Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe
-
Size
68KB
-
MD5
6bdf114b920f46288106f8df51f5e8a0
-
SHA1
456a0a2218b3f6cd9a9932295b05cb57101d734e
-
SHA256
2d131d70af5d7c87b65325a8c71a92320cdeecd9c06d004a7ebfb35c59a3b216
-
SHA512
bb41cc1776b0564a6afc5a8ae765c0d785031a7c9bfc58672c4e8c52c8615f437f9b2177dbf7c605fe206325cfbc8dab8d8088853871f698179ecded18f4e13b
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIfv7+afCD+QsQbO:ymb3NkkiQ3mdBjFIfvTfCD+H/
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral1/memory/868-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2208-15-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2084-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1656-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/312-293-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2396-275-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1236-266-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1000-257-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/844-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1508-231-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-194-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/872-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2256-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2804-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1424-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/780-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2852-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-96-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2976-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2544-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1676-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
1nhbnn.exevjppp.exexrllxxl.exexrlfllr.exebbtnbb.exe7httbb.exeppvvj.exefxlxflr.exerlfxllr.exe5nthhh.exebtbtbh.exepjjjp.exevpddj.exefrffffl.exe9rrfrrx.exebththh.exenhtttn.exevjdvj.exejdddj.exepdpvd.exelxxfrrx.exenbtbbb.exetnbtbn.exevpvdp.exe5jddp.exe9xxxlrf.exe3htbth.exenhthtn.exeddppv.exepdjdj.exelfxflrx.exethhhbt.exejvppd.exejdjjj.exevpvjp.exe1rllrxl.exexxlrfrx.exelfxflrx.exe7bhnbh.exethbttn.exebhhnbn.exe7tnhnn.exe3jvvd.exe1pdvj.exelxxrlrx.exelrlffxx.exellllxll.exe5hntnn.exebttttn.exe3vddd.exe7xrlrrx.exelxxlxxx.exepdppv.exerfxlxfx.exe7tnnnt.exe5jppd.exetnhttt.exejvjvj.exelffxfxf.exebbhnbh.exelrfrxfl.exexlfllll.exettnbnt.exepjdpd.exepid process 2208 1nhbnn.exe 2580 vjppp.exe 2700 xrllxxl.exe 2476 xrlfllr.exe 2772 bbtnbb.exe 1676 7httbb.exe 2544 ppvvj.exe 2976 fxlxflr.exe 2852 rlfxllr.exe 2084 5nthhh.exe 780 btbtbh.exe 1424 pjjjp.exe 2788 vpddj.exe 1656 frffffl.exe 2804 9rrfrrx.exe 2256 bththh.exe 872 nhtttn.exe 1800 vjdvj.exe 2908 jdddj.exe 2024 pdpvd.exe 540 