Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 04:12
Behavioral task
behavioral1
Sample
ebb5bbb495bce255f0c221e4c0f079c2e123ed2cb03411ce1cdfe43dc0fc780e.exe
Resource
win7-20240419-en
windows7-x64
6 signatures
150 seconds
General
-
Target
ebb5bbb495bce255f0c221e4c0f079c2e123ed2cb03411ce1cdfe43dc0fc780e.exe
-
Size
81KB
-
MD5
1ff8e5161eaa6cd08070f07fcec63ecb
-
SHA1
1c666eff9d4966f0ecc0f8b67b1d39289a1331c6
-
SHA256
ebb5bbb495bce255f0c221e4c0f079c2e123ed2cb03411ce1cdfe43dc0fc780e
-
SHA512
59fbd6fd7fe8d3056f7d4338ada41e1ecfe8513ecdff9e06a0c8ef3a581053a0a1a5e29c3954588368a1a323f7063be42525de507921384391e61b300514ed0b
-
SSDEEP
1536:zvQBeOGtrYS3srx93UBWfwC6Ggnouy8iT4+C2HVM1p6T7Q6:zhOmTsF93UYfwC6GIoutiTU2HVS63Q6
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1908-1-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4840-10-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3552-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3220-23-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1924-28-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2800-33-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4400-44-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2144-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/532-56-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1780-69-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4652-76-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4612-82-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4612-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4160-91-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2804-96-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3636-101-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4352-107-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4440-109-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2788-118-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/640-132-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1576-127-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1268-137-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3308-146-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4224-149-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4936-153-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1092-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3480-164-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2368-166-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/828-171-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/948-174-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3400-176-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3852-182-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4892-184-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2824-188-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4976-190-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2904-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4348-196-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1392-204-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4468-207-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2600-208-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3820-216-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4748-223-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4608-229-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4236-232-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5068-267-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4876-273-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4616-285-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/948-316-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