Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 03:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7e3b36ae1a0bb983c492e03f5cca2fc0_NeikiAnalytics.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
7e3b36ae1a0bb983c492e03f5cca2fc0_NeikiAnalytics.exe
-
Size
85KB
-
MD5
7e3b36ae1a0bb983c492e03f5cca2fc0
-
SHA1
000c0ab678e3a7ac09f5ccc08bc6e604e94c5a9c
-
SHA256
cf70e790cc076d6ef0802ef3b35750385a8485f9a031f8aff6da8c55bf07cab5
-
SHA512
fd023f1fa14e836fc0ca9bd8f307c52bfde21b0b791b1210084b32649a63e0dca1fa8120bc3e6ec0db7972ff4c26b492121ced56bb2f21baffcb10e85ad5d58d
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIgt7WxZKmNDnX77lY8/X5QgrciN:ymb3NkkiQ3mdBjFIgte0mNb77Bptt3
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/1712-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2668-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-29-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2864-35-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2552-28-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-51-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2720-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2480-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2480-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2544-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2380-98-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/564-108-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/768-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1484-161-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2244-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1448-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2876-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2776-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/976-260-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/700-287-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1316-296-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1724-306-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
dhtldb.exejbdppx.exefjrvn.exebtdvjnh.exelldtxjv.exejvfnfdj.exedpnhxb.exejtljlrn.exebhjpldd.exedflnrbh.exehdxdvjl.exedddbpv.exelnxjpn.exevrbxv.exentjttb.exehbljvr.exenhrjl.exejvvbnx.exevbxjlxx.exejtdflt.exerdplj.exelddpddt.exexnnllbd.exevvbfpl.exetvrlr.exeldxlhll.exejvhdtl.exehljhrt.exelfxdhp.exehllldrv.exebvdpj.exejjvljjr.exetbljn.exeljdpt.exettrfp.exelnbjrl.exefpxjht.exephxvf.exehrhtln.exehrrvx.exebthdhr.exepbpnj.exenjxftdj.exetvxtbh.exebdxtdlx.exehrhdjh.exelfrrj.exerfjrln.exexrplrd.exehtrrflh.exedfpnpfd.exephtbr.exerlfldbj.exejlhtfr.exervvjhn.exejlhrlnx.exetpxjdl.exexntpdjh.exejjhfvp.exerfrdxdj.exexrltv.exejptbxrj.exefnbjl.exexdppftr.exepid