Analysis
-
max time kernel
150s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe
-
Size
68KB
-
MD5
6bdf114b920f46288106f8df51f5e8a0
-
SHA1
456a0a2218b3f6cd9a9932295b05cb57101d734e
-
SHA256
2d131d70af5d7c87b65325a8c71a92320cdeecd9c06d004a7ebfb35c59a3b216
-
SHA512
bb41cc1776b0564a6afc5a8ae765c0d785031a7c9bfc58672c4e8c52c8615f437f9b2177dbf7c605fe206325cfbc8dab8d8088853871f698179ecded18f4e13b
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIfv7+afCD+QsQbO:ymb3NkkiQ3mdBjFIfvTfCD+H/
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/1616-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2444-16-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1680-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/856-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/780-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1592-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2160-59-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5052-55-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/940-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/940-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3012-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4932-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4864-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4528-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2672-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1956-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1064-153-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4476-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1700-171-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4824-177-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4216-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/652-123-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2748-207-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3932-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3472-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2340-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
7frxlxl.exebnhhbn.exe1lrflll.exe4248822.exee06004.exe0840482.exebnnhtt.exevjpjv.exe860422.exejdvjv.exerfxlfxr.exe282266.exe2288804.exe266482.exethnhbt.exe6682828.exe66282.exepvdpj.exerffrxrr.exeo062666.exes8620.exexlxlfxr.exe6066622.exedvdpp.exe8660226.exe08486.exenbtnnh.exedppvv.exejvvjv.exe0804826.exe488826.exe82486.exe60286.exe84006.exe60426.exe486802.exek46044.exebbbttb.exerfxlxrf.exe42404.exe7bnhbt.exedpdvp.exedjvjd.exe80260.exefxxrrrx.exejvvjv.exejvddv.exeq66442.exexflffrx.exetnnhtn.exe7tnhbt.exerlxfxfr.exe06286.exe2048226.exe3pdpp.exe2064488.exedpvpj.exedjjvj.exeg6642.exe204860.exe02822.exe80082.exexflxlfx.exe6024084.exepid process 1680 7frxlxl.exe 2444 bnhhbn.exe 856 1lrflll.exe 780 4248822.exe 1592 e06004.exe 5052 0840482.exe 2160 bnnhtt.exe 940 vjpjv.exe 2340 860422.exe 3012 jdvjv.exe 3472 