Analysis
-
max time kernel
43s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 06:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe
-
Size
93KB
-
MD5
0486f1a755983c9016c8a589c7c12286
-
SHA1
451f9d37369d2d6845dc795fe0a6ae5d784b5caf
-
SHA256
a9994482e4ad4c2563f0f7687b79d3545dcd6f2cd090196b7f773ae56d149db0
-
SHA512
dd1d187fae2269d7a4f5b6874e441929d0a1bca4c05d4fd306dbbe99aa4de73f120981a1a4bd9d67abb252e1297dc1979bcc9266f9057d4a5ac3f38488631b06
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+mzv7oEzNcI2w0V:ymb3NkkiQ3mdBjF+3TYzvTu
Malware Config
Signatures
-
Detect Blackmoon payload 29 IoCs
Processes:
resource yara_rule behavioral2/memory/3392-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4616-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1644-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4680-26-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4680-25-0x0000000000540000-0x0000000000580000-memory.dmp family_blackmoon behavioral2/memory/2432-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4172-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4460-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4460-48-0x0000000000550000-0x0000000000590000-memory.dmp family_blackmoon behavioral2/memory/1540-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3604-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5084-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1216-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3308-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3016-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2900-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2160-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2780-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3340-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2096-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4416-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2136-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/732-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/552-164-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4152-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1504-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4004-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1616-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4016-206-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
tntnnn.exe7xflffl.exebnnnnh.exedjpjd.exe9llfxxr.exexrxxxxx.exe1vdvj.exerlrlffx.exenhthnh.exehhnnnn.exepvppp.exelxflffr.exetthbbt.exevvvpj.exejdjdd.exerflffff.exethbbbb.exe3vppj.exe3llrrrl.exelxffffx.exehnnnhb.exehtbthh.exejddvv.exe1ffrrll.exehbhhhb.exejdppp.exe7vddp.exexflflfx.exebbnhnh.exejpdvp.exejdjdv.exerrfxxrl.exehbhbtt.exevvvjd.exefflfxrl.exellflxrf.exehthhbb.exetnnnhh.exedpvpp.exepjvpd.exe1llxrrf.exexrrrfxf.exefxfxfxf.exe1tbbbt.exejppjd.exefrrrlff.exerffxrrl.exehhhtnn.exetnbttn.exedvppv.exedvjjv.exerfllllr.exexflffff.exe5bhbtt.exevpdvv.exeflrffxx.exellrrxfl.exexrlllfx.exenttnhh.exe7pjdd.exexllrfff.exelffxrrl.exebhnttt.exepjpjd.exepid