Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 18:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6bd61cf1c7637ffd7e98d20c4e32e7e9_JaffaCakes118.exe
Resource
win7-20240221-en
windows7-x64
5 signatures
150 seconds
General
-
Target
6bd61cf1c7637ffd7e98d20c4e32e7e9_JaffaCakes118.exe
-
Size
78KB
-
MD5
6bd61cf1c7637ffd7e98d20c4e32e7e9
-
SHA1
2dd4aa09f3313e041567d5867de4a2c91c6e43b8
-
SHA256
96104f7526b22316b8c23e3180521f25a5f582239a74e89f74b557a8d368e2d5
-
SHA512
eae80cbf6d11e32bdddb59f94d5adea53732250e64cd9d232dc04296d2e3db69e195871c4092ba85dc59233948076f1bac32d12f20e906e4354050785eaf8a5c
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDWiekja1br3GGBxfot3n3:ymb3NkkiQ3mdBjFWXkj7afodn3
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/2936-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3028-13-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2624-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2976-33-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2660-45-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2580-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2484-63-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2496-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2464-93-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2904-102-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2740-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2784-129-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2224-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/544-156-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1984-174-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2136-191-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2432-201-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2304-291-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1512-300-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ddpdj.exe5rllxxx.exe9tbhtt.exe7jppp.exepdjdd.exexlffrrl.exeflxllxx.exe7bhhhh.exejpjvj.exedpppj.exeflllfxf.exehttthb.exejvddp.exeppppj.exelxfxflr.exe1rfxrlf.exe1htttn.exevjjvd.exejvjjp.exerfrffll.exe5fxfxfr.exe3bnnbb.exe9pdpd.exe5djvj.exexllrrxx.exexrlrxrx.exetnbbnh.exe9jjvd.exerllxxfl.exexlrrrrx.exethntbt.exe1vdvv.exe1jppv.exe3fllxxf.exerffffxf.exe5tbhbt.exethtbbn.exe9vdjp.exejvvvp.exefxffrrx.exexlrrxrr.exe7hntbt.exe5tbhbh.exe5pjpp.exevjvdd.exe1lrrxrr.exe3lffffl.exehbnnnh.exebnbhhb.exejdjjp.exevdjjj.exexlfrxrr.exellrxxxr.exetthhnn.exentbnnn.exevjvpp.exejpjvv.exelxlffxx.exebtbbhb.exe3jpvv.exejvdvv.exelxxrxrf.exerfflrll.exethnnhb.exepid process 3028 ddpdj.exe 2624 5rllxxx.exe 2976 9tbhtt.exe 2660 7jppp.exe 2580 pdjdd.exe 2484 xlffrrl.exe 2496 flxllxx.exe 2464 7bhhhh.exe 2904 jpjvj.exe 1432 