Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
20-05-2024 20:12
Behavioral task
behavioral1
Sample
22c2c9a00d98dca419a0dd3285b1622eddf585b7e66d588d90d22ab70db80f64.exe
Resource
win7-20240220-en
windows7-x64
6 signatures
150 seconds
General
-
Target
22c2c9a00d98dca419a0dd3285b1622eddf585b7e66d588d90d22ab70db80f64.exe
-
Size
81KB
-
MD5
5795e7d1e5ae624b824c2fe9e3cfd4c0
-
SHA1
20e3134dceec4f5e91e332de5c19382a004bf0d6
-
SHA256
22c2c9a00d98dca419a0dd3285b1622eddf585b7e66d588d90d22ab70db80f64
-
SHA512
d5afc922f75b8d21c16fd1ee581e00770228b81d015c9fb972adfac6b7e753d32c050419f622649e93a18d79b9f497433e6b923db80d2fc622388f0cef557d1e
-
SSDEEP
1536:zvQBeOGtrYS3srx93UBWfwC6Ggnouy8iT4+C2HVM1p6T7QGIC:zhOmTsF93UYfwC6GIoutiTU2HVS63Qg
Malware Config
Signatures
-
Detect Blackmoon payload 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1612-4-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1884-16-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2124-17-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/996-15-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3484-25-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2992-30-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4168-38-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3520-37-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/772-42-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4088-50-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4084-56-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2620-59-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1644-68-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3964-74-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4372-75-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4372-80-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4728-82-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3508-86-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4828-93-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4488-97-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1364-102-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2252-109-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4116-116-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/880-122-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2056-141-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2904-146-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1652-160-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3528-164-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1944-167-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1516-176-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1992-182-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1088-189-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3128-194-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/956-206-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2420-209-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4992-213-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4324-217-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3184-236-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3656-239-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4348-247-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1060-252-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1240-259-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1712-266-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/716-273-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/948-278-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4632-281-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2392-283-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