rfxlfxr.exe 4932 282266.exe 3932 2288804.exe 3384 266482.exe 4864 thnhbt.exe 4804 6682828.exe 652 66282.exe 2672 pvdpj.exe 4528 rffrxrr.exe 1956 o062666.exe 3428 s8620.exe 1064 xlxlfxr.exe 4216 6066622.exe 4476 dvdpp.exe 1700 8660226.exe 4824 08486.exe 5032 nbtnnh.exe 3604 dppvv.exe 2936 jvvjv.exe 1872 0804826.exe 2748 488826.exe 1928 82486.exe 4000 60286.exe 980 84006.exe 2104 60426.exe 4424 486802.exe 5092 k46044.exe 3420 bbbttb.exe 2868 rfxlxrf.exe 1436 42404.exe 1080 7bnhbt.exe 2428 dpdvp.exe 1652 djvjd.exe 2156 80260.exe 996 fxxrrrx.exe 3968 jvvjv.exe 1428 jvddv.exe 1204 q66442.exe 676 xflffrx.exe 756 tnnhtn.exe 4508 7tnhbt.exe 2148 rlxfxfr.exe 4128 06286.exe 4808 2048226.exe 1756 3pdpp.exe 2036 2064488.exe 3168 dpvpj.exe 4804 djjvj.exe 680 g6642.exe 5100 204860.exe 4072 02822.exe 1460 80082.exe 4504 xflxlfx.exe 1956 6024084.exe -
Processes:
resource yara_rule behavioral2/memory/1616-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2444-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1680-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/856-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/780-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1592-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1592-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2160-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1592-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/940-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/940-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3012-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4932-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4864-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4528-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2672-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1956-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1064-153-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4476-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1700-171-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4824-177-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4216-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/652-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2748-207-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3932-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3472-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2340-71-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe7frxlxl.exebnhhbn.exe1lrflll.exe4248822.exee06004.exe0840482.exebnnhtt.exevjpjv.exe860422.exejdvjv.exerfxlfxr.exe282266.exe2288804.exe266482.exethnhbt.exe6682828.exe66282.exepvdpj.exerffrxrr.exeo062666.exes8620.exedescription pid process target process PID 1616 wrote to memory of 1680 1616 6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe 7frxlxl.exe PID 1616 wrote to memory of 1680 1616 