dpppj.exe 2740 flllfxf.exe 2784 httthb.exe 2224 jvddp.exe 1924 ppppj.exe 544 lxfxflr.exe 2164 1rfxrlf.exe 1984 1htttn.exe 1660 vjjvd.exe 2136 jvjjp.exe 2432 rfrffll.exe 2852 5fxfxfr.exe 536 3bnnbb.exe 1112 9pdpd.exe 1116 5djvj.exe 360 xllrrxx.exe 624 xrlrxrx.exe 1240 tnbbnh.exe 1036 9jjvd.exe 2960 rllxxfl.exe 2304 xlrrrrx.exe 1512 thntbt.exe 3008 1vdvv.exe 1716 1jppv.exe 3036 3fllxxf.exe 2120 rffffxf.exe 2624 5tbhbt.exe 2556 thtbbn.exe 2832 9vdjp.exe 2828 jvvvp.exe 2472 fxffrrx.exe 2732 xlrrxrr.exe 2460 7hntbt.exe 2616 5tbhbh.exe 2108 5pjpp.exe 1696 vjvdd.exe 640 1lrrxrr.exe 2776 3lffffl.exe 2760 hbnnnh.exe 2784 bnbhhb.exe 2240 jdjjp.exe 1532 vdjjj.exe 1948 xlfrxrr.exe 1920 llrxxxr.exe 1672 tthhnn.exe 1832 ntbnnn.exe 1340 vjvpp.exe 2544 jpjvv.exe 2280 lxlffxx.exe 2432 btbbhb.exe 2852 3jpvv.exe 2720 jvdvv.exe 704 lxxrxrf.exe 1856 rfflrll.exe 1136 thnnhb.exe -
Processes:
resource yara_rule behavioral1/memory/2936-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3028-13-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2624-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2976-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2660-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2580-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2484-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2496-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2464-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2464-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2464-93-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2904-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2740-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2784-129-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2224-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/544-156-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1984-174-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2136-191-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2432-201-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2304-291-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1512-300-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6bd61cf1c7637ffd7e98d20c4e32e7e9_JaffaCakes118.exeddpdj.exe5rllxxx.exe9tbhtt.exe7jppp.exepdjdd.exexlffrrl.exeflxllxx.exe7bhhhh.exejpjvj.exedpppj.exeflllfxf.exehttthb.exejvddp.exeppppj.exelxfxflr.exedescription pid process target process PID 2936 wrote to memory of 3028 2936 6bd61cf1c7637ffd7e98d20c4e32e7e9_JaffaCakes118.exe ddpdj.exe PID 2936 wrote to memory of 3028 2936 6bd61cf1c7637ffd7e98d20c4e32e7e9_JaffaCakes118.exe ddpdj.exe PID 2936 wrote to memory of 3028 2936 6bd61cf1c7637ffd7e98d20c4e32e7e9_JaffaCakes118.exe ddpdj.exe PID 