Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:39
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe
-
Size
97KB
-
MD5
6862b5a53d9af4615e4734eab1829051
-
SHA1
7768fda75c37a79e4dc49bf3d4ae79f7176229c2
-
SHA256
1b1a5c0d89107de39146e2ccfe0dad9cfdd220b340e841fc4d202a91f0d0011b
-
SHA512
244f9036625146943f5f17145cdfd02c254599a175295f253c9d1132f41664b19f24e958f71dcfbddcac227c88bee88f8edfd56617df28bf03626e55d7014fb5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+mzv7oEzNmNMvVjoM0:ymb3NkkiQ3mdBjF+3TYzvTt8M0
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/388-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1600-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/60-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/508-29-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3332-41-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3332-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1260-50-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1880-65-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5016-57-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1076-81-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4960-73-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/932-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3380-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4416-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4048-105-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4496-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3684-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3524-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3292-147-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4328-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4480-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4952-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4936-182-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4220-195-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
jvddd.exerrfrlff.exetbhbbb.exebhhhbb.exevjpjj.exe3frrllx.exennbbhh.exe3vddd.exeddddv.exeffxrrll.exentnttt.exejdjdd.exennbbhb.exe1pdpj.exexfrrrff.exe5lfxllx.exenhbbbn.exejdppd.exelfrrrrr.exebbnttb.exejdjjj.exelrffxxf.exebnhnbh.exedvjjp.exerffrflr.exellrrllr.exebbttbt.exejppjd.exexfffxlf.exepvvvd.exelxffxfx.exetnnhbt.exethtttb.exevjvdv.exejjpjj.exerlxxxfx.exenbnttt.exetnthnn.exentnttb.exepjvvv.exe9xxxflr.exe7bhtbb.exejpjdd.exerrxfxff.exexxxxxxf.exehhhnnt.exetthhbh.exepvddv.exefllfxfx.exerflrfrr.exehhnnhn.exedjjjv.exepvppp.exerfrxxrf.exenhbbhh.exedpddj.exevjvdv.exerrffxfl.exexfffrrr.exenbnnnh.exejpppp.exevvpvp.exexxxxflr.exelfrrrrr.exepid process 60 jvddd.exe 1600 rrfrlff.exe 2560 tbhbbb.exe 508 bhhhbb.exe 3332 vjpjj.exe 4380 3frrllx.exe 1260 nnbbhh.exe 5016 3vddd.exe 1880 ddddv.exe 4960 ffxrrll.exe 1076 ntnttt.exe 932 jdjdd.exe 