process 4616 tntnnn.exe 1644 7xflffl.exe 4680 bnnnnh.exe 2432 djpjd.exe 4172 9llfxxr.exe 4460 xrxxxxx.exe 1540 1vdvj.exe 3604 rlrlffx.exe 5084 nhthnh.exe 1216 hhnnnn.exe 3308 pvppp.exe 3016 lxflffr.exe 2900 tthbbt.exe 2160 vvvpj.exe 2780 jdjdd.exe 3340 rflffff.exe 2096 thbbbb.exe 4416 3vppj.exe 3196 3llrrrl.exe 2136 lxffffx.exe 732 hnnnhb.exe 3508 htbthh.exe 2180 jddvv.exe 552 1ffrrll.exe 4152 hbhhhb.exe 3992 jdppp.exe 1504 7vddp.exe 2492 xflflfx.exe 4004 bbnhnh.exe 1616 jpdvp.exe 4016 jdjdv.exe 2112 rrfxxrl.exe 4420 hbhbtt.exe 792 vvvjd.exe 3108 fflfxrl.exe 4776 llflxrf.exe 4488 hthhbb.exe 2144 tnnnhh.exe 4372 dpvpp.exe 4856 pjvpd.exe 4780 1llxrrf.exe 3164 xrrrfxf.exe 1936 fxfxfxf.exe 1392 1tbbbt.exe 1964 jppjd.exe 2920 frrrlff.exe 4172 rffxrrl.exe 1036 hhhtnn.exe 3548 tnbttn.exe 4668 dvppv.exe 1088 dvjjv.exe 2544 rfllllr.exe 3288 xflffff.exe 1012 5bhbtt.exe 1800 vpdvv.exe 3016 flrffxx.exe 5072 llrrxfl.exe 2264 xrlllfx.exe 376 nttnhh.exe 640 7pjdd.exe 2944 xllrfff.exe 3568 lffxrrl.exe 968 bhnttt.exe 4796 pjpjd.exe -
Processes:
resource yara_rule behavioral2/memory/3392-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4616-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1644-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4680-26-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2432-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4172-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4460-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1540-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3604-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5084-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1216-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3308-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3016-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2900-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2160-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2780-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3340-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2096-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4416-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2136-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/732-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/552-164-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4152-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1504-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1616-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4016-206-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exetntnnn.exe7xflffl.exebnnnnh.exedjpjd.exe9llfxxr.exexrxxxxx.exe1vdvj.exerlrlffx.exenhthnh.exehhnnnn.exepvppp.exelxflffr.exetthbbt.exevvvpj.exejdjdd.exerflffff.exethbbbb.exe3vppj.exe3llrrrl.exelxffffx.exehnnnhb.exedescription