Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 13:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe
Resource
win7-20240508-en
5 signatures
150 seconds
General
-
Target
677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe
-
Size
231KB
-
MD5
677fa54db2e2c164662d063d8748efe6
-
SHA1
5d4daf203f487b26531e67d28466bca3112ce4ab
-
SHA256
a9d83a26da0e1b8d80afd5f699cf03e00f6a4f9ad86ad5c65603d43ea27c76ab
-
SHA512
8e7b9f619a3c91cbfdb75ac092f9cc90e6cb880282176aaa660e01ddd82356a250c920f795cf69c6ec9997a8ee2da3133291d093a9191f7a621c0878b51ed2e3
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xL8eBWOgX:n3C9BRo7MlrWKo+lxK8eBWVX
Malware Config
Signatures
-
Detect Blackmoon payload 23 IoCs
Processes:
resource yara_rule behavioral1/memory/1684-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1244-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2128-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2320-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2728-55-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2788-50-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2724-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2680-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2444-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2568-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2168-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2820-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2032-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2036-150-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2216-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/896-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1140-186-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1724-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2108-222-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2604-232-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/628-240-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
tnhtbn.exepdppd.exe5rrxrfx.exenhnntt.exe5dppv.exe1flrlrr.exebththn.exelfrrxff.exe5xlxlrf.exedvpvd.exelfrfllr.exefxllxfl.exeddppv.exevvvjp.exefrflxfl.exebnbhbt.exe9jdpp.exe9lfllrr.exehtnthb.exe3vdvd.exevjvdp.exe3nhbtn.exehbnbtb.exepjvvj.exe7fxxflr.exehbthhh.exe1pjpd.exedvjjp.exeflfrxfr.exebntbnt.exe5djdp.exerflxflr.exe3hhntb.exeppddp.exejdvdj.exelrflflx.exe9fffrxl.exehbnbhn.exe9htbtt.exejdpvp.exe9vjpj.exerfxfllr.exefrfffxr.exehtbbhh.exevdpvd.exepdjpd.exepjvdj.exe3lxfflx.exexxffffr.exetnnntt.exe9pjjp.exepdvvj.exerffffff.exexrxxlll.exe7ttbbh.exebthntt.exedvddp.exe7rrxlxl.exerfxxflf.exe5hhbnt.exenhbbtt.exejvppv.exedvjvd.exexxlxlfl.exepid process 1244 tnhtbn.exe 2320 pdppd.exe 2128 5rrxrfx.exe 2788 nhnntt.exe 2728 5dppv.exe 2724 1flrlrr.exe 2680 bththn.exe 2572 lfrrxff.exe 2444 5xlxlrf.exe 2568 dvpvd.exe 