Analysis
-
max time kernel
120s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 05:40
Static task
static1
Behavioral task
behavioral1
Sample
f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe
Resource
win7-20240704-en
General
-
Target
f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe
-
Size
590KB
-
MD5
b99d38b0727cd3aa4179792df9f2aada
-
SHA1
eceed0c49b6fd652aea1964a521735379dce2013
-
SHA256
f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e
-
SHA512
9db1905ac72d899ddcc8eb23560b661e06ee0ec7465b9b991e55bc9b86eeb60706f4635ac3f1fe1082b2c71bc6877bf56b625666fe4a9e2bba7c901af16c1e8d
-
SSDEEP
6144:n3C9BRIj+ebjcSbcY+CaQdaFOY4iGFYtRdzzoyYxJAyfgayu:n3C9Lebz+xt4vFeFmgayu
Malware Config
Signatures
-
Detect Blackmoon payload 26 IoCs
Processes:
resource yara_rule behavioral2/memory/4284-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4284-9-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2744-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4176-19-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4176-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/556-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/64-75-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4884-74-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5096-68-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/5096-67-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1208-61-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/1208-60-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3016-40-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1624-27-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3216-87-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1236-92-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2324-106-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/5080-111-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2144-114-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3144-127-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/440-141-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3440-137-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3732-145-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4044-165-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3736-188-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4608-192-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
rxffxfx.exepjvdp.exedpjjv.exerllfrfl.exetnttbh.exelrlrrff.exelrxffxf.exefrxrrfx.exexffrlxl.exellrfxll.exexfrrlrl.exejvpdd.exebnnhbt.exedjpvv.exevjvdd.exehhbthn.exefrlllll.exeflfffll.exerrxxlfl.exetbnbbh.exe7rfllrx.exebttbhh.exetbhnnt.exedddjd.exethttnh.exepddjp.exedjjdd.exedvjjj.exexxfllll.exerrrxrrl.exepjvjj.exehbbbhn.exenthbnb.exehtbtbn.exeddjjp.exepvpjp.exetbhbhb.exefxxrfrf.exe3pdpp.exehtbhht.exelxlrxfr.exevjvvv.exefxrfrfr.exeflllxlf.exejjpjj.exenbttbh.exexlrrrxr.exepjpdj.exejjvjd.exethnhnb.exerxlrrlx.exejjpvd.exebnbhnn.exethtbbh.exexrfxxrr.exerlxlxfx.exennnhth.exerrrlrlr.exelxrllxr.exeflxxxxf.exehtnntt.exenbbthh.exerffllrx.exehtntbh.exepid process 2744 rxffxfx.exe 4176 pjvdp.exe 1624 dpjjv.exe 556 rllfrfl.exe 3016 tnttbh.exe 2224 lrlrrff.exe 1208 lrxffxf.exe 5096 frxrrfx.exe 4884 xffrlxl.exe 64 llrfxll.exe 3216 xfrrlrl.exe 1236 jvpdd.exe 4904 bnnhbt.exe 2324 djpvv.exe 5080 vjvdd.exe 2144 hhbthn.exe 992 frlllll.exe 3144 flfffll.exe 3440 rrxxlfl.exe 440 tbnbbh.exe 3732 7rfllrx.exe 4508 bttbhh.exe 3948 tbhnnt.exe 4044 dddjd.exe 2996 thttnh.exe 4772 pddjp.exe 812 djjdd.exe 3736 dvjjj.exe 4608 xxfllll.exe 4660 rrrxrrl.exe 2984 pjvjj.exe 1888 hbbbhn.exe 840 nthbnb.exe 1272 htbtbn.exe 4356 ddjjp.exe 2204 pvpjp.exe 4616 tbhbhb.exe 2420 fxxrfrf.exe 2952 3pdpp.exe 3516 htbhht.exe 2476 lxlrxfr.exe 2236 vjvvv.exe 556 fxrfrfr.exe 1192 flllxlf.exe 1836 jjpjj.exe 1208 nbttbh.exe 3532 xlrrrxr.exe 4884 pjpdj.exe 1756 jjvjd.exe 628 thnhnb.exe 396 rxlrrlx.exe 3816 jjpvd.exe 1688 bnbhnn.exe 636 thtbbh.exe 4064 xrfxxrr.exe 1088 rlxlxfx.exe 4784 nnnhth.exe 4544 rrrlrlr.exe 4568 lxrllxr.exe 1108 flxxxxf.exe 1848 htnntt.exe 1008 nbbthh.exe 3684 rffllrx.exe 2640 htntbh.exe -
Processes:
resource yara_rule behavioral2/memory/4284-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4284-9-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2744-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4176-19-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4176-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/556-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/64-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4884-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5096-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1208-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3016-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1624-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4176-17-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3216-87-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1236-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2324-