Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 19:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe
-
Size
97KB
-
MD5
6862b5a53d9af4615e4734eab1829051
-
SHA1
7768fda75c37a79e4dc49bf3d4ae79f7176229c2
-
SHA256
1b1a5c0d89107de39146e2ccfe0dad9cfdd220b340e841fc4d202a91f0d0011b
-
SHA512
244f9036625146943f5f17145cdfd02c254599a175295f253c9d1132f41664b19f24e958f71dcfbddcac227c88bee88f8edfd56617df28bf03626e55d7014fb5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+mzv7oEzNmNMvVjoM0:ymb3NkkiQ3mdBjF+3TYzvTt8M0
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral1/memory/1924-7-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1924-6-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1952-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2964-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2608-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2700-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2428-62-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2560-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2424-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2908-91-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1884-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2728-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2748-120-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2276-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2164-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2032-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2068-183-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1976-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2088-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/580-219-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1768-228-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2356-237-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1916-245-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/900-299-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2248-263-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
jjdjp.exelfrxflx.exennhbth.exedvddp.exefrflllr.exe1tnnbb.exedvjpv.exedvvpj.exelfrrxfl.exelxfxrrx.exe9bnntt.exe7bhhnt.exenhtthb.exevpdjv.exepvdpv.exelfffllx.exe7lrxrxf.exetntbhn.exe9nnnhh.exeppdjv.exejpjpj.exe3frlrrx.exe9rfxlrl.exebtbthh.exenhtbhn.exe5pdjp.exefxllxlr.exexxfllff.exehbnnbt.exe7hhbhn.exehbnntt.exevpvvv.exerrfrxxf.exe5xrrxrx.exe5flrrxx.exebthhnn.exepjppd.exedppjd.exexfrlfrf.exexrxxfxl.exebnbbhh.exe7vvpv.exenhtbnn.exe3tthtt.exenbnnbh.exehbhttt.exejvjdj.exepdppp.exelrxxxxx.exe7rlrflr.exennbhbh.exe5pvjj.exejjvdj.exexfffxxr.exexllrxff.exehtnhtn.exe3pvvv.exe3pdpj.exerlxxlrx.exefrrlrlr.exe3rxfxxx.exethnhnh.exejvddd.exejpvpv.exepid process 1952 jjdjp.exe 2964 lfrxflx.exe 2608 nnhbth.exe 2700 dvddp.exe 2428 frflllr.exe 2560 1tnnbb.exe 2424 