Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 13:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe
Resource
win7-20240508-en
5 signatures
150 seconds
General
-
Target
677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe
-
Size
231KB
-
MD5
677fa54db2e2c164662d063d8748efe6
-
SHA1
5d4daf203f487b26531e67d28466bca3112ce4ab
-
SHA256
a9d83a26da0e1b8d80afd5f699cf03e00f6a4f9ad86ad5c65603d43ea27c76ab
-
SHA512
8e7b9f619a3c91cbfdb75ac092f9cc90e6cb880282176aaa660e01ddd82356a250c920f795cf69c6ec9997a8ee2da3133291d093a9191f7a621c0878b51ed2e3
-
SSDEEP
3072:ymb3NkkiQ3mdBjFo73PYP1lri3KoSV31x4xL8eBWOgX:n3C9BRo7MlrWKo+lxK8eBWVX
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/4092-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4784-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3720-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2320-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4460-38-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3512-47-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3768-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/452-68-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3532-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3532-79-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4536-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2108-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4920-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2072-109-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5028-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4604-121-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2380-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2008-139-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1172-144-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4776-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3328-180-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/928-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3872-200-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3168-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
3vpdp.exebhhbtn.exevppdp.exe5tbttt.exejdjjd.exexlxrrlr.exejjvvv.exe1xxlfxr.exebbtnhb.exevdjdp.exefxxlfxr.exe7nthbh.exexlrlffx.exellrlfxr.exethtnhb.exefrxlxxx.exebnnhbb.exejpjdd.exe7hnhth.exevdjdp.exejvpjv.exe7lfffrl.exenhhbtt.exe1vvpj.exexxrrlfx.exevpjdv.exexxxxrrr.exe3nttnn.exevdpjd.exettnnhh.exepvdvj.exejdjvp.exetbhbnn.exe9tthbt.exevpdvd.exerllffxf.exehtbhhh.exe3thhbb.exejjjdd.exe7xxrrrr.exe9rxrfff.exe9nnhbt.exevpjdv.exefxfxrrl.exefrxrllf.exentbbnt.exedvvvj.exedvdpj.exelflfxxf.exefrrrllf.exe9nntnn.exeddjdv.exepjppd.exe7lfrffx.exenhhnbb.exehtbtnn.exe1pppj.exexrxrrll.exerxrxrxr.exetnbbtt.exe7djdv.exerxfxllf.exexrffxxr.exebthnbb.exepid