process 2668 dhtldb.exe 2552 jbdppx.exe 2864 fjrvn.exe 2604 btdvjnh.exe 2720 lldtxjv.exe 2480 jvfnfdj.exe 2544 dpnhxb.exe 2380 jtljlrn.exe 564 bhjpldd.exe 1964 dflnrbh.exe 2780 hdxdvjl.exe 1688 dddbpv.exe 944 lnxjpn.exe 768 vrbxv.exe 1484 ntjttb.exe 1760 hbljvr.exe 1520 nhrjl.exe 2244 jvvbnx.exe 1448 vbxjlxx.exe 2876 jtdflt.exe 324 rdplj.exe 652 lddpddt.exe 400 xnnllbd.exe 1852 vvbfpl.exe 2776 tvrlr.exe 976 ldxlhll.exe 1840 jvhdtl.exe 772 hljhrt.exe 700 lfxdhp.exe 1316 hllldrv.exe 1724 bvdpj.exe 1628 jjvljjr.exe 2984 tbljn.exe 2356 ljdpt.exe 2980 ttrfp.exe 2628 lnbjrl.exe 1564 fpxjht.exe 2648 phxvf.exe 2864 hrhtln.exe 2432 hrrvx.exe 2028 bthdhr.exe 2664 pbpnj.exe 2420 njxftdj.exe 2444 tvxtbh.exe 2932 bdxtdlx.exe 2380 hrhdjh.exe 1396 lfrrj.exe 2348 rfjrln.exe 1880 xrplrd.exe 2780 htrrflh.exe 1168 dfpnpfd.exe 1536 phtbr.exe 944 rlfldbj.exe 864 jlhtfr.exe 2708 rvvjhn.exe 1760 jlhrlnx.exe 1744 tpxjdl.exe 840 xntpdjh.exe 3056 jjhfvp.exe 468 rfrdxdj.exe 2876 xrltv.exe 2248 jptbxrj.exe 3060 fnbjl.exe 2352 xdppftr.exe -
Processes:
resource yara_rule behavioral1/memory/1712-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2668-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2864-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2552-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2720-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2480-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2380-98-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2380-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2380-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2380-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/564-108-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/768-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1484-161-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2244-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1448-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-206-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2776-251-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/976-260-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/700-287-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1316-296-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1724-306-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7e3b36ae1a0bb983c492e03f5cca2fc0_NeikiAnalytics.exedhtldb.exejbdppx.exefjrvn.exebtdvjnh.exelldtxjv.exejvfnfdj.exedpnhxb.exejtljlrn.exebhjpldd.exedflnrbh.exehdxdvjl.exedddbpv.exelnxjpn.exevrbxv.exentjttb.exedescription