dvjpv.exe 2908 dvvpj.exe 1884 lfrrxfl.exe 2728 lxfxrrx.exe 2748 9bnntt.exe 2800 7bhhnt.exe 340 nhtthb.exe 2276 vpdjv.exe 2348 pvdpv.exe 2164 lfffllx.exe 2032 7lrxrxf.exe 2068 tntbhn.exe 1976 9nnnhh.exe 2088 ppdjv.exe 324 jpjpj.exe 580 3frlrrx.exe 1768 9rfxlrl.exe 2356 btbthh.exe 1916 nhtbhn.exe 964 5pdjp.exe 2248 fxllxlr.exe 2960 xxfllff.exe 1444 hbnnbt.exe 2600 7hhbhn.exe 900 hbnntt.exe 2064 vpvvv.exe 1652 rrfrxxf.exe 2124 5xrrxrx.exe 2320 5flrrxx.exe 2964 bthhnn.exe 2608 pjppd.exe 2596 dppjd.exe 2700 xfrlfrf.exe 2552 xrxxfxl.exe 2388 bnbbhh.exe 2904 7vvpv.exe 1984 nhtbnn.exe 2648 3tthtt.exe 2644 nbnnbh.exe 2652 hbhttt.exe 1252 jvjdj.exe 2636 pdppp.exe 2800 lrxxxxx.exe 1348 7rlrflr.exe 848 nnbhbh.exe 1760 5pvjj.exe 2036 jjvdj.exe 2004 xfffxxr.exe 1612 xllrxff.exe 2184 htnhtn.exe 2368 3pvvv.exe 2208 3pdpj.exe 2088 rlxxlrx.exe 324 frrlrlr.exe 1420 3rxfxxx.exe 1132 thnhnh.exe 2108 jvddd.exe 1564 jpvpv.exe -
Processes:
resource yara_rule behavioral1/memory/1924-6-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1952-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2964-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2608-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2700-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2428-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2424-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2908-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1884-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2728-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2748-120-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2276-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2164-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2032-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2068-183-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1976-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2088-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/580-219-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1768-228-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2356-237-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1916-245-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/900-299-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2248-263-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exejjdjp.exelfrxflx.exennhbth.exedvddp.exefrflllr.exe1tnnbb.exedvjpv.exedvvpj.exelfrrxfl.exelxfxrrx.exe9bnntt.exe7bhhnt.exenhtthb.exevpdjv.exepvdpv.exedescription pid process target process PID 1924 wrote to memory of 1952 1924 6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe jjdjp.exe PID 1924 wrote to memory of 1952 1924 6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe jjdjp.exe PID 1924 wrote to memory of 1952 1924 6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe jjdjp.exe