Analysis
-
max time kernel
150s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 04:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f00b93f6c3861a8afc5643f29c04057bf586963d092dc79f2233dfe1e7469124.exe
Resource
win7-20240611-en
5 signatures
150 seconds
General
-
Target
f00b93f6c3861a8afc5643f29c04057bf586963d092dc79f2233dfe1e7469124.exe
-
Size
201KB
-
MD5
22695f650c8e52d4396324a5e36b4858
-
SHA1
7170424b27fc2fe7c364b4418b9e9b89d4a58c1d
-
SHA256
f00b93f6c3861a8afc5643f29c04057bf586963d092dc79f2233dfe1e7469124
-
SHA512
0aeb5fe284d6d437e67e11769e24cb953585c03c24363f81687efaa71aa4e2394bc3dd393aaaec2f7d7b244de09b7f3ea30e137e31ce5aeece6f30b96a57f46f
-
SSDEEP
3072:ymb3NkkiQ3mdBjFIi/0RU6QeYQsm71vPmc51+GqekBJCvr6zJBUVv1T5m:n3C9BRIG0asYFm71m8+GdkB9Cv1I
Malware Config
Signatures
-
Detect Blackmoon payload 24 IoCs
Processes:
resource yara_rule behavioral2/memory/5044-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3132-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1848-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1832-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1632-31-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3104-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1972-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1544-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4572-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3784-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3504-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3492-89-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4076-95-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5104-103-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4120-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3052-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2496-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4492-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3496-143-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1056-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2696-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/336-168-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1816-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2972-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
