Analysis
-
max time kernel
59s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
db753c357ec09d47e42dc6b98ac6ae907c9c0bae3c3d7f856a23cfb235a5fe85.exe
Resource
win7-20240705-en
General
-
Target
db753c357ec09d47e42dc6b98ac6ae907c9c0bae3c3d7f856a23cfb235a5fe85.exe
-
Size
87KB
-
MD5
7370186d27c441a541a13d5a09bb7dc8
-
SHA1
3e6a695804f535d08730018907b0d47654e2bf16
-
SHA256
db753c357ec09d47e42dc6b98ac6ae907c9c0bae3c3d7f856a23cfb235a5fe85
-
SHA512
0e9c8e65eb0d12905bed3dadd6277e1908b4e66aaddff452bb27f6807c2dcb8afe458f8227b6d1c52cb886c42242cee8441c5d4830145bd8fc5e6af891642434
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDInWeNCYGyA2R7JxJAeEnDyxC/:ymb3NkkiQ3mdBjFIWeFGyAsJAeomxC/
Malware Config
Signatures
-
Detect Blackmoon payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3016-4-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2096-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2800-24-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2540-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2420-44-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2708-54-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3008-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/592-85-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1052-101-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2716-119-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1456-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2876-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2744-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2572-146-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2112-181-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2072-244-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1508-253-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/604-262-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2284-272-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1556-281-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
pvdpp.exe7ppvj.exepppdd.exenhbbbh.exejpjjv.exettnntt.exennbntb.exexxlfrll.exevpjjj.exeppvjp.exe7htntn.exerlrlrrf.exelrfxxff.exe9frrrrx.exexxflxrf.exevjpvj.exehtnntb.exevpddd.exejvjjp.exebnhnhh.exefllrrlr.exebbtthb.exexflrfrl.exetnhhnb.exe3tbhtn.exelrfxffl.exethbbht.exefrlflfl.exedvpvv.exetththh.exerxlfrfl.exelxrxrxr.exehhhhtt.exevjvdp.exexfrffxf.exehnthtt.exepdpjd.exebhtnbt.exepdjjv.exehthbnn.exejvjdj.exeflrlrrr.exebntnbb.exeppvdj.exebhnhhb.exefxfrxxx.exe1bhbbb.exepdddd.exentnhhb.exedpvvd.exeffllxrx.exevjvjp.exeflllrlf.exeppdpd.exe7rxxfxf.exedjvvd.exerfffffl.exe9vddd.exeffllrxr.exebhnhhh.exelrffrfx.exeddvvv.exedvvdj.exerflflll.exepid process 2096 pvdpp.exe 2800 7ppvj.exe 2540 pppdd.exe 2420 nhbbbh.exe 2708 jpjjv.exe 2544 ttnntt.exe 3008 nnbntb.exe 592 xxlfrll.exe 1052 vpjjj.exe 1456 ppvjp.exe 2716 7htntn.exe 2876 rlrlrrf.exe 2744 lrfxxff.exe 2572 9frrrrx.exe 2268 xxflxrf.exe 2212 vjpvj.exe 2164 htnntb.exe 2112 vpddd.exe 2168 jvjjp.exe 3056 bnhnhh.exe 1888 fllrrlr.exe 1884 bbtthb.exe 744 xflrfrl.exe 1900 tnhhnb.exe 2072 3tbhtn.exe 1508 lrfxffl.exe 604 thbbht.exe 2284 frlflfl.exe 1556 dvpvv.exe 2248 tththh.exe 2932 rxlfrfl.exe 2296 lxrxrxr.exe 2676 hhhhtt.exe 1608 vjvdp.exe 2788 xfrffxf.exe 2896 hnthtt.exe 2756 pdpjd.exe 2848 bhtnbt.exe 2712 pdjjv.exe 2708 hthbnn.exe 2604 jvjdj.exe 1364 flrlrrr.exe 3008 bntnbb.exe 2476 ppvdj.exe 276 bhnhhb.exe 2516 fxfrxxx.exe 2236 1bhbbb.exe 1872 pdddd.exe 1224 ntnhhb.exe 2056 dpvvd.exe 2328 ffllxrx.exe 2088 vjvjp.exe 1088 flllrlf.exe 1832 ppdpd.exe 2336 7rxxfxf.exe 1528 djvvd.exe 1804 rfffffl.exe 3028 9vddd.exe 1880 ffllrxr.exe 2360 bhnhhh.exe 764 lrffrfx.exe 1552 ddvvv.exe 1820 dvvdj.exe 1572 rflflll.exe -