2820 lfrfllr.exe 2168 fxllxfl.exe 2032 ddppv.exe 2036 vvvjp.exe 2216 frflxfl.exe 896 bnbhbt.exe 1620 9jdpp.exe 1140 9lfllrr.exe 1724 htnthb.exe 2908 3vdvd.exe 2888 vjvdp.exe 2108 3nhbtn.exe 2604 hbnbtb.exe 628 pjvvj.exe 2400 7fxxflr.exe 1520 hbthhh.exe 1600 1pjpd.exe 2172 dvjjp.exe 2860 flfrxfr.exe 1948 bntbnt.exe 1268 5djdp.exe 2980 rflxflr.exe 1512 3hhntb.exe 1144 ppddp.exe 2164 jdvdj.exe 3068 lrflflx.exe 1604 9fffrxl.exe 2636 hbnbhn.exe 2800 9htbtt.exe 2788 jdpvp.exe 2632 9vjpj.exe 2868 rfxfllr.exe 2552 frfffxr.exe 2880 htbbhh.exe 2536 vdpvd.exe 2572 pdjpd.exe 2556 pjvdj.exe 2276 3lxfflx.exe 2836 xxffffr.exe 1696 tnnntt.exe 2168 9pjjp.exe 1956 pdvvj.exe 2032 rffffff.exe 2208 xrxxlll.exe 748 7ttbbh.exe 976 bthntt.exe 796 dvddp.exe 1980 7rrxlxl.exe 552 rfxxflf.exe 1724 5hhbnt.exe 2544 nhbbtt.exe 2240 jvppv.exe 2956 dvjvd.exe 2464 xxlxlfl.exe -
Processes:
resource yara_rule behavioral1/memory/1684-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1244-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2128-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2320-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2788-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2728-55-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2724-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2444-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2568-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2168-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2820-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2032-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2036-150-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2216-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/896-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1140-186-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1724-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2108-222-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2604-232-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/628-240-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exetnhtbn.exepdppd.exe5rrxrfx.exenhnntt.exe5dppv.exe1flrlrr.exebththn.exelfrrxff.exe5xlxlrf.exedvpvd.exelfrfllr.exefxllxfl.exeddppv.exevvvjp.exefrflxfl.exedescription pid process target process PID 1684 wrote to memory of 1244 1684 677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe tnhtbn.exe PID 1684 wrote to memory of 1244 1684 677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe tnhtbn.exe PID 1684 wrote to memory of 1244 1684 677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe tnhtbn.exe PID 1684 wrote to memory of 1244 1684 677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe tnhtbn.exe PID 1244 wrote to memory of 2320 1244 tnhtbn.exe pdppd.exe PID 1244 wrote to memory of 