process 4784 3vpdp.exe 2320 bhhbtn.exe 3720 vppdp.exe 2136 5tbttt.exe 4460 jdjjd.exe 3512 xlxrrlr.exe 5056 jjvvv.exe 3768 1xxlfxr.exe 452 bbtnhb.exe 3532 vdjdp.exe 4536 fxxlfxr.exe 2108 7nthbh.exe 4920 xlrlffx.exe 1584 llrlfxr.exe 2072 thtnhb.exe 5028 frxlxxx.exe 4604 bnnhbb.exe 2380 jpjdd.exe 4336 7hnhth.exe 2008 vdjdp.exe 1172 jvpjv.exe 3416 7lfffrl.exe 5032 nhhbtt.exe 384 1vvpj.exe 4776 xxrrlfx.exe 4712 vpjdv.exe 3328 xxxxrrr.exe 4848 3nttnn.exe 928 vdpjd.exe 3872 ttnnhh.exe 3168 pvdvj.exe 376 jdjvp.exe 904 tbhbnn.exe 2588 9tthbt.exe 2068 vpdvd.exe 5084 rllffxf.exe 4416 htbhhh.exe 1632 3thhbb.exe 4076 jjjdd.exe 1372 7xxrrrr.exe 1620 9rxrfff.exe 3280 9nnhbt.exe 4768 vpjdv.exe 3408 fxfxrrl.exe 1468 frxrllf.exe 3568 ntbbnt.exe 3240 dvvvj.exe 4892 dvdpj.exe 3600 lflfxxf.exe 460 frrrllf.exe 2108 9nntnn.exe 2024 ddjdv.exe 840 pjppd.exe 3228 7lfrffx.exe 4484 nhhnbb.exe 2084 htbtnn.exe 1592 1pppj.exe 3948 xrxrrll.exe 2884 rxrxrxr.exe 1896 tnbbtt.exe 4856 7djdv.exe 4356 rxfxllf.exe 1400 xrffxxr.exe 2016 bthnbb.exe -
Processes:
resource yara_rule behavioral2/memory/4092-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4784-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3720-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2320-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4460-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4460-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3512-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5056-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3768-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/452-68-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3532-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3532-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4536-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2108-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4920-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2072-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5028-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4604-121-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2380-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2008-139-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1172-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