Processes:
resource yara_rule behavioral1/memory/3016-4-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2096-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2800-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2540-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2420-44-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2708-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2544-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3008-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/592-83-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1052-101-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2716-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1456-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2744-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2572-146-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2112-181-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2072-244-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1508-253-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/604-262-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2284-272-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1556-281-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rffllfl.exennbbtt.exe9rllxfx.exefrxrlfx.exefxrffrx.exe1lllrrx.exe3llxffl.exetbhnbb.exelrfrrlr.exeflxrxfl.exexrlflxf.exerrlfrlx.exehtnhtn.exebnhnhh.exetnhhnb.exevpjpd.exexflfrxx.exepvdvd.exe7rxxfxf.exebhnhhh.exe7ntntn.exebbnnhn.exepjjjp.exefrlrxxl.exehtnhhh.exexrffrxl.exexrrxlrx.exennhttn.exejjjdp.exelffxlll.exebbbhbn.exejpdjp.exevvdjd.exe7rxlxfx.exejpjjj.exepvdvd.exeffxrlrf.exe5rllflf.exexlxxxxf.exenhbtbh.exejdvdp.exe5rllfff.exerxffrff.exehnbtnh.exelrrxlxx.exenbnntt.exepdvpp.exexrrxflx.exepvvpp.exentttbn.exe9frflfx.exennhtnt.exeffxlllx.exehhhttb.exexxffrlr.exebntnbb.exeflrlrlf.exeflfrrfx.exedjpjd.exerfllffl.exevjvdv.exerfffffl.exe7jjdv.exehtnhth.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rffllfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbbtt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9rllxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxrlfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fxrffrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1lllrrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3llxffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbhnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrfrrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxrxfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlflxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrlfrlx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhnhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhhnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xflfrxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rxxfxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ntntn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbnnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frlrxxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnhhh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrffrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrxlrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffxlll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbhbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpdjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvdjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rxlxfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvdvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxrlrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rllflf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxxxxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhbtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jdvdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5rllfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxffrff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnbtnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrrxlxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbnntt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrxflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntttbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9frflfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnhtnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffxlllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhhttb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxffrlr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntnbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrlrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flfrrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfllffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfffffl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7jjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language htnhth.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
db753c357ec09d47e42dc6b98ac6ae907c9c0bae3c3d7f856a23cfb235a5fe85.exepvdpp.exe7ppvj.exepppdd.exenhbbbh.exejpjjv.exettnntt.exennbntb.exexxlfrll.exevpjjj.exeppvjp.exe7htntn.exerlrlrrf.exelrfxxff.exe9frrrrx.exexxflxrf.exedescription pid process target process PID 3016 wrote to memory of 2096 3016 db753c357ec09d47e42dc6b98ac6ae907c9c0bae3c3d7f856a23cfb235a5fe85.exe pvdpp.exe PID 3016 wrote to memory of 2096 3016 db753c357ec09d47e42dc6b98ac6ae907c9c0bae3c3d7f856a23cfb235a5fe85.exe pvdpp.exe PID 3016 wrote to memory of 2096 3016 db753c357ec09d47e42dc6b98ac6ae907c9c0bae3c3d7f856a23cfb235a5fe85.exe pvdpp.exe PID 3016 wrote to memory of 2096 3016 db753c357ec09d47e42dc6b98ac6ae907c9c0bae3c3d7f856a23cfb235a5fe85.exe pvdpp.exe PID 2096 wrote to memory of 2800 2096 pvdpp.exe 7ppvj.exe PID 2096 wrote to memory of 2800 2096 pvdpp.exe 7ppvj.exe PID 2096 wrote to memory of 2800 2096 pvdpp.exe 7ppvj.exe PID 2096 wrote to memory of 2800 2096 pvdpp.exe 7ppvj.exe PID 2800 wrote to memory of 2540 2800 7ppvj.exe pppdd.exe PID 2800 wrote to memory of 2540 2800 7ppvj.exe pppdd.exe PID 2800 wrote to memory of 2540 2800 7ppvj.exe pppdd.exe PID 2800 wrote to memory of 2540 2800 7ppvj.exe pppdd.exe PID 2540 wrote to memory of 2420 2540 pppdd.exe nhbbbh.exe PID 2540 wrote to memory of 2420 2540 pppdd.exe nhbbbh.exe PID 2540 wrote to memory of 2420 2540 pppdd.exe nhbbbh.exe PID 2540 wrote to memory of 