Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 20:44
Behavioral task
behavioral1
Sample
52e88d59c2320ee0f97d9c3b64bbca90N.exe
Resource
win7-20240705-en
windows7-x64
6 signatures
120 seconds
General
-
Target
52e88d59c2320ee0f97d9c3b64bbca90N.exe
-
Size
91KB
-
MD5
52e88d59c2320ee0f97d9c3b64bbca90
-
SHA1
84eff3699ff55bc6ce73069734d0dad87dd01d80
-
SHA256
f5bc269a4a3d7fc960e6a0b553bab7a31352f5d4ea7e8a3b1ff0754e2afd754f
-
SHA512
4eafdeec83adbc680e016fcf55b9a26bc598d823d05afe50bdcbedee38e782598f4b943e670cfd01ccba5f12bb91beba17ab5598d3c627b2ef6720c1cdca6b9b
-
SSDEEP
1536:9vQBeOGtrYS3srx93UBWfwC6Ggnouy8yaVskCzYBQi37bF+fZlwC:9hOmTsF93UYfwC6GIoutyaVszji3vFoB
Malware Config
Signatures
-
Detect Blackmoon payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2148-7-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2080-11-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3020-27-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/756-44-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2756-54-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2884-63-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2848-80-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2808-90-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2612-92-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1880-108-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3040-116-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/324-126-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1828-129-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1164-145-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1660-169-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1728-178-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1956-211-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1688-237-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1512-278-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1600-293-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3020-313-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2732-339-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1484-376-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1880-389-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3040-396-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/1740-495-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2876-581-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2344-594-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2644-619-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/776-668-0x0000000000220000-0x0000000000247000-memory.dmp family_blackmoon behavioral1/memory/1872-796-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2064-909-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2496-971-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/3060-1131-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon behavioral1/memory/2372-1189-0x0000000000400000-0x0000000000427000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
