Overview
overview
10Static
static
10VirusSign....f3.exe
windows7-x64
10VirusSign....f3.exe
windows10-2004-x64
10VirusSign....ff.exe
windows7-x64
7VirusSign....ff.exe
windows10-2004-x64
7VirusSign....2d.exe
windows7-x64
1VirusSign....2d.exe
windows10-2004-x64
1VirusSign....31.exe
windows7-x64
VirusSign....31.exe
windows10-2004-x64
VirusSign....67.exe
windows7-x64
1VirusSign....67.exe
windows10-2004-x64
10VirusSign....f9.exe
windows7-x64
10VirusSign....f9.exe
windows10-2004-x64
10VirusSign....76.exe
windows7-x64
10VirusSign....76.exe
windows10-2004-x64
10VirusSign....45.exe
windows7-x64
1VirusSign....45.exe
windows10-2004-x64
1VirusSign....3a.exe
windows7-x64
10VirusSign....3a.exe
windows10-2004-x64
10VirusSign....2b.exe
windows7-x64
7VirusSign....2b.exe
windows10-2004-x64
7VirusSign....74.exe
windows7-x64
1VirusSign....74.exe
windows10-2004-x64
1VirusSign....9e.exe
windows7-x64
7VirusSign....9e.exe
windows10-2004-x64
7VirusSign....22.exe
windows7-x64
7VirusSign....22.exe
windows10-2004-x64
7VirusSign....ef.exe
windows7-x64
7VirusSign....ef.exe
windows10-2004-x64
7VirusSign....f3.exe
windows7-x64
3VirusSign....f3.exe
windows10-2004-x64
3VirusSign....d8.exe
windows7-x64
1VirusSign....d8.exe
windows10-2004-x64
7Analysis
-
max time kernel
150s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
VirusSign.2024.02.08/036062de97522e2c40b04d1c1c0d5bf3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
VirusSign.2024.02.08/036062de97522e2c40b04d1c1c0d5bf3.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral3
Sample
VirusSign.2024.02.08/0366d8bc8e9bd5e64e301190356e79ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
VirusSign.2024.02.08/0366d8bc8e9bd5e64e301190356e79ff.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral5
Sample
VirusSign.2024.02.08/0372bdc19184e4dd7461170dfb052a2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
VirusSign.2024.02.08/0372bdc19184e4dd7461170dfb052a2d.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
VirusSign.2024.02.08/038db7a1bc9f32408eb32a8b02b5cf31.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
VirusSign.2024.02.08/038db7a1bc9f32408eb32a8b02b5cf31.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
VirusSign.2024.02.08/0399febb08bcbf43227bad19576af767.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
VirusSign.2024.02.08/0399febb08bcbf43227bad19576af767.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral11
Sample
VirusSign.2024.02.08/03a3a464ef2a1fbe54b35a8effbf54f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
VirusSign.2024.02.08/03a3a464ef2a1fbe54b35a8effbf54f9.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
VirusSign.2024.02.08/03a4ed0cb8c9721fc1369cc5f381fd76.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
VirusSign.2024.02.08/03a4ed0cb8c9721fc1369cc5f381fd76.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
VirusSign.2024.02.08/03af51abe00f3c6154bc829f07f83945.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
VirusSign.2024.02.08/03af51abe00f3c6154bc829f07f83945.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
VirusSign.2024.02.08/03b6a8e2d209f10cce366b73bec0283a.exe
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
VirusSign.2024.02.08/03b6a8e2d209f10cce366b73bec0283a.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
VirusSign.2024.02.08/03ba9978296204d2048fb184e546932b.exe
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
VirusSign.2024.02.08/03ba9978296204d2048fb184e546932b.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
VirusSign.2024.02.08/03e3a2fc4bf137d68962d35b23186a74.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
VirusSign.2024.02.08/03e3a2fc4bf137d68962d35b23186a74.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