3380 nnbbhb.exe 4416 1pdpj.exe 4048 xfrrrff.exe 4496 5lfxllx.exe 836 nhbbbn.exe 3656 jdppd.exe 3684 lfrrrrr.exe 3524 bbnttb.exe 928 jdjjj.exe 3292 lrffxxf.exe 3464 bnhnbh.exe 4328 dvjjp.exe 4860 rffrflr.exe 4480 llrrllr.exe 4952 bbttbt.exe 4936 jppjd.exe 4588 xfffxlf.exe 4220 pvvvd.exe 4252 lxffxfx.exe 1704 tnnhbt.exe 2404 thtttb.exe 4400 vjvdv.exe 4108 jjpjj.exe 2724 rlxxxfx.exe 1048 nbnttt.exe 3888 tnthnn.exe 1928 ntnttb.exe 400 pjvvv.exe 4484 9xxxflr.exe 756 7bhtbb.exe 4204 jpjdd.exe 1600 rrxfxff.exe 512 xxxxxxf.exe 4408 hhhnnt.exe 4716 tthhbh.exe 1492 pvddv.exe 4852 fllfxfx.exe 3900 rflrfrr.exe 2692 hhnnhn.exe 2288 djjjv.exe 4468 pvppp.exe 392 rfrxxrf.exe 2924 nhbbhh.exe 3816 dpddj.exe 4292 vjvdv.exe 3160 rrffxfl.exe 1472 xfffrrr.exe 4496 nbnnnh.exe 3832 jpppp.exe 4644 vvpvp.exe 3584 xxxxflr.exe 1648 lfrrrrr.exe -
Processes:
resource yara_rule behavioral2/memory/388-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1600-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/60-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/508-29-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3332-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1260-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1880-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5016-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1076-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4960-73-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/932-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3380-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4416-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4048-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4496-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3684-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3524-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3292-147-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4328-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4480-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4952-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4936-182-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4220-195-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exejvddd.exerrfrlff.exetbhbbb.exebhhhbb.exevjpjj.exe3frrllx.exennbbhh.exe3vddd.exeddddv.exeffxrrll.exentnttt.exejdjdd.exennbbhb.exe1pdpj.exexfrrrff.exe5lfxllx.exenhbbbn.exejdppd.exelfrrrrr.exebbnttb.exejdjjj.exedescription pid process target process PID 388 wrote to memory of 60 388 6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe jvddd.exe PID 388 wrote to memory of 60 388 6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe jvddd.exe PID 388 wrote to memory of 60 388 6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe jvddd.exe PID 60 wrote to memory of 1600 60 jvddd.exe rrfrlff.exe PID 