ppjpd.exerxxfxlx.exevjdvj.exetnbbtn.exehhbbnb.exerrrlxxr.exebbthtb.exedjdpp.exefflxlrl.exebnbttt.exenbntbb.exe9dvdj.exerrlrrxl.exebbhnhn.exepjvjd.exevpjjp.exerflxlxx.exetnhhtt.exejdvdd.exevvpjj.exeffxlxfx.exetnhntt.exe7pdpj.exepjvpp.exenhhthh.exehbnnhn.exepvdvp.exellfrxrf.exetnnhbn.exepvppp.exexxrflxx.exexxrlxlr.exe1tbttt.exe3vvjj.exe7pvdv.exexffrfxl.exehhtnhn.exevvjjp.exexlfxrlf.exetbhbhb.exe9bbtbn.exe7pjvj.exerlxffxf.exennhntn.exeppdvd.exe7vjdj.exe7lrrrxx.exebhnthn.exetnhtbn.exedvvpj.exe1xrlxlr.exe1rlxlll.exetnhntb.exenhnnbn.exepvjdd.exejvpjv.exellrxrll.exetnhhbh.exepvpjj.exe7rflffx.exeffffrll.exehbbnbh.exeddvpj.exefxrxflx.exepid process 2080 ppjpd.exe 3020 rxxfxlx.exe 2380 vjdvj.exe 756 tnbbtn.exe 2756 hhbbnb.exe 2884 rrrlxxr.exe 2348 bbthtb.exe 2848 djdpp.exe 2808 fflxlrl.exe 2612 bnbttt.exe 1880 nbntbb.exe 3040 9dvdj.exe 324 rrlrrxl.exe 1828 bbhnhn.exe 1840 pjvjd.exe 1164 vpjjp.exe 2604 rflxlxx.exe 1660 tnhhtt.exe 1728 jdvdd.exe 3048 vvpjj.exe 2296 ffxlxfx.exe 2244 tnhntt.exe 1956 7pdpj.exe 352 pjvpp.exe 2444 nhhthh.exe 1688 hbnnhn.exe 1864 pvdvp.exe 2352 llfrxrf.exe 560 tnnhbn.exe 1296 pvppp.exe 1512 xxrflxx.exe 2272 xxrlxlr.exe 1600 1tbttt.exe 2412 3vvjj.exe 3008 7pvdv.exe 3020 xffrfxl.exe 2708 hhtnhn.exe 536 vvjjp.exe 2840 xlfxrlf.exe 2756 tbhbhb.exe 2732 9bbtbn.exe 2652 7pjvj.exe 2912 rlxffxf.exe 2664 nnhntn.exe 2672 ppdvd.exe 2660 7vjdj.exe 1484 7lrrrxx.exe 1880 bhnthn.exe 3040 tnhtbn.exe 1376 dvvpj.exe 2892 1xrlxlr.exe 1636 1rlxlll.exe 1824 tnhntb.exe 2684 nhnnbn.exe 2440 pvjdd.exe 316 jvpjv.exe 1680 llrxrll.exe 3064 tnhhbh.exe 2208 pvpjj.exe 2436 7rflffx.exe 2480 ffffrll.exe 948 hbbnbh.exe 1956 ddvpj.exe 2976 fxrxflx.exe -
Processes:
resource yara_rule behavioral1/memory/2148-0-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ppjpd.exe upx behavioral1/memory/2148-7-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2080-11-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rxxfxlx.exe upx behavioral1/memory/3020-24-0x0000000000220000-0x0000000000247000-memory.dmp upx behavioral1/memory/3020-27-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2380-28-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\vjdvj.exe upx C:\tnbbtn.exe upx behavioral1/memory/756-44-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\hhbbnb.exe upx C:\rrrlxxr.exe upx behavioral1/memory/2756-54-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2884-63-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bbthtb.exe upx C:\djdpp.exe upx behavioral1/memory/2848-72-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2848-80-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\fflxlrl.exe upx C:\bnbttt.exe upx behavioral1/memory/2808-90-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2612-92-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nbntbb.exe upx C:\9dvdj.exe upx behavioral1/memory/1880-108-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rrlrrxl.exe upx behavioral1/memory/3040-116-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\bbhnhn.exe upx behavioral1/memory/324-126-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1828-129-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pjvjd.exe upx C:\vpjjp.exe upx