4776-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3328-180-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/928-195-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3872-200-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3168-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe3vpdp.exebhhbtn.exevppdp.exe5tbttt.exejdjjd.exexlxrrlr.exejjvvv.exe1xxlfxr.exebbtnhb.exevdjdp.exefxxlfxr.exe7nthbh.exexlrlffx.exellrlfxr.exethtnhb.exefrxlxxx.exebnnhbb.exejpjdd.exe7hnhth.exevdjdp.exejvpjv.exedescription pid process target process PID 4092 wrote to memory of 4784 4092 677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe 3vpdp.exe PID 4092 wrote to memory of 4784 4092 677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe 3vpdp.exe PID 4092 wrote to memory of 4784 4092 677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe 3vpdp.exe PID 4784 wrote to memory of 2320 4784 3vpdp.exe bhhbtn.exe PID 4784 wrote to memory of 2320 4784 3vpdp.exe bhhbtn.exe PID 4784 wrote to memory of 2320 4784 3vpdp.exe bhhbtn.exe PID 2320 wrote to memory of 3720 2320 bhhbtn.exe vppdp.exe PID 2320 wrote to memory of 3720 2320 bhhbtn.exe vppdp.exe PID 2320 wrote to memory of 3720 2320 bhhbtn.exe vppdp.exe PID 3720 wrote to memory of 2136 3720 vppdp.exe 5tbttt.exe PID 3720 wrote to memory of 2136 3720 vppdp.exe 5tbttt.exe PID 3720 wrote to memory of 2136 3720 vppdp.exe 5tbttt.exe PID 2136 wrote to memory of 4460 2136 5tbttt.exe jdjjd.exe PID 2136 wrote to memory of 4460 2136 5tbttt.exe jdjjd.exe PID 2136 wrote to memory of 4460 2136 5tbttt.exe jdjjd.exe PID 4460 wrote to memory of 3512 4460 jdjjd.exe xlxrrlr.exe PID 4460 wrote to memory of 3512 4460 jdjjd.exe xlxrrlr.exe PID 4460 wrote to memory of 3512 4460 jdjjd.exe xlxrrlr.exe PID 3512 wrote to memory of 5056 3512 xlxrrlr.exe jjvvv.exe PID 3512 wrote to memory of 5056 3512 xlxrrlr.exe jjvvv.exe PID 3512 wrote to memory of 5056 3512 xlxrrlr.exe jjvvv.exe PID 5056 wrote to memory of 3768 5056 jjvvv.exe 1xxlfxr.exe PID 5056 wrote to memory of 3768 5056 jjvvv.exe 1xxlfxr.exe PID 5056 wrote to memory of 3768 5056 jjvvv.exe 1xxlfxr.exe PID 3768 wrote to memory of 452 3768 1xxlfxr.exe bbtnhb.exe PID 3768 wrote to memory of 452 3768 1xxlfxr.exe bbtnhb.exe PID 3768 wrote to memory of 452 3768 1xxlfxr.exe bbtnhb.exe PID 452 wrote to memory of 3532 452 bbtnhb.exe vdjdp.exe PID 452 wrote to memory of 3532 452 bbtnhb.exe vdjdp.exe PID 452 wrote to memory of 3532 452 bbtnhb.exe vdjdp.exe PID 3532 wrote to memory of 4536 3532 vdjdp.exe