2420 2540 pppdd.exe nhbbbh.exe PID 2420 wrote to memory of 2708 2420 nhbbbh.exe jpjjv.exe PID 2420 wrote to memory of 2708 2420 nhbbbh.exe jpjjv.exe PID 2420 wrote to memory of 2708 2420 nhbbbh.exe jpjjv.exe PID 2420 wrote to memory of 2708 2420 nhbbbh.exe jpjjv.exe PID 2708 wrote to memory of 2544 2708 jpjjv.exe ttnntt.exe PID 2708 wrote to memory of 2544 2708 jpjjv.exe ttnntt.exe PID 2708 wrote to memory of 2544 2708 jpjjv.exe ttnntt.exe PID 2708 wrote to memory of 2544 2708 jpjjv.exe ttnntt.exe PID 2544 wrote to memory of 3008 2544 ttnntt.exe nnbntb.exe PID 2544 wrote to memory of 3008 2544 ttnntt.exe nnbntb.exe PID 2544 wrote to memory of 3008 2544 ttnntt.exe nnbntb.exe PID 2544 wrote to memory of 3008 2544 ttnntt.exe nnbntb.exe PID 3008 wrote to memory of 592 3008 nnbntb.exe xxlfrll.exe PID 3008 wrote to memory of 592 3008 nnbntb.exe xxlfrll.exe PID 3008 wrote to memory of 592 3008 nnbntb.exe xxlfrll.exe PID 3008 wrote to memory of 592 3008 nnbntb.exe xxlfrll.exe PID 592 wrote to memory of 1052 592 xxlfrll.exe vpjjj.exe PID 592 wrote to memory of 1052 592 xxlfrll.exe vpjjj.exe PID 592 wrote to memory of 1052 592 xxlfrll.exe vpjjj.exe PID 592 wrote to memory of 1052 592 xxlfrll.exe vpjjj.exe PID 1052 wrote to memory of 1456 1052 vpjjj.exe ppvjp.exe PID 1052 wrote to memory of 1456 1052 vpjjj.exe ppvjp.exe PID 1052 wrote to memory of 1456 1052 vpjjj.exe ppvjp.exe PID 1052 wrote to memory of 1456 1052 vpjjj.exe ppvjp.exe PID 1456 wrote to memory of 2716 1456 ppvjp.exe 7htntn.exe PID 1456 wrote to memory of 2716 1456 ppvjp.exe 7htntn.exe PID 1456 wrote to memory of 2716 1456 ppvjp.exe 7htntn.exe PID 1456 wrote to memory of 2716 1456 ppvjp.exe 7htntn.exe PID 2716 wrote to memory of 2876 2716 7htntn.exe rlrlrrf.exe PID 2716 wrote to memory of 2876 2716 7htntn.exe rlrlrrf.exe PID 2716 wrote to memory of 2876 2716 7htntn.exe rlrlrrf.exe PID 2716 wrote to memory of 2876 2716 7htntn.exe rlrlrrf.exe PID 2876 wrote to memory of 2744 2876 rlrlrrf.exe lrfxxff.exe PID 2876 wrote to memory of 2744 2876 rlrlrrf.exe lrfxxff.exe PID 2876 wrote to memory of 2744 2876 rlrlrrf.exe lrfxxff.exe PID 2876 wrote to memory of 2744 2876 rlrlrrf.exe lrfxxff.exe PID 2744 wrote to memory of 2572 2744 lrfxxff.exe 9frrrrx.exe PID 2744 wrote to memory of 2572 2744 lrfxxff.exe 9frrrrx.exe PID 2744 wrote to memory of 2572 2744 lrfxxff.exe 9frrrrx.exe PID 2744 wrote to memory of 2572 2744 lrfxxff.exe 9frrrrx.exe PID 2572 wrote to memory of 2268 2572 9frrrrx.exe xxflxrf.exe PID 2572 wrote to memory of 2268 2572 9frrrrx.exe xxflxrf.exe PID 2572 wrote to memory of 2268 2572 9frrrrx.exe xxflxrf.exe PID 2572 wrote to memory of 2268 2572 9frrrrx.exe xxflxrf.exe PID 2268 wrote to memory of 2212 2268 xxflxrf.exe vjpvj.exe PID 2268 wrote to memory of 2212 2268 xxflxrf.exe vjpvj.exe PID 2268 wrote to memory of 2212 2268 xxflxrf.exe vjpvj.exe PID 2268 wrote to memory of 2212 2268 xxflxrf.exe vjpvj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\db753c357ec09d47e42dc6b98ac6ae907c9c0bae3c3d7f856a23cfb235a5fe85.exe"C:\Users\Admin\AppData\Local\Temp\db753c357ec09d47e42dc6b98ac6ae907c9c0bae3c3d7f856a23cfb235a5fe85.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\pvdpp.exec:\pvdpp.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2096 -
\??\c:\7ppvj.exec:\7ppvj.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
