Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5d4a17d93a4a7158ecf0056404a22acc_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
5d4a17d93a4a7158ecf0056404a22acc_JaffaCakes118.exe
-
Size
99KB
-
MD5
5d4a17d93a4a7158ecf0056404a22acc
-
SHA1
58e287112a05b53430c880a1e224224e271639d7
-
SHA256
c559c02682a230708a085e33fce38da5f8e8ecd3d16fddfa3f99554844f9e1f8
-
SHA512
844a21ef917b92fac0e0c3cbe17e21eb61476970f9723f8fc58fb5406b5adcec7811f6c8401917934202f843a06a92b85bf1e698b026d1891c2cd25bb83dc8e5
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIQIDyviFxx2hCtgIMLP9rBZ3BVB:ymb3NkkiQ3mdBjFIVLd2hWZGrNVqIf
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/4140-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5108-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3556-32-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3168-12-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2724-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3380-46-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2912-58-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1336-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4920-72-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2808-82-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4468-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2152-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/672-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4636-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2552-118-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3192-132-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4124-135-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2980-142-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2740-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1320-154-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1816-160-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4004-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4504-172-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4112-178-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2504-189-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3808-198-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ppppp.exehbnnhh.exe7hnhbb.exe602244.exejvdvv.exe4466004.exexxrrllf.exeu204602.exehbhhtb.exevvddd.exehbnnbh.exelffffrr.exe4060040.exe6602244.exeppjvd.exehthbtn.exedjvvj.exevjvvv.exe0468488.exe464802.exenbnhbb.exe2826042.exe804682.exe0660888.exe0868846.exe040680.exe4048066.exe68660.exee00004.exe6660640.exebbtbhn.exenbtbnh.exe8468420.exe684822.exehhbtbt.exexlrlllf.exevdvpd.exe002224.exejddvv.exehttttt.exes6226.exe848484.exe6446460.exe22842.exe864044.exexxlxxrf.exevpjpv.exeflllrxl.exelfxrxrx.exe808266.exe002660.exevjvdj.exexllfxfl.exe0426660.exefxlxfff.exe8282622.exejpvvp.exe022088.exerxffrff.exedpppv.exenttnhh.exefrlrrrr.exejdddd.exe4020888.exepid