Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 09:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
12180c3605b3e9d5bfa6e6f990b012d8_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
12180c3605b3e9d5bfa6e6f990b012d8_JaffaCakes118.exe
-
Size
75KB
-
MD5
12180c3605b3e9d5bfa6e6f990b012d8
-
SHA1
f21b1314e7b1fb3adb109958c9904ae7f966ead3
-
SHA256
1de64702f8f94e5a6b28fa6a699c1d5dc782a4d691181efe86f63d7967c1af2b
-
SHA512
09269e8ad9ebe80e4895e3082dd66a728a1094cad3eb0dcd0270cf29695e874c01e94208fa371c26a6ab0fd7699cc84173ffad2f82a1e6fa701242dc01353b18
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxND+3T4+DQmqc7vMohS:ymb3NkkiQ3mdBjF+3TCg7EQS
Malware Config
Signatures
-
Detect Blackmoon payload 22 IoCs
resource yara_rule behavioral1/memory/2128-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2012-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2768-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2584-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2736-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2736-62-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2680-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2496-83-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2496-82-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2468-71-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2984-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1516-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1624-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1632-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2952-210-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1988-227-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/904-245-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1292-254-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/916-272-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2772-290-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2388-299-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 2012 jvvpp.exe 2768 4806628.exe 2584 hbhhnn.exe 2680 thbbnt.exe 2736 vvppp.exe 2468 frfflxf.exe 2496 4284662.exe 2560 dvjjd.exe 2984 26402.exe 2540 dvvdp.exe 2788 jjpvp.exe 1516 xxllrlx.exe 1648 64624.exe 2004 btntbb.exe 1624 22624.exe 1920 jddvd.exe 712 2648846.exe 288 4208422.exe 1308 jvppv.exe 1632 bnbhtb.exe 2952 426024.exe 2120 246666.exe 1988 hnhtth.exe 1144 5tnntt.exe 904 0806284.exe 1292 jdppd.exe 3016 dvjvj.exe 916 nbnntt.exe 2888 046802.exe 2772 7vpdp.exe 2388 026466.exe 1940 68062.exe 2380 64228.exe 1832 lxffrrx.exe 1712 m4224.exe 2672 vjvvj.exe 2544 nhtbtb.exe 2688 tttttt.exe 2740 hnttbt.exe 2600 2402662.exe 2612 8666884.exe 2504 4028406.exe 2440 7xrrffr.exe 2932 5rlflfl.exe 1644 frxrfrr.exe 628 608044.exe 2784 frffrrx.exe 2896 jdpvj.exe 1872 llrrfll.exe 1628 3nttbb.exe 1600 hbtbnt.exe 1504 828462.exe 2956 dvdpp.exe 2500 o060224.exe 548 rlxfrfx.exe 1640 04682.exe 2964 0244662.exe 1312 6868840.exe 2976 0806828.exe 2960 q40640.exe 3028 lfrrfxl.exe 2036 lfxxllr.exe 1680 4288440.exe 2924 424462.exe -