pid process target process PID 3392 wrote to memory of 4616 3392 0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe tntnnn.exe PID 3392 wrote to memory of 4616 3392 0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe tntnnn.exe PID 3392 wrote to memory of 4616 3392 0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe tntnnn.exe PID 4616 wrote to memory of 1644 4616 tntnnn.exe 7xflffl.exe PID 4616 wrote to memory of 1644 4616 tntnnn.exe 7xflffl.exe PID 4616 wrote to memory of 1644 4616 tntnnn.exe 7xflffl.exe PID 1644 wrote to memory of 4680 1644 7xflffl.exe bnnnnh.exe PID 1644 wrote to memory of 4680 1644 7xflffl.exe bnnnnh.exe PID 1644 wrote to memory of 4680 1644 7xflffl.exe bnnnnh.exe PID 4680 wrote to memory of 2432 4680 bnnnnh.exe djpjd.exe PID 4680 wrote to memory of 2432 4680 bnnnnh.exe djpjd.exe PID 4680 wrote to memory of 2432 4680 bnnnnh.exe djpjd.exe PID 2432 wrote to memory of 4172 2432 djpjd.exe 9llfxxr.exe PID 2432 wrote to memory of 4172 2432 djpjd.exe 9llfxxr.exe PID 2432 wrote to memory of 4172 2432 djpjd.exe 9llfxxr.exe PID 4172 wrote to memory of 4460 4172 9llfxxr.exe xrxxxxx.exe PID 4172 wrote to memory of 4460 4172 9llfxxr.exe xrxxxxx.exe PID 4172 wrote to memory of 4460 4172 9llfxxr.exe xrxxxxx.exe PID 4460 wrote to memory of 1540 4460 xrxxxxx.exe 1vdvj.exe PID 4460 wrote to memory of 1540 4460 xrxxxxx.exe 1vdvj.exe PID 4460 wrote to memory of 1540 4460 xrxxxxx.exe 1vdvj.exe PID 1540 wrote to memory of 3604 1540 1vdvj.exe rlrlffx.exe PID 1540 wrote to memory of 3604 1540 1vdvj.exe rlrlffx.exe PID 1540 wrote to memory of 3604 1540 1vdvj.exe rlrlffx.exe PID 3604 wrote to memory of 5084 3604 rlrlffx.exe nhthnh.exe PID 3604 wrote to memory of 5084 3604 rlrlffx.exe nhthnh.exe PID 3604 wrote to memory of 5084 3604 rlrlffx.exe nhthnh.exe PID 5084 wrote to memory of 1216 5084 nhthnh.exe hhnnnn.exe PID 5084 wrote to memory of 1216 5084 nhthnh.exe hhnnnn.exe PID 5084 wrote to memory of 1216 5084 nhthnh.exe hhnnnn.exe PID 1216 wrote to memory of 3308 1216 hhnnnn.exe pvppp.exe PID 1216 wrote to memory of 3308 1216 hhnnnn.exe pvppp.exe PID 1216 wrote to memory of 3308 1216 hhnnnn.exe pvppp.exe PID 3308 wrote to memory of 3016 3308 pvppp.exe lxflffr.exe PID 3308 wrote to memory of 3016 3308 pvppp.exe lxflffr.exe PID 3308 wrote to memory of 3016 3308 pvppp.exe lxflffr.exe PID 3016 wrote to memory of 2900 3016 lxflffr.exe tthbbt.exe PID 3016 wrote to memory of 2900 3016 lxflffr.exe tthbbt.exe PID 3016 wrote to memory of 2900 3016 lxflffr.exe tthbbt.exe PID 2900 wrote to memory of 2160 2900 tthbbt.exe vvvpj.exe PID 2900 wrote to memory of 2160 2900 tthbbt.exe vvvpj.exe PID 2900 wrote to memory of 2160 2900 tthbbt.exe vvvpj.exe PID 2160 wrote to memory of 2780 2160 vvvpj.exe jdjdd.exe PID 2160 wrote to memory of 2780 2160 vvvpj.exe jdjdd.exe PID 2160 wrote to memory of 2780 2160 vvvpj.exe jdjdd.exe PID 2780 wrote to memory of 3340 2780 jdjdd.exe rflffff.exe PID 