fxxlfxr.exe PID 3532 wrote to memory of 4536 3532 vdjdp.exe fxxlfxr.exe PID 3532 wrote to memory of 4536 3532 vdjdp.exe fxxlfxr.exe PID 4536 wrote to memory of 2108 4536 fxxlfxr.exe 7nthbh.exe PID 4536 wrote to memory of 2108 4536 fxxlfxr.exe 7nthbh.exe PID 4536 wrote to memory of 2108 4536 fxxlfxr.exe 7nthbh.exe PID 2108 wrote to memory of 4920 2108 7nthbh.exe xlrlffx.exe PID 2108 wrote to memory of 4920 2108 7nthbh.exe xlrlffx.exe PID 2108 wrote to memory of 4920 2108 7nthbh.exe xlrlffx.exe PID 4920 wrote to memory of 1584 4920 xlrlffx.exe llrlfxr.exe PID 4920 wrote to memory of 1584 4920 xlrlffx.exe llrlfxr.exe PID 4920 wrote to memory of 1584 4920 xlrlffx.exe llrlfxr.exe PID 1584 wrote to memory of 2072 1584 llrlfxr.exe thtnhb.exe PID 1584 wrote to memory of 2072 1584 llrlfxr.exe thtnhb.exe PID 1584 wrote to memory of 2072 1584 llrlfxr.exe thtnhb.exe PID 2072 wrote to memory of 5028 2072 thtnhb.exe frxlxxx.exe PID 2072 wrote to memory of 5028 2072 thtnhb.exe frxlxxx.exe PID 2072 wrote to memory of 5028 2072 thtnhb.exe frxlxxx.exe PID 5028 wrote to memory of 4604 5028 frxlxxx.exe bnnhbb.exe PID 5028 wrote to memory of 4604 5028 frxlxxx.exe bnnhbb.exe PID 5028 wrote to memory of 4604 5028 frxlxxx.exe bnnhbb.exe PID 4604 wrote to memory of 2380 4604 bnnhbb.exe jpjdd.exe PID 4604 wrote to memory of 2380 4604 bnnhbb.exe jpjdd.exe PID 4604 wrote to memory of 2380 4604 bnnhbb.exe jpjdd.exe PID 2380 wrote to memory of 4336 2380 jpjdd.exe 7hnhth.exe PID 2380 wrote to memory of 4336 2380 jpjdd.exe 7hnhth.exe PID 2380 wrote to memory of 4336 2380 jpjdd.exe 7hnhth.exe PID 4336 wrote to memory of 2008 4336 7hnhth.exe vdjdp.exe PID 4336 wrote to memory of 2008 4336 7hnhth.exe vdjdp.exe PID 4336 wrote to memory of 2008 4336 7hnhth.exe vdjdp.exe PID 2008 wrote to memory of 1172 2008 vdjdp.exe jvpjv.exe PID 2008 wrote to memory of 1172 2008 vdjdp.exe jvpjv.exe PID 2008 wrote to memory of 1172 2008 vdjdp.exe jvpjv.exe PID 1172 wrote to memory of 3416 1172 jvpjv.exe 7lfffrl.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\677fa54db2e2c164662d063d8748efe6_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\3vpdp.exec:\3vpdp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bhhbtn.exec:\bhhbtn.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vppdp.exec:\vppdp.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5tbttt.exec:\5tbttt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdjjd.exec:\jdjjd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlxrrlr.exec:\xlxrrlr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjvvv.exec:\jjvvv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1xxlfxr.exec:\1xxlfxr.