VirusSign.2024.02.08/03e8dd811ff56c2ef65a494a29601f9e.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
VirusSign.2024.02.08/03e8dd811ff56c2ef65a494a29601f9e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
VirusSign.2024.02.08/03eec9b444ff21a20e84fa8592478c22.exe
Resource
win7-20231215-en
Behavioral task
behavioral26
Sample
VirusSign.2024.02.08/03eec9b444ff21a20e84fa8592478c22.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral27
Sample
VirusSign.2024.02.08/04048340f3e175baa6bd71fcc12851ef.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
VirusSign.2024.02.08/04048340f3e175baa6bd71fcc12851ef.exe
Resource
win10v2004-20240220-en
Behavioral task
behavioral29
Sample
VirusSign.2024.02.08/0409c5c4922e4b79e2017df62f632cf3.exe
Resource
win7-20240220-en
Behavioral task
behavioral30
Sample
VirusSign.2024.02.08/0409c5c4922e4b79e2017df62f632cf3.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
VirusSign.2024.02.08/040dcef90aa17a406b8de190fd3330d8.exe
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
VirusSign.2024.02.08/040dcef90aa17a406b8de190fd3330d8.exe
Resource
win10v2004-20231215-en
General
-
Target
VirusSign.2024.02.08/03b6a8e2d209f10cce366b73bec0283a.exe
-
Size
392KB
-
MD5
03b6a8e2d209f10cce366b73bec0283a
-
SHA1
72641bc2f5627cf9ff3aac9a451f1a3883469a4d
-
SHA256
583c10d1bb3b7be55f6147164340e8f7604613051bdd242385c7b1c186560f52
-
SHA512
9ad94d9a4125081ca5eb3b54d4664989189459d6c873ef85858568082334e3a5b91027cc4c2cb61cea48cdad073020e6221cdb54e4324e48d302fede08bf2a3f
-
SSDEEP
6144:Acm7ImGddX5WrXF5lpKGYV0aTk/BO0XJm4UEPOshN/xdKnvP48bmmv:m7TcJWjdpKGATTk/jYIOWN/KnnPD
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
resource yara_rule behavioral18/memory/2104-5-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4572-15-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4612-8-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2100-21-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2428-25-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3996-32-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3336-37-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4408-42-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/232-47-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4344-74-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2336-80-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2152-59-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2548-63-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3816-85-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2056-96-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2316-101-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/5076-109-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4892-113-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4980-119-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3028-126-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/1548-135-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/372-132-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3368-141-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/1792-149-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/1420-156-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4600-164-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3720-169-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2972-175-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/640-182-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2976-186-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/1780-189-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2904-199-