lxxfrrx.exe 760 nbtbbb.exe 1508 tnbtbn.exe 844 vpvdp.exe 2280 5jddp.exe 1000 9xxxlrf.exe 1236 3htbth.exe 2396 nhthtn.exe 2948 ddppv.exe 312 pdjdj.exe 2736 lfxflrx.exe 2332 thhhbt.exe 776 jvppd.exe 2620 jdjjj.exe 2676 vpvjp.exe 2440 1rllrxl.exe 2028 xxlrfrx.exe 2476 lfxflrx.exe 2688 7bhnbh.exe 2624 thbttn.exe 2968 bhhnbn.exe 1652 7tnhnn.exe 2500 3jvvd.exe 2568 1pdvj.exe 2744 lxxrlrx.exe 1608 lrlffxx.exe 2748 llllxll.exe 1972 5hntnn.exe 2788 bttttn.exe 1656 3vddd.exe 1564 7xrlrrx.exe 1472 lxxlxxx.exe 1760 pdppv.exe 2900 rfxlxfx.exe 3048 7tnnnt.exe 2904 5jppd.exe 2780 tnhttt.exe 576 jvjvj.exe 1140 lffxfxf.exe 760 bbhnbh.exe 2784 lrfrxfl.exe 1668 xlfllll.exe 888 ttnbnt.exe 2288 pjdpd.exe -
Processes:
resource yara_rule behavioral1/memory/868-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/868-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2208-15-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2476-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1656-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/312-293-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2396-275-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1236-266-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1000-257-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/844-240-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1508-231-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-194-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/872-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1424-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/780-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2852-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1676-65-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe1nhbnn.exevjppp.exexrllxxl.exexrlfllr.exebbtnbb.exe7httbb.exeppvvj.exefxlxflr.exerlfxllr.exe5nthhh.exebtbtbh.exepjjjp.exevpddj.exefrffffl.exe9rrfrrx.exedescription pid process target process PID 868 wrote to memory of 2208 868 6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe 1nhbnn.exe PID 868 wrote to memory of 2208 868 6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe 1nhbnn.exe PID 868 wrote to memory of 2208 868 6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe 1nhbnn.exe PID 868 wrote to memory of 2208 868 6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe 1nhbnn.exe PID 2208 wrote to memory of 2580 2208 1nhbnn.exe vjppp.exe PID 2208 wrote to memory of 2580 2208 1nhbnn.exe vjppp.exe PID 2208 wrote to memory of 2580 2208 1nhbnn.exe vjppp.exe PID 2208 wrote to memory of 2580 2208 1nhbnn.exe vjppp.exe PID 2580 wrote to memory of 2700 2580 vjppp.exe xrllxxl.exe PID 2580 wrote to memory of 2700 2580 vjppp.exe xrllxxl.exe PID 2580 wrote to memory