1lfxrxf.exe llflflx.exe PID 2560 wrote to memory of 2996 2560 llflflx.exe pjppj.exe PID 2560 wrote to memory of 2996 2560 llflflx.exe pjppj.exe PID 2560 wrote to memory of 2996 2560 llflflx.exe pjppj.exe PID 2560 wrote to memory of 2996 2560 llflflx.exe pjppj.exe PID 2996 wrote to memory of 2964 2996 pjppj.exe 7rlrflr.exe PID 2996 wrote to memory of 2964 2996 pjppj.exe 7rlrflr.exe PID 2996 wrote to memory of 2964 2996 pjppj.exe 7rlrflr.exe PID 2996 wrote to memory of 2964 2996 pjppj.exe 7rlrflr.exe PID 2964 wrote to memory of 1484 2964 7rlrflr.exe 9bbbnn.exe PID 2964 wrote to memory of 1484 2964 7rlrflr.exe 9bbbnn.exe PID 2964 wrote to memory of 1484 2964 7rlrflr.exe 9bbbnn.exe PID 2964 wrote to memory of 1484 2964 7rlrflr.exe 9bbbnn.exe PID 1484 wrote to memory of 1412 1484 9bbbnn.exe 3dvdv.exe PID 1484 wrote to memory of 1412 1484 9bbbnn.exe 3dvdv.exe PID 1484 wrote to memory of 1412 1484 9bbbnn.exe 3dvdv.exe PID 1484 wrote to memory of 1412 1484 9bbbnn.exe 3dvdv.exe PID 1412 wrote to memory of 2016 1412 3dvdv.exe 1frffrf.exe PID 1412 wrote to memory of 2016 1412 3dvdv.exe 1frffrf.exe PID 1412 wrote to memory of 2016 1412 3dvdv.exe 1frffrf.exe PID 1412 wrote to memory of 2016 1412 3dvdv.exe 1frffrf.exe PID 2016 wrote to memory of 1948 2016 1frffrf.exe nhthnt.exe PID 2016 wrote to memory of 1948 2016 1frffrf.exe nhthnt.exe PID 2016 wrote to memory of 1948 2016 1frffrf.exe nhthnt.exe PID 2016 wrote to memory of 1948 2016 1frffrf.exe nhthnt.exe PID 1948 wrote to memory of 2596 1948 nhthnt.exe vpdjv.exe PID 1948 wrote to memory of 2596 1948 nhthnt.exe vpdjv.exe PID 1948 wrote to memory of 2596 1948 nhthnt.exe vpdjv.exe PID 1948 wrote to memory of 2596 1948 nhthnt.exe vpdjv.exe PID 2596 wrote to memory of 2256 2596 vpdjv.exe 7xllllx.exe PID 2596 wrote to memory of 2256 2596 vpdjv.exe 7xllllx.exe PID 2596 wrote to memory of 2256 2596 vpdjv.exe 7xllllx.exe PID 2596 wrote to memory of 2256 2596 vpdjv.exe 7xllllx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f5a6139b8d726144ea46cfdaaea98f0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\1f5a6139b8d726144ea46cfdaaea98f0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\tntbhn.exec:\tntbhn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrfrfrx.exec:\rrfrfrx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbthtb.exec:\bbthtb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvddd.exec:\pvddd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlxfllr.exec:\rlxfllr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdvvd.exec:\jdvvd.