3764-320-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1724-328-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1016-346-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3388-374-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5072-379-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4296-389-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1400-394-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2128-415-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3964-418-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2476-429-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1744-435-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3220-469-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1976-638-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4872-666-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4604-671-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4396-741-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1908-1-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\pddvp.exe UPX behavioral2/memory/4840-5-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\lrxfxll.exe UPX behavioral2/memory/4840-10-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\lfxrllf.exe UPX behavioral2/memory/3552-16-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\tbhbtt.exe UPX C:\ppppp.exe UPX behavioral2/memory/3220-23-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\vpjjj.exe UPX behavioral2/memory/1924-28-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\rlrlrrx.exe UPX behavioral2/memory/2800-33-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\tnnnnn.exe UPX behavioral2/memory/4400-39-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\hbhhbb.exe UPX behavioral2/memory/4400-44-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\vvdvv.exe UPX behavioral2/memory/2144-49-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\pddvj.exe UPX behavioral2/memory/2144-54-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/532-56-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\7xrllll.exe UPX C:\9xllfff.exe UPX C:\hhhnnn.exe UPX behavioral2/memory/1780-69-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\3ntnnn.exe UPX behavioral2/memory/4652-76-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\pddvp.exe UPX C:\xrfffff.exe UPX behavioral2/memory/4612-82-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\3xffxxx.exe UPX behavioral2/memory/4612-86-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\hhbbhh.exe UPX behavioral2/memory/4160-91-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\tnnbbt.exe UPX behavioral2/memory/2804-96-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\pdddv.exe UPX behavioral2/memory/3636-101-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\1flffff.exe UPX behavioral2/memory/4352-107-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/4440-109-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\nhhnth.exe UPX behavioral2/memory/2788-118-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\pdjdv.exe UPX behavioral2/memory/640-132-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\5fxxlfx.exe UPX \??\c:\vpdpp.exe UPX behavioral2/memory/1576-127-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/1576-123-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\tnnhhn.exe UPX behavioral2/memory/1268-137-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\bthtbb.exe UPX \??\c:\5bbttt.exe UPX behavioral2/memory/2788-113-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/3308-146-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\ddvvv.exe UPX behavioral2/memory/4224-149-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\xxxlrlr.exe UPX behavioral2/memory/4936-153-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\thhhhb.exe UPX behavioral2/memory/1092-160-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/3480-164-0x0000000000400000-0x0000000000427000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