2780 wrote to memory of 3340 2780 jdjdd.exe rflffff.exe PID 2780 wrote to memory of 3340 2780 jdjdd.exe rflffff.exe PID 3340 wrote to memory of 2096 3340 rflffff.exe thbbbb.exe PID 3340 wrote to memory of 2096 3340 rflffff.exe thbbbb.exe PID 3340 wrote to memory of 2096 3340 rflffff.exe thbbbb.exe PID 2096 wrote to memory of 4416 2096 thbbbb.exe 3vppj.exe PID 2096 wrote to memory of 4416 2096 thbbbb.exe 3vppj.exe PID 2096 wrote to memory of 4416 2096 thbbbb.exe 3vppj.exe PID 4416 wrote to memory of 3196 4416 3vppj.exe 3llrrrl.exe PID 4416 wrote to memory of 3196 4416 3vppj.exe 3llrrrl.exe PID 4416 wrote to memory of 3196 4416 3vppj.exe 3llrrrl.exe PID 3196 wrote to memory of 2136 3196 3llrrrl.exe lxffffx.exe PID 3196 wrote to memory of 2136 3196 3llrrrl.exe lxffffx.exe PID 3196 wrote to memory of 2136 3196 3llrrrl.exe lxffffx.exe PID 2136 wrote to memory of 732 2136 lxffffx.exe hnnnhb.exe PID 2136 wrote to memory of 732 2136 lxffffx.exe hnnnhb.exe PID 2136 wrote to memory of 732 2136 lxffffx.exe hnnnhb.exe PID 732 wrote to memory of 3508 732 hnnnhb.exe htbthh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0486f1a755983c9016c8a589c7c12286_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\tntnnn.exec:\tntnnn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7xflffl.exec:\7xflffl.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnnnnh.exec:\bnnnnh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\djpjd.exec:\djpjd.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9llfxxr.exec:\9llfxxr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrxxxxx.exec:\xrxxxxx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1vdvj.exec:\1vdvj.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rlrlffx.exec:\rlrlffx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhthnh.exec:\nhthnh.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhnnnn.exec:\hhnnnn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvppp.exec:\pvppp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxflffr.exec:\lxflffr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tthbbt.exec:\tthbbt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvvpj.exec:\vvvpj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdjdd.exec:\jdjdd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rflffff.exec:\rflffff.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\thbbbb.exec:\thbbbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3vppj.exec:\3vppj.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3llrrrl.exec:\3llrrrl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxffffx.exec:\lxffffx.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hnnnhb.exec:\hnnnhb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\htbthh.exec:\htbthh.exe23⤵
- Executes dropped EXE
-
\??\c:\jddvv.exec:\jddvv.exe24⤵
- Executes dropped EXE
-
\??\c:\1ffrrll.exec:\1ffrrll.exe25⤵
- Executes dropped EXE
-
\??\c:\hbhhhb.exec:\hbhhhb.exe26⤵