60 wrote to memory of 1600 60 jvddd.exe rrfrlff.exe PID 60 wrote to memory of 1600 60 jvddd.exe rrfrlff.exe PID 1600 wrote to memory of 2560 1600 rrfrlff.exe tbhbbb.exe PID 1600 wrote to memory of 2560 1600 rrfrlff.exe tbhbbb.exe PID 1600 wrote to memory of 2560 1600 rrfrlff.exe tbhbbb.exe PID 2560 wrote to memory of 508 2560 tbhbbb.exe bhhhbb.exe PID 2560 wrote to memory of 508 2560 tbhbbb.exe bhhhbb.exe PID 2560 wrote to memory of 508 2560 tbhbbb.exe bhhhbb.exe PID 508 wrote to memory of 3332 508 bhhhbb.exe vjpjj.exe PID 508 wrote to memory of 3332 508 bhhhbb.exe vjpjj.exe PID 508 wrote to memory of 3332 508 bhhhbb.exe vjpjj.exe PID 3332 wrote to memory of 4380 3332 vjpjj.exe 3frrllx.exe PID 3332 wrote to memory of 4380 3332 vjpjj.exe 3frrllx.exe PID 3332 wrote to memory of 4380 3332 vjpjj.exe 3frrllx.exe PID 4380 wrote to memory of 1260 4380 3frrllx.exe nnbbhh.exe PID 4380 wrote to memory of 1260 4380 3frrllx.exe nnbbhh.exe PID 4380 wrote to memory of 1260 4380 3frrllx.exe nnbbhh.exe PID 1260 wrote to memory of 5016 1260 nnbbhh.exe 3vddd.exe PID 1260 wrote to memory of 5016 1260 nnbbhh.exe 3vddd.exe PID 1260 wrote to memory of 5016 1260 nnbbhh.exe 3vddd.exe PID 5016 wrote to memory of 1880 5016 3vddd.exe ddddv.exe PID 5016 wrote to memory of 1880 5016 3vddd.exe ddddv.exe PID 5016 wrote to memory of 1880 5016 3vddd.exe ddddv.exe PID 1880 wrote to memory of 4960 1880 ddddv.exe ffxrrll.exe PID 1880 wrote to memory of 4960 1880 ddddv.exe ffxrrll.exe PID 1880 wrote to memory of 4960 1880 ddddv.exe ffxrrll.exe PID 4960 wrote to memory of 1076 4960 ffxrrll.exe ntnttt.exe PID 4960 wrote to memory of 1076 4960 ffxrrll.exe ntnttt.exe PID 4960 wrote to memory of 1076 4960 ffxrrll.exe ntnttt.exe PID 1076 wrote to memory of 932 1076 ntnttt.exe jdjdd.exe PID 1076 wrote to memory of 932 1076 ntnttt.exe jdjdd.exe PID 1076 wrote to memory of 932 1076 ntnttt.exe jdjdd.exe PID 932 wrote to memory of 3380 932 jdjdd.exe nnbbhb.exe PID 932 wrote to memory of 3380 932 jdjdd.exe nnbbhb.exe PID 932 wrote to memory of 3380 932 jdjdd.exe nnbbhb.exe PID 3380 wrote to memory of 4416 3380 nnbbhb.exe 1pdpj.exe PID 3380 wrote to memory of 4416 3380 nnbbhb.exe 1pdpj.exe PID 3380 wrote to memory of 4416 3380 nnbbhb.exe 1pdpj.exe PID 4416 wrote to memory of 4048 4416 1pdpj.exe xfrrrff.exe PID 4416 wrote to memory of 4048 4416 1pdpj.exe xfrrrff.exe PID 4416 wrote to memory of 4048 4416 1pdpj.exe xfrrrff.exe PID 4048 wrote to memory of 4496 4048 xfrrrff.exe 5lfxllx.exe PID 4048 wrote to memory of 4496 4048 xfrrrff.exe 5lfxllx.exe PID 4048 wrote to memory of 4496 4048 xfrrrff.exe 5lfxllx.exe PID 4496 wrote to memory of 836 4496 5lfxllx.exe nhbbbn.exe PID 4496 wrote to memory of 836 4496 5lfxllx.exe nhbbbn.exe PID 4496 wrote to memory of 836 4496 5lfxllx.exe nhbbbn.exe PID 836 wrote to memory of 3656 836 nhbbbn.exe jdppd.exe