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4988-202-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3340-209-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3284-212-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2588-219-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/1800-229-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2352-235-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/1948-242-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4812-250-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/952-256-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/112-257-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4668-273-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/1752-289-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/1608-299-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4360-310-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4420-332-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2228-354-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4556-358-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2464-368-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4992-375-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/1180-398-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2288-433-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4544-481-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4720-486-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3948-504-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/5068-515-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3364-525-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/1616-669-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/2036-725-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/4000-734-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/1180-747-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3980-929-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon behavioral18/memory/3980-959-0x0000000000400000-0x000000000042A000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
pid Process 4612 bnnbth.exe 4572 vddpd.exe 2100 lxrlxlf.exe 2428 9jjvj.exe 3996 lxlxrfr.exe 3336 ntbnhh.exe 4408 bttbnt.exe 232 pdpjj.exe 4664 ddjjj.exe 2152 ttnbbt.exe 2548 jjvjj.exe 4120 lrlfrlx.exe 4344 dpjvj.exe 2336 3ddvj.exe 3816 hhnhbt.exe 1448 3dvvp.exe 2056 1tthbb.exe 2316 hbhnhb.exe 5076 9hbnhb.exe 4892 1jjdp.exe 4980 tbbthh.exe 3028 5vvpj.exe 372 3hbhbt.exe 1548 vpjdv.exe 3368 xxrfrlx.exe 1792 5bhhbb.exe 1420 3hbhtn.exe 2212 jppjj.exe 4600 lxrllfx.exe 3720 nbbthh.exe 2972 flfxrlf.exe 640 1ddvj.exe 2976 rllxrlf.exe 1780 jvvdv.exe 396 bthbhh.exe 2512 3pjdp.exe 2904 xxxlxrl.exe 4988 nbnhth.exe 2004 jvppj.exe 3340 flfrflx.exe 3284 7tthbt.exe 532 9vvjj.exe 2588 frrlxrx.exe 3052 tbtthb.exe 3548 xrlfrrf.exe 1800 fxxrlxr.exe 4108 htbhtt.exe 2352 3fxrllf.exe 2068 bttnhh.exe 3428 dvjvv.exe 1948 jpdpv.exe 3320 nnnhnh.exe 4812 pddvp.exe 952 jvjdj.exe 112 nttntt.exe 2576 nthhnn.exe 3392 vdvjv.exe 1396 9lfrfrx.exe 4668 7bhbth.exe 4548 nnbhnn.exe 100 rllfxxx.exe 816 rrlflxr.exe 688 ttnhbb.exe 4940 9pvpp.exe -