- Executes dropped EXE
-
\??\c:\jdppp.exec:\jdppp.exe27⤵
- Executes dropped EXE
-
\??\c:\7vddp.exec:\7vddp.exe28⤵
- Executes dropped EXE
-
\??\c:\xflflfx.exec:\xflflfx.exe29⤵
- Executes dropped EXE
-
\??\c:\bbnhnh.exec:\bbnhnh.exe30⤵
- Executes dropped EXE
-
\??\c:\jpdvp.exec:\jpdvp.exe31⤵
- Executes dropped EXE
-
\??\c:\jdjdv.exec:\jdjdv.exe32⤵
- Executes dropped EXE
-
\??\c:\rrfxxrl.exec:\rrfxxrl.exe33⤵
- Executes dropped EXE
-
\??\c:\hbhbtt.exec:\hbhbtt.exe34⤵
- Executes dropped EXE
-
\??\c:\vvvjd.exec:\vvvjd.exe35⤵
- Executes dropped EXE
-
\??\c:\fflfxrl.exec:\fflfxrl.exe36⤵
- Executes dropped EXE
-
\??\c:\llflxrf.exec:\llflxrf.exe37⤵
- Executes dropped EXE
-
\??\c:\hthhbb.exec:\hthhbb.exe38⤵
- Executes dropped EXE
-
\??\c:\tnnnhh.exec:\tnnnhh.exe39⤵
- Executes dropped EXE
-
\??\c:\dpvpp.exec:\dpvpp.exe40⤵
- Executes dropped EXE
-
\??\c:\pjvpd.exec:\pjvpd.exe41⤵
- Executes dropped EXE
-
\??\c:\1llxrrf.exec:\1llxrrf.exe42⤵
- Executes dropped EXE
-
\??\c:\xrrrfxf.exec:\xrrrfxf.exe43⤵
- Executes dropped EXE
-
\??\c:\fxfxfxf.exec:\fxfxfxf.exe44⤵
- Executes dropped EXE
-
\??\c:\1tbbbt.exec:\1tbbbt.exe45⤵
- Executes dropped EXE
-
\??\c:\jppjd.exec:\jppjd.exe46⤵
- Executes dropped EXE
-
\??\c:\frrrlff.exec:\frrrlff.exe47⤵
- Executes dropped EXE
-
\??\c:\rffxrrl.exec:\rffxrrl.exe48⤵
- Executes dropped EXE
-
\??\c:\hhhtnn.exec:\hhhtnn.exe49⤵
- Executes dropped EXE
-
\??\c:\tnbttn.exec:\tnbttn.exe50⤵
- Executes dropped EXE
-
\??\c:\dvppv.exec:\dvppv.exe51⤵
- Executes dropped EXE
-
\??\c:\dvjjv.exec:\dvjjv.exe52⤵
- Executes dropped EXE
-
\??\c:\rfllllr.exec:\rfllllr.exe53⤵
- Executes dropped EXE
-
\??\c:\xflffff.exec:\xflffff.exe54⤵
- Executes dropped EXE
-
\??\c:\5bhbtt.exec:\5bhbtt.exe55⤵
- Executes dropped EXE
-
\??\c:\vpdvv.exec:\vpdvv.exe56⤵
- Executes dropped EXE
-
\??\c:\flrffxx.exec:\flrffxx.exe57⤵
- Executes dropped EXE
-
\??\c:\llrrxfl.exec:\llrrxfl.exe58⤵
- Executes dropped EXE
-
\??\c:\xrlllfx.exec:\xrlllfx.exe59⤵
- Executes dropped EXE
-
\??\c:\nttnhh.exec:\nttnhh.exe60⤵
- Executes dropped EXE
-
\??\c:\7pjdd.exec:\7pjdd.exe61⤵
- Executes dropped EXE
-
\??\c:\xllrfff.exec:\xllrfff.exe62⤵
- Executes dropped EXE
-
\??\c:\lffxrrl.exec:\lffxrrl.exe63⤵
- Executes dropped EXE
-
\??\c:\bhnttt.exec:\bhnttt.exe64⤵
- Executes dropped EXE
-
\??\c:\pjpjd.exec:\pjpjd.exe65⤵
- Executes dropped EXE
-
\??\c:\3llfxxr.exec:\3llfxxr.exe66⤵
-
\??\c:\hbttnn.exec:\hbttnn.exe67⤵
-
\??\c:\nbhbbt.exec:\nbhbbt.exe68⤵
-
\??\c:\jjpjj.exec:\jjpjj.exe69⤵
-
\??\c:\llllllf.exec:\llllllf.exe70⤵
-
\??\c:\nbhnnn.exec:\nbhnnn.exe71⤵
-
\??\c:\nntthh.exec:\nntthh.exe72⤵
-
\??\c:\pjjdp.exec:\pjjdp.exe73⤵
-
\??\c:\lxfxrll.exec:\lxfxrll.exe74⤵
-
\??\c:\xrxxffx.exec:\xrxxffx.exe75⤵
-
\??\c:\vvpvp.exec:\vvpvp.exe76⤵
-
\??\c:\jjvpj.exec:\jjvpj.exe77⤵
-
\??\c:\lfxrrlf.exec:\lfxrrlf.exe78⤵
-
\??\c:\ttnnhh.exec:\ttnnhh.exe79⤵
-
\??\c:\vpvjj.exec:\vpvjj.exe80⤵
-
\??\c:\1lxxfrl.exec:\1lxxfrl.exe81⤵
-
\??\c:\llxlfff.exec:\llxlfff.exe82⤵
-