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5080-111-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2144-114-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3144-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/440-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3440-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3732-145-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4044-165-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3736-188-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4608-192-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bbtbbn.exebhnhtn.exennbhhn.exepjvjd.exevpvjd.exepddjp.exebntbbb.exetnnhnn.exefrxrllx.exe5bntnn.exebtbhtn.exexllxfff.exetnnhth.exeflxrffx.exetnbhbh.exe3jpjp.exedjdvv.exejppjv.exepdddv.exevpppj.exethbhtn.exe3hhhnt.exedjpvv.exe7rfllrx.exejjjjp.exentnthh.exelxxxffr.exexxrxxrl.exefrrrlrr.exepvddj.exe7rxflrl.exevpjpd.exeflflxlf.exedpdpp.exenhtbbn.exedjjdv.exebnhnhb.exexlrrrxr.exejvvdj.exehhnhnt.exentttth.exebnhbtn.exedjjdj.exevvjvj.exedpvjd.exentnhtn.exepdjdv.exevvjvv.exevpjdv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbtbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nnbhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pjvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pddjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bntbbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frxrllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bntnn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btbhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xllxfff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnnhth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flxrffx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnbhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3jpjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djdvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jppjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpppj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thbhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3hhhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rfllrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jjjjp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnthh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxxffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrxxrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language frrrlrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvddj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7rxflrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flflxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpdpp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhtbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhnhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlrrrxr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hhnhnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntttth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bnhbtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djjdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntnhtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vpjdv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exerxffxfx.exepjvdp.exedpjjv.exerllfrfl.exetnttbh.exelrlrrff.exelrxffxf.exefrxrrfx.exexffrlxl.exellrfxll.exexfrrlrl.exejvpdd.exebnnhbt.exedjpvv.exevjvdd.exehhbthn.exefrlllll.exeflfffll.exerrxxlfl.exetbnbbh.exe7rfllrx.exedescription pid process target process PID 4284 wrote to memory of 2744 4284 f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe rxffxfx.exe PID 4284 wrote to memory of 2744 4284 f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe rxffxfx.exe PID 4284 wrote to memory of 2744 4284 f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe rxffxfx.exe PID 2744 wrote to memory of 4176 2744 rxffxfx.exe pjvdp.exe PID 2744 wrote to memory of 4176 2744 rxffxfx.exe pjvdp.exe PID 2744 wrote to memory of 4176 2744 rxffxfx.exe pjvdp.exe PID 4176 wrote to memory of 1624 4176 pjvdp.exe dpjjv.exe PID 4176 wrote to memory of 1624 4176 pjvdp.exe dpjjv.exe PID 4176 wrote to memory of 1624 4176 pjvdp.exe dpjjv.exe PID 1624 wrote to memory of 556 1624 dpjjv.exe rllfrfl.exe PID 1624 wrote to memory of 556 1624 dpjjv.exe rllfrfl.exe PID 1624 wrote to memory of 556 1624 dpjjv.exe rllfrfl.exe PID 556 wrote to memory of 3016 556 rllfrfl.exe tnttbh.exe PID 556 wrote to memory of 3016 556 rllfrfl.exe tnttbh.exe PID 556 wrote to memory of 3016 556 rllfrfl.exe tnttbh.exe PID 3016 wrote to memory of 2224 3016 tnttbh.exe lrlrrff.exe PID 3016 wrote to memory of 2224 3016 tnttbh.exe lrlrrff.exe PID 3016 wrote to memory of 2224 3016 tnttbh.exe lrlrrff.exe PID 2224 wrote to memory of 1208 2224 lrlrrff.exe lrxffxf.exe PID 2224 wrote to memory of 1208 2224 lrlrrff.exe lrxffxf.exe PID 2224 wrote to memory of 1208 2224 lrlrrff.exe lrxffxf.exe PID 1208 wrote to memory of 5096 1208 lrxffxf.exe frxrrfx.exe PID 1208 wrote to memory