of 2700 2580 vjppp.exe xrllxxl.exe PID 2580 wrote to memory of 2700 2580 vjppp.exe xrllxxl.exe PID 2700 wrote to memory of 2476 2700 xrllxxl.exe xrlfllr.exe PID 2700 wrote to memory of 2476 2700 xrllxxl.exe xrlfllr.exe PID 2700 wrote to memory of 2476 2700 xrllxxl.exe xrlfllr.exe PID 2700 wrote to memory of 2476 2700 xrllxxl.exe xrlfllr.exe PID 2476 wrote to memory of 2772 2476 xrlfllr.exe bbtnbb.exe PID 2476 wrote to memory of 2772 2476 xrlfllr.exe bbtnbb.exe PID 2476 wrote to memory of 2772 2476 xrlfllr.exe bbtnbb.exe PID 2476 wrote to memory of 2772 2476 xrlfllr.exe bbtnbb.exe PID 2772 wrote to memory of 1676 2772 bbtnbb.exe 7httbb.exe PID 2772 wrote to memory of 1676 2772 bbtnbb.exe 7httbb.exe PID 2772 wrote to memory of 1676 2772 bbtnbb.exe 7httbb.exe PID 2772 wrote to memory of 1676 2772 bbtnbb.exe 7httbb.exe PID 1676 wrote to memory of 2544 1676 7httbb.exe ppvvj.exe PID 1676 wrote to memory of 2544 1676 7httbb.exe ppvvj.exe PID 1676 wrote to memory of 2544 1676 7httbb.exe ppvvj.exe PID 1676 wrote to memory of 2544 1676 7httbb.exe ppvvj.exe PID 2544 wrote to memory of 2976 2544 ppvvj.exe fxlxflr.exe PID 2544 wrote to memory of 2976 2544 ppvvj.exe fxlxflr.exe PID 2544 wrote to memory of 2976 2544 ppvvj.exe fxlxflr.exe PID 2544 wrote to memory of 2976 2544 ppvvj.exe fxlxflr.exe PID 2976 wrote to memory of 2852 2976 fxlxflr.exe rlfxllr.exe PID 2976 wrote to memory of 2852 2976 fxlxflr.exe rlfxllr.exe PID 2976 wrote to memory of 2852 2976 fxlxflr.exe rlfxllr.exe PID 2976 wrote to memory of 2852 2976 fxlxflr.exe rlfxllr.exe PID 2852 wrote to memory of 2084 2852 rlfxllr.exe 5nthhh.exe PID 2852 wrote to memory of 2084 2852 rlfxllr.exe 5nthhh.exe PID 2852 wrote to memory of 2084 2852 rlfxllr.exe 5nthhh.exe PID 2852 wrote to memory of 2084 2852 rlfxllr.exe 5nthhh.exe PID 2084 wrote to memory of 780 2084 5nthhh.exe btbtbh.exe PID 2084 wrote to memory of 780 2084 5nthhh.exe btbtbh.exe PID 2084 wrote to memory of 780 2084 5nthhh.exe btbtbh.exe PID 2084 wrote to memory of 780 2084 5nthhh.exe btbtbh.exe PID 780 wrote to memory of 1424 780 btbtbh.exe pjjjp.exe PID 780 wrote to memory of 1424 780 btbtbh.exe pjjjp.exe PID 780 wrote to memory of 1424 780 btbtbh.exe pjjjp.exe PID 780 wrote to memory of 1424 780 btbtbh.exe pjjjp.exe PID 1424 wrote to memory of 2788 1424 pjjjp.exe vpddj.exe PID 1424 wrote to memory of 2788 1424 pjjjp.exe vpddj.exe PID 1424 wrote to memory of 2788 1424 pjjjp.exe vpddj.exe PID 1424 wrote to memory of 2788 1424 pjjjp.exe vpddj.exe PID 2788 wrote to memory of 1656 2788 vpddj.exe 3vddd.exe PID 2788 wrote to memory of 1656 2788 vpddj.exe 3vddd.exe PID 2788 wrote to memory of 1656 2788 vpddj.exe 3vddd.exe PID 2788 wrote to memory of 1656 2788 vpddj.exe 3vddd.exe PID 1656 wrote to