\??\c:\htnhtt.exec:\htnhtt.exe83⤵
-
\??\c:\fxxxllx.exec:\fxxxllx.exe84⤵
-
\??\c:\frllfxf.exec:\frllfxf.exe85⤵
-
\??\c:\htbtnn.exec:\htbtnn.exe86⤵
-
\??\c:\vjjdp.exec:\vjjdp.exe87⤵
-
\??\c:\jvjjd.exec:\jvjjd.exe88⤵
-
\??\c:\rlrlfff.exec:\rlrlfff.exe89⤵
-
\??\c:\3btbbt.exec:\3btbbt.exe90⤵
-
\??\c:\htthbt.exec:\htthbt.exe91⤵
-
\??\c:\vvppj.exec:\vvppj.exe92⤵
-
\??\c:\rxxrffr.exec:\rxxrffr.exe93⤵
-
\??\c:\hbbbth.exec:\hbbbth.exe94⤵
-
\??\c:\thnbtt.exec:\thnbtt.exe95⤵
-
\??\c:\7jddp.exec:\7jddp.exe96⤵
-
\??\c:\vdjjj.exec:\vdjjj.exe97⤵
-
\??\c:\lfxrfff.exec:\lfxrfff.exe98⤵
-
\??\c:\lllllll.exec:\lllllll.exe99⤵
-
\??\c:\hbhhnn.exec:\hbhhnn.exe100⤵
-
\??\c:\vdvpd.exec:\vdvpd.exe101⤵
-
\??\c:\9vdvj.exec:\9vdvj.exe102⤵
-
\??\c:\7xfrrrl.exec:\7xfrrrl.exe103⤵
-
\??\c:\lxflfff.exec:\lxflfff.exe104⤵
-
\??\c:\nhhntt.exec:\nhhntt.exe105⤵
-
\??\c:\bttnhh.exec:\bttnhh.exe106⤵
-
\??\c:\9ppjd.exec:\9ppjd.exe107⤵
-
\??\c:\frrllll.exec:\frrllll.exe108⤵
-
\??\c:\xllfxxr.exec:\xllfxxr.exe109⤵
-
\??\c:\nhhbtt.exec:\nhhbtt.exe110⤵
-
\??\c:\tnbttt.exec:\tnbttt.exe111⤵
-
\??\c:\3ddvp.exec:\3ddvp.exe112⤵
-
\??\c:\ddpjv.exec:\ddpjv.exe113⤵
-
\??\c:\frffxxr.exec:\frffxxr.exe114⤵
-
\??\c:\9rrllfl.exec:\9rrllfl.exe115⤵
-
\??\c:\nbtntn.exec:\nbtntn.exe116⤵
-
\??\c:\pdvpv.exec:\pdvpv.exe117⤵
-
\??\c:\fflflrf.exec:\fflflrf.exe118⤵
-
\??\c:\xrrlffx.exec:\xrrlffx.exe119⤵
-
\??\c:\ppddd.exec:\ppddd.exe120⤵
-
\??\c:\vjpjj.exec:\vjpjj.exe121⤵
-
\??\c:\lrxxllf.exec:\lrxxllf.exe122⤵
-
\??\c:\hbhbhh.exec:\hbhbhh.exe123⤵
-
\??\c:\hnbtnn.exec:\hnbtnn.exe124⤵
-
\??\c:\vpjdj.exec:\vpjdj.exe125⤵
-
\??\c:\vpdpv.exec:\vpdpv.exe126⤵
-
\??\c:\flrlffx.exec:\flrlffx.exe127⤵
-
\??\c:\hbnhnn.exec:\hbnhnn.exe128⤵
-
\??\c:\1thbbb.exec:\1thbbb.exe129⤵
-
\??\c:\djjpj.exec:\djjpj.exe130⤵
-
\??\c:\5xlxlll.exec:\5xlxlll.exe131⤵
-
\??\c:\rxrlfxx.exec:\rxrlfxx.exe132⤵
-
\??\c:\hntttt.exec:\hntttt.exe133⤵
-
\??\c:\dvdjj.exec:\dvdjj.exe134⤵
-
\??\c:\pjpjd.exec:\pjpjd.exe135⤵
-
\??\c:\ffxrxxf.exec:\ffxrxxf.exe136⤵
-
\??\c:\xfllllx.exec:\xfllllx.exe137⤵
-
\??\c:\7hhhhb.exec:\7hhhhb.exe138⤵
-
\??\c:\dvvpp.exec:\dvvpp.exe139⤵
-
\??\c:\dvdvp.exec:\dvdvp.exe140⤵
-
\??\c:\djppp.exec:\djppp.exe141⤵
-
\??\c:\5lfxllf.exec:\5lfxllf.exe142⤵
-
\??\c:\tnbhnn.exec:\tnbhnn.exe143⤵
-
\??\c:\dppdj.exec:\dppdj.exe144⤵
-
\??\c:\ddjdp.exec:\ddjdp.exe145⤵
-
\??\c:\lffflll.exec:\lffflll.exe146⤵
-
\??\c:\fxfrlll.exec:\fxfrlll.exe147⤵
-
\??\c:\thhbtt.exec:\thhbtt.exe148⤵
-
\??\c:\dpvpj.exec:\dpvpj.exe149⤵
-
\??\c:\ddvpp.exec:\ddvpp.exe150⤵
-
\??\c:\flrrlff.exec:\flrrlff.exe151⤵
-
\??\c:\7xrlfxr.exec:\7xrlfxr.exe152⤵
-
\??\c:\nhtntt.exec:\nhtntt.exe153⤵
-
\??\c:\bbbthb.exec:\bbbthb.exe154⤵
-
\??\c:\3dvvj.exec:\3dvvj.exe155⤵
-
\??\c:\pvdpd.exec:\pvdpd.exe156⤵
-
\??\c:\lxxrflf.exec:\lxxrflf.exe157⤵
-
\??\c:\tnbbbb.exec:\tnbbbb.exe158⤵
-
\??\c:\pjjjd.exec:\pjjjd.exe159⤵
-
\??\c:\jdvdp.exec:\jdvdp.exe160⤵
-
\??\c:\xrrxrxr.exec:\xrrxrxr.exe161⤵
-
\??\c:\xlrxlfx.exec:\xlrxlfx.exe162⤵
-