pddvp.exelrxfxll.exelfxrllf.exetbhbtt.exeppppp.exevpjjj.exerlrlrrx.exetnnnnn.exehbhhbb.exevvdvv.exepddvj.exe7xrllll.exe9xllfff.exehhhnnn.exe3ntnnn.exepddvp.exexrfffff.exe3xffxxx.exehhbbhh.exetnnbbt.exepdddv.exe1flffff.exenhhnth.exe5bbttt.exepdjdv.exevpdpp.exe5fxxlfx.exetnnhhn.exebthtbb.exeddvvv.exexxxlrlr.exethhhhb.exenthbnn.exedjppv.exerrfrrlr.exe7frrxxf.exenhtnnt.exepjvvd.exedvppv.exefrfxfff.exenhtnnh.exebttbnb.exejjpdj.exexffxrlf.exellfxrlr.exehbnhtn.exeddjjd.exe1pppd.exelflxrlf.exe1thnth.exe1tthtn.exethbthh.exejvpjv.exefxxlxll.exebbtnbt.exe1tbttn.exe3dvpj.exexffrflx.exe3xxrxxx.exethbthb.exejpppv.exedpdjp.exe9vvvj.exe3xxrxfx.exepid process 4840 pddvp.exe 3552 lrxfxll.exe 3200 lfxrllf.exe 3220 tbhbtt.exe 1924 ppppp.exe 2800 vpjjj.exe 1404 rlrlrrx.exe 4400 tnnnnn.exe 4236 hbhhbb.exe 2144 vvdvv.exe 532 pddvj.exe 1532 7xrllll.exe 3388 9xllfff.exe 1780 hhhnnn.exe 4652 3ntnnn.exe 2916 pddvp.exe 4612 xrfffff.exe 4160 3xffxxx.exe 2804 hhbbhh.exe 3636 tnnbbt.exe 4352 pdddv.exe 4440 1flffff.exe 2788 nhhnth.exe 2572 5bbttt.exe 1576 pdjdv.exe 640 vpdpp.exe 1268 5fxxlfx.exe 1732 tnnhhn.exe 3308 bthtbb.exe 4224 ddvvv.exe 4936 xxxlrlr.exe 1092 thhhhb.exe 2888 nthbnn.exe 3480 djppv.exe 2368 rrfrrlr.exe 828 7frrxxf.exe 948 nhtnnt.exe 3400 pjvvd.exe 1236 dvppv.exe 3852 frfxfff.exe 4892 nhtnnh.exe 2824 bttbnb.exe 4976 jjpdj.exe 2904 xffxrlf.exe 4348 llfxrlr.exe 2988 hbnhtn.exe 2032 ddjjd.exe 1392 1pppd.exe 4468 lflxrlf.exe 2600 1thnth.exe 2164 1tthtn.exe 3820 thbthh.exe 920 jvpjv.exe 4204 fxxlxll.exe 4748 bbtnbt.exe 5064 1tbttn.exe 4608 3dvpj.exe 4236 xffrflx.exe 4864 3xxrxxx.exe 5080 thbthb.exe 1264 jpppv.exe 3388 dpdjp.exe 636 9vvvj.exe 1652 3xxrxfx.exe -
Processes:
resource yara_rule behavioral2/memory/1908-1-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pddvp.exe upx behavioral2/memory/4840-5-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lrxfxll.exe upx behavioral2/memory/4840-10-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lfxrllf.exe upx behavioral2/memory/3552-16-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tbhbtt.exe upx C:\ppppp.exe upx behavioral2/memory/3220-23-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpjjj.exe upx behavioral2/memory/1924-28-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rlrlrrx.exe upx behavioral2/memory/2800-33-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\tnnnnn.exe upx behavioral2/memory/4400-39-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hbhhbb.exe upx behavioral2/memory/4400-44-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vvdvv.exe upx behavioral2/memory/2144-49-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pddvj.exe upx behavioral2/memory/2144-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/532-56-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\7xrllll.exe upx C:\9xllfff.exe upx C:\hhhnnn.exe upx behavioral2/memory/1780-69-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3ntnnn.exe upx behavioral2/memory/4652-76-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pddvp.exe upx C:\xrfffff.exe upx behavioral2/memory/4612-82-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\3xffxxx.exe upx behavioral2/memory/4612-86-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hhbbhh.exe upx behavioral2/memory/4160-91-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\tnnbbt.exe upx behavioral2/memory/2804-96-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pdddv.exe upx behavioral2/memory/3636-101-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1flffff.exe upx behavioral2/memory/4352-107-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4440-109-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhhnth.exe upx behavioral2/memory/2788-118-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\pdjdv.exe upx behavioral2/memory/640-132-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\5fxxlfx.exe upx \??