behavioral1/memory/1164-145-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\rflxlxx.exe upx C:\tnhhtt.exe upx behavioral1/memory/1660-169-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\jdvdd.exe upx C:\vvpjj.exe upx behavioral1/memory/1728-178-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\ffxlxfx.exe upx C:\tnhntt.exe upx behavioral1/memory/2244-195-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\7pdpj.exe upx C:\pjvpp.exe upx behavioral1/memory/352-214-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1956-211-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\nhhthh.exe upx C:\hbnnhn.exe upx behavioral1/memory/1688-237-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\pvdvp.exe upx C:\llfrxrf.exe upx C:\tnnhbn.exe upx C:\pvppp.exe upx C:\xxrflxx.exe upx behavioral1/memory/1512-278-0x0000000000400000-0x0000000000427000-memory.dmp upx C:\xxrlxlr.exe upx behavioral1/memory/1600-293-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3008-300-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/3020-313-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/536-320-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/2732-339-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1484-376-0x0000000000400000-0x0000000000427000-memory.dmp upx behavioral1/memory/1880-389-0x0000000000400000-0x0000000000427000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
xxxflrf.exetnhhtt.exeffxxrll.exexfxlflf.exejjdpd.exedpdvd.exellffrrf.exe7dvvp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhhtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxxrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxlflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjdpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llffrrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dvvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
52e88d59c2320ee0f97d9c3b64bbca90N.exeppjpd.exerxxfxlx.exevjdvj.exetnbbtn.exehhbbnb.exerrrlxxr.exebbthtb.exedjdpp.exefflxlrl.exebnbttt.exenbntbb.exe9dvdj.exerrlrrxl.exebbhnhn.exepjvjd.exedescription pid process target process PID 2148 wrote to memory of 2080 2148 52e88d59c2320ee0f97d9c3b64bbca90N.exe ppjpd.exe PID 2148 wrote to memory of 2080 2148 52e88d59c2320ee0f97d9c3b64bbca90N.exe ppjpd.exe PID 2148 wrote to memory of 2080 2148 52e88d59c2320ee0f97d9c3b64bbca90N.exe ppjpd.exe PID 2148 wrote to memory of 2080 2148 52e88d59c2320ee0f97d9c3b64bbca90N.exe ppjpd.exe PID 2080 wrote to memory of 3020 2080 ppjpd.exe rxxfxlx.exe PID 2080 wrote to memory of 3020 2080 ppjpd.exe rxxfxlx.exe PID 2080 wrote to memory of 3020 2080 ppjpd.exe rxxfxlx.exe PID 2080 wrote to memory of 3020 2080 ppjpd.exe rxxfxlx.exe PID 3020 wrote to memory of 2380 3020 rxxfxlx.exe vjdvj.exe PID 3020 wrote to memory of 2380 3020 rxxfxlx.exe vjdvj.exe PID 3020 wrote to memory of 2380 3020 rxxfxlx.exe vjdvj.exe PID 3020 wrote to memory of 2380 3020 rxxfxlx.exe vjdvj.exe PID 2380 wrote to memory of 756 2380 vjdvj.exe tnbbtn.exe PID 2380 wrote to memory of 756 2380 vjdvj.exe tnbbtn.exe PID 2380 wrote to memory of 756 2380 vjdvj.exe tnbbtn.exe PID 2380 wrote