6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe 7frxlxl.exe PID 1616 wrote to memory of 1680 1616 6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe 7frxlxl.exe PID 1680 wrote to memory of 2444 1680 7frxlxl.exe bnhhbn.exe PID 1680 wrote to memory of 2444 1680 7frxlxl.exe bnhhbn.exe PID 1680 wrote to memory of 2444 1680 7frxlxl.exe bnhhbn.exe PID 2444 wrote to memory of 856 2444 bnhhbn.exe 1lrflll.exe PID 2444 wrote to memory of 856 2444 bnhhbn.exe 1lrflll.exe PID 2444 wrote to memory of 856 2444 bnhhbn.exe 1lrflll.exe PID 856 wrote to memory of 780 856 1lrflll.exe 4248822.exe PID 856 wrote to memory of 780 856 1lrflll.exe 4248822.exe PID 856 wrote to memory of 780 856 1lrflll.exe 4248822.exe PID 780 wrote to memory of 1592 780 4248822.exe e06004.exe PID 780 wrote to memory of 1592 780 4248822.exe e06004.exe PID 780 wrote to memory of 1592 780 4248822.exe e06004.exe PID 1592 wrote to memory of 5052 1592 e06004.exe 0840482.exe PID 1592 wrote to memory of 5052 1592 e06004.exe 0840482.exe PID 1592 wrote to memory of 5052 1592 e06004.exe 0840482.exe PID 5052 wrote to memory of 2160 5052 0840482.exe bnnhtt.exe PID 5052 wrote to memory of 2160 5052 0840482.exe bnnhtt.exe PID 5052 wrote to memory of 2160 5052 0840482.exe bnnhtt.exe PID 2160 wrote to memory of 940 2160 bnnhtt.exe vjpjv.exe PID 2160 wrote to memory of 940 2160 bnnhtt.exe vjpjv.exe PID 2160 wrote to memory of 940 2160 bnnhtt.exe vjpjv.exe PID 940 wrote to memory of 2340 940 vjpjv.exe 860422.exe PID 940 wrote to memory of 2340 940 vjpjv.exe 860422.exe PID 940 wrote to memory of 2340 940 vjpjv.exe 860422.exe PID 2340 wrote to memory of 3012 2340 860422.exe jdvjv.exe PID 2340 wrote to memory of 3012 2340 860422.exe jdvjv.exe PID 2340 wrote to memory of 3012 2340 860422.exe jdvjv.exe PID 3012 wrote to memory of 3472 3012 jdvjv.exe rfxlfxr.exe PID 3012 wrote to memory of 3472 3012 jdvjv.exe rfxlfxr.exe PID 3012 wrote to memory of 3472 3012 jdvjv.exe rfxlfxr.exe PID 3472 wrote to memory of 4932 3472 rfxlfxr.exe 282266.exe PID 3472 wrote to memory of 4932 3472 rfxlfxr.exe 282266.exe PID 3472 wrote to memory of 4932 3472 rfxlfxr.exe 282266.exe PID 4932 wrote to memory of 3932 4932 282266.exe 2288804.exe PID 4932 wrote to memory of 3932 4932 282266.exe 2288804.exe PID 4932 wrote to memory of 3932 4932 282266.exe 2288804.exe PID 3932 wrote to memory of 3384 3932 2288804.exe 266482.exe PID 3932 wrote to memory of 3384 3932 2288804.exe 266482.exe PID 3932 wrote to memory of 3384 3932 2288804.exe 266482.exe PID 3384 wrote to memory of 4864 3384 266482.exe thnhbt.exe PID 3384 wrote to memory of 4864 3384 266482.exe thnhbt.exe PID 3384 wrote to memory of 4864 3384 266482.exe thnhbt.exe PID 4864 wrote to memory of 4804 4864 thnhbt.exe djjvj.exe PID 4864 wrote to memory of 4804 4864 thnhbt.exe djjvj.exe PID 4864 wrote to memory of 4804 4864 thnhbt.exe djjvj.exe PID 4804 wrote to memory of 652 4804 