resource yara_rule behavioral18/memory/2104-5-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4572-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4572-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4612-8-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2100-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2428-25-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/3996-32-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/3336-37-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4408-42-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/232-47-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4344-74-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2336-80-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2152-59-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2548-63-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/3816-85-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2056-96-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2316-101-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/5076-109-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4892-113-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4980-119-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/3028-126-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/1548-135-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/372-132-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/3368-141-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/1792-149-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/1420-151-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/1420-156-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4600-164-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/3720-169-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2972-175-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/640-182-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2976-186-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/1780-189-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2904-199-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4988-202-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/3340-209-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/3284-212-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2588-219-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/1800-229-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2352-235-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/1948-242-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4812-250-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/952-256-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/112-257-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4668-273-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/1752-289-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/3736-293-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/1608-299-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4360-310-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4420-332-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2228-354-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4556-358-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2464-368-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4992-375-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/1180-394-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/1180-398-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2288-433-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4544-481-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4720-486-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/3948-504-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/5068-515-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/3364-525-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/4804-528-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral18/memory/2680-650-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 4612 2104 03b6a8e2d209f10cce366b73bec0283a.exe 84 PID 2104 wrote to memory of 4612 2104 03b6a8e2d209f10cce366b73bec0283a.exe 84 PID 2104 wrote to memory of 4612 2104 03b6a8e2d209f10cce366b73bec0283a.exe 