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbtnhb.exec:\bbtnhb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vdjdp.exec:\vdjdp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxxlfxr.exec:\fxxlfxr.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7nthbh.exec:\7nthbh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xlrlffx.exec:\xlrlffx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\llrlfxr.exec:\llrlfxr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\thtnhb.exec:\thtnhb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frxlxxx.exec:\frxlxxx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnnhbb.exec:\bnnhbb.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpjdd.exec:\jpjdd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7hnhth.exec:\7hnhth.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vdjdp.exec:\vdjdp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jvpjv.exec:\jvpjv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7lfffrl.exec:\7lfffrl.exe23⤵
- Executes dropped EXE
-
\??\c:\nhhbtt.exec:\nhhbtt.exe24⤵
- Executes dropped EXE
-
\??\c:\1vvpj.exec:\1vvpj.exe25⤵
- Executes dropped EXE
-
\??\c:\xxrrlfx.exec:\xxrrlfx.exe26⤵
- Executes dropped EXE
-
\??\c:\vpjdv.exec:\vpjdv.exe27⤵
- Executes dropped EXE
-
\??\c:\xxxxrrr.exec:\xxxxrrr.exe28⤵
- Executes dropped EXE
-
\??\c:\3nttnn.exec:\3nttnn.exe29⤵
- Executes dropped EXE
-
\??\c:\vdpjd.exec:\vdpjd.exe30⤵
- Executes dropped EXE
-
\??\c:\ttnnhh.exec:\ttnnhh.exe31⤵
- Executes dropped EXE
-
\??\c:\pvdvj.exec:\pvdvj.exe32⤵
- Executes dropped EXE
-
\??\c:\jdjvp.exec:\jdjvp.exe33⤵
- Executes dropped EXE
-
\??\c:\tbhbnn.exec:\tbhbnn.exe34⤵
- Executes dropped EXE
-
\??\c:\9tthbt.exec:\9tthbt.exe35⤵
- Executes dropped EXE
-
\??\c:\vpdvd.exec:\vpdvd.exe36⤵
- Executes dropped EXE
-
\??\c:\rllffxf.exec:\rllffxf.exe37⤵
- Executes dropped EXE
-
\??\c:\htbhhh.exec:\htbhhh.exe38⤵
- Executes dropped EXE
-
\??\c:\3thhbb.exec:\3thhbb.exe39⤵
- Executes dropped EXE
-
\??\c:\jjjdd.exec:\jjjdd.exe40⤵
- Executes dropped EXE
-
\??\c:\7xxrrrr.exec:\7xxrrrr.exe41⤵
- Executes dropped EXE
-
\??\c:\9rxrfff.exec:\9rxrfff.exe42⤵
- Executes dropped EXE
-
\??\c:\9nnhbt.exec:\9nnhbt.exe43⤵
- Executes dropped EXE
-
\??\c:\vpjdv.exec:\vpjdv.exe44⤵
- Executes dropped EXE
-
\??\c:\fxfxrrl.exec:\fxfxrrl.exe45⤵
- Executes dropped EXE
-
\??\c:\frxrllf.exec:\frxrllf.exe46⤵
- Executes dropped EXE
-