memory of 2804 1656 frffffl.exe 9rrfrrx.exe PID 1656 wrote to memory of 2804 1656 frffffl.exe 9rrfrrx.exe PID 1656 wrote to memory of 2804 1656 frffffl.exe 9rrfrrx.exe PID 1656 wrote to memory of 2804 1656 frffffl.exe 9rrfrrx.exe PID 2804 wrote to memory of 2256 2804 9rrfrrx.exe bththh.exe PID 2804 wrote to memory of 2256 2804 9rrfrrx.exe bththh.exe PID 2804 wrote to memory of 2256 2804 9rrfrrx.exe bththh.exe PID 2804 wrote to memory of 2256 2804 9rrfrrx.exe bththh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\1nhbnn.exec:\1nhbnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjppp.exec:\vjppp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrllxxl.exec:\xrllxxl.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrlfllr.exec:\xrlfllr.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbtnbb.exec:\bbtnbb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7httbb.exec:\7httbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ppvvj.exec:\ppvvj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxlxflr.exec:\fxlxflr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlfxllr.exec:\rlfxllr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5nthhh.exec:\5nthhh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btbtbh.exec:\btbtbh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pjjjp.exec:\pjjjp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpddj.exec:\vpddj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frffffl.exec:\frffffl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9rrfrrx.exec:\9rrfrrx.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bththh.exec:\bththh.exe17⤵
- Executes dropped EXE
-
\??\c:\nhtttn.exec:\nhtttn.exe18⤵
- Executes dropped EXE
-
\??\c:\vjdvj.exec:\vjdvj.exe19⤵
- Executes dropped EXE
-
\??\c:\jdddj.exec:\jdddj.exe20⤵
- Executes dropped EXE
-
\??\c:\pdpvd.exec:\pdpvd.exe21⤵
- Executes dropped EXE
-
\??\c:\lxxfrrx.exec:\lxxfrrx.exe22⤵
- Executes dropped EXE
-
\??\c:\nbtbbb.exec:\nbtbbb.exe23⤵
- Executes dropped EXE
-
\??\c:\tnbtbn.exec:\tnbtbn.exe24⤵
- Executes dropped EXE
-
\??\c:\vpvdp.exec:\vpvdp.exe25⤵
- Executes dropped EXE
-
\??\c:\5jddp.exec:\5jddp.exe26⤵
- Executes dropped EXE
-
\??\c:\9xxxlrf.exec:\9xxxlrf.exe27⤵
- Executes dropped EXE
-
\??\c:\3htbth.exec:\3htbth.exe28⤵
- Executes dropped EXE
-
\??\c:\nhthtn.exec:\nhthtn.exe29⤵
- Executes dropped EXE
-
\??\c:\ddppv.exec:\ddppv.exe30⤵
- Executes dropped EXE
-
\??\c:\pdjdj.exec:\pdjdj.exe31⤵
- Executes dropped EXE
-
\??\c:\lfxflrx.exec:\lfxflrx.exe32⤵
- Executes dropped EXE
-
\??\c:\thhhbt.exec:\thhhbt.exe33⤵
- Executes dropped EXE
-
\??\c:\jvppd.exec:\jvppd.exe34⤵
- Executes dropped EXE
-
\??\c:\jdjjj.exec:\jdjjj.exe35⤵
- Executes dropped EXE
-
\??\c:\vpvjp.exec:\vpvjp.exe36⤵