to memory of 756 2380 vjdvj.exe tnbbtn.exe PID 756 wrote to memory of 2756 756 tnbbtn.exe hhbbnb.exe PID 756 wrote to memory of 2756 756 tnbbtn.exe hhbbnb.exe PID 756 wrote to memory of 2756 756 tnbbtn.exe hhbbnb.exe PID 756 wrote to memory of 2756 756 tnbbtn.exe hhbbnb.exe PID 2756 wrote to memory of 2884 2756 hhbbnb.exe rrrlxxr.exe PID 2756 wrote to memory of 2884 2756 hhbbnb.exe rrrlxxr.exe PID 2756 wrote to memory of 2884 2756 hhbbnb.exe rrrlxxr.exe PID 2756 wrote to memory of 2884 2756 hhbbnb.exe rrrlxxr.exe PID 2884 wrote to memory of 2348 2884 rrrlxxr.exe bbthtb.exe PID 2884 wrote to memory of 2348 2884 rrrlxxr.exe bbthtb.exe PID 2884 wrote to memory of 2348 2884 rrrlxxr.exe bbthtb.exe PID 2884 wrote to memory of 2348 2884 rrrlxxr.exe bbthtb.exe PID 2348 wrote to memory of 2848 2348 bbthtb.exe djdpp.exe PID 2348 wrote to memory of 2848 2348 bbthtb.exe djdpp.exe PID 2348 wrote to memory of 2848 2348 bbthtb.exe djdpp.exe PID 2348 wrote to memory of 2848 2348 bbthtb.exe djdpp.exe PID 2848 wrote to memory of 2808 2848 djdpp.exe fflxlrl.exe PID 2848 wrote to memory of 2808 2848 djdpp.exe fflxlrl.exe PID 2848 wrote to memory of 2808 2848 djdpp.exe fflxlrl.exe PID 2848 wrote to memory of 2808 2848 djdpp.exe fflxlrl.exe PID 2808 wrote to memory of 2612 2808 fflxlrl.exe bnbttt.exe PID 2808 wrote to memory of 2612 2808 fflxlrl.exe bnbttt.exe PID 2808 wrote to memory of 2612 2808 fflxlrl.exe bnbttt.exe PID 2808 wrote to memory of 2612 2808 fflxlrl.exe bnbttt.exe PID 2612 wrote to memory of 1880 2612 bnbttt.exe nbntbb.exe PID 2612 wrote to memory of 1880 2612 bnbttt.exe nbntbb.exe PID 2612 wrote to memory of 1880 2612 bnbttt.exe nbntbb.exe PID 2612 wrote to memory of 1880 2612 bnbttt.exe nbntbb.exe PID 1880 wrote to memory of 3040 1880 nbntbb.exe 9dvdj.exe PID 1880 wrote to memory of 3040 1880 nbntbb.exe 9dvdj.exe PID 1880 wrote to memory of 3040 1880 nbntbb.exe 9dvdj.exe PID 1880 wrote to memory of 3040 1880 nbntbb.exe 9dvdj.exe PID 3040 wrote to memory of 324 3040 9dvdj.exe rrlrrxl.exe PID 3040 wrote to memory of 324 3040 9dvdj.exe rrlrrxl.exe PID 3040 wrote to memory of 324 3040 9dvdj.exe rrlrrxl.exe PID 3040 wrote to memory of 324 3040 9dvdj.exe rrlrrxl.exe PID 324 wrote to memory of 1828 324 rrlrrxl.exe bbhnhn.exe PID 324 wrote to memory of 1828 324 rrlrrxl.exe bbhnhn.exe PID 324 wrote to memory of 1828 324 rrlrrxl.exe bbhnhn.exe PID 324 wrote to memory of 1828 324 rrlrrxl.exe bbhnhn.exe PID 1828 wrote to memory of 1840 1828 bbhnhn.exe pjvjd.exe PID 1828 wrote to memory of 1840 1828 bbhnhn.exe pjvjd.exe PID 1828 wrote to memory of 1840 1828 bbhnhn.exe pjvjd.exe PID 1828 wrote to memory of 1840 1828 bbhnhn.exe pjvjd.exe PID 1840 wrote to memory of 1164 1840 pjvjd.exe vpjjp.exe PID 1840 wrote to memory of 1164 1840 pjvjd.exe vpjjp.exe PID 1840 wrote to memory of 1164 1840 pjvjd.exe vpjjp.exe PID 1840 wrote to memory of 1164 1840 pjvjd.exe vpjjp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\52e88d59c2320ee0f97d9c3b64bbca90N.exe"C:\Users\Admin\AppData\Local\Temp\52e88d59c2320ee0f97d9c3b64bbca90N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