2936 wrote to memory of 3028 2936 6bd61cf1c7637ffd7e98d20c4e32e7e9_JaffaCakes118.exe ddpdj.exe PID 3028 wrote to memory of 2624 3028 ddpdj.exe 5rllxxx.exe PID 3028 wrote to memory of 2624 3028 ddpdj.exe 5rllxxx.exe PID 3028 wrote to memory of 2624 3028 ddpdj.exe 5rllxxx.exe PID 3028 wrote to memory of 2624 3028 ddpdj.exe 5rllxxx.exe PID 2624 wrote to memory of 2976 2624 5rllxxx.exe 9tbhtt.exe PID 2624 wrote to memory of 2976 2624 5rllxxx.exe 9tbhtt.exe PID 2624 wrote to memory of 2976 2624 5rllxxx.exe 9tbhtt.exe PID 2624 wrote to memory of 2976 2624 5rllxxx.exe 9tbhtt.exe PID 2976 wrote to memory of 2660 2976 9tbhtt.exe 7jppp.exe PID 2976 wrote to memory of 2660 2976 9tbhtt.exe 7jppp.exe PID 2976 wrote to memory of 2660 2976 9tbhtt.exe 7jppp.exe PID 2976 wrote to memory of 2660 2976 9tbhtt.exe 7jppp.exe PID 2660 wrote to memory of 2580 2660 7jppp.exe pdjdd.exe PID 2660 wrote to memory of 2580 2660 7jppp.exe pdjdd.exe PID 2660 wrote to memory of 2580 2660 7jppp.exe pdjdd.exe PID 2660 wrote to memory of 2580 2660 7jppp.exe pdjdd.exe PID 2580 wrote to memory of 2484 2580 pdjdd.exe xlffrrl.exe PID 2580 wrote to memory of 2484 2580 pdjdd.exe xlffrrl.exe PID 2580 wrote to memory of 2484 2580 pdjdd.exe xlffrrl.exe PID 2580 wrote to memory of 2484 2580 pdjdd.exe xlffrrl.exe PID 2484 wrote to memory of 2496 2484 xlffrrl.exe flxllxx.exe PID 2484 wrote to memory of 2496 2484 xlffrrl.exe flxllxx.exe PID 2484 wrote to memory of 2496 2484 xlffrrl.exe flxllxx.exe PID 2484 wrote to memory of 2496 2484 xlffrrl.exe flxllxx.exe PID 2496 wrote to memory of 2464 2496 flxllxx.exe 7bhhhh.exe PID 2496 wrote to memory of 2464 2496 flxllxx.exe 7bhhhh.exe PID 2496 wrote to memory of 2464 2496 flxllxx.exe 7bhhhh.exe PID 2496 wrote to memory of 2464 2496 flxllxx.exe 7bhhhh.exe PID 2464 wrote to memory of 2904 2464 7bhhhh.exe jpjvj.exe PID 2464 wrote to memory of 2904 2464 7bhhhh.exe jpjvj.exe PID 2464 wrote to memory of 2904 2464 7bhhhh.exe jpjvj.exe PID 2464 wrote to memory of 2904 2464 7bhhhh.exe jpjvj.exe PID 2904 wrote to memory of 1432 2904 jpjvj.exe dpppj.exe PID 2904 wrote to memory of 1432 2904 jpjvj.exe dpppj.exe PID 2904 wrote to memory of 1432 2904 jpjvj.exe dpppj.exe PID 2904 wrote to memory of 1432 2904 jpjvj.exe dpppj.exe PID 1432 wrote to memory of 2740 1432 dpppj.exe flllfxf.exe PID 1432 wrote to memory of 2740 1432 dpppj.exe flllfxf.exe PID 1432 wrote to memory of 2740 1432 dpppj.exe flllfxf.exe PID 1432 wrote to memory of 2740 1432 dpppj.exe flllfxf.exe PID 2740 wrote to memory of 2784 2740 flllfxf.exe httthb.exe PID 2740 wrote to memory of 2784 2740 flllfxf.exe httthb.exe PID 2740 wrote to memory of 2784 2740 flllfxf.exe httthb.exe PID 2740 wrote to memory of 2784 2740 