\c:\vpdpp.exe upx behavioral2/memory/1576-127-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1576-123-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\tnnhhn.exe upx behavioral2/memory/1268-137-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bthtbb.exe upx \??\c:\5bbttt.exe upx behavioral2/memory/2788-113-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3308-146-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\ddvvv.exe upx behavioral2/memory/4224-149-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xxxlrlr.exe upx behavioral2/memory/4936-153-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\thhhhb.exe upx behavioral2/memory/1092-160-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3480-164-0x0000000000400000-0x0000000000427000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ebb5bbb495bce255f0c221e4c0f079c2e123ed2cb03411ce1cdfe43dc0fc780e.exepddvp.exelrxfxll.exelfxrllf.exetbhbtt.exeppppp.exevpjjj.exerlrlrrx.exetnnnnn.exehbhhbb.exevvdvv.exepddvj.exe7xrllll.exe9xllfff.exehhhnnn.exe3ntnnn.exepddvp.exexrfffff.exe3xffxxx.exehhbbhh.exetnnbbt.exepdddv.exedescription pid process target process PID 1908 wrote to memory of 4840 1908 ebb5bbb495bce255f0c221e4c0f079c2e123ed2cb03411ce1cdfe43dc0fc780e.exe pddvp.exe PID 1908 wrote to memory of 4840 1908 ebb5bbb495bce255f0c221e4c0f079c2e123ed2cb03411ce1cdfe43dc0fc780e.exe pddvp.exe PID 1908 wrote to memory of 4840 1908 ebb5bbb495bce255f0c221e4c0f079c2e123ed2cb03411ce1cdfe43dc0fc780e.exe pddvp.exe PID 4840 wrote to memory of 3552 4840 pddvp.exe lrxfxll.exe PID 4840 wrote to memory of 3552 4840 pddvp.exe lrxfxll.exe PID 4840 wrote to memory of 3552 4840 pddvp.exe lrxfxll.exe PID 3552 wrote to memory of 3200 3552 lrxfxll.exe lfxrllf.exe PID 3552 wrote to memory of 3200 3552 lrxfxll.exe lfxrllf.exe PID 3552 wrote to memory of 3200 3552 lrxfxll.exe lfxrllf.exe PID 3200 wrote to memory of 3220 3200 lfxrllf.exe tbhbtt.exe PID 3200 wrote to memory of 3220 3200 lfxrllf.exe tbhbtt.exe PID 3200 wrote to memory of 3220 3200 lfxrllf.exe tbhbtt.exe PID 3220 wrote to memory of 1924 3220 tbhbtt.exe ppppp.exe PID 3220 wrote to memory of 1924 3220 tbhbtt.exe ppppp.exe PID 3220 wrote to memory of 1924 3220 tbhbtt.exe ppppp.exe PID 1924 wrote to memory of 2800 1924 ppppp.exe vpjjj.exe PID 1924 wrote to memory of 2800 1924 ppppp.exe vpjjj.exe PID 1924 wrote to memory of 2800 1924 ppppp.exe vpjjj.exe PID 2800 wrote to memory of 1404 2800 vpjjj.exe rlrlrrx.exe PID 2800 wrote to memory of 1404 2800 vpjjj.exe rlrlrrx.exe PID 2800 wrote to memory of 1404 2800 vpjjj.exe rlrlrrx.exe PID 1404 wrote to memory of 4400 1404 rlrlrrx.exe tnnnnn.exe PID 1404 wrote to memory of 4400 1404 rlrlrrx.exe tnnnnn.exe PID 1404 wrote to memory of 4400 1404 rlrlrrx.exe tnnnnn.exe PID 4400 wrote to memory of 4236 4400 tnnnnn.exe hbhhbb.exe PID 4400 wrote to memory of 4236 4400 tnnnnn.exe hbhhbb.exe PID 4400 wrote to memory of 4236 4400 tnnnnn.exe hbhhbb.exe PID 4236 wrote to memory of 2144 4236 hbhhbb.exe vvdvv.exe PID 4236 wrote to memory of 2144 4236 hbhhbb.exe vvdvv.exe PID 4236 wrote to memory of 2144 4236 hbhhbb.exe vvdvv.exe PID 2144 wrote to memory of 532 2144 vvdvv.exe