4236-296-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1652-299-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1944-305-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2912-308-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/700-331-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2460-339-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2548-343-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1484-360-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2412-384-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1016-408-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4168-453-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3916-456-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4912-467-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1680-500-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/4528-513-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2188-537-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/3832-603-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 64 IoCs
Processes:
resource yara_rule behavioral2/memory/1612-0-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\jdjvv.exe UPX behavioral2/memory/1612-4-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\fxlffff.exe UPX C:\hbnnhh.exe UPX behavioral2/memory/1884-16-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\hhhbth.exe UPX behavioral2/memory/2124-17-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/996-15-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\llrxxff.exe UPX behavioral2/memory/3484-25-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\9tnnnb.exe UPX behavioral2/memory/3520-31-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/2992-30-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\hhtnhh.exe UPX behavioral2/memory/4168-38-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/3520-37-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\pdjdv.exe UPX behavioral2/memory/772-42-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\lflffxl.exe UPX C:\htnttn.exe UPX behavioral2/memory/4088-50-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/4084-52-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/4084-56-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\vpvvp.exe UPX C:\dvjpd.exe UPX behavioral2/memory/2620-59-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/1644-63-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\lfxxlrx.exe UPX behavioral2/memory/1644-68-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/3964-69-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\bbbtbb.exe UPX behavioral2/memory/3964-74-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/4372-75-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\bntnhb.exe UPX behavioral2/memory/4372-80-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/4728-82-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\ddjdv.exe UPX behavioral2/memory/3508-86-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/4828-93-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\xfxllrf.exe UPX C:\bthbtb.exe UPX behavioral2/memory/4488-97-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\bnttnh.exe UPX behavioral2/memory/1364-102-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\thttnn.exe UPX C:\vpvpd.exe UPX behavioral2/memory/2252-109-0x0000000000400000-0x0000000000427000-memory.dmp UPX behavioral2/memory/3088-111-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\fflfxxx.exe UPX behavioral2/memory/4116-116-0x0000000000400000-0x0000000000427000-memory.dmp UPX \??\c:\ntnbht.exe UPX behavioral2/memory/880-122-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\ppjjj.exe UPX C:\vppdv.exe UPX behavioral2/memory/4100-130-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\flrlrrx.exe UPX \??\c:\hntnhb.exe UPX \??\c:\jjjvp.exe UPX behavioral2/memory/2056-141-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\ttnntb.exe UPX behavioral2/memory/2904-146-0x0000000000400000-0x0000000000427000-memory.dmp UPX C:\1pjdp.exe UPX C:\vppdj.exe UPX -