vdpvp.exelffxlfx.exenbtnbt.exennnhnh.exejjjvp.exehhhtnb.exebtnbtn.exexrrxlrx.exeflrfffr.exe7vpjd.exexflfrxf.exehnbtnh.exejpdpd.exefxxrfxr.exenbhbbt.exejjpjv.exefxrxxlr.exebnhthb.exevdvdp.exepdvjd.exerxrxfrf.exedppjv.exepdjvj.exexrxllfl.exehttnnh.exepdpdp.exelfxlfxl.exerlxrlfx.exetnbnbt.exe3vpjp.exelxrfrlf.exebbhnnt.exe3vvpp.exepdvjv.exeflxfrrr.exehbbnhn.exedpjdj.exexfxxrlf.exe1ttnbb.exevpvpj.exevjpdd.exexllrlfx.exebnhtnn.exedpdpp.exe3ppdj.exexflfrlf.exenbbnhb.exenbnhnh.exevdvpp.exefxxxrrl.exelxfxfxx.exethtnbt.exenbtthb.exevjvpv.exeffrfxlf.exe5lllxrf.exebnbbtn.exedjpdv.exevpvpd.exepvvjv.exerlfrllr.exehhbhhn.exetnnbth.exe9jjvp.exepid process 3132 vdpvp.exe 1832 lffxlfx.exe 1848 nbtnbt.exe 1632 nnnhnh.exe 3104 jjjvp.exe 320 hhhtnb.exe 1972 btnbtn.exe 1544 xrrxlrx.exe 4572 flrfffr.exe 3784 7vpjd.exe 3504 xflfrxf.exe 3492 hnbtnh.exe 4076 jpdpd.exe 5104 fxxrfxr.exe 4120 nbhbbt.exe 3052 jjpjv.exe 2496 fxrxxlr.exe 4576 bnhthb.exe 4492 vdvdp.exe 1040 pdvjd.exe 3496 rxrxfrf.exe 1056 dppjv.exe 3856 pdjvj.exe 2696 xrxllfl.exe 336 httnnh.exe 5112 pdpdp.exe 1824 lfxlfxl.exe 4660 rlxrlfx.exe 1816 tnbnbt.exe 2972 3vpjp.exe 1540 lxrfrlf.exe 4388 bbhnnt.exe 3428 3vvpp.exe 1608 pdvjv.exe 3200 flxfrrr.exe 4908 hbbnhn.exe 4332 dpjdj.exe 3116 xfxxrlf.exe 3324 1ttnbb.exe 4808 vpvpj.exe 5068 vjpdd.exe 1696 xllrlfx.exe 1632 bnhtnn.exe 3412 dpdpp.exe 3104 3ppdj.exe 1476 xflfrlf.exe 1904 nbbnhb.exe 1544 nbnhnh.exe 4476 vdvpp.exe 4164 fxxxrrl.exe 2884 lxfxfxx.exe 2768 thtnbt.exe 2244 nbtthb.exe 4532 vjvpv.exe 944 ffrfxlf.exe 4764 5lllxrf.exe 1936 bnbbtn.exe 3612 djpdv.exe 1516 vpvpd.exe 4372 pvvjv.exe 1164 rlfrllr.exe 704 hhbhhn.exe 1412 tnnbth.exe 2984 9jjvp.exe -
Processes:
resource yara_rule behavioral2/memory/5044-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3132-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1848-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1832-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1632-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3104-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3104-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1972-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1544-59-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1544-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4572-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3784-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3504-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3492-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4076-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5104-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4120-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3052-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2496-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4492-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3496