pid process target process PID 1712 wrote to memory of 2668 1712 7e3b36ae1a0bb983c492e03f5cca2fc0_NeikiAnalytics.exe dhtldb.exe PID 1712 wrote to memory of 2668 1712 7e3b36ae1a0bb983c492e03f5cca2fc0_NeikiAnalytics.exe dhtldb.exe PID 1712 wrote to memory of 2668 1712 7e3b36ae1a0bb983c492e03f5cca2fc0_NeikiAnalytics.exe dhtldb.exe PID 1712 wrote to memory of 2668 1712 7e3b36ae1a0bb983c492e03f5cca2fc0_NeikiAnalytics.exe dhtldb.exe PID 2668 wrote to memory of 2552 2668 dhtldb.exe jbdppx.exe PID 2668 wrote to memory of 2552 2668 dhtldb.exe jbdppx.exe PID 2668 wrote to memory of 2552 2668 dhtldb.exe jbdppx.exe PID 2668 wrote to memory of 2552 2668 dhtldb.exe jbdppx.exe PID 2552 wrote to memory of 2864 2552 jbdppx.exe fjrvn.exe PID 2552 wrote to memory of 2864 2552 jbdppx.exe fjrvn.exe PID 2552 wrote to memory of 2864 2552 jbdppx.exe fjrvn.exe PID 2552 wrote to memory of 2864 2552 jbdppx.exe fjrvn.exe PID 2864 wrote to memory of 2604 2864 fjrvn.exe btdvjnh.exe PID 2864 wrote to memory of 2604 2864 fjrvn.exe btdvjnh.exe PID 2864 wrote to memory of 2604 2864 fjrvn.exe btdvjnh.exe PID 2864 wrote to memory of 2604 2864 fjrvn.exe btdvjnh.exe PID 2604 wrote to memory of 2720 2604 btdvjnh.exe lldtxjv.exe PID 2604 wrote to memory of 2720 2604 btdvjnh.exe lldtxjv.exe PID 2604 wrote to memory of 2720 2604 btdvjnh.exe lldtxjv.exe PID 2604 wrote to memory of 2720 2604 btdvjnh.exe lldtxjv.exe PID 2720 wrote to memory of 2480 2720 lldtxjv.exe jvfnfdj.exe PID 2720 wrote to memory of 2480 2720 lldtxjv.exe jvfnfdj.exe PID 2720 wrote to memory of 2480 2720 lldtxjv.exe jvfnfdj.exe PID 2720 wrote to memory of 2480 2720 lldtxjv.exe jvfnfdj.exe PID 2480 wrote to memory of 2544 2480 jvfnfdj.exe dpnhxb.exe PID 2480 wrote to memory of 2544 2480 jvfnfdj.exe dpnhxb.exe PID 2480 wrote to memory of 2544 2480 jvfnfdj.exe dpnhxb.exe PID 2480 wrote to memory of 2544 2480 jvfnfdj.exe dpnhxb.exe PID 2544 wrote to memory of 2380 2544 dpnhxb.exe jtljlrn.exe PID 2544 wrote to memory of 2380 2544 dpnhxb.exe jtljlrn.exe PID 2544 wrote to memory of 2380 2544 dpnhxb.exe jtljlrn.exe PID 2544 wrote to memory of 2380 2544 dpnhxb.exe jtljlrn.exe PID 2380 wrote to memory of 564 2380 jtljlrn.exe bhjpldd.exe PID 2380 wrote to memory of 564 2380 