6682828.exe 66282.exe PID 4804 wrote to memory of 652 4804 6682828.exe 66282.exe PID 4804 wrote to memory of 652 4804 6682828.exe 66282.exe PID 652 wrote to memory of 2672 652 66282.exe pvdpj.exe PID 652 wrote to memory of 2672 652 66282.exe pvdpj.exe PID 652 wrote to memory of 2672 652 66282.exe pvdpj.exe PID 2672 wrote to memory of 4528 2672 pvdpj.exe rffrxrr.exe PID 2672 wrote to memory of 4528 2672 pvdpj.exe rffrxrr.exe PID 2672 wrote to memory of 4528 2672 pvdpj.exe rffrxrr.exe PID 4528 wrote to memory of 1956 4528 rffrxrr.exe 6024084.exe PID 4528 wrote to memory of 1956 4528 rffrxrr.exe 6024084.exe PID 4528 wrote to memory of 1956 4528 rffrxrr.exe 6024084.exe PID 1956 wrote to memory of 3428 1956 o062666.exe s8620.exe PID 1956 wrote to memory of 3428 1956 o062666.exe s8620.exe PID 1956 wrote to memory of 3428 1956 o062666.exe s8620.exe PID 3428 wrote to memory of 1064 3428 s8620.exe xlxlfxr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\6bdf114b920f46288106f8df51f5e8a0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\7frxlxl.exec:\7frxlxl.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnhhbn.exec:\bnhhbn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1lrflll.exec:\1lrflll.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\4248822.exec:\4248822.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\e06004.exec:\e06004.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\0840482.exec:\0840482.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnnhtt.exec:\bnnhtt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjpjv.exec:\vjpjv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\860422.exec:\860422.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdvjv.exec:\jdvjv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rfxlfxr.exec:\rfxlfxr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\282266.exec:\282266.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\2288804.exec:\2288804.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\266482.exec:\266482.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\thnhbt.exec:\thnhbt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\6682828.exec:\6682828.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\66282.exec:\66282.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvdpj.exec:\pvdpj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rffrxrr.exec:\rffrxrr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\o062666.exec:\o062666.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\s8620.exec:\s8620.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlxlfxr.exec:\xlxlfxr.exe23⤵
- Executes dropped EXE
-
\??\c:\6066622.exec:\6066622.exe24⤵
- Executes dropped EXE
-
\??\c:\dvdpp.exec:\dvdpp.exe25⤵
- Executes dropped EXE
-
\??\c:\8660226.exec:\8660226.exe26⤵
- Executes dropped EXE
-
\??\c:\08486.exec:\08486.exe27⤵
- Executes dropped EXE
-
\??\c:\nbtnnh.exec:\nbtnnh.exe28⤵