PID 1924 wrote to memory of 1952 1924 6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe jjdjp.exe PID 1952 wrote to memory of 2964 1952 jjdjp.exe lfrxflx.exe PID 1952 wrote to memory of 2964 1952 jjdjp.exe lfrxflx.exe PID 1952 wrote to memory of 2964 1952 jjdjp.exe lfrxflx.exe PID 1952 wrote to memory of 2964 1952 jjdjp.exe lfrxflx.exe PID 2964 wrote to memory of 2608 2964 lfrxflx.exe nnhbth.exe PID 2964 wrote to memory of 2608 2964 lfrxflx.exe nnhbth.exe PID 2964 wrote to memory of 2608 2964 lfrxflx.exe nnhbth.exe PID 2964 wrote to memory of 2608 2964 lfrxflx.exe nnhbth.exe PID 2608 wrote to memory of 2700 2608 nnhbth.exe dvddp.exe PID 2608 wrote to memory of 2700 2608 nnhbth.exe dvddp.exe PID 2608 wrote to memory of 2700 2608 nnhbth.exe dvddp.exe PID 2608 wrote to memory of 2700 2608 nnhbth.exe dvddp.exe PID 2700 wrote to memory of 2428 2700 dvddp.exe frflllr.exe PID 2700 wrote to memory of 2428 2700 dvddp.exe frflllr.exe PID 2700 wrote to memory of 2428 2700 dvddp.exe frflllr.exe PID 2700 wrote to memory of 2428 2700 dvddp.exe frflllr.exe PID 2428 wrote to memory of 2560 2428 frflllr.exe 1tnnbb.exe PID 2428 wrote to memory of 2560 2428 frflllr.exe 1tnnbb.exe PID 2428 wrote to memory of 2560 2428 frflllr.exe 1tnnbb.exe PID 2428 wrote to memory of 2560 2428 frflllr.exe 1tnnbb.exe PID 2560 wrote to memory of 2424 2560 1tnnbb.exe dvjpv.exe PID 2560 wrote to memory of 2424 2560 1tnnbb.exe dvjpv.exe PID 2560 wrote to memory of 2424 2560 1tnnbb.exe dvjpv.exe PID 2560 wrote to memory of 2424 2560 1tnnbb.exe dvjpv.exe PID 2424 wrote to memory of 2908 2424 dvjpv.exe dvvpj.exe PID 2424 wrote to memory of 2908 2424 dvjpv.exe dvvpj.exe PID 2424 wrote to memory of 2908 2424 dvjpv.exe dvvpj.exe PID 2424 wrote to memory of 2908 2424 dvjpv.exe dvvpj.exe PID 2908 wrote to memory of 1884 2908 dvvpj.exe lfrrxfl.exe PID 2908 wrote to memory of 1884 2908 dvvpj.exe lfrrxfl.exe PID 2908 wrote to memory of 1884 2908 dvvpj.exe lfrrxfl.exe PID 2908 wrote to memory of 1884 2908 dvvpj.exe lfrrxfl.exe PID 1884 wrote to memory of 2728 1884 lfrrxfl.exe lxfxrrx.exe PID 1884 wrote to memory of 2728 1884 lfrrxfl.exe lxfxrrx.exe PID 1884 wrote to memory of 2728 1884 lfrrxfl.exe lxfxrrx.exe PID 1884 wrote to memory of 2728 1884 lfrrxfl.exe lxfxrrx.exe PID 2728 wrote to memory of 2748 2728 lxfxrrx.exe 9bnntt.exe PID 2728 wrote to memory of 2748 2728 lxfxrrx.exe 9bnntt.exe PID 2728 wrote to memory of 2748 2728 lxfxrrx.exe 9bnntt.exe PID 2728 wrote to memory of 2748 2728 lxfxrrx.exe 9bnntt.exe PID 2748 wrote to memory of 2800 2748 9bnntt.exe 7bhhnt.exe PID 2748 wrote to memory of 2800 2748 9bnntt.exe 7bhhnt.exe PID 2748 wrote to memory of 2800 2748 9bnntt.exe 7bhhnt.exe PID 2748 wrote to memory of 2800 2748 9bnntt.exe 7bhhnt.exe PID 2800 wrote to memory of 340 2800 7bhhnt.exe nhtthb.exe PID 2800 wrote to memory