2320 1244 tnhtbn.exe pdppd.exe PID 1244 wrote to memory of 2320 1244 tnhtbn.exe pdppd.exe PID 1244 wrote to memory of 2320 1244 tnhtbn.exe pdppd.exe PID 2320 wrote to memory of 2128 2320 pdppd.exe 5rrxrfx.exe PID 2320 wrote to memory of 2128 2320 pdppd.exe 5rrxrfx.exe PID 2320 wrote to memory of 2128 2320 pdppd.exe 5rrxrfx.exe PID 2320 wrote to memory of 2128 2320 pdppd.exe 5rrxrfx.exe PID 2128 wrote to memory of 2788 2128 5rrxrfx.exe nhnntt.exe PID 2128 wrote to memory of 2788 2128 5rrxrfx.exe nhnntt.exe PID 2128 wrote to memory of 2788 2128 5rrxrfx.exe nhnntt.exe PID 2128 wrote to memory of 2788 2128 5rrxrfx.exe nhnntt.exe PID 2788 wrote to memory of 2728 2788 nhnntt.exe 5dppv.exe PID 2788 wrote to memory of 2728 2788 nhnntt.exe 5dppv.exe PID 2788 wrote to memory of 2728 2788 nhnntt.exe 5dppv.exe PID 2788 wrote to memory of 2728 2788 nhnntt.exe 5dppv.exe PID 2728 wrote to memory of 2724 2728 5dppv.exe 1flrlrr.exe PID 2728 wrote to memory of 2724 2728 5dppv.exe 1flrlrr.exe PID 2728 wrote to memory of 2724 2728 5dppv.exe 1flrlrr.exe PID 2728 wrote to memory of 2724 2728 5dppv.exe 1flrlrr.exe PID 2724 wrote to memory of 2680 2724 1flrlrr.exe bththn.exe PID 2724 wrote to memory of 2680 2724 1flrlrr.exe bththn.exe PID 2724 wrote to memory of 2680 2724 1flrlrr.exe bththn.exe PID 2724 wrote to memory of 2680 2724 1flrlrr.exe bththn.exe PID 2680 wrote to memory of 2572 2680 bththn.exe lfrrxff.exe PID 2680 wrote to memory of 2572 2680 bththn.exe lfrrxff.exe PID 2680 wrote to memory of 2572 2680 bththn.exe lfrrxff.exe PID 2680 wrote to memory of 2572 2680 bththn.exe lfrrxff.exe PID 2572 wrote to memory of 2444 2572 lfrrxff.exe 5xlxlrf.exe PID 2572 wrote to memory of 2444 2572 lfrrxff.exe 5xlxlrf.exe PID 2572 wrote to memory of 2444 2572 lfrrxff.exe 5xlxlrf.exe PID 2572 wrote to memory of 2444 2572 lfrrxff.exe 5xlxlrf.exe PID 2444 wrote to memory of 2568 2444 5xlxlrf.exe dvpvd.exe PID 2444 wrote to memory of 2568 2444 5xlxlrf.exe dvpvd.exe PID 2444 wrote to memory of 2568 2444 5xlxlrf.exe dvpvd.exe PID 2444 wrote to memory of 2568 2444 5xlxlrf.exe dvpvd.exe PID 2568 wrote to memory of 2820 2568 dvpvd.exe lfrfllr.exe PID 2568 wrote to memory of 2820 2568 dvpvd.exe lfrfllr.exe PID 2568 wrote to memory of 2820 2568 dvpvd.exe lfrfllr.exe PID 2568 wrote to memory of 2820 2568 dvpvd.exe lfrfllr.exe PID 2820 wrote to memory of 2168 2820 lfrfllr.exe fxllxfl.exe PID 2820 wrote to memory of 2168 2820 lfrfllr.exe fxllxfl.exe PID 2820 wrote to memory of 2168 2820 lfrfllr.exe fxllxfl.exe PID 2820 wrote to memory of 2168 2820 lfrfllr.exe fxllxfl.exe PID 2168 wrote to memory of 2032 2168 fxllxfl.exe ddppv.exe PID 2168 wrote to memory of 2032 2168 fxllxfl.exe ddppv.exe PID 2168 wrote to memory of 2032 2168 fxllxfl.exe ddppv.exe PID 2168 wrote to memory of 2032 2168 fxllxfl.exe