jtljlrn.exe bhjpldd.exe PID 2380 wrote to memory of 564 2380 jtljlrn.exe bhjpldd.exe PID 2380 wrote to memory of 564 2380 jtljlrn.exe bhjpldd.exe PID 564 wrote to memory of 1964 564 bhjpldd.exe dflnrbh.exe PID 564 wrote to memory of 1964 564 bhjpldd.exe dflnrbh.exe PID 564 wrote to memory of 1964 564 bhjpldd.exe dflnrbh.exe PID 564 wrote to memory of 1964 564 bhjpldd.exe dflnrbh.exe PID 1964 wrote to memory of 2780 1964 dflnrbh.exe hdxdvjl.exe PID 1964 wrote to memory of 2780 1964 dflnrbh.exe hdxdvjl.exe PID 1964 wrote to memory of 2780 1964 dflnrbh.exe hdxdvjl.exe PID 1964 wrote to memory of 2780 1964 dflnrbh.exe hdxdvjl.exe PID 2780 wrote to memory of 1688 2780 hdxdvjl.exe dddbpv.exe PID 2780 wrote to memory of 1688 2780 hdxdvjl.exe dddbpv.exe PID 2780 wrote to memory of 1688 2780 hdxdvjl.exe dddbpv.exe PID 2780 wrote to memory of 1688 2780 hdxdvjl.exe dddbpv.exe PID 1688 wrote to memory of 944 1688 dddbpv.exe lnxjpn.exe PID 1688 wrote to memory of 944 1688 dddbpv.exe lnxjpn.exe PID 1688 wrote to memory of 944 1688 dddbpv.exe lnxjpn.exe PID 1688 wrote to memory of 944 1688 dddbpv.exe lnxjpn.exe PID 944 wrote to memory of 768 944 lnxjpn.exe vrbxv.exe PID 944 wrote to memory of 768 944 lnxjpn.exe vrbxv.exe PID 944 wrote to memory of 768 944 lnxjpn.exe vrbxv.exe PID 944 wrote to memory of 768 944 lnxjpn.exe vrbxv.exe PID 768 wrote to memory of 1484 768 vrbxv.exe ntjttb.exe PID 768 wrote to memory of 1484 768 vrbxv.exe ntjttb.exe PID 768 wrote to memory of 1484 768 vrbxv.exe ntjttb.exe PID 768 wrote to memory of 1484 768 vrbxv.exe ntjttb.exe PID 1484 wrote to memory of 1760 1484 ntjttb.exe hbljvr.exe PID 1484 wrote to memory of 1760 1484 ntjttb.exe hbljvr.exe PID 1484 wrote to memory of 1760 1484 ntjttb.exe hbljvr.exe PID 1484 wrote to memory of 1760 1484 ntjttb.exe hbljvr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e3b36ae1a0bb983c492e03f5cca2fc0_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\7e3b36ae1a0bb983c492e03f5cca2fc0_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\dhtldb.exec:\dhtldb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jbdppx.exec:\jbdppx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fjrvn.exec:\fjrvn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btdvjnh.exec:\btdvjnh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lldtxjv.exec:\lldtxjv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvfnfdj.exec:\jvfnfdj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dpnhxb.exec:\dpnhxb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jtljlrn.exec:\jtljlrn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bhjpldd.exec:\bhjpldd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dflnrbh.exec:\dflnrbh.