Executes dropped EXE 64 IoCs
Processes:
jdjvv.exefxlffff.exehbnnhh.exehhhbth.exellrxxff.exe9tnnnb.exehhtnhh.exepdjdv.exelflffxl.exehtnttn.exevpvvp.exedvjpd.exelfxxlrx.exebbbtbb.exebntnhb.exeddjdv.exexfxllrf.exebthbtb.exebnttnh.exethttnn.exevpvpd.exefflfxxx.exentnbht.exeppjjj.exevppdv.exeflrlrrx.exehntnhb.exejjjvp.exettnntb.exe1pjdp.exevppdj.exexxxxxxr.exehbnhnh.exevjjvp.exerrfrlrf.exetntnbt.exedjvvv.exedvppd.exe9lrlffx.exebttbbn.exevdjdv.exelfxrlff.exexxrlffx.exenntnhh.exe7bnhhb.exepvpjd.exerrrxrlf.exebbnhhh.exenbbtnh.exe1djdv.exejdpjv.exenbhbnh.exedvjdd.exe9dddp.exerrllfff.exehttnnb.exevjpjv.exepvddp.exe9xffrlf.exerfllffx.exe7ttbtt.exenbhhtn.exejvpjd.exelrrrlll.exepid process 996 jdjvv.exe 2124 fxlffff.exe 1884 hbnnhh.exe 3484 hhhbth.exe 2992 llrxxff.exe 3520 9tnnnb.exe 4168 hhtnhh.exe 772 pdjdv.exe 4088 lflffxl.exe 4084 htnttn.exe 2620 vpvvp.exe 1644 dvjpd.exe 3964 lfxxlrx.exe 4372 bbbtbb.exe 4728 bntnhb.exe 3508 ddjdv.exe 4828 xfxllrf.exe 4488 bthbtb.exe 1364 bnttnh.exe 2252 thttnn.exe 3088 vpvpd.exe 4116 fflfxxx.exe 880 ntnbht.exe 2588 ppjjj.exe 4100 vppdv.exe 388 flrlrrx.exe 2056 hntnhb.exe 2904 jjjvp.exe 5064 ttnntb.exe 740 1pjdp.exe 1652 vppdj.exe 3528 xxxxxxr.exe 1944 hbnhnh.exe 428 vjjvp.exe 1224 rrfrlrf.exe 4176 tntnbt.exe 1516 djvvv.exe 4736 dvppd.exe 1992 9lrlffx.exe 3456 bttbbn.exe 4892 vdjdv.exe 1088 lfxrlff.exe 3496 xxrlffx.exe 3128 nntnhh.exe 1612 7bnhhb.exe 1660 pvpjd.exe 1380 rrrxrlf.exe 4852 bbnhhh.exe 956 nbbtnh.exe 2420 1djdv.exe 4992 jdpjv.exe 1000 nbhbnh.exe 4324 dvjdd.exe 4920 9dddp.exe 4024 rrllfff.exe 3664 httnnb.exe 3376 vjpjv.exe 3324 pvddp.exe 1008 9xffrlf.exe 4796 rfllffx.exe 3184 7ttbtt.exe 3656 nbhhtn.exe 1636 jvpjd.exe 1560 lrrrlll.exe -
Processes:
resource yara_rule behavioral2/memory/1612-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jdjvv.exe upx behavioral2/memory/1612-4-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\fxlffff.exe upx C:\hbnnhh.exe upx behavioral2/memory/1884-16-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hhhbth.exe upx behavioral2/memory/2124-17-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/996-15-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\llrxxff.exe upx behavioral2/memory/3484-25-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\9tnnnb.exe upx behavioral2/memory/3520-31-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/2992-30-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hhtnhh.exe upx behavioral2/memory/4168-38-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3520-37-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pdjdv.exe upx behavioral2/memory/772-42-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lflffxl.exe upx C:\htnttn.exe upx behavioral2/memory/4088-50-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4084-52-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4084-56-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vpvvp.exe upx C:\dvjpd.exe upx behavioral2/memory/2620-59-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/1644-63-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\lfxxlrx.exe upx behavioral2/memory/1644-68-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3964-69-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bbbtbb.exe upx