- Executes dropped EXE
-
\??\c:\1rllrxl.exec:\1rllrxl.exe37⤵
- Executes dropped EXE
-
\??\c:\xxlrfrx.exec:\xxlrfrx.exe38⤵
- Executes dropped EXE
-
\??\c:\lfxflrx.exec:\lfxflrx.exe39⤵
- Executes dropped EXE
-
\??\c:\7bhnbh.exec:\7bhnbh.exe40⤵
- Executes dropped EXE
-
\??\c:\thbttn.exec:\thbttn.exe41⤵
- Executes dropped EXE
-
\??\c:\bhhnbn.exec:\bhhnbn.exe42⤵
- Executes dropped EXE
-
\??\c:\7tnhnn.exec:\7tnhnn.exe43⤵
- Executes dropped EXE
-
\??\c:\3jvvd.exec:\3jvvd.exe44⤵
- Executes dropped EXE
-
\??\c:\1pdvj.exec:\1pdvj.exe45⤵
- Executes dropped EXE
-
\??\c:\lxxrlrx.exec:\lxxrlrx.exe46⤵
- Executes dropped EXE
-
\??\c:\lrlffxx.exec:\lrlffxx.exe47⤵
- Executes dropped EXE
-
\??\c:\llllxll.exec:\llllxll.exe48⤵
- Executes dropped EXE
-
\??\c:\5hntnn.exec:\5hntnn.exe49⤵
- Executes dropped EXE
-
\??\c:\bttttn.exec:\bttttn.exe50⤵
- Executes dropped EXE
-
\??\c:\3vddd.exec:\3vddd.exe51⤵
- Executes dropped EXE
-
\??\c:\7xrlrrx.exec:\7xrlrrx.exe52⤵
- Executes dropped EXE
-
\??\c:\lxxlxxx.exec:\lxxlxxx.exe53⤵
- Executes dropped EXE
-
\??\c:\pdppv.exec:\pdppv.exe54⤵
- Executes dropped EXE
-
\??\c:\rfxlxfx.exec:\rfxlxfx.exe55⤵
- Executes dropped EXE
-
\??\c:\7tnnnt.exec:\7tnnnt.exe56⤵
- Executes dropped EXE
-
\??\c:\5jppd.exec:\5jppd.exe57⤵
- Executes dropped EXE
-
\??\c:\tnhttt.exec:\tnhttt.exe58⤵
- Executes dropped EXE
-
\??\c:\jvjvj.exec:\jvjvj.exe59⤵
- Executes dropped EXE
-
\??\c:\lffxfxf.exec:\lffxfxf.exe60⤵
- Executes dropped EXE
-
\??\c:\bbhnbh.exec:\bbhnbh.exe61⤵
- Executes dropped EXE
-
\??\c:\lrfrxfl.exec:\lrfrxfl.exe62⤵
- Executes dropped EXE
-
\??\c:\xlfllll.exec:\xlfllll.exe63⤵
- Executes dropped EXE
-
\??\c:\ttnbnt.exec:\ttnbnt.exe64⤵
- Executes dropped EXE
-
\??\c:\pjdpd.exec:\pjdpd.exe65⤵
- Executes dropped EXE
-
\??\c:\3dpvv.exec:\3dpvv.exe66⤵
-
\??\c:\frxfrxl.exec:\frxfrxl.exe67⤵
-
\??\c:\tnhnhb.exec:\tnhnhb.exe68⤵
-
\??\c:\5btbhn.exec:\5btbhn.exe69⤵
-
\??\c:\vpvjd.exec:\vpvjd.exe70⤵
-
\??\c:\fxlrffr.exec:\fxlrffr.exe71⤵
-
\??\c:\xrlrxxl.exec:\xrlrxxl.exe72⤵
-
\??\c:\7ntbhn.exec:\7ntbhn.exe73⤵
-
\??\c:\bbnthh.exec:\bbnthh.exe74⤵
-
\??\c:\dvppd.exec:\dvppd.exe75⤵
-
\??\c:\9pvpv.exec:\9pvpv.exe76⤵
-
\??\c:\lfrllff.exec:\lfrllff.exe77⤵
-
\??\c:\1frlrll.exec:\1frlrll.exe78⤵
-
\??\c:\btnntn.exec:\btnntn.exe79⤵
-
\??\c:\5btttt.exec:\5btttt.exe80⤵
-
\??\c:\pjpvj.exec:\pjpvj.exe81⤵
-
\??\c:\ppdjp.exec:\ppdjp.exe82⤵
-
\??\c:\rlllrrx.exec:\rlllrrx.exe83⤵
-
\??\c:\1xllrrf.exec:\1xllrrf.exe84⤵
-
\??\c:\7hbhnn.exec:\7hbhnn.exe85⤵
-
\??\c:\bnbtbt.exec:\bnbtbt.exe86⤵
-
\??\c:\5vddd.exec:\5vddd.exe87⤵
-
\??\c:\fxlxffl.exec:\fxlxffl.exe88⤵
-
\??\c:\rflllrx.exec:\rflllrx.exe89⤵
-
\??\c:\1hbnnn.exec:\1hbnnn.exe90⤵
-
\??\c:\7bnttb.exec:\7bnttb.exe91⤵
-
\??\c:\tnhnnt.exec:\tnhnnt.exe92⤵
-
\??\c:\dvvvv.exec:\dvvvv.exe93⤵