of 340 2800 7bhhnt.exe nhtthb.exe PID 2800 wrote to memory of 340 2800 7bhhnt.exe nhtthb.exe PID 2800 wrote to memory of 340 2800 7bhhnt.exe nhtthb.exe PID 340 wrote to memory of 2276 340 nhtthb.exe vpdjv.exe PID 340 wrote to memory of 2276 340 nhtthb.exe vpdjv.exe PID 340 wrote to memory of 2276 340 nhtthb.exe vpdjv.exe PID 340 wrote to memory of 2276 340 nhtthb.exe vpdjv.exe PID 2276 wrote to memory of 2348 2276 vpdjv.exe pvdpv.exe PID 2276 wrote to memory of 2348 2276 vpdjv.exe pvdpv.exe PID 2276 wrote to memory of 2348 2276 vpdjv.exe pvdpv.exe PID 2276 wrote to memory of 2348 2276 vpdjv.exe pvdpv.exe PID 2348 wrote to memory of 2164 2348 pvdpv.exe lfffllx.exe PID 2348 wrote to memory of 2164 2348 pvdpv.exe lfffllx.exe PID 2348 wrote to memory of 2164 2348 pvdpv.exe lfffllx.exe PID 2348 wrote to memory of 2164 2348 pvdpv.exe lfffllx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\jjdjp.exec:\jjdjp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfrxflx.exec:\lfrxflx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnhbth.exec:\nnhbth.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvddp.exec:\dvddp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\frflllr.exec:\frflllr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1tnnbb.exec:\1tnnbb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvjpv.exec:\dvjpv.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dvvpj.exec:\dvvpj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfrrxfl.exec:\lfrrxfl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lxfxrrx.exec:\lxfxrrx.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\9bnntt.exec:\9bnntt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7bhhnt.exec:\7bhhnt.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhtthb.exec:\nhtthb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vpdjv.exec:\vpdjv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pvdpv.exec:\pvdpv.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfffllx.exec:\lfffllx.exe17⤵
- Executes dropped EXE
-
\??\c:\7lrxrxf.exec:\7lrxrxf.exe18⤵
- Executes dropped EXE
-
\??\c:\tntbhn.exec:\tntbhn.exe19⤵
- Executes dropped EXE
-
\??\c:\9nnnhh.exec:\9nnnhh.exe20⤵
- Executes dropped EXE
-
\??\c:\ppdjv.exec:\ppdjv.exe21⤵
- Executes dropped EXE
-
\??\c:\jpjpj.exec:\jpjpj.exe22⤵
- Executes dropped EXE
-
\??\c:\3frlrrx.exec:\3frlrrx.exe23⤵
- Executes dropped EXE
-
\??\c:\9rfxlrl.exec:\9rfxlrl.exe24⤵
- Executes dropped EXE
-
\??\c:\btbthh.exec:\btbthh.exe25⤵
- Executes dropped EXE
-
\??\c:\nhtbhn.exec:\nhtbhn.exe26⤵
- Executes dropped EXE
-
\??\c:\5pdjp.exec:\5pdjp.exe27⤵
- Executes dropped EXE
-
\??\c:\fxllxlr.exec:\fxllxlr.exe28⤵
- Executes dropped EXE
-
\??\c:\xxfllff.exec:\xxfllff.exe29⤵
- Executes dropped EXE
-
\??\c:\hbnnbt.exec:\hbnnbt.exe30⤵
- Executes dropped EXE
-
\??\c:\7hhbhn.exec:\7hhbhn.exe31⤵