flllfxf.exe httthb.exe PID 2784 wrote to memory of 2224 2784 httthb.exe jvddp.exe PID 2784 wrote to memory of 2224 2784 httthb.exe jvddp.exe PID 2784 wrote to memory of 2224 2784 httthb.exe jvddp.exe PID 2784 wrote to memory of 2224 2784 httthb.exe jvddp.exe PID 2224 wrote to memory of 1924 2224 jvddp.exe ppppj.exe PID 2224 wrote to memory of 1924 2224 jvddp.exe ppppj.exe PID 2224 wrote to memory of 1924 2224 jvddp.exe ppppj.exe PID 2224 wrote to memory of 1924 2224 jvddp.exe ppppj.exe PID 1924 wrote to memory of 544 1924 ppppj.exe lxfxflr.exe PID 1924 wrote to memory of 544 1924 ppppj.exe lxfxflr.exe PID 1924 wrote to memory of 544 1924 ppppj.exe lxfxflr.exe PID 1924 wrote to memory of 544 1924 ppppj.exe lxfxflr.exe PID 544 wrote to memory of 2164 544 lxfxflr.exe 1rfxrlf.exe PID 544 wrote to memory of 2164 544 lxfxflr.exe 1rfxrlf.exe PID 544 wrote to memory of 2164 544 lxfxflr.exe 1rfxrlf.exe PID 544 wrote to memory of 2164 544 lxfxflr.exe 1rfxrlf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bd61cf1c7637ffd7e98d20c4e32e7e9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6bd61cf1c7637ffd7e98d20c4e32e7e9_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
\??\c:\ddpdj.exec:\ddpdj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
\??\c:\5rllxxx.exec:\5rllxxx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\9tbhtt.exec:\9tbhtt.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2976 -
\??\c:\7jppp.exec:\7jppp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
\??\c:\pdjdd.exec:\pdjdd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\xlffrrl.exec:\xlffrrl.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\flxllxx.exec:\flxllxx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2496 -
\??\c:\7bhhhh.exec:\7bhhhh.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
\??\c:\jpjvj.exec:\jpjvj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
\??\c:\dpppj.exec:\dpppj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
\??\c:\flllfxf.exec:\flllfxf.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\httthb.exec:\httthb.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\jvddp.exec:\jvddp.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\ppppj.exec:\ppppj.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\lxfxflr.exec:\lxfxflr.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:544 -
\??\c:\1rfxrlf.exec:\1rfxrlf.exe17⤵
- Executes dropped EXE
PID:2164 -
\??\c:\1htttn.exec:\1htttn.exe18⤵
- Executes dropped EXE
PID:1984 -
\??\c:\vjjvd.exec:\vjjvd.exe19⤵
- Executes dropped EXE
PID:1660 -
\??\c:\jvjjp.exec:\jvjjp.exe20⤵
- Executes dropped EXE
PID:2136 -
\??\c:\rfrffll.exec:\rfrffll.exe21⤵
- Executes dropped EXE
PID:2432 -