process 3168 ppppp.exe 2680 hbnnhh.exe 4140 7hnhbb.exe 3556 602244.exe 5108 jvdvv.exe 3380 4466004.exe 1996 xxrrllf.exe 2912 u204602.exe 1336 hbhhtb.exe 4920 vvddd.exe 2808 hbnnbh.exe 4468 lffffrr.exe 2152 4060040.exe 672 6602244.exe 4636 ppjvd.exe 4448 hthbtn.exe 2552 djvvj.exe 3248 vjvvv.exe 3192 0468488.exe 4124 464802.exe 2980 nbnhbb.exe 2740 2826042.exe 1320 804682.exe 1816 0660888.exe 4004 0868846.exe 4504 040680.exe 4112 4048066.exe 3480 68660.exe 2504 e00004.exe 3808 6660640.exe 3984 bbtbhn.exe 4564 nbtbnh.exe 2032 8468420.exe 4264 684822.exe 964 hhbtbt.exe 1648 xlrlllf.exe 4584 vdvpd.exe 808 002224.exe 4488 jddvv.exe 3164 httttt.exe 4896 s6226.exe 232 848484.exe 1896 6446460.exe 1240 22842.exe 4664 864044.exe 2276 xxlxxrf.exe 4240 vpjpv.exe 3188 flllrxl.exe 4168 lfxrxrx.exe 2424 808266.exe 3796 002660.exe 1412 vjvdj.exe 4468 xllfxfl.exe 4080 0426660.exe 4716 fxlxfff.exe 2872 8282622.exe 2300 jpvvp.exe 2400 022088.exe 3196 rxffrff.exe 3212 dpppv.exe 2112 nttnhh.exe 1504 frlrrrr.exe 2272 jdddd.exe 2980 4020888.exe -
Processes:
resource yara_rule behavioral2/memory/4140-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5108-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3556-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3168-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2724-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3380-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2912-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1336-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4920-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2808-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4468-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2152-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/672-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4636-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2552-118-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3192-132-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4124-135-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2980-142-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2740-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1320-154-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1816-160-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4004-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4504-172-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4112-178-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2504-189-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3808-198-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5d4a17d93a4a7158ecf0056404a22acc_JaffaCakes118.exeppppp.exehbnnhh.exe7hnhbb.exe602244.exejvdvv.exe4466004.exexxrrllf.exeu204602.exehbhhtb.exevvddd.exehbnnbh.exelffffrr.exe4060040.exe6602244.exeppjvd.exehthbtn.exedjvvj.exevjvvv.exe0468488.exe464802.exenbnhbb.exedescription