Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-04-2024 06:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe
-
Size
93KB
-
MD5
0486f1a755983c9016c8a589c7c12286
-
SHA1
451f9d37369d2d6845dc795fe0a6ae5d784b5caf
-
SHA256
a9994482e4ad4c2563f0f7687b79d3545dcd6f2cd090196b7f773ae56d149db0
-
SHA512
dd1d187fae2269d7a4f5b6874e441929d0a1bca4c05d4fd306dbbe99aa4de73f120981a1a4bd9d67abb252e1297dc1979bcc9266f9057d4a5ac3f38488631b06
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+mzv7oEzNcI2w0V:ymb3NkkiQ3mdBjF+3TYzvTu
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2020-7-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2192-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1936-22-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2416-41-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2660-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2528-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2884-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2724-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/556-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1800-138-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1272-157-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/584-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2124-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2052-202-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1744-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2932-255-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2072-282-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3lflxxf.exebthhth.exedjvdd.exevpdpv.exerxffflr.exennbttt.exedvjpv.exefxxxxrx.exexlxxllf.exetnbbnn.exepdjdj.exe5dpdv.exelxxxfff.exefrffxfl.exehthnnt.exehbhbhh.exeddvdp.exe7xrrxfx.exe5xffffx.exebthhnt.exejdjpp.exevjjdv.exe9rflxxf.exerfrrxrx.exehbnbbn.exebnhhnn.exepjdjj.exe1jvvd.exerfllxxf.exelfrrxxx.exebthhhh.exedvddd.exellffrfx.exexfxxxxl.exe9bntbt.exebnbbbh.exevjjvv.exepdddj.exe7frlrlx.exe3xllrrr.exebtnnhh.exe7bhhbh.exepjpvd.exepjjjp.exe3ffxrlr.exelfxlrrl.exe3thhtt.exebthtbb.exepvvvd.exeppvpj.exelxxxffl.exefrxflfl.exe7tbbhh.exe9thbhb.exejvvpp.exerlrrflr.exefrxrrfl.exe5djvj.exevjppp.exefrffrlr.exe5fflfff.exehbnttt.exe5nbbht.exevjpjj.exepid process 2192 3lflxxf.exe 1936 bthhth.exe 2664 djvdd.exe 2416 vpdpv.exe 2580 rxffflr.exe 2660 nnbttt.exe 2528 dvjpv.exe 2884 fxxxxrx.exe 2700 xlxxllf.exe 2724 tnbbnn.exe 640 pdjdj.exe 556 5dpdv.exe 1800 lxxxfff.exe 1808 frffxfl.exe 1272 hthnnt.exe 584 hbhbhh.exe 1280 ddvdp.exe 1692 7xrrxfx.exe 2124 5xffffx.exe 2052 bthhnt.exe 1744 jdjpp.exe 592 vjjdv.exe 2796 9rflxxf.exe 1136 rfrrxrx.exe 2008 hbnbbn.exe 2932 bnhhnn.exe 108 pjdjj.exe 712 1jvvd.exe 2072 rfllxxf.exe 