\??\c:\5fxfxfr.exec:\5fxfxfr.exe22⤵
- Executes dropped EXE
PID:2852 -
\??\c:\3bnnbb.exec:\3bnnbb.exe23⤵
- Executes dropped EXE
PID:536 -
\??\c:\9pdpd.exec:\9pdpd.exe24⤵
- Executes dropped EXE
PID:1112 -
\??\c:\5djvj.exec:\5djvj.exe25⤵
- Executes dropped EXE
PID:1116 -
\??\c:\xllrrxx.exec:\xllrrxx.exe26⤵
- Executes dropped EXE
PID:360 -
\??\c:\xrlrxrx.exec:\xrlrxrx.exe27⤵
- Executes dropped EXE
PID:624 -
\??\c:\tnbbnh.exec:\tnbbnh.exe28⤵
- Executes dropped EXE
PID:1240 -
\??\c:\9jjvd.exec:\9jjvd.exe29⤵
- Executes dropped EXE
PID:1036 -
\??\c:\rllxxfl.exec:\rllxxfl.exe30⤵
- Executes dropped EXE
PID:2960 -
\??\c:\xlrrrrx.exec:\xlrrrrx.exe31⤵
- Executes dropped EXE
PID:2304 -
\??\c:\thntbt.exec:\thntbt.exe32⤵
- Executes dropped EXE
PID:1512 -
\??\c:\1vdvv.exec:\1vdvv.exe33⤵
- Executes dropped EXE
PID:3008 -
\??\c:\1jppv.exec:\1jppv.exe34⤵
- Executes dropped EXE
PID:1716 -
\??\c:\3fllxxf.exec:\3fllxxf.exe35⤵
- Executes dropped EXE
PID:3036 -
\??\c:\rffffxf.exec:\rffffxf.exe36⤵
- Executes dropped EXE
PID:2120 -
\??\c:\5tbhbt.exec:\5tbhbt.exe37⤵
- Executes dropped EXE
PID:2624 -
\??\c:\thtbbn.exec:\thtbbn.exe38⤵
- Executes dropped EXE
PID:2556 -
\??\c:\9vdjp.exec:\9vdjp.exe39⤵
- Executes dropped EXE
PID:2832 -
\??\c:\jvvvp.exec:\jvvvp.exe40⤵
- Executes dropped EXE
PID:2828 -
\??\c:\fxffrrx.exec:\fxffrrx.exe41⤵
- Executes dropped EXE
PID:2472 -
\??\c:\xlrrxrr.exec:\xlrrxrr.exe42⤵
- Executes dropped EXE
PID:2732 -
\??\c:\7hntbt.exec:\7hntbt.exe43⤵
- Executes dropped EXE
PID:2460 -
\??\c:\5tbhbh.exec:\5tbhbh.exe44⤵
- Executes dropped EXE
PID:2616 -
\??\c:\5pjpp.exec:\5pjpp.exe45⤵
- Executes dropped EXE
PID:2108 -
\??\c:\vjvdd.exec:\vjvdd.exe46⤵
- Executes dropped EXE
PID:1696 -
\??\c:\1lrrxrr.exec:\1lrrxrr.exe47⤵
- Executes dropped EXE
PID:640 -
\??\c:\3lffffl.exec:\3lffffl.exe48⤵
- Executes dropped EXE
PID:2776 -
\??\c:\hbnnnh.exec:\hbnnnh.exe49⤵
- Executes dropped EXE
PID:2760 -
\??\c:\bnbhhb.exec:\bnbhhb.exe50⤵
- Executes dropped EXE
PID:2784 -
\??\c:\jdjjp.exec:\jdjjp.exe51⤵
- Executes dropped EXE
PID:2240 -
\??\c:\vdjjj.exec:\vdjjj.exe52⤵
- Executes dropped EXE
PID:1532 -
\??\c:\xlfrxrr.exec:\xlfrxrr.exe53⤵
- Executes dropped EXE
PID:1948 -
\??\c:\llrxxxr.exec:\llrxxxr.exe54⤵
- Executes dropped EXE
PID:1920 -
\??\c:\tthhnn.exec:\tthhnn.exe55⤵
- Executes dropped EXE
PID:1672 -
\??\c:\ntbnnn.exec:\ntbnnn.exe56⤵
- Executes dropped EXE
PID:1832 -
\??\c:\vjvpp.exec:\vjvpp.exe57⤵
- Executes dropped EXE
PID:1340 -
\??\c:\jpjvv.exec:\jpjvv.exe58⤵
- Executes dropped EXE
PID:2544 -
\??\c:\lxlffxx.exec:\lxlffxx.exe59⤵
- Executes dropped EXE
PID:2280 -
\??\c:\btbbhb.exec:\btbbhb.exe60⤵
- Executes dropped EXE
PID:2432 -
\??\c:\3jpvv.exec:\3jpvv.exe61⤵
- Executes dropped EXE
PID:2852 -