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1lfxrxf.exec:\1lfxrxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\llflflx.exec:\llflflx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjppj.exec:\pjppj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7rlrflr.exec:\7rlrflr.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9bbbnn.exec:\9bbbnn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3dvdv.exec:\3dvdv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1frffrf.exec:\1frffrf.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhthnt.exec:\nhthnt.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpdjv.exec:\vpdjv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7xllllx.exec:\7xllllx.exe17⤵
- Executes dropped EXE
-
\??\c:\bthntb.exec:\bthntb.exe18⤵
- Executes dropped EXE
-
\??\c:\hhttbh.exec:\hhttbh.exe19⤵
- Executes dropped EXE
-
\??\c:\fxlflfl.exec:\fxlflfl.exe20⤵
- Executes dropped EXE
-
\??\c:\hbntbh.exec:\hbntbh.exe21⤵
- Executes dropped EXE
-
\??\c:\dvjdd.exec:\dvjdd.exe22⤵
- Executes dropped EXE
-
\??\c:\vpdpj.exec:\vpdpj.exe23⤵
- Executes dropped EXE
-
\??\c:\7frrllr.exec:\7frrllr.exe24⤵
- Executes dropped EXE
-
\??\c:\5jdpj.exec:\5jdpj.exe25⤵
- Executes dropped EXE
-
\??\c:\3frrrrx.exec:\3frrrrx.exe26⤵
- Executes dropped EXE
-
\??\c:\fxrfxxf.exec:\fxrfxxf.exe27⤵
- Executes dropped EXE
-
\??\c:\jvppd.exec:\jvppd.exe28⤵
- Executes dropped EXE
-
\??\c:\xrlxlrf.exec:\xrlxlrf.exe29⤵
- Executes dropped EXE
-
\??\c:\3hbtbb.exec:\3hbtbb.exe30⤵
- Executes dropped EXE
-
\??\c:\jjdpd.exec:\jjdpd.exe31⤵
- Executes dropped EXE
-
\??\c:\ffxflxf.exec:\ffxflxf.exe32⤵
- Executes dropped EXE
-
\??\c:\5tnnhn.exec:\5tnnhn.exe33⤵
- Executes dropped EXE
-
\??\c:\ppjvj.exec:\ppjvj.exe34⤵
- Executes dropped EXE
-
\??\c:\fxrxfrl.exec:\fxrxfrl.exe35⤵
- Executes dropped EXE
-
\??\c:\bbtbnn.exec:\bbtbnn.exe36⤵
- Executes dropped EXE
-
\??\c:\7dvvj.exec:\7dvvj.exe37⤵
- Executes dropped EXE
-
\??\c:\pppdv.exec:\pppdv.exe38⤵
- Executes dropped EXE
-
\??\c:\rrlfllf.exec:\rrlfllf.exe39⤵
- Executes dropped EXE
-
\??\c:\thtbhn.exec:\thtbhn.exe40⤵
- Executes dropped EXE
-
\??\c:\bbntnn.exec:\bbntnn.exe41⤵
- Executes dropped EXE
-
\??\c:\dpdjj.exec:\dpdjj.exe42⤵
- Executes dropped EXE
-
\??\c:\pppvp.exec:\pppvp.exe43⤵
- Executes dropped EXE
-
\??\c:\3lfllxf.exec:\3lfllxf.exe44⤵
- Executes dropped EXE
-
\??\c:\tthhnt.exec:\tthhnt.exe45⤵
- Executes dropped EXE
-
\??\c:\3jvdd.exec:\3jvdd.exe46⤵
- Executes dropped EXE
-
\??\c:\9pjvd.exec:\9pjvd.exe47⤵