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hdxdvjl.exec:\hdxdvjl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dddbpv.exec:\dddbpv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lnxjpn.exec:\lnxjpn.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vrbxv.exec:\vrbxv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ntjttb.exec:\ntjttb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbljvr.exec:\hbljvr.exe17⤵
- Executes dropped EXE
-
\??\c:\nhrjl.exec:\nhrjl.exe18⤵
- Executes dropped EXE
-
\??\c:\jvvbnx.exec:\jvvbnx.exe19⤵
- Executes dropped EXE
-
\??\c:\vbxjlxx.exec:\vbxjlxx.exe20⤵
- Executes dropped EXE
-
\??\c:\jtdflt.exec:\jtdflt.exe21⤵
- Executes dropped EXE
-
\??\c:\rdplj.exec:\rdplj.exe22⤵
- Executes dropped EXE
-
\??\c:\lddpddt.exec:\lddpddt.exe23⤵
- Executes dropped EXE
-
\??\c:\xnnllbd.exec:\xnnllbd.exe24⤵
- Executes dropped EXE
-
\??\c:\vvbfpl.exec:\vvbfpl.exe25⤵
- Executes dropped EXE
-
\??\c:\tvrlr.exec:\tvrlr.exe26⤵
- Executes dropped EXE
-
\??\c:\ldxlhll.exec:\ldxlhll.exe27⤵
- Executes dropped EXE
-
\??\c:\jvhdtl.exec:\jvhdtl.exe28⤵
- Executes dropped EXE
-
\??\c:\hljhrt.exec:\hljhrt.exe29⤵
- Executes dropped EXE
-
\??\c:\lfxdhp.exec:\lfxdhp.exe30⤵
- Executes dropped EXE
-
\??\c:\hllldrv.exec:\hllldrv.exe31⤵
- Executes dropped EXE
-
\??\c:\bvdpj.exec:\bvdpj.exe32⤵
- Executes dropped EXE
-
\??\c:\jjvljjr.exec:\jjvljjr.exe33⤵
- Executes dropped EXE
-
\??\c:\tbljn.exec:\tbljn.exe34⤵
- Executes dropped EXE
-
\??\c:\ljdpt.exec:\ljdpt.exe35⤵
- Executes dropped EXE
-
\??\c:\ttrfp.exec:\ttrfp.exe36⤵
- Executes dropped EXE
-
\??\c:\lnbjrl.exec:\lnbjrl.exe37⤵
- Executes dropped EXE
-
\??\c:\fpxjht.exec:\fpxjht.exe38⤵
- Executes dropped EXE
-
\??\c:\phxvf.exec:\phxvf.exe39⤵
- Executes dropped EXE
-
\??\c:\hrhtln.exec:\hrhtln.exe40⤵
- Executes dropped EXE
-
\??\c:\hrrvx.exec:\hrrvx.exe41⤵
- Executes dropped EXE
-
\??\c:\bthdhr.exec:\bthdhr.exe42⤵
- Executes dropped EXE
-
\??\c:\pbpnj.exec:\pbpnj.exe43⤵
- Executes dropped EXE
-
\??\c:\njxftdj.exec:\njxftdj.exe44⤵
- Executes dropped EXE
-
\??\c:\tvxtbh.exec:\tvxtbh.exe45⤵
- Executes dropped EXE
-
\??\c:\bdxtdlx.exec:\bdxtdlx.exe46⤵
- Executes dropped EXE
-
\??\c:\hrhdjh.exec:\hrhdjh.exe47⤵
- Executes dropped EXE
-
\??\c:\lfrrj.exec:\lfrrj.exe48⤵
- Executes dropped EXE