pddvj.exe PID 2144 wrote to memory of 532 2144 vvdvv.exe pddvj.exe PID 2144 wrote to memory of 532 2144 vvdvv.exe pddvj.exe PID 532 wrote to memory of 1532 532 pddvj.exe 7xrllll.exe PID 532 wrote to memory of 1532 532 pddvj.exe 7xrllll.exe PID 532 wrote to memory of 1532 532 pddvj.exe 7xrllll.exe PID 1532 wrote to memory of 3388 1532 7xrllll.exe 9xllfff.exe PID 1532 wrote to memory of 3388 1532 7xrllll.exe 9xllfff.exe PID 1532 wrote to memory of 3388 1532 7xrllll.exe 9xllfff.exe PID 3388 wrote to memory of 1780 3388 9xllfff.exe hhhnnn.exe PID 3388 wrote to memory of 1780 3388 9xllfff.exe hhhnnn.exe PID 3388 wrote to memory of 1780 3388 9xllfff.exe hhhnnn.exe PID 1780 wrote to memory of 4652 1780 hhhnnn.exe 3ntnnn.exe PID 1780 wrote to memory of 4652 1780 hhhnnn.exe 3ntnnn.exe PID 1780 wrote to memory of 4652 1780 hhhnnn.exe 3ntnnn.exe PID 4652 wrote to memory of 2916 4652 3ntnnn.exe pddvp.exe PID 4652 wrote to memory of 2916 4652 3ntnnn.exe pddvp.exe PID 4652 wrote to memory of 2916 4652 3ntnnn.exe pddvp.exe PID 2916 wrote to memory of 4612 2916 pddvp.exe xrfffff.exe PID 2916 wrote to memory of 4612 2916 pddvp.exe xrfffff.exe PID 2916 wrote to memory of 4612 2916 pddvp.exe xrfffff.exe PID 4612 wrote to memory of 4160 4612 xrfffff.exe 3xffxxx.exe PID 4612 wrote to memory of 4160 4612 xrfffff.exe 3xffxxx.exe PID 4612 wrote to memory of 4160 4612 xrfffff.exe 3xffxxx.exe PID 4160 wrote to memory of 2804 4160 3xffxxx.exe hhbbhh.exe PID 4160 wrote to memory of 2804 4160 3xffxxx.exe hhbbhh.exe PID 4160 wrote to memory of 2804 4160 3xffxxx.exe hhbbhh.exe PID 2804 wrote to memory of 3636 2804 hhbbhh.exe tnnbbt.exe PID 2804 wrote to memory of 3636 2804 hhbbhh.exe tnnbbt.exe PID 2804 wrote to memory of 3636 2804 hhbbhh.exe tnnbbt.exe PID 3636 wrote to memory of 4352 3636 tnnbbt.exe pdddv.exe PID 3636 wrote to memory of 4352 3636 tnnbbt.exe pdddv.exe PID 3636 wrote to memory of 4352 3636 tnnbbt.exe pdddv.exe PID 4352 wrote to memory of 4440 4352 pdddv.exe 1flffff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebb5bbb495bce255f0c221e4c0f079c2e123ed2cb03411ce1cdfe43dc0fc780e.exe"C:\Users\Admin\AppData\Local\Temp\ebb5bbb495bce255f0c221e4c0f079c2e123ed2cb03411ce1cdfe43dc0fc780e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
\??\c:\pddvp.exec:\pddvp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
\??\c:\lrxfxll.exec:\lrxfxll.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
\??\c:\lfxrllf.exec:\lfxrllf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
\??\c:\tbhbtt.exec:\tbhbtt.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
\??\c:\ppppp.exec:\ppppp.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
\??\c:\vpjjj.exec:\vpjjj.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\rlrlrrx.exec:\rlrlrrx.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
\??\c:\tnnnnn.exec:\tnnnnn.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
\??\c:\hbhhbb.exec:\hbhhbb.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
\??\c:\vvdvv.exec:\vvdvv.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\pddvj.exec:\pddvj.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
\??\c:\7xrllll.exec:\7xrllll.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1532 -
\??\c:\9xllfff.exec:\9xllfff.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3388 -
\??\c:\hhhnnn.exec:\hhhnnn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
\??\c:\3ntnnn.exec:\3ntnnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
\??\c:\pddvp.exec:\pddvp.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2916 -
\??\c:\xrfffff.exec:\xrfffff.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
\??\c:\3xffxxx.exec:\3xffxxx.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4160 -
