Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 21:06
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
89298c936720691f09a1cf9110125550_NeikiAnalytics.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
89298c936720691f09a1cf9110125550_NeikiAnalytics.exe
-
Size
103KB
-
MD5
89298c936720691f09a1cf9110125550
-
SHA1
84d3e36b633e99e13f81445820101a46c0bbe471
-
SHA256
eb7479380d6004652f42ee863abed86a59ff4e6455bf993f2ae2a30d8bbbeb53
-
SHA512
46f6828dcf1eaa332f72ece6eed7dff8562c1f272ccb68d2052447a46b8c3b66dd393dd3f61cb5b9f68cf41246ecb36fab3735149f5a10e1524487fef46d507d
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDoTNKDeS98hPUdHV7RNzfnLnN3oM:ymb3NkkiQ3mdBjFo5KDe88g1fR8a
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/1132-56-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1592-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-269-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2252-305-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2804-296-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/976-260-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2256-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1200-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1700-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1072-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/844-116-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2372-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2836-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3040-79-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3040-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-69-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2628-36-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3048-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3048-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2684-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2172-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3040-2515-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
djjjj.exexfdtrf.exeldxvlr.exenfnjbjb.exedjfpt.exefbxvvv.exenrddxxn.exephpjhbp.exevxrpt.exehljvht.exejvhrd.exenpjfhp.exepbrnvpd.exetnfldj.exerhvhn.exebpjvdxn.exerfpnnrx.exelfvhlvv.exetfljhht.exeddptdv.exeptjfvdj.exetjdhj.exejnjbjx.exetdldv.exeflxxr.exehlfvp.exetrjhhb.exenjbdrhp.exefxbtx.exefjthft.exejfjvb.exejjrjhj.exetvlfp.exetpdpjvr.exepjhpvdr.exepbrxb.exehdpjll.exejlftfh.exebjnbxn.exehtlrnl.exejtlbr.exelxdnvn.exepfjpbxl.exephptx.exedfvtvhx.exejbbhd.exenlnhhnj.exennrhd.exevrnvf.exevpxbttn.exefxnbv.exejjhpdl.exejhlrdbf.exetnnndtb.exedbnpnnj.exefldbvbb.exerhlllt.exepvttnn.exehbhdn.exevjtvbrh.exelbrxdj.exevlpxvp.exebxjvlhv.exedbjphjj.exepid