pid process target process PID 2724 wrote to memory of 3168 2724 5d4a17d93a4a7158ecf0056404a22acc_JaffaCakes118.exe ppppp.exe PID 2724 wrote to memory of 3168 2724 5d4a17d93a4a7158ecf0056404a22acc_JaffaCakes118.exe ppppp.exe PID 2724 wrote to memory of 3168 2724 5d4a17d93a4a7158ecf0056404a22acc_JaffaCakes118.exe ppppp.exe PID 3168 wrote to memory of 2680 3168 ppppp.exe hbnnhh.exe PID 3168 wrote to memory of 2680 3168 ppppp.exe hbnnhh.exe PID 3168 wrote to memory of 2680 3168 ppppp.exe hbnnhh.exe PID 2680 wrote to memory of 4140 2680 hbnnhh.exe 7hnhbb.exe PID 2680 wrote to memory of 4140 2680 hbnnhh.exe 7hnhbb.exe PID 2680 wrote to memory of 4140 2680 hbnnhh.exe 7hnhbb.exe PID 4140 wrote to memory of 3556 4140 7hnhbb.exe 602244.exe PID 4140 wrote to memory of 3556 4140 7hnhbb.exe 602244.exe PID 4140 wrote to memory of 3556 4140 7hnhbb.exe 602244.exe PID 3556 wrote to memory of 5108 3556 602244.exe jvdvv.exe PID 3556 wrote to memory of 5108 3556 602244.exe jvdvv.exe PID 3556 wrote to memory of 5108 3556 602244.exe jvdvv.exe PID 5108 wrote to memory of 3380 5108 jvdvv.exe 4466004.exe PID 5108 wrote to memory of 3380 5108 jvdvv.exe 4466004.exe PID 5108 wrote to memory of 3380 5108 jvdvv.exe 4466004.exe PID 3380 wrote to memory of 1996 3380 4466004.exe xxrrllf.exe PID 3380 wrote to memory of 1996 3380 4466004.exe xxrrllf.exe PID 3380 wrote to memory of 1996 3380 4466004.exe xxrrllf.exe PID 1996 wrote to memory of 2912 1996 xxrrllf.exe u204602.exe PID 1996 wrote to memory of 2912 1996 xxrrllf.exe u204602.exe PID 1996 wrote to memory of 2912 1996 xxrrllf.exe u204602.exe PID 2912 wrote to memory of 1336 2912 u204602.exe hbhhtb.exe PID 2912 wrote to memory of 1336 2912 u204602.exe hbhhtb.exe PID 2912 wrote to memory of 1336 2912 u204602.exe hbhhtb.exe PID 1336 wrote to memory of 4920 1336 hbhhtb.exe vvddd.exe PID 1336 wrote to memory of 4920 1336 hbhhtb.exe vvddd.exe PID 1336 wrote to memory of 4920 1336 hbhhtb.exe vvddd.exe PID 4920 wrote to memory of 2808 4920 vvddd.exe hbnnbh.exe PID 4920 wrote to memory of 2808 4920 vvddd.exe hbnnbh.exe PID 4920 wrote to memory of 2808 4920 vvddd.exe hbnnbh.exe PID 2808 wrote to memory of 4468 2808 hbnnbh.exe lffffrr.exe PID 2808 wrote to memory of 4468 2808 hbnnbh.exe lffffrr.exe PID 2808 wrote to memory of 4468 2808 hbnnbh.exe lffffrr.exe PID 4468 wrote to memory of 2152 4468 lffffrr.exe 4060040.exe PID 4468 wrote to memory of 2152 4468 lffffrr.exe 4060040.exe PID 4468 wrote to memory of 2152 4468 lffffrr.exe 4060040.exe PID 2152 wrote to memory of 672 2152 4060040.exe 6602244.exe PID 2152 wrote to memory of 672 2152 4060040.exe 6602244.exe PID 2152 wrote to memory of 672 2152 4060040.exe 