- Executes dropped EXE
-
\??\c:\dppvv.exec:\dppvv.exe29⤵
- Executes dropped EXE
-
\??\c:\jvvjv.exec:\jvvjv.exe30⤵
- Executes dropped EXE
-
\??\c:\0804826.exec:\0804826.exe31⤵
- Executes dropped EXE
-
\??\c:\488826.exec:\488826.exe32⤵
- Executes dropped EXE
-
\??\c:\82486.exec:\82486.exe33⤵
- Executes dropped EXE
-
\??\c:\60286.exec:\60286.exe34⤵
- Executes dropped EXE
-
\??\c:\84006.exec:\84006.exe35⤵
- Executes dropped EXE
-
\??\c:\60426.exec:\60426.exe36⤵
- Executes dropped EXE
-
\??\c:\486802.exec:\486802.exe37⤵
- Executes dropped EXE
-
\??\c:\k46044.exec:\k46044.exe38⤵
- Executes dropped EXE
-
\??\c:\bbbttb.exec:\bbbttb.exe39⤵
- Executes dropped EXE
-
\??\c:\rfxlxrf.exec:\rfxlxrf.exe40⤵
- Executes dropped EXE
-
\??\c:\42404.exec:\42404.exe41⤵
- Executes dropped EXE
-
\??\c:\7bnhbt.exec:\7bnhbt.exe42⤵
- Executes dropped EXE
-
\??\c:\dpdvp.exec:\dpdvp.exe43⤵
- Executes dropped EXE
-
\??\c:\djvjd.exec:\djvjd.exe44⤵
- Executes dropped EXE
-
\??\c:\80260.exec:\80260.exe45⤵
- Executes dropped EXE
-
\??\c:\fxxrrrx.exec:\fxxrrrx.exe46⤵
- Executes dropped EXE
-
\??\c:\jvvjv.exec:\jvvjv.exe47⤵
- Executes dropped EXE
-
\??\c:\jvddv.exec:\jvddv.exe48⤵
- Executes dropped EXE
-
\??\c:\q66442.exec:\q66442.exe49⤵
- Executes dropped EXE
-
\??\c:\xflffrx.exec:\xflffrx.exe50⤵
- Executes dropped EXE
-
\??\c:\tnnhtn.exec:\tnnhtn.exe51⤵
- Executes dropped EXE
-
\??\c:\7tnhbt.exec:\7tnhbt.exe52⤵
- Executes dropped EXE
-
\??\c:\rlxfxfr.exec:\rlxfxfr.exe53⤵
- Executes dropped EXE
-
\??\c:\06286.exec:\06286.exe54⤵
- Executes dropped EXE
-
\??\c:\2048226.exec:\2048226.exe55⤵
- Executes dropped EXE
-
\??\c:\3pdpp.exec:\3pdpp.exe56⤵
- Executes dropped EXE
-
\??\c:\2064488.exec:\2064488.exe57⤵
- Executes dropped EXE
-
\??\c:\dpvpj.exec:\dpvpj.exe58⤵
- Executes dropped EXE
-
\??\c:\djjvj.exec:\djjvj.exe59⤵
- Executes dropped EXE
-
\??\c:\g6642.exec:\g6642.exe60⤵
- Executes dropped EXE
-
\??\c:\204860.exec:\204860.exe61⤵
- Executes dropped EXE
-
\??\c:\02822.exec:\02822.exe62⤵
- Executes dropped EXE
-
\??\c:\80082.exec:\80082.exe63⤵
- Executes dropped EXE
-
\??\c:\xflxlfx.exec:\xflxlfx.exe64⤵
- Executes dropped EXE
-
\??\c:\6024084.exec:\6024084.exe65⤵
- Executes dropped EXE
-
\??\c:\jddpv.exec:\jddpv.exe66⤵
-
\??\c:\o888660.exec:\o888660.exe67⤵
-
\??\c:\88820.exec:\88820.exe68⤵
-
\??\c:\868208.exec:\868208.exe69⤵
-
\??\c:\a4042.exec:\a4042.exe70⤵
-
\??\c:\7llxfxl.exec:\7llxfxl.exe71⤵
-
\??\c:\jjdpj.exec:\jjdpj.exe72⤵
-
\??\c:\88042.exec:\88042.exe73⤵
-
\??\c:\ffrrxxx.exec:\ffrrxxx.exe74⤵
-
\??\c:\06444.exec:\06444.exe75⤵
-
\??\c:\400488.exec:\400488.exe76⤵
-
\??\c:\620206.exec:\620206.exe77⤵
-
\??\c:\thnhbb.exec:\thnhbb.exe78⤵
-
\??\c:\622004.exec:\622004.exe79⤵
-
\??\c:\q00022.exec:\q00022.exe80⤵
-
\??\c:\rlfrffx.exec:\rlfrffx.exe81⤵
-
\??\c:\0222682.exec:\0222682.exe82⤵
-
\??\c:\026088.exec:\026088.exe83⤵
-
\??\c:\7vpdp.exec:\7vpdp.exe84⤵
-