\??\c:\ppjpd.exec:\ppjpd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
\??\c:\rxxfxlx.exec:\rxxfxlx.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
\??\c:\vjdvj.exec:\vjdvj.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
\??\c:\tnbbtn.exec:\tnbbtn.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
\??\c:\hhbbnb.exec:\hhbbnb.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
\??\c:\rrrlxxr.exec:\rrrlxxr.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
\??\c:\bbthtb.exec:\bbthtb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\djdpp.exec:\djdpp.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2848 -
\??\c:\fflxlrl.exec:\fflxlrl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
\??\c:\bnbttt.exec:\bnbttt.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\nbntbb.exec:\nbntbb.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
\??\c:\9dvdj.exec:\9dvdj.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3040 -
\??\c:\rrlrrxl.exec:\rrlrrxl.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:324 -
\??\c:\bbhnhn.exec:\bbhnhn.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1828 -
\??\c:\pjvjd.exec:\pjvjd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1840 -
\??\c:\vpjjp.exec:\vpjjp.exe17⤵
- Executes dropped EXE
PID:1164 -
\??\c:\rflxlxx.exec:\rflxlxx.exe18⤵
- Executes dropped EXE
PID:2604 -
\??\c:\tnhhtt.exec:\tnhhtt.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1660 -
\??\c:\jdvdd.exec:\jdvdd.exe20⤵
- Executes dropped EXE
PID:1728 -
\??\c:\vvpjj.exec:\vvpjj.exe21⤵
- Executes dropped EXE
PID:3048 -
\??\c:\ffxlxfx.exec:\ffxlxfx.exe22⤵
- Executes dropped EXE
PID:2296 -
\??\c:\tnhntt.exec:\tnhntt.exe23⤵
- Executes dropped EXE
PID:2244 -
\??\c:\7pdpj.exec:\7pdpj.exe24⤵
- Executes dropped EXE
PID:1956 -
\??\c:\pjvpp.exec:\pjvpp.exe25⤵
- Executes dropped EXE
PID:352 -
\??\c:\nhhthh.exec:\nhhthh.exe26⤵
- Executes dropped EXE
PID:2444 -
\??\c:\hbnnhn.exec:\hbnnhn.exe27⤵
- Executes dropped EXE
PID:1688 -
\??\c:\pvdvp.exec:\pvdvp.exe28⤵
- Executes dropped EXE
PID:1864 -
\??\c:\llfrxrf.exec:\llfrxrf.exe29⤵
- Executes dropped EXE
PID:2352 -
\??\c:\tnnhbn.exec:\tnnhbn.exe30⤵
- Executes dropped EXE
PID:560 -
\??\c:\pvppp.exec:\pvppp.exe31⤵
- Executes dropped EXE
PID:1296 -
\??\c:\xxrflxx.exec:\xxrflxx.exe32⤵
- Executes dropped EXE
PID:1512 -
\??\c:\xxrlxlr.exec:\xxrlxlr.exe33⤵
- Executes dropped EXE
PID:2272 -
\??\c:\1tbttt.exec:\1tbttt.exe34⤵
- Executes dropped EXE
PID:1600 -
\??\c:\3vvjj.exec:\3vvjj.exe35⤵
- Executes dropped EXE
PID:2412 -
\??\c:\7pvdv.exec:\7pvdv.exe36⤵
- Executes dropped EXE
PID:3008 -
\??\c:\xffrfxl.exec:\xffrfxl.exe37⤵
- Executes dropped EXE
PID:3020 -
\??\c:\hhtnhn.exec:\hhtnhn.exe38⤵
- Executes dropped EXE
PID:2708 -
\??\c:\vvjjp.exec:\vvjjp.exe39⤵
- Executes dropped EXE
PID:536 -
\??\c:\xlfxrlf.exec:\xlfxrlf.exe40⤵
- Executes dropped EXE
PID:2840 -
\??\c:\tbhbhb.exec:\tbhbhb.exe41⤵
- Executes dropped EXE
PID:2756 -
\??\c:\9bbtbn.exec:\9bbtbn.exe42⤵
- Executes dropped EXE
PID:2732 -
\??\c:\7pjvj.exec:\7pjvj.exe43⤵
- Executes dropped EXE
PID:2652 -
\??\c:\rlxffxf.exec:\rlxffxf.exe44⤵
- Executes dropped EXE
