Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3lslt(BMFor...��.htm
windows7-x64
1lslt(BMFor...��.htm
windows10-2004-x64
1BMForum.exe
windows7-x64
1BMForum.exe
windows10-2004-x64
1lsmf.exe
windows7-x64
1lsmf.exe
windows10-2004-x64
1BMF.exe
windows7-x64
1BMF.exe
windows10-2004-x64
1cygwin1.dll
windows7-x64
3cygwin1.dll
windows10-2004-x64
3lslt(BMFor...um.exe
windows7-x64
1lslt(BMFor...um.exe
windows10-2004-x64
1lslt(BMFor...��.url
windows7-x64
1lslt(BMFor...��.url
windows10-2004-x64
1Analysis
-
max time kernel
131s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2024, 12:19
Static task
static1
Behavioral task
behavioral1
Sample
lslt(BMForum)ldly/lslt(BMForum)ldly/77169.org˵.htm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
lslt(BMForum)ldly/lslt(BMForum)ldly/77169.org˵.htm
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
BMForum.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
BMForum.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
lsmf.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
lsmf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
BMF.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
BMF.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
cygwin1.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
cygwin1.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
lslt(BMForum)ldly/lslt(BMForum)ldly/BMForum.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
lslt(BMForum)ldly/lslt(BMForum)ldly/BMForum.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
lslt(BMForum)ldly/lslt(BMForum)ldly/ĺڿͬ.url
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
lslt(BMForum)ldly/lslt(BMForum)ldly/ĺڿͬ.url
Resource
win10v2004-20240508-en
General
-
Target
BMF.exe
-
Size
22KB
-
MD5
70a61a711113f673bf8349d01ffbe6be
-
SHA1
e7f771b349d8cdd51e015bceb34317dac947756a
-
SHA256
5f2418afecede066b1ae30a16bb55954499e04378c56bb2bfb99aa68e0fd7419
-
SHA512
2402eaf882ca06508abf494df6078b398afea5b2613c87543bb51aa8c5e1d2ba696770b8a42b549f555e351f7931acec7b6f3293c4355e35722335475666b9cd
-
SSDEEP
384:u/DA+FuIF/dOvmwszF/FNFzFzFyFwF1FwsFjnFN6FcF0gvwsf2aoCrRqC:uDXPzF/FNFzFzFyFwF1FJjnFN6FcF0YB
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 1896 2008 BMF.exe 83 PID 2008 wrote to memory of 1896 2008 BMF.exe 83 PID 2008 wrote to memory of 1896 2008 BMF.exe 83 PID 1896 wrote to memory of 4296 1896 BMF.exe 84 PID 1896 wrote to memory of 4296 1896 BMF.exe 84 PID 1896 wrote to memory of 4296 1896 BMF.exe 84 PID 4296 wrote to memory of 388 4296 BMF.exe 85 PID 4296 wrote to memory of 388 4296 BMF.exe 85 PID 4296 wrote to memory of 388 4296 BMF.exe 85 PID 388 wrote to memory of 4340 388 BMF.exe 86 PID 388 wrote to memory of 4340 388 BMF.exe 86 PID 388 wrote to memory of 4340 388 BMF.exe 86 PID 4340 wrote to memory of 440 4340 BMF.exe 87 PID 4340 wrote to memory of 440 4340 BMF.exe 87 PID 4340 wrote to memory of 440 4340 BMF.exe 87 PID 440 wrote to memory of 1308 440 BMF.exe 88 PID 440 wrote to memory of 1308 440 BMF.exe 88 PID 440 wrote to memory of 1308 440 BMF.exe 88 PID 1308 wrote to memory of 772 1308 BMF.exe 89 PID 1308 wrote to memory of 772 1308 BMF.exe 89 PID 1308 wrote to memory of 772 1308 BMF.exe 89 PID 772 wrote to memory of 64 772 BMF.exe 90 PID 772 wrote to memory of 64 772 BMF.exe 90 PID 772 wrote to memory of 64 772 BMF.exe 90 PID 64 wrote to memory of 3296 64 BMF.exe 91 PID 64 wrote to memory of 3296 64 BMF.exe 91 PID 64 wrote to memory of 3296 64 BMF.exe 91 PID 3296 wrote to memory of 4712 3296 BMF.exe 92 PID 3296 wrote to memory of 4712 3296 BMF.exe 92 PID 3296 wrote to memory of 4712 3296 BMF.exe 92 PID 4712 wrote to memory of 3372 4712 BMF.exe 93 PID 4712 wrote to memory of 3372 4712 BMF.exe 93 PID 4712 wrote to memory of 3372 4712 BMF.exe 93 PID 3372 wrote to memory of 2620 3372 BMF.exe 94 PID 3372 wrote to memory of 2620 3372 BMF.exe 94 PID 3372 wrote to memory of 2620 3372 BMF.exe 94 PID 2620 wrote to memory of 4416 2620 BMF.exe 95 PID 2620 wrote to memory of 4416 2620 BMF.exe 95 PID 2620 wrote to memory of 4416 2620 BMF.exe 95 PID 4416 wrote to memory of 4508 4416 BMF.exe 96 PID 4416 wrote to memory of 4508 4416 BMF.exe 96 PID 4416 wrote to memory of 4508 4416 BMF.exe 96 PID 4508 wrote to memory of 4932 4508 BMF.exe 97 PID 4508 wrote to memory of 4932 4508 BMF.exe 97 PID 4508 wrote to memory of 4932 4508 BMF.exe 97 PID 4932 wrote to memory of 2912 4932 BMF.exe 98 PID 4932 wrote to memory of 2912 4932 BMF.exe 98 PID 4932 wrote to memory of 2912 4932 BMF.exe 98 PID 2912 wrote to memory of 1152 2912 BMF.exe 99 PID 2912 wrote to memory of 1152 2912 BMF.exe 99 PID 2912 wrote to memory of 1152 2912 BMF.exe 99 PID 1152 wrote to memory of 1932 1152 BMF.exe 100 PID 1152 wrote to memory of 1932 1152 BMF.exe 100 PID 1152 wrote to memory of 1932 1152 BMF.exe 100 PID 1932 wrote to memory of 2120 1932 BMF.exe 101 PID 1932 wrote to memory of 2120 1932 BMF.exe 101 PID 1932 wrote to memory of 2120 1932 BMF.exe 101 PID 2120 wrote to memory of 2036 2120 BMF.exe 102 PID 2120 wrote to memory of 2036 2120 BMF.exe 102 PID 2120 wrote to memory of 2036 2120 BMF.exe 102 PID 2036 wrote to memory of 1352 2036 BMF.exe 103 PID 2036 wrote to memory of 1352 2036 BMF.exe 103 PID 2036 wrote to memory of 1352 2036 BMF.exe 103 PID 1352 wrote to memory of 4864 1352 BMF.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"9⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"10⤵