\??\c:\hhbbhh.exec:\hhbbhh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
\??\c:\tnnbbt.exec:\tnnbbt.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
\??\c:\pdddv.exec:\pdddv.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4352 -
\??\c:\1flffff.exec:\1flffff.exe23⤵
- Executes dropped EXE
PID:4440 -
\??\c:\nhhnth.exec:\nhhnth.exe24⤵
- Executes dropped EXE
PID:2788 -
\??\c:\5bbttt.exec:\5bbttt.exe25⤵
- Executes dropped EXE
PID:2572 -
\??\c:\pdjdv.exec:\pdjdv.exe26⤵
- Executes dropped EXE
PID:1576 -
\??\c:\vpdpp.exec:\vpdpp.exe27⤵
- Executes dropped EXE
PID:640 -
\??\c:\5fxxlfx.exec:\5fxxlfx.exe28⤵
- Executes dropped EXE
PID:1268 -
\??\c:\tnnhhn.exec:\tnnhhn.exe29⤵
- Executes dropped EXE
PID:1732 -
\??\c:\bthtbb.exec:\bthtbb.exe30⤵
- Executes dropped EXE
PID:3308 -
\??\c:\ddvvv.exec:\ddvvv.exe31⤵
- Executes dropped EXE
PID:4224 -
\??\c:\xxxlrlr.exec:\xxxlrlr.exe32⤵
- Executes dropped EXE
PID:4936 -
\??\c:\thhhhb.exec:\thhhhb.exe33⤵
- Executes dropped EXE
PID:1092 -
\??\c:\nthbnn.exec:\nthbnn.exe34⤵
- Executes dropped EXE
PID:2888 -
\??\c:\djppv.exec:\djppv.exe35⤵
- Executes dropped EXE
PID:3480 -
\??\c:\rrfrrlr.exec:\rrfrrlr.exe36⤵
- Executes dropped EXE
PID:2368 -
\??\c:\7frrxxf.exec:\7frrxxf.exe37⤵
- Executes dropped EXE
PID:828 -
\??\c:\nhtnnt.exec:\nhtnnt.exe38⤵
- Executes dropped EXE
PID:948 -
\??\c:\pjvvd.exec:\pjvvd.exe39⤵
- Executes dropped EXE
PID:3400 -
\??\c:\dvppv.exec:\dvppv.exe40⤵
- Executes dropped EXE
PID:1236 -
\??\c:\frfxfff.exec:\frfxfff.exe41⤵
- Executes dropped EXE
PID:3852 -
\??\c:\nhtnnh.exec:\nhtnnh.exe42⤵
- Executes dropped EXE
PID:4892 -
\??\c:\bttbnb.exec:\bttbnb.exe43⤵
- Executes dropped EXE
PID:2824 -
\??\c:\jjpdj.exec:\jjpdj.exe44⤵
- Executes dropped EXE
PID:4976 -
\??\c:\xffxrlf.exec:\xffxrlf.exe45⤵
- Executes dropped EXE
PID:2904 -
\??\c:\llfxrlr.exec:\llfxrlr.exe46⤵
- Executes dropped EXE
PID:4348 -
\??\c:\hbnhtn.exec:\hbnhtn.exe47⤵
- Executes dropped EXE
PID:2988 -
\??\c:\ddjjd.exec:\ddjjd.exe48⤵
- Executes dropped EXE
PID:2032 -
\??\c:\1pppd.exec:\1pppd.exe49⤵
- Executes dropped EXE
PID:1392 -
\??\c:\lflxrlf.exec:\lflxrlf.exe50⤵
- Executes dropped EXE
PID:4468 -
\??\c:\1thnth.exec:\1thnth.exe51⤵
- Executes dropped EXE
PID:2600 -
\??\c:\1tthtn.exec:\1tthtn.exe52⤵
- Executes dropped EXE
PID:2164 -
\??\c:\thbthh.exec:\thbthh.exe53⤵
- Executes dropped EXE
PID:3820 -
\??\c:\jvpjv.exec:\jvpjv.exe54⤵
- Executes dropped EXE
PID:920 -
\??\c:\fxxlxll.exec:\fxxlxll.exe55⤵
- Executes dropped EXE
PID:4204 -
\??\c:\bbtnbt.exec:\bbtnbt.exe56⤵
- Executes dropped EXE
PID:4748 -
\??\c:\1tbttn.exec:\1tbttn.exe57⤵
- Executes dropped EXE
PID:5064 -
\??\c:\3dvpj.exec:\3dvpj.exe58⤵
- Executes dropped EXE
PID:4608 -
\??\c:\xffrflx.exec:\xffrflx.exe59⤵
- Executes dropped EXE
PID:4236 -
\??\c:\3xxrxxx.exec:\3xxrxxx.exe60⤵
- Executes dropped EXE
PID:4864 -
\??\c:\thbthb.exec:\thbthb.exe61⤵
- Executes dropped EXE
PID:5080 -
\??\c:\jpppv.exec:\jpppv.exe62⤵
- Executes dropped EXE
PID:1264 -
\??\c:\dpdjp.exec:\dpdjp.exe63⤵
- Executes dropped EXE
PID:3388 -
\??\c:\9vvvj.exec:\9vvvj.exe64⤵
- Executes dropped EXE
PID:636 -
\??\c:\3xxrxfx.exec:\3xxrxfx.exe65⤵
- Executes dropped EXE
PID:1652 -
\??\c:\rrlffll.exec:\rrlffll.exe66⤵PID:4652
-
\??\c:\hnnhtt.exec:\hnnhtt.exe67⤵PID:2844
-
\??\c:\ddjpp.exec:\ddjpp.exe68⤵PID:2648
-
\??\c:\jvdvd.exec:\jvdvd.exe69⤵PID:4296
-
\??\c:\ffflfff.exec:\ffflfff.exe70⤵PID:3016
-
\??\c:\flflxfx.exec:\flflxfx.exe71⤵PID:1400
-
\??\c:\ntnntb.exec:\ntnntb.exe72⤵PID:960
-
\??\c:\jpvdd.exec:\jpvdd.exe73⤵PID:3556
-
\??\c:\vpdvj.exec:\vpdvj.exe74⤵PID:3976
-
\??\c:\7lllxrf.exec:\7lllxrf.exe75⤵PID:5068
-
\??\c:\xrffrlf.exec:\xrffrlf.exe76⤵PID:2292
-
\??\c:\bnnhhb.exec:\bnnhhb.exe77⤵PID:3576