process 2684 djjjj.exe 3048 xfdtrf.exe 2628 ldxvlr.exe 1132 nfnjbjb.exe 2908 djfpt.exe 3040 fbxvvv.exe 2412 nrddxxn.exe 2836 phpjhbp.exe 2372 vxrpt.exe 844 hljvht.exe 1592 jvhrd.exe 2600 npjfhp.exe 1072 pbrnvpd.exe 1884 tnfldj.exe 1700 rhvhn.exe 1200 bpjvdxn.exe 1904 rfpnnrx.exe 2720 lfvhlvv.exe 2256 tfljhht.exe 2740 ddptdv.exe 700 ptjfvdj.exe 628 tjdhj.exe 1628 jnjbjx.exe 1376 tdldv.exe 1052 flxxr.exe 976 hlfvp.exe 2788 trjhhb.exe 1968 njbdrhp.exe 2264 fxbtx.exe 2804 fjthft.exe 2252 jfjvb.exe 1952 jjrjhj.exe 2092 tvlfp.exe 1368 tpdpjvr.exe 2584 pjhpvdr.exe 2488 pbrxb.exe 2748 hdpjll.exe 2660 jlftfh.exe 2652 bjnbxn.exe 2732 htlrnl.exe 2756 jtlbr.exe 2396 lxdnvn.exe 2444 pfjpbxl.exe 3032 phptx.exe 2400 dfvtvhx.exe 2640 jbbhd.exe 1016 nlnhhnj.exe 948 nnrhd.exe 2696 vrnvf.exe 2516 vpxbttn.exe 2600 fxnbv.exe 1172 jjhpdl.exe 2716 jhlrdbf.exe 1724 tnnndtb.exe 1180 dbnpnnj.exe 1200 fldbvbb.exe 2700 rhlllt.exe 2272 pvttnn.exe 1996 hbhdn.exe 3016 vjtvbrh.exe 2924 lbrxdj.exe 1308 vlpxvp.exe 2060 bxjvlhv.exe 2580 dbjphjj.exe -
Processes:
resource yara_rule behavioral1/memory/1132-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1132-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1592-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-269-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2252-305-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2804-296-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/976-260-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2256-198-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1200-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1700-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1072-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/844-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2372-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2836-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3040-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1132-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2628-36-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3048-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2684-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2172-4-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