resource yara_rule behavioral1/memory/2128-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2012-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2768-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2584-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2736-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2680-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2468-71-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2984-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1516-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1624-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1632-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2952-210-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1988-227-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/904-245-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1292-254-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/916-272-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2772-290-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2388-299-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2012 2128 12180c3605b3e9d5bfa6e6f990b012d8_JaffaCakes118.exe 28 PID 2128 wrote to memory of 2012 2128 12180c3605b3e9d5bfa6e6f990b012d8_JaffaCakes118.exe 28 PID 2128 wrote to memory of 2012 2128 12180c3605b3e9d5bfa6e6f990b012d8_JaffaCakes118.exe 28 PID 2128 wrote to memory of 2012 2128 12180c3605b3e9d5bfa6e6f990b012d8_JaffaCakes118.exe 28 PID 2012 wrote to memory of 2768 2012 jvvpp.exe 29 PID 2012 wrote to memory of 2768 2012 jvvpp.exe 29 PID 2012 wrote to memory of 2768 2012 jvvpp.exe 29 PID 2012 wrote to memory of 2768 2012 jvvpp.exe 29 PID 2768 wrote to memory of 2584 2768 4806628.exe 30 PID 2768 wrote to memory of 2584 2768 4806628.exe 30 PID 2768 wrote to memory of 2584 2768 4806628.exe 30 PID 2768 wrote to memory of 2584 2768 4806628.exe 30 PID 2584 wrote to memory of 2680 2584 hbhhnn.exe 31 PID 2584 wrote to memory of 2680 2584 hbhhnn.exe 31 PID 2584 wrote to memory of 2680 2584 hbhhnn.exe 31 PID 2584 wrote to memory of 2680 2584 hbhhnn.exe 31 PID 2680 wrote to memory of 2736 2680 thbbnt.exe 32 PID 2680 wrote to memory of 2736 2680 thbbnt.exe 32 PID 2680 wrote to memory of 2736 2680 thbbnt.exe 32 PID 2680 wrote to memory of 2736 2680 thbbnt.exe 32 PID 2736 wrote to memory of 2468 2736 vvppp.exe 33 PID 2736 wrote to memory of 2468 2736 vvppp.exe 33 PID 2736 wrote to memory of 2468 2736 vvppp.exe 33 PID 2736 wrote to memory of 2468 2736 vvppp.exe 33 PID 2468 wrote to memory of 2496 2468 frfflxf.exe 34 PID 2468 wrote to memory of 2496 2468 frfflxf.exe 34 PID 2468 wrote to memory of 2496 2468 frfflxf.exe 34 PID 2468 wrote to memory of 2496 2468 frfflxf.exe 34 PID 2496 wrote to memory of 2560 2496 4284662.exe 35 PID 2496 wrote to memory of 2560 2496 4284662.exe 35 PID 2496 wrote to memory of 2560 2496 4284662.exe 35 PID 2496 wrote to memory of 2560 2496 4284662.exe 35 PID 2560 wrote