\??\c:\pppdd.exec:\pppdd.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\nhbbbh.exec:\nhbbbh.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
\??\c:\jpjjv.exec:\jpjjv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
\??\c:\ttnntt.exec:\ttnntt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\nnbntb.exec:\nnbntb.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
\??\c:\xxlfrll.exec:\xxlfrll.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:592 -
\??\c:\vpjjj.exec:\vpjjj.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1052 -
\??\c:\ppvjp.exec:\ppvjp.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
\??\c:\7htntn.exec:\7htntn.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\rlrlrrf.exec:\rlrlrrf.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\lrfxxff.exec:\lrfxxff.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\9frrrrx.exec:\9frrrrx.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2572 -
\??\c:\xxflxrf.exec:\xxflxrf.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\vjpvj.exec:\vjpvj.exe17⤵
- Executes dropped EXE
PID:2212 -
\??\c:\htnntb.exec:\htnntb.exe18⤵
- Executes dropped EXE
PID:2164 -
\??\c:\vpddd.exec:\vpddd.exe19⤵
- Executes dropped EXE
PID:2112 -
\??\c:\jvjjp.exec:\jvjjp.exe20⤵
- Executes dropped EXE
PID:2168 -
\??\c:\bnhnhh.exec:\bnhnhh.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056 -
\??\c:\fllrrlr.exec:\fllrrlr.exe22⤵
- Executes dropped EXE
PID:1888 -
\??\c:\bbtthb.exec:\bbtthb.exe23⤵
- Executes dropped EXE
PID:1884 -
\??\c:\xflrfrl.exec:\xflrfrl.exe24⤵
- Executes dropped EXE
PID:744 -
\??\c:\tnhhnb.exec:\tnhhnb.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900 -
\??\c:\3tbhtn.exec:\3tbhtn.exe26⤵
- Executes dropped EXE
PID:2072 -
\??\c:\lrfxffl.exec:\lrfxffl.exe27⤵
- Executes dropped EXE
PID:1508 -
\??\c:\thbbht.exec:\thbbht.exe28⤵
- Executes dropped EXE
PID:604 -
\??\c:\frlflfl.exec:\frlflfl.exe29⤵
- Executes dropped EXE
PID:2284 -
\??\c:\dvpvv.exec:\dvpvv.exe30⤵
- Executes dropped EXE
PID:1556 -
\??\c:\tththh.exec:\tththh.exe31⤵
- Executes dropped EXE
PID:2248 -
\??\c:\rxlfrfl.exec:\rxlfrfl.exe32⤵
- Executes dropped EXE
PID:2932 -
\??\c:\lxrxrxr.exec:\lxrxrxr.exe33⤵
- Executes dropped EXE
PID:2296 -
\??\c:\hhhhtt.exec:\hhhhtt.exe34⤵
- Executes dropped EXE
PID:2676 -
\??\c:\vjvdp.exec:\vjvdp.exe35⤵
- Executes dropped EXE
PID:1608 -
\??\c:\xfrffxf.exec:\xfrffxf.exe36⤵
- Executes dropped EXE
PID:2788 -
\??\c:\hnthtt.exec:\hnthtt.exe37⤵
- Executes dropped EXE
PID:2896 -
\??\c:\pdpjd.exec:\pdpjd.exe38⤵
- Executes dropped EXE
PID:2756 -
\??\c:\bhtnbt.exec:\bhtnbt.exe39⤵
- Executes dropped EXE
PID:2848 -
\??\c:\pdjjv.exec:\pdjjv.exe40⤵
- Executes dropped EXE
PID:2712 -
\??\c:\hthbnn.exec:\hthbnn.exe41⤵
- Executes dropped EXE
PID:2708 -
\??\c:\jvjdj.exec:\jvjdj.exe42⤵
- Executes dropped EXE
PID:2604 -
\??\c:\flrlrrr.exec:\flrlrrr.exe43⤵
- Executes dropped EXE
PID:1364 -
\??\c:\bntnbb.exec:\bntnbb.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3008 -
\??\c:\ppvdj.exec:\ppvdj.exe45⤵
- Executes dropped EXE
PID:2476 -
\??\c:\bhnhhb.exec:\bhnhhb.exe46⤵
- Executes dropped EXE
PID:276 -
\??\c:\fxfrxxx.exec:\fxfrxxx.exe47⤵
- Executes dropped EXE
PID:2516 -
\??\c:\1bhbbb.exec:\1bhbbb.exe48⤵
- Executes dropped EXE
PID:2236 -
\??\c:\pdddd.exec:\pdddd.exe49⤵
- Executes dropped EXE
PID:1872 -
\??\c:\ntnhhb.exec:\ntnhhb.exe50⤵