89298c936720691f09a1cf9110125550_NeikiAnalytics.exedjjjj.exexfdtrf.exeldxvlr.exenfnjbjb.exedjfpt.exefbxvvv.exenrddxxn.exephpjhbp.exevxrpt.exehljvht.exejvhrd.exenpjfhp.exepbrnvpd.exetnfldj.exerhvhn.exedescription pid process target process PID 2172 wrote to memory of 2684 2172 89298c936720691f09a1cf9110125550_NeikiAnalytics.exe djjjj.exe PID 2172 wrote to memory of 2684 2172 89298c936720691f09a1cf9110125550_NeikiAnalytics.exe djjjj.exe PID 2172 wrote to memory of 2684 2172 89298c936720691f09a1cf9110125550_NeikiAnalytics.exe djjjj.exe PID 2172 wrote to memory of 2684 2172 89298c936720691f09a1cf9110125550_NeikiAnalytics.exe djjjj.exe PID 2684 wrote to memory of 3048 2684 djjjj.exe xfdtrf.exe PID 2684 wrote to memory of 3048 2684 djjjj.exe xfdtrf.exe PID 2684 wrote to memory of 3048 2684 djjjj.exe xfdtrf.exe PID 2684 wrote to memory of 3048 2684 djjjj.exe xfdtrf.exe PID 3048 wrote to memory of 2628 3048 xfdtrf.exe ldxvlr.exe PID 3048 wrote to memory of 2628 3048 xfdtrf.exe ldxvlr.exe PID 3048 wrote to memory of 2628 3048 xfdtrf.exe ldxvlr.exe PID 3048 wrote to memory of 2628 3048 xfdtrf.exe ldxvlr.exe PID 2628 wrote to memory of 1132 2628 ldxvlr.exe nfnjbjb.exe PID 2628 wrote to memory of 1132 2628 ldxvlr.exe nfnjbjb.exe PID 2628 wrote to memory of 1132 2628 ldxvlr.exe nfnjbjb.exe PID 2628 wrote to memory of 1132 2628 ldxvlr.exe nfnjbjb.exe PID 1132 wrote to memory of 2908 1132 nfnjbjb.exe djfpt.exe PID 1132 wrote to memory of 2908 1132 nfnjbjb.exe djfpt.exe PID 1132 wrote to memory of 2908 1132 nfnjbjb.exe djfpt.exe PID 1132 wrote to memory of 2908 1132 nfnjbjb.exe djfpt.exe PID 2908 wrote to memory of 3040 2908 djfpt.exe fbxvvv.exe PID 2908 wrote to memory of 3040 2908 djfpt.exe fbxvvv.exe PID 2908 wrote to memory of 3040 2908 djfpt.exe fbxvvv.exe PID 2908 wrote to memory of 3040 2908 djfpt.exe fbxvvv.exe PID 3040 wrote to memory of 2412 3040 fbxvvv.exe nrddxxn.exe PID 3040 wrote to memory of 2412 3040 fbxvvv.exe nrddxxn.exe PID 3040 wrote to memory of 2412 3040 fbxvvv.exe nrddxxn.exe PID 3040 wrote to memory of 2412 3040 fbxvvv.exe nrddxxn.exe PID 2412 wrote to memory of 2836 2412 nrddxxn.exe phpjhbp.exe PID 2412 wrote to memory of 2836 2412 nrddxxn.exe phpjhbp.exe PID 2412 wrote to memory of 2836 2412 nrddxxn.exe phpjhbp.exe PID 2412 wrote to memory of 2836 2412 nrddxxn.exe phpjhbp.exe PID 2836 wrote to memory of 2372 2836 phpjhbp.exe vxrpt.exe PID 2836 wrote to memory of 2372 2836 phpjhbp.exe vxrpt.exe PID 2836 wrote to memory of 2372 2836 phpjhbp.exe vxrpt.exe PID 2836 wrote to memory