-143-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1056-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2696-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/336-168-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1816-192-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2972-196-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f00b93f6c3861a8afc5643f29c04057bf586963d092dc79f2233dfe1e7469124.exevdpvp.exelffxlfx.exenbtnbt.exennnhnh.exejjjvp.exehhhtnb.exebtnbtn.exexrrxlrx.exeflrfffr.exe7vpjd.exexflfrxf.exehnbtnh.exejpdpd.exefxxrfxr.exenbhbbt.exejjpjv.exefxrxxlr.exebnhthb.exevdvdp.exepdvjd.exerxrxfrf.exedescription pid process target process PID 5044 wrote to memory of 3132 5044 f00b93f6c3861a8afc5643f29c04057bf586963d092dc79f2233dfe1e7469124.exe vdpvp.exe PID 5044 wrote to memory of 3132 5044 f00b93f6c3861a8afc5643f29c04057bf586963d092dc79f2233dfe1e7469124.exe vdpvp.exe PID 5044 wrote to memory of 3132 5044 f00b93f6c3861a8afc5643f29c04057bf586963d092dc79f2233dfe1e7469124.exe vdpvp.exe PID 3132 wrote to memory of 1832 3132 vdpvp.exe lffxlfx.exe PID 3132 wrote to memory of 1832 3132 vdpvp.exe lffxlfx.exe PID 3132 wrote to memory of 1832 3132 vdpvp.exe lffxlfx.exe PID 1832 wrote to memory of 1848 1832 lffxlfx.exe nbtnbt.exe PID 1832 wrote to memory of 1848 1832 lffxlfx.exe nbtnbt.exe PID 1832 wrote to memory of 1848 1832 lffxlfx.exe nbtnbt.exe PID 1848 wrote to memory of 1632 1848 nbtnbt.exe nnnhnh.exe PID 1848 wrote to memory of 1632 1848 nbtnbt.exe nnnhnh.exe PID 1848 wrote to memory of 1632 1848 nbtnbt.exe nnnhnh.exe PID 1632 wrote to memory of 3104 1632 nnnhnh.exe jjjvp.exe PID 1632 wrote to memory of 3104 1632 nnnhnh.exe jjjvp.exe PID 1632 wrote to memory of 3104 1632 nnnhnh.exe jjjvp.exe PID 3104 wrote to memory of 320 3104 jjjvp.exe hhhtnb.exe PID 3104 wrote to memory of 320 3104 jjjvp.exe hhhtnb.exe PID 3104 wrote to memory of 320 3104 jjjvp.exe hhhtnb.exe PID 320 wrote to memory of 1972 320 hhhtnb.exe btnbtn.exe PID 320 wrote to memory of 1972 320 hhhtnb.exe btnbtn.exe PID 320 wrote to memory of 1972 320 hhhtnb.exe btnbtn.exe PID 1972 wrote to memory of 1544 1972 btnbtn.exe xrrxlrx.exe PID 1972 wrote to memory of 1544 1972 btnbtn.exe xrrxlrx.exe PID 1972 wrote to memory of 1544 1972 btnbtn.exe xrrxlrx.exe PID 1544 wrote to memory of 4572 1544 xrrxlrx.exe flrfffr.exe PID 1544 wrote to memory of 4572 1544 xrrxlrx.exe flrfffr.exe PID 1544 wrote to memory of 4572 1544 xrrxlrx.exe flrfffr.exe PID 4572 wrote to memory of 3784 4572 flrfffr.exe 7vpjd.exe PID 4572 wrote to memory of 3784 4572 flrfffr.exe 