PID:2912 -
\??\c:\nnhntn.exec:\nnhntn.exe45⤵
- Executes dropped EXE
PID:2664 -
\??\c:\ppdvd.exec:\ppdvd.exe46⤵
- Executes dropped EXE
PID:2672 -
\??\c:\7vjdj.exec:\7vjdj.exe47⤵
- Executes dropped EXE
PID:2660 -
\??\c:\7lrrrxx.exec:\7lrrrxx.exe48⤵
- Executes dropped EXE
PID:1484 -
\??\c:\bhnthn.exec:\bhnthn.exe49⤵
- Executes dropped EXE
PID:1880 -
\??\c:\tnhtbn.exec:\tnhtbn.exe50⤵
- Executes dropped EXE
PID:3040 -
\??\c:\dvvpj.exec:\dvvpj.exe51⤵
- Executes dropped EXE
PID:1376 -
\??\c:\1xrlxlr.exec:\1xrlxlr.exe52⤵
- Executes dropped EXE
PID:2892 -
\??\c:\1rlxlll.exec:\1rlxlll.exe53⤵
- Executes dropped EXE
PID:1636 -
\??\c:\tnhntb.exec:\tnhntb.exe54⤵
- Executes dropped EXE
PID:1824 -
\??\c:\nhnnbn.exec:\nhnnbn.exe55⤵
- Executes dropped EXE
PID:2684 -
\??\c:\pvjdd.exec:\pvjdd.exe56⤵
- Executes dropped EXE
PID:2440 -
\??\c:\jvpjv.exec:\jvpjv.exe57⤵
- Executes dropped EXE
PID:316 -
\??\c:\llrxrll.exec:\llrxrll.exe58⤵
- Executes dropped EXE
PID:1680 -
\??\c:\tnhhbh.exec:\tnhhbh.exe59⤵
- Executes dropped EXE
PID:3064 -
\??\c:\pvpjj.exec:\pvpjj.exe60⤵
- Executes dropped EXE
PID:2208 -
\??\c:\7rflffx.exec:\7rflffx.exe61⤵
- Executes dropped EXE
PID:2436 -
\??\c:\ffffrll.exec:\ffffrll.exe62⤵
- Executes dropped EXE
PID:2480 -
\??\c:\hbbnbh.exec:\hbbnbh.exe63⤵
- Executes dropped EXE
PID:948 -
\??\c:\ddvpj.exec:\ddvpj.exe64⤵
- Executes dropped EXE
PID:1956 -
\??\c:\fxrxflx.exec:\fxrxflx.exe65⤵
- Executes dropped EXE
PID:2976 -
\??\c:\fffxxfx.exec:\fffxxfx.exe66⤵PID:1740
-
\??\c:\nhtnht.exec:\nhtnht.exe67⤵PID:1924
-
\??\c:\nnbbtt.exec:\nnbbtt.exe68⤵PID:2460
-
\??\c:\pppdd.exec:\pppdd.exe69⤵PID:2332
-
\??\c:\fxrfrxf.exec:\fxrfrxf.exe70⤵PID:1864
-
\??\c:\lfxxlrx.exec:\lfxxlrx.exe71⤵PID:2352
-
\??\c:\7nhhtb.exec:\7nhhtb.exe72⤵PID:2316
-
\??\c:\ththtb.exec:\ththtb.exe73⤵PID:2264
-
\??\c:\jpjdv.exec:\jpjdv.exe74⤵PID:2308
-
\??\c:\vpjvj.exec:\vpjvj.exe75⤵PID:2092
-
\??\c:\rlrxflr.exec:\rlrxflr.exe76⤵PID:2272
-
\??\c:\lxflrrf.exec:\lxflrrf.exe77⤵PID:1596
-
\??\c:\nnnbnb.exec:\nnnbnb.exe78⤵PID:2400
-
\??\c:\9hhhbb.exec:\9hhhbb.exe79⤵PID:2184
-
\??\c:\vpdpp.exec:\vpdpp.exe80⤵PID:2944
-
\??\c:\rrrllrr.exec:\rrrllrr.exe81⤵PID:2876
-
\??\c:\xxlrlfx.exec:\xxlrlfx.exe82⤵PID:2344
-
\??\c:\hhttnb.exec:\hhttnb.exe83⤵PID:2828
-
\??\c:\5ddpp.exec:\5ddpp.exe84⤵PID:2852
-
\??\c:\jjjpj.exec:\jjjpj.exe85⤵PID:2956
-
\??\c:\xxlrffr.exec:\xxlrffr.exe86⤵PID:2812
-
\??\c:\5lfxflx.exec:\5lfxflx.exe87⤵PID:2644
-
\??\c:\hhhhht.exec:\hhhhht.exe88⤵PID:2728
-
\??\c:\ppddd.exec:\ppddd.exe89⤵PID:2680
-
\??\c:\1dppj.exec:\1dppj.exe90⤵PID:2612
-
\??\c:\lrfflrx.exec:\lrfflrx.exe91⤵PID:2560
-
\??\c:\bnnthn.exec:\bnnthn.exe92⤵PID:908
-
\??\c:\ntbtbt.exec:\ntbtbt.exe93⤵PID:2928
-
\??\c:\vjddj.exec:\vjddj.exe94⤵PID:776
-
\??\c:\rflflff.exec:\rflflff.exe95⤵PID:2036
-
\??\c:\frrfxxr.exec:\frrfxxr.exe96⤵PID:1888
-
\??\c:\thnntt.exec:\thnntt.exe97⤵PID:2376
-
\??\c:\3vjjd.exec:\3vjjd.exe98⤵PID:1160
-
\??\c:\ddvjp.exec:\ddvjp.exe99⤵PID:2676
-
\??\c:\xrlxrrl.exec:\xrlxrrl.exe100⤵PID:2656
-
\??\c:\9ttnhn.exec:\9ttnhn.exe101⤵PID:2312
-
\??\c:\tttnnb.exec:\tttnnb.exe102⤵PID:2128
-
\??\c:\9vjvj.exec:\9vjvj.exe103⤵PID:3012