- Executes dropped EXE
-
\??\c:\xlxlrfl.exec:\xlxlrfl.exe48⤵
- Executes dropped EXE
-
\??\c:\nhtnbb.exec:\nhtnbb.exe49⤵
- Executes dropped EXE
-
\??\c:\nhbbnt.exec:\nhbbnt.exe50⤵
- Executes dropped EXE
-
\??\c:\vpdjp.exec:\vpdjp.exe51⤵
- Executes dropped EXE
-
\??\c:\xrxxfxl.exec:\xrxxfxl.exe52⤵
- Executes dropped EXE
-
\??\c:\lfxfflr.exec:\lfxfflr.exe53⤵
- Executes dropped EXE
-
\??\c:\7bhhnb.exec:\7bhhnb.exe54⤵
- Executes dropped EXE
-
\??\c:\bbttbt.exec:\bbttbt.exe55⤵
- Executes dropped EXE
-
\??\c:\dvjjp.exec:\dvjjp.exe56⤵
- Executes dropped EXE
-
\??\c:\ddpdv.exec:\ddpdv.exe57⤵
- Executes dropped EXE
-
\??\c:\lfrxflx.exec:\lfrxflx.exe58⤵
- Executes dropped EXE
-
\??\c:\nhntbb.exec:\nhntbb.exe59⤵
- Executes dropped EXE
-
\??\c:\9bbntt.exec:\9bbntt.exe60⤵
- Executes dropped EXE
-
\??\c:\pdpvv.exec:\pdpvv.exe61⤵
- Executes dropped EXE
-
\??\c:\llxflrl.exec:\llxflrl.exe62⤵
- Executes dropped EXE
-
\??\c:\lllxrff.exec:\lllxrff.exe63⤵
- Executes dropped EXE
-
\??\c:\nnbhnt.exec:\nnbhnt.exe64⤵
- Executes dropped EXE
-
\??\c:\tthntt.exec:\tthntt.exe65⤵
- Executes dropped EXE
-
\??\c:\jdpvd.exec:\jdpvd.exe66⤵
-
\??\c:\dvjdj.exec:\dvjdj.exe67⤵
-
\??\c:\9flllrx.exec:\9flllrx.exe68⤵
-
\??\c:\9rlrxlx.exec:\9rlrxlx.exe69⤵
-
\??\c:\hhtbnt.exec:\hhtbnt.exe70⤵
-
\??\c:\tththh.exec:\tththh.exe71⤵
-
\??\c:\pjvvj.exec:\pjvvj.exe72⤵
-
\??\c:\rlxfllx.exec:\rlxfllx.exe73⤵
-
\??\c:\rlfrflf.exec:\rlfrflf.exe74⤵
-
\??\c:\7hbhbh.exec:\7hbhbh.exe75⤵
-
\??\c:\hbnnhb.exec:\hbnnhb.exe76⤵
-
\??\c:\7pjvj.exec:\7pjvj.exe77⤵
-
\??\c:\5djdd.exec:\5djdd.exe78⤵
-
\??\c:\llflxfl.exec:\llflxfl.exe79⤵
-
\??\c:\hbnntt.exec:\hbnntt.exe80⤵
-
\??\c:\bthhnn.exec:\bthhnn.exe81⤵
-
\??\c:\jjjpv.exec:\jjjpv.exe82⤵
-
\??\c:\dvpdp.exec:\dvpdp.exe83⤵
-
\??\c:\9llrflx.exec:\9llrflx.exe84⤵
-
\??\c:\xxlrfrf.exec:\xxlrfrf.exe85⤵
-
\??\c:\1bnnnt.exec:\1bnnnt.exe86⤵
-
\??\c:\vvvdp.exec:\vvvdp.exe87⤵
-
\??\c:\vppvj.exec:\vppvj.exe88⤵
-
\??\c:\rrfxlrf.exec:\rrfxlrf.exe89⤵
-
\??\c:\7lflrxf.exec:\7lflrxf.exe90⤵
-
\??\c:\tnhthn.exec:\tnhthn.exe91⤵
-
\??\c:\jjdjv.exec:\jjdjv.exe92⤵
-
\??\c:\jdvdd.exec:\jdvdd.exe93⤵
-
\??\c:\rlffrlx.exec:\rlffrlx.exe94⤵
-
\??\c:\lfrrxxl.exec:\lfrrxxl.exe95⤵
-
\??\c:\nnhhhh.exec:\nnhhhh.exe96⤵
-
\??\c:\jjjvj.exec:\jjjvj.exe97⤵
-
\??\c:\pjddj.exec:\pjddj.exe98⤵
-
\??\c:\1lrxxlr.exec:\1lrxxlr.exe99⤵
-
\??\c:\xrfxflr.exec:\xrfxflr.exe100⤵
-
\??\c:\5tnnbb.exec:\5tnnbb.exe101⤵
-
\??\c:\vpddp.exec:\vpddp.exe102⤵
-
\??\c:\jddpd.exec:\jddpd.exe103⤵
-
\??\c:\3rllrxf.exec:\3rllrxf.exe104⤵
-
\??\c:\rlflrlr.exec:\rlflrlr.exe105⤵