7vpjd.exe PID 4572 wrote to memory of 3784 4572 flrfffr.exe 7vpjd.exe PID 3784 wrote to memory of 3504 3784 7vpjd.exe xflfrxf.exe PID 3784 wrote to memory of 3504 3784 7vpjd.exe xflfrxf.exe PID 3784 wrote to memory of 3504 3784 7vpjd.exe xflfrxf.exe PID 3504 wrote to memory of 3492 3504 xflfrxf.exe hnbtnh.exe PID 3504 wrote to memory of 3492 3504 xflfrxf.exe hnbtnh.exe PID 3504 wrote to memory of 3492 3504 xflfrxf.exe hnbtnh.exe PID 3492 wrote to memory of 4076 3492 hnbtnh.exe jpdpd.exe PID 3492 wrote to memory of 4076 3492 hnbtnh.exe jpdpd.exe PID 3492 wrote to memory of 4076 3492 hnbtnh.exe jpdpd.exe PID 4076 wrote to memory of 5104 4076 jpdpd.exe fxxrfxr.exe PID 4076 wrote to memory of 5104 4076 jpdpd.exe fxxrfxr.exe PID 4076 wrote to memory of 5104 4076 jpdpd.exe fxxrfxr.exe PID 5104 wrote to memory of 4120 5104 fxxrfxr.exe nbhbbt.exe PID 5104 wrote to memory of 4120 5104 fxxrfxr.exe nbhbbt.exe PID 5104 wrote to memory of 4120 5104 fxxrfxr.exe nbhbbt.exe PID 4120 wrote to memory of 3052 4120 nbhbbt.exe jjpjv.exe PID 4120 wrote to memory of 3052 4120 nbhbbt.exe jjpjv.exe PID 4120 wrote to memory of 3052 4120 nbhbbt.exe jjpjv.exe PID 3052 wrote to memory of 2496 3052 jjpjv.exe fxrxxlr.exe PID 3052 wrote to memory of 2496 3052 jjpjv.exe fxrxxlr.exe PID 3052 wrote to memory of 2496 3052 jjpjv.exe fxrxxlr.exe PID 2496 wrote to memory of 4576 2496 fxrxxlr.exe bnhthb.exe PID 2496 wrote to memory of 4576 2496 fxrxxlr.exe bnhthb.exe PID 2496 wrote to memory of 4576 2496 fxrxxlr.exe bnhthb.exe PID 4576 wrote to memory of 4492 4576 bnhthb.exe vdvdp.exe PID 4576 wrote to memory of 4492 4576 bnhthb.exe vdvdp.exe PID 4576 wrote to memory of 4492 4576 bnhthb.exe vdvdp.exe PID 4492 wrote to memory of 1040 4492 vdvdp.exe pdvjd.exe PID 4492 wrote to memory of 1040 4492 vdvdp.exe pdvjd.exe PID 4492 wrote to memory of 1040 4492 vdvdp.exe pdvjd.exe PID 1040 wrote to memory of 3496 1040 pdvjd.exe rxrxfrf.exe PID 1040 wrote to memory of 3496 1040 pdvjd.exe rxrxfrf.exe PID 1040 wrote to memory of 3496 1040 pdvjd.exe rxrxfrf.exe PID 3496 wrote to memory of 1056 3496 rxrxfrf.exe dppjv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f00b93f6c3861a8afc5643f29c04057bf586963d092dc79f2233dfe1e7469124.exe"C:\Users\Admin\AppData\Local\Temp\f00b93f6c3861a8afc5643f29c04057bf586963d092dc79f2233dfe1e7469124.exe"1⤵
- Suspicious use of WriteProcessMemory
-