- Executes dropped EXE
-
\??\c:\hbnntt.exec:\hbnntt.exe32⤵
- Executes dropped EXE
-
\??\c:\vpvvv.exec:\vpvvv.exe33⤵
- Executes dropped EXE
-
\??\c:\rrfrxxf.exec:\rrfrxxf.exe34⤵
- Executes dropped EXE
-
\??\c:\5xrrxrx.exec:\5xrrxrx.exe35⤵
- Executes dropped EXE
-
\??\c:\5flrrxx.exec:\5flrrxx.exe36⤵
- Executes dropped EXE
-
\??\c:\bthhnn.exec:\bthhnn.exe37⤵
- Executes dropped EXE
-
\??\c:\pjppd.exec:\pjppd.exe38⤵
- Executes dropped EXE
-
\??\c:\dppjd.exec:\dppjd.exe39⤵
- Executes dropped EXE
-
\??\c:\xfrlfrf.exec:\xfrlfrf.exe40⤵
- Executes dropped EXE
-
\??\c:\xrxxfxl.exec:\xrxxfxl.exe41⤵
- Executes dropped EXE
-
\??\c:\bnbbhh.exec:\bnbbhh.exe42⤵
- Executes dropped EXE
-
\??\c:\7vvpv.exec:\7vvpv.exe43⤵
- Executes dropped EXE
-
\??\c:\nhtbnn.exec:\nhtbnn.exe44⤵
- Executes dropped EXE
-
\??\c:\3tthtt.exec:\3tthtt.exe45⤵
- Executes dropped EXE
-
\??\c:\nbnnbh.exec:\nbnnbh.exe46⤵
- Executes dropped EXE
-
\??\c:\hbhttt.exec:\hbhttt.exe47⤵
- Executes dropped EXE
-
\??\c:\jvjdj.exec:\jvjdj.exe48⤵
- Executes dropped EXE
-
\??\c:\pdppp.exec:\pdppp.exe49⤵
- Executes dropped EXE
-
\??\c:\lrxxxxx.exec:\lrxxxxx.exe50⤵
- Executes dropped EXE
-
\??\c:\7rlrflr.exec:\7rlrflr.exe51⤵
- Executes dropped EXE
-
\??\c:\nnbhbh.exec:\nnbhbh.exe52⤵
- Executes dropped EXE
-
\??\c:\5pvjj.exec:\5pvjj.exe53⤵
- Executes dropped EXE
-
\??\c:\jjvdj.exec:\jjvdj.exe54⤵
- Executes dropped EXE
-
\??\c:\xfffxxr.exec:\xfffxxr.exe55⤵
- Executes dropped EXE
-
\??\c:\xllrxff.exec:\xllrxff.exe56⤵
- Executes dropped EXE
-
\??\c:\htnhtn.exec:\htnhtn.exe57⤵
- Executes dropped EXE
-
\??\c:\3pvvv.exec:\3pvvv.exe58⤵
- Executes dropped EXE
-
\??\c:\3pdpj.exec:\3pdpj.exe59⤵
- Executes dropped EXE
-
\??\c:\rlxxlrx.exec:\rlxxlrx.exe60⤵
- Executes dropped EXE
-
\??\c:\frrlrlr.exec:\frrlrlr.exe61⤵
- Executes dropped EXE
-
\??\c:\3rxfxxx.exec:\3rxfxxx.exe62⤵
- Executes dropped EXE
-
\??\c:\thnhnh.exec:\thnhnh.exe63⤵
- Executes dropped EXE
-
\??\c:\jvddd.exec:\jvddd.exe64⤵
- Executes dropped EXE
-
\??\c:\jpvpv.exec:\jpvpv.exe65⤵
- Executes dropped EXE
-
\??\c:\pdddv.exec:\pdddv.exe66⤵
-
\??\c:\frfxrrr.exec:\frfxrrr.exe67⤵
-
\??\c:\xrfxxxx.exec:\xrfxxxx.exe68⤵
-
\??\c:\1hhbbb.exec:\1hhbbb.exe69⤵
-
\??\c:\hthtbh.exec:\hthtbh.exe70⤵
-
\??\c:\7jvjj.exec:\7jvjj.exe71⤵
-
\??\c:\vpddd.exec:\vpddd.exe72⤵
-
\??\c:\xfrxrlx.exec:\xfrxrlx.exe73⤵
-
\??\c:\9llrxxl.exec:\9llrxxl.exe74⤵
-
\??\c:\xlfflxl.exec:\xlfflxl.exe75⤵
-
\??\c:\thnnbh.exec:\thnnbh.exe76⤵
-
\??\c:\btnttb.exec:\btnttb.exe77⤵
-
\??\c:\jvdvj.exec:\jvdvj.exe78⤵
-
\??\c:\jppdj.exec:\jppdj.exe79⤵
-
\??\c:\1frrxrl.exec:\1frrxrl.exe80⤵
-
\??\c:\lflrxxf.exec:\lflrxxf.exe81⤵
-
\??\c:\9bhnbb.exec:\9bhnbb.exe82⤵
-
\??\c:\bttbnn.exec:\bttbnn.exe83⤵
-
\??\c:\1pddd.exec:\1pddd.exe84⤵
-
\??\c:\pdpdj.exec:\pdpdj.exe85⤵
-
\??\c:\jvddj.exec:\jvddj.exe86⤵
-
\??\c:\lxlffff.exec:\lxlffff.exe87⤵
-