\??\c:\ntbbnt.exec:\ntbbnt.exe47⤵
- Executes dropped EXE
-
\??\c:\dvvvj.exec:\dvvvj.exe48⤵
- Executes dropped EXE
-
\??\c:\dvdpj.exec:\dvdpj.exe49⤵
- Executes dropped EXE
-
\??\c:\lflfxxf.exec:\lflfxxf.exe50⤵
- Executes dropped EXE
-
\??\c:\frrrllf.exec:\frrrllf.exe51⤵
- Executes dropped EXE
-
\??\c:\9nntnn.exec:\9nntnn.exe52⤵
- Executes dropped EXE
-
\??\c:\ddjdv.exec:\ddjdv.exe53⤵
- Executes dropped EXE
-
\??\c:\pjppd.exec:\pjppd.exe54⤵
- Executes dropped EXE
-
\??\c:\7lfrffx.exec:\7lfrffx.exe55⤵
- Executes dropped EXE
-
\??\c:\nhhnbb.exec:\nhhnbb.exe56⤵
- Executes dropped EXE
-
\??\c:\htbtnn.exec:\htbtnn.exe57⤵
- Executes dropped EXE
-
\??\c:\1pppj.exec:\1pppj.exe58⤵
- Executes dropped EXE
-
\??\c:\xrxrrll.exec:\xrxrrll.exe59⤵
- Executes dropped EXE
-
\??\c:\rxrxrxr.exec:\rxrxrxr.exe60⤵
- Executes dropped EXE
-
\??\c:\tnbbtt.exec:\tnbbtt.exe61⤵
- Executes dropped EXE
-
\??\c:\7djdv.exec:\7djdv.exe62⤵
- Executes dropped EXE
-
\??\c:\rxfxllf.exec:\rxfxllf.exe63⤵
- Executes dropped EXE
-
\??\c:\xrffxxr.exec:\xrffxxr.exe64⤵
- Executes dropped EXE
-
\??\c:\bthnbb.exec:\bthnbb.exe65⤵
- Executes dropped EXE
-
\??\c:\3hnbnn.exec:\3hnbnn.exe66⤵
-
\??\c:\dvddd.exec:\dvddd.exe67⤵
-
\??\c:\jjpjv.exec:\jjpjv.exe68⤵
-
\??\c:\fxlfrrl.exec:\fxlfrrl.exe69⤵
-
\??\c:\tbbtbt.exec:\tbbtbt.exe70⤵
-
\??\c:\vjvpj.exec:\vjvpj.exe71⤵
-
\??\c:\jpvvp.exec:\jpvvp.exe72⤵
-
\??\c:\fflfffl.exec:\fflfffl.exe73⤵
-
\??\c:\htbthh.exec:\htbthh.exe74⤵
-
\??\c:\tbnhtt.exec:\tbnhtt.exe75⤵
-
\??\c:\ppjvd.exec:\ppjvd.exe76⤵
-
\??\c:\vdjvp.exec:\vdjvp.exe77⤵
-
\??\c:\1rlfxxr.exec:\1rlfxxr.exe78⤵
-
\??\c:\9tnbnh.exec:\9tnbnh.exe79⤵
-
\??\c:\nbhbbt.exec:\nbhbbt.exe80⤵
-
\??\c:\jjpdv.exec:\jjpdv.exe81⤵
-
\??\c:\fxffxxr.exec:\fxffxxr.exe82⤵
-
\??\c:\thbtnb.exec:\thbtnb.exe83⤵
-
\??\c:\htbhtt.exec:\htbhtt.exe84⤵
-
\??\c:\vppjv.exec:\vppjv.exe85⤵
-
\??\c:\rlfxxxf.exec:\rlfxxxf.exe86⤵
-
\??\c:\rlffrrl.exec:\rlffrrl.exe87⤵
-
\??\c:\btnbtt.exec:\btnbtt.exe88⤵
-
\??\c:\htbnhb.exec:\htbnhb.exe89⤵
-
\??\c:\pdjjv.exec:\pdjjv.exe90⤵
-
\??\c:\xlxrrrl.exec:\xlxrrrl.exe91⤵
-
\??\c:\1lrlllf.exec:\1lrlllf.exe92⤵
-
\??\c:\3nhhbb.exec:\3nhhbb.exe93⤵
-
\??\c:\7ntnhh.exec:\7ntnhh.exe94⤵
-
\??\c:\jdddp.exec:\jdddp.exe95⤵
-
\??\c:\jjpdv.exec:\jjpdv.exe96⤵
-
\??\c:\fxxxrrl.exec:\fxxxrrl.exe97⤵
-
\??\c:\lllfxxr.exec:\lllfxxr.exe98⤵
-
\??\c:\5bhhnn.exec:\5bhhnn.exe99⤵
-
\??\c:\5bhtnh.exec:\5bhtnh.exe100⤵
-
\??\c:\vpjdd.exec:\vpjdd.exe101⤵
-
\??\c:\fxrlxxr.exec:\fxrlxxr.exe102⤵
-
\??\c:\fflfxxx.exec:\fflfxxx.exe103⤵
-
\??\c:\nhnnhn.exec:\nhnnhn.exe104⤵