-
\??\c:\ppjjj.exec:\ppjjj.exe104⤵PID:2140
-
\??\c:\lrrlxlr.exec:\lrrlxlr.exe105⤵PID:2292
-
\??\c:\xlrllfl.exec:\xlrllfl.exe106⤵PID:1336
-
\??\c:\hbthbh.exec:\hbthbh.exe107⤵PID:2588
-
\??\c:\jpvjp.exec:\jpvjp.exe108⤵PID:1760
-
\??\c:\3ddjv.exec:\3ddjv.exe109⤵PID:896
-
\??\c:\lllflll.exec:\lllflll.exe110⤵PID:2444
-
\??\c:\3fxflrf.exec:\3fxflrf.exe111⤵PID:1688
-
\??\c:\nhntbh.exec:\nhntbh.exe112⤵PID:700
-
\??\c:\vdvjp.exec:\vdvjp.exe113⤵PID:2456
-
\??\c:\pjddj.exec:\pjddj.exe114⤵PID:2472
-
\??\c:\llflxlr.exec:\llflxlr.exe115⤵PID:1872
-
\??\c:\rllrlfr.exec:\rllrlfr.exe116⤵PID:2512
-
\??\c:\htbbnn.exec:\htbbnn.exe117⤵PID:2248
-
\??\c:\7pjvj.exec:\7pjvj.exe118⤵PID:2088
-
\??\c:\ddppv.exec:\ddppv.exe119⤵PID:3016
-
\??\c:\lfxlrxl.exec:\lfxlrxl.exe120⤵PID:1596
-
\??\c:\rlflxfr.exec:\rlflxfr.exe121⤵PID:2200
-
\??\c:\ththhn.exec:\ththhn.exe122⤵PID:1812
-
\??\c:\1jdjp.exec:\1jdjp.exe123⤵PID:2872
-
\??\c:\lffxfrx.exec:\lffxfrx.exe124⤵PID:2508
-
\??\c:\rlxxlrf.exec:\rlxxlrf.exe125⤵PID:2832
-
\??\c:\nttnbt.exec:\nttnbt.exe126⤵PID:2824
-
\??\c:\tnbthb.exec:\tnbthb.exe127⤵PID:2852
-
\??\c:\5pjjv.exec:\5pjjv.exe128⤵PID:2760
-
\??\c:\3pdpd.exec:\3pdpd.exe129⤵PID:1996
-
\??\c:\lrxrfxr.exec:\lrxrfxr.exe130⤵PID:2788
-
\??\c:\thtnbn.exec:\thtnbn.exe131⤵PID:2728
-
\??\c:\3tbnnn.exec:\3tbnnn.exe132⤵PID:2628
-
\??\c:\jpvvd.exec:\jpvvd.exe133⤵PID:2064
-
\??\c:\xxxxfxx.exec:\xxxxfxx.exe134⤵PID:2560
-
\??\c:\1hbtbh.exec:\1hbtbh.exe135⤵PID:1480
-
\??\c:\bhtthb.exec:\bhtthb.exe136⤵PID:1836
-
\??\c:\ppvvj.exec:\ppvvj.exe137⤵PID:1828
-
\??\c:\pvvjv.exec:\pvvjv.exe138⤵PID:2792
-
\??\c:\lfxlrrl.exec:\lfxlrrl.exe139⤵PID:760
-
\??\c:\fxlrrrf.exec:\fxlrrrf.exe140⤵PID:1400
-
\??\c:\hnttnh.exec:\hnttnh.exe141⤵PID:1916
-
\??\c:\vvvdj.exec:\vvvdj.exe142⤵PID:1620
-
\??\c:\vvjpj.exec:\vvjpj.exe143⤵PID:2496
-
\??\c:\lfrxrll.exec:\lfrxrll.exe144⤵PID:2940
-
\??\c:\hbnbth.exec:\hbnbth.exe145⤵PID:2072
-
\??\c:\djjjd.exec:\djjjd.exe146⤵PID:2452
-
\??\c:\vppvd.exec:\vppvd.exe147⤵PID:2140
-
\??\c:\xrllrxl.exec:\xrllrxl.exe148⤵PID:2204
-
\??\c:\nnbnhh.exec:\nnbnhh.exe149⤵PID:1340
-
\??\c:\thttbt.exec:\thttbt.exe150⤵PID:2524
-
\??\c:\jdjvj.exec:\jdjvj.exe151⤵PID:1760
-
\??\c:\vppjj.exec:\vppjj.exe152⤵PID:1756
-
\??\c:\xfrrxxl.exec:\xfrrxxl.exe153⤵PID:268
-
\??\c:\rlxlfrf.exec:\rlxlfrf.exe154⤵PID:1688
-
\??\c:\nbhntt.exec:\nbhntt.exe155⤵PID:2340
-
\??\c:\jddvv.exec:\jddvv.exe156⤵PID:2304
-
\??\c:\tbhnbt.exec:\tbhnbt.exe157⤵PID:2316
-
\??\c:\thbhtt.exec:\thbhtt.exe158⤵PID:1872
-
\??\c:\djpjd.exec:\djpjd.exe159⤵PID:2308
-
\??\c:\lrfffrr.exec:\lrfffrr.exe160⤵PID:2248
-
\??\c:\9ntnth.exec:\9ntnth.exe161⤵PID:1572
-
\??\c:\nbtbnb.exec:\nbtbnb.exe162⤵PID:2424
-
\??\c:\djpjv.exec:\djpjv.exe163⤵PID:1256
-
\??\c:\3bhhtb.exec:\3bhhtb.exe164⤵PID:2540
-
\??\c:\vjvjv.exec:\vjvjv.exe165⤵PID:1204
-
\??\c:\pjddj.exec:\pjddj.exe166⤵PID:2764
-
\??\c:\rrxlfxf.exec:\rrxlfxf.exe167⤵PID:2744
-
\??\c:\nbhhhb.exec:\nbhhhb.exe168⤵PID:2856
-
\??\c:\nnhthn.exec:\nnhthn.exe169⤵PID:3060
-
\??\c:\pdjdd.exec:\pdjdd.exe170⤵PID:2432
-
\??\c:\rlflxlx.exec:\rlflxlx.exe171⤵PID:2640
-
\??\c:\rlxlrxl.exec:\rlxlrxl.exe172⤵PID:2172
-