to memory of 2984 2560 dvjjd.exe 36 PID 2560 wrote to memory of 2984 2560 dvjjd.exe 36 PID 2560 wrote to memory of 2984 2560 dvjjd.exe 36 PID 2560 wrote to memory of 2984 2560 dvjjd.exe 36 PID 2984 wrote to memory of 2540 2984 26402.exe 37 PID 2984 wrote to memory of 2540 2984 26402.exe 37 PID 2984 wrote to memory of 2540 2984 26402.exe 37 PID 2984 wrote to memory of 2540 2984 26402.exe 37 PID 2540 wrote to memory of 2788 2540 dvvdp.exe 38 PID 2540 wrote to memory of 2788 2540 dvvdp.exe 38 PID 2540 wrote to memory of 2788 2540 dvvdp.exe 38 PID 2540 wrote to memory of 2788 2540 dvvdp.exe 38 PID 2788 wrote to memory of 1516 2788 jjpvp.exe 39 PID 2788 wrote to memory of 1516 2788 jjpvp.exe 39 PID 2788 wrote to memory of 1516 2788 jjpvp.exe 39 PID 2788 wrote to memory of 1516 2788 jjpvp.exe 39 PID 1516 wrote to memory of 1648 1516 xxllrlx.exe 40 PID 1516 wrote to memory of 1648 1516 xxllrlx.exe 40 PID 1516 wrote to memory of 1648 1516 xxllrlx.exe 40 PID 1516 wrote to memory of 1648 1516 xxllrlx.exe 40 PID 1648 wrote to memory of 2004 1648 64624.exe 41 PID 1648 wrote to memory of 2004 1648 64624.exe 41 PID 1648 wrote to memory of 2004 1648 64624.exe 41 PID 1648 wrote to memory of 2004 1648 64624.exe 41 PID 2004 wrote to memory of 1624 2004 btntbb.exe 42 PID 2004 wrote to memory of 1624 2004 btntbb.exe 42 PID 2004 wrote to memory of 1624 2004 btntbb.exe 42 PID 2004 wrote to memory of 1624 2004 btntbb.exe 42 PID 1624 wrote to memory of 1920 1624 22624.exe 43 PID 1624 wrote to memory of 1920 1624 22624.exe 43 PID 1624 wrote to memory of 1920 1624 22624.exe 43 PID 1624 wrote to memory of 1920 1624 22624.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\12180c3605b3e9d5bfa6e6f990b012d8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\12180c3605b3e9d5bfa6e6f990b012d8_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
\??\c:\jvvpp.exec:\jvvpp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
\??\c:\4806628.exec:\4806628.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
\??\c:\hbhhnn.exec:\hbhhnn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2584 -
\??\c:\thbbnt.exec:\thbbnt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\vvppp.exec:\vvppp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
\??\c:\frfflxf.exec:\frfflxf.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
\??\c:\4284662.exec:\4284662.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
\??\c:\dvjjd.exec:\dvjjd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\26402.exec:\26402.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
\??\c:\dvvdp.exec:\dvvdp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\jjpvp.exec:\jjpvp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
\??\c:\xxllrlx.exec:\xxllrlx.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1516 -
\??\c:\64624.exec:\64624.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1648 -
\??\c:\btntbb.exec:\btntbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