\??\c:\5ddpd.exec:\5ddpd.exe85⤵
-
\??\c:\8448604.exec:\8448604.exe86⤵
-
\??\c:\00044.exec:\00044.exe87⤵
-
\??\c:\s4282.exec:\s4282.exe88⤵
-
\??\c:\9jjvj.exec:\9jjvj.exe89⤵
-
\??\c:\864226.exec:\864226.exe90⤵
-
\??\c:\nbhtnn.exec:\nbhtnn.exe91⤵
-
\??\c:\u844266.exec:\u844266.exe92⤵
-
\??\c:\a2264.exec:\a2264.exe93⤵
-
\??\c:\vvpjd.exec:\vvpjd.exe94⤵
-
\??\c:\bnhbnh.exec:\bnhbnh.exe95⤵
-
\??\c:\jdvjv.exec:\jdvjv.exe96⤵
-
\??\c:\7jvjv.exec:\7jvjv.exe97⤵
-
\??\c:\c448604.exec:\c448604.exe98⤵
-
\??\c:\2282224.exec:\2282224.exe99⤵
-
\??\c:\nbtntt.exec:\nbtntt.exe100⤵
-
\??\c:\e66080.exec:\e66080.exe101⤵
-
\??\c:\66048.exec:\66048.exe102⤵
-
\??\c:\hnbbnb.exec:\hnbbnb.exe103⤵
-
\??\c:\ffllrrf.exec:\ffllrrf.exe104⤵
-
\??\c:\xflfrlf.exec:\xflfrlf.exe105⤵
-
\??\c:\nbbnbt.exec:\nbbnbt.exe106⤵
-
\??\c:\7llfrrl.exec:\7llfrrl.exe107⤵
-
\??\c:\tttnbt.exec:\tttnbt.exe108⤵
-
\??\c:\80426.exec:\80426.exe109⤵
-
\??\c:\22864.exec:\22864.exe110⤵
-
\??\c:\0882042.exec:\0882042.exe111⤵
-
\??\c:\c666026.exec:\c666026.exe112⤵
-
\??\c:\26088.exec:\26088.exe113⤵
-
\??\c:\0626482.exec:\0626482.exe114⤵
-
\??\c:\3vpdp.exec:\3vpdp.exe115⤵
-
\??\c:\xrfrfrf.exec:\xrfrfrf.exe116⤵
-
\??\c:\2042042.exec:\2042042.exe117⤵
-
\??\c:\8482048.exec:\8482048.exe118⤵
-
\??\c:\nnbbtt.exec:\nnbbtt.exe119⤵
-
\??\c:\268664.exec:\268664.exe120⤵
-
\??\c:\k68048.exec:\k68048.exe121⤵
-
\??\c:\640282.exec:\640282.exe122⤵
-
\??\c:\llxxlfl.exec:\llxxlfl.exe123⤵
-
\??\c:\6460482.exec:\6460482.exe124⤵
-
\??\c:\i442048.exec:\i442048.exe125⤵
-
\??\c:\66082.exec:\66082.exe126⤵
-
\??\c:\e48664.exec:\e48664.exe127⤵
-
\??\c:\3tbnhb.exec:\3tbnhb.exe128⤵
-
\??\c:\22802.exec:\22802.exe129⤵
-
\??\c:\djpdp.exec:\djpdp.exe130⤵
-
\??\c:\bhbthb.exec:\bhbthb.exe131⤵
-
\??\c:\fxfxxxf.exec:\fxfxxxf.exe132⤵
-
\??\c:\xfrrrrl.exec:\xfrrrrl.exe133⤵
-
\??\c:\pppjv.exec:\pppjv.exe134⤵
-
\??\c:\flfxlfx.exec:\flfxlfx.exe135⤵
-
\??\c:\3bnbhh.exec:\3bnbhh.exe136⤵
-
\??\c:\jdjdd.exec:\jdjdd.exe137⤵
-
\??\c:\42084.exec:\42084.exe138⤵
-
\??\c:\pjdvj.exec:\pjdvj.exe139⤵
-
\??\c:\068200.exec:\068200.exe140⤵
-
\??\c:\g2082.exec:\g2082.exe141⤵
-
\??\c:\3rrlrrl.exec:\3rrlrrl.exe142⤵
-
\??\c:\u688226.exec:\u688226.exe143⤵
-
\??\c:\s8448.exec:\s8448.exe144⤵
-
\??\c:\pjvpj.exec:\pjvpj.exe145⤵
-
\??\c:\m2486.exec:\m2486.exe146⤵
-
\??\c:\hthhnn.exec:\hthhnn.exe147⤵
-
\??\c:\e26288.exec:\e26288.exe148⤵
-
\??\c:\nbbnnh.exec:\nbbnnh.exe149⤵
-
\??\c:\jjpjd.exec:\jjpjd.exe150⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe151⤵
-
\??\c:\vjjdd.exec:\vjjdd.exe152⤵
-
\??\c:\2626448.exec:\2626448.exe153⤵
-
\??\c:\5rxxrxx.exec:\5rxxrxx.exe154⤵
-
\??\c:\xrllfff.exec:\xrllfff.exe155⤵
-
\??\c:\6644226.exec:\6644226.exe156⤵
-
\??\c:\08004.exec:\08004.exe157⤵
-
\??\c:\tttbnb.exec:\tttbnb.exe158⤵
-
\??\c:\5tthbt.exec:\5tthbt.exe159⤵
-
\??\c:\26666.exec:\26666.exe160⤵
-
\??\c:\2486460.exec:\2486460.exe161⤵
-
\??\c:\6422262.exec:\6422262.exe162⤵
-