\??\c:\jvdvv.exec:\jvdvv.exe62⤵
- Executes dropped EXE
PID:2720 -
\??\c:\lxxrxrf.exec:\lxxrxrf.exe63⤵
- Executes dropped EXE
PID:704 -
\??\c:\rfflrll.exec:\rfflrll.exe64⤵
- Executes dropped EXE
PID:1856 -
\??\c:\thnnhb.exec:\thnnhb.exe65⤵
- Executes dropped EXE
PID:1136 -
\??\c:\bnbbbt.exec:\bnbbbt.exe66⤵PID:3032
-
\??\c:\djpjp.exec:\djpjp.exe67⤵PID:1100
-
\??\c:\jvdvp.exec:\jvdvp.exe68⤵PID:568
-
\??\c:\xrxflff.exec:\xrxflff.exe69⤵PID:2324
-
\??\c:\rflrrrx.exec:\rflrrrx.exe70⤵PID:1808
-
\??\c:\3nbbth.exec:\3nbbth.exe71⤵PID:884
-
\??\c:\bnttnh.exec:\bnttnh.exe72⤵PID:2020
-
\??\c:\vpvvj.exec:\vpvvj.exe73⤵PID:2056
-
\??\c:\jvvdd.exec:\jvvdd.exe74⤵PID:1608
-
\??\c:\9frffxf.exec:\9frffxf.exe75⤵PID:272
-
\??\c:\xllllfr.exec:\xllllfr.exe76⤵PID:2820
-
\??\c:\5bbbbt.exec:\5bbbbt.exe77⤵PID:1804
-
\??\c:\ttttbb.exec:\ttttbb.exe78⤵PID:2816
-
\??\c:\jpjjp.exec:\jpjjp.exe79⤵PID:2672
-
\??\c:\5vpjj.exec:\5vpjj.exe80⤵PID:2648
-
\??\c:\rrrfxrf.exec:\rrrfxrf.exe81⤵PID:2276
-
\??\c:\9xxfrlx.exec:\9xxfrlx.exe82⤵PID:2804
-
\??\c:\hbhhtb.exec:\hbhhtb.exe83⤵PID:2560
-
\??\c:\jdjpj.exec:\jdjpj.exe84⤵PID:2584
-
\??\c:\dpvvv.exec:\dpvvv.exe85⤵PID:2524
-
\??\c:\7lrllll.exec:\7lrllll.exe86⤵PID:2464
-
\??\c:\xrfxffl.exec:\xrfxffl.exe87⤵PID:2900
-
\??\c:\htbtbb.exec:\htbtbb.exe88⤵PID:2688
-
\??\c:\bntnhb.exec:\bntnhb.exe89⤵PID:2536
-
\??\c:\htbbtn.exec:\htbbtn.exe90⤵PID:2740
-
\??\c:\3jpjp.exec:\3jpjp.exe91⤵PID:2808
-
\??\c:\5vjdv.exec:\5vjdv.exe92⤵PID:2332
-
\??\c:\9xlllxx.exec:\9xlllxx.exe93⤵PID:1872
-
\??\c:\rrfrrrx.exec:\rrfrrrx.exe94⤵PID:1452
-
\??\c:\9nhnnh.exec:\9nhnnh.exe95⤵PID:544
-
\??\c:\3httth.exec:\3httth.exe96⤵PID:1056
-
\??\c:\9hnntn.exec:\9hnntn.exe97⤵PID:2228
-
\??\c:\dpppp.exec:\dpppp.exe98⤵PID:2104
-
\??\c:\djvvv.exec:\djvvv.exe99⤵PID:2088
-
\??\c:\xrxrfxx.exec:\xrxrfxx.exe100⤵PID:2308
-
\??\c:\1rflrfx.exec:\1rflrfx.exe101⤵PID:2800
-
\??\c:\9llxfrl.exec:\9llxfrl.exe102⤵PID:2856
-
\??\c:\btttbt.exec:\btttbt.exe103⤵PID:2116
-
\??\c:\htbbbt.exec:\htbbbt.exe104⤵PID:600
-
\??\c:\1ppjj.exec:\1ppjj.exe105⤵PID:3024
-
\??\c:\pjppv.exec:\pjppv.exe106⤵PID:1516
-
\??\c:\frllfxf.exec:\frllfxf.exe107⤵PID:360
-
\??\c:\rffxxrx.exec:\rffxxrx.exe108⤵PID:2344
-
\??\c:\htntbn.exec:\htntbn.exe109⤵PID:920
-
\??\c:\vpdjj.exec:\vpdjj.exe110⤵PID:1824
-
\??\c:\pjvpp.exec:\pjvpp.exe111⤵PID:3060
-
\??\c:\fffxrxx.exec:\fffxrxx.exe112⤵PID:332
-
\??\c:\rlrrxxf.exec:\rlrrxxf.exe113⤵PID:1508
-
\??\c:\tnnbhh.exec:\tnnbhh.exe114⤵PID:2140
-
\??\c:\nbhntb.exec:\nbhntb.exe115⤵PID:2056
-
\??\c:\1vvpp.exec:\1vvpp.exe116⤵PID:2156
-
\??\c:\dpvpv.exec:\dpvpv.exe117⤵PID:2148
-
\??\c:\lxxflll.exec:\lxxflll.exe118⤵PID:2168
-
\??\c:\lfxxrrx.exec:\lfxxrrx.exe119⤵PID:2540
-
\??\c:\3fllflf.exec:\3fllflf.exe120⤵PID:2652
-