\??\c:\vdpvp.exec:\vdpvp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\lffxlfx.exec:\lffxlfx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbtnbt.exec:\nbtnbt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nnnhnh.exec:\nnnhnh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjjvp.exec:\jjjvp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hhhtnb.exec:\hhhtnb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\btnbtn.exec:\btnbtn.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xrrxlrx.exec:\xrrxlrx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\flrfffr.exec:\flrfffr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\7vpjd.exec:\7vpjd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\xflfrxf.exec:\xflfrxf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\hnbtnh.exec:\hnbtnh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jpdpd.exec:\jpdpd.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxxrfxr.exec:\fxxrfxr.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\nbhbbt.exec:\nbhbbt.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\jjpjv.exec:\jjpjv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\fxrxxlr.exec:\fxrxxlr.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\bnhthb.exec:\bnhthb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\vdvdp.exec:\vdvdp.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\pdvjd.exec:\pdvjd.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\rxrxfrf.exec:\rxrxfrf.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
\??\c:\dppjv.exec:\dppjv.exe23⤵
- Executes dropped EXE
-
\??\c:\pdjvj.exec:\pdjvj.exe24⤵
- Executes dropped EXE
-
\??\c:\xrxllfl.exec:\xrxllfl.exe25⤵
- Executes dropped EXE
-
\??\c:\httnnh.exec:\httnnh.exe26⤵
- Executes dropped EXE
-
\??\c:\pdpdp.exec:\pdpdp.exe27⤵
- Executes dropped EXE
-
\??\c:\lfxlfxl.exec:\lfxlfxl.exe28⤵
- Executes dropped EXE
-
\??\c:\rlxrlfx.exec:\rlxrlfx.exe29⤵
- Executes dropped EXE
-
\??\c:\tnbnbt.exec:\tnbnbt.exe30⤵
- Executes dropped EXE
-
\??\c:\3vpjp.exec:\3vpjp.exe31⤵
- Executes dropped EXE
-
\??\c:\lxrfrlf.exec:\lxrfrlf.exe32⤵
- Executes dropped EXE
-
\??\c:\bbhnnt.exec:\bbhnnt.exe33⤵
- Executes dropped EXE
-
\??\c:\3vvpp.exec:\3vvpp.exe34⤵
- Executes dropped EXE
-
\??\c:\pdvjv.exec:\pdvjv.exe35⤵
- Executes dropped EXE
-
\??\c:\flxfrrr.exec:\flxfrrr.exe36⤵
- Executes dropped EXE
-
\??\c:\hbbnhn.exec:\hbbnhn.exe37⤵
- Executes dropped EXE
-
\??\c:\dpjdj.exec:\dpjdj.exe38⤵
- Executes dropped EXE
-
\??\c:\xfxxrlf.exec:\xfxxrlf.exe39⤵
- Executes dropped EXE
-
\??\c:\1ttnbb.exec:\1ttnbb.exe40⤵
- Executes dropped EXE
-
\??\c:\vpvpj.exec:\vpvpj.exe41⤵
- Executes dropped EXE
-
\??\c:\vjpdd.exec:\vjpdd.exe42⤵
- Executes dropped EXE
-
\??\c:\xllrlfx.exec:\xllrlfx.exe43⤵
- Executes dropped EXE
-
\??\c:\bnhtnn.exec:\bnhtnn.exe44⤵