\??\c:\22624.exec:\22624.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\jddvd.exec:\jddvd.exe17⤵
- Executes dropped EXE
PID:1920 -
\??\c:\2648846.exec:\2648846.exe18⤵
- Executes dropped EXE
PID:712 -
\??\c:\4208422.exec:\4208422.exe19⤵
- Executes dropped EXE
PID:288 -
\??\c:\jvppv.exec:\jvppv.exe20⤵
- Executes dropped EXE
PID:1308 -
\??\c:\bnbhtb.exec:\bnbhtb.exe21⤵
- Executes dropped EXE
PID:1632 -
\??\c:\426024.exec:\426024.exe22⤵
- Executes dropped EXE
PID:2952 -
\??\c:\246666.exec:\246666.exe23⤵
- Executes dropped EXE
PID:2120 -
\??\c:\hnhtth.exec:\hnhtth.exe24⤵
- Executes dropped EXE
PID:1988 -
\??\c:\5tnntt.exec:\5tnntt.exe25⤵
- Executes dropped EXE
PID:1144 -
\??\c:\0806284.exec:\0806284.exe26⤵
- Executes dropped EXE
PID:904 -
\??\c:\jdppd.exec:\jdppd.exe27⤵
- Executes dropped EXE
PID:1292 -
\??\c:\dvjvj.exec:\dvjvj.exe28⤵
- Executes dropped EXE
PID:3016 -
\??\c:\nbnntt.exec:\nbnntt.exe29⤵
- Executes dropped EXE
PID:916 -
\??\c:\046802.exec:\046802.exe30⤵
- Executes dropped EXE
PID:2888 -
\??\c:\7vpdp.exec:\7vpdp.exe31⤵
- Executes dropped EXE
PID:2772 -
\??\c:\026466.exec:\026466.exe32⤵
- Executes dropped EXE
PID:2388 -
\??\c:\68062.exec:\68062.exe33⤵
- Executes dropped EXE
PID:1940 -
\??\c:\64228.exec:\64228.exe34⤵
- Executes dropped EXE
PID:2380 -
\??\c:\lxffrrx.exec:\lxffrrx.exe35⤵
- Executes dropped EXE
PID:1832 -
\??\c:\m4224.exec:\m4224.exe36⤵
- Executes dropped EXE
PID:1712 -
\??\c:\vjvvj.exec:\vjvvj.exe37⤵
- Executes dropped EXE
PID:2672 -
\??\c:\nhtbtb.exec:\nhtbtb.exe38⤵
- Executes dropped EXE
PID:2544 -
\??\c:\tttttt.exec:\tttttt.exe39⤵
- Executes dropped EXE
PID:2688 -
\??\c:\hnttbt.exec:\hnttbt.exe40⤵
- Executes dropped EXE
PID:2740 -
\??\c:\2402662.exec:\2402662.exe41⤵
- Executes dropped EXE
PID:2600 -
\??\c:\8666884.exec:\8666884.exe42⤵
- Executes dropped EXE
PID:2612 -
\??\c:\4028406.exec:\4028406.exe43⤵
- Executes dropped EXE
PID:2504 -
\??\c:\7xrrffr.exec:\7xrrffr.exe44⤵
- Executes dropped EXE
PID:2440 -
\??\c:\5rlflfl.exec:\5rlflfl.exe45⤵
- Executes dropped EXE
PID:2932 -
\??\c:\frxrfrr.exec:\frxrfrr.exe46⤵
- Executes dropped EXE
PID:1644 -
\??\c:\608044.exec:\608044.exe47⤵
- Executes dropped EXE
PID:628 -
\??\c:\frffrrx.exec:\frffrrx.exe48⤵
- Executes dropped EXE
PID:2784 -
\??\c:\jdpvj.exec:\jdpvj.exe49⤵
- Executes dropped EXE
PID:2896 -
\??\c:\llrrfll.exec:\llrrfll.exe50⤵
- Executes dropped EXE
PID:1872 -
\??\c:\3nttbb.exec:\3nttbb.exe51⤵
- Executes dropped EXE
PID:1628 -
\??\c:\hbtbnt.exec:\hbtbnt.exe52⤵
- Executes dropped EXE
PID:1600 -
\??\c:\828462.exec:\828462.exe53⤵
- Executes dropped EXE
PID:1504 -
\??\c:\dvdpp.exec:\dvdpp.exe54⤵
- Executes dropped EXE
PID:2956 -
\??\c:\o060224.exec:\o060224.exe55⤵
- Executes dropped EXE
PID:2500 -
\??\c:\rlxfrfx.exec:\rlxfrfx.exe56⤵
- Executes dropped EXE
PID:548 -
\??\c:\04682.exec:\04682.exe57⤵
- Executes dropped EXE
PID:1640 -
\??\c:\0244662.exec:\0244662.exe58⤵
- Executes dropped EXE
PID:2964 -
\??\c:\6868840.exec:\6868840.exe59⤵
- Executes dropped EXE
PID:1312 -