\??\c:\3ntbhn.exec:\3ntbhn.exe121⤵PID:2592
-
\??\c:\nhtbbt.exec:\nhtbbt.exe122⤵PID:2736
-
\??\c:\vjvpj.exec:\vjvpj.exe123⤵PID:2780
-
\??\c:\5xlxlrr.exec:\5xlxlrr.exe124⤵PID:2796
-
\??\c:\xlxflrx.exec:\xlxflrx.exe125⤵PID:2452
-
\??\c:\rlxlllx.exec:\rlxlllx.exe126⤵PID:2620
-
\??\c:\1htntt.exec:\1htntt.exe127⤵PID:2468
-
\??\c:\bnnntn.exec:\bnnntn.exe128⤵PID:2952
-
\??\c:\vjpvd.exec:\vjpvd.exe129⤵PID:2196
-
\??\c:\9pdvv.exec:\9pdvv.exe130⤵PID:1432
-
\??\c:\xlxxrrx.exec:\xlxxrrx.exe131⤵PID:2748
-
\??\c:\xfrlfxx.exec:\xfrlfxx.exe132⤵PID:2036
-
\??\c:\1bntnt.exec:\1bntnt.exe133⤵PID:844
-
\??\c:\ththbb.exec:\ththbb.exe134⤵PID:872
-
\??\c:\jvjpv.exec:\jvjpv.exe135⤵PID:1336
-
\??\c:\jvjpp.exec:\jvjpp.exe136⤵PID:2180
-
\??\c:\9rfffrf.exec:\9rfffrf.exe137⤵PID:1752
-
\??\c:\9rffrrx.exec:\9rffrrx.exe138⤵PID:1028
-
\??\c:\9htbhb.exec:\9htbhb.exe139⤵PID:1664
-
\??\c:\1nttth.exec:\1nttth.exe140⤵PID:2252
-
\??\c:\hthhbb.exec:\hthhbb.exe141⤵PID:1912
-
\??\c:\jdpjp.exec:\jdpjp.exe142⤵PID:2260
-
\??\c:\dvpvv.exec:\dvpvv.exe143⤵PID:588
-
\??\c:\xrrrxxx.exec:\xrrrxxx.exe144⤵PID:2256
-
\??\c:\tnnbht.exec:\tnnbht.exe145⤵PID:1500
-
\??\c:\bnbntn.exec:\bnbntn.exe146⤵PID:2912
-
\??\c:\pdddp.exec:\pdddp.exe147⤵PID:1116
-
\??\c:\1dppd.exec:\1dppd.exe148⤵PID:1096
-
\??\c:\fxxrxrl.exec:\fxxrxrl.exe149⤵PID:860
-
\??\c:\9flflll.exec:\9flflll.exe150⤵PID:912
-
\??\c:\nbbtbt.exec:\nbbtbt.exe151⤵PID:2004
-
\??\c:\3jvvd.exec:\3jvvd.exe152⤵PID:1036
-
\??\c:\3jvpp.exec:\3jvpp.exe153⤵PID:1540
-
\??\c:\frrlfxx.exec:\frrlfxx.exe154⤵PID:2348
-
\??\c:\xlfflfr.exec:\xlfflfr.exe155⤵PID:3068
-
\??\c:\tbhbbt.exec:\tbhbbt.exe156⤵PID:2936
-
\??\c:\5nbttt.exec:\5nbttt.exe157⤵PID:2056
-
\??\c:\dvjjd.exec:\dvjjd.exe158⤵PID:1616
-
\??\c:\vjpjj.exec:\vjpjj.exe159⤵PID:2364
-
\??\c:\dvvvd.exec:\dvvvd.exe160⤵PID:2588
-
\??\c:\xlfxxxx.exec:\xlfxxxx.exe161⤵PID:1708
-
\??\c:\9lxxxrl.exec:\9lxxxrl.exe162⤵PID:2600
-
\??\c:\bhhntn.exec:\bhhntn.exe163⤵PID:2712
-
\??\c:\3bttbt.exec:\3bttbt.exe164⤵PID:2580
-
\??\c:\3jpvp.exec:\3jpvp.exe165⤵PID:2264
-
\??\c:\pdjjd.exec:\pdjjd.exe166⤵PID:2212
-
\??\c:\1pddd.exec:\1pddd.exe167⤵PID:2520
-
\??\c:\rflffxx.exec:\rflffxx.exe168⤵PID:2568
-
\??\c:\3rxrrrl.exec:\3rxrrrl.exe169⤵PID:2908
-
\??\c:\nhnntt.exec:\nhnntt.exe170⤵PID:2628
-
\??\c:\thnntn.exec:\thnntn.exe171⤵PID:2500
-
\??\c:\vjjdd.exec:\vjjdd.exe172⤵PID:2792
-
\??\c:\jvjjv.exec:\jvjjv.exe173⤵PID:2888
-
\??\c:\5rlxrrf.exec:\5rlxrrf.exe174⤵PID:2412
-
\??\c:\flrrrxl.exec:\flrrrxl.exe175⤵PID:1296
-
\??\c:\btttnn.exec:\btttnn.exe176⤵PID:2328
-
\??\c:\tnhntt.exec:\tnhntt.exe177⤵PID:1940
-
\??\c:\jpdjj.exec:\jpdjj.exe178⤵PID:2220
-
\??\c:\jvppp.exec:\jvppp.exe179⤵PID:1648
-
\??\c:\5lfxllx.exec:\5lfxllx.exe180⤵PID:1668
-
\??\c:\tntttn.exec:\tntttn.exe181⤵PID:2092