ddppv.exe PID 2032 wrote to memory of 2036 2032 ddppv.exe vvvjp.exe PID 2032 wrote to memory of 2036 2032 ddppv.exe vvvjp.exe PID 2032 wrote to memory of 2036 2032 ddppv.exe vvvjp.exe PID 2032 wrote to memory of 2036 2032 ddppv.exe vvvjp.exe PID 2036 wrote to memory of 2216 2036 vvvjp.exe frflxfl.exe PID 2036 wrote to memory of 2216 2036 vvvjp.exe frflxfl.exe PID 2036 wrote to memory of 2216 2036 vvvjp.exe frflxfl.exe PID 2036 wrote to memory of 2216 2036 vvvjp.exe frflxfl.exe PID 2216 wrote to memory of 896 2216 frflxfl.exe bnbhbt.exe PID 2216 wrote to memory of 896 2216 frflxfl.exe bnbhbt.exe PID 2216 wrote to memory of 896 2216 frflxfl.exe bnbhbt.exe PID 2216 wrote to memory of 896 2216 frflxfl.exe bnbhbt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\tnhtbn.exec:\tnhtbn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdppd.exec:\pdppd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5rrxrfx.exec:\5rrxrfx.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhnntt.exec:\nhnntt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5dppv.exec:\5dppv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1flrlrr.exec:\1flrlrr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bththn.exec:\bththn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfrrxff.exec:\lfrrxff.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5xlxlrf.exec:\5xlxlrf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvpvd.exec:\dvpvd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfrfllr.exec:\lfrfllr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxllxfl.exec:\fxllxfl.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddppv.exec:\ddppv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vvvjp.exec:\vvvjp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frflxfl.exec:\frflxfl.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnbhbt.exec:\bnbhbt.exe17⤵
- Executes dropped EXE
-
\??\c:\9jdpp.exec:\9jdpp.exe18⤵
- Executes dropped EXE
-
\??\c:\9lfllrr.exec:\9lfllrr.exe19⤵
- Executes dropped EXE
-
\??\c:\htnthb.exec:\htnthb.exe20⤵
- Executes dropped EXE
-
\??\c:\3vdvd.exec:\3vdvd.exe21⤵
- Executes dropped EXE
-
\??\c:\vjvdp.exec:\vjvdp.exe22⤵
- Executes dropped EXE
-
\??\c:\3nhbtn.exec:\3nhbtn.exe23⤵
- Executes dropped EXE
-
\??\c:\hbnbtb.exec:\hbnbtb.exe24⤵
- Executes dropped EXE
-
\??\c:\pjvvj.exec:\pjvvj.exe25⤵
- Executes dropped EXE
-
\??\c:\7fxxflr.exec:\7fxxflr.exe26⤵
- Executes dropped EXE
-
\??\c:\hbthhh.exec:\hbthhh.exe27⤵
- Executes dropped EXE
-
\??\c:\1pjpd.exec:\1pjpd.exe28⤵
- Executes dropped EXE
-
\??\c:\dvjjp.exec:\dvjjp.exe29⤵
- Executes dropped EXE
-
\??\c:\flfrxfr.exec:\flfrxfr.exe30⤵
- Executes dropped EXE
-
\??\c:\bntbnt.exec:\bntbnt.exe31⤵
- Executes dropped EXE
-
\??\c:\5djdp.exec:\5djdp.exe32⤵
- Executes dropped EXE
-
\??\c:\rflxflr.exec:\rflxflr.exe33⤵