84 PID 4612 wrote to memory of 4572 4612 bnnbth.exe 85 PID 4612 wrote to memory of 4572 4612 bnnbth.exe 85 PID 4612 wrote to memory of 4572 4612 bnnbth.exe 85 PID 4572 wrote to memory of 2100 4572 vddpd.exe 86 PID 4572 wrote to memory of 2100 4572 vddpd.exe 86 PID 4572 wrote to memory of 2100 4572 vddpd.exe 86 PID 2100 wrote to memory of 2428 2100 lxrlxlf.exe 87 PID 2100 wrote to memory of 2428 2100 lxrlxlf.exe 87 PID 2100 wrote to memory of 2428 2100 lxrlxlf.exe 87 PID 2428 wrote to memory of 3996 2428 9jjvj.exe 88 PID 2428 wrote to memory of 3996 2428 9jjvj.exe 88 PID 2428 wrote to memory of 3996 2428 9jjvj.exe 88 PID 3996 wrote to memory of 3336 3996 lxlxrfr.exe 89 PID 3996 wrote to memory of 3336 3996 lxlxrfr.exe 89 PID 3996 wrote to memory of 3336 3996 lxlxrfr.exe 89 PID 3336 wrote to memory of 4408 3336 ntbnhh.exe 90 PID 3336 wrote to memory of 4408 3336 ntbnhh.exe 90 PID 3336 wrote to memory of 4408 3336 ntbnhh.exe 90 PID 4408 wrote to memory of 232 4408 bttbnt.exe 93 PID 4408 wrote to memory of 232 4408 bttbnt.exe 93 PID 4408 wrote to memory of 232 4408 bttbnt.exe 93 PID 232 wrote to memory of 4664 232 pdpjj.exe 92 PID 232 wrote to memory of 4664 232 pdpjj.exe 92 PID 232 wrote to memory of 4664 232 pdpjj.exe 92 PID 4664 wrote to memory of 2152 4664 ddjjj.exe 91 PID 4664 wrote to memory of 2152 4664 ddjjj.exe 91 PID 4664 wrote to memory of 2152 4664 ddjjj.exe 91 PID 2152 wrote to memory of 2548 2152 ttnbbt.exe 94 PID 2152 wrote to memory of 2548 2152 ttnbbt.exe 94 PID 2152 wrote to memory of 2548 2152 ttnbbt.exe 94 PID 2548 wrote to memory of 4120 2548 jjvjj.exe 95 PID 2548 wrote to memory of 4120 2548 jjvjj.exe 95 PID 2548 wrote to memory of 4120 2548 jjvjj.exe 95 PID 4120 wrote to memory of 4344 4120 lrlfrlx.exe 96 PID 4120 wrote to memory of 4344 4120 lrlfrlx.exe 96 PID 4120 wrote to memory of 4344 4120 lrlfrlx.exe 96 PID 4344 wrote to memory of 2336 4344 dpjvj.exe 99 PID 4344 wrote to memory of 2336 4344 dpjvj.exe 99 PID 4344 wrote to memory of 2336 4344 dpjvj.exe 99 PID 2336 wrote to memory of 3816 2336 3ddvj.exe 98 PID 2336 wrote to memory of 3816 2336 3ddvj.exe 98 PID 2336 wrote to memory of 3816 2336 3ddvj.exe 98 PID 3816 wrote to memory of 1448 3816 hhnhbt.exe 97 PID 3816 wrote to memory of 1448 3816 hhnhbt.exe 97 PID 3816 wrote to memory of 1448 3816 hhnhbt.exe 97 PID 1448 wrote to memory of 2056 1448 3dvvp.exe 100 PID 1448 wrote to memory of 2056 1448 3dvvp.exe 100 PID 1448 wrote to memory of 2056 1448 3dvvp.exe 100 PID 2056 wrote to memory of 2316 2056 1tthbb.exe 101 PID 2056 wrote to memory of 2316 2056 1tthbb.exe 101 PID 2056 wrote to memory of 2316 2056 1tthbb.exe 101 PID 2316 wrote to memory of 5076 2316 hbhnhb.exe 102 PID 2316 wrote to memory of 5076 2316 hbhnhb.exe 102 PID 2316 wrote to memory of 5076 2316 hbhnhb.exe 102 PID 5076 wrote to memory of 4892 5076 9hbnhb.exe 103 PID 5076 wrote to memory of 4892 5076 9hbnhb.exe 103 PID 5076 wrote to memory of 4892 5076 9hbnhb.exe 103 PID 4892 wrote to memory of 4980 4892 1jjdp.exe 104 PID 4892 wrote to memory of 4980 4892 1jjdp.exe 104 PID 4892 wrote to memory of 4980 4892 1jjdp.exe 104 PID 4980 wrote to memory of 3028 4980 tbbthh.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\VirusSign.2024.02.08\03b6a8e2d209f10cce366b73bec0283a.exe"C:\Users\Admin\AppData\Local\Temp\VirusSign.2024.02.08\03b6a8e2d209f10cce366b73bec0283a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
\??\c:\bnnbth.exec:\bnnbth.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
\??\c:\vddpd.exec:\vddpd.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
\??\c:\lxrlxlf.exec:\lxrlxlf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