- Executes dropped EXE
PID:1224 -
\??\c:\dpvvd.exec:\dpvvd.exe51⤵
- Executes dropped EXE
PID:2056 -
\??\c:\ffllxrx.exec:\ffllxrx.exe52⤵
- Executes dropped EXE
PID:2328 -
\??\c:\vjvjp.exec:\vjvjp.exe53⤵
- Executes dropped EXE
PID:2088 -
\??\c:\flllrlf.exec:\flllrlf.exe54⤵
- Executes dropped EXE
PID:1088 -
\??\c:\ppdpd.exec:\ppdpd.exe55⤵
- Executes dropped EXE
PID:1832 -
\??\c:\7rxxfxf.exec:\7rxxfxf.exe56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2336 -
\??\c:\djvvd.exec:\djvvd.exe57⤵
- Executes dropped EXE
PID:1528 -
\??\c:\rfffffl.exec:\rfffffl.exe58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804 -
\??\c:\9vddd.exec:\9vddd.exe59⤵
- Executes dropped EXE
PID:3028 -
\??\c:\ffllrxr.exec:\ffllrxr.exe60⤵
- Executes dropped EXE
PID:1880 -
\??\c:\bhnhhh.exec:\bhnhhh.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360 -
\??\c:\lrffrfx.exec:\lrffrfx.exe62⤵
- Executes dropped EXE
PID:764 -
\??\c:\ddvvv.exec:\ddvvv.exe63⤵
- Executes dropped EXE
PID:1552 -
\??\c:\dvvdj.exec:\dvvdj.exe64⤵
- Executes dropped EXE
PID:1820 -
\??\c:\rflflll.exec:\rflflll.exe65⤵
- Executes dropped EXE
PID:1572 -
\??\c:\ppjvv.exec:\ppjvv.exe66⤵PID:2276
-
\??\c:\htbhth.exec:\htbhth.exe67⤵PID:1648
-
\??\c:\xfllrrf.exec:\xfllrrf.exe68⤵PID:2392
-
\??\c:\frlfxff.exec:\frlfxff.exe69⤵PID:1536
-
\??\c:\rxfrxrr.exec:\rxfrxrr.exe70⤵PID:2068
-
\??\c:\5hnnnh.exec:\5hnnnh.exe71⤵PID:684
-
\??\c:\lrlflfl.exec:\lrlflfl.exe72⤵PID:1516
-
\??\c:\pdvvd.exec:\pdvvd.exe73⤵PID:2448
-
\??\c:\flxrxfl.exec:\flxrxfl.exe74⤵
- System Location Discovery: System Language Discovery
PID:2684 -
\??\c:\tbtbbh.exec:\tbtbbh.exe75⤵PID:2096
-
\??\c:\frxffxf.exec:\frxffxf.exe76⤵PID:2764
-
\??\c:\thtnth.exec:\thtnth.exe77⤵PID:2132
-
\??\c:\djpjj.exec:\djpjj.exe78⤵PID:2836
-
\??\c:\1lrlxrf.exec:\1lrlxrf.exe79⤵PID:2632
-
\??\c:\jvdjp.exec:\jvdjp.exe80⤵PID:840
-
\??\c:\lxxrxfx.exec:\lxxrxfx.exe81⤵PID:2588
-
\??\c:\hnhttb.exec:\hnhttb.exe82⤵PID:2596
-
\??\c:\xllxxrf.exec:\xllxxrf.exe83⤵PID:796
-
\??\c:\rxfflll.exec:\rxfflll.exe84⤵PID:2576
-
\??\c:\xrffrxl.exec:\xrffrxl.exe85⤵
- System Location Discovery: System Language Discovery
PID:2468 -
\??\c:\vjdvd.exec:\vjdvd.exe86⤵PID:1360
-
\??\c:\rrrfrfl.exec:\rrrfrfl.exe87⤵PID:1008
-
\??\c:\5hnhnb.exec:\5hnhnb.exe88⤵PID:2904
-
\??\c:\dpdpv.exec:\dpdpv.exe89⤵PID:2196
-
\??\c:\7rlrxrr.exec:\7rlrxrr.exe90⤵PID:2160
-
\??\c:\vppvd.exec:\vppvd.exe91⤵PID:1872
-
\??\c:\rrlrrxx.exec:\rrlrrxx.exe92⤵PID:1940
-
\??\c:\bnhbbh.exec:\bnhbbh.exe93⤵PID:2172
-
\??\c:\bbtbnb.exec:\bbtbnb.exe94⤵PID:2200
-
\??\c:\ddvdp.exec:\ddvdp.exe95⤵PID:2268
-
\??\c:\vvvjv.exec:\vvvjv.exe96⤵PID:2348
-
\??\c:\xxfrrrr.exec:\xxfrrrr.exe97⤵PID:2184
-
\??\c:\dddjv.exec:\dddjv.exe98⤵PID:2112
-
\??\c:\lrrlrxl.exec:\lrrlrxl.exe99⤵PID:3048
-
\??\c:\bbbhbb.exec:\bbbhbb.exe100⤵PID:1300
-
\??\c:\flxrxxx.exec:\flxrxxx.exe101⤵PID:3056
-
\??\c:\hbbntn.exec:\hbbntn.exe102⤵PID:1888
-
\??\c:\frllxfl.exec:\frllxfl.exe103⤵PID:1884
-
\??\c:\vdvdp.exec:\vdvdp.exe104⤵PID:824
-
\??\c:\nnhttn.exec:\nnhttn.exe105⤵
- System Location Discovery: System Language Discovery
PID:2396 -
\??\c:\nnnbtb.exec:\nnnbtb.exe106⤵PID:1824
-
\??\c:\rxfxlfl.exec:\rxfxlfl.exe107⤵PID:1368
-
\??\c:\3hhnnb.exec:\3hhnnb.exe108⤵PID:1700
-
\??\c:\9pdvv.exec:\9pdvv.exe109⤵PID:1352
-
\??\c:\9ddpp.exec:\9ddpp.exe110⤵PID:1000
-
\??\c:\llfffff.exec:\llfffff.exe111⤵PID:572
-