6602244.exe PID 672 wrote to memory of 4636 672 6602244.exe ppjvd.exe PID 672 wrote to memory of 4636 672 6602244.exe ppjvd.exe PID 672 wrote to memory of 4636 672 6602244.exe ppjvd.exe PID 4636 wrote to memory of 4448 4636 ppjvd.exe hthbtn.exe PID 4636 wrote to memory of 4448 4636 ppjvd.exe hthbtn.exe PID 4636 wrote to memory of 4448 4636 ppjvd.exe hthbtn.exe PID 4448 wrote to memory of 2552 4448 hthbtn.exe djvvj.exe PID 4448 wrote to memory of 2552 4448 hthbtn.exe djvvj.exe PID 4448 wrote to memory of 2552 4448 hthbtn.exe djvvj.exe PID 2552 wrote to memory of 3248 2552 djvvj.exe vjvvv.exe PID 2552 wrote to memory of 3248 2552 djvvj.exe vjvvv.exe PID 2552 wrote to memory of 3248 2552 djvvj.exe vjvvv.exe PID 3248 wrote to memory of 3192 3248 vjvvv.exe 0468488.exe PID 3248 wrote to memory of 3192 3248 vjvvv.exe 0468488.exe PID 3248 wrote to memory of 3192 3248 vjvvv.exe 0468488.exe PID 3192 wrote to memory of 4124 3192 0468488.exe 464802.exe PID 3192 wrote to memory of 4124 3192 0468488.exe 464802.exe PID 3192 wrote to memory of 4124 3192 0468488.exe 464802.exe PID 4124 wrote to memory of 2980 4124 464802.exe nbnhbb.exe PID 4124 wrote to memory of 2980 4124 464802.exe nbnhbb.exe PID 4124 wrote to memory of 2980 4124 464802.exe nbnhbb.exe PID 2980 wrote to memory of 2740 2980 nbnhbb.exe 2826042.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d4a17d93a4a7158ecf0056404a22acc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d4a17d93a4a7158ecf0056404a22acc_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\ppppp.exec:\ppppp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
\??\c:\hbnnhh.exec:\hbnnhh.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2680 -
\??\c:\7hnhbb.exec:\7hnhbb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
\??\c:\602244.exec:\602244.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3556 -
\??\c:\jvdvv.exec:\jvdvv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
\??\c:\4466004.exec:\4466004.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
\??\c:\xxrrllf.exec:\xxrrllf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
\??\c:\u204602.exec:\u204602.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
\??\c:\hbhhtb.exec:\hbhhtb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
\??\c:\vvddd.exec:\vvddd.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4920 -
\??\c:\hbnnbh.exec:\hbnnbh.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\lffffrr.exec:\lffffrr.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
\??\c:\4060040.exec:\4060040.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\6602244.exec:\6602244.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
\??\c:\ppjvd.exec:\ppjvd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
\??\c:\hthbtn.exec:\hthbtn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