- Executes dropped EXE
-
\??\c:\3hhntb.exec:\3hhntb.exe34⤵
- Executes dropped EXE
-
\??\c:\ppddp.exec:\ppddp.exe35⤵
- Executes dropped EXE
-
\??\c:\jdvdj.exec:\jdvdj.exe36⤵
- Executes dropped EXE
-
\??\c:\lrflflx.exec:\lrflflx.exe37⤵
- Executes dropped EXE
-
\??\c:\9fffrxl.exec:\9fffrxl.exe38⤵
- Executes dropped EXE
-
\??\c:\hbnbhn.exec:\hbnbhn.exe39⤵
- Executes dropped EXE
-
\??\c:\9htbtt.exec:\9htbtt.exe40⤵
- Executes dropped EXE
-
\??\c:\jdpvp.exec:\jdpvp.exe41⤵
- Executes dropped EXE
-
\??\c:\9vjpj.exec:\9vjpj.exe42⤵
- Executes dropped EXE
-
\??\c:\rfxfllr.exec:\rfxfllr.exe43⤵
- Executes dropped EXE
-
\??\c:\frfffxr.exec:\frfffxr.exe44⤵
- Executes dropped EXE
-
\??\c:\htbbhh.exec:\htbbhh.exe45⤵
- Executes dropped EXE
-
\??\c:\vdpvd.exec:\vdpvd.exe46⤵
- Executes dropped EXE
-
\??\c:\pdjpd.exec:\pdjpd.exe47⤵
- Executes dropped EXE
-
\??\c:\pjvdj.exec:\pjvdj.exe48⤵
- Executes dropped EXE
-
\??\c:\3lxfflx.exec:\3lxfflx.exe49⤵
- Executes dropped EXE
-
\??\c:\xxffffr.exec:\xxffffr.exe50⤵
- Executes dropped EXE
-
\??\c:\tnnntt.exec:\tnnntt.exe51⤵
- Executes dropped EXE
-
\??\c:\9pjjp.exec:\9pjjp.exe52⤵
- Executes dropped EXE
-
\??\c:\pdvvj.exec:\pdvvj.exe53⤵
- Executes dropped EXE
-
\??\c:\rffffff.exec:\rffffff.exe54⤵
- Executes dropped EXE
-
\??\c:\xrxxlll.exec:\xrxxlll.exe55⤵
- Executes dropped EXE
-
\??\c:\7ttbbh.exec:\7ttbbh.exe56⤵
- Executes dropped EXE
-
\??\c:\bthntt.exec:\bthntt.exe57⤵
- Executes dropped EXE
-
\??\c:\dvddp.exec:\dvddp.exe58⤵
- Executes dropped EXE
-
\??\c:\7rrxlxl.exec:\7rrxlxl.exe59⤵
- Executes dropped EXE
-
\??\c:\rfxxflf.exec:\rfxxflf.exe60⤵
- Executes dropped EXE
-
\??\c:\5hhbnt.exec:\5hhbnt.exe61⤵
- Executes dropped EXE
-
\??\c:\nhbbtt.exec:\nhbbtt.exe62⤵
- Executes dropped EXE
-
\??\c:\jvppv.exec:\jvppv.exe63⤵
- Executes dropped EXE
-
\??\c:\dvjvd.exec:\dvjvd.exe64⤵
- Executes dropped EXE
-
\??\c:\xxlxlfl.exec:\xxlxlfl.exe65⤵
- Executes dropped EXE
-
\??\c:\5rfrxxf.exec:\5rfrxxf.exe66⤵
-
\??\c:\bbhntt.exec:\bbhntt.exe67⤵
-
\??\c:\7vpvd.exec:\7vpvd.exe68⤵
-
\??\c:\dvpdj.exec:\dvpdj.exe69⤵
-
\??\c:\rrllrxf.exec:\rrllrxf.exe70⤵
-
\??\c:\1xrrrxf.exec:\1xrrrxf.exe71⤵
-
\??\c:\7hbnbb.exec:\7hbnbb.exe72⤵
-
\??\c:\pjvdp.exec:\pjvdp.exe73⤵
-
\??\c:\jdvjv.exec:\jdvjv.exe74⤵
-
\??\c:\lfrrfxf.exec:\lfrrfxf.exe75⤵
-
\??\c:\lfxxffl.exec:\lfxxffl.exe76⤵
-
\??\c:\7tnnbb.exec:\7tnnbb.exe77⤵
-
\??\c:\tnbbnh.exec:\tnbbnh.exe78⤵
-
\??\c:\5jjdd.exec:\5jjdd.exe79⤵
-
\??\c:\rlrflrx.exec:\rlrflrx.exe80⤵
-
\??\c:\3xrxxxf.exec:\3xrxxxf.exe81⤵
-
\??\c:\bttnhh.exec:\bttnhh.exe82⤵
-
\??\c:\btnntt.exec:\btnntt.exe83⤵
-
\??\c:\dvdvj.exec:\dvdvj.exe84⤵
-
\??\c:\vvpjv.exec:\vvpjv.exe85⤵
-
\??\c:\rllxffl.exec:\rllxffl.exe86⤵
-
\??\c:\9xlfrrx.exec:\9xlfrrx.exe87⤵
-
\??\c:\hhhtht.exec:\hhhtht.exe88⤵
-
\??\c:\jdjpd.exec:\jdjpd.exe89⤵
-