2112 lfrrxxx.exe 1004 bthhhh.exe 1748 dvddd.exe 2592 llffrfx.exe 1536 xfxxxxl.exe 2548 9bntbt.exe 2644 bnbbbh.exe 2564 vjjvv.exe 2776 pdddj.exe 2988 7frlrlx.exe 2572 3xllrrr.exe 2576 btnnhh.exe 2460 7bhhbh.exe 2480 pjpvd.exe 1588 pjjjp.exe 2728 3ffxrlr.exe 2584 lfxlrrl.exe 2732 3thhtt.exe 2296 bthtbb.exe 876 pvvvd.exe 1872 ppvpj.exe 1800 lxxxffl.exe 1372 frxflfl.exe 384 7tbbhh.exe 1196 9thbhb.exe 1028 jvvpp.exe 1280 rlrrflr.exe 2904 frxrrfl.exe 2224 5djvj.exe 1632 vjppp.exe 2220 frffrlr.exe 1076 5fflfff.exe 1792 hbnttt.exe 1740 5nbbht.exe 1400 vjpjj.exe -
Processes:
resource yara_rule behavioral1/memory/2020-7-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2192-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1936-22-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2416-41-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2528-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2884-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/556-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1800-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1272-157-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/584-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2124-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2052-202-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1744-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2932-255-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2072-282-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe3lflxxf.exebthhth.exedjvdd.exevpdpv.exerxffflr.exennbttt.exedvjpv.exefxxxxrx.exexlxxllf.exetnbbnn.exepdjdj.exe5dpdv.exelxxxfff.exefrffxfl.exehthnnt.exedescription pid process target process PID 2020 wrote to memory of 2192 2020 0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe 3lflxxf.exe PID 2020 wrote to memory of 2192 2020 0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe 3lflxxf.exe PID 2020 wrote to memory of 2192 2020 0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe 3lflxxf.exe PID 2020 wrote to memory of 2192 2020 0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe 3lflxxf.exe PID 2192 wrote to memory of 1936 2192 3lflxxf.exe bthhth.exe PID 2192 wrote to memory of 1936 2192 3lflxxf.exe bthhth.exe PID 2192 wrote to memory of 1936 2192 3lflxxf.exe bthhth.exe PID 2192 wrote to memory of 1936 2192 3lflxxf.exe bthhth.exe PID 1936 wrote to memory of 2664 1936 bthhth.exe djvdd.exe PID 1936 wrote to memory of 2664 1936 bthhth.exe djvdd.exe PID 1936 wrote to memory of 2664 1936 bthhth.exe djvdd.exe PID 1936 wrote to memory of 2664 1936 bthhth.exe djvdd.exe PID 2664 wrote to memory of 2416 2664 djvdd.exe vpdpv.exe PID 2664 wrote to memory of 2416 2664 