\??\c:\djvvj.exec:\djvvj.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
\??\c:\vjvvv.exec:\vjvvv.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3248 -
\??\c:\0468488.exec:\0468488.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
\??\c:\464802.exec:\464802.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
\??\c:\nbnhbb.exec:\nbnhbb.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\2826042.exec:\2826042.exe23⤵
- Executes dropped EXE
PID:2740 -
\??\c:\804682.exec:\804682.exe24⤵
- Executes dropped EXE
PID:1320 -
\??\c:\0660888.exec:\0660888.exe25⤵
- Executes dropped EXE
PID:1816 -
\??\c:\0868846.exec:\0868846.exe26⤵
- Executes dropped EXE
PID:4004 -
\??\c:\040680.exec:\040680.exe27⤵
- Executes dropped EXE
PID:4504 -
\??\c:\4048066.exec:\4048066.exe28⤵
- Executes dropped EXE
PID:4112 -
\??\c:\68660.exec:\68660.exe29⤵
- Executes dropped EXE
PID:3480 -
\??\c:\e00004.exec:\e00004.exe30⤵
- Executes dropped EXE
PID:2504 -
\??\c:\6660640.exec:\6660640.exe31⤵
- Executes dropped EXE
PID:3808 -
\??\c:\bbtbhn.exec:\bbtbhn.exe32⤵
- Executes dropped EXE
PID:3984 -
\??\c:\nbtbnh.exec:\nbtbnh.exe33⤵
- Executes dropped EXE
PID:4564 -
\??\c:\8468420.exec:\8468420.exe34⤵
- Executes dropped EXE
PID:2032 -
\??\c:\684822.exec:\684822.exe35⤵
- Executes dropped EXE
PID:4264 -
\??\c:\hhbtbt.exec:\hhbtbt.exe36⤵
- Executes dropped EXE
PID:964 -
\??\c:\xlrlllf.exec:\xlrlllf.exe37⤵
- Executes dropped EXE
PID:1648 -
\??\c:\vdvpd.exec:\vdvpd.exe38⤵
- Executes dropped EXE
PID:4584 -
\??\c:\002224.exec:\002224.exe39⤵
- Executes dropped EXE
PID:808 -
\??\c:\jddvv.exec:\jddvv.exe40⤵
- Executes dropped EXE
PID:4488 -
\??\c:\httttt.exec:\httttt.exe41⤵
- Executes dropped EXE
PID:3164 -
\??\c:\s6226.exec:\s6226.exe42⤵
- Executes dropped EXE
PID:4896 -
\??\c:\848484.exec:\848484.exe43⤵
- Executes dropped EXE
PID:232 -
\??\c:\6446460.exec:\6446460.exe44⤵
- Executes dropped EXE
PID:1896 -
\??\c:\22842.exec:\22842.exe45⤵
- Executes dropped EXE
PID:1240 -
\??\c:\864044.exec:\864044.exe46⤵
- Executes dropped EXE
PID:4664 -
\??\c:\xxlxxrf.exec:\xxlxxrf.exe47⤵
- Executes dropped EXE
PID:2276 -
\??\c:\vpjpv.exec:\vpjpv.exe48⤵
- Executes dropped EXE
PID:4240 -
\??\c:\flllrxl.exec:\flllrxl.exe49⤵
- Executes dropped EXE
PID:3188 -
\??\c:\lfxrxrx.exec:\lfxrxrx.exe50⤵
- Executes dropped EXE
PID:4168 -
\??\c:\808266.exec:\808266.exe51⤵
- Executes dropped EXE
PID:2424 -
\??\c:\002660.exec:\002660.exe52⤵
- Executes dropped EXE
PID:3796 -
\??\c:\vjvdj.exec:\vjvdj.exe53⤵
- Executes dropped EXE
PID:1412 -
\??\c:\xllfxfl.exec:\xllfxfl.exe54⤵
- Executes dropped EXE
PID:4468 -
\??\c:\0426660.exec:\0426660.exe55⤵
- Executes dropped EXE
PID:4080 -
\??\c:\fxlxfff.exec:\fxlxfff.exe56⤵
- Executes dropped EXE
PID:4716 -
\??\c:\8282622.exec:\8282622.exe57⤵
- Executes dropped EXE
PID:2872 -