-
\??\c:\tnbhtt.exec:\tnbhtt.exe106⤵
-
\??\c:\hbtbnn.exec:\hbtbnn.exe107⤵
-
\??\c:\7vpvj.exec:\7vpvj.exe108⤵
-
\??\c:\vjjvj.exec:\vjjvj.exe109⤵
-
\??\c:\ffrxffl.exec:\ffrxffl.exe110⤵
-
\??\c:\rrllxxl.exec:\rrllxxl.exe111⤵
-
\??\c:\tthntt.exec:\tthntt.exe112⤵
-
\??\c:\bnbhnn.exec:\bnbhnn.exe113⤵
-
\??\c:\jdpdj.exec:\jdpdj.exe114⤵
-
\??\c:\9pddj.exec:\9pddj.exe115⤵
-
\??\c:\7rlxflr.exec:\7rlxflr.exe116⤵
-
\??\c:\tnhnnn.exec:\tnhnnn.exe117⤵
-
\??\c:\tnhtbh.exec:\tnhtbh.exe118⤵
-
\??\c:\5jvdp.exec:\5jvdp.exe119⤵
-
\??\c:\ddvjp.exec:\ddvjp.exe120⤵
-
\??\c:\xrlxfrx.exec:\xrlxfrx.exe121⤵
-
\??\c:\lfxxlrf.exec:\lfxxlrf.exe122⤵
-
\??\c:\hthhtt.exec:\hthhtt.exe123⤵
-
\??\c:\ppdjv.exec:\ppdjv.exe124⤵
-
\??\c:\vvpdp.exec:\vvpdp.exe125⤵
-
\??\c:\lffxxxf.exec:\lffxxxf.exe126⤵
-
\??\c:\xrfrxfr.exec:\xrfrxfr.exe127⤵
-
\??\c:\hbhhnn.exec:\hbhhnn.exe128⤵
-
\??\c:\bbnnbb.exec:\bbnnbb.exe129⤵
-
\??\c:\dvvpp.exec:\dvvpp.exe130⤵
-
\??\c:\fxrxllx.exec:\fxrxllx.exe131⤵
-
\??\c:\lfrxflx.exec:\lfrxflx.exe132⤵
-
\??\c:\nnhntb.exec:\nnhntb.exe133⤵
-
\??\c:\pppdp.exec:\pppdp.exe134⤵
-
\??\c:\9djjj.exec:\9djjj.exe135⤵
-
\??\c:\rfrrllx.exec:\rfrrllx.exe136⤵
-
\??\c:\lfrfrxl.exec:\lfrfrxl.exe137⤵
-
\??\c:\hhbbht.exec:\hhbbht.exe138⤵
-
\??\c:\tthbnt.exec:\tthbnt.exe139⤵
-
\??\c:\5dvjp.exec:\5dvjp.exe140⤵
-
\??\c:\1jdjv.exec:\1jdjv.exe141⤵
-
\??\c:\llffllx.exec:\llffllx.exe142⤵
-
\??\c:\9frflrx.exec:\9frflrx.exe143⤵
-
\??\c:\7hbbnt.exec:\7hbbnt.exe144⤵
-
\??\c:\5djpd.exec:\5djpd.exe145⤵
-
\??\c:\vvpvd.exec:\vvpvd.exe146⤵
-
\??\c:\lfxxlfr.exec:\lfxxlfr.exe147⤵
-
\??\c:\lfrxxfl.exec:\lfrxxfl.exe148⤵
-
\??\c:\nnhhtb.exec:\nnhhtb.exe149⤵
-
\??\c:\hbtbhh.exec:\hbtbhh.exe150⤵
-
\??\c:\7ddpd.exec:\7ddpd.exe151⤵
-
\??\c:\7ppvv.exec:\7ppvv.exe152⤵
-
\??\c:\xfrfrxx.exec:\xfrfrxx.exe153⤵
-
\??\c:\1rlllrx.exec:\1rlllrx.exe154⤵
-
\??\c:\hbnbhh.exec:\hbnbhh.exe155⤵
-
\??\c:\vvvdp.exec:\vvvdp.exe156⤵
-
\??\c:\ppjjv.exec:\ppjjv.exe157⤵
-
\??\c:\rlflxlr.exec:\rlflxlr.exe158⤵
-
\??\c:\hhbthn.exec:\hhbthn.exe159⤵
-
\??\c:\bbtbnn.exec:\bbtbnn.exe160⤵
-
\??\c:\7djvj.exec:\7djvj.exe161⤵
-
\??\c:\5vjpv.exec:\5vjpv.exe162⤵
-
\??\c:\flrrxxf.exec:\flrrxxf.exe163⤵
-
\??\c:\rlxlxfl.exec:\rlxlxfl.exe164⤵
-
\??\c:\nhthbh.exec:\nhthbh.exe165⤵
-
\??\c:\vpddd.exec:\vpddd.exe166⤵
-
\??\c:\jdvvv.exec:\jdvvv.exe167⤵
-
\??\c:\rfxrxxf.exec:\rfxrxxf.exe168⤵
-
\??\c:\5lfrxfl.exec:\5lfrxfl.exe169⤵
-
\??\c:\tnhnnt.exec:\tnhnnt.exe170⤵
-
\??\c:\7vjpp.exec:\7vjpp.exe171⤵
-
\??\c:\dpddd.exec:\dpddd.exe172⤵
-
\??\c:\rlxfffl.exec:\rlxfffl.exe173⤵