-
\??\c:\rfjrln.exec:\rfjrln.exe49⤵
- Executes dropped EXE
-
\??\c:\xrplrd.exec:\xrplrd.exe50⤵
- Executes dropped EXE
-
\??\c:\htrrflh.exec:\htrrflh.exe51⤵
- Executes dropped EXE
-
\??\c:\dfpnpfd.exec:\dfpnpfd.exe52⤵
- Executes dropped EXE
-
\??\c:\phtbr.exec:\phtbr.exe53⤵
- Executes dropped EXE
-
\??\c:\rlfldbj.exec:\rlfldbj.exe54⤵
- Executes dropped EXE
-
\??\c:\jlhtfr.exec:\jlhtfr.exe55⤵
- Executes dropped EXE
-
\??\c:\rvvjhn.exec:\rvvjhn.exe56⤵
- Executes dropped EXE
-
\??\c:\jlhrlnx.exec:\jlhrlnx.exe57⤵
- Executes dropped EXE
-
\??\c:\tpxjdl.exec:\tpxjdl.exe58⤵
- Executes dropped EXE
-
\??\c:\xntpdjh.exec:\xntpdjh.exe59⤵
- Executes dropped EXE
-
\??\c:\jjhfvp.exec:\jjhfvp.exe60⤵
- Executes dropped EXE
-
\??\c:\rfrdxdj.exec:\rfrdxdj.exe61⤵
- Executes dropped EXE
-
\??\c:\xrltv.exec:\xrltv.exe62⤵
- Executes dropped EXE
-
\??\c:\jptbxrj.exec:\jptbxrj.exe63⤵
- Executes dropped EXE
-
\??\c:\fnbjl.exec:\fnbjl.exe64⤵
- Executes dropped EXE
-
\??\c:\xdppftr.exec:\xdppftr.exe65⤵
- Executes dropped EXE
-
\??\c:\ttxtf.exec:\ttxtf.exe66⤵
-
\??\c:\hnjpp.exec:\hnjpp.exe67⤵
-
\??\c:\hfndpdn.exec:\hfndpdn.exe68⤵
-
\??\c:\fbbxbr.exec:\fbbxbr.exe69⤵
-
\??\c:\plhxdj.exec:\plhxdj.exe70⤵
-
\??\c:\hlbfj.exec:\hlbfj.exe71⤵
-
\??\c:\txjjhf.exec:\txjjhf.exe72⤵
-
\??\c:\htpjx.exec:\htpjx.exe73⤵
-
\??\c:\xldxx.exec:\xldxx.exe74⤵
-
\??\c:\hlnxld.exec:\hlnxld.exe75⤵
-
\??\c:\tdlbfxh.exec:\tdlbfxh.exe76⤵
-
\??\c:\jdxrvh.exec:\jdxrvh.exe77⤵
-
\??\c:\plvjp.exec:\plvjp.exe78⤵
-
\??\c:\jfrfhtx.exec:\jfrfhtx.exe79⤵
-
\??\c:\jbbphxh.exec:\jbbphxh.exe80⤵
-
\??\c:\ppbln.exec:\ppbln.exe81⤵
-
\??\c:\nnrpp.exec:\nnrpp.exe82⤵
-
\??\c:\hldtd.exec:\hldtd.exe83⤵
-
\??\c:\llxbjpj.exec:\llxbjpj.exe84⤵
-
\??\c:\lvtbr.exec:\lvtbr.exe85⤵
-
\??\c:\lfrnd.exec:\lfrnd.exe86⤵
-
\??\c:\vthnplf.exec:\vthnplf.exe87⤵
-
\??\c:\jlrrjxd.exec:\jlrrjxd.exe88⤵
-
\??\c:\vdvbxf.exec:\vdvbxf.exe89⤵
-
\??\c:\jhljdh.exec:\jhljdh.exe90⤵
-
\??\c:\hbxjv.exec:\hbxjv.exe91⤵
-
\??\c:\hrvxlb.exec:\hrvxlb.exe92⤵
-
\??\c:\tbpfl.exec:\tbpfl.exe93⤵
-
\??\c:\pfnftr.exec:\pfnftr.exe94⤵
-
\??\c:\nblxl.exec:\nblxl.exe95⤵
-
\??\c:\lrfxxnh.exec:\lrfxxnh.exe96⤵
-
\??\c:\tpjtjb.exec:\tpjtjb.exe97⤵
-
\??\c:\xtrjvdl.exec:\xtrjvdl.exe98⤵
-
\??\c:\plhbjx.exec:\plhbjx.exe99⤵
-
\??\c:\tthrtlt.exec:\tthrtlt.exe100⤵
-
\??\c:\tnxljpl.exec:\tnxljpl.exe101⤵
-
\??\c:\ffvld.exec:\ffvld.exe102⤵
-
\??\c:\hpjldnb.exec:\hpjldnb.exe103⤵
-
\??\c:\dvxlx.exec:\dvxlx.exe104⤵
-
\??\c:\dljlf.exec:\dljlf.exe105⤵
-
\??\c:\xdtlp.exec:\xdtlp.exe106⤵
-