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"11⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"12⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"13⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"14⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"15⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"16⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"17⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"18⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"19⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"20⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"21⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"22⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"23⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"24⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"25⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"26⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"27⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"28⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"29⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"30⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"31⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"32⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"33⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"34⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"35⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"36⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"37⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"38⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"39⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"40⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"41⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"42⤵PID:5060
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"43⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"44⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"45⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"46⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"47⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"48⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"49⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"50⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"51⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"52⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"53⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"54⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"55⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"56⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"57⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"58⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"59⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"60⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"61⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"62⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"63⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"64⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"65⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"66⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"67⤵PID:4896
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"68⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"69⤵PID:3524
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"70⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"71⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"72⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"73⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"74⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"75⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"76⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"77⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"78⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"79⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"80⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"81⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"82⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"83⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"84⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"85⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"86⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"87⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"88⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"89⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"90⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"91⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"92⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"93⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"94⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"95⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"96⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"97⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"98⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"99⤵PID:3092
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"100⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"101⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"102⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"103⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"104⤵PID:5132
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"105⤵PID:5152
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"106⤵PID:5168
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"107⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"108⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"109⤵PID:5220
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"110⤵PID:5236
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"111⤵PID:5252
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"112⤵PID:5264
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"113⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"114⤵PID:5296
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"115⤵PID:5312
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"116⤵PID:5328
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"117⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"118⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"119⤵PID:5380
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"120⤵PID:5392
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"121⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\BMF.exe"C:\Users\Admin\AppData\Local\Temp\BMF.exe"122⤵PID:5428
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-