\??\c:\bnthhn.exec:\bnthhn.exe112⤵PID:1236
-
\??\c:\1ddvv.exec:\1ddvv.exe113⤵PID:684
-
\??\c:\nhbtbh.exec:\nhbtbh.exe114⤵
- System Location Discovery: System Language Discovery
PID:3052 -
\??\c:\flrlrlf.exec:\flrlrlf.exe115⤵
- System Location Discovery: System Language Discovery
PID:2776 -
\??\c:\thbnht.exec:\thbnht.exe116⤵PID:3032
-
\??\c:\ffllllf.exec:\ffllllf.exe117⤵PID:2908
-
\??\c:\ddvjj.exec:\ddvjj.exe118⤵PID:2664
-
\??\c:\jjdpp.exec:\jjdpp.exe119⤵PID:2808
-
\??\c:\nththt.exec:\nththt.exe120⤵PID:2732
-
\??\c:\vjddp.exec:\vjddp.exe121⤵PID:2556
-
\??\c:\fxllflf.exec:\fxllflf.exe122⤵PID:2024
-
\??\c:\rfrlrrx.exec:\rfrlrrx.exe123⤵PID:2608
-
\??\c:\bhtbth.exec:\bhtbth.exe124⤵PID:2804
-
\??\c:\lrrlrlr.exec:\lrrlrlr.exe125⤵PID:2324
-
\??\c:\7vvvd.exec:\7vvvd.exe126⤵PID:2000
-
\??\c:\xxfrfxf.exec:\xxfrfxf.exe127⤵PID:2380
-
\??\c:\bhhnbh.exec:\bhhnbh.exe128⤵PID:1132
-
\??\c:\lrrffxx.exec:\lrrffxx.exe129⤵PID:2924
-
\??\c:\hnhnbb.exec:\hnhnbb.exe130⤵PID:2104
-
\??\c:\3llxffl.exec:\3llxffl.exe131⤵PID:2876
-
\??\c:\ttbbth.exec:\ttbbth.exe132⤵PID:2872
-
\??\c:\llflfxl.exec:\llflfxl.exe133⤵PID:2432
-
\??\c:\thbhhh.exec:\thbhhh.exe134⤵PID:2228
-
\??\c:\jjjdp.exec:\jjjdp.exe135⤵
- System Location Discovery: System Language Discovery
PID:332 -
\??\c:\vjpdd.exec:\vjpdd.exe136⤵PID:1072
-
\??\c:\hthtbt.exec:\hthtbt.exe137⤵PID:2332
-
\??\c:\ddjdd.exec:\ddjdd.exe138⤵PID:2336
-
\??\c:\bnnhnh.exec:\bnnhnh.exe139⤵PID:3012
-
\??\c:\bhhbhb.exec:\bhhbhb.exe140⤵PID:1296
-
\??\c:\bhttnh.exec:\bhttnh.exe141⤵PID:2440
-
\??\c:\hhnbtb.exec:\hhnbtb.exe142⤵PID:1996
-
\??\c:\vdjjd.exec:\vdjjd.exe143⤵PID:672
-
\??\c:\nbthtn.exec:\nbthtn.exe144⤵PID:1744
-
\??\c:\jpdvj.exec:\jpdvj.exe145⤵PID:1548
-
\??\c:\rxxxlll.exec:\rxxxlll.exe146⤵PID:1076
-
\??\c:\3thhtn.exec:\3thhtn.exe147⤵PID:1660
-
\??\c:\djvjp.exec:\djvjp.exe148⤵PID:1144
-
\??\c:\llrlxrx.exec:\llrlxrx.exe149⤵PID:1932
-
\??\c:\hbbbhh.exec:\hbbbhh.exe150⤵PID:1752
-
\??\c:\vdppj.exec:\vdppj.exe151⤵PID:2284
-
\??\c:\hnbnnn.exec:\hnbnnn.exe152⤵PID:552
-
\??\c:\jvdjd.exec:\jvdjd.exe153⤵PID:892
-
\??\c:\frfxrxf.exec:\frfxrxf.exe154⤵PID:2280
-
\??\c:\dvppp.exec:\dvppp.exe155⤵PID:2624
-
\??\c:\flfrrfx.exec:\flfrrfx.exe156⤵
- System Location Discovery: System Language Discovery
PID:3016 -
\??\c:\pvppv.exec:\pvppv.exe157⤵PID:2096
-
\??\c:\fflrfrr.exec:\fflrfrr.exe158⤵PID:1612
-
\??\c:\ntbtht.exec:\ntbtht.exe159⤵PID:1608
-
\??\c:\3pjdp.exec:\3pjdp.exe160⤵PID:1976
-
\??\c:\hhbnnt.exec:\hhbnnt.exe161⤵PID:2632
-
\??\c:\pjjvj.exec:\pjjvj.exe162⤵PID:840
-
\??\c:\ntnnbb.exec:\ntnnbb.exe163⤵PID:2672
-
\??\c:\fflxxll.exec:\fflxxll.exe164⤵PID:2972
-
\??\c:\vdppj.exec:\vdppj.exe165⤵PID:796
-
\??\c:\9frflfx.exec:\9frflfx.exe166⤵
- System Location Discovery: System Language Discovery
PID:864 -
\??\c:\djpdd.exec:\djpdd.exe167⤵PID:2464
-
\??\c:\ffffxfr.exec:\ffffxfr.exe168⤵PID:2476
-
\??\c:\lffxlll.exec:\lffxlll.exe169⤵
- System Location Discovery: System Language Discovery
PID:276 -
\??\c:\1lrffxx.exec:\1lrffxx.exe170⤵PID:2444
-
\??\c:\jjvjd.exec:\jjvjd.exe171⤵PID:2864
-
\??\c:\hhbbtb.exec:\hhbbtb.exe172⤵PID:2816
-
\??\c:\xfflrrf.exec:\xfflrrf.exe173⤵PID:2752
-
\??\c:\bbhbnt.exec:\bbhbnt.exe174⤵PID:2244
-
\??\c:\lflrrfr.exec:\lflrrfr.exe175⤵PID:2172
-
\??\c:\3llxffl.exec:\3llxffl.exe176⤵
- System Location Discovery: System Language Discovery
PID:2212 -
\??\c:\jdvdp.exec:\jdvdp.exe177⤵