- Executes dropped EXE
-
\??\c:\dpdpp.exec:\dpdpp.exe45⤵
- Executes dropped EXE
-
\??\c:\3ppdj.exec:\3ppdj.exe46⤵
- Executes dropped EXE
-
\??\c:\xflfrlf.exec:\xflfrlf.exe47⤵
- Executes dropped EXE
-
\??\c:\nbbnhb.exec:\nbbnhb.exe48⤵
- Executes dropped EXE
-
\??\c:\nbnhnh.exec:\nbnhnh.exe49⤵
- Executes dropped EXE
-
\??\c:\vdvpp.exec:\vdvpp.exe50⤵
- Executes dropped EXE
-
\??\c:\fxxxrrl.exec:\fxxxrrl.exe51⤵
- Executes dropped EXE
-
\??\c:\lxfxfxx.exec:\lxfxfxx.exe52⤵
- Executes dropped EXE
-
\??\c:\thtnbt.exec:\thtnbt.exe53⤵
- Executes dropped EXE
-
\??\c:\nbtthb.exec:\nbtthb.exe54⤵
- Executes dropped EXE
-
\??\c:\vjvpv.exec:\vjvpv.exe55⤵
- Executes dropped EXE
-
\??\c:\ffrfxlf.exec:\ffrfxlf.exe56⤵
- Executes dropped EXE
-
\??\c:\5lllxrf.exec:\5lllxrf.exe57⤵
- Executes dropped EXE
-
\??\c:\bnbbtn.exec:\bnbbtn.exe58⤵
- Executes dropped EXE
-
\??\c:\djpdv.exec:\djpdv.exe59⤵
- Executes dropped EXE
-
\??\c:\vpvpd.exec:\vpvpd.exe60⤵
- Executes dropped EXE
-
\??\c:\pvvjv.exec:\pvvjv.exe61⤵
- Executes dropped EXE
-
\??\c:\rlfrllr.exec:\rlfrllr.exe62⤵
- Executes dropped EXE
-
\??\c:\hhbhhn.exec:\hhbhhn.exe63⤵
- Executes dropped EXE
-
\??\c:\tnnbth.exec:\tnnbth.exe64⤵
- Executes dropped EXE
-
\??\c:\9jjvp.exec:\9jjvp.exe65⤵
- Executes dropped EXE
-
\??\c:\llrfrlx.exec:\llrfrlx.exe66⤵
-
\??\c:\rffxrrf.exec:\rffxrrf.exe67⤵
-
\??\c:\tnnbtn.exec:\tnnbtn.exe68⤵
-
\??\c:\hbbtbb.exec:\hbbtbb.exe69⤵
-
\??\c:\ddjdv.exec:\ddjdv.exe70⤵
-
\??\c:\fflfxxr.exec:\fflfxxr.exe71⤵
-
\??\c:\bhnhtt.exec:\bhnhtt.exe72⤵
-
\??\c:\3tnbnh.exec:\3tnbnh.exe73⤵
-
\??\c:\dvpjd.exec:\dvpjd.exe74⤵
-
\??\c:\xrrxlxx.exec:\xrrxlxx.exe75⤵
-
\??\c:\httnhb.exec:\httnhb.exe76⤵
-
\??\c:\vpdpj.exec:\vpdpj.exe77⤵
-
\??\c:\pddvd.exec:\pddvd.exe78⤵
-
\??\c:\xrlfrll.exec:\xrlfrll.exe79⤵
-
\??\c:\xfffrlf.exec:\xfffrlf.exe80⤵
-
\??\c:\hbtnnh.exec:\hbtnnh.exe81⤵
-
\??\c:\1jjvj.exec:\1jjvj.exe82⤵
-
\??\c:\ppvpd.exec:\ppvpd.exe83⤵
-
\??\c:\1llxfxl.exec:\1llxfxl.exe84⤵
-
\??\c:\xxrlxrf.exec:\xxrlxrf.exe85⤵
-
\??\c:\3pvjd.exec:\3pvjd.exe86⤵
-
\??\c:\pdpvd.exec:\pdpvd.exe87⤵
-
\??\c:\5frfrfx.exec:\5frfrfx.exe88⤵
-
\??\c:\thtnbt.exec:\thtnbt.exe89⤵
-
\??\c:\bnnbnh.exec:\bnnbnh.exe90⤵
-
\??\c:\dvpjp.exec:\dvpjp.exe91⤵
-
\??\c:\dvdvj.exec:\dvdvj.exe92⤵
-
\??\c:\flfrfxr.exec:\flfrfxr.exe93⤵
-
\??\c:\ffxxlrf.exec:\ffxxlrf.exe94⤵
-
\??\c:\btnnhb.exec:\btnnhb.exe95⤵
-
\??\c:\3vjdv.exec:\3vjdv.exe96⤵
-
\??\c:\vjjvp.exec:\vjjvp.exe97⤵
-
\??\c:\fxxlfxx.exec:\fxxlfxx.exe98⤵
-
\??\c:\fxrfrlx.exec:\fxrfrlx.exe99⤵
-
\??\c:\hntnbt.exec:\hntnbt.exe100⤵
-
\??\c:\btbnhh.exec:\btbnhh.exe101⤵
-