\??\c:\9jjvj.exec:\9jjvj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\lxlxrfr.exec:\lxlxrfr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3996 -
\??\c:\ntbnhh.exec:\ntbnhh.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
\??\c:\bttbnt.exec:\bttbnt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4408 -
\??\c:\pdpjj.exec:\pdpjj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232
-
-
-
-
-
-
-
-
-
\??\c:\ttnbbt.exec:\ttnbbt.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2152 -
\??\c:\jjvjj.exec:\jjvjj.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\lrlfrlx.exec:\lrlfrlx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
\??\c:\dpjvj.exec:\dpjvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
\??\c:\3ddvj.exec:\3ddvj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336
-
-
-
-
-
\??\c:\ddjjj.exec:\ddjjj.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4664
-
\??\c:\3dvvp.exec:\3dvvp.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
\??\c:\1tthbb.exec:\1tthbb.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2056 -
\??\c:\hbhnhb.exec:\hbhnhb.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
\??\c:\9hbnhb.exec:\9hbnhb.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
\??\c:\1jjdp.exec:\1jjdp.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
\??\c:\tbbthh.exec:\tbbthh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4980 -
\??\c:\5vvpj.exec:\5vvpj.exe7⤵
- Executes dropped EXE
PID:3028
-
-
-
-
-
-
-
\??\c:\hhnhbt.exec:\hhnhbt.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3816
-
\??\c:\3hbhbt.exec:\3hbhbt.exe1⤵
- Executes dropped EXE
PID:372 -
\??\c:\vpjdv.exec:\vpjdv.exe2⤵
- Executes dropped EXE
PID:1548 -
\??\c:\xxrfrlx.exec:\xxrfrlx.exe3⤵
- Executes dropped EXE
PID:3368 -
\??\c:\5bhhbb.exec:\5bhhbb.exe4⤵
- Executes dropped EXE
PID:1792 -
\??\c:\3hbhtn.exec:\3hbhtn.exe5⤵
- Executes dropped EXE
PID:1420 -
\??\c:\jppjj.exec:\jppjj.exe6⤵
- Executes dropped EXE
PID:2212 -
\??\c:\lxrllfx.exec:\lxrllfx.exe7⤵
- Executes dropped EXE
PID:4600 -
\??\c:\nbbthh.exec:\nbbthh.exe8⤵
- Executes dropped EXE
PID:3720 -
\??\c:\flfxrlf.exec:\flfxrlf.exe9⤵
- Executes dropped EXE
PID:2972 -
\??\c:\1ddvj.exec:\1ddvj.exe10⤵
- Executes dropped EXE
PID:640 -
\??\c:\rllxrlf.exec:\rllxrlf.exe11⤵
- Executes dropped EXE
PID:2976 -
\??\c:\jvvdv.exec:\jvvdv.exe12⤵
- Executes dropped EXE
PID:1780 -
\??\c:\bthbhh.exec:\bthbhh.exe13⤵
- Executes dropped EXE
PID:396 -
\??\c:\3pjdp.exec:\3pjdp.exe14⤵
- Executes dropped EXE
PID:2512 -
\??\c:\xxxlxrl.exec:\xxxlxrl.exe15⤵
- Executes dropped EXE
PID:2904 -
\??\c:\nbnhth.exec:\nbnhth.exe16⤵
- Executes dropped EXE
PID:4988 -
\??\c:\jvppj.exec:\jvppj.exe17⤵
- Executes dropped EXE
PID:2004 -
\??\c:\flfrflx.exec:\flfrflx.exe18⤵
- Executes dropped EXE
PID:3340 -
\??\c:\7tthbt.exec:\7tthbt.exe19⤵
- Executes dropped EXE
PID:3284 -
\??\c:\9vvjj.exec:\9vvjj.exe20⤵
- Executes dropped EXE
PID:532 -
\??\c:\frrlxrx.exec:\frrlxrx.exe21⤵
- Executes dropped EXE
PID:2588
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\tbtthb.exec:\tbtthb.exe1⤵
- Executes dropped EXE
PID:3052 -
\??\c:\xrlfrrf.exec:\xrlfrrf.exe2⤵
- Executes dropped EXE
PID:3548 -
\??\c:\fxxrlxr.exec:\fxxrlxr.exe3⤵
- Executes dropped EXE
PID:1800 -
\??\c:\htbhtt.exec:\htbhtt.exe4⤵
- Executes dropped EXE
PID:4108 -
\??\c:\3fxrllf.exec:\3fxrllf.exe5⤵
- Executes dropped EXE
PID:2352 -
\??\c:\bttnhh.exec:\bttnhh.exe6⤵
- Executes dropped EXE
PID:2068 -
\??\c:\dvjvv.exec:\dvjvv.exe7⤵
- Executes dropped EXE
PID:3428 -
\??\c:\jpdpv.exec:\jpdpv.exe8⤵
- Executes dropped EXE
PID:1948 -
\??\c:\ffxxrll.exec:\ffxxrll.exe9⤵PID:4540
-
\??\c:\nnnhnh.exec:\nnnhnh.exe10⤵
- Executes dropped EXE
PID:3320 -