-
\??\c:\5ffflrx.exec:\5ffflrx.exe94⤵
-
\??\c:\lrllrlr.exec:\lrllrlr.exe95⤵
-
\??\c:\1bnnnn.exec:\1bnnnn.exe96⤵
-
\??\c:\bthttt.exec:\bthttt.exe97⤵
-
\??\c:\jvdvv.exec:\jvdvv.exe98⤵
-
\??\c:\jvddd.exec:\jvddd.exe99⤵
-
\??\c:\rlrlrrx.exec:\rlrlrrx.exe100⤵
-
\??\c:\fxxllrx.exec:\fxxllrx.exe101⤵
-
\??\c:\htbttt.exec:\htbttt.exe102⤵
-
\??\c:\jdjjj.exec:\jdjjj.exe103⤵
-
\??\c:\pjppp.exec:\pjppp.exe104⤵
-
\??\c:\5frrrrf.exec:\5frrrrf.exe105⤵
-
\??\c:\rlxfllr.exec:\rlxfllr.exe106⤵
-
\??\c:\hbnnhh.exec:\hbnnhh.exe107⤵
-
\??\c:\btnntt.exec:\btnntt.exe108⤵
-
\??\c:\dvddj.exec:\dvddj.exe109⤵
-
\??\c:\pjvdd.exec:\pjvdd.exe110⤵
-
\??\c:\rlrxlrx.exec:\rlrxlrx.exe111⤵
-
\??\c:\9lxxffr.exec:\9lxxffr.exe112⤵
-
\??\c:\hhthtb.exec:\hhthtb.exe113⤵
-
\??\c:\3tbbbt.exec:\3tbbbt.exe114⤵
-
\??\c:\vvvvj.exec:\vvvvj.exe115⤵
-
\??\c:\lrllxxl.exec:\lrllxxl.exe116⤵
-
\??\c:\fxflrxf.exec:\fxflrxf.exe117⤵
-
\??\c:\hntthh.exec:\hntthh.exe118⤵
-
\??\c:\nhtttb.exec:\nhtttb.exe119⤵
-
\??\c:\pjpvv.exec:\pjpvv.exe120⤵
-
\??\c:\1dpvd.exec:\1dpvd.exe121⤵
-
\??\c:\tnhntt.exec:\tnhntt.exe122⤵
-
\??\c:\hbhhht.exec:\hbhhht.exe123⤵
-
\??\c:\jdjjp.exec:\jdjjp.exe124⤵
-
\??\c:\llrrffl.exec:\llrrffl.exe125⤵
-
\??\c:\xrfrflr.exec:\xrfrflr.exe126⤵
-
\??\c:\btntbb.exec:\btntbb.exe127⤵
-
\??\c:\7nhnnh.exec:\7nhnnh.exe128⤵
-
\??\c:\5dvdd.exec:\5dvdd.exe129⤵
-
\??\c:\vpjpv.exec:\vpjpv.exe130⤵
-
\??\c:\xrrfrlf.exec:\xrrfrlf.exe131⤵
-
\??\c:\9xfxlxl.exec:\9xfxlxl.exe132⤵
-
\??\c:\3bnbhh.exec:\3bnbhh.exe133⤵
-
\??\c:\nnhhnt.exec:\nnhhnt.exe134⤵
-
\??\c:\tnhnhh.exec:\tnhnhh.exe135⤵
-
\??\c:\vvpjp.exec:\vvpjp.exe136⤵
-
\??\c:\pjpjv.exec:\pjpjv.exe137⤵
-
\??\c:\1fffffl.exec:\1fffffl.exe138⤵
-
\??\c:\lfllrrx.exec:\lfllrrx.exe139⤵
-
\??\c:\xrflrxf.exec:\xrflrxf.exe140⤵
-
\??\c:\btbhhn.exec:\btbhhn.exe141⤵
-
\??\c:\nnhhnt.exec:\nnhhnt.exe142⤵
-
\??\c:\pdvdp.exec:\pdvdp.exe143⤵
-
\??\c:\5jdvv.exec:\5jdvv.exe144⤵
-
\??\c:\rlxrflr.exec:\rlxrflr.exe145⤵
-
\??\c:\1lfflrl.exec:\1lfflrl.exe146⤵
-
\??\c:\nhnntt.exec:\nhnntt.exe147⤵
-
\??\c:\9nttbb.exec:\9nttbb.exe148⤵
-
\??\c:\hbhttb.exec:\hbhttb.exe149⤵
-
\??\c:\jdpvj.exec:\jdpvj.exe150⤵
-
\??\c:\1pddd.exec:\1pddd.exe151⤵
-
\??\c:\xxxflrl.exec:\xxxflrl.exe152⤵
-
\??\c:\fxlrxfl.exec:\fxlrxfl.exe153⤵
-
\??\c:\btbbnn.exec:\btbbnn.exe154⤵
-
\??\c:\7hnhnn.exec:\7hnhnn.exe155⤵
-
\??\c:\jdjdj.exec:\jdjdj.exe156⤵
-
\??\c:\pdpvj.exec:\pdpvj.exe157⤵
-
\??\c:\dppdv.exec:\dppdv.exe158⤵
-
\??\c:\flxxlxl.exec:\flxxlxl.exe159⤵
-
\??\c:\lfrrxfl.exec:\lfrrxfl.exe160⤵
-
\??\c:\5bhhbt.exec:\5bhhbt.exe161⤵
-
\??\c:\1hbhnn.exec:\1hbhnn.exe162⤵
-
\??\c:\jdpvj.exec:\jdpvj.exe163⤵
-
\??\c:\jdjpv.exec:\jdjpv.exe164⤵
-
\??\c:\lxrlfxf.exec:\lxrlfxf.exe165⤵
-
\??\c:\rrrxflf.exec:\rrrxflf.exe166⤵
-
\??\c:\5nnhnn.exec:\5nnhnn.exe167⤵