\??\c:\rlxxfll.exec:\rlxxfll.exe88⤵
-
\??\c:\nbhnhb.exec:\nbhnhb.exe89⤵
-
\??\c:\hbhbbb.exec:\hbhbbb.exe90⤵
-
\??\c:\tttbth.exec:\tttbth.exe91⤵
-
\??\c:\vdjvj.exec:\vdjvj.exe92⤵
-
\??\c:\dddvd.exec:\dddvd.exe93⤵
-
\??\c:\frxxxxf.exec:\frxxxxf.exe94⤵
-
\??\c:\1lxfflr.exec:\1lxfflr.exe95⤵
-
\??\c:\5tnnnn.exec:\5tnnnn.exe96⤵
-
\??\c:\vvjjd.exec:\vvjjd.exe97⤵
-
\??\c:\rrrrxxr.exec:\rrrrxxr.exe98⤵
-
\??\c:\rxlfffr.exec:\rxlfffr.exe99⤵
-
\??\c:\hnhtbh.exec:\hnhtbh.exe100⤵
-
\??\c:\bbthht.exec:\bbthht.exe101⤵
-
\??\c:\vppjj.exec:\vppjj.exe102⤵
-
\??\c:\5rfxflr.exec:\5rfxflr.exe103⤵
-
\??\c:\3xrlrrx.exec:\3xrlrrx.exe104⤵
-
\??\c:\3ntntt.exec:\3ntntt.exe105⤵
-
\??\c:\7thhhb.exec:\7thhhb.exe106⤵
-
\??\c:\5ddpp.exec:\5ddpp.exe107⤵
-
\??\c:\1jvpj.exec:\1jvpj.exe108⤵
-
\??\c:\rlxxflr.exec:\rlxxflr.exe109⤵
-
\??\c:\lfllrrl.exec:\lfllrrl.exe110⤵
-
\??\c:\bthbhh.exec:\bthbhh.exe111⤵
-
\??\c:\jdpdp.exec:\jdpdp.exe112⤵
-
\??\c:\djvdp.exec:\djvdp.exe113⤵
-
\??\c:\1fllffr.exec:\1fllffr.exe114⤵
-
\??\c:\lxflxfr.exec:\lxflxfr.exe115⤵
-
\??\c:\tnhhtt.exec:\tnhhtt.exe116⤵
-
\??\c:\thttbh.exec:\thttbh.exe117⤵
-
\??\c:\vpvdp.exec:\vpvdp.exe118⤵
-
\??\c:\pjvpp.exec:\pjvpp.exe119⤵
-
\??\c:\rfffflr.exec:\rfffflr.exe120⤵
-
\??\c:\frfflll.exec:\frfflll.exe121⤵
-
\??\c:\hbnbnh.exec:\hbnbnh.exe122⤵
-
\??\c:\hhhhtn.exec:\hhhhtn.exe123⤵
-
\??\c:\jdpvd.exec:\jdpvd.exe124⤵
-
\??\c:\pjdpv.exec:\pjdpv.exe125⤵
-
\??\c:\3rfxfff.exec:\3rfxfff.exe126⤵
-
\??\c:\rrxfllx.exec:\rrxfllx.exe127⤵
-
\??\c:\bthnbn.exec:\bthnbn.exe128⤵
-
\??\c:\tnbbtn.exec:\tnbbtn.exe129⤵
-
\??\c:\9pjdj.exec:\9pjdj.exe130⤵
-
\??\c:\djjdj.exec:\djjdj.exe131⤵
-
\??\c:\lfxlrxl.exec:\lfxlrxl.exe132⤵
-
\??\c:\9tntbb.exec:\9tntbb.exe133⤵
-
\??\c:\ntnthh.exec:\ntnthh.exe134⤵
-
\??\c:\1jdjp.exec:\1jdjp.exe135⤵
-
\??\c:\pvdpj.exec:\pvdpj.exe136⤵
-
\??\c:\xrflrxl.exec:\xrflrxl.exe137⤵
-
\??\c:\rlfxffl.exec:\rlfxffl.exe138⤵
-
\??\c:\tthtbh.exec:\tthtbh.exe139⤵
-
\??\c:\bttbhn.exec:\bttbhn.exe140⤵
-
\??\c:\vppjd.exec:\vppjd.exe141⤵
-
\??\c:\1dvvd.exec:\1dvvd.exe142⤵
-
\??\c:\fxrfxfl.exec:\fxrfxfl.exe143⤵
-
\??\c:\xrlrfrx.exec:\xrlrfrx.exe144⤵
-
\??\c:\bbbbhh.exec:\bbbbhh.exe145⤵
-
\??\c:\hthntt.exec:\hthntt.exe146⤵
-
\??\c:\vjvdj.exec:\vjvdj.exe147⤵
-
\??\c:\vvjjp.exec:\vvjjp.exe148⤵
-
\??\c:\rllrxfx.exec:\rllrxfx.exe149⤵
-
\??\c:\lfxfrxr.exec:\lfxfrxr.exe150⤵
-
\??\c:\frflrlx.exec:\frflrlx.exe151⤵
-
\??\c:\jdpvd.exec:\jdpvd.exe152⤵
-
\??\c:\ppvvp.exec:\ppvvp.exe153⤵
-
\??\c:\rfrlrlr.exec:\rfrlrlr.exe154⤵
-
\??\c:\xxfffxf.exec:\xxfffxf.exe155⤵
-
\??\c:\nhnnnh.exec:\nhnnnh.exe156⤵
-
\??\c:\hbhtbb.exec:\hbhtbb.exe157⤵
-
\??\c:\djvdj.exec:\djvdj.exe158⤵
-
\??\c:\9pddd.exec:\9pddd.exe159⤵
-
\??\c:\3xlxlfx.exec:\3xlxlfx.exe160⤵
-
\??\c:\lfrrxlr.exec:\lfrrxlr.exe161⤵
-
\??\c:\3nhntt.exec:\3nhntt.exe162⤵
-
\??\c:\bbtthn.exec:\bbtthn.exe163⤵
-
\??\c:\jvvdp.exec:\jvvdp.exe164⤵
-