-
\??\c:\hnhthb.exec:\hnhthb.exe78⤵PID:4876
-
\??\c:\dpvpp.exec:\dpvpp.exe79⤵PID:4992
-
\??\c:\vjjjv.exec:\vjjjv.exe80⤵PID:3804
-
\??\c:\llfxfxr.exec:\llfxfxr.exe81⤵PID:3084
-
\??\c:\thnbhh.exec:\thnbhh.exe82⤵PID:640
-
\??\c:\thtbhb.exec:\thtbhb.exe83⤵PID:4616
-
\??\c:\jvjdv.exec:\jvjdv.exe84⤵PID:368
-
\??\c:\9jpjv.exec:\9jpjv.exe85⤵PID:4844
-
\??\c:\frffrlf.exec:\frffrlf.exe86⤵PID:4276
-
\??\c:\1lxxrlf.exec:\1lxxrlf.exe87⤵PID:2476
-
\??\c:\btnhtn.exec:\btnhtn.exe88⤵PID:1676
-
\??\c:\pvjjd.exec:\pvjjd.exe89⤵PID:1744
-
\??\c:\5flxfxr.exec:\5flxfxr.exe90⤵PID:964
-
\??\c:\btthnh.exec:\btthnh.exe91⤵PID:3384
-
\??\c:\bnnhtn.exec:\bnnhtn.exe92⤵PID:3240
-
\??\c:\vjdpv.exec:\vjdpv.exe93⤵PID:1920
-
\??\c:\rfxllxl.exec:\rfxllxl.exe94⤵PID:3396
-
\??\c:\fxxfrrf.exec:\fxxfrrf.exe95⤵PID:2368
-
\??\c:\hbbbtn.exec:\hbbbtn.exe96⤵PID:2380
-
\??\c:\hbhbtt.exec:\hbhbtt.exe97⤵PID:948
-
\??\c:\djjvj.exec:\djjvj.exe98⤵PID:4732
-
\??\c:\xxfrxfl.exec:\xxfrxfl.exe99⤵PID:3764
-
\??\c:\1rlfxrl.exec:\1rlfxrl.exe100⤵PID:3488
-
\??\c:\nntnhb.exec:\nntnhb.exe101⤵PID:3512
-
\??\c:\nhbbtt.exec:\nhbbtt.exe102⤵PID:1724
-
\??\c:\1bnhbb.exec:\1bnhbb.exe103⤵PID:4892
-
\??\c:\dvdvv.exec:\dvdvv.exe104⤵PID:1720
-
\??\c:\xxffffr.exec:\xxffffr.exe105⤵PID:4976
-
\??\c:\flrlfxr.exec:\flrlfxr.exe106⤵PID:4220
-
\??\c:\htbbtt.exec:\htbbtt.exe107⤵PID:2892
-
\??\c:\pdjvd.exec:\pdjvd.exe108⤵PID:4348
-
\??\c:\lfrrfff.exec:\lfrrfff.exe109⤵PID:3420
-
\??\c:\nbhbbt.exec:\nbhbbt.exe110⤵PID:1016
-
\??\c:\nbbnhn.exec:\nbbnhn.exe111⤵PID:3436
-
\??\c:\dvvpp.exec:\dvvpp.exe112⤵PID:2760
-
\??\c:\vjdvv.exec:\vjdvv.exe113⤵PID:3200
-
\??\c:\xlrfflx.exec:\xlrfflx.exe114⤵PID:2164
-
\??\c:\vpvpp.exec:\vpvpp.exe115⤵PID:3820
-
\??\c:\vdvdp.exec:\vdvdp.exe116⤵PID:4584
-
\??\c:\frrlxxr.exec:\frrlxxr.exe117⤵PID:3752
-
\??\c:\1rxrxrr.exec:\1rxrxrr.exe118⤵PID:4400
-
\??\c:\btbtnn.exec:\btbtnn.exe119⤵PID:4660
-
\??\c:\5pvpv.exec:\5pvpv.exe120⤵PID:808
-
\??\c:\dpvpj.exec:\dpvpj.exe121⤵PID:1532
-
\??\c:\rlffffr.exec:\rlffffr.exe122⤵PID:5080
-
\??\c:\xlrllfr.exec:\xlrllfr.exe123⤵PID:1264
-
\??\c:\7ntbhh.exec:\7ntbhh.exe124⤵PID:3388
-
\??\c:\tthhbb.exec:\tthhbb.exe125⤵PID:3600
-
\??\c:\dvdvv.exec:\dvdvv.exe126⤵PID:5072
-
\??\c:\rflrxlf.exec:\rflrxlf.exe127⤵PID:4652
-
\??\c:\lxxrffx.exec:\lxxrffx.exe128⤵PID:2844
-
\??\c:\tnttnn.exec:\tnttnn.exe129⤵PID:2648
-
\??\c:\ntttnt.exec:\ntttnt.exe130⤵PID:4296
-
\??\c:\pvvvp.exec:\pvvvp.exe131⤵PID:3016
-
\??\c:\pdjdp.exec:\pdjdp.exe132⤵PID:1400
-
\??\c:\pddjd.exec:\pddjd.exe133⤵PID:960
-
\??\c:\lfrllrr.exec:\lfrllrr.exe134⤵PID:4636
-
\??\c:\nbbbbb.exec:\nbbbbb.exe135⤵PID:4352
-
\??\c:\bhtbht.exec:\bhtbht.exe136⤵PID:3380
-
\??\c:\vvpvd.exec:\vvpvd.exe137⤵PID:4792
-
\??\c:\pjvpp.exec:\pjvpp.exe138⤵PID:3068
-
\??\c:\hbbbbt.exec:\hbbbbt.exe139⤵PID:4876
-
\??\c:\pvvpj.exec:\pvvpj.exe140⤵PID:4992
-
\??\c:\vdvpp.exec:\vdvpp.exe141⤵PID:5116
-
\??\c:\xllrrrx.exec:\xllrrrx.exe142⤵PID:2128
-
\??\c:\bthhhh.exec:\bthhhh.exe143⤵PID:3964
-
\??\c:\3bbtnb.exec:\3bbtnb.exe144⤵PID:4616
-
\??\c:\ttbhnn.exec:\ttbhnn.exe145⤵PID:2968
-
\??\c:\jpjvd.exec:\jpjvd.exe146⤵PID:4844
-
\??\c:\pvvpp.exec:\pvvpp.exe147⤵PID:1812
-
\??\c:\7xlfrrl.exec:\7xlfrrl.exe148⤵PID:2476
-
\??\c:\hhnhbb.exec:\hhnhbb.exe149⤵PID:2340
-
\??\c:\bhnhbb.exec:\bhnhbb.exe150⤵PID:1744
-
\??\c:\dvjjd.exec:\dvjjd.exe151⤵PID:964
-
\??\c:\9ppjj.exec:\9ppjj.exe152⤵PID:3716
-
\??\c:\ffxrflx.exec:\ffxrflx.exe153⤵PID:3616
-
\??\c:\rrfxllx.exec:\rrfxllx.exe154⤵PID:3596
-
\??\c:\nhhnhh.exec:\nhhnhh.exe155⤵PID:2996
-
\??\c:\nnnnhb.exec:\nnnnhb.exe156⤵PID:948
-
\??\c:\7vjdj.exec:\7vjdj.exe157⤵PID:3496
-
\??\c:\dvdvd.exec:\dvdvd.exe158⤵PID:1456
-
\??\c:\xffxffx.exec:\xffxffx.exe159⤵PID:4116
-
\??\c:\xllllll.exec:\xllllll.exe160⤵PID:1252