behavioral2/memory/3964-74-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4372-75-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bntnhb.exe upx behavioral2/memory/4372-80-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4728-82-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ddjdv.exe upx behavioral2/memory/3508-86-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/4828-93-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\xfxllrf.exe upx C:\bthbtb.exe upx behavioral2/memory/4488-97-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\bnttnh.exe upx behavioral2/memory/1364-102-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\thttnn.exe upx C:\vpvpd.exe upx behavioral2/memory/2252-109-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral2/memory/3088-111-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\fflfxxx.exe upx behavioral2/memory/4116-116-0x0000000000400000-0x0000000000427000-memory.dmp upx \??\c:\ntnbht.exe upx behavioral2/memory/880-122-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ppjjj.exe upx C:\vppdv.exe upx behavioral2/memory/4100-130-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\flrlrrx.exe upx \??\c:\hntnhb.exe upx \??\c:\jjjvp.exe upx behavioral2/memory/2056-141-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ttnntb.exe upx behavioral2/memory/2904-146-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\1pjdp.exe upx C:\vppdj.exe upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
22c2c9a00d98dca419a0dd3285b1622eddf585b7e66d588d90d22ab70db80f64.exejdjvv.exefxlffff.exehbnnhh.exehhhbth.exellrxxff.exe9tnnnb.exehhtnhh.exepdjdv.exelflffxl.exehtnttn.exevpvvp.exedvjpd.exelfxxlrx.exebbbtbb.exebntnhb.exeddjdv.exexfxllrf.exebthbtb.exebnttnh.exethttnn.exevpvpd.exedescription pid process target process PID 1612 wrote to memory of 996 1612 22c2c9a00d98dca419a0dd3285b1622eddf585b7e66d588d90d22ab70db80f64.exe jdjvv.exe PID 1612 wrote to memory of 996 1612 22c2c9a00d98dca419a0dd3285b1622eddf585b7e66d588d90d22ab70db80f64.exe jdjvv.exe PID 1612 wrote to memory of 996 1612 22c2c9a00d98dca419a0dd3285b1622eddf585b7e66d588d90d22ab70db80f64.exe jdjvv.exe PID 996 wrote to memory of 2124 996 jdjvv.exe fxlffff.exe PID 996 wrote to memory of 2124 996 jdjvv.exe fxlffff.exe PID 996 wrote to memory of 2124 996 jdjvv.exe fxlffff.exe PID 2124 wrote to memory of 1884 2124 fxlffff.exe hbnnhh.exe PID 2124 wrote to memory of 1884 2124 fxlffff.exe hbnnhh.exe PID 2124 wrote to memory of 1884 2124 fxlffff.exe hbnnhh.exe PID 1884 wrote to memory of 3484 1884 hbnnhh.exe hhhbth.exe PID 1884 wrote to memory of 3484 1884 hbnnhh.exe hhhbth.exe PID 1884 wrote to memory of 3484 1884 hbnnhh.exe hhhbth.exe PID 3484 wrote to memory of 2992 3484 hhhbth.exe llrxxff.exe PID 3484 wrote to memory of 2992 3484 hhhbth.exe llrxxff.exe PID 3484 wrote to memory of 2992 3484 hhhbth.exe llrxxff.exe PID 2992 wrote to memory of 3520 2992 llrxxff.exe 9tnnnb.exe PID 2992 wrote to memory of 3520 2992 llrxxff.exe 9tnnnb.exe PID 2992 wrote to memory of 3520 2992 llrxxff.exe 9tnnnb.exe PID 3520 wrote to memory of 4168 3520 9tnnnb.exe hhtnhh.exe PID 3520 wrote to memory of 4168 3520 9tnnnb.exe hhtnhh.exe PID 3520 wrote to memory of 4168 3520 9tnnnb.exe hhtnhh.exe PID 4168 wrote to memory of 772 4168 hhtnhh.exe pdjdv.exe PID 4168 wrote to memory of 772 4168 hhtnhh.exe pdjdv.exe PID 4168 wrote to memory of 772 4168 hhtnhh.exe pdjdv.exe PID 772 wrote to memory of 4088 772 pdjdv.exe lflffxl.exe PID 772 wrote to memory of 4088 772 pdjdv.exe lflffxl.exe PID 772 wrote to memory of 4088 772 pdjdv.exe lflffxl.exe PID 4088 wrote to memory of 4084 4088 lflffxl.exe htnttn.exe PID 4088 wrote to memory of 4084 4088 lflffxl.exe htnttn.exe PID 4088 wrote to memory of 4084 4088 lflffxl.exe htnttn.exe PID 4084 wrote