\??\c:\pjpvv.exec:\pjpvv.exe90⤵
-
\??\c:\flrxxlr.exec:\flrxxlr.exe91⤵
-
\??\c:\5fllrrx.exec:\5fllrrx.exe92⤵
-
\??\c:\hbnttt.exec:\hbnttt.exe93⤵
-
\??\c:\hbhhtt.exec:\hbhhtt.exe94⤵
-
\??\c:\9jppv.exec:\9jppv.exe95⤵
-
\??\c:\pjddd.exec:\pjddd.exe96⤵
-
\??\c:\frflfxx.exec:\frflfxx.exe97⤵
-
\??\c:\3lflrxr.exec:\3lflrxr.exe98⤵
-
\??\c:\hbnbtt.exec:\hbnbtt.exe99⤵
-
\??\c:\nthnnt.exec:\nthnnt.exe100⤵
-
\??\c:\ppjjj.exec:\ppjjj.exe101⤵
-
\??\c:\pvjdd.exec:\pvjdd.exe102⤵
-
\??\c:\xrflxfl.exec:\xrflxfl.exe103⤵
-
\??\c:\xrlfllr.exec:\xrlfllr.exe104⤵
-
\??\c:\htbhtt.exec:\htbhtt.exe105⤵
-
\??\c:\dpdvd.exec:\dpdvd.exe106⤵
-
\??\c:\dvjjp.exec:\dvjjp.exe107⤵
-
\??\c:\rfrrffl.exec:\rfrrffl.exe108⤵
-
\??\c:\9rrxxxr.exec:\9rrxxxr.exe109⤵
-
\??\c:\bnbtbb.exec:\bnbtbb.exe110⤵
-
\??\c:\5ttntb.exec:\5ttntb.exe111⤵
-
\??\c:\dvvdj.exec:\dvvdj.exe112⤵
-
\??\c:\jdpjd.exec:\jdpjd.exe113⤵
-
\??\c:\9xllllr.exec:\9xllllr.exe114⤵
-
\??\c:\tnbbnh.exec:\tnbbnh.exe115⤵
-
\??\c:\9hnhbb.exec:\9hnhbb.exe116⤵
-
\??\c:\pjjdj.exec:\pjjdj.exe117⤵
-
\??\c:\dvpdd.exec:\dvpdd.exe118⤵
-
\??\c:\rfrrrxl.exec:\rfrrrxl.exe119⤵
-
\??\c:\rlxxfxx.exec:\rlxxfxx.exe120⤵
-
\??\c:\nhbhtn.exec:\nhbhtn.exe121⤵
-
\??\c:\7hbbtt.exec:\7hbbtt.exe122⤵
-
\??\c:\jdpdd.exec:\jdpdd.exe123⤵
-
\??\c:\pdvpv.exec:\pdvpv.exe124⤵
-
\??\c:\xlxfllx.exec:\xlxfllx.exe125⤵
-
\??\c:\xlrrfrx.exec:\xlrrfrx.exe126⤵
-
\??\c:\1tbttn.exec:\1tbttn.exe127⤵
-
\??\c:\3djvv.exec:\3djvv.exe128⤵
-
\??\c:\jvdvv.exec:\jvdvv.exe129⤵
-
\??\c:\rfrrrrr.exec:\rfrrrrr.exe130⤵
-
\??\c:\xllxfff.exec:\xllxfff.exe131⤵
-
\??\c:\tnnntn.exec:\tnnntn.exe132⤵
-
\??\c:\nbbbhb.exec:\nbbbhb.exe133⤵
-
\??\c:\3jppv.exec:\3jppv.exe134⤵
-
\??\c:\pjdpp.exec:\pjdpp.exe135⤵
-
\??\c:\xrflrfl.exec:\xrflrfl.exe136⤵
-
\??\c:\7xrxflr.exec:\7xrxflr.exe137⤵
-
\??\c:\nntbnn.exec:\nntbnn.exe138⤵
-
\??\c:\htbtbt.exec:\htbtbt.exe139⤵
-
\??\c:\3ddpj.exec:\3ddpj.exe140⤵
-
\??\c:\dvdvd.exec:\dvdvd.exe141⤵
-
\??\c:\frllxxf.exec:\frllxxf.exe142⤵
-
\??\c:\lffflll.exec:\lffflll.exe143⤵
-
\??\c:\htnntn.exec:\htnntn.exe144⤵
-
\??\c:\1pjvp.exec:\1pjvp.exe145⤵
-
\??\c:\7dppp.exec:\7dppp.exe146⤵
-
\??\c:\7xrxfxx.exec:\7xrxfxx.exe147⤵
-
\??\c:\lxllrll.exec:\lxllrll.exe148⤵
-
\??\c:\hthhbt.exec:\hthhbt.exe149⤵
-
\??\c:\bnnnhh.exec:\bnnnhh.exe150⤵
-
\??\c:\jdpdv.exec:\jdpdv.exe151⤵
-
\??\c:\pdpvv.exec:\pdpvv.exe152⤵
-
\??\c:\xlxfrlr.exec:\xlxfrlr.exe153⤵
-
\??\c:\9rrxfff.exec:\9rrxfff.exe154⤵
-
\??\c:\9hhntt.exec:\9hhntt.exe155⤵
-
\??\c:\tnthbh.exec:\tnthbh.exe156⤵
-
\??\c:\jvjdj.exec:\jvjdj.exe157⤵
-
\??\c:\pdppv.exec:\pdppv.exe158⤵
-
\??\c:\rlxxxfl.exec:\rlxxxfl.exe159⤵
-
\??\c:\lxllxff.exec:\lxllxff.exe160⤵
-
\??\c:\3bhhhn.exec:\3bhhhn.exe161⤵
-
\??\c:\1ppjv.exec:\1ppjv.exe162⤵
-
\??\c:\pdjpd.exec:\pdjpd.exe163⤵
-
\??\c:\xrxfxlr.exec:\xrxfxlr.exe164⤵
-
\??\c:\xrfrlxl.exec:\xrfrlxl.exe165⤵
-