- System Location Discovery: System Language Discovery
PID:2320 -
\??\c:\rxrxfrx.exec:\rxrxfrx.exe178⤵PID:2348
-
\??\c:\lrfllxx.exec:\lrfllxx.exe179⤵PID:2900
-
\??\c:\jjdjv.exec:\jjdjv.exe180⤵PID:2336
-
\??\c:\frxxrfr.exec:\frxxrfr.exe181⤵PID:3024
-
\??\c:\ttbnbn.exec:\ttbnbn.exe182⤵PID:2316
-
\??\c:\7llxxrf.exec:\7llxxrf.exe183⤵PID:1880
-
\??\c:\bhbhhh.exec:\bhbhhh.exe184⤵PID:2360
-
\??\c:\btnbnb.exec:\btnbnb.exe185⤵PID:1960
-
\??\c:\xfxxlrr.exec:\xfxxlrr.exe186⤵PID:1688
-
\??\c:\5vdpj.exec:\5vdpj.exe187⤵PID:1992
-
\??\c:\5vvjp.exec:\5vvjp.exe188⤵PID:1572
-
\??\c:\thhbnn.exec:\thhbnn.exe189⤵PID:624
-
\??\c:\flfxlrf.exec:\flfxlrf.exe190⤵PID:1616
-
\??\c:\ttbhtt.exec:\ttbhtt.exe191⤵PID:1624
-
\??\c:\jvdjj.exec:\jvdjj.exe192⤵PID:2888
-
\??\c:\bnhbbt.exec:\bnhbbt.exe193⤵PID:2100
-
\??\c:\vpdpj.exec:\vpdpj.exe194⤵PID:2460
-
\??\c:\xlxxlxl.exec:\xlxxlxl.exe195⤵PID:2224
-
\??\c:\bnbhth.exec:\bnbhth.exe196⤵PID:2508
-
\??\c:\rfrrrxf.exec:\rfrrrxf.exe197⤵PID:2776
-
\??\c:\ntbbnn.exec:\ntbbnn.exe198⤵PID:2676
-
\??\c:\xfllxxf.exec:\xfllxxf.exe199⤵PID:2680
-
\??\c:\hthnbb.exec:\hthnbb.exe200⤵PID:2792
-
\??\c:\pdppd.exec:\pdppd.exe201⤵PID:2808
-
\??\c:\rfflxxl.exec:\rfflxxl.exe202⤵PID:2568
-
\??\c:\hbthtb.exec:\hbthtb.exe203⤵PID:3004
-
\??\c:\djpdj.exec:\djpdj.exe204⤵PID:2964
-
\??\c:\tbhnbb.exec:\tbhnbb.exe205⤵
- System Location Discovery: System Language Discovery
PID:1324 -
\??\c:\vdjdp.exec:\vdjdp.exe206⤵PID:468
-
\??\c:\lxffxfl.exec:\lxffxfl.exe207⤵PID:1636
-
\??\c:\vjdjj.exec:\vjdjj.exe208⤵PID:2356
-
\??\c:\flllxxf.exec:\flllxxf.exe209⤵PID:2380
-
\??\c:\ntbbnt.exec:\ntbbnt.exe210⤵PID:2916
-
\??\c:\frxfxlx.exec:\frxfxlx.exe211⤵PID:2512
-
\??\c:\jjppp.exec:\jjppp.exe212⤵PID:2824
-
\??\c:\htnhnt.exec:\htnhnt.exe213⤵PID:2828
-
\??\c:\xffxfxx.exec:\xffxfxx.exe214⤵PID:2744
-
\??\c:\jdjdv.exec:\jdjdv.exe215⤵PID:2628
-
\??\c:\htthhn.exec:\htthhn.exe216⤵PID:2244
-
\??\c:\lfxlfrl.exec:\lfxlfrl.exe217⤵PID:2328
-
\??\c:\fxxfrxx.exec:\fxxfrxx.exe218⤵PID:2980
-
\??\c:\tnbbbb.exec:\tnbbbb.exe219⤵PID:1832
-
\??\c:\xrlflxf.exec:\xrlflxf.exe220⤵
- System Location Discovery: System Language Discovery
PID:2348 -
\??\c:\nhhtnb.exec:\nhhtnb.exe221⤵PID:1692
-
\??\c:\llrlrll.exec:\llrlrll.exe222⤵PID:1316
-
\??\c:\jjpvj.exec:\jjpvj.exe223⤵PID:1300
-
\??\c:\httnth.exec:\httnth.exe224⤵PID:352
-
\??\c:\1frlxrx.exec:\1frlxrx.exe225⤵PID:764
-
\??\c:\bnbttt.exec:\bnbttt.exe226⤵PID:2064
-
\??\c:\pjvdv.exec:\pjvdv.exe227⤵PID:1900
-
\??\c:\nnhtnt.exec:\nnhtnt.exe228⤵
- System Location Discovery: System Language Discovery
PID:2396 -
\??\c:\llflrlr.exec:\llflrlr.exe229⤵PID:1740
-
\??\c:\jpdjp.exec:\jpdjp.exe230⤵
- System Location Discovery: System Language Discovery
PID:1144 -
\??\c:\rlrrxxx.exec:\rlrrxxx.exe231⤵PID:604
-
\??\c:\bhhhhb.exec:\bhhhhb.exe232⤵PID:2084
-
\??\c:\1rllrxf.exec:\1rllrxf.exe233⤵PID:1556
-
\??\c:\nnbbtt.exec:\nnbbtt.exe234⤵
- System Location Discovery: System Language Discovery
PID:1000 -
\??\c:\rrlfrlx.exec:\rrlfrlx.exe235⤵
- System Location Discovery: System Language Discovery
PID:2928 -
\??\c:\1btbhh.exec:\1btbhh.exe236⤵PID:3036
-
\??\c:\rrxrxxf.exec:\rrxrxxf.exe237⤵PID:2932
-
\??\c:\vddvd.exec:\vddvd.exe238⤵PID:2688
-
\??\c:\3rfrfrl.exec:\3rfrfrl.exe239⤵PID:2764
-
\??\c:\pddvd.exec:\pddvd.exe240⤵PID:1612
-
\??\c:\7xfxxff.exec:\7xfxxff.exe241⤵PID:2760
-
\??\c:\bhtntt.exec:\bhtntt.exe242⤵PID:2620