to memory of 2620 4084 htnttn.exe vpvvp.exe PID 4084 wrote to memory of 2620 4084 htnttn.exe vpvvp.exe PID 4084 wrote to memory of 2620 4084 htnttn.exe vpvvp.exe PID 2620 wrote to memory of 1644 2620 vpvvp.exe dvjpd.exe PID 2620 wrote to memory of 1644 2620 vpvvp.exe dvjpd.exe PID 2620 wrote to memory of 1644 2620 vpvvp.exe dvjpd.exe PID 1644 wrote to memory of 3964 1644 dvjpd.exe lfxxlrx.exe PID 1644 wrote to memory of 3964 1644 dvjpd.exe lfxxlrx.exe PID 1644 wrote to memory of 3964 1644 dvjpd.exe lfxxlrx.exe PID 3964 wrote to memory of 4372 3964 lfxxlrx.exe bbbtbb.exe PID 3964 wrote to memory of 4372 3964 lfxxlrx.exe bbbtbb.exe PID 3964 wrote to memory of 4372 3964 lfxxlrx.exe bbbtbb.exe PID 4372 wrote to memory of 4728 4372 bbbtbb.exe bntnhb.exe PID 4372 wrote to memory of 4728 4372 bbbtbb.exe bntnhb.exe PID 4372 wrote to memory of 4728 4372 bbbtbb.exe bntnhb.exe PID 4728 wrote to memory of 3508 4728 bntnhb.exe ddjdv.exe PID 4728 wrote to memory of 3508 4728 bntnhb.exe ddjdv.exe PID 4728 wrote to memory of 3508 4728 bntnhb.exe ddjdv.exe PID 3508 wrote to memory of 4828 3508 ddjdv.exe xfxllrf.exe PID 3508 wrote to memory of 4828 3508 ddjdv.exe xfxllrf.exe PID 3508 wrote to memory of 4828 3508 ddjdv.exe xfxllrf.exe PID 4828 wrote to memory of 4488 4828 xfxllrf.exe bthbtb.exe PID 4828 wrote to memory of 4488 4828 xfxllrf.exe bthbtb.exe PID 4828 wrote to memory of 4488 4828 xfxllrf.exe bthbtb.exe PID 4488 wrote to memory of 1364 4488 bthbtb.exe bnttnh.exe PID 4488 wrote to memory of 1364 4488 bthbtb.exe bnttnh.exe PID 4488 wrote to memory of 1364 4488 bthbtb.exe bnttnh.exe PID 1364 wrote to memory of 2252 1364 bnttnh.exe thttnn.exe PID 1364 wrote to memory of 2252 1364 bnttnh.exe thttnn.exe PID 1364 wrote to memory of 2252 1364 bnttnh.exe thttnn.exe PID 2252 wrote to memory of 3088 2252 thttnn.exe vpvpd.exe PID 2252 wrote to memory of 3088 2252 thttnn.exe vpvpd.exe PID 2252 wrote to memory of 3088 2252 thttnn.exe vpvpd.exe PID 3088 wrote to memory of 4116 3088 vpvpd.exe fflfxxx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22c2c9a00d98dca419a0dd3285b1622eddf585b7e66d588d90d22ab70db80f64.exe"C:\Users\Admin\AppData\Local\Temp\22c2c9a00d98dca419a0dd3285b1622eddf585b7e66d588d90d22ab70db80f64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
\??\c:\jdjvv.exec:\jdjvv.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:996 -
\??\c:\fxlffff.exec:\fxlffff.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2124 -
\??\c:\hbnnhh.exec:\hbnnhh.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1884 -
\??\c:\hhhbth.exec:\hhhbth.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
\??\c:\llrxxff.exec:\llrxxff.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2992 -
\??\c:\9tnnnb.exec:\9tnnnb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
\??\c:\hhtnhh.exec:\hhtnhh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4168 -
\??\c:\pdjdv.exec:\pdjdv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
\??\c:\lflffxl.exec:\lflffxl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
\??\c:\htnttn.exec:\htnttn.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
\??\c:\vpvvp.exec:\vpvvp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
\??\c:\dvjpd.exec:\dvjpd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
\??\c:\lfxxlrx.exec:\lfxxlrx.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
\??\c:\bbbtbb.exec:\bbbtbb.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
\??\c:\bntnhb.exec:\bntnhb.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4728 -
\??\c:\ddjdv.exec:\ddjdv.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3508 -
\??\c:\xfxllrf.exec:\xfxllrf.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4828 -