-
\??\c:\fxffllr.exec:\fxffllr.exe174⤵
-
\??\c:\nnnbtb.exec:\nnnbtb.exe175⤵
-
\??\c:\nnnthh.exec:\nnnthh.exe176⤵
-
\??\c:\vvppj.exec:\vvppj.exe177⤵
-
\??\c:\dvpjv.exec:\dvpjv.exe178⤵
-
\??\c:\xrlrxlx.exec:\xrlrxlx.exe179⤵
-
\??\c:\hbbtbh.exec:\hbbtbh.exe180⤵
-
\??\c:\hbthnt.exec:\hbthnt.exe181⤵
-
\??\c:\vvpvj.exec:\vvpvj.exe182⤵
-
\??\c:\9pddj.exec:\9pddj.exe183⤵
-
\??\c:\rrrfrxr.exec:\rrrfrxr.exe184⤵
-
\??\c:\7hntbh.exec:\7hntbh.exe185⤵
-
\??\c:\7hbnnt.exec:\7hbnnt.exe186⤵
-
\??\c:\vpjpd.exec:\vpjpd.exe187⤵
-
\??\c:\7jjvd.exec:\7jjvd.exe188⤵
-
\??\c:\ffxfrxf.exec:\ffxfrxf.exe189⤵
-
\??\c:\5lxflrx.exec:\5lxflrx.exe190⤵
-
\??\c:\hhtnbt.exec:\hhtnbt.exe191⤵
-
\??\c:\jjvdj.exec:\jjvdj.exe192⤵
-
\??\c:\pvddp.exec:\pvddp.exe193⤵
-
\??\c:\rrfxlxx.exec:\rrfxlxx.exe194⤵
-
\??\c:\rlrxrrx.exec:\rlrxrrx.exe195⤵
-
\??\c:\5tnbhn.exec:\5tnbhn.exe196⤵
-
\??\c:\vppdj.exec:\vppdj.exe197⤵
-
\??\c:\7pjjp.exec:\7pjjp.exe198⤵
-
\??\c:\rrrrflx.exec:\rrrrflx.exe199⤵
-
\??\c:\lfxfxfr.exec:\lfxfxfr.exe200⤵
-
\??\c:\9htbbb.exec:\9htbbb.exe201⤵
-
\??\c:\hnbtbb.exec:\hnbtbb.exe202⤵
-
\??\c:\1dvvv.exec:\1dvvv.exe203⤵
-
\??\c:\vjppp.exec:\vjppp.exe204⤵
-
\??\c:\lfxxlrf.exec:\lfxxlrf.exe205⤵
-
\??\c:\9rlrfrx.exec:\9rlrfrx.exe206⤵
-
\??\c:\nhbhtb.exec:\nhbhtb.exe207⤵
-
\??\c:\hbbhtt.exec:\hbbhtt.exe208⤵
-
\??\c:\ppdpv.exec:\ppdpv.exe209⤵
-
\??\c:\xrxrffl.exec:\xrxrffl.exe210⤵
-
\??\c:\9xrxffr.exec:\9xrxffr.exe211⤵
-
\??\c:\nhbtbb.exec:\nhbtbb.exe212⤵
-
\??\c:\btbthn.exec:\btbthn.exe213⤵
-
\??\c:\dvjpd.exec:\dvjpd.exe214⤵
-
\??\c:\3vvjp.exec:\3vvjp.exe215⤵
-
\??\c:\5lflrxf.exec:\5lflrxf.exe216⤵
-
\??\c:\1flrfrl.exec:\1flrfrl.exe217⤵
-
\??\c:\nnhthb.exec:\nnhthb.exe218⤵
-
\??\c:\9jddj.exec:\9jddj.exe219⤵
-
\??\c:\dvjpd.exec:\dvjpd.exe220⤵
-
\??\c:\xflxfxx.exec:\xflxfxx.exe221⤵
-
\??\c:\rxxfrxx.exec:\rxxfrxx.exe222⤵
-
\??\c:\hbbhnn.exec:\hbbhnn.exe223⤵
-
\??\c:\jjpvj.exec:\jjpvj.exe224⤵
-
\??\c:\vvpvd.exec:\vvpvd.exe225⤵
-
\??\c:\lfxflrx.exec:\lfxflrx.exe226⤵
-
\??\c:\lffrffl.exec:\lffrffl.exe227⤵
-
\??\c:\bhbhnh.exec:\bhbhnh.exe228⤵
-
\??\c:\btntbh.exec:\btntbh.exe229⤵
-
\??\c:\pjpvv.exec:\pjpvv.exe230⤵
-
\??\c:\dpdjp.exec:\dpdjp.exe231⤵
-
\??\c:\rfllllr.exec:\rfllllr.exe232⤵
-
\??\c:\xfrllfx.exec:\xfrllfx.exe233⤵
-
\??\c:\nhnntt.exec:\nhnntt.exe234⤵
-
\??\c:\7dvvd.exec:\7dvvd.exe235⤵
-
\??\c:\pdddj.exec:\pdddj.exe236⤵
-
\??\c:\llffllr.exec:\llffllr.exe237⤵
-
\??\c:\rxxlrfr.exec:\rxxlrfr.exe238⤵
-
\??\c:\3hbbtt.exec:\3hbbtt.exe239⤵
-
\??\c:\hhthnb.exec:\hhthnb.exe240⤵
-
\??\c:\jdvdj.exec:\jdvdj.exe241⤵