of 2372 2836 phpjhbp.exe vxrpt.exe PID 2372 wrote to memory of 844 2372 vxrpt.exe hljvht.exe PID 2372 wrote to memory of 844 2372 vxrpt.exe hljvht.exe PID 2372 wrote to memory of 844 2372 vxrpt.exe hljvht.exe PID 2372 wrote to memory of 844 2372 vxrpt.exe hljvht.exe PID 844 wrote to memory of 1592 844 hljvht.exe jvhrd.exe PID 844 wrote to memory of 1592 844 hljvht.exe jvhrd.exe PID 844 wrote to memory of 1592 844 hljvht.exe jvhrd.exe PID 844 wrote to memory of 1592 844 hljvht.exe jvhrd.exe PID 1592 wrote to memory of 2600 1592 jvhrd.exe npjfhp.exe PID 1592 wrote to memory of 2600 1592 jvhrd.exe npjfhp.exe PID 1592 wrote to memory of 2600 1592 jvhrd.exe npjfhp.exe PID 1592 wrote to memory of 2600 1592 jvhrd.exe npjfhp.exe PID 2600 wrote to memory of 1072 2600 npjfhp.exe pbrnvpd.exe PID 2600 wrote to memory of 1072 2600 npjfhp.exe pbrnvpd.exe PID 2600 wrote to memory of 1072 2600 npjfhp.exe pbrnvpd.exe PID 2600 wrote to memory of 1072 2600 npjfhp.exe pbrnvpd.exe PID 1072 wrote to memory of 1884 1072 pbrnvpd.exe tnfldj.exe PID 1072 wrote to memory of 1884 1072 pbrnvpd.exe tnfldj.exe PID 1072 wrote to memory of 1884 1072 pbrnvpd.exe tnfldj.exe PID 1072 wrote to memory of 1884 1072 pbrnvpd.exe tnfldj.exe PID 1884 wrote to memory of 1700 1884 tnfldj.exe rhvhn.exe PID 1884 wrote to memory of 1700 1884 tnfldj.exe rhvhn.exe PID 1884 wrote to memory of 1700 1884 tnfldj.exe rhvhn.exe PID 1884 wrote to memory of 1700 1884 tnfldj.exe rhvhn.exe PID 1700 wrote to memory of 1200 1700 rhvhn.exe fldbvbb.exe PID 1700 wrote to memory of 1200 1700 rhvhn.exe fldbvbb.exe PID 1700 wrote to memory of 1200 1700 rhvhn.exe fldbvbb.exe PID 1700 wrote to memory of 1200 1700 rhvhn.exe fldbvbb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1071205050\zmstage.exeC:\Users\Admin\AppData\Local\Temp\1071205050\zmstage.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\89298c936720691f09a1cf9110125550_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\89298c936720691f09a1cf9110125550_NeikiAnalytics.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\djjjj.exec:\djjjj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfdtrf.exec:\xfdtrf.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ldxvlr.exec:\ldxvlr.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nfnjbjb.exec:\nfnjbjb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djfpt.exec:\djfpt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fbxvvv.exec:\fbxvvv.