djvdd.exe vpdpv.exe PID 2664 wrote to memory of 2416 2664 djvdd.exe vpdpv.exe PID 2664 wrote to memory of 2416 2664 djvdd.exe vpdpv.exe PID 2416 wrote to memory of 2580 2416 vpdpv.exe rxffflr.exe PID 2416 wrote to memory of 2580 2416 vpdpv.exe rxffflr.exe PID 2416 wrote to memory of 2580 2416 vpdpv.exe rxffflr.exe PID 2416 wrote to memory of 2580 2416 vpdpv.exe rxffflr.exe PID 2580 wrote to memory of 2660 2580 rxffflr.exe nnbttt.exe PID 2580 wrote to memory of 2660 2580 rxffflr.exe nnbttt.exe PID 2580 wrote to memory of 2660 2580 rxffflr.exe nnbttt.exe PID 2580 wrote to memory of 2660 2580 rxffflr.exe nnbttt.exe PID 2660 wrote to memory of 2528 2660 nnbttt.exe dvjpv.exe PID 2660 wrote to memory of 2528 2660 nnbttt.exe dvjpv.exe PID 2660 wrote to memory of 2528 2660 nnbttt.exe dvjpv.exe PID 2660 wrote to memory of 2528 2660 nnbttt.exe dvjpv.exe PID 2528 wrote to memory of 2884 2528 dvjpv.exe fxxxxrx.exe PID 2528 wrote to memory of 2884 2528 dvjpv.exe fxxxxrx.exe PID 2528 wrote to memory of 2884 2528 dvjpv.exe fxxxxrx.exe PID 2528 wrote to memory of 2884 2528 dvjpv.exe fxxxxrx.exe PID 2884 wrote to memory of 2700 2884 fxxxxrx.exe xlxxllf.exe PID 2884 wrote to memory of 2700 2884 fxxxxrx.exe xlxxllf.exe PID 2884 wrote to memory of 2700 2884 fxxxxrx.exe xlxxllf.exe PID 2884 wrote to memory of 2700 2884 fxxxxrx.exe xlxxllf.exe PID 2700 wrote to memory of 2724 2700 xlxxllf.exe tnbbnn.exe PID 2700 wrote to memory of 2724 2700 xlxxllf.exe tnbbnn.exe PID 2700 wrote to memory of 2724 2700 xlxxllf.exe tnbbnn.exe PID 2700 wrote to memory of 2724 2700 xlxxllf.exe tnbbnn.exe PID 2724 wrote to memory of 640 2724 tnbbnn.exe pdjdj.exe PID 2724 wrote to memory of 640 2724 tnbbnn.exe pdjdj.exe PID 2724 wrote to memory of 640 2724 tnbbnn.exe pdjdj.exe PID 2724 wrote to memory of 640 2724 tnbbnn.exe pdjdj.exe PID 640 wrote to memory of 556 640 pdjdj.exe 5dpdv.exe PID 640 wrote to memory of 556 640 pdjdj.exe 5dpdv.exe PID 640 wrote to memory of 556 640 pdjdj.exe 5dpdv.exe PID 640 wrote to memory of 556 640 pdjdj.exe 5dpdv.exe PID 556 wrote to memory of 1800 556 5dpdv.exe lxxxfff.exe PID 556 wrote to memory of 1800 556 5dpdv.exe lxxxfff.exe PID 556 wrote to memory of 1800 556 5dpdv.exe lxxxfff.exe PID 556 wrote to memory of 1800 556 5dpdv.exe lxxxfff.exe PID 1800 wrote to memory of 1808 1800 lxxxfff.exe frffxfl.exe PID 1800 wrote to memory of 1808 1800 lxxxfff.exe frffxfl.exe PID 1800 wrote to memory of 1808 1800 lxxxfff.exe frffxfl.exe PID 1800 wrote to memory of 1808 1800 lxxxfff.exe frffxfl.exe PID 1808 wrote to memory of 1272 1808 frffxfl.exe hthnnt.exe PID 1808 wrote to memory of 1272 1808 frffxfl.exe hthnnt.exe PID 1808 wrote to memory of 1272 1808 frffxfl.exe hthnnt.exe PID 1808 wrote to memory of 1272 1808 frffxfl.exe hthnnt.exe PID 1272 wrote to memory of 584 1272 hthnnt.exe hbhbhh.exe PID 1272 wrote to memory of 584 1272 hthnnt.exe hbhbhh.exe PID 1272 wrote to memory of 584 1272 hthnnt.exe hbhbhh.exe PID 1272 wrote to memory of 584 1272 hthnnt.exe hbhbhh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\3lflxxf.exec:\3lflxxf.