PID 836 wrote to memory of 3656 836 nhbbbn.exe jdppd.exe PID 836 wrote to memory of 3656 836 nhbbbn.exe jdppd.exe PID 3656 wrote to memory of 3684 3656 jdppd.exe lfrrrrr.exe PID 3656 wrote to memory of 3684 3656 jdppd.exe lfrrrrr.exe PID 3656 wrote to memory of 3684 3656 jdppd.exe lfrrrrr.exe PID 3684 wrote to memory of 3524 3684 lfrrrrr.exe bbnttb.exe PID 3684 wrote to memory of 3524 3684 lfrrrrr.exe bbnttb.exe PID 3684 wrote to memory of 3524 3684 lfrrrrr.exe bbnttb.exe PID 3524 wrote to memory of 928 3524 bbnttb.exe jdjjj.exe PID 3524 wrote to memory of 928 3524 bbnttb.exe jdjjj.exe PID 3524 wrote to memory of 928 3524 bbnttb.exe jdjjj.exe PID 928 wrote to memory of 3292 928 jdjjj.exe lrffxxf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6862b5a53d9af4615e4734eab1829051_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\jvddd.exec:\jvddd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rrfrlff.exec:\rrfrlff.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\tbhbbb.exec:\tbhbbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bhhhbb.exec:\bhhhbb.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vjpjj.exec:\vjpjj.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3frrllx.exec:\3frrllx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnbbhh.exec:\nnbbhh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\3vddd.exec:\3vddd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ddddv.exec:\ddddv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ffxrrll.exec:\ffxrrll.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\ntnttt.exec:\ntnttt.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdjdd.exec:\jdjdd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnbbhb.exec:\nnbbhb.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\1pdpj.exec:\1pdpj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xfrrrff.exec:\xfrrrff.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\5lfxllx.exec:\5lfxllx.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nhbbbn.exec:\nhbbbn.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdppd.exec:\jdppd.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lfrrrrr.exec:\lfrrrrr.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bbnttb.exec:\bbnttb.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jdjjj.exec:\jdjjj.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lrffxxf.exec:\lrffxxf.exe23⤵
- Executes dropped EXE
-
\??\c:\bnhnbh.exec:\bnhnbh.exe24⤵
- Executes dropped EXE
-
\??\c:\dvjjp.exec:\dvjjp.exe25⤵
- Executes dropped EXE
-
\??\c:\rffrflr.exec:\rffrflr.exe26⤵
- Executes dropped EXE
-
\??\c:\llrrllr.exec:\llrrllr.exe27⤵
- Executes dropped EXE
-
\??\c:\bbttbt.exec:\bbttbt.exe28⤵
- Executes dropped EXE
-
\??\c:\jppjd.exec:\jppjd.exe29⤵
- Executes dropped EXE
-
\??\c:\xfffxlf.exec:\xfffxlf.exe30⤵
- Executes dropped EXE
-