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nrddxxn.exec:\nrddxxn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\phpjhbp.exec:\phpjhbp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vxrpt.exec:\vxrpt.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hljvht.exec:\hljvht.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvhrd.exec:\jvhrd.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\npjfhp.exec:\npjfhp.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pbrnvpd.exec:\pbrnvpd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnfldj.exec:\tnfldj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rhvhn.exec:\rhvhn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bpjvdxn.exec:\bpjvdxn.exe17⤵
- Executes dropped EXE
-
\??\c:\rfpnnrx.exec:\rfpnnrx.exe18⤵
- Executes dropped EXE
-
\??\c:\lfvhlvv.exec:\lfvhlvv.exe19⤵
- Executes dropped EXE
-
\??\c:\tfljhht.exec:\tfljhht.exe20⤵
- Executes dropped EXE
-
\??\c:\ddptdv.exec:\ddptdv.exe21⤵
- Executes dropped EXE
-
\??\c:\ptjfvdj.exec:\ptjfvdj.exe22⤵
- Executes dropped EXE
-
\??\c:\tjdhj.exec:\tjdhj.exe23⤵
- Executes dropped EXE
-
\??\c:\jnjbjx.exec:\jnjbjx.exe24⤵
- Executes dropped EXE
-
\??\c:\tdldv.exec:\tdldv.exe25⤵
- Executes dropped EXE
-
\??\c:\flxxr.exec:\flxxr.exe26⤵
- Executes dropped EXE
-
\??\c:\hlfvp.exec:\hlfvp.exe27⤵
- Executes dropped EXE
-
\??\c:\trjhhb.exec:\trjhhb.exe28⤵
- Executes dropped EXE
-
\??\c:\njbdrhp.exec:\njbdrhp.exe29⤵
- Executes dropped EXE
-
\??\c:\fxbtx.exec:\fxbtx.exe30⤵
- Executes dropped EXE
-
\??\c:\fjthft.exec:\fjthft.exe31⤵
- Executes dropped EXE
-
\??\c:\jfjvb.exec:\jfjvb.exe32⤵
- Executes dropped EXE
-
\??\c:\jjrjhj.exec:\jjrjhj.exe33⤵
- Executes dropped EXE
-
\??\c:\tvlfp.exec:\tvlfp.exe34⤵
- Executes dropped EXE
-
\??\c:\tpdpjvr.exec:\tpdpjvr.exe35⤵
- Executes dropped EXE
-
\??\c:\pjhpvdr.exec:\pjhpvdr.exe36⤵
- Executes dropped EXE
-
\??\c:\pbrxb.exec:\pbrxb.exe37⤵
- Executes dropped EXE
-
\??\c:\hdpjll.exec:\hdpjll.exe38⤵
- Executes dropped EXE
-
\??\c:\jlftfh.exec:\jlftfh.exe39⤵
- Executes dropped EXE
-
\??\c:\bjnbxn.exec:\bjnbxn.exe40⤵
- Executes dropped EXE
-
\??\c:\htlrnl.exec:\htlrnl.exe41⤵
- Executes dropped EXE
-
\??\c:\jtlbr.exec:\jtlbr.exe42⤵
- Executes dropped EXE
-
\??\c:\lxdnvn.exec:\lxdnvn.exe43⤵
- Executes dropped EXE
-
\??\c:\pfjpbxl.exec:\pfjpbxl.exe44⤵
- Executes dropped EXE
-
\??\c:\phptx.exec:\phptx.exe45⤵
- Executes dropped EXE
-
\??\c:\dfvtvhx.exec:\dfvtvhx.exe46⤵
- Executes dropped EXE
-
\??\c:\jbbhd.exec:\jbbhd.exe47⤵
- Executes dropped EXE
-
\??\c:\nlnhhnj.exec:\nlnhhnj.exe48⤵