\??\c:\1vvvp.exec:\1vvvp.exe102⤵
-
\??\c:\7lrxxlf.exec:\7lrxxlf.exe103⤵
-
\??\c:\3xxfxrl.exec:\3xxfxrl.exe104⤵
-
\??\c:\hthhnn.exec:\hthhnn.exe105⤵
-
\??\c:\tnhhhb.exec:\tnhhhb.exe106⤵
-
\??\c:\djppj.exec:\djppj.exe107⤵
-
\??\c:\xrxrrrx.exec:\xrxrrrx.exe108⤵
-
\??\c:\flrrllf.exec:\flrrllf.exe109⤵
-
\??\c:\hbhtnn.exec:\hbhtnn.exe110⤵
-
\??\c:\3bbhtb.exec:\3bbhtb.exe111⤵
-
\??\c:\jpvvj.exec:\jpvvj.exe112⤵
-
\??\c:\vjjdv.exec:\vjjdv.exe113⤵
-
\??\c:\lxrlrfr.exec:\lxrlrfr.exe114⤵
-
\??\c:\xlrlxlx.exec:\xlrlxlx.exe115⤵
-
\??\c:\bnhhtb.exec:\bnhhtb.exe116⤵
-
\??\c:\9jvpv.exec:\9jvpv.exe117⤵
-
\??\c:\pvppj.exec:\pvppj.exe118⤵
-
\??\c:\nhhbtt.exec:\nhhbtt.exe119⤵
-
\??\c:\jvjjd.exec:\jvjjd.exe120⤵
-
\??\c:\rlllfff.exec:\rlllfff.exe121⤵
-
\??\c:\lfxrllf.exec:\lfxrllf.exe122⤵
-
\??\c:\bttnhh.exec:\bttnhh.exe123⤵
-
\??\c:\5nnnhn.exec:\5nnnhn.exe124⤵
-
\??\c:\vvvpp.exec:\vvvpp.exe125⤵
-
\??\c:\lxfxrxx.exec:\lxfxrxx.exe126⤵
-
\??\c:\lxlllll.exec:\lxlllll.exe127⤵
-
\??\c:\bhnbtt.exec:\bhnbtt.exe128⤵
-
\??\c:\bthbtn.exec:\bthbtn.exe129⤵
-
\??\c:\pjjdv.exec:\pjjdv.exe130⤵
-
\??\c:\jdvvp.exec:\jdvvp.exe131⤵
-
\??\c:\rrrlrrl.exec:\rrrlrrl.exe132⤵
-
\??\c:\3llfxrr.exec:\3llfxrr.exe133⤵
-
\??\c:\1ntnhn.exec:\1ntnhn.exe134⤵
-
\??\c:\nbbbbb.exec:\nbbbbb.exe135⤵
-
\??\c:\9vjvv.exec:\9vjvv.exe136⤵
-
\??\c:\pdjdp.exec:\pdjdp.exe137⤵
-
\??\c:\llrlxxx.exec:\llrlxxx.exe138⤵
-
\??\c:\xrxrxxr.exec:\xrxrxxr.exe139⤵
-
\??\c:\tbbnhn.exec:\tbbnhn.exe140⤵
-
\??\c:\nnnttb.exec:\nnnttb.exe141⤵
-
\??\c:\pjvpp.exec:\pjvpp.exe142⤵
-
\??\c:\rlrllll.exec:\rlrllll.exe143⤵
-
\??\c:\xrffxxx.exec:\xrffxxx.exe144⤵
-
\??\c:\tbhhtb.exec:\tbhhtb.exe145⤵
-
\??\c:\jvpjv.exec:\jvpjv.exe146⤵
-
\??\c:\vvvdd.exec:\vvvdd.exe147⤵
-
\??\c:\llfxxfl.exec:\llfxxfl.exe148⤵
-
\??\c:\5llffrr.exec:\5llffrr.exe149⤵
-
\??\c:\tnbtbb.exec:\tnbtbb.exe150⤵
-
\??\c:\nthbtn.exec:\nthbtn.exe151⤵
-
\??\c:\dvdvd.exec:\dvdvd.exe152⤵
-
\??\c:\rllrlxx.exec:\rllrlxx.exe153⤵
-
\??\c:\xlrlrrx.exec:\xlrlrrx.exe154⤵
-
\??\c:\ntbhbb.exec:\ntbhbb.exe155⤵
-
\??\c:\5nnhbb.exec:\5nnhbb.exe156⤵
-
\??\c:\5pppp.exec:\5pppp.exe157⤵
-
\??\c:\pvjjj.exec:\pvjjj.exe158⤵
-
\??\c:\rxxxrrl.exec:\rxxxrrl.exe159⤵
-
\??\c:\bnhnhn.exec:\bnhnhn.exe160⤵
-
\??\c:\tnbbhh.exec:\tnbbhh.exe161⤵
-
\??\c:\vdpjd.exec:\vdpjd.exe162⤵
-
\??\c:\vdddv.exec:\vdddv.exe163⤵
-
\??\c:\bhbbtb.exec:\bhbbtb.exe164⤵
-
\??\c:\bntnnt.exec:\bntnnt.exe165⤵
-
\??\c:\9djdv.exec:\9djdv.exe166⤵
-
\??\c:\pdvvv.exec:\pdvvv.exe167⤵
-
\??\c:\rrllfff.exec:\rrllfff.exe168⤵
-
\??\c:\xxfllll.exec:\xxfllll.exe169⤵
-
\??\c:\tttnhh.exec:\tttnhh.exe170⤵
-
\??\c:\pvddv.exec:\pvddv.exe171⤵
-