\??\c:\bthbtb.exec:\bthbtb.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
\??\c:\bnttnh.exec:\bnttnh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
\??\c:\thttnn.exec:\thttnn.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
\??\c:\vpvpd.exec:\vpvpd.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3088 -
\??\c:\fflfxxx.exec:\fflfxxx.exe23⤵
- Executes dropped EXE
PID:4116 -
\??\c:\ntnbht.exec:\ntnbht.exe24⤵
- Executes dropped EXE
PID:880 -
\??\c:\ppjjj.exec:\ppjjj.exe25⤵
- Executes dropped EXE
PID:2588 -
\??\c:\vppdv.exec:\vppdv.exe26⤵
- Executes dropped EXE
PID:4100 -
\??\c:\flrlrrx.exec:\flrlrrx.exe27⤵
- Executes dropped EXE
PID:388 -
\??\c:\hntnhb.exec:\hntnhb.exe28⤵
- Executes dropped EXE
PID:2056 -
\??\c:\jjjvp.exec:\jjjvp.exe29⤵
- Executes dropped EXE
PID:2904 -
\??\c:\ttnntb.exec:\ttnntb.exe30⤵
- Executes dropped EXE
PID:5064 -
\??\c:\1pjdp.exec:\1pjdp.exe31⤵
- Executes dropped EXE
PID:740 -
\??\c:\vppdj.exec:\vppdj.exe32⤵
- Executes dropped EXE
PID:1652 -
\??\c:\xxxxxxr.exec:\xxxxxxr.exe33⤵
- Executes dropped EXE
PID:3528 -
\??\c:\hbnhnh.exec:\hbnhnh.exe34⤵
- Executes dropped EXE
PID:1944 -
\??\c:\vjjvp.exec:\vjjvp.exe35⤵
- Executes dropped EXE
PID:428 -
\??\c:\rrfrlrf.exec:\rrfrlrf.exe36⤵
- Executes dropped EXE
PID:1224 -
\??\c:\tntnbt.exec:\tntnbt.exe37⤵
- Executes dropped EXE
PID:4176 -
\??\c:\djvvv.exec:\djvvv.exe38⤵
- Executes dropped EXE
PID:1516 -
\??\c:\dvppd.exec:\dvppd.exe39⤵
- Executes dropped EXE
PID:4736 -
\??\c:\9lrlffx.exec:\9lrlffx.exe40⤵
- Executes dropped EXE
PID:1992 -
\??\c:\bttbbn.exec:\bttbbn.exe41⤵
- Executes dropped EXE
PID:3456 -
\??\c:\vdjdv.exec:\vdjdv.exe42⤵
- Executes dropped EXE
PID:4892 -
\??\c:\lfxrlff.exec:\lfxrlff.exe43⤵
- Executes dropped EXE
PID:1088 -
\??\c:\xxrlffx.exec:\xxrlffx.exe44⤵
- Executes dropped EXE
PID:3496 -
\??\c:\nntnhh.exec:\nntnhh.exe45⤵
- Executes dropped EXE
PID:3128 -
\??\c:\7bnhhb.exec:\7bnhhb.exe46⤵
- Executes dropped EXE
PID:1612 -
\??\c:\pvpjd.exec:\pvpjd.exe47⤵
- Executes dropped EXE
PID:1660 -
\??\c:\rrrxrlf.exec:\rrrxrlf.exe48⤵
- Executes dropped EXE
PID:1380 -
\??\c:\bbnhhh.exec:\bbnhhh.exe49⤵
- Executes dropped EXE
PID:4852 -
\??\c:\nbbtnh.exec:\nbbtnh.exe50⤵
- Executes dropped EXE
PID:956 -
\??\c:\1djdv.exec:\1djdv.exe51⤵
- Executes dropped EXE
PID:2420 -
\??\c:\jdpjv.exec:\jdpjv.exe52⤵
- Executes dropped EXE
PID:4992 -
\??\c:\nbhbnh.exec:\nbhbnh.exe53⤵
- Executes dropped EXE
PID:1000 -
\??\c:\dvjdd.exec:\dvjdd.exe54⤵
- Executes dropped EXE
PID:4324 -
\??\c:\9dddp.exec:\9dddp.exe55⤵
- Executes dropped EXE
PID:4920 -
\??\c:\rrllfff.exec:\rrllfff.exe56⤵
- Executes dropped EXE
PID:4024 -
\??\c:\httnnb.exec:\httnnb.exe57⤵
- Executes dropped EXE
PID:3664 -
\??\c:\vjpjv.exec:\vjpjv.exe58⤵
- Executes dropped EXE
PID:3376 -
\??\c:\pvddp.exec:\pvddp.exe59⤵
- Executes dropped EXE
PID:3324 -
\??\c:\9xffrlf.exec:\9xffrlf.exe60⤵
- Executes dropped EXE
PID:1008 -
\??\c:\rfllffx.exec:\rfllffx.exe61⤵
- Executes dropped EXE
PID:4796 -
\??\c:\7ttbtt.exec:\7ttbtt.exe62⤵
- Executes dropped EXE
PID:3184 -
\??\c:\nbhhtn.exec:\nbhhtn.exe63⤵
- Executes dropped EXE
PID:3656 -
\??\c:\jvpjd.exec:\jvpjd.exe64⤵
- Executes dropped EXE
PID:1636 -
\??\c:\lrrrlll.exec:\lrrrlll.exe65⤵
- Executes dropped EXE
PID:1560 -
\??\c:\rlllfff.exec:\rlllfff.exe66⤵PID:3084
-
\??\c:\5bhhbt.exec:\5bhhbt.exe67⤵PID:4348
-
\??\c:\5ntnnn.exec:\5ntnnn.exe68⤵PID:3320
-
\??\c:\vjppp.exec:\vjppp.exe69⤵PID:1060
-
\??\c:\lllxrrl.exec:\lllxrrl.exe70⤵PID:2200
-
\??\c:\5xxrllx.exec:\5xxrllx.exe71⤵PID:2760
-
\??\c:\bbhhbb.exec:\bbhhbb.exe72⤵PID:1240
-
\??\c:\jvpjv.exec:\jvpjv.exe73⤵PID:4212
-
\??\c:\jpvvj.exec:\jpvvj.exe74⤵PID:1820
-
\??\c:\llllxxr.exec:\llllxxr.exe75⤵PID:1712
-
\??\c:\frrrrrl.exec:\frrrrrl.exe76⤵PID:632
-