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bthhth.exec:\bthhth.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djvdd.exec:\djvdd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpdpv.exec:\vpdpv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxffflr.exec:\rxffflr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnbttt.exec:\nnbttt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvjpv.exec:\dvjpv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxxxxrx.exec:\fxxxxrx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlxxllf.exec:\xlxxllf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tnbbnn.exec:\tnbbnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdjdj.exec:\pdjdj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5dpdv.exec:\5dpdv.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxxxfff.exec:\lxxxfff.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frffxfl.exec:\frffxfl.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hthnnt.exec:\hthnnt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hbhbhh.exec:\hbhbhh.exe17⤵
- Executes dropped EXE
-
\??\c:\ddvdp.exec:\ddvdp.exe18⤵
- Executes dropped EXE
-
\??\c:\7xrrxfx.exec:\7xrrxfx.exe19⤵
- Executes dropped EXE
-
\??\c:\5xffffx.exec:\5xffffx.exe20⤵
- Executes dropped EXE
-
\??\c:\bthhnt.exec:\bthhnt.exe21⤵
- Executes dropped EXE
-
\??\c:\jdjpp.exec:\jdjpp.exe22⤵
- Executes dropped EXE
-
\??\c:\vjjdv.exec:\vjjdv.exe23⤵
- Executes dropped EXE
-
\??\c:\9rflxxf.exec:\9rflxxf.exe24⤵
- Executes dropped EXE
-
\??\c:\rfrrxrx.exec:\rfrrxrx.exe25⤵
- Executes dropped EXE
-
\??\c:\hbnbbn.exec:\hbnbbn.exe26⤵
- Executes dropped EXE
-
\??\c:\bnhhnn.exec:\bnhhnn.exe27⤵
- Executes dropped EXE
-
\??\c:\pjdjj.exec:\pjdjj.exe28⤵
- Executes dropped EXE
-
\??\c:\1jvvd.exec:\1jvvd.exe29⤵
- Executes dropped EXE
-
\??\c:\rfllxxf.exec:\rfllxxf.exe30⤵
- Executes dropped EXE
-
\??\c:\lfrrxxx.exec:\lfrrxxx.exe31⤵
- Executes dropped EXE
-
\??\c:\bthhhh.exec:\bthhhh.exe32⤵
- Executes dropped EXE
-
\??\c:\dvddd.exec:\dvddd.exe33⤵
- Executes dropped EXE
-
\??\c:\llffrfx.exec:\llffrfx.exe34⤵
- Executes dropped EXE
-
\??\c:\xfxxxxl.exec:\xfxxxxl.exe35⤵
- Executes dropped EXE
-
\??\c:\9bntbt.exec:\9bntbt.exe36⤵
- Executes dropped EXE
-
\??\c:\bnbbbh.exec:\bnbbbh.exe37⤵
- Executes dropped EXE
-
\??\c:\vjjvv.exec:\vjjvv.exe38⤵