-
\??\c:\tbtnbb.exec:\tbtnbb.exe105⤵
-
\??\c:\flrlffl.exec:\flrlffl.exe106⤵
-
\??\c:\9nttnn.exec:\9nttnn.exe107⤵
-
\??\c:\7pvdv.exec:\7pvdv.exe108⤵
-
\??\c:\vpppj.exec:\vpppj.exe109⤵
-
\??\c:\lffrlff.exec:\lffrlff.exe110⤵
-
\??\c:\1lrlffx.exec:\1lrlffx.exe111⤵
-
\??\c:\tntttt.exec:\tntttt.exe112⤵
-
\??\c:\bbnhhb.exec:\bbnhhb.exe113⤵
-
\??\c:\dpjdp.exec:\dpjdp.exe114⤵
-
\??\c:\lrxrrrl.exec:\lrxrrrl.exe115⤵
-
\??\c:\lxfflll.exec:\lxfflll.exe116⤵
-
\??\c:\7tbttn.exec:\7tbttn.exe117⤵
-
\??\c:\1hbbnt.exec:\1hbbnt.exe118⤵
-
\??\c:\9jjdv.exec:\9jjdv.exe119⤵
-
\??\c:\jvddd.exec:\jvddd.exe120⤵
-
\??\c:\llllrlr.exec:\llllrlr.exe121⤵
-
\??\c:\nhnhbt.exec:\nhnhbt.exe122⤵
-
\??\c:\thbnbb.exec:\thbnbb.exe123⤵
-
\??\c:\5pppd.exec:\5pppd.exe124⤵
-
\??\c:\vjdvp.exec:\vjdvp.exe125⤵
-
\??\c:\lrxrffx.exec:\lrxrffx.exe126⤵
-
\??\c:\lffxxxr.exec:\lffxxxr.exe127⤵
-
\??\c:\3hhbnt.exec:\3hhbnt.exe128⤵
-
\??\c:\9vpdp.exec:\9vpdp.exe129⤵
-
\??\c:\dpjdd.exec:\dpjdd.exe130⤵
-
\??\c:\fxfxllf.exec:\fxfxllf.exe131⤵
-
\??\c:\tnhbtn.exec:\tnhbtn.exe132⤵
-
\??\c:\dvpjd.exec:\dvpjd.exe133⤵
-
\??\c:\vpvpd.exec:\vpvpd.exe134⤵
-
\??\c:\lfxrlxr.exec:\lfxrlxr.exe135⤵
-
\??\c:\tbthhb.exec:\tbthhb.exe136⤵
-
\??\c:\pvvvp.exec:\pvvvp.exe137⤵
-
\??\c:\rlfrrrx.exec:\rlfrrrx.exe138⤵
-
\??\c:\xfllfxr.exec:\xfllfxr.exe139⤵
-
\??\c:\hbtthh.exec:\hbtthh.exe140⤵
-
\??\c:\fllxrrl.exec:\fllxrrl.exe141⤵
-
\??\c:\9xffxxx.exec:\9xffxxx.exe142⤵
-
\??\c:\1hnbtn.exec:\1hnbtn.exe143⤵
-
\??\c:\jdjdv.exec:\jdjdv.exe144⤵
-
\??\c:\vdjvp.exec:\vdjvp.exe145⤵
-
\??\c:\fxxrffx.exec:\fxxrffx.exe146⤵
-
\??\c:\bhhbtn.exec:\bhhbtn.exe147⤵
-
\??\c:\hbbbtn.exec:\hbbbtn.exe148⤵
-
\??\c:\vjjdp.exec:\vjjdp.exe149⤵
-
\??\c:\lxrlllr.exec:\lxrlllr.exe150⤵
-
\??\c:\nhtnhh.exec:\nhtnhh.exe151⤵
-
\??\c:\vvdvp.exec:\vvdvp.exe152⤵
-
\??\c:\9pvjv.exec:\9pvjv.exe153⤵
-
\??\c:\xrlfxrl.exec:\xrlfxrl.exe154⤵
-
\??\c:\nbhbhb.exec:\nbhbhb.exe155⤵
-
\??\c:\7bnnbt.exec:\7bnnbt.exe156⤵
-
\??\c:\jppjd.exec:\jppjd.exe157⤵
-
\??\c:\jpjdp.exec:\jpjdp.exe158⤵
-
\??\c:\xlrxllf.exec:\xlrxllf.exe159⤵
-
\??\c:\lflfxxx.exec:\lflfxxx.exe160⤵
-
\??\c:\ntbtnn.exec:\ntbtnn.exe161⤵
-
\??\c:\dpvpd.exec:\dpvpd.exe162⤵
-
\??\c:\dvvpp.exec:\dvvpp.exe163⤵
-
\??\c:\xffxlll.exec:\xffxlll.exe164⤵
-
\??\c:\ttttnn.exec:\ttttnn.exe165⤵
-
\??\c:\tnbtht.exec:\tnbtht.exe166⤵
-
\??\c:\jvjvd.exec:\jvjvd.exe167⤵
-
\??\c:\djjdp.exec:\djjdp.exe168⤵
-
\??\c:\rlrlxxr.exec:\rlrlxxr.exe169⤵
-
\??\c:\nbbbtt.exec:\nbbbtt.exe170⤵
-
\??\c:\thhtnt.exec:\thhtnt.exe171⤵
-
\??\c:\7ddvp.exec:\7ddvp.exe172⤵
-