\??\c:\9nnhhh.exec:\9nnhhh.exe77⤵PID:716
-
\??\c:\jpppd.exec:\jpppd.exe78⤵PID:880
-
\??\c:\pvpjv.exec:\pvpjv.exe79⤵PID:948
-
\??\c:\rflfflr.exec:\rflfflr.exe80⤵PID:4632
-
\??\c:\7fxfxlx.exec:\7fxfxlx.exe81⤵PID:2392
-
\??\c:\htbbnn.exec:\htbbnn.exe82⤵PID:876
-
\??\c:\jddvp.exec:\jddvp.exe83⤵PID:528
-
\??\c:\7pjdv.exec:\7pjdv.exe84⤵PID:1532
-
\??\c:\ffffxxr.exec:\ffffxxr.exe85⤵PID:4924
-
\??\c:\ffxrlxr.exec:\ffxrlxr.exe86⤵PID:2172
-
\??\c:\nnbbhb.exec:\nnbbhb.exe87⤵PID:4236
-
\??\c:\1hhhbn.exec:\1hhhbn.exe88⤵PID:1652
-
\??\c:\ddddd.exec:\ddddd.exe89⤵PID:4464
-
\??\c:\dvvpd.exec:\dvvpd.exe90⤵PID:1944
-
\??\c:\rlrlxrl.exec:\rlrlxrl.exe91⤵PID:2912
-
\??\c:\hbbbtn.exec:\hbbbtn.exe92⤵PID:3104
-
\??\c:\htbnhh.exec:\htbnhh.exe93⤵PID:1052
-
\??\c:\nbtnhh.exec:\nbtnhh.exe94⤵PID:2080
-
\??\c:\7dppd.exec:\7dppd.exe95⤵PID:3844
-
\??\c:\fllxlxf.exec:\fllxlxf.exe96⤵PID:1516
-
\??\c:\lxxxllf.exec:\lxxxllf.exe97⤵PID:4572
-
\??\c:\1nbtbt.exec:\1nbtbt.exe98⤵PID:2472
-
\??\c:\bhnhbn.exec:\bhnhbn.exe99⤵PID:3932
-
\??\c:\3vpjv.exec:\3vpjv.exe100⤵PID:680
-
\??\c:\vpvvv.exec:\vpvvv.exe101⤵PID:4864
-
\??\c:\1lflffx.exec:\1lflffx.exe102⤵PID:700
-
\??\c:\tntnhh.exec:\tntnhh.exe103⤵PID:1660
-
\??\c:\nhtntn.exec:\nhtntn.exe104⤵PID:1884
-
\??\c:\9jpjv.exec:\9jpjv.exe105⤵PID:2460
-
\??\c:\1vdvj.exec:\1vdvj.exe106⤵PID:2548
-
\??\c:\lfxrxrl.exec:\lfxrxrl.exe107⤵PID:872
-
\??\c:\fxxrllf.exec:\fxxrllf.exe108⤵PID:4920
-
\??\c:\5hhhtn.exec:\5hhhtn.exe109⤵PID:3452
-
\??\c:\5btnnn.exec:\5btnnn.exe110⤵PID:3664
-
\??\c:\ddjjv.exec:\ddjjv.exe111⤵PID:4896
-
\??\c:\dpppd.exec:\dpppd.exe112⤵PID:3232
-
\??\c:\7flfrlx.exec:\7flfrlx.exe113⤵PID:1644
-
\??\c:\hthhhh.exec:\hthhhh.exe114⤵PID:1956
-
\??\c:\1pvvv.exec:\1pvvv.exe115⤵PID:1484
-
\??\c:\xlrlxxr.exec:\xlrlxxr.exe116⤵PID:3716
-
\??\c:\bbttbb.exec:\bbttbb.exe117⤵PID:4856
-
\??\c:\nhbtnh.exec:\nhbtnh.exe118⤵PID:2740
-
\??\c:\dpjpd.exec:\dpjpd.exe119⤵PID:4460
-
\??\c:\jvjvj.exec:\jvjvj.exe120⤵PID:4828
-
\??\c:\jpvpj.exec:\jpvpj.exe121⤵PID:3912
-
\??\c:\pjjvd.exec:\pjjvd.exe122⤵PID:2212
-
\??\c:\rlfxrlf.exec:\rlfxrlf.exe123⤵PID:1492
-
\??\c:\nbnttn.exec:\nbnttn.exe124⤵PID:2764
-
\??\c:\nttthh.exec:\nttthh.exe125⤵PID:2412
-
\??\c:\5djdd.exec:\5djdd.exe126⤵PID:2936
-
\??\c:\7rfxrxl.exec:\7rfxrxl.exe127⤵PID:2072
-
\??\c:\fxfxrrr.exec:\fxfxrrr.exe128⤵PID:780
-
\??\c:\7tbbtt.exec:\7tbbtt.exe129⤵PID:880
-
\??\c:\nntthh.exec:\nntthh.exe130⤵PID:948
-
\??\c:\vpvdp.exec:\vpvdp.exe131⤵PID:4100
-
\??\c:\jvvpp.exec:\jvvpp.exe132⤵PID:764
-
\??\c:\flrrfxl.exec:\flrrfxl.exe133⤵PID:2056
-
\??\c:\tthtbt.exec:\tthtbt.exe134⤵PID:1232
-
\??\c:\vvjvp.exec:\vvjvp.exe135⤵PID:972
-
\??\c:\xrrlfxx.exec:\xrrlfxx.exe136⤵PID:1016
-
\??\c:\1bbbhn.exec:\1bbbhn.exe137⤵PID:5008
-
\??\c:\jvdvv.exec:\jvdvv.exe138⤵PID:3840
-
\??\c:\lxrlllf.exec:\lxrlllf.exe139⤵PID:1196
-
\??\c:\fxfxrlf.exec:\fxfxrlf.exe140⤵PID:4064
-
\??\c:\nntntt.exec:\nntntt.exe141⤵PID:4020
-
\??\c:\dpjdv.exec:\dpjdv.exe142⤵PID:428
-
\??\c:\lrlfxxr.exec:\lrlfxxr.exe143⤵PID:448
-
\??\c:\9nttnh.exec:\9nttnh.exe144⤵PID:4160
-
\??\c:\btnhtt.exec:\btnhtt.exe145⤵PID:2324
-
\??\c:\vvvvp.exec:\vvvvp.exe146⤵PID:2280
-
\??\c:\fffxllx.exec:\fffxllx.exe147⤵PID:3040
-
\??\c:\frffxrx.exec:\frffxrx.exe148⤵PID:2232
-
\??\c:\hhnhtn.exec:\hhnhtn.exe149⤵PID:3968
-
\??\c:\ddjdv.exec:\ddjdv.exe150⤵PID:4532
-
\??\c:\7lxlfxr.exec:\7lxlfxr.exe151⤵PID:4500
-
\??\c:\xxfrlxr.exec:\xxfrlxr.exe152⤵PID:1676
-
\??\c:\thhttt.exec:\thhttt.exe153⤵PID:3748
-
\??\c:\9bhntn.exec:\9bhntn.exe154⤵PID:1452
-
\??\c:\djjjd.exec:\djjjd.exe155⤵PID:1524
-
\??\c:\bbbttt.exec:\bbbttt.exe156⤵PID:2992
-
\??\c:\nnbnhh.exec:\nnbnhh.exe157⤵PID:1096
-
\??\c:\xfrrllf.exec:\xfrrllf.exe158⤵PID:4168
-
\??\c:\rrxrxrr.exec:\rrxrxrr.exe159⤵PID:3916
-