\??\c:\ppdjj.exec:\ppdjj.exe165⤵
-
\??\c:\fxlrrxx.exec:\fxlrrxx.exe166⤵
-
\??\c:\5hnttb.exec:\5hnttb.exe167⤵
-
\??\c:\1nhntt.exec:\1nhntt.exe168⤵
-
\??\c:\dvpdj.exec:\dvpdj.exe169⤵
-
\??\c:\vvvpd.exec:\vvvpd.exe170⤵
-
\??\c:\ffrxrfr.exec:\ffrxrfr.exe171⤵
-
\??\c:\fxrrflr.exec:\fxrrflr.exe172⤵
-
\??\c:\thhhnn.exec:\thhhnn.exe173⤵
-
\??\c:\thnnnh.exec:\thnnnh.exe174⤵
-
\??\c:\7pjjj.exec:\7pjjj.exe175⤵
-
\??\c:\5pvpd.exec:\5pvpd.exe176⤵
-
\??\c:\rfxlllx.exec:\rfxlllx.exe177⤵
-
\??\c:\rfllrfl.exec:\rfllrfl.exe178⤵
-
\??\c:\hhtbnt.exec:\hhtbnt.exe179⤵
-
\??\c:\3bnttb.exec:\3bnttb.exe180⤵
-
\??\c:\dpddd.exec:\dpddd.exe181⤵
-
\??\c:\5vvvd.exec:\5vvvd.exe182⤵
-
\??\c:\rllfffl.exec:\rllfffl.exe183⤵
-
\??\c:\llrflfl.exec:\llrflfl.exe184⤵
-
\??\c:\nbhhnn.exec:\nbhhnn.exe185⤵
-
\??\c:\btnbhh.exec:\btnbhh.exe186⤵
-
\??\c:\hntnht.exec:\hntnht.exe187⤵
-
\??\c:\7ddpv.exec:\7ddpv.exe188⤵
-
\??\c:\pdjjv.exec:\pdjjv.exe189⤵
-
\??\c:\9lxxxrf.exec:\9lxxxrf.exe190⤵
-
\??\c:\1fxffff.exec:\1fxffff.exe191⤵
-
\??\c:\5nhhtb.exec:\5nhhtb.exe192⤵
-
\??\c:\thnhtt.exec:\thnhtt.exe193⤵
-
\??\c:\dvjjp.exec:\dvjjp.exe194⤵
-
\??\c:\vpvdp.exec:\vpvdp.exe195⤵
-
\??\c:\fxrrxfx.exec:\fxrrxfx.exe196⤵
-
\??\c:\hhthnt.exec:\hhthnt.exe197⤵
-
\??\c:\3htthh.exec:\3htthh.exe198⤵
-
\??\c:\7nhntt.exec:\7nhntt.exe199⤵
-
\??\c:\jvvjd.exec:\jvvjd.exe200⤵
-
\??\c:\pvjdj.exec:\pvjdj.exe201⤵
-
\??\c:\lxxrflf.exec:\lxxrflf.exe202⤵
-
\??\c:\nhnbnt.exec:\nhnbnt.exe203⤵
-
\??\c:\7jppv.exec:\7jppv.exe204⤵
-
\??\c:\dpvpj.exec:\dpvpj.exe205⤵
-
\??\c:\lffxfxl.exec:\lffxfxl.exe206⤵
-
\??\c:\lfrxflr.exec:\lfrxflr.exe207⤵
-
\??\c:\7htntt.exec:\7htntt.exe208⤵
-
\??\c:\thhnhh.exec:\thhnhh.exe209⤵
-
\??\c:\vpppd.exec:\vpppd.exe210⤵
-
\??\c:\dvdjj.exec:\dvdjj.exe211⤵
-
\??\c:\xrllrrf.exec:\xrllrrf.exe212⤵
-
\??\c:\7lrrrrx.exec:\7lrrrrx.exe213⤵
-
\??\c:\tnttbt.exec:\tnttbt.exe214⤵
-
\??\c:\nnhbbt.exec:\nnhbbt.exe215⤵
-
\??\c:\jdpvv.exec:\jdpvv.exe216⤵
-
\??\c:\dvppp.exec:\dvppp.exe217⤵
-
\??\c:\fxlxflr.exec:\fxlxflr.exe218⤵
-
\??\c:\9lxflfr.exec:\9lxflfr.exe219⤵
-
\??\c:\hbnnhb.exec:\hbnnhb.exe220⤵
-
\??\c:\bnbntt.exec:\bnbntt.exe221⤵
-
\??\c:\ppjjd.exec:\ppjjd.exe222⤵
-
\??\c:\pjppp.exec:\pjppp.exe223⤵
-
\??\c:\xrffrfl.exec:\xrffrfl.exe224⤵
-
\??\c:\7lffrrx.exec:\7lffrrx.exe225⤵
-
\??\c:\9thbnn.exec:\9thbnn.exe226⤵
-
\??\c:\9nhhhh.exec:\9nhhhh.exe227⤵
-
\??\c:\vjvvj.exec:\vjvvj.exe228⤵
-
\??\c:\9dvvj.exec:\9dvvj.exe229⤵
-
\??\c:\lfrrrrx.exec:\lfrrrrx.exe230⤵
-
\??\c:\7fllrxf.exec:\7fllrxf.exe231⤵
-
\??\c:\tnbttt.exec:\tnbttt.exe232⤵
-
\??\c:\bntnhn.exec:\bntnhn.exe233⤵
-
\??\c:\9pvpj.exec:\9pvpj.exe234⤵
-
\??\c:\vppdd.exec:\vppdd.exe235⤵
-
\??\c:\xrxffff.exec:\xrxffff.exe236⤵
-
\??\c:\5rfxfrx.exec:\5rfxfrx.exe237⤵
-
\??\c:\3lxrrll.exec:\3lxrrll.exe238⤵
-
\??\c:\nhnnnn.exec:\nhnnnn.exe239⤵
-
\??\c:\dvjpv.exec:\dvjpv.exe240⤵
-
\??\c:\jdjdj.exec:\jdjdj.exe241⤵