- Executes dropped EXE
-
\??\c:\nnrhd.exec:\nnrhd.exe49⤵
- Executes dropped EXE
-
\??\c:\vrnvf.exec:\vrnvf.exe50⤵
- Executes dropped EXE
-
\??\c:\vpxbttn.exec:\vpxbttn.exe51⤵
- Executes dropped EXE
-
\??\c:\fxnbv.exec:\fxnbv.exe52⤵
- Executes dropped EXE
-
\??\c:\jjhpdl.exec:\jjhpdl.exe53⤵
- Executes dropped EXE
-
\??\c:\jhlrdbf.exec:\jhlrdbf.exe54⤵
- Executes dropped EXE
-
\??\c:\tnnndtb.exec:\tnnndtb.exe55⤵
- Executes dropped EXE
-
\??\c:\dbnpnnj.exec:\dbnpnnj.exe56⤵
- Executes dropped EXE
-
\??\c:\fldbvbb.exec:\fldbvbb.exe57⤵
- Executes dropped EXE
-
\??\c:\rhlllt.exec:\rhlllt.exe58⤵
- Executes dropped EXE
-
\??\c:\pvttnn.exec:\pvttnn.exe59⤵
- Executes dropped EXE
-
\??\c:\hbhdn.exec:\hbhdn.exe60⤵
- Executes dropped EXE
-
\??\c:\vjtvbrh.exec:\vjtvbrh.exe61⤵
- Executes dropped EXE
-
\??\c:\lbrxdj.exec:\lbrxdj.exe62⤵
- Executes dropped EXE
-
\??\c:\vlpxvp.exec:\vlpxvp.exe63⤵
- Executes dropped EXE
-
\??\c:\bxjvlhv.exec:\bxjvlhv.exe64⤵
- Executes dropped EXE
-
\??\c:\dbjphjj.exec:\dbjphjj.exe65⤵
- Executes dropped EXE
-
\??\c:\rjlxvd.exec:\rjlxvd.exe66⤵
-
\??\c:\rftbb.exec:\rftbb.exe67⤵
-
\??\c:\lvddjr.exec:\lvddjr.exe68⤵
-
\??\c:\tfflxp.exec:\tfflxp.exe69⤵
-
\??\c:\htxfph.exec:\htxfph.exe70⤵
-
\??\c:\brnjfth.exec:\brnjfth.exe71⤵
-
\??\c:\jdtlpbj.exec:\jdtlpbj.exe72⤵
-
\??\c:\pddrjn.exec:\pddrjn.exe73⤵
-
\??\c:\prxlb.exec:\prxlb.exe74⤵
-
\??\c:\nxjlxjp.exec:\nxjlxjp.exe75⤵
-
\??\c:\ffnfl.exec:\ffnfl.exe76⤵
-
\??\c:\bbjtpd.exec:\bbjtpd.exe77⤵
-
\??\c:\thljfb.exec:\thljfb.exe78⤵
-
\??\c:\fpjln.exec:\fpjln.exe79⤵
-
\??\c:\xvrrr.exec:\xvrrr.exe80⤵
-
\??\c:\rvthnvb.exec:\rvthnvb.exe81⤵
-
\??\c:\hrnbl.exec:\hrnbl.exe82⤵
-
\??\c:\nrdltd.exec:\nrdltd.exe83⤵
-
\??\c:\xjphdpr.exec:\xjphdpr.exe84⤵
-
\??\c:\dbdvjd.exec:\dbdvjd.exe85⤵
-
\??\c:\btbtdr.exec:\btbtdr.exe86⤵
-
\??\c:\thdtthx.exec:\thdtthx.exe87⤵
-
\??\c:\pxtpd.exec:\pxtpd.exe88⤵
-
\??\c:\nplllf.exec:\nplllf.exe89⤵
-
\??\c:\xrbrx.exec:\xrbrx.exe90⤵
-
\??\c:\bbllbbj.exec:\bbllbbj.exe91⤵
-
\??\c:\vdrvrnp.exec:\vdrvrnp.exe92⤵
-
\??\c:\ttjntvt.exec:\ttjntvt.exe93⤵
-
\??\c:\fxlhrd.exec:\fxlhrd.exe94⤵
-
\??\c:\vhhlxt.exec:\vhhlxt.exe95⤵
-
\??\c:\vhnlbv.exec:\vhnlbv.exe96⤵
-
\??\c:\drdff.exec:\drdff.exe97⤵
-
\??\c:\ftlplx.exec:\ftlplx.exe98⤵
-
\??\c:\dxnpd.exec:\dxnpd.exe99⤵
-
\??\c:\jrpfjh.exec:\jrpfjh.exe100⤵
-
\??\c:\lrpxbjr.exec:\lrpxbjr.exe101⤵
-
\??\c:\tbhfptv.exec:\tbhfptv.exe102⤵
-
\??\c:\vlprbbb.exec:\vlprbbb.exe103⤵
-
\??\c:\bbphlbd.exec:\bbphlbd.exe104⤵
-
\??\c:\lnxxlt.exec:\lnxxlt.exe105⤵
-