\??\c:\pvvvd.exec:\pvvvd.exe31⤵
- Executes dropped EXE
-
\??\c:\lxffxfx.exec:\lxffxfx.exe32⤵
- Executes dropped EXE
-
\??\c:\tnnhbt.exec:\tnnhbt.exe33⤵
- Executes dropped EXE
-
\??\c:\thtttb.exec:\thtttb.exe34⤵
- Executes dropped EXE
-
\??\c:\vjvdv.exec:\vjvdv.exe35⤵
- Executes dropped EXE
-
\??\c:\jjpjj.exec:\jjpjj.exe36⤵
- Executes dropped EXE
-
\??\c:\rlxxxfx.exec:\rlxxxfx.exe37⤵
- Executes dropped EXE
-
\??\c:\nbnttt.exec:\nbnttt.exe38⤵
- Executes dropped EXE
-
\??\c:\tnthnn.exec:\tnthnn.exe39⤵
- Executes dropped EXE
-
\??\c:\ntnttb.exec:\ntnttb.exe40⤵
- Executes dropped EXE
-
\??\c:\pjvvv.exec:\pjvvv.exe41⤵
- Executes dropped EXE
-
\??\c:\9xxxflr.exec:\9xxxflr.exe42⤵
- Executes dropped EXE
-
\??\c:\7bhtbb.exec:\7bhtbb.exe43⤵
- Executes dropped EXE
-
\??\c:\jpjdd.exec:\jpjdd.exe44⤵
- Executes dropped EXE
-
\??\c:\rrxfxff.exec:\rrxfxff.exe45⤵
- Executes dropped EXE
-
\??\c:\xxxxxxf.exec:\xxxxxxf.exe46⤵
- Executes dropped EXE
-
\??\c:\hhhnnt.exec:\hhhnnt.exe47⤵
- Executes dropped EXE
-
\??\c:\tthhbh.exec:\tthhbh.exe48⤵
- Executes dropped EXE
-
\??\c:\pvddv.exec:\pvddv.exe49⤵
- Executes dropped EXE
-
\??\c:\fllfxfx.exec:\fllfxfx.exe50⤵
- Executes dropped EXE
-
\??\c:\rflrfrr.exec:\rflrfrr.exe51⤵
- Executes dropped EXE
-
\??\c:\hhnnhn.exec:\hhnnhn.exe52⤵
- Executes dropped EXE
-
\??\c:\djjjv.exec:\djjjv.exe53⤵
- Executes dropped EXE
-
\??\c:\pvppp.exec:\pvppp.exe54⤵
- Executes dropped EXE
-
\??\c:\rfrxxrf.exec:\rfrxxrf.exe55⤵
- Executes dropped EXE
-
\??\c:\nhbbhh.exec:\nhbbhh.exe56⤵
- Executes dropped EXE
-
\??\c:\dpddj.exec:\dpddj.exe57⤵
- Executes dropped EXE
-
\??\c:\vjvdv.exec:\vjvdv.exe58⤵
- Executes dropped EXE
-
\??\c:\rrffxfl.exec:\rrffxfl.exe59⤵
- Executes dropped EXE
-
\??\c:\xfffrrr.exec:\xfffrrr.exe60⤵
- Executes dropped EXE
-
\??\c:\nbnnnh.exec:\nbnnnh.exe61⤵
- Executes dropped EXE
-
\??\c:\jpppp.exec:\jpppp.exe62⤵
- Executes dropped EXE
-
\??\c:\vvpvp.exec:\vvpvp.exe63⤵
- Executes dropped EXE
-
\??\c:\xxxxflr.exec:\xxxxflr.exe64⤵
- Executes dropped EXE
-
\??\c:\lfrrrrr.exec:\lfrrrrr.exe65⤵
- Executes dropped EXE
-
\??\c:\ttbbnb.exec:\ttbbnb.exe66⤵
-
\??\c:\vdvjd.exec:\vdvjd.exe67⤵
-
\??\c:\dvvdj.exec:\dvvdj.exe68⤵
-
\??\c:\fxxffrx.exec:\fxxffrx.exe69⤵
-
\??\c:\nhbbbh.exec:\nhbbbh.exe70⤵
-
\??\c:\jpjjj.exec:\jpjjj.exe71⤵
-
\??\c:\ppvpd.exec:\ppvpd.exe72⤵
-
\??\c:\rrlllrl.exec:\rrlllrl.exe73⤵
-
\??\c:\hhbbtb.exec:\hhbbtb.exe74⤵
-
\??\c:\tttttb.exec:\tttttb.exe75⤵
-
\??\c:\jpvjd.exec:\jpvjd.exe76⤵
-
\??\c:\dvjdj.exec:\dvjdj.exe77⤵
-
\??\c:\xrrrlxr.exec:\xrrrlxr.exe78⤵
-
\??\c:\hhthnn.exec:\hhthnn.exe79⤵
-
\??\c:\pdvdv.exec:\pdvdv.exe80⤵
-
\??\c:\lxxxrxx.exec:\lxxxrxx.exe81⤵
-
\??\c:\xxxxlll.exec:\xxxxlll.exe82⤵
-
\??\c:\5bbbbb.exec:\5bbbbb.exe83⤵
-
\??\c:\vvddd.exec:\vvddd.exe84⤵
-
\??\c:\vvddd.exec:\vvddd.exe85⤵
-
\??\c:\flrrrxf.exec:\flrrrxf.exe86⤵
-
\??\c:\rrrrrrr.exec:\rrrrrrr.exe87⤵