\??\c:\thtbbb.exec:\thtbbb.exe166⤵
-
\??\c:\thnntt.exec:\thnntt.exe167⤵
-
\??\c:\1pvjp.exec:\1pvjp.exe168⤵
-
\??\c:\vpdvd.exec:\vpdvd.exe169⤵
-
\??\c:\rlxlrfl.exec:\rlxlrfl.exe170⤵
-
\??\c:\lfrxlfr.exec:\lfrxlfr.exe171⤵
-
\??\c:\hthnbb.exec:\hthnbb.exe172⤵
-
\??\c:\nbhnnn.exec:\nbhnnn.exe173⤵
-
\??\c:\vdpjj.exec:\vdpjj.exe174⤵
-
\??\c:\pdpdj.exec:\pdpdj.exe175⤵
-
\??\c:\lxlrrxx.exec:\lxlrrxx.exe176⤵
-
\??\c:\7xlrxrx.exec:\7xlrxrx.exe177⤵
-
\??\c:\1nbhhh.exec:\1nbhhh.exe178⤵
-
\??\c:\tnnnbh.exec:\tnnnbh.exe179⤵
-
\??\c:\rlfxxrx.exec:\rlfxxrx.exe180⤵
-
\??\c:\xrxflrx.exec:\xrxflrx.exe181⤵
-
\??\c:\9nhhbb.exec:\9nhhbb.exe182⤵
-
\??\c:\vppvp.exec:\vppvp.exe183⤵
-
\??\c:\jdjjp.exec:\jdjjp.exe184⤵
-
\??\c:\xxxlxrl.exec:\xxxlxrl.exe185⤵
-
\??\c:\3lllrfl.exec:\3lllrfl.exe186⤵
-
\??\c:\7tntnt.exec:\7tntnt.exe187⤵
-
\??\c:\5bnnnn.exec:\5bnnnn.exe188⤵
-
\??\c:\pjppd.exec:\pjppd.exe189⤵
-
\??\c:\jdvvj.exec:\jdvvj.exe190⤵
-
\??\c:\lfrxllr.exec:\lfrxllr.exe191⤵
-
\??\c:\xxllxxl.exec:\xxllxxl.exe192⤵
-
\??\c:\9nbbhh.exec:\9nbbhh.exe193⤵
-
\??\c:\btnntt.exec:\btnntt.exe194⤵
-
\??\c:\3jdvd.exec:\3jdvd.exe195⤵
-
\??\c:\jvjjp.exec:\jvjjp.exe196⤵
-
\??\c:\1rfrrxf.exec:\1rfrrxf.exe197⤵
-
\??\c:\fxrxflx.exec:\fxrxflx.exe198⤵
-
\??\c:\btbbhb.exec:\btbbhb.exe199⤵
-
\??\c:\btbbnn.exec:\btbbnn.exe200⤵
-
\??\c:\5dpjj.exec:\5dpjj.exe201⤵
-
\??\c:\vjvpd.exec:\vjvpd.exe202⤵
-
\??\c:\xrxxfff.exec:\xrxxfff.exe203⤵
-
\??\c:\rfllxrx.exec:\rfllxrx.exe204⤵
-
\??\c:\nbhnnn.exec:\nbhnnn.exe205⤵
-
\??\c:\thbttt.exec:\thbttt.exe206⤵
-
\??\c:\vpvvd.exec:\vpvvd.exe207⤵
-
\??\c:\7vpvj.exec:\7vpvj.exe208⤵
-
\??\c:\fxlflfr.exec:\fxlflfr.exe209⤵
-
\??\c:\btbthn.exec:\btbthn.exe210⤵
-
\??\c:\thtbbb.exec:\thtbbb.exe211⤵
-
\??\c:\dpdvv.exec:\dpdvv.exe212⤵
-
\??\c:\dpvjj.exec:\dpvjj.exe213⤵
-
\??\c:\5xfxxxx.exec:\5xfxxxx.exe214⤵
-
\??\c:\7rflllf.exec:\7rflllf.exe215⤵
-
\??\c:\tnttbb.exec:\tnttbb.exe216⤵
-
\??\c:\hbnnnh.exec:\hbnnnh.exe217⤵
-
\??\c:\jvdjj.exec:\jvdjj.exe218⤵
-
\??\c:\dvjdd.exec:\dvjdd.exe219⤵
-
\??\c:\9ffffff.exec:\9ffffff.exe220⤵
-
\??\c:\rlxxxxf.exec:\rlxxxxf.exe221⤵
-
\??\c:\7hbhnt.exec:\7hbhnt.exe222⤵
-
\??\c:\3tbbbb.exec:\3tbbbb.exe223⤵
-
\??\c:\pdjdj.exec:\pdjdj.exe224⤵
-
\??\c:\vdpjj.exec:\vdpjj.exe225⤵
-
\??\c:\xlxrrlr.exec:\xlxrrlr.exe226⤵
-
\??\c:\bhnhnn.exec:\bhnhnn.exe227⤵
-
\??\c:\3thntt.exec:\3thntt.exe228⤵
-
\??\c:\jvppv.exec:\jvppv.exe229⤵
-
\??\c:\dpjjv.exec:\dpjjv.exe230⤵
-
\??\c:\lflfllr.exec:\lflfllr.exe231⤵
-
\??\c:\lxrrxll.exec:\lxrrxll.exe232⤵
-
\??\c:\bnnhnh.exec:\bnnhnh.exe233⤵
-
\??\c:\7tntbb.exec:\7tntbb.exe234⤵
-
\??\c:\5pdvp.exec:\5pdvp.exe235⤵
-
\??\c:\5jpdj.exec:\5jpdj.exe236⤵
-
\??\c:\fxlfrlr.exec:\fxlfrlr.exe237⤵
-
\??\c:\lxrxllr.exec:\lxrxllr.exe238⤵
-
\??\c:\7nthtb.exec:\7nthtb.exe239⤵
-
\??\c:\nhhthh.exec:\nhhthh.exe240⤵
-
\??\c:\dvjpj.exec:\dvjpj.exe241⤵