\??\c:\vjvpp.exec:\vjvpp.exe173⤵
-
\??\c:\5lxfflr.exec:\5lxfflr.exe174⤵
-
\??\c:\rfrflll.exec:\rfrflll.exe175⤵
-
\??\c:\nhbnhb.exec:\nhbnhb.exe176⤵
-
\??\c:\bnthtt.exec:\bnthtt.exe177⤵
-
\??\c:\vjjdd.exec:\vjjdd.exe178⤵
-
\??\c:\vvvpp.exec:\vvvpp.exe179⤵
-
\??\c:\fflfrrl.exec:\fflfrrl.exe180⤵
-
\??\c:\5hnhbb.exec:\5hnhbb.exe181⤵
-
\??\c:\pddpv.exec:\pddpv.exe182⤵
-
\??\c:\7jvpp.exec:\7jvpp.exe183⤵
-
\??\c:\9fxrlfx.exec:\9fxrlfx.exe184⤵
-
\??\c:\1ntnbb.exec:\1ntnbb.exe185⤵
-
\??\c:\bntnbt.exec:\bntnbt.exe186⤵
-
\??\c:\jvvjd.exec:\jvvjd.exe187⤵
-
\??\c:\vdddv.exec:\vdddv.exe188⤵
-
\??\c:\9fflffl.exec:\9fflffl.exe189⤵
-
\??\c:\5flfrrl.exec:\5flfrrl.exe190⤵
-
\??\c:\ttbhth.exec:\ttbhth.exe191⤵
-
\??\c:\nhnhbb.exec:\nhnhbb.exe192⤵
-
\??\c:\1ddvp.exec:\1ddvp.exe193⤵
-
\??\c:\7jvpd.exec:\7jvpd.exe194⤵
-
\??\c:\3llfffl.exec:\3llfffl.exe195⤵
-
\??\c:\9rxrxxr.exec:\9rxrxxr.exe196⤵
-
\??\c:\tntnbb.exec:\tntnbb.exe197⤵
-
\??\c:\ppvpj.exec:\ppvpj.exe198⤵
-
\??\c:\pjjvp.exec:\pjjvp.exe199⤵
-
\??\c:\frfxrrr.exec:\frfxrrr.exe200⤵
-
\??\c:\rlxrrrl.exec:\rlxrrrl.exe201⤵
-
\??\c:\tbbtnn.exec:\tbbtnn.exe202⤵
-
\??\c:\bthbbb.exec:\bthbbb.exe203⤵
-
\??\c:\pdvpj.exec:\pdvpj.exe204⤵
-
\??\c:\vjdvv.exec:\vjdvv.exe205⤵
-
\??\c:\lfrxrxx.exec:\lfrxrxx.exe206⤵
-
\??\c:\rflrlrr.exec:\rflrlrr.exe207⤵
-
\??\c:\tnbtnt.exec:\tnbtnt.exe208⤵
-
\??\c:\3bbnbh.exec:\3bbnbh.exe209⤵
-
\??\c:\jddvj.exec:\jddvj.exe210⤵
-
\??\c:\dpvjp.exec:\dpvjp.exe211⤵
-
\??\c:\lfxxrrr.exec:\lfxxrrr.exe212⤵
-
\??\c:\thhhhh.exec:\thhhhh.exe213⤵
-
\??\c:\bnnhtt.exec:\bnnhtt.exe214⤵
-
\??\c:\9vpjv.exec:\9vpjv.exe215⤵
-
\??\c:\7pvpj.exec:\7pvpj.exe216⤵
-
\??\c:\xlrfrrl.exec:\xlrfrrl.exe217⤵
-
\??\c:\rlrxrrr.exec:\rlrxrrr.exe218⤵
-
\??\c:\tnnhbb.exec:\tnnhbb.exe219⤵
-
\??\c:\pjjdd.exec:\pjjdd.exe220⤵
-
\??\c:\pjdvp.exec:\pjdvp.exe221⤵
-
\??\c:\1rfrrrr.exec:\1rfrrrr.exe222⤵
-
\??\c:\lxxxrrl.exec:\lxxxrrl.exe223⤵
-
\??\c:\hthhhh.exec:\hthhhh.exe224⤵
-
\??\c:\hbnbnb.exec:\hbnbnb.exe225⤵
-
\??\c:\vvjvd.exec:\vvjvd.exe226⤵
-
\??\c:\jjjdv.exec:\jjjdv.exe227⤵
-
\??\c:\xxfxlxr.exec:\xxfxlxr.exe228⤵
-
\??\c:\hbnhbb.exec:\hbnhbb.exe229⤵
-
\??\c:\tnhhtt.exec:\tnhhtt.exe230⤵
-
\??\c:\pdvpd.exec:\pdvpd.exe231⤵
-
\??\c:\fflfrrl.exec:\fflfrrl.exe232⤵
-
\??\c:\3xfxrrl.exec:\3xfxrrl.exe233⤵
-
\??\c:\nhnhbb.exec:\nhnhbb.exe234⤵
-
\??\c:\nnbbtt.exec:\nnbbtt.exe235⤵
-
\??\c:\7ddvv.exec:\7ddvv.exe236⤵
-
\??\c:\vdjdp.exec:\vdjdp.exe237⤵
-
\??\c:\llrrffx.exec:\llrrffx.exe238⤵
-
\??\c:\nbtnhb.exec:\nbtnhb.exe239⤵
-
\??\c:\hbbtnn.exec:\hbbtnn.exe240⤵
-
\??\c:\dpvjd.exec:\dpvjd.exe241⤵