\??\c:\pddvp.exec:\pddvp.exe11⤵
- Executes dropped EXE
PID:4812 -
\??\c:\jvjdj.exec:\jvjdj.exe12⤵
- Executes dropped EXE
PID:952 -
\??\c:\nttntt.exec:\nttntt.exe13⤵
- Executes dropped EXE
PID:112 -
\??\c:\nthhnn.exec:\nthhnn.exe14⤵
- Executes dropped EXE
PID:2576 -
\??\c:\vdvjv.exec:\vdvjv.exe15⤵
- Executes dropped EXE
PID:3392 -
\??\c:\9lfrfrx.exec:\9lfrfrx.exe16⤵
- Executes dropped EXE
PID:1396 -
\??\c:\7bhbth.exec:\7bhbth.exe17⤵
- Executes dropped EXE
PID:4668 -
\??\c:\nnbhnn.exec:\nnbhnn.exe18⤵
- Executes dropped EXE
PID:4548 -
\??\c:\rllfxxx.exec:\rllfxxx.exe19⤵
- Executes dropped EXE
PID:100 -
\??\c:\rrlflxr.exec:\rrlflxr.exe20⤵
- Executes dropped EXE
PID:816 -
\??\c:\ttnhbb.exec:\ttnhbb.exe21⤵
- Executes dropped EXE
PID:688 -
\??\c:\9pvpp.exec:\9pvpp.exe22⤵
- Executes dropped EXE
PID:4940 -
\??\c:\jdvpd.exec:\jdvpd.exe23⤵PID:1752
-
\??\c:\rffxlrl.exec:\rffxlrl.exe24⤵PID:3736
-
\??\c:\nhhbhn.exec:\nhhbhn.exe25⤵PID:1608
-
\??\c:\vpjvp.exec:\vpjvp.exe26⤵PID:4344
-
\??\c:\rlxrfxr.exec:\rlxrfxr.exe27⤵PID:4652
-
\??\c:\xllxrlx.exec:\xllxrlx.exe28⤵PID:4360
-
\??\c:\tnnnbb.exec:\tnnnbb.exe29⤵PID:2056
-
\??\c:\3rxrrfx.exec:\3rxrrfx.exe30⤵PID:1912
-
\??\c:\bnnbbh.exec:\bnnbbh.exe31⤵PID:1448
-
\??\c:\hththh.exec:\hththh.exe32⤵PID:1508
-
\??\c:\dddvv.exec:\dddvv.exe33⤵PID:4716
-
\??\c:\1vvpd.exec:\1vvpd.exe34⤵PID:4552
-
\??\c:\ttbthh.exec:\ttbthh.exe35⤵PID:4420
-
\??\c:\3hhbnn.exec:\3hhbnn.exe36⤵PID:2400
-
\??\c:\xxrfxrl.exec:\xxrfxrl.exe37⤵PID:4592
-
\??\c:\7ththb.exec:\7ththb.exe38⤵PID:1200
-
\??\c:\5vvvj.exec:\5vvvj.exe39⤵PID:4432
-
\??\c:\lxlfxrl.exec:\lxlfxrl.exe40⤵PID:1556
-
\??\c:\hhhhbh.exec:\hhhhbh.exe41⤵PID:1548
-
\??\c:\frxxffl.exec:\frxxffl.exe42⤵PID:2228
-
\??\c:\1flfxrl.exec:\1flfxrl.exe43⤵PID:4556
-
\??\c:\pjdvp.exec:\pjdvp.exe44⤵PID:4352
-
\??\c:\rfxrlrl.exec:\rfxrlrl.exe45⤵PID:3272
-
\??\c:\hhhbtt.exec:\hhhbtt.exe46⤵PID:2464
-
\??\c:\dvdvd.exec:\dvdvd.exe47⤵PID:4992
-
\??\c:\rrlffxx.exec:\rrlffxx.exe48⤵PID:1376
-
\??\c:\nbhbbb.exec:\nbhbbb.exe49⤵PID:1604
-
\??\c:\fxfxllf.exec:\fxfxllf.exe50⤵PID:2832
-
\??\c:\httnnh.exec:\httnnh.exe51⤵PID:3156
-
\??\c:\9jjdv.exec:\9jjdv.exe52⤵PID:4636
-
\??\c:\1xrlffx.exec:\1xrlffx.exe53⤵PID:1704
-
\??\c:\hhtbth.exec:\hhtbth.exe54⤵PID:2828
-
\??\c:\ntbthh.exec:\ntbthh.exe55⤵PID:1180
-
\??\c:\jpjdv.exec:\jpjdv.exe56⤵PID:1380
-
\??\c:\frxfxxr.exec:\frxfxxr.exe57⤵PID:2560
-
\??\c:\nbhbnn.exec:\nbhbnn.exe58⤵PID:5008
-
\??\c:\dvdpd.exec:\dvdpd.exe59⤵PID:4984
-
\??\c:\xrxrllx.exec:\xrxrllx.exe60⤵PID:2592
-
\??\c:\1flfxff.exec:\1flfxff.exe61⤵PID:3052
-
\??\c:\3btnhh.exec:\3btnhh.exe62⤵PID:1868
-
\??\c:\vpvdd.exec:\vpvdd.exe63⤵PID:2308
-
\??\c:\xlrfxrx.exec:\xlrfxrx.exe64⤵PID:1192
-
\??\c:\9lrxrxr.exec:\9lrxrxr.exe65⤵PID:4632
-
\??\c:\bbhbtn.exec:\bbhbtn.exe66⤵PID:220
-
\??\c:\ddjdv.exec:\ddjdv.exe67⤵PID:2288
-
\??\c:\xxfrfxx.exec:\xxfrfxx.exe68⤵PID:4452
-
\??\c:\9xlxrll.exec:\9xlxrll.exe69⤵PID:1252
-
\??\c:\bttnhb.exec:\bttnhb.exe70⤵PID:1320
-
\??\c:\jjpjj.exec:\jjpjj.exe71⤵PID:4348
-
\??\c:\9ffxxxl.exec:\9ffxxxl.exe72⤵PID:3224
-
\??\c:\hnttnh.exec:\hnttnh.exe73⤵PID:1308
-
\??\c:\1flxlxl.exec:\1flxlxl.exe74⤵PID:3356
-
\??\c:\bbbhhh.exec:\bbbhhh.exe75⤵PID:3316
-
\??\c:\pdvjv.exec:\pdvjv.exe76⤵PID:100
-
\??\c:\xlxrrlr.exec:\xlxrrlr.exe77⤵PID:4268
-
\??\c:\rlxrlfl.exec:\rlxrlfl.exe78⤵PID:3884
-
\??\c:\bttntt.exec:\bttntt.exe79⤵PID:2548
-
\??\c:\hhbthb.exec:\hhbthb.exe80⤵PID:2544
-
\??\c:\vvvpd.exec:\vvvpd.exe81⤵PID:3244
-
\??\c:\rflrfrf.exec:\rflrfrf.exe82⤵PID:4544
-
\??\c:\rlrxfll.exec:\rlrxfll.exe83⤵PID:2748
-
\??\c:\pjppj.exec:\pjppj.exe84⤵PID:4720
-
\??\c:\rfxrfrl.exec:\rfxrfrl.exe85⤵PID:3136
-
\??\c:\7rrfxfr.exec:\7rrfxfr.exe86⤵PID:712
-
\??\c:\hhbbtn.exec:\hhbbtn.exe87⤵PID:3168