\??\c:\jpvvp.exec:\jpvvp.exe58⤵
- Executes dropped EXE
PID:2300 -
\??\c:\022088.exec:\022088.exe59⤵
- Executes dropped EXE
PID:2400 -
\??\c:\rxffrff.exec:\rxffrff.exe60⤵
- Executes dropped EXE
PID:3196 -
\??\c:\dpppv.exec:\dpppv.exe61⤵
- Executes dropped EXE
PID:3212 -
\??\c:\nttnhh.exec:\nttnhh.exe62⤵
- Executes dropped EXE
PID:2112 -
\??\c:\frlrrrr.exec:\frlrrrr.exe63⤵
- Executes dropped EXE
PID:1504 -
\??\c:\jdddd.exec:\jdddd.exe64⤵
- Executes dropped EXE
PID:2272 -
\??\c:\4020888.exec:\4020888.exe65⤵
- Executes dropped EXE
PID:2980 -
\??\c:\dpjjj.exec:\dpjjj.exe66⤵PID:2116
-
\??\c:\btnhnn.exec:\btnhnn.exe67⤵PID:1700
-
\??\c:\bnbtnh.exec:\bnbtnh.exe68⤵PID:4208
-
\??\c:\0446004.exec:\0446004.exe69⤵PID:4676
-
\??\c:\flxllxl.exec:\flxllxl.exe70⤵PID:3428
-
\??\c:\08646.exec:\08646.exe71⤵PID:4504
-
\??\c:\804808.exec:\804808.exe72⤵PID:2264
-
\??\c:\thbhtn.exec:\thbhtn.exe73⤵PID:5020
-
\??\c:\jvdvv.exec:\jvdvv.exe74⤵PID:2888
-
\??\c:\vjjvj.exec:\vjjvj.exe75⤵PID:3256
-
\??\c:\4044862.exec:\4044862.exe76⤵PID:4360
-
\??\c:\ppvpd.exec:\ppvpd.exe77⤵PID:1236
-
\??\c:\8662600.exec:\8662600.exe78⤵PID:2000
-
\??\c:\6208622.exec:\6208622.exe79⤵PID:2940
-
\??\c:\80264.exec:\80264.exe80⤵PID:2520
-
\??\c:\xrllfrx.exec:\xrllfrx.exe81⤵PID:2824
-
\??\c:\ttnbnh.exec:\ttnbnh.exe82⤵PID:4900
-
\??\c:\5vpdp.exec:\5vpdp.exe83⤵PID:776
-
\??\c:\420404.exec:\420404.exe84⤵PID:4736
-
\??\c:\nnbnnn.exec:\nnbnnn.exe85⤵PID:808
-
\??\c:\jvpdp.exec:\jvpdp.exe86⤵PID:2928
-
\??\c:\86862.exec:\86862.exe87⤵PID:4392
-
\??\c:\0804880.exec:\0804880.exe88⤵PID:4848
-
\??\c:\7nbtnn.exec:\7nbtnn.exe89⤵PID:4268
-
\??\c:\604444.exec:\604444.exe90⤵PID:4008
-
\??\c:\82246.exec:\82246.exe91⤵PID:4036
-
\??\c:\rrfxxxr.exec:\rrfxxxr.exe92⤵PID:1644
-
\??\c:\3xxlffx.exec:\3xxlffx.exe93⤵PID:4248
-
\??\c:\xffllfr.exec:\xffllfr.exe94⤵PID:1564
-
\??\c:\pdvpp.exec:\pdvpp.exe95⤵PID:4152
-
\??\c:\2042244.exec:\2042244.exe96⤵PID:1516
-
\??\c:\dppdj.exec:\dppdj.exe97⤵PID:2424
-
\??\c:\k00426.exec:\k00426.exe98⤵PID:3796
-
\??\c:\000444.exec:\000444.exe99⤵PID:400
-
\??\c:\lrrlfxr.exec:\lrrlfxr.exe100⤵PID:2804
-
\??\c:\1nbtnn.exec:\1nbtnn.exe101⤵PID:3884
-
\??\c:\rxllxxr.exec:\rxllxxr.exe102⤵PID:4568
-
\??\c:\btbtnt.exec:\btbtnt.exe103⤵PID:2872
-
\??\c:\62620.exec:\62620.exe104⤵PID:1796
-
\??\c:\ntttnt.exec:\ntttnt.exe105⤵PID:1364
-
\??\c:\204084.exec:\204084.exe106⤵PID:856
-
\??\c:\2668824.exec:\2668824.exe107⤵PID:4720
-
\??\c:\nbhbbt.exec:\nbhbbt.exe108⤵PID:3368
-
\??\c:\802208.exec:\802208.exe109⤵PID:4416
-
\??\c:\46464.exec:\46464.exe110⤵PID:3364
-
\??\c:\042462.exec:\042462.exe111⤵PID:1760
-
\??\c:\6402262.exec:\6402262.exe112⤵PID:4192
-
\??\c:\84604.exec:\84604.exe113⤵PID:4908
-
\??\c:\s0648.exec:\s0648.exe114⤵PID:3756
-
\??\c:\xxlxlrx.exec:\xxlxlrx.exe115⤵PID:4500
-
\??\c:\g8040.exec:\g8040.exe116⤵PID:1944
-
\??\c:\48666.exec:\48666.exe117⤵PID:2852