\??\c:\0806828.exec:\0806828.exe60⤵
- Executes dropped EXE
PID:2976 -
\??\c:\q40640.exec:\q40640.exe61⤵
- Executes dropped EXE
PID:2960 -
\??\c:\lfrrfxl.exec:\lfrrfxl.exe62⤵
- Executes dropped EXE
PID:3028 -
\??\c:\lfxxllr.exec:\lfxxllr.exe63⤵
- Executes dropped EXE
PID:2036 -
\??\c:\4288440.exec:\4288440.exe64⤵
- Executes dropped EXE
PID:1680 -
\??\c:\424462.exec:\424462.exe65⤵
- Executes dropped EXE
PID:2924 -
\??\c:\08000.exec:\08000.exe66⤵PID:420
-
\??\c:\4200224.exec:\4200224.exe67⤵PID:904
-
\??\c:\2688440.exec:\2688440.exe68⤵PID:2900
-
\??\c:\nhnthh.exec:\nhnthh.exe69⤵PID:3016
-
\??\c:\6406440.exec:\6406440.exe70⤵PID:772
-
\??\c:\frflxfl.exec:\frflxfl.exe71⤵PID:1972
-
\??\c:\262800.exec:\262800.exe72⤵PID:1656
-
\??\c:\g4286.exec:\g4286.exe73⤵PID:2088
-
\??\c:\7jvvd.exec:\7jvvd.exe74⤵PID:2388
-
\??\c:\862282.exec:\862282.exe75⤵PID:1732
-
\??\c:\6028446.exec:\6028446.exe76⤵PID:2104
-
\??\c:\268800.exec:\268800.exe77⤵PID:2296
-
\??\c:\dpddp.exec:\dpddp.exe78⤵PID:3036
-
\??\c:\268422.exec:\268422.exe79⤵PID:1980
-
\??\c:\22262.exec:\22262.exe80⤵PID:2596
-
\??\c:\nbntnn.exec:\nbntnn.exe81⤵PID:2448
-
\??\c:\9pjjj.exec:\9pjjj.exe82⤵PID:3052
-
\??\c:\g0228.exec:\g0228.exe83⤵PID:2628
-
\??\c:\8688446.exec:\8688446.exe84⤵PID:2744
-
\??\c:\dvjjp.exec:\dvjjp.exe85⤵PID:2940
-
\??\c:\xxrfxxr.exec:\xxrfxxr.exe86⤵PID:2552
-
\??\c:\840206.exec:\840206.exe87⤵PID:2404
-
\??\c:\66622.exec:\66622.exe88⤵PID:2228
-
\??\c:\820006.exec:\820006.exe89⤵PID:2676
-
\??\c:\jpvjp.exec:\jpvjp.exe90⤵PID:2648
-
\??\c:\4266662.exec:\4266662.exe91⤵PID:2796
-
\??\c:\1thhtt.exec:\1thhtt.exe92⤵PID:856
-
\??\c:\680240.exec:\680240.exe93⤵PID:1716
-
\??\c:\202244.exec:\202244.exe94⤵PID:1048
-
\??\c:\i024662.exec:\i024662.exe95⤵PID:640
-
\??\c:\9hbhnt.exec:\9hbhnt.exe96⤵PID:1624
-
\??\c:\04286.exec:\04286.exe97⤵PID:324
-
\??\c:\80668.exec:\80668.exe98⤵PID:336
-
\??\c:\rrrrffl.exec:\rrrrffl.exe99⤵PID:1276
-
\??\c:\3nhntb.exec:\3nhntb.exe100⤵PID:860
-
\??\c:\64668.exec:\64668.exe101⤵PID:2280
-
\??\c:\60420.exec:\60420.exe102⤵PID:2912
-
\??\c:\htnnbh.exec:\htnnbh.exe103⤵PID:2928
-
\??\c:\4206246.exec:\4206246.exe104⤵PID:2268
-
\??\c:\rffxrfx.exec:\rffxrfx.exe105⤵PID:1488
-
\??\c:\a6280.exec:\a6280.exe106⤵PID:2420
-
\??\c:\o644684.exec:\o644684.exe107⤵PID:1864
-
\??\c:\202882.exec:\202882.exe108⤵PID:2424
-
\??\c:\k82224.exec:\k82224.exe109⤵PID:1248
-
\??\c:\lffrrrf.exec:\lffrrrf.exe110⤵PID:812
-
\??\c:\9xllffl.exec:\9xllffl.exe111⤵PID:576
-
\??\c:\4800288.exec:\4800288.exe112⤵PID:2200
-
\??\c:\lxllxxl.exec:\lxllxxl.exe113⤵PID:2000
-
\??\c:\0888066.exec:\0888066.exe114⤵PID:1968
-
\??\c:\m2408.exec:\m2408.exe115⤵PID:2300
-
\??\c:\20288.exec:\20288.exe116⤵PID:1880
-
\??\c:\428022.exec:\428022.exe117⤵PID:2412
-
\??\c:\842288.exec:\842288.exe118⤵PID:1592
-
\??\c:\i688606.exec:\i688606.exe119⤵PID:1192
-
\??\c:\jddjv.exec:\jddjv.exe120⤵PID:1712
-
\??\c:\fxlrflr.exec:\fxlrflr.exe121⤵PID:2724
-
\??\c:\68840.exec:\68840.exe122⤵PID:2564
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-