- Executes dropped EXE
-
\??\c:\pdddj.exec:\pdddj.exe39⤵
- Executes dropped EXE
-
\??\c:\7frlrlx.exec:\7frlrlx.exe40⤵
- Executes dropped EXE
-
\??\c:\3xllrrr.exec:\3xllrrr.exe41⤵
- Executes dropped EXE
-
\??\c:\btnnhh.exec:\btnnhh.exe42⤵
- Executes dropped EXE
-
\??\c:\7bhhbh.exec:\7bhhbh.exe43⤵
- Executes dropped EXE
-
\??\c:\pjpvd.exec:\pjpvd.exe44⤵
- Executes dropped EXE
-
\??\c:\pjjjp.exec:\pjjjp.exe45⤵
- Executes dropped EXE
-
\??\c:\3ffxrlr.exec:\3ffxrlr.exe46⤵
- Executes dropped EXE
-
\??\c:\lfxlrrl.exec:\lfxlrrl.exe47⤵
- Executes dropped EXE
-
\??\c:\3thhtt.exec:\3thhtt.exe48⤵
- Executes dropped EXE
-
\??\c:\bthtbb.exec:\bthtbb.exe49⤵
- Executes dropped EXE
-
\??\c:\pvvvd.exec:\pvvvd.exe50⤵
- Executes dropped EXE
-
\??\c:\ppvpj.exec:\ppvpj.exe51⤵
- Executes dropped EXE
-
\??\c:\lxxxffl.exec:\lxxxffl.exe52⤵
- Executes dropped EXE
-
\??\c:\frxflfl.exec:\frxflfl.exe53⤵
- Executes dropped EXE
-
\??\c:\7tbbhh.exec:\7tbbhh.exe54⤵
- Executes dropped EXE
-
\??\c:\9thbhb.exec:\9thbhb.exe55⤵
- Executes dropped EXE
-
\??\c:\jvvpp.exec:\jvvpp.exe56⤵
- Executes dropped EXE
-
\??\c:\rlrrflr.exec:\rlrrflr.exe57⤵
- Executes dropped EXE
-
\??\c:\frxrrfl.exec:\frxrrfl.exe58⤵
- Executes dropped EXE
-
\??\c:\5djvj.exec:\5djvj.exe59⤵
- Executes dropped EXE
-
\??\c:\vjppp.exec:\vjppp.exe60⤵
- Executes dropped EXE
-
\??\c:\frffrlr.exec:\frffrlr.exe61⤵
- Executes dropped EXE
-
\??\c:\5fflfff.exec:\5fflfff.exe62⤵
- Executes dropped EXE
-
\??\c:\hbnttt.exec:\hbnttt.exe63⤵
- Executes dropped EXE
-
\??\c:\5nbbht.exec:\5nbbht.exe64⤵
- Executes dropped EXE
-
\??\c:\vjpjj.exec:\vjpjj.exe65⤵
- Executes dropped EXE
-
\??\c:\dppjp.exec:\dppjp.exe66⤵
-
\??\c:\5flllll.exec:\5flllll.exe67⤵
-
\??\c:\xlxxrxx.exec:\xlxxrxx.exe68⤵
-
\??\c:\bnnntb.exec:\bnnntb.exe69⤵
-
\??\c:\5bhhhh.exec:\5bhhhh.exe70⤵
-
\??\c:\9dvpp.exec:\9dvpp.exe71⤵
-
\??\c:\vpjdv.exec:\vpjdv.exe72⤵
-
\??\c:\1rlxxff.exec:\1rlxxff.exe73⤵
-
\??\c:\rfrrfxx.exec:\rfrrfxx.exe74⤵
-
\??\c:\xrrrffl.exec:\xrrrffl.exe75⤵
-
\??\c:\hthbbh.exec:\hthbbh.exe76⤵
-
\??\c:\thtttt.exec:\thtttt.exe77⤵
-
\??\c:\7jvjv.exec:\7jvjv.exe78⤵
-
\??\c:\dpdjv.exec:\dpdjv.exe79⤵
-
\??\c:\5frxxff.exec:\5frxxff.exe80⤵
-
\??\c:\xrllrfl.exec:\xrllrfl.exe81⤵
-
\??\c:\frfxxrr.exec:\frfxxrr.exe82⤵
-
\??\c:\9thttt.exec:\9thttt.exe83⤵
-
\??\c:\7thttn.exec:\7thttn.exe84⤵
-
\??\c:\ppdvd.exec:\ppdvd.exe85⤵
-
\??\c:\1jpjd.exec:\1jpjd.exe86⤵
-
\??\c:\rfffffr.exec:\rfffffr.exe87⤵
-
\??\c:\xrfflrf.exec:\xrfflrf.exe88⤵
-
\??\c:\9btnbb.exec:\9btnbb.exe89⤵
-
\??\c:\hnnhtt.exec:\hnnhtt.exe90⤵
-
\??\c:\pjdpj.exec:\pjdpj.exe91⤵
-
\??\c:\dvvpp.exec:\dvvpp.exe92⤵
-
\??\c:\lffxxrx.exec:\lffxxrx.exe93⤵
-
\??\c:\flfxxfr.exec:\flfxxfr.exe94⤵
-
\??\c:\1thntt.exec:\1thntt.exe95⤵
-