\??\c:\bhnbth.exec:\bhnbth.exe173⤵PID:2644
-
\??\c:\pdjdp.exec:\pdjdp.exe174⤵PID:2616
-
\??\c:\vjvjv.exec:\vjvjv.exe175⤵PID:2612
-
\??\c:\fxlllrr.exec:\fxlllrr.exe176⤵PID:1580
-
\??\c:\9lrfrxl.exec:\9lrfrxl.exe177⤵PID:832
-
\??\c:\7nnntt.exec:\7nnntt.exe178⤵PID:2372
-
\??\c:\vdjdd.exec:\vdjdd.exe179⤵PID:2916
-
\??\c:\vvdvv.exec:\vvdvv.exe180⤵PID:776
-
\??\c:\frxrlll.exec:\frxrlll.exe181⤵PID:2584
-
\??\c:\xlfrlxf.exec:\xlfrlxf.exe182⤵PID:2164
-
\??\c:\nntthb.exec:\nntthb.exe183⤵PID:1160
-
\??\c:\bthnbn.exec:\bthnbn.exe184⤵PID:2676
-
\??\c:\vvvjv.exec:\vvvjv.exe185⤵PID:2656
-
\??\c:\xrrxllr.exec:\xrrxllr.exe186⤵PID:2212
-
\??\c:\xxxxxrx.exec:\xxxxxrx.exe187⤵PID:2128
-
\??\c:\bbbnbb.exec:\bbbnbb.exe188⤵PID:2492
-
\??\c:\jjvvp.exec:\jjvvp.exe189⤵PID:2296
-
\??\c:\vpdjp.exec:\vpdjp.exe190⤵PID:2280
-
\??\c:\rfrrffr.exec:\rfrrffr.exe191⤵PID:788
-
\??\c:\rfxlrrx.exec:\rfxlrrx.exe192⤵PID:2588
-
\??\c:\thtbbh.exec:\thtbbh.exe193⤵PID:1612
-
\??\c:\3vvjd.exec:\3vvjd.exe194⤵PID:896
-
\??\c:\vdpdj.exec:\vdpdj.exe195⤵PID:1924
-
\??\c:\xxxfxlx.exec:\xxxfxlx.exe196⤵PID:2444
-
\??\c:\tbbntn.exec:\tbbntn.exe197⤵PID:864
-
\??\c:\bttbnt.exec:\bttbnt.exe198⤵PID:2340
-
\??\c:\pvddd.exec:\pvddd.exe199⤵PID:2304
-
\??\c:\vpjpj.exec:\vpjpj.exe200⤵PID:2132
-
\??\c:\9fflrrf.exec:\9fflrrf.exe201⤵PID:1296
-
\??\c:\lrfxlxr.exec:\lrfxlxr.exe202⤵PID:768
-
\??\c:\tnnhhh.exec:\tnnhhh.exe203⤵PID:2248
-
\??\c:\vvjvj.exec:\vvjvj.exe204⤵PID:3016
-
\??\c:\pjddj.exec:\pjddj.exe205⤵PID:2396
-
\??\c:\vjpjp.exec:\vjpjp.exe206⤵PID:3008
-
\??\c:\xrlfxxl.exec:\xrlfxxl.exe207⤵PID:804
-
\??\c:\nhnnbb.exec:\nhnnbb.exe208⤵PID:2944
-
\??\c:\btttbn.exec:\btttbn.exe209⤵PID:3036
-
\??\c:\7vdpd.exec:\7vdpd.exe210⤵PID:2708
-
\??\c:\dddjj.exec:\dddjj.exe211⤵PID:2776
-
\??\c:\rllxrlx.exec:\rllxrlx.exe212⤵PID:2824
-
\??\c:\tthnht.exec:\tthnht.exe213⤵PID:2652
-
\??\c:\hthtnt.exec:\hthtnt.exe214⤵PID:2760
-
\??\c:\pdvjv.exec:\pdvjv.exe215⤵PID:1844
-
\??\c:\ppvjv.exec:\ppvjv.exe216⤵PID:2620
-
\??\c:\rrlxfrr.exec:\rrlxfrr.exe217⤵PID:3032
-
\??\c:\5rlrlxr.exec:\5rlrlxr.exe218⤵PID:2692
-
\??\c:\7bbnbb.exec:\7bbnbb.exe219⤵PID:2004
-
\??\c:\vddjd.exec:\vddjd.exe220⤵PID:1788
-
\??\c:\jvjjp.exec:\jvjjp.exe221⤵PID:1820
-
\??\c:\rrlfxlx.exec:\rrlfxlx.exe222⤵PID:1836
-
\??\c:\rfrrffl.exec:\rfrrffl.exe223⤵PID:2896
-
\??\c:\thtnbb.exec:\thtnbb.exe224⤵PID:1636
-
\??\c:\bbhhtt.exec:\bbhhtt.exe225⤵PID:956
-
\??\c:\jdpdd.exec:\jdpdd.exe226⤵PID:1400
-
\??\c:\lrrflll.exec:\lrrflll.exe227⤵PID:316
-
\??\c:\llfrflf.exec:\llfrflf.exe228⤵PID:2716
-
\??\c:\bbntnt.exec:\bbntnt.exe229⤵PID:1728
-
\??\c:\btnbhn.exec:\btnbhn.exe230⤵PID:3056
-
\??\c:\1vvpv.exec:\1vvpv.exe231⤵PID:2208
-
\??\c:\jpvdv.exec:\jpvdv.exe232⤵PID:2492
-
\??\c:\lrffllx.exec:\lrffllx.exe233⤵PID:2140
-
\??\c:\lxflrxr.exec:\lxflrxr.exe234⤵PID:2280
-
\??\c:\nnthhb.exec:\nnthhb.exe235⤵PID:1340
-
\??\c:\ddjvv.exec:\ddjvv.exe236⤵PID:2588
-
\??\c:\jdpdd.exec:\jdpdd.exe237⤵PID:752
-
\??\c:\llrlrrx.exec:\llrlrrx.exe238⤵PID:1656
-
\??\c:\thbbhb.exec:\thbbhb.exe239⤵PID:2332
-
\??\c:\dpvdj.exec:\dpvdj.exe240⤵PID:2444
-
\??\c:\rlfrfff.exec:\rlfrfff.exe241⤵PID:792
-
\??\c:\bnhtnt.exec:\bnhtnt.exe242⤵PID:2316