\??\c:\jddhdtl.exec:\jddhdtl.exe106⤵
-
\??\c:\dftpjd.exec:\dftpjd.exe107⤵
-
\??\c:\rthfxt.exec:\rthfxt.exe108⤵
-
\??\c:\nbjprb.exec:\nbjprb.exe109⤵
-
\??\c:\plppl.exec:\plppl.exe110⤵
-
\??\c:\dbdlxx.exec:\dbdlxx.exe111⤵
-
\??\c:\ntlbplf.exec:\ntlbplf.exe112⤵
-
\??\c:\tvtxbv.exec:\tvtxbv.exe113⤵
-
\??\c:\rjbprd.exec:\rjbprd.exe114⤵
-
\??\c:\bpdhdnr.exec:\bpdhdnr.exe115⤵
-
\??\c:\lndvt.exec:\lndvt.exe116⤵
-
\??\c:\jbhxprt.exec:\jbhxprt.exe117⤵
-
\??\c:\rfdfdp.exec:\rfdfdp.exe118⤵
-
\??\c:\vtvhfx.exec:\vtvhfx.exe119⤵
-
\??\c:\xnfpj.exec:\xnfpj.exe120⤵
-
\??\c:\tjrpvnd.exec:\tjrpvnd.exe121⤵
-
\??\c:\xfpvpd.exec:\xfpvpd.exe122⤵
-
\??\c:\llvlh.exec:\llvlh.exe123⤵
-
\??\c:\jjvxpd.exec:\jjvxpd.exe124⤵
-
\??\c:\bpxbb.exec:\bpxbb.exe125⤵
-
\??\c:\fnthttt.exec:\fnthttt.exe126⤵
-
\??\c:\hrtrxj.exec:\hrtrxj.exe127⤵
-
\??\c:\lhbfv.exec:\lhbfv.exe128⤵
-
\??\c:\ddnxn.exec:\ddnxn.exe129⤵
-
\??\c:\drfjn.exec:\drfjn.exe130⤵
-
\??\c:\xlvfp.exec:\xlvfp.exe131⤵
-
\??\c:\vtnrv.exec:\vtnrv.exe132⤵
-
\??\c:\xdtvrtn.exec:\xdtvrtn.exe133⤵
-
\??\c:\dnfjvd.exec:\dnfjvd.exe134⤵
-
\??\c:\jfrjb.exec:\jfrjb.exe135⤵
-
\??\c:\xbbtd.exec:\xbbtd.exe136⤵
-
\??\c:\ttxrp.exec:\ttxrp.exe137⤵
-
\??\c:\djlhrr.exec:\djlhrr.exe138⤵
-
\??\c:\jttldlt.exec:\jttldlt.exe139⤵
-
\??\c:\rrbvt.exec:\rrbvt.exe140⤵
-
\??\c:\txrhb.exec:\txrhb.exe141⤵
-
\??\c:\dflpv.exec:\dflpv.exe142⤵
-
\??\c:\jhjlfbx.exec:\jhjlfbx.exe143⤵
-
\??\c:\dfxphp.exec:\dfxphp.exe144⤵
-
\??\c:\dvljlj.exec:\dvljlj.exe145⤵
-
\??\c:\djvhj.exec:\djvhj.exe146⤵
-
\??\c:\xlnhh.exec:\xlnhh.exe147⤵
-
\??\c:\rnhrf.exec:\rnhrf.exe148⤵
-
\??\c:\tvrxpf.exec:\tvrxpf.exe149⤵
-
\??\c:\trtlh.exec:\trtlh.exe150⤵
-
\??\c:\jbdfr.exec:\jbdfr.exe151⤵
-
\??\c:\rfpvh.exec:\rfpvh.exe152⤵
-
\??\c:\hftldrx.exec:\hftldrx.exe153⤵
-
\??\c:\xhdjdb.exec:\xhdjdb.exe154⤵
-
\??\c:\pjljp.exec:\pjljp.exe155⤵
-
\??\c:\njdxlb.exec:\njdxlb.exe156⤵
-
\??\c:\pnphp.exec:\pnphp.exe157⤵
-
\??\c:\hnrxjhh.exec:\hnrxjhh.exe158⤵
-
\??\c:\ltrnhj.exec:\ltrnhj.exe159⤵
-
\??\c:\tbvpt.exec:\tbvpt.exe160⤵
-
\??\c:\rhvrxrt.exec:\rhvrxrt.exe161⤵
-
\??\c:\vrvbrrb.exec:\vrvbrrb.exe162⤵
-
\??\c:\xjnvd.exec:\xjnvd.exe163⤵
-
\??\c:\rblhprb.exec:\rblhprb.exe164⤵
-
\??\c:\dhvln.exec:\dhvln.exe165⤵
-
\??\c:\dnhhjpr.exec:\dnhhjpr.exe166⤵
-
\??\c:\pltbrx.exec:\pltbrx.exe167⤵
-
\??\c:\ddjfvht.exec:\ddjfvht.exe168⤵
-
\??\c:\rrnfxrr.exec:\rrnfxrr.exe169⤵
-
\??\c:\bhhnd.exec:\bhhnd.exe170⤵
-
\??\c:\bnnlvjf.exec:\bnnlvjf.exe171⤵
-
\??\c:\hrdpfvp.exec:\hrdpfvp.exe172⤵
-
\??\c:\ttrhdpt.exec:\ttrhdpt.exe173⤵
-