-
\??\c:\htthhh.exec:\htthhh.exe88⤵
-
\??\c:\vdpvj.exec:\vdpvj.exe89⤵
-
\??\c:\1jdpj.exec:\1jdpj.exe90⤵
-
\??\c:\xlxxrrx.exec:\xlxxrrx.exe91⤵
-
\??\c:\rrxlxxx.exec:\rrxlxxx.exe92⤵
-
\??\c:\7tttnb.exec:\7tttnb.exe93⤵
-
\??\c:\thtbtb.exec:\thtbtb.exe94⤵
-
\??\c:\vpdjd.exec:\vpdjd.exe95⤵
-
\??\c:\djjjj.exec:\djjjj.exe96⤵
-
\??\c:\fxlrlrx.exec:\fxlrlrx.exe97⤵
-
\??\c:\lffxrrl.exec:\lffxrrl.exe98⤵
-
\??\c:\hbnnnt.exec:\hbnnnt.exe99⤵
-
\??\c:\1vdvv.exec:\1vdvv.exe100⤵
-
\??\c:\jjdjj.exec:\jjdjj.exe101⤵
-
\??\c:\xfrxxxl.exec:\xfrxxxl.exe102⤵
-
\??\c:\llxffrr.exec:\llxffrr.exe103⤵
-
\??\c:\nttbbh.exec:\nttbbh.exe104⤵
-
\??\c:\hnnhhh.exec:\hnnhhh.exe105⤵
-
\??\c:\5vdvp.exec:\5vdvp.exe106⤵
-
\??\c:\vdddd.exec:\vdddd.exe107⤵
-
\??\c:\vjvvj.exec:\vjvvj.exe108⤵
-
\??\c:\llrrxll.exec:\llrrxll.exe109⤵
-
\??\c:\ttbbbb.exec:\ttbbbb.exe110⤵
-
\??\c:\tntntt.exec:\tntntt.exe111⤵
-
\??\c:\vjjpp.exec:\vjjpp.exe112⤵
-
\??\c:\pvppj.exec:\pvppj.exe113⤵
-
\??\c:\xrxxrrl.exec:\xrxxrrl.exe114⤵
-
\??\c:\rrxflxr.exec:\rrxflxr.exe115⤵
-
\??\c:\5xllrxx.exec:\5xllrxx.exe116⤵
-
\??\c:\hbnnnn.exec:\hbnnnn.exe117⤵
-
\??\c:\hnnntb.exec:\hnnntb.exe118⤵
-
\??\c:\pvvpd.exec:\pvvpd.exe119⤵
-
\??\c:\1jvvd.exec:\1jvvd.exe120⤵
-
\??\c:\xlxfxfl.exec:\xlxfxfl.exe121⤵
-
\??\c:\vvdvv.exec:\vvdvv.exe122⤵
-
\??\c:\jjvpj.exec:\jjvpj.exe123⤵
-
\??\c:\xxffxff.exec:\xxffxff.exe124⤵
-
\??\c:\xrxxxff.exec:\xrxxxff.exe125⤵
-
\??\c:\nnhntb.exec:\nnhntb.exe126⤵
-
\??\c:\ntbnht.exec:\ntbnht.exe127⤵
-
\??\c:\pvjpp.exec:\pvjpp.exe128⤵
-
\??\c:\7vjdv.exec:\7vjdv.exe129⤵
-
\??\c:\3llxrrx.exec:\3llxrrx.exe130⤵
-
\??\c:\xflllrr.exec:\xflllrr.exe131⤵
-
\??\c:\bnbnhh.exec:\bnbnhh.exe132⤵
-
\??\c:\nhhbtn.exec:\nhhbtn.exe133⤵
-
\??\c:\9pddd.exec:\9pddd.exe134⤵
-
\??\c:\jpjdv.exec:\jpjdv.exe135⤵
-
\??\c:\rlfxrxx.exec:\rlfxrxx.exe136⤵
-
\??\c:\ntbbbb.exec:\ntbbbb.exe137⤵
-
\??\c:\pdjvv.exec:\pdjvv.exe138⤵
-
\??\c:\ppjpd.exec:\ppjpd.exe139⤵
-
\??\c:\fflxrff.exec:\fflxrff.exe140⤵
-
\??\c:\xlxrllf.exec:\xlxrllf.exe141⤵
-
\??\c:\thtnnn.exec:\thtnnn.exe142⤵
-
\??\c:\1jppp.exec:\1jppp.exe143⤵
-
\??\c:\ddddd.exec:\ddddd.exe144⤵
-
\??\c:\fffflrf.exec:\fffflrf.exe145⤵
-
\??\c:\bbnbtn.exec:\bbnbtn.exe146⤵
-
\??\c:\bbttbh.exec:\bbttbh.exe147⤵
-
\??\c:\1pdvd.exec:\1pdvd.exe148⤵
-
\??\c:\pvjpj.exec:\pvjpj.exe149⤵
-
\??\c:\fxrrlfl.exec:\fxrrlfl.exe150⤵
-
\??\c:\rrfffff.exec:\rrfffff.exe151⤵
-
\??\c:\3nttnt.exec:\3nttnt.exe152⤵
-
\??\c:\nbhhtb.exec:\nbhhtb.exe153⤵
-
\??\c:\vpppj.exec:\vpppj.exe154⤵
-
\??\c:\9ddjd.exec:\9ddjd.exe155⤵
-
\??\c:\lrxrrxr.exec:\lrxrrxr.exe156⤵
-
\??\c:\rxllxfl.exec:\rxllxfl.exe157⤵
-
\??\c:\nnhhtb.exec:\nnhhtb.exe158⤵
-
\??\c:\dvjpj.exec:\dvjpj.exe159⤵
-
\??\c:\jjppj.exec:\jjppj.exe160⤵
-
\??\c:\lrxxrxx.exec:\lrxxrxx.exe161⤵
-
\??\c:\llxxxff.exec:\llxxxff.exe162⤵
-
\??\c:\9hhhhh.exec:\9hhhhh.exe163⤵
-
\??\c:\btbbbb.exec:\btbbbb.exe164⤵
-