\??\c:\tfrdh.exec:\tfrdh.exe107⤵
-
\??\c:\rjlhfj.exec:\rjlhfj.exe108⤵
-
\??\c:\jbjpxlf.exec:\jbjpxlf.exe109⤵
-
\??\c:\rjbtbl.exec:\rjbtbl.exe110⤵
-
\??\c:\jfjrnbd.exec:\jfjrnbd.exe111⤵
-
\??\c:\fntfj.exec:\fntfj.exe112⤵
-
\??\c:\rtnjf.exec:\rtnjf.exe113⤵
-
\??\c:\nlxrnfb.exec:\nlxrnfb.exe114⤵
-
\??\c:\jhxnplx.exec:\jhxnplx.exe115⤵
-
\??\c:\tvnpntn.exec:\tvnpntn.exe116⤵
-
\??\c:\nphvxfd.exec:\nphvxfd.exe117⤵
-
\??\c:\frfrxl.exec:\frfrxl.exe118⤵
-
\??\c:\bxfnrx.exec:\bxfnrx.exe119⤵
-
\??\c:\vfdjll.exec:\vfdjll.exe120⤵
-
\??\c:\ltldd.exec:\ltldd.exe121⤵
-
\??\c:\nfnvjxx.exec:\nfnvjxx.exe122⤵
-
\??\c:\dvxnv.exec:\dvxnv.exe123⤵
-
\??\c:\vpjpjbp.exec:\vpjpjbp.exe124⤵
-
\??\c:\tttfn.exec:\tttfn.exe125⤵
-
\??\c:\dvlthrb.exec:\dvlthrb.exe126⤵
-
\??\c:\rrbldt.exec:\rrbldt.exe127⤵
-
\??\c:\pxhpr.exec:\pxhpr.exe128⤵
-
\??\c:\hdftvr.exec:\hdftvr.exe129⤵
-
\??\c:\ltfjv.exec:\ltfjv.exe130⤵
-
\??\c:\jfxrx.exec:\jfxrx.exe131⤵
-
\??\c:\hljttjx.exec:\hljttjx.exe132⤵
-
\??\c:\hxfbhbh.exec:\hxfbhbh.exe133⤵
-
\??\c:\vdnvxxh.exec:\vdnvxxh.exe134⤵
-
\??\c:\pvnpfb.exec:\pvnpfb.exe135⤵
-
\??\c:\drxjh.exec:\drxjh.exe136⤵
-
\??\c:\xfnjnrr.exec:\xfnjnrr.exe137⤵
-
\??\c:\nlntntj.exec:\nlntntj.exe138⤵
-
\??\c:\lttttx.exec:\lttttx.exe139⤵
-
\??\c:\llhjpb.exec:\llhjpb.exe140⤵
-
\??\c:\nxnnnlv.exec:\nxnnnlv.exe141⤵
-
\??\c:\rtrdn.exec:\rtrdn.exe142⤵
-
\??\c:\lrxvp.exec:\lrxvp.exe143⤵
-
\??\c:\blfjd.exec:\blfjd.exe144⤵
-
\??\c:\prhtn.exec:\prhtn.exe145⤵
-
\??\c:\nrdlv.exec:\nrdlv.exe146⤵
-
\??\c:\jbhvh.exec:\jbhvh.exe147⤵
-
\??\c:\bddxvb.exec:\bddxvb.exe148⤵
-
\??\c:\hdpvfrp.exec:\hdpvfrp.exe149⤵
-
\??\c:\btbjrl.exec:\btbjrl.exe150⤵
-
\??\c:\drxnhx.exec:\drxnhx.exe151⤵
-
\??\c:\dttxx.exec:\dttxx.exe152⤵
-
\??\c:\brtdt.exec:\brtdt.exe153⤵
-
\??\c:\dblpjt.exec:\dblpjt.exe154⤵
-
\??\c:\thpfvfv.exec:\thpfvfv.exe155⤵
-
\??\c:\dxdhbh.exec:\dxdhbh.exe156⤵
-
\??\c:\rntfj.exec:\rntfj.exe157⤵
-
\??\c:\dlptfr.exec:\dlptfr.exe158⤵
-
\??\c:\pdnvnvj.exec:\pdnvnvj.exe159⤵
-
\??\c:\ljllrbb.exec:\ljllrbb.exe160⤵
-
\??\c:\dtdtdx.exec:\dtdtdx.exe161⤵
-
\??\c:\ddpbh.exec:\ddpbh.exe162⤵
-
\??\c:\lvxnrl.exec:\lvxnrl.exe163⤵
-
\??\c:\nhtbfh.exec:\nhtbfh.exe164⤵
-
\??\c:\bdfrpj.exec:\bdfrpj.exe165⤵
-
\??\c:\vfnlbn.exec:\vfnlbn.exe166⤵
-
\??\c:\rdxnlf.exec:\rdxnlf.exe167⤵
-
\??\c:\nbtdxvf.exec:\nbtdxvf.exe168⤵
-
\??\c:\bpbdnjp.exec:\bpbdnjp.exe169⤵
-
\??\c:\fnrphnv.exec:\fnrphnv.exe170⤵
-
\??\c:\bhjjn.exec:\bhjjn.exe171⤵
-
\??\c:\lttlhnj.exec:\lttlhnj.exe172⤵
-
\??\c:\fppvrbd.exec:\fppvrbd.exe173⤵
-