\??\c:\nbhhhh.exec:\nbhhhh.exe96⤵
-
\??\c:\7pddv.exec:\7pddv.exe97⤵
-
\??\c:\jpvdp.exec:\jpvdp.exe98⤵
-
\??\c:\rflllrr.exec:\rflllrr.exe99⤵
-
\??\c:\rlflxrx.exec:\rlflxrx.exe100⤵
-
\??\c:\5thtbb.exec:\5thtbb.exe101⤵
-
\??\c:\bnnnhb.exec:\bnnnhb.exe102⤵
-
\??\c:\thtbbb.exec:\thtbbb.exe103⤵
-
\??\c:\vvdjp.exec:\vvdjp.exe104⤵
-
\??\c:\pdvvd.exec:\pdvvd.exe105⤵
-
\??\c:\rlllfrl.exec:\rlllfrl.exe106⤵
-
\??\c:\5xxrrfl.exec:\5xxrrfl.exe107⤵
-
\??\c:\bhbbbt.exec:\bhbbbt.exe108⤵
-
\??\c:\9bbttt.exec:\9bbttt.exe109⤵
-
\??\c:\pdddv.exec:\pdddv.exe110⤵
-
\??\c:\jdppd.exec:\jdppd.exe111⤵
-
\??\c:\3frllrf.exec:\3frllrf.exe112⤵
-
\??\c:\frxrxxr.exec:\frxrxxr.exe113⤵
-
\??\c:\9thnnn.exec:\9thnnn.exe114⤵
-
\??\c:\nhnnbt.exec:\nhnnbt.exe115⤵
-
\??\c:\vdddj.exec:\vdddj.exe116⤵
-
\??\c:\vppvd.exec:\vppvd.exe117⤵
-
\??\c:\lrxxfxx.exec:\lrxxfxx.exe118⤵
-
\??\c:\3rlfrlx.exec:\3rlfrlx.exe119⤵
-
\??\c:\bnhntn.exec:\bnhntn.exe120⤵
-
\??\c:\7tbnnt.exec:\7tbnnt.exe121⤵
-
\??\c:\jvdvv.exec:\jvdvv.exe122⤵
-
\??\c:\9jpjj.exec:\9jpjj.exe123⤵
-
\??\c:\9lllfrx.exec:\9lllfrx.exe124⤵
-
\??\c:\lxrrxrx.exec:\lxrrxrx.exe125⤵
-
\??\c:\thbbnt.exec:\thbbnt.exe126⤵
-
\??\c:\btbttn.exec:\btbttn.exe127⤵
-
\??\c:\hbhbtt.exec:\hbhbtt.exe128⤵
-
\??\c:\9jpjd.exec:\9jpjd.exe129⤵
-
\??\c:\rxlxfxx.exec:\rxlxfxx.exe130⤵
-
\??\c:\xlrxxfl.exec:\xlrxxfl.exe131⤵
-
\??\c:\hntnbb.exec:\hntnbb.exe132⤵
-
\??\c:\pjvjd.exec:\pjvjd.exe133⤵
-
\??\c:\fxffllr.exec:\fxffllr.exe134⤵
-
\??\c:\rlxrfrf.exec:\rlxrfrf.exe135⤵
-
\??\c:\lrxxffr.exec:\lrxxffr.exe136⤵
-
\??\c:\thnntt.exec:\thnntt.exe137⤵
-
\??\c:\7jjjj.exec:\7jjjj.exe138⤵
-
\??\c:\9pjdv.exec:\9pjdv.exe139⤵
-
\??\c:\vpvjj.exec:\vpvjj.exe140⤵
-
\??\c:\5rfflrf.exec:\5rfflrf.exe141⤵
-
\??\c:\frrxxff.exec:\frrxxff.exe142⤵
-
\??\c:\5htttt.exec:\5htttt.exe143⤵
-
\??\c:\9ttttt.exec:\9ttttt.exe144⤵
-
\??\c:\3djpj.exec:\3djpj.exe145⤵
-
\??\c:\vpdvp.exec:\vpdvp.exe146⤵
-
\??\c:\fxlrfff.exec:\fxlrfff.exe147⤵
-
\??\c:\lxrxffl.exec:\lxrxffl.exe148⤵
-
\??\c:\btbbnn.exec:\btbbnn.exe149⤵
-
\??\c:\hthbhh.exec:\hthbhh.exe150⤵
-
\??\c:\7pjdj.exec:\7pjdj.exe151⤵
-
\??\c:\ddppd.exec:\ddppd.exe152⤵
-
\??\c:\xrrlrrx.exec:\xrrlrrx.exe153⤵
-
\??\c:\xlrxffl.exec:\xlrxffl.exe154⤵
-
\??\c:\nhnhnb.exec:\nhnhnb.exe155⤵
-
\??\c:\hbhhtn.exec:\hbhhtn.exe156⤵
-
\??\c:\pjjjp.exec:\pjjjp.exe157⤵
-
\??\c:\vjvvd.exec:\vjvvd.exe158⤵
-
\??\c:\rrfxllr.exec:\rrfxllr.exe159⤵
-
\??\c:\llrxrrx.exec:\llrxrrx.exe160⤵
-
\??\c:\9hnhtn.exec:\9hnhtn.exe161⤵
-
\??\c:\1btbbb.exec:\1btbbb.exe162⤵
-
\??\c:\tnnnnn.exec:\tnnnnn.exe163⤵
-
\??\c:\3djdv.exec:\3djdv.exe164⤵
-
\??\c:\dvdjp.exec:\dvdjp.exe165⤵
-
\??\c:\xrrxllr.exec:\xrrxllr.exe166⤵
-
\??\c:\5xflxfx.exec:\5xflxfx.exe167⤵
-
\??\c:\1fxflrf.exec:\1fxflrf.exe168⤵
-