\??\c:\jdjjj.exec:\jdjjj.exe165⤵
-
\??\c:\7djjj.exec:\7djjj.exe166⤵
-
\??\c:\xrxrrrr.exec:\xrxrrrr.exe167⤵
-
\??\c:\fllrlrr.exec:\fllrlrr.exe168⤵
-
\??\c:\hbtbnt.exec:\hbtbnt.exe169⤵
-
\??\c:\1djpj.exec:\1djpj.exe170⤵
-
\??\c:\fxlllfl.exec:\fxlllfl.exe171⤵
-
\??\c:\bbbbhn.exec:\bbbbhn.exe172⤵
-
\??\c:\3hhbtn.exec:\3hhbtn.exe173⤵
-
\??\c:\jjjpp.exec:\jjjpp.exe174⤵
-
\??\c:\llllllr.exec:\llllllr.exe175⤵
-
\??\c:\nbnntt.exec:\nbnntt.exe176⤵
-
\??\c:\vvddv.exec:\vvddv.exe177⤵
-
\??\c:\vvvvd.exec:\vvvvd.exe178⤵
-
\??\c:\fllrlrr.exec:\fllrlrr.exe179⤵
-
\??\c:\tntnhb.exec:\tntnhb.exe180⤵
-
\??\c:\bhnttn.exec:\bhnttn.exe181⤵
-
\??\c:\xfrlrlx.exec:\xfrlrlx.exe182⤵
-
\??\c:\9tnnhh.exec:\9tnnhh.exe183⤵
-
\??\c:\3vvjj.exec:\3vvjj.exe184⤵
-
\??\c:\xrfffff.exec:\xrfffff.exe185⤵
-
\??\c:\nbbthh.exec:\nbbthh.exe186⤵
-
\??\c:\thnhbb.exec:\thnhbb.exe187⤵
-
\??\c:\pjpvp.exec:\pjpvp.exe188⤵
-
\??\c:\pvddv.exec:\pvddv.exe189⤵
-
\??\c:\fxrxllr.exec:\fxrxllr.exe190⤵
-
\??\c:\xfffxxr.exec:\xfffxxr.exe191⤵
-
\??\c:\ttnhhb.exec:\ttnhhb.exe192⤵
-
\??\c:\nbbbnh.exec:\nbbbnh.exe193⤵
-
\??\c:\pjvpj.exec:\pjvpj.exe194⤵
-
\??\c:\xlfllxl.exec:\xlfllxl.exe195⤵
-
\??\c:\5fllfrl.exec:\5fllfrl.exe196⤵
-
\??\c:\nnnhtn.exec:\nnnhtn.exe197⤵
-
\??\c:\bbnbtt.exec:\bbnbtt.exe198⤵
-
\??\c:\9ddpv.exec:\9ddpv.exe199⤵
-
\??\c:\fxffxxx.exec:\fxffxxx.exe200⤵
-
\??\c:\flxxxrl.exec:\flxxxrl.exe201⤵
-
\??\c:\bnnntt.exec:\bnnntt.exe202⤵
-
\??\c:\thtbnn.exec:\thtbnn.exe203⤵
-
\??\c:\vddvp.exec:\vddvp.exe204⤵
-
\??\c:\dvjjv.exec:\dvjjv.exe205⤵
-
\??\c:\frrxrll.exec:\frrxrll.exe206⤵
-
\??\c:\lrxxrrl.exec:\lrxxrrl.exe207⤵
-
\??\c:\nbtttt.exec:\nbtttt.exe208⤵
-
\??\c:\bhnnbb.exec:\bhnnbb.exe209⤵
-
\??\c:\9jjdd.exec:\9jjdd.exe210⤵
-
\??\c:\ppvpj.exec:\ppvpj.exe211⤵
-
\??\c:\lrxxfll.exec:\lrxxfll.exe212⤵
-
\??\c:\5fxrllf.exec:\5fxrllf.exe213⤵
-
\??\c:\nhbtnb.exec:\nhbtnb.exe214⤵
-
\??\c:\bbhhtb.exec:\bbhhtb.exe215⤵
-
\??\c:\ddpjp.exec:\ddpjp.exe216⤵
-
\??\c:\1dddv.exec:\1dddv.exe217⤵
-
\??\c:\xxxfxxr.exec:\xxxfxxr.exe218⤵
-
\??\c:\ffxxllf.exec:\ffxxllf.exe219⤵
-
\??\c:\nnhhbb.exec:\nnhhbb.exe220⤵
-
\??\c:\nbnhnh.exec:\nbnhnh.exe221⤵
-
\??\c:\vvdvv.exec:\vvdvv.exe222⤵
-
\??\c:\5vvpj.exec:\5vvpj.exe223⤵
-
\??\c:\xlrrfxf.exec:\xlrrfxf.exe224⤵
-
\??\c:\1llxrlf.exec:\1llxrlf.exe225⤵
-
\??\c:\nbbtnh.exec:\nbbtnh.exe226⤵
-
\??\c:\bnhhbh.exec:\bnhhbh.exe227⤵
-
\??\c:\jddvj.exec:\jddvj.exe228⤵
-
\??\c:\vvpvp.exec:\vvpvp.exe229⤵
-
\??\c:\7llffff.exec:\7llffff.exe230⤵
-
\??\c:\5llfrrf.exec:\5llfrrf.exe231⤵
-
\??\c:\btnhbn.exec:\btnhbn.exe232⤵
-
\??\c:\httnhh.exec:\httnhh.exe233⤵
-
\??\c:\pvvpp.exec:\pvvpp.exe234⤵
-
\??\c:\ddvvd.exec:\ddvvd.exe235⤵
-
\??\c:\xrlfffx.exec:\xrlfffx.exe236⤵
-
\??\c:\ntnbbt.exec:\ntnbbt.exe237⤵
-
\??\c:\bnnnhh.exec:\bnnnhh.exe238⤵
-
\??\c:\vvppp.exec:\vvppp.exe239⤵
-
\??\c:\dvvpd.exec:\dvvpd.exe240⤵
-
\??\c:\jpvvj.exec:\jpvvj.exe241⤵