-
\??\c:\1btthn.exec:\1btthn.exe168⤵
-
\??\c:\hbtbht.exec:\hbtbht.exe169⤵
-
\??\c:\jpjpj.exec:\jpjpj.exe170⤵
-
\??\c:\dvpvj.exec:\dvpvj.exe171⤵
-
\??\c:\rlxxxfl.exec:\rlxxxfl.exe172⤵
-
\??\c:\fffflrf.exec:\fffflrf.exe173⤵
-
\??\c:\tnnhbh.exec:\tnnhbh.exe174⤵
-
\??\c:\btntbh.exec:\btntbh.exe175⤵
-
\??\c:\pjdpp.exec:\pjdpp.exe176⤵
-
\??\c:\7dvdj.exec:\7dvdj.exe177⤵
-
\??\c:\jdjdj.exec:\jdjdj.exe178⤵
-
\??\c:\lfflxfx.exec:\lfflxfx.exe179⤵
-
\??\c:\ffrrflr.exec:\ffrrflr.exe180⤵
-
\??\c:\hbnntn.exec:\hbnntn.exe181⤵
-
\??\c:\bbtbnb.exec:\bbtbnb.exe182⤵
-
\??\c:\3pjvj.exec:\3pjvj.exe183⤵
-
\??\c:\vppvd.exec:\vppvd.exe184⤵
-
\??\c:\xrffrrf.exec:\xrffrrf.exe185⤵
-
\??\c:\rflrrrx.exec:\rflrrrx.exe186⤵
-
\??\c:\nhthnb.exec:\nhthnb.exe187⤵
-
\??\c:\nhthnn.exec:\nhthnn.exe188⤵
-
\??\c:\jjvdj.exec:\jjvdj.exe189⤵
-
\??\c:\vdpjj.exec:\vdpjj.exe190⤵
-
\??\c:\5lffffl.exec:\5lffffl.exe191⤵
-
\??\c:\3frxlff.exec:\3frxlff.exe192⤵
-
\??\c:\bbnthh.exec:\bbnthh.exe193⤵
-
\??\c:\btbbhn.exec:\btbbhn.exe194⤵
-
\??\c:\5pdjj.exec:\5pdjj.exe195⤵
-
\??\c:\dvvvj.exec:\dvvvj.exe196⤵
-
\??\c:\fxlfrlx.exec:\fxlfrlx.exe197⤵
-
\??\c:\lxxxllx.exec:\lxxxllx.exe198⤵
-
\??\c:\tnbbhh.exec:\tnbbhh.exe199⤵
-
\??\c:\thhnnn.exec:\thhnnn.exe200⤵
-
\??\c:\jvjjj.exec:\jvjjj.exe201⤵
-
\??\c:\thtnnh.exec:\thtnnh.exe202⤵
-
\??\c:\hthntb.exec:\hthntb.exe203⤵
-
\??\c:\9pppd.exec:\9pppd.exe204⤵
-
\??\c:\5dppp.exec:\5dppp.exe205⤵
-
\??\c:\7xrrxrl.exec:\7xrrxrl.exe206⤵
-
\??\c:\fxrfrrf.exec:\fxrfrrf.exe207⤵
-
\??\c:\hbntbn.exec:\hbntbn.exe208⤵
-
\??\c:\3htbnb.exec:\3htbnb.exe209⤵
-
\??\c:\ddpvd.exec:\ddpvd.exe210⤵
-
\??\c:\7vjpv.exec:\7vjpv.exe211⤵
-
\??\c:\5lflrxf.exec:\5lflrxf.exe212⤵
-
\??\c:\lfxxxxf.exec:\lfxxxxf.exe213⤵
-
\??\c:\llffllx.exec:\llffllx.exe214⤵
-
\??\c:\9nntbh.exec:\9nntbh.exe215⤵
-
\??\c:\9tnthn.exec:\9tnthn.exe216⤵
-
\??\c:\dvjjp.exec:\dvjjp.exe217⤵
-
\??\c:\jpdpd.exec:\jpdpd.exe218⤵
-
\??\c:\9xflrrx.exec:\9xflrrx.exe219⤵
-
\??\c:\rrfllll.exec:\rrfllll.exe220⤵
-
\??\c:\tthtbh.exec:\tthtbh.exe221⤵
-
\??\c:\hbtbht.exec:\hbtbht.exe222⤵
-
\??\c:\pjpdd.exec:\pjpdd.exe223⤵
-
\??\c:\5vpjp.exec:\5vpjp.exe224⤵
-
\??\c:\rlxlrxf.exec:\rlxlrxf.exe225⤵
-
\??\c:\1xxxllr.exec:\1xxxllr.exe226⤵
-
\??\c:\xxllxrl.exec:\xxllxrl.exe227⤵
-
\??\c:\hbnntb.exec:\hbnntb.exe228⤵
-
\??\c:\bbbbhh.exec:\bbbbhh.exe229⤵
-
\??\c:\dpvvd.exec:\dpvvd.exe230⤵
-
\??\c:\jjpvv.exec:\jjpvv.exe231⤵
-
\??\c:\ffxxllr.exec:\ffxxllr.exe232⤵
-
\??\c:\7xxxlfl.exec:\7xxxlfl.exe233⤵
-
\??\c:\xrlrlrl.exec:\xrlrlrl.exe234⤵
-
\??\c:\1hntbh.exec:\1hntbh.exe235⤵
-
\??\c:\5bbthn.exec:\5bbthn.exe236⤵
-
\??\c:\pjvpv.exec:\pjvpv.exe237⤵
-
\??\c:\jdppd.exec:\jdppd.exe238⤵
-
\??\c:\xxrllrf.exec:\xxrllrf.exe239⤵
-
\??\c:\fxrrrrr.exec:\fxrrrrr.exe240⤵
-
\??\c:\fxxrlrx.exec:\fxxrlrx.exe241⤵