-
\??\c:\bnttbn.exec:\bnttbn.exe182⤵PID:2132
-
\??\c:\dpvpp.exec:\dpvpp.exe183⤵PID:2848
-
\??\c:\jjvdp.exec:\jjvdp.exe184⤵PID:324
-
\??\c:\lxfllxf.exec:\lxfllxf.exe185⤵PID:556
-
\??\c:\rrxrrlr.exec:\rrxrrlr.exe186⤵PID:336
-
\??\c:\rfxrxrf.exec:\rfxrxrf.exe187⤵PID:992
-
\??\c:\bbthnt.exec:\bbthnt.exe188⤵PID:3016
-
\??\c:\vjppd.exec:\vjppd.exe189⤵PID:1796
-
\??\c:\jvvpj.exec:\jvvpj.exe190⤵PID:2192
-
\??\c:\3rfrxrx.exec:\3rfrxrx.exe191⤵PID:940
-
\??\c:\9xlfflr.exec:\9xlfflr.exe192⤵PID:1760
-
\??\c:\7xlrfxf.exec:\7xlrfxf.exe193⤵PID:1040
-
\??\c:\7bnttt.exec:\7bnttt.exe194⤵PID:816
-
\??\c:\9jvdd.exec:\9jvdd.exe195⤵PID:2076
-
\??\c:\jpvpp.exec:\jpvpp.exe196⤵PID:1284
-
\??\c:\xrflxfr.exec:\xrflxfr.exe197⤵PID:1512
-
\??\c:\lfxflrf.exec:\lfxflrf.exe198⤵PID:1580
-
\??\c:\3flflfr.exec:\3flflfr.exe199⤵PID:2056
-
\??\c:\btbhhh.exec:\btbhhh.exe200⤵PID:2968
-
\??\c:\bbtbtt.exec:\bbtbtt.exe201⤵PID:2576
-
\??\c:\ppddd.exec:\ppddd.exe202⤵PID:3004
-
\??\c:\1lffrlf.exec:\1lffrlf.exe203⤵PID:2840
-
\??\c:\xrfrxxx.exec:\xrfrxxx.exe204⤵PID:2668
-
\??\c:\1thntt.exec:\1thntt.exe205⤵PID:2716
-
\??\c:\tntbbh.exec:\tntbbh.exe206⤵PID:2996
-
\??\c:\jdppv.exec:\jdppv.exe207⤵PID:2448
-
\??\c:\vjvvj.exec:\vjvvj.exe208⤵PID:2508
-
\??\c:\rfllrrr.exec:\rfllrrr.exe209⤵PID:2152
-
\??\c:\lffflll.exec:\lffflll.exe210⤵PID:1972
-
\??\c:\1vjjd.exec:\1vjjd.exe211⤵PID:2680
-
\??\c:\vpdjp.exec:\vpdjp.exe212⤵PID:2696
-
\??\c:\lfxlxfr.exec:\lfxlxfr.exe213⤵PID:2700
-
\??\c:\llllrlr.exec:\llllrlr.exe214⤵PID:2360
-
\??\c:\bnntbn.exec:\bnntbn.exe215⤵PID:1736
-
\??\c:\thnntt.exec:\thnntt.exe216⤵PID:1964
-
\??\c:\jjvdj.exec:\jjvdj.exe217⤵PID:1976
-
\??\c:\dvdvv.exec:\dvdvv.exe218⤵PID:276
-
\??\c:\5frlxrx.exec:\5frlxrx.exe219⤵PID:2176
-
\??\c:\3frlrlx.exec:\3frlrlx.exe220⤵PID:2424
-
\??\c:\tnnhnn.exec:\tnnhnn.exe221⤵PID:2228
-
\??\c:\jdpvv.exec:\jdpvv.exe222⤵PID:1820
-
\??\c:\dvddd.exec:\dvddd.exe223⤵PID:2252
-
\??\c:\dvddp.exec:\dvddp.exe224⤵PID:2860
-
\??\c:\fxfffxf.exec:\fxfffxf.exe225⤵PID:2800
-
\??\c:\lfffxrf.exec:\lfffxrf.exe226⤵PID:2080
-
\??\c:\7bhhnn.exec:\7bhhnn.exe227⤵PID:2116
-
\??\c:\nhnnbt.exec:\nhnnbt.exe228⤵PID:604
-
\??\c:\pjdjj.exec:\pjdjj.exe229⤵PID:3024
-
\??\c:\7vppv.exec:\7vppv.exe230⤵PID:1856
-
\??\c:\ffrlrlf.exec:\ffrlrlf.exe231⤵PID:1484
-
\??\c:\rfxxllx.exec:\rfxxllx.exe232⤵PID:3032
-
\??\c:\hnhnbt.exec:\hnhnbt.exe233⤵PID:912
-
\??\c:\nbhntt.exec:\nbhntt.exe234⤵PID:1316
-
\??\c:\pdpdp.exec:\pdpdp.exe235⤵PID:1036
-
\??\c:\ppjjp.exec:\ppjjp.exe236⤵PID:1808
-
\??\c:\rlrflfr.exec:\rlrflfr.exe237⤵PID:884
-
\??\c:\lxlflfl.exec:\lxlflfl.exe238⤵PID:2304
-
\??\c:\bnbntb.exec:\bnbntb.exe239⤵PID:2528
-
\??\c:\hnttnt.exec:\hnttnt.exe240⤵PID:2980
-
\??\c:\pvjdj.exec:\pvjdj.exe241⤵PID:2768
-