\??\c:\480444.exec:\480444.exe163⤵
-
\??\c:\228822.exec:\228822.exe164⤵
-
\??\c:\xllfrxl.exec:\xllfrxl.exe165⤵
-
\??\c:\6828868.exec:\6828868.exe166⤵
-
\??\c:\jdddv.exec:\jdddv.exe167⤵
-
\??\c:\nthbtn.exec:\nthbtn.exe168⤵
-
\??\c:\vpjdd.exec:\vpjdd.exe169⤵
-
\??\c:\6060888.exec:\6060888.exe170⤵
-
\??\c:\jdjjp.exec:\jdjjp.exe171⤵
-
\??\c:\62888.exec:\62888.exe172⤵
-
\??\c:\vdjvj.exec:\vdjvj.exe173⤵
-
\??\c:\jdvpj.exec:\jdvpj.exe174⤵
-
\??\c:\o406404.exec:\o406404.exe175⤵
-
\??\c:\lrllffx.exec:\lrllffx.exe176⤵
-
\??\c:\42826.exec:\42826.exe177⤵
-
\??\c:\ffffxxx.exec:\ffffxxx.exe178⤵
-
\??\c:\5xxrllr.exec:\5xxrllr.exe179⤵
-
\??\c:\08682.exec:\08682.exe180⤵
-
\??\c:\622264.exec:\622264.exe181⤵
-
\??\c:\w00488.exec:\w00488.exe182⤵
-
\??\c:\6244226.exec:\6244226.exe183⤵
-
\??\c:\tbbbhh.exec:\tbbbhh.exe184⤵
-
\??\c:\c822226.exec:\c822226.exe185⤵
-
\??\c:\dpdvv.exec:\dpdvv.exe186⤵
-
\??\c:\q64822.exec:\q64822.exe187⤵
-
\??\c:\82442.exec:\82442.exe188⤵
-
\??\c:\vjdvj.exec:\vjdvj.exe189⤵
-
\??\c:\llxrfxx.exec:\llxrfxx.exe190⤵
-
\??\c:\44488.exec:\44488.exe191⤵
-
\??\c:\6688660.exec:\6688660.exe192⤵
-
\??\c:\xxrrllf.exec:\xxrrllf.exe193⤵
-
\??\c:\c660060.exec:\c660060.exe194⤵
-
\??\c:\xxffffl.exec:\xxffffl.exe195⤵
-
\??\c:\ddvdv.exec:\ddvdv.exe196⤵
-
\??\c:\c026460.exec:\c026460.exe197⤵
-
\??\c:\48400.exec:\48400.exe198⤵
-
\??\c:\k80426.exec:\k80426.exe199⤵
-
\??\c:\868260.exec:\868260.exe200⤵
-
\??\c:\thhhhh.exec:\thhhhh.exe201⤵
-
\??\c:\9pvvd.exec:\9pvvd.exe202⤵
-
\??\c:\btbttt.exec:\btbttt.exe203⤵
-
\??\c:\dvdvv.exec:\dvdvv.exe204⤵
-
\??\c:\vvdvj.exec:\vvdvj.exe205⤵
-
\??\c:\s4000.exec:\s4000.exe206⤵
-
\??\c:\1dddd.exec:\1dddd.exe207⤵
-
\??\c:\3ntnbb.exec:\3ntnbb.exe208⤵
-
\??\c:\86264.exec:\86264.exe209⤵
-
\??\c:\jdvpj.exec:\jdvpj.exe210⤵
-
\??\c:\bbbhbb.exec:\bbbhbb.exe211⤵
-
\??\c:\840088.exec:\840088.exe212⤵
-
\??\c:\6448260.exec:\6448260.exe213⤵
-
\??\c:\20888.exec:\20888.exe214⤵
-
\??\c:\84048.exec:\84048.exe215⤵
-
\??\c:\lffxrrl.exec:\lffxrrl.exe216⤵
-
\??\c:\08040.exec:\08040.exe217⤵
-
\??\c:\24860.exec:\24860.exe218⤵
-
\??\c:\fxxrlll.exec:\fxxrlll.exe219⤵
-
\??\c:\3nttnn.exec:\3nttnn.exe220⤵
-
\??\c:\fxfxrxr.exec:\fxfxrxr.exe221⤵
-
\??\c:\862620.exec:\862620.exe222⤵
-
\??\c:\jvddd.exec:\jvddd.exe223⤵
-
\??\c:\200428.exec:\200428.exe224⤵
-
\??\c:\tnbttt.exec:\tnbttt.exe225⤵
-
\??\c:\64086.exec:\64086.exe226⤵
-
\??\c:\2004826.exec:\2004826.exe227⤵
-
\??\c:\3xfffrr.exec:\3xfffrr.exe228⤵
-
\??\c:\6066266.exec:\6066266.exe229⤵
-
\??\c:\hnhbbb.exec:\hnhbbb.exe230⤵
-
\??\c:\ntnhtt.exec:\ntnhtt.exe231⤵
-
\??\c:\8488620.exec:\8488620.exe232⤵
-
\??\c:\vdvpd.exec:\vdvpd.exe233⤵
-
\??\c:\9llxrrr.exec:\9llxrrr.exe234⤵
-
\??\c:\26888.exec:\26888.exe235⤵
-
\??\c:\jvvdv.exec:\jvvdv.exe236⤵
-
\??\c:\9ffxrll.exec:\9ffxrll.exe237⤵
-
\??\c:\fllfxxl.exec:\fllfxxl.exe238⤵
-
\??\c:\jjdvv.exec:\jjdvv.exe239⤵
-
\??\c:\dpjdd.exec:\dpjdd.exe240⤵
-
\??\c:\lxxrlll.exec:\lxxrlll.exe241⤵