-
\??\c:\nbbnht.exec:\nbbnht.exe88⤵PID:1912
-
\??\c:\1ddpd.exec:\1ddpd.exe89⤵PID:3948
-
\??\c:\xxxlfxl.exec:\xxxlfxl.exe90⤵PID:3864
-
\??\c:\btnhbt.exec:\btnhbt.exe91⤵PID:4604
-
\??\c:\9tbtnn.exec:\9tbtnn.exe92⤵PID:4892
-
\??\c:\pdpdj.exec:\pdpdj.exe93⤵PID:5068
-
\??\c:\xxlxlfr.exec:\xxlxlfr.exe94⤵PID:3028
-
\??\c:\htbthb.exec:\htbthb.exe95⤵PID:3660
-
\??\c:\9bnnbb.exec:\9bnnbb.exe96⤵PID:3364
-
\??\c:\jvjdd.exec:\jvjdd.exe97⤵PID:4804
-
\??\c:\1ttnnn.exec:\1ttnnn.exe98⤵PID:1548
-
\??\c:\vpjvp.exec:\vpjvp.exe99⤵PID:1932
-
\??\c:\7ppjd.exec:\7ppjd.exe100⤵PID:4064
-
\??\c:\rfxrllx.exec:\rfxrllx.exe101⤵PID:376
-
\??\c:\nthnhh.exec:\nthnhh.exe102⤵PID:4352
-
\??\c:\3tnbtn.exec:\3tnbtn.exe103⤵PID:2464
-
\??\c:\1dddd.exec:\1dddd.exe104⤵PID:2212
-
\??\c:\dpvvv.exec:\dpvvv.exe105⤵PID:3160
-
\??\c:\rlllxxr.exec:\rlllxxr.exe106⤵PID:4060
-
\??\c:\nhhhbn.exec:\nhhhbn.exe107⤵PID:4288
-
\??\c:\3nnhhn.exec:\3nnhhn.exe108⤵PID:2040
-
\??\c:\pjdpj.exec:\pjdpj.exe109⤵PID:2512
-
\??\c:\7frffxl.exec:\7frffxl.exe110⤵PID:4084
-
\??\c:\rlrrrlr.exec:\rlrrrlr.exe111⤵PID:2828
-
\??\c:\3tnbhb.exec:\3tnbhb.exe112⤵PID:2004
-
\??\c:\3jjpj.exec:\3jjpj.exe113⤵PID:4068
-
\??\c:\pppjd.exec:\pppjd.exe114⤵PID:2500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
\??\c:\1jvdv.exec:\1jvdv.exe70⤵PID:2100
-
\??\c:\rflxrrf.exec:\rflxrrf.exe71⤵PID:112
-
\??\c:\lfxlllf.exec:\lfxlllf.exe72⤵PID:2300
-
\??\c:\ttnhbt.exec:\ttnhbt.exe73⤵PID:3224
-
\??\c:\jvdvp.exec:\jvdvp.exe74⤵PID:1288
-
\??\c:\flffrrf.exec:\flffrrf.exe75⤵PID:3248
-
\??\c:\nbnhhn.exec:\nbnhhn.exe76⤵PID:3336
-
\??\c:\pddpj.exec:\pddpj.exe77⤵PID:816
-
\??\c:\fflxrfx.exec:\fflxrfx.exe78⤵PID:4268
-
\??\c:\hbtthb.exec:\hbtthb.exe79⤵PID:2220
-
\??\c:\nbtnbn.exec:\nbtnbn.exe80⤵PID:1752
-
\??\c:\dvdvv.exec:\dvdvv.exe81⤵PID:2176
-
\??\c:\rlrlrlr.exec:\rlrlrlr.exe82⤵PID:4476
-
\??\c:\7bhttn.exec:\7bhttn.exe83⤵PID:3936
-
\??\c:\vdpdj.exec:\vdpdj.exe84⤵PID:4036
-
\??\c:\5pdvp.exec:\5pdvp.exe85⤵PID:4904
-
\??\c:\1xlxlxl.exec:\1xlxlxl.exe86⤵PID:2964
-
\??\c:\3tnbtn.exec:\3tnbtn.exe87⤵PID:1588
-
\??\c:\hhnnhb.exec:\hhnnhb.exe88⤵PID:1200
-
\??\c:\vpvvp.exec:\vpvvp.exe89⤵PID:1596
-
\??\c:\lxfrfxl.exec:\lxfrfxl.exe90⤵PID:1748
-
\??\c:\lxrffxf.exec:\lxrffxf.exe91⤵PID:1088
-
\??\c:\bnnhtb.exec:\bnnhtb.exe92⤵PID:2280
-
\??\c:\jpdpd.exec:\jpdpd.exe93⤵PID:1864
-
\??\c:\dpdpp.exec:\dpdpp.exe94⤵PID:2948
-
\??\c:\fffxrrr.exec:\fffxrrr.exe95⤵PID:3720
-
\??\c:\htnhtn.exec:\htnhtn.exe96⤵PID:3180
-
\??\c:\jppvp.exec:\jppvp.exe97⤵PID:1376
-
\??\c:\pdjdp.exec:\pdjdp.exe98⤵PID:3184
-
\??\c:\lfxlfxr.exec:\lfxlfxr.exe99⤵PID:792
-
\??\c:\hnnhtn.exec:\hnnhtn.exe100⤵PID:3988
-
\??\c:\5frlfxr.exec:\5frlfxr.exe101⤵PID:2312
-
\??\c:\rxxxlxl.exec:\rxxxlxl.exe102⤵PID:780
-
\??\c:\bhnbth.exec:\bhnbth.exe103⤵PID:4636
-
\??\c:\ppjdd.exec:\ppjdd.exe104⤵PID:1500
-
\??\c:\lfxrllf.exec:\lfxrllf.exe105⤵PID:2792
-
\??\c:\rrfxrrx.exec:\rrfxrrx.exe106⤵PID:3728
-
\??\c:\nhttnh.exec:\nhttnh.exe107⤵PID:3324
-
\??\c:\5dpdp.exec:\5dpdp.exe108⤵PID:1380
-
\??\c:\fxxxxrx.exec:\fxxxxrx.exe109⤵PID:4048
-
\??\c:\3hbtnh.exec:\3hbtnh.exe110⤵PID:1968
-
\??\c:\hhtnbb.exec:\hhtnbb.exe111⤵PID:3260
-
\??\c:\dvvvd.exec:\dvvvd.exe112⤵PID:4444
-
\??\c:\llxxrlr.exec:\llxxrlr.exe113⤵PID:3524
-
\??\c:\bhtnht.exec:\bhtnht.exe114⤵PID:1972
-
\??\c:\9djdv.exec:\9djdv.exe115⤵PID:1868
-
\??\c:\dddpd.exec:\dddpd.exe116⤵PID:3376
-
\??\c:\5xxlxrf.exec:\5xxlxrf.exe117⤵PID:4612
-
\??\c:\ttbnbb.exec:\ttbnbb.exe118⤵PID:4632
-
\??\c:\httnhn.exec:\httnhn.exe119⤵PID:4820
-
\??\c:\1jjpd.exec:\1jjpd.exe120⤵PID:1320
-
\??\c:\dpvpj.exec:\dpvpj.exe121⤵PID:4452
-
\??\c:\rfffxlf.exec:\rfffxlf.exe122⤵PID:4220
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-