-
\??\c:\4460882.exec:\4460882.exe118⤵PID:3952
-
\??\c:\8020048.exec:\8020048.exe119⤵PID:1664
-
\??\c:\4844440.exec:\4844440.exe120⤵PID:3808
-
\??\c:\60646.exec:\60646.exe121⤵PID:4276
-
\??\c:\4204884.exec:\4204884.exe122⤵PID:3220
-
\??\c:\ffrrlxf.exec:\ffrrlxf.exe123⤵PID:2520
-
\??\c:\04028.exec:\04028.exe124⤵PID:4200
-
\??\c:\828200.exec:\828200.exe125⤵PID:3300
-
\??\c:\hbnhhb.exec:\hbnhhb.exe126⤵PID:3152
-
\??\c:\xlfxrlf.exec:\xlfxrlf.exe127⤵PID:4952
-
\??\c:\hhnhhb.exec:\hhnhhb.exe128⤵PID:4880
-
\??\c:\06048.exec:\06048.exe129⤵PID:3556
-
\??\c:\hnbnth.exec:\hnbnth.exe130⤵PID:2560
-
\??\c:\lrlfrrl.exec:\lrlfrrl.exe131⤵PID:4008
-
\??\c:\20004.exec:\20004.exe132⤵PID:4036
-
\??\c:\htnhtt.exec:\htnhtt.exe133⤵PID:1736
-
\??\c:\224024.exec:\224024.exe134⤵PID:2576
-
\??\c:\tnttnh.exec:\tnttnh.exe135⤵PID:1064
-
\??\c:\7pvvp.exec:\7pvvp.exe136⤵PID:3648
-
\??\c:\ffflrfx.exec:\ffflrfx.exe137⤵PID:3324
-
\??\c:\2620882.exec:\2620882.exe138⤵PID:3048
-
\??\c:\6246666.exec:\6246666.exe139⤵PID:3604
-
\??\c:\80660.exec:\80660.exe140⤵PID:4556
-
\??\c:\pjpjd.exec:\pjpjd.exe141⤵PID:3200
-
\??\c:\0460882.exec:\0460882.exe142⤵PID:2872
-
\??\c:\rfflffx.exec:\rfflffx.exe143⤵PID:1796
-
\??\c:\646004.exec:\646004.exe144⤵PID:1364
-
\??\c:\6006648.exec:\6006648.exe145⤵PID:528
-
\??\c:\hthnnn.exec:\hthnnn.exe146⤵PID:4092
-
\??\c:\ppddj.exec:\ppddj.exe147⤵PID:3368
-
\??\c:\ntbtnn.exec:\ntbtnn.exe148⤵PID:1964
-
\??\c:\484602.exec:\484602.exe149⤵PID:2988
-
\??\c:\rrxrrrl.exec:\rrxrrrl.exe150⤵PID:4596
-
\??\c:\flfrxrf.exec:\flfrxrf.exe151⤵PID:2932
-
\??\c:\02260.exec:\02260.exe152⤵PID:464
-
\??\c:\804862.exec:\804862.exe153⤵PID:4056
-
\??\c:\nhtbhn.exec:\nhtbhn.exe154⤵PID:1956
-
\??\c:\9ffxlrx.exec:\9ffxlrx.exe155⤵PID:1000
-
\??\c:\002684.exec:\002684.exe156⤵PID:3952
-
\??\c:\08602.exec:\08602.exe157⤵PID:536
-
\??\c:\2622802.exec:\2622802.exe158⤵PID:3808
-
\??\c:\6620866.exec:\6620866.exe159⤵PID:4276
-
\??\c:\2408226.exec:\2408226.exe160⤵PID:964
-
\??\c:\bhhntb.exec:\bhhntb.exe161⤵PID:812
-
\??\c:\8248888.exec:\8248888.exe162⤵PID:4900
-
\??\c:\ppjdv.exec:\ppjdv.exe163⤵PID:2724
-
\??\c:\44664.exec:\44664.exe164⤵PID:408
-
\??\c:\3tnhtt.exec:\3tnhtt.exe165⤵PID:5108
-
\??\c:\824882.exec:\824882.exe166⤵PID:4664
-
\??\c:\82820.exec:\82820.exe167⤵PID:3516
-
\??\c:\444866.exec:\444866.exe168⤵PID:5084
-
\??\c:\nhnbhh.exec:\nhnbhh.exe169⤵PID:3084
-
\??\c:\pddjv.exec:\pddjv.exe170⤵PID:1564
-
\??\c:\626864.exec:\626864.exe171⤵PID:1128
-
\??\c:\48848.exec:\48848.exe172⤵PID:1064
-
\??\c:\xrlrrlr.exec:\xrlrrlr.exe173⤵PID:3648
-
\??\c:\068440.exec:\068440.exe174⤵PID:1372
-
\??\c:\g6806.exec:\g6806.exe175⤵PID:3076
-
\??\c:\262886.exec:\262886.exe176⤵PID:3604
-
\??\c:\w46040.exec:\w46040.exe177⤵PID:4556
-
\??\c:\jjjpp.exec:\jjjpp.exe178⤵PID:3200
-
\??\c:\844226.exec:\844226.exe179⤵PID:4444
-