\??\c:\bhbthb.exec:\bhbthb.exe160⤵PID:2084
-
\??\c:\jpvvp.exec:\jpvvp.exe161⤵PID:3488
-
\??\c:\rrlffll.exec:\rrlffll.exe162⤵PID:2808
-
\??\c:\xfffxfx.exec:\xfffxfx.exe163⤵PID:816
-
\??\c:\nbbbbt.exec:\nbbbbt.exe164⤵PID:4872
-
\??\c:\nnnnhh.exec:\nnnnhh.exe165⤵PID:4912
-
\??\c:\vvjdv.exec:\vvjdv.exe166⤵PID:1964
-
\??\c:\jvvpd.exec:\jvvpd.exe167⤵PID:4156
-
\??\c:\rxlfrrl.exec:\rxlfrrl.exe168⤵PID:4792
-
\??\c:\nhbthh.exec:\nhbthh.exe169⤵PID:4488
-
\??\c:\tnbttt.exec:\tnbttt.exe170⤵PID:4616
-
\??\c:\3vppp.exec:\3vppp.exe171⤵PID:2844
-
\??\c:\lxrfrrl.exec:\lxrfrrl.exe172⤵PID:2796
-
\??\c:\bhhnhn.exec:\bhhnhn.exe173⤵PID:2716
-
\??\c:\vjppd.exec:\vjppd.exe174⤵PID:4112
-
\??\c:\5dvpj.exec:\5dvpj.exe175⤵PID:1856
-
\??\c:\xfrrrlf.exec:\xfrrrlf.exe176⤵PID:2936
-
\??\c:\5lfxxxr.exec:\5lfxxxr.exe177⤵PID:2072
-
\??\c:\nbbnnn.exec:\nbbnnn.exe178⤵PID:4640
-
\??\c:\vvppj.exec:\vvppj.exe179⤵PID:1680
-
\??\c:\ddddv.exec:\ddddv.exe180⤵PID:4904
-
\??\c:\fxxxlfx.exec:\fxxxlfx.exe181⤵PID:4040
-
\??\c:\bhhbnn.exec:\bhhbnn.exe182⤵PID:5028
-
\??\c:\jdjdv.exec:\jdjdv.exe183⤵PID:4360
-
\??\c:\3vvvj.exec:\3vvvj.exe184⤵PID:3548
-
\??\c:\ppdvp.exec:\ppdvp.exe185⤵PID:4528
-
\??\c:\rffxfrf.exec:\rffxfrf.exe186⤵PID:1016
-
\??\c:\rxrlxxr.exec:\rxrlxxr.exe187⤵PID:4848
-
\??\c:\nbhbtn.exec:\nbhbtn.exe188⤵PID:3564
-
\??\c:\vvvpp.exec:\vvvpp.exe189⤵PID:4524
-
\??\c:\dvdvd.exec:\dvdvd.exe190⤵PID:4432
-
\??\c:\rlxrrll.exec:\rlxrrll.exe191⤵PID:1224
-
\??\c:\lffxffl.exec:\lffxffl.exe192⤵PID:448
-
\??\c:\xxxrfxf.exec:\xxxrfxf.exe193⤵PID:1256
-
\??\c:\nhnhhh.exec:\nhnhhh.exe194⤵PID:2280
-
\??\c:\ntnnbb.exec:\ntnnbb.exe195⤵PID:1992
-
\??\c:\jvpdv.exec:\jvpdv.exe196⤵PID:2188
-
\??\c:\rrxxxxr.exec:\rrxxxxr.exe197⤵PID:4512
-
\??\c:\xrfxxxx.exec:\xrfxxxx.exe198⤵PID:2124
-
\??\c:\bbttnb.exec:\bbttnb.exe199⤵PID:4788
-
\??\c:\1hhhbt.exec:\1hhhbt.exe200⤵PID:3448
-
\??\c:\vvddp.exec:\vvddp.exe201⤵PID:3276
-
\??\c:\ddpdp.exec:\ddpdp.exe202⤵PID:1392
-
\??\c:\fxlllfx.exec:\fxlllfx.exe203⤵PID:2332
-
\??\c:\rlxlxrf.exec:\rlxlxrf.exe204⤵PID:3292
-
\??\c:\nbbtth.exec:\nbbtth.exe205⤵PID:3944
-
\??\c:\vvjdp.exec:\vvjdp.exe206⤵PID:3324
-
\??\c:\xrxrfxl.exec:\xrxrfxl.exe207⤵PID:1072
-
\??\c:\xfflflr.exec:\xfflflr.exe208⤵PID:1476
-
\??\c:\3xrrlfx.exec:\3xrrlfx.exe209⤵PID:4964
-
\??\c:\hnnhhb.exec:\hnnhhb.exe210⤵PID:1964
-
\??\c:\htthnh.exec:\htthnh.exe211⤵PID:4880
-
\??\c:\3ddpd.exec:\3ddpd.exe212⤵PID:1364
-
\??\c:\vddvp.exec:\vddvp.exe213⤵PID:4484
-
\??\c:\pvjdp.exec:\pvjdp.exe214⤵PID:2212
-
\??\c:\xrlflfr.exec:\xrlflfr.exe215⤵PID:3144
-
\??\c:\lxfxxrx.exec:\lxfxxrx.exe216⤵PID:1076
-
\??\c:\bthhnn.exec:\bthhnn.exe217⤵PID:1104
-
\??\c:\thhtnh.exec:\thhtnh.exe218⤵PID:5068
-
\??\c:\pppjd.exec:\pppjd.exe219⤵PID:2936
-
\??\c:\5rfffff.exec:\5rfffff.exe220⤵PID:880
-
\??\c:\3llfffr.exec:\3llfffr.exe221⤵PID:2768
-
\??\c:\bttttt.exec:\bttttt.exe222⤵PID:4548
-
\??\c:\bhhbhh.exec:\bhhbhh.exe223⤵PID:4100
-
\??\c:\jvjjj.exec:\jvjjj.exe224⤵PID:528
-
\??\c:\dvdpd.exec:\dvdpd.exe225⤵PID:3220
-
\??\c:\rlrfllf.exec:\rlrfllf.exe226⤵PID:1232
-
\??\c:\lxlflfl.exec:\lxlflfl.exe227⤵PID:3832
-
\??\c:\llfrllf.exec:\llfrllf.exe228⤵PID:2920
-
\??\c:\tbttbt.exec:\tbttbt.exe229⤵PID:4236
-
\??\c:\nntbtb.exec:\nntbtb.exe230⤵PID:3840
-
\??\c:\pjjpv.exec:\pjjpv.exe231⤵PID:4464
-
\??\c:\jddpd.exec:\jddpd.exe232⤵PID:4064
-
\??\c:\frrlffx.exec:\frrlffx.exe233⤵PID:1916
-
\??\c:\fxrrlfx.exec:\fxrrlfx.exe234⤵PID:1224
-
\??\c:\bthbtt.exec:\bthbtt.exe235⤵PID:1516
-
\??\c:\5djjv.exec:\5djjv.exe236⤵PID:1132
-
\??\c:\jjppd.exec:\jjppd.exe237⤵PID:4268
-
\??\c:\rfxrlfx.exec:\rfxrlfx.exe238⤵PID:3968
-
\??\c:\fxffxxr.exec:\fxffxxr.exe239⤵PID:3932
-
\??\c:\thnhbb.exec:\thnhbb.exe240⤵PID:4500
-
\??\c:\tnbthb.exec:\tnbthb.exe241⤵PID:3128
-
\??\c:\pddvj.exec:\pddvj.exe242⤵PID:700