\??\c:\vpthhb.exec:\vpthhb.exe174⤵
-
\??\c:\lvbrphx.exec:\lvbrphx.exe175⤵
-
\??\c:\flrdbdp.exec:\flrdbdp.exe176⤵
-
\??\c:\tlvtv.exec:\tlvtv.exe177⤵
-
\??\c:\nnnjlfd.exec:\nnnjlfd.exe178⤵
-
\??\c:\frtrhp.exec:\frtrhp.exe179⤵
-
\??\c:\vdjjt.exec:\vdjjt.exe180⤵
-
\??\c:\htphbj.exec:\htphbj.exe181⤵
-
\??\c:\lfjnx.exec:\lfjnx.exe182⤵
-
\??\c:\bvnjpp.exec:\bvnjpp.exe183⤵
-
\??\c:\vjvfvr.exec:\vjvfvr.exe184⤵
-
\??\c:\vjhrhtl.exec:\vjhrhtl.exe185⤵
-
\??\c:\bdjllrn.exec:\bdjllrn.exe186⤵
-
\??\c:\dflvrh.exec:\dflvrh.exe187⤵
-
\??\c:\lbldjd.exec:\lbldjd.exe188⤵
-
\??\c:\tphpp.exec:\tphpp.exe189⤵
-
\??\c:\ftnjfr.exec:\ftnjfr.exe190⤵
-
\??\c:\dxdfjv.exec:\dxdfjv.exe191⤵
-
\??\c:\rxvxb.exec:\rxvxb.exe192⤵
-
\??\c:\xdpptxr.exec:\xdpptxr.exe193⤵
-
\??\c:\vvdjxrt.exec:\vvdjxrt.exe194⤵
-
\??\c:\phfflx.exec:\phfflx.exe195⤵
-
\??\c:\fnnjf.exec:\fnnjf.exe196⤵
-
\??\c:\ffvjj.exec:\ffvjj.exe197⤵
-
\??\c:\tpfhtn.exec:\tpfhtn.exe198⤵
-
\??\c:\ndbbjx.exec:\ndbbjx.exe199⤵
-
\??\c:\tvbbtx.exec:\tvbbtx.exe200⤵
-
\??\c:\jdhjn.exec:\jdhjn.exe201⤵
-
\??\c:\rfdxv.exec:\rfdxv.exe202⤵
-
\??\c:\tptlh.exec:\tptlh.exe203⤵
-
\??\c:\hdvxx.exec:\hdvxx.exe204⤵
-
\??\c:\tpppppv.exec:\tpppppv.exe205⤵
-
\??\c:\jlfdv.exec:\jlfdv.exe206⤵
-
\??\c:\prjlp.exec:\prjlp.exe207⤵
-
\??\c:\dxjxlx.exec:\dxjxlx.exe208⤵
-
\??\c:\flxbxp.exec:\flxbxp.exe209⤵
-
\??\c:\rrbnx.exec:\rrbnx.exe210⤵
-
\??\c:\tdtbxv.exec:\tdtbxv.exe211⤵
-
\??\c:\vhltlxt.exec:\vhltlxt.exe212⤵
-
\??\c:\pxpjrp.exec:\pxpjrp.exe213⤵
-
\??\c:\blrvfj.exec:\blrvfj.exe214⤵
-
\??\c:\lnxnld.exec:\lnxnld.exe215⤵
-
\??\c:\ttprh.exec:\ttprh.exe216⤵
-
\??\c:\xbxlxjt.exec:\xbxlxjt.exe217⤵
-
\??\c:\vlbxrdd.exec:\vlbxrdd.exe218⤵
-
\??\c:\fpjdpn.exec:\fpjdpn.exe219⤵
-
\??\c:\prbpn.exec:\prbpn.exe220⤵
-
\??\c:\nrrxhnd.exec:\nrrxhnd.exe221⤵
-
\??\c:\ffjxrhl.exec:\ffjxrhl.exe222⤵
-
\??\c:\drttn.exec:\drttn.exe223⤵
-
\??\c:\xphvj.exec:\xphvj.exe224⤵
-
\??\c:\trxlfpr.exec:\trxlfpr.exe225⤵
-
\??\c:\hjdhd.exec:\hjdhd.exe226⤵
-
\??\c:\hnjbdp.exec:\hnjbdp.exe227⤵
-
\??\c:\hnjvl.exec:\hnjvl.exe228⤵
-
\??\c:\jplpxnx.exec:\jplpxnx.exe229⤵
-
\??\c:\rddbt.exec:\rddbt.exe230⤵
-
\??\c:\jvjfhlr.exec:\jvjfhlr.exe231⤵
-
\??\c:\tfnftnx.exec:\tfnftnx.exe232⤵
-
\??\c:\htjjhfn.exec:\htjjhfn.exe233⤵
-
\??\c:\rlrldxr.exec:\rlrldxr.exe234⤵
-
\??\c:\rvtrxp.exec:\rvtrxp.exe235⤵
-
\??\c:\pbnpnf.exec:\pbnpnf.exe236⤵
-
\??\c:\lpfdl.exec:\lpfdl.exe237⤵
-
\??\c:\ffdvxp.exec:\ffdvxp.exe238⤵
-
\??\c:\xvhff.exec:\xvhff.exe239⤵
-
\??\c:\jvlrvh.exec:\jvlrvh.exe240⤵
-
\??\c:\rhxxb.exec:\rhxxb.exe241⤵