-
\??\c:\xfffxxx.exec:\xfffxxx.exe161⤵PID:5032
-
\??\c:\bnnnhh.exec:\bnnnhh.exe162⤵PID:2492
-
\??\c:\tnbttn.exec:\tnbttn.exe163⤵PID:2988
-
\??\c:\5dvvd.exec:\5dvvd.exe164⤵PID:2032
-
\??\c:\9jpjd.exec:\9jpjd.exe165⤵PID:4212
-
\??\c:\dvpvv.exec:\dvpvv.exe166⤵PID:804
-
\??\c:\xlrrlll.exec:\xlrrlll.exe167⤵PID:3220
-
\??\c:\1xffllr.exec:\1xffllr.exe168⤵PID:3200
-
\??\c:\jdpdd.exec:\jdpdd.exe169⤵PID:1404
-
\??\c:\1xlfxfx.exec:\1xlfxfx.exe170⤵PID:2308
-
\??\c:\7tnnhh.exec:\7tnnhh.exe171⤵PID:4448
-
\??\c:\hbnntb.exec:\hbnntb.exe172⤵PID:2144
-
\??\c:\pdppj.exec:\pdppj.exe173⤵PID:532
-
\??\c:\5lrrffx.exec:\5lrrffx.exe174⤵PID:692
-
\??\c:\rrffxrl.exec:\rrffxrl.exe175⤵PID:1716
-
\??\c:\7nntnt.exec:\7nntnt.exe176⤵PID:3992
-
\??\c:\bbbtnn.exec:\bbbtnn.exe177⤵PID:1700
-
\??\c:\9dddv.exec:\9dddv.exe178⤵PID:1156
-
\??\c:\lfrfxxr.exec:\lfrfxxr.exe179⤵PID:5084
-
\??\c:\bbbnnh.exec:\bbbnnh.exe180⤵PID:5076
-
\??\c:\dpdjv.exec:\dpdjv.exe181⤵PID:3252
-
\??\c:\btnhnn.exec:\btnhnn.exe182⤵PID:3456
-
\??\c:\hbbbtt.exec:\hbbbtt.exe183⤵PID:3224
-
\??\c:\jvvpj.exec:\jvvpj.exe184⤵PID:5012
-
\??\c:\7djdd.exec:\7djdd.exe185⤵PID:3268
-
\??\c:\lrxrllx.exec:\lrxrllx.exe186⤵PID:4412
-
\??\c:\bthhhn.exec:\bthhhn.exe187⤵PID:3140
-
\??\c:\ttnbbn.exec:\ttnbbn.exe188⤵PID:3976
-
\??\c:\pjdjp.exec:\pjdjp.exe189⤵PID:4504
-
\??\c:\5vpdp.exec:\5vpdp.exe190⤵PID:2336
-
\??\c:\rxfxrrl.exec:\rxfxrrl.exe191⤵PID:4924
-
\??\c:\bttnnn.exec:\bttnnn.exe192⤵PID:4952
-
\??\c:\nhntnn.exec:\nhntnn.exe193⤵PID:2020
-
\??\c:\dvjdj.exec:\dvjdj.exe194⤵PID:3296
-
\??\c:\pjvvp.exec:\pjvvp.exe195⤵PID:3804
-
\??\c:\rrffffl.exec:\rrffffl.exe196⤵PID:3084
-
\??\c:\lxfxrfx.exec:\lxfxrfx.exe197⤵PID:640
-
\??\c:\7hnnhh.exec:\7hnnhh.exe198⤵PID:1636
-
\??\c:\5hhbnn.exec:\5hhbnn.exe199⤵PID:1732
-
\??\c:\dvdjd.exec:\dvdjd.exe200⤵PID:2968
-
\??\c:\1rxxlxx.exec:\1rxxlxx.exe201⤵PID:4844
-
\??\c:\7rxxxxx.exec:\7rxxxxx.exe202⤵PID:1812
-
\??\c:\btnhbb.exec:\btnhbb.exe203⤵PID:2476
-
\??\c:\nbbnbt.exec:\nbbnbt.exe204⤵PID:2340
-
\??\c:\7vpdj.exec:\7vpdj.exe205⤵PID:4848
-
\??\c:\3vppd.exec:\3vppd.exe206⤵PID:2528
-
\??\c:\1rrrrlf.exec:\1rrrrlf.exe207⤵PID:1920
-
\??\c:\7ffffff.exec:\7ffffff.exe208⤵PID:2388
-
\??\c:\hbnhbh.exec:\hbnhbh.exe209⤵PID:1968
-
\??\c:\tbnnnb.exec:\tbnnnb.exe210⤵PID:4108
-
\??\c:\1pvvj.exec:\1pvvj.exe211⤵PID:3764
-
\??\c:\jdjdd.exec:\jdjdd.exe212⤵PID:3852
-
\??\c:\rlrlxrl.exec:\rlrlxrl.exe213⤵PID:4004
-
\??\c:\flrfxxr.exec:\flrfxxr.exe214⤵PID:468
-
\??\c:\1ntnnn.exec:\1ntnnn.exe215⤵PID:2920
-
\??\c:\tnnhbt.exec:\tnnhbt.exe216⤵PID:1720
-
\??\c:\jddvd.exec:\jddvd.exe217⤵PID:2892
-
\??\c:\7xffxxx.exec:\7xffxxx.exe218⤵PID:1596
-
\??\c:\3rrllrl.exec:\3rrllrl.exe219⤵PID:1972
-
\??\c:\nhnttt.exec:\nhnttt.exe220⤵PID:404
-
\??\c:\5pdvd.exec:\5pdvd.exe221⤵PID:4468
-
\??\c:\jjvjp.exec:\jjvjp.exe222⤵PID:1612
-
\??\c:\rffflrl.exec:\rffflrl.exe223⤵PID:920
-
\??\c:\rlrfxfx.exec:\rlrfxfx.exe224⤵PID:4244
-
\??\c:\3ntnbb.exec:\3ntnbb.exe225⤵PID:2912
-
\??\c:\9tnhtt.exec:\9tnhtt.exe226⤵PID:3752
-
\??\c:\5jppj.exec:\5jppj.exe227⤵PID:4400
-
\??\c:\dvpjp.exec:\dvpjp.exe228⤵PID:4864
-
\??\c:\lrlfllf.exec:\lrlfllf.exe229⤵PID:808
-
\??\c:\lrrlffx.exec:\lrrlffx.exe230⤵PID:1568
-
\??\c:\5bhhbt.exec:\5bhhbt.exe231⤵PID:5056
-
\??\c:\hbhbhh.exec:\hbhbhh.exe232⤵PID:1780
-
\??\c:\7djdv.exec:\7djdv.exe233⤵PID:3388
-
\??\c:\fflrllf.exec:\fflrllf.exe234⤵PID:5072
-
\??\c:\thbhbb.exec:\thbhbb.exe235⤵PID:4928
-
\??\c:\ntthbn.exec:\ntthbn.exe236⤵PID:5104
-
\??\c:\dvddj.exec:\dvddj.exe237⤵PID:4612
-
\??\c:\lffxrrr.exec:\lffxrrr.exe238⤵PID:4160
-
\??\c:\rrflfll.exec:\rrflfll.exe239⤵PID:3100
-
\??\c:\3nbbtb.exec:\3nbbtb.exe240⤵PID:3344
-
\??\c:\3nbbtt.exec:\3nbbtt.exe241⤵PID:1400
-
\??\c:\pdddv.exec:\pdddv.exe242⤵PID:3860