\??\c:\hthhnn.exec:\hthhnn.exe169⤵
-
\??\c:\3nbttn.exec:\3nbttn.exe170⤵
-
\??\c:\3dpjp.exec:\3dpjp.exe171⤵
-
\??\c:\5jjdd.exec:\5jjdd.exe172⤵
-
\??\c:\5frrrrx.exec:\5frrrrx.exe173⤵
-
\??\c:\lflxrrx.exec:\lflxrrx.exe174⤵
-
\??\c:\tnbbhh.exec:\tnbbhh.exe175⤵
-
\??\c:\hhnbth.exec:\hhnbth.exe176⤵
-
\??\c:\dpddd.exec:\dpddd.exe177⤵
-
\??\c:\pdjvd.exec:\pdjvd.exe178⤵
-
\??\c:\lxrllff.exec:\lxrllff.exe179⤵
-
\??\c:\rlxlrrf.exec:\rlxlrrf.exe180⤵
-
\??\c:\3nbtbh.exec:\3nbtbh.exe181⤵
-
\??\c:\thnnhh.exec:\thnnhh.exe182⤵
-
\??\c:\bnnttb.exec:\bnnttb.exe183⤵
-
\??\c:\dpdjp.exec:\dpdjp.exe184⤵
-
\??\c:\vpddj.exec:\vpddj.exe185⤵
-
\??\c:\lxlllxl.exec:\lxlllxl.exe186⤵
-
\??\c:\frlxxll.exec:\frlxxll.exe187⤵
-
\??\c:\hthntt.exec:\hthntt.exe188⤵
-
\??\c:\tnhntt.exec:\tnhntt.exe189⤵
-
\??\c:\1dpvp.exec:\1dpvp.exe190⤵
-
\??\c:\djppd.exec:\djppd.exe191⤵
-
\??\c:\7lrfxxr.exec:\7lrfxxr.exe192⤵
-
\??\c:\9fxrxfl.exec:\9fxrxfl.exe193⤵
-
\??\c:\7nbhtn.exec:\7nbhtn.exe194⤵
-
\??\c:\tntnnh.exec:\tntnnh.exe195⤵
-
\??\c:\jvvvp.exec:\jvvvp.exe196⤵
-
\??\c:\5vjjj.exec:\5vjjj.exe197⤵
-
\??\c:\lxllxxl.exec:\lxllxxl.exe198⤵
-
\??\c:\xfxrxfl.exec:\xfxrxfl.exe199⤵
-
\??\c:\nthbnt.exec:\nthbnt.exe200⤵
-
\??\c:\bthtbb.exec:\bthtbb.exe201⤵
-
\??\c:\pjvjd.exec:\pjvjd.exe202⤵
-
\??\c:\vdjvv.exec:\vdjvv.exe203⤵
-
\??\c:\7rlrrrr.exec:\7rlrrrr.exe204⤵
-
\??\c:\xffxlrx.exec:\xffxlrx.exe205⤵
-
\??\c:\bttthb.exec:\bttthb.exe206⤵
-
\??\c:\thnbhh.exec:\thnbhh.exe207⤵
-
\??\c:\thtntt.exec:\thtntt.exe208⤵
-
\??\c:\vppvv.exec:\vppvv.exe209⤵
-
\??\c:\dppdd.exec:\dppdd.exe210⤵
-
\??\c:\rlrrrlx.exec:\rlrrrlx.exe211⤵
-
\??\c:\5flrfxf.exec:\5flrfxf.exe212⤵
-
\??\c:\xllrfxf.exec:\xllrfxf.exe213⤵
-
\??\c:\htbntt.exec:\htbntt.exe214⤵
-
\??\c:\llxxllr.exec:\llxxllr.exe215⤵
-
\??\c:\frxxlff.exec:\frxxlff.exe216⤵
-
\??\c:\frlrrrl.exec:\frlrrrl.exe217⤵
-
\??\c:\1bbbtt.exec:\1bbbtt.exe218⤵
-
\??\c:\3btthh.exec:\3btthh.exe219⤵
-
\??\c:\pdvdd.exec:\pdvdd.exe220⤵
-
\??\c:\rffflfl.exec:\rffflfl.exe221⤵
-
\??\c:\tbnnhn.exec:\tbnnhn.exe222⤵
-
\??\c:\thnhnt.exec:\thnhnt.exe223⤵
-
\??\c:\1nttth.exec:\1nttth.exe224⤵
-
\??\c:\9vjdd.exec:\9vjdd.exe225⤵
-
\??\c:\vjjdd.exec:\vjjdd.exe226⤵
-
\??\c:\7lrlrrf.exec:\7lrlrrf.exe227⤵
-
\??\c:\5lrllll.exec:\5lrllll.exe228⤵
-
\??\c:\lffffff.exec:\lffffff.exe229⤵
-
\??\c:\3hnttt.exec:\3hnttt.exe230⤵
-
\??\c:\hbhttt.exec:\hbhttt.exe231⤵
-
\??\c:\5jppj.exec:\5jppj.exe232⤵
-
\??\c:\dvdvp.exec:\dvdvp.exe233⤵
-
\??\c:\lffflfl.exec:\lffflfl.exe234⤵
-
\??\c:\5llfllr.exec:\5llfllr.exe235⤵
-
\??\c:\flrxrll.exec:\flrxrll.exe236⤵
-
\??\c:\btbbbt.exec:\btbbbt.exe237⤵
-
\??\c:\7tbbbb.exec:\7tbbbb.exe238⤵
-
\??\c:\vddvv.exec:\vddvv.exe239⤵
-
\??\c:\vjpjj.exec:\vjpjj.exe240⤵
-
\??\c:\5flflxx.exec:\5flflxx.exe241⤵