\??\c:\824888.exec:\824888.exe180⤵PID:2656
-
\??\c:\s4600.exec:\s4600.exe181⤵PID:2840
-
\??\c:\ppddv.exec:\ppddv.exe182⤵PID:2660
-
\??\c:\80244.exec:\80244.exe183⤵PID:2980
-
\??\c:\462644.exec:\462644.exe184⤵PID:3368
-
\??\c:\htbbnb.exec:\htbbnb.exe185⤵PID:1760
-
\??\c:\4248282.exec:\4248282.exe186⤵PID:2988
-
\??\c:\nhtnhb.exec:\nhtnhb.exe187⤵PID:4908
-
\??\c:\008686.exec:\008686.exe188⤵PID:4004
-
\??\c:\7hnhbb.exec:\7hnhbb.exe189⤵PID:5004
-
\??\c:\440048.exec:\440048.exe190⤵PID:3552
-
\??\c:\280422.exec:\280422.exe191⤵PID:1880
-
\??\c:\4626664.exec:\4626664.exe192⤵PID:1708
-
\??\c:\3llfxrl.exec:\3llfxrl.exe193⤵PID:848
-
\??\c:\thbthn.exec:\thbthn.exe194⤵PID:3044
-
\??\c:\0648222.exec:\0648222.exe195⤵PID:4888
-
\??\c:\4688200.exec:\4688200.exe196⤵PID:2892
-
\??\c:\84666.exec:\84666.exe197⤵PID:4912
-
\??\c:\7rlrxxf.exec:\7rlrxxf.exe198⤵PID:4700
-
\??\c:\lxrlffx.exec:\lxrlffx.exe199⤵PID:1016
-
\??\c:\5pddv.exec:\5pddv.exe200⤵PID:1356
-
\??\c:\884206.exec:\884206.exe201⤵PID:4808
-
\??\c:\824862.exec:\824862.exe202⤵PID:2268
-
\??\c:\64880.exec:\64880.exe203⤵PID:1728
-
\??\c:\nthtbt.exec:\nthtbt.exe204⤵PID:3936
-
\??\c:\4004220.exec:\4004220.exe205⤵PID:4152
-
\??\c:\404282.exec:\404282.exe206⤵PID:2372
-
\??\c:\pvvvp.exec:\pvvvp.exe207⤵PID:1516
-
\??\c:\tbhbbn.exec:\tbhbbn.exe208⤵PID:4820
-
\??\c:\nhnbhh.exec:\nhnbhh.exe209⤵PID:400
-
\??\c:\pdpvp.exec:\pdpvp.exe210⤵PID:2804
-
\??\c:\fflfrrr.exec:\fflfrrr.exe211⤵PID:3484
-
\??\c:\6648846.exec:\6648846.exe212⤵PID:3604
-
\??\c:\hhnhbh.exec:\hhnhbh.exe213⤵PID:1056
-
\??\c:\462840.exec:\462840.exe214⤵PID:3580
-
\??\c:\nnnhbh.exec:\nnnhbh.exe215⤵PID:4444
-
\??\c:\nnhhtt.exec:\nnhhtt.exe216⤵PID:1204
-
\??\c:\48006.exec:\48006.exe217⤵PID:1032
-
\??\c:\hbttnn.exec:\hbttnn.exe218⤵PID:1624
-
\??\c:\8042600.exec:\8042600.exe219⤵PID:1964
-
\??\c:\vvdvd.exec:\vvdvd.exe220⤵PID:1832
-
\??\c:\042622.exec:\042622.exe221⤵PID:1760
-
\??\c:\808042.exec:\808042.exe222⤵PID:4916
-
\??\c:\20482.exec:\20482.exe223⤵PID:4864
-
\??\c:\httnnn.exec:\httnnn.exe224⤵PID:4056
-
\??\c:\hbttbb.exec:\hbttbb.exe225⤵PID:1956
-
\??\c:\ttnhbh.exec:\ttnhbh.exe226⤵PID:5020
-
\??\c:\82444.exec:\82444.exe227⤵PID:2636
-
\??\c:\6404442.exec:\6404442.exe228⤵PID:1344
-
\??\c:\9hbttt.exec:\9hbttt.exe229⤵PID:5100
-
\??\c:\68082.exec:\68082.exe230⤵PID:2968
-
\??\c:\68604.exec:\68604.exe231⤵PID:4488
-
\??\c:\lrrlfxx.exec:\lrrlfxx.exe232⤵PID:2724
-
\??\c:\826082.exec:\826082.exe233⤵PID:4880
-
\??\c:\flfflll.exec:\flfflll.exe234⤵PID:3792
-
\??\c:\6688488.exec:\6688488.exe235⤵PID:2560
-
\??\c:\rrxrffl.exec:\rrxrffl.exe236⤵PID:1716
-
\??\c:\0848826.exec:\0848826.exe237⤵PID:3084
-
\??\c:\rlffxfx.exec:\rlffxfx.exe238⤵PID:3936
-
\??\c:\64846.exec:\64846.exe239⤵PID:4152
-
\??\c:\64204.exec:\64204.exe240⤵PID:3712
-
\??\c:\0626000.exec:\0626000.exe241⤵PID:1064
-
\??\c:\c064488.exec:\c064488.exe242⤵PID:3048