\??\c:\vvvjp.exec:\vvvjp.exe163⤵
-
\??\c:\dvddv.exec:\dvddv.exe164⤵
-
\??\c:\rllfrrr.exec:\rllfrrr.exe165⤵
-
\??\c:\xxrrfxr.exec:\xxrrfxr.exe166⤵
-
\??\c:\bnhbtt.exec:\bnhbtt.exe167⤵
-
\??\c:\pjddp.exec:\pjddp.exe168⤵
-
\??\c:\jvpdv.exec:\jvpdv.exe169⤵
-
\??\c:\lrrrfll.exec:\lrrrfll.exe170⤵
-
\??\c:\lrxrlfx.exec:\lrxrlfx.exe171⤵
-
\??\c:\ntbthb.exec:\ntbthb.exe172⤵
-
\??\c:\vdjdp.exec:\vdjdp.exe173⤵
-
\??\c:\vjdvd.exec:\vjdvd.exe174⤵
-
\??\c:\rflfrrl.exec:\rflfrrl.exe175⤵
-
\??\c:\fffxlfr.exec:\fffxlfr.exe176⤵
-
\??\c:\thnhhh.exec:\thnhhh.exe177⤵
-
\??\c:\9bbttn.exec:\9bbttn.exe178⤵
-
\??\c:\1dvpd.exec:\1dvpd.exe179⤵
-
\??\c:\frlxffr.exec:\frlxffr.exe180⤵
-
\??\c:\flllfxl.exec:\flllfxl.exe181⤵
-
\??\c:\nhtttt.exec:\nhtttt.exe182⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe183⤵
-
\??\c:\1jjdd.exec:\1jjdd.exe184⤵
-
\??\c:\lrxrfxr.exec:\lrxrfxr.exe185⤵
-
\??\c:\nhtbnh.exec:\nhtbnh.exe186⤵
-
\??\c:\tbtnhh.exec:\tbtnhh.exe187⤵
-
\??\c:\pdppv.exec:\pdppv.exe188⤵
-
\??\c:\1rlxllx.exec:\1rlxllx.exe189⤵
-
\??\c:\7xllxrl.exec:\7xllxrl.exe190⤵
-
\??\c:\9ttnnh.exec:\9ttnnh.exe191⤵
-
\??\c:\vvpjd.exec:\vvpjd.exe192⤵
-
\??\c:\vvvpv.exec:\vvvpv.exe193⤵
-
\??\c:\rfrxxff.exec:\rfrxxff.exe194⤵
-
\??\c:\fxxxrlf.exec:\fxxxrlf.exe195⤵
-
\??\c:\htbnhh.exec:\htbnhh.exe196⤵
-
\??\c:\vpvpd.exec:\vpvpd.exe197⤵
-
\??\c:\5dvpd.exec:\5dvpd.exe198⤵
-
\??\c:\fxfffxr.exec:\fxfffxr.exe199⤵
-
\??\c:\fxxlxrl.exec:\fxxlxrl.exe200⤵
-
\??\c:\nttnbb.exec:\nttnbb.exe201⤵
-
\??\c:\nhbnhn.exec:\nhbnhn.exe202⤵
-
\??\c:\djddd.exec:\djddd.exe203⤵
-
\??\c:\rlllxfx.exec:\rlllxfx.exe204⤵
-
\??\c:\xxxrlrl.exec:\xxxrlrl.exe205⤵
-
\??\c:\nhnbnh.exec:\nhnbnh.exe206⤵
-
\??\c:\hthbtn.exec:\hthbtn.exe207⤵
-
\??\c:\pjjdd.exec:\pjjdd.exe208⤵
-
\??\c:\jdjjd.exec:\jdjjd.exe209⤵
-
\??\c:\lllffff.exec:\lllffff.exe210⤵
-
\??\c:\9hbtnh.exec:\9hbtnh.exe211⤵
-
\??\c:\hnbbbb.exec:\hnbbbb.exe212⤵
-
\??\c:\vjpdd.exec:\vjpdd.exe213⤵
-
\??\c:\fxrrfxr.exec:\fxrrfxr.exe214⤵
-
\??\c:\xfffrlf.exec:\xfffrlf.exe215⤵
-
\??\c:\nhbtnh.exec:\nhbtnh.exe216⤵
-
\??\c:\3nnhbb.exec:\3nnhbb.exe217⤵
-
\??\c:\pdvvp.exec:\pdvvp.exe218⤵
-
\??\c:\lrxrffx.exec:\lrxrffx.exe219⤵
-
\??\c:\lrrfxlx.exec:\lrrfxlx.exe220⤵
-
\??\c:\tbhbht.exec:\tbhbht.exe221⤵
-
\??\c:\nbhbht.exec:\nbhbht.exe222⤵
-
\??\c:\pjvjj.exec:\pjvjj.exe223⤵
-
\??\c:\vjjvv.exec:\vjjvv.exe224⤵
-
\??\c:\xllfxxl.exec:\xllfxxl.exe225⤵
-
\??\c:\xlrfffl.exec:\xlrfffl.exe226⤵
-
\??\c:\5tnhbb.exec:\5tnhbb.exe227⤵
-
\??\c:\ntthnn.exec:\ntthnn.exe228⤵
-
\??\c:\jdvdp.exec:\jdvdp.exe229⤵
-
\??\c:\vvvvj.exec:\vvvvj.exe230⤵
-
\??\c:\lrfxlfx.exec:\lrfxlfx.exe231⤵
-
\??\c:\lllxrlr.exec:\lllxrlr.exe232⤵
-
\??\c:\9nhbth.exec:\9nhbth.exe233⤵
-
\??\c:\nbnhth.exec:\nbnhth.exe234⤵
-
\??\c:\pjvpp.exec:\pjvpp.exe235⤵
-
\??\c:\xrfrfxl.exec:\xrfrfxl.exe236⤵
-
\??\c:\fllfffx.exec:\fllfffx.exe237⤵
-
\??\c:\tbbtnh.exec:\tbbtnh.exe238⤵
-
\??\c:\bhhthb.exec:\bhhthb.exe239⤵
-
\??\c:\ddvpp.exec:\ddvpp.exe240⤵
-
\??\c:\5vpdp.exec:\5vpdp.exe241⤵