\??\c:\pvddp.exec:\pvddp.exe172⤵
-
\??\c:\frxrfxx.exec:\frxrfxx.exe173⤵
-
\??\c:\rrxxffl.exec:\rrxxffl.exe174⤵
-
\??\c:\5nnnhh.exec:\5nnnhh.exe175⤵
-
\??\c:\3bbtnb.exec:\3bbtnb.exe176⤵
-
\??\c:\djppp.exec:\djppp.exe177⤵
-
\??\c:\fffxfrl.exec:\fffxfrl.exe178⤵
-
\??\c:\1xffxxx.exec:\1xffxxx.exe179⤵
-
\??\c:\tbnhnn.exec:\tbnhnn.exe180⤵
-
\??\c:\btbnhh.exec:\btbnhh.exe181⤵
-
\??\c:\pdvvp.exec:\pdvvp.exe182⤵
-
\??\c:\3fxrfxx.exec:\3fxrfxx.exe183⤵
-
\??\c:\7lxlxrf.exec:\7lxlxrf.exe184⤵
-
\??\c:\tbbthb.exec:\tbbthb.exe185⤵
-
\??\c:\htbntn.exec:\htbntn.exe186⤵
-
\??\c:\vjvpp.exec:\vjvpp.exe187⤵
-
\??\c:\1xrfrlf.exec:\1xrfrlf.exe188⤵
-
\??\c:\llllxrx.exec:\llllxrx.exe189⤵
-
\??\c:\nbhtnh.exec:\nbhtnh.exe190⤵
-
\??\c:\vdvvp.exec:\vdvvp.exe191⤵
-
\??\c:\xlllrxl.exec:\xlllrxl.exe192⤵
-
\??\c:\1xrxrrl.exec:\1xrxrrl.exe193⤵
-
\??\c:\htthbt.exec:\htthbt.exe194⤵
-
\??\c:\nbtntt.exec:\nbtntt.exe195⤵
-
\??\c:\vpvpj.exec:\vpvpj.exe196⤵
-
\??\c:\5lrxxll.exec:\5lrxxll.exe197⤵
-
\??\c:\nbhbhn.exec:\nbhbhn.exe198⤵
-
\??\c:\nhbthh.exec:\nhbthh.exe199⤵
-
\??\c:\jdvvj.exec:\jdvvj.exe200⤵
-
\??\c:\flxxlfr.exec:\flxxlfr.exe201⤵
-
\??\c:\fxlflff.exec:\fxlflff.exe202⤵
-
\??\c:\nhtnbb.exec:\nhtnbb.exe203⤵
-
\??\c:\vppjv.exec:\vppjv.exe204⤵
-
\??\c:\dppjv.exec:\dppjv.exe205⤵
-
\??\c:\xrrrlrl.exec:\xrrrlrl.exe206⤵
-
\??\c:\fxrlxxr.exec:\fxrlxxr.exe207⤵
-
\??\c:\thnnhh.exec:\thnnhh.exe208⤵
-
\??\c:\vvpvv.exec:\vvpvv.exe209⤵
-
\??\c:\xlflrlx.exec:\xlflrlx.exe210⤵
-
\??\c:\xrfflxf.exec:\xrfflxf.exe211⤵
-
\??\c:\bhhhnn.exec:\bhhhnn.exe212⤵
-
\??\c:\pjdpd.exec:\pjdpd.exe213⤵
-
\??\c:\jpjdv.exec:\jpjdv.exe214⤵
-
\??\c:\frrflfr.exec:\frrflfr.exe215⤵
-
\??\c:\hbbthb.exec:\hbbthb.exe216⤵
-
\??\c:\nhbtnt.exec:\nhbtnt.exe217⤵
-
\??\c:\jdvpj.exec:\jdvpj.exe218⤵
-
\??\c:\1dpdp.exec:\1dpdp.exe219⤵
-
\??\c:\xlfxlfx.exec:\xlfxlfx.exe220⤵
-
\??\c:\tbhbbn.exec:\tbhbbn.exe221⤵
-
\??\c:\dvvvj.exec:\dvvvj.exe222⤵
-
\??\c:\pdjvp.exec:\pdjvp.exe223⤵
-
\??\c:\llrlfll.exec:\llrlfll.exe224⤵
-
\??\c:\nnhbnh.exec:\nnhbnh.exe225⤵
-
\??\c:\tnnbtn.exec:\tnnbtn.exe226⤵
-
\??\c:\pjppd.exec:\pjppd.exe227⤵
-
\??\c:\jvvpd.exec:\jvvpd.exe228⤵
-
\??\c:\3xrfrlx.exec:\3xrfrlx.exe229⤵
-
\??\c:\nhttbt.exec:\nhttbt.exe230⤵
-
\??\c:\bnbnbt.exec:\bnbnbt.exe231⤵
-
\??\c:\dvppp.exec:\dvppp.exe232⤵
-
\??\c:\rlrxxxr.exec:\rlrxxxr.exe233⤵
-
\??\c:\tbbnbt.exec:\tbbnbt.exe234⤵
-
\??\c:\ttthhb.exec:\ttthhb.exe235⤵
-
\??\c:\jvdvv.exec:\jvdvv.exe236⤵
-
\??\c:\dvjjd.exec:\dvjjd.exe237⤵
-
\??\c:\xxxrfxr.exec:\xxxrfxr.exe238⤵
-
\??\c:\bntnhh.exec:\bntnhh.exe239⤵
-
\??\c:\bhhtht.exec:\bhhtht.exe240⤵
-
\??\c:\1vvdv.exec:\1vvdv.exe241⤵