\??\c:\dtdrdl.exec:\dtdrdl.exe174⤵
-
\??\c:\rbhjlbn.exec:\rbhjlbn.exe175⤵
-
\??\c:\vfxxr.exec:\vfxxr.exe176⤵
-
\??\c:\djrlttt.exec:\djrlttt.exe177⤵
-
\??\c:\hbhxfdb.exec:\hbhxfdb.exe178⤵
-
\??\c:\ltvtj.exec:\ltvtj.exe179⤵
-
\??\c:\rlfvv.exec:\rlfvv.exe180⤵
-
\??\c:\hbxllrb.exec:\hbxllrb.exe181⤵
-
\??\c:\trfdx.exec:\trfdx.exe182⤵
-
\??\c:\xrtbp.exec:\xrtbp.exe183⤵
-
\??\c:\hbxjfft.exec:\hbxjfft.exe184⤵
-
\??\c:\lvdbbj.exec:\lvdbbj.exe185⤵
-
\??\c:\xdbhlxf.exec:\xdbhlxf.exe186⤵
-
\??\c:\fbllt.exec:\fbllt.exe187⤵
-
\??\c:\lfdlr.exec:\lfdlr.exe188⤵
-
\??\c:\pnxfrl.exec:\pnxfrl.exe189⤵
-
\??\c:\vdppv.exec:\vdppv.exe190⤵
-
\??\c:\dnbjbp.exec:\dnbjbp.exe191⤵
-
\??\c:\ltjjj.exec:\ltjjj.exe192⤵
-
\??\c:\pppdj.exec:\pppdj.exe193⤵
-
\??\c:\vjrhf.exec:\vjrhf.exe194⤵
-
\??\c:\fpdrv.exec:\fpdrv.exe195⤵
-
\??\c:\fltht.exec:\fltht.exe196⤵
-
\??\c:\jpjnj.exec:\jpjnj.exe197⤵
-
\??\c:\jrhbth.exec:\jrhbth.exe198⤵
-
\??\c:\hpxlt.exec:\hpxlt.exe199⤵
-
\??\c:\bdhlvvb.exec:\bdhlvvb.exe200⤵
-
\??\c:\fbjlnt.exec:\fbjlnt.exe201⤵
-
\??\c:\rrpvtt.exec:\rrpvtt.exe202⤵
-
\??\c:\hbrpfrr.exec:\hbrpfrr.exe203⤵
-
\??\c:\drjfhx.exec:\drjfhx.exe204⤵
-
\??\c:\thhjpj.exec:\thhjpj.exe205⤵
-
\??\c:\brvlxt.exec:\brvlxt.exe206⤵
-
\??\c:\vfbbf.exec:\vfbbf.exe207⤵
-
\??\c:\jnfbfd.exec:\jnfbfd.exe208⤵
-
\??\c:\prlpxxf.exec:\prlpxxf.exe209⤵
-
\??\c:\vhdtpft.exec:\vhdtpft.exe210⤵
-
\??\c:\tpvjdhv.exec:\tpvjdhv.exe211⤵
-
\??\c:\vjpvvb.exec:\vjpvvb.exe212⤵
-
\??\c:\dxlvnh.exec:\dxlvnh.exe213⤵
-
\??\c:\nvrbx.exec:\nvrbx.exe214⤵
-
\??\c:\xhpxhlh.exec:\xhpxhlh.exe215⤵
-
\??\c:\lftpxpb.exec:\lftpxpb.exe216⤵
-
\??\c:\njfrj.exec:\njfrj.exe217⤵
-
\??\c:\ldfdf.exec:\ldfdf.exe218⤵
-
\??\c:\rjnpj.exec:\rjnpj.exe219⤵
-
\??\c:\txpphdl.exec:\txpphdl.exe220⤵
-
\??\c:\dxrbnhr.exec:\dxrbnhr.exe221⤵
-
\??\c:\fbjtf.exec:\fbjtf.exe222⤵
-
\??\c:\vhhrt.exec:\vhhrt.exe223⤵
-
\??\c:\fjjdfp.exec:\fjjdfp.exe224⤵
-
\??\c:\ttppltl.exec:\ttppltl.exe225⤵
-
\??\c:\jhdrvbt.exec:\jhdrvbt.exe226⤵
-
\??\c:\lxdxr.exec:\lxdxr.exe227⤵
-
\??\c:\pntlv.exec:\pntlv.exe228⤵
-
\??\c:\vxhtdvb.exec:\vxhtdvb.exe229⤵
-
\??\c:\trhpjjp.exec:\trhpjjp.exe230⤵
-
\??\c:\rrtlxlp.exec:\rrtlxlp.exe231⤵
-
\??\c:\fjlndl.exec:\fjlndl.exe232⤵
-
\??\c:\bnfxhfj.exec:\bnfxhfj.exe233⤵
-
\??\c:\jjnntp.exec:\jjnntp.exe234⤵
-
\??\c:\lhdhn.exec:\lhdhn.exe235⤵
-
\??\c:\bddnrnt.exec:\bddnrnt.exe236⤵
-
\??\c:\fppbn.exec:\fppbn.exe237⤵
-
\??\c:\hpfdnhx.exec:\hpfdnhx.exe238⤵
-
\??\c:\ndpdd.exec:\ndpdd.exe239⤵
-
\??\c:\jdtrr.exec:\jdtrr.exe240⤵
-
\??\c:\jjllr.exec:\jjllr.exe241⤵