of 5096 1208 lrxffxf.exe frxrrfx.exe PID 1208 wrote to memory of 5096 1208 lrxffxf.exe frxrrfx.exe PID 5096 wrote to memory of 4884 5096 frxrrfx.exe xffrlxl.exe PID 5096 wrote to memory of 4884 5096 frxrrfx.exe xffrlxl.exe PID 5096 wrote to memory of 4884 5096 frxrrfx.exe xffrlxl.exe PID 4884 wrote to memory of 64 4884 xffrlxl.exe llrfxll.exe PID 4884 wrote to memory of 64 4884 xffrlxl.exe llrfxll.exe PID 4884 wrote to memory of 64 4884 xffrlxl.exe llrfxll.exe PID 64 wrote to memory of 3216 64 llrfxll.exe xfrrlrl.exe PID 64 wrote to memory of 3216 64 llrfxll.exe xfrrlrl.exe PID 64 wrote to memory of 3216 64 llrfxll.exe xfrrlrl.exe PID 3216 wrote to memory of 1236 3216 xfrrlrl.exe jvpdd.exe PID 3216 wrote to memory of 1236 3216 xfrrlrl.exe jvpdd.exe PID 3216 wrote to memory of 1236 3216 xfrrlrl.exe jvpdd.exe PID 1236 wrote to memory of 4904 1236 jvpdd.exe bnnhbt.exe PID 1236 wrote to memory of 4904 1236 jvpdd.exe bnnhbt.exe PID 1236 wrote to memory of 4904 1236 jvpdd.exe bnnhbt.exe PID 4904 wrote to memory of 2324 4904 bnnhbt.exe djpvv.exe PID 4904 wrote to memory of 2324 4904 bnnhbt.exe djpvv.exe PID 4904 wrote to memory of 2324 4904 bnnhbt.exe djpvv.exe PID 2324 wrote to memory of 5080 2324 djpvv.exe vjvdd.exe PID 2324 wrote to memory of 5080 2324 djpvv.exe vjvdd.exe PID 2324 wrote to memory of 5080 2324 djpvv.exe vjvdd.exe PID 5080 wrote to memory of 2144 5080 vjvdd.exe hhbthn.exe PID 5080 wrote to memory of 2144 5080 vjvdd.exe hhbthn.exe PID 5080 wrote to memory of 2144 5080 vjvdd.exe hhbthn.exe PID 2144 wrote to memory of 992 2144 hhbthn.exe frlllll.exe PID 2144 wrote to memory of 992 2144 hhbthn.exe frlllll.exe PID 2144 wrote to memory of 992 2144 hhbthn.exe frlllll.exe PID 992 wrote to memory of 3144 992 frlllll.exe flfffll.exe PID 992 wrote to memory of 3144 992 frlllll.exe flfffll.exe PID 992 wrote to memory of 3144 992 frlllll.exe flfffll.exe PID 3144 wrote to memory of 3440 3144 flfffll.exe rrxxlfl.exe PID 3144 wrote to memory of 3440 3144 flfffll.exe rrxxlfl.exe PID 3144 wrote to memory of 3440 3144 flfffll.exe rrxxlfl.exe PID 3440 wrote to memory of 440 3440 rrxxlfl.exe tbnbbh.exe PID 3440 wrote to memory of 440 3440 rrxxlfl.exe tbnbbh.exe PID 3440 wrote to memory of 440 3440 rrxxlfl.exe tbnbbh.exe PID 440 wrote to memory of 3732 440 tbnbbh.exe 7rfllrx.exe PID 440 wrote to memory of 3732 440 tbnbbh.exe 7rfllrx.exe PID 440 wrote to memory of 3732 440 tbnbbh.exe 7rfllrx.exe PID 3732 wrote to memory of 4508 3732 7rfllrx.exe bttbhh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe"C:\Users\Admin\AppData\Local\Temp\f00169b0ce81d83fa0d48aa78a0afdff54ab642e7f955140c70269bc9334be2e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
\??\c:\rxffxfx.exec:\rxffxfx.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2744 -
\??\c:\pjvdp.exec:\pjvdp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4176 -
\??\c:\dpjjv.exec:\dpjjv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
\??\c:\rllfrfl.exec:\rllfrfl.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:556 -
\??\c:\tnttbh.exec:\tnttbh.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3016 -
\??\c:\lrlrrff.exec:\lrlrrff.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
\??\c:\lrxffxf.exec:\lrxffxf.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1208 -
\??\c:\frxrrfx.exec:\frxrrfx.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
\??\c:\xffrlxl.exec:\xffrlxl.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
\??\c:\llrfxll.exec:\llrfxll.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
\??\c:\xfrrlrl.exec:\xfrrlrl.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
\??\c:\jvpdd.exec:\jvpdd.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1236 -
\??\c:\bnnhbt.exec:\bnnhbt.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
\??\c:\djpvv.exec:\djpvv.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2324 -
\??\c:\vjvdd.exec:\vjvdd.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5080 -
\??\c:\hhbthn.exec:\hhbthn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
\??\c:\frlllll.exec:\frlllll.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:992 -
\??\c:\flfffll.exec:\flfffll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3144 -
\??\c:\rrxxlfl.exec:\rrxxlfl.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
\??\c:\tbnbbh.exec:\tbnbbh.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:440 -
\??\c:\7rfllrx.exec:\7rfllrx.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
\??\c:\bttbhh.exec:\bttbhh.exe23⤵
- Executes dropped EXE
PID:4508 -
\??\c:\tbhnnt.exec:\tbhnnt.exe24⤵
- Executes dropped EXE
PID:3948 -
\??\c:\dddjd.exec:\dddjd.exe25⤵
- Executes dropped EXE
PID:4044 -
\??\c:\thttnh.exec:\thttnh.exe26⤵
- Executes dropped EXE
PID:2996 -
\??\c:\pddjp.exec:\pddjp.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4772 -
\??\c:\djjdd.exec:\djjdd.exe28⤵
- Executes dropped EXE
PID:812 -
\??\c:\dvjjj.exec:\dvjjj.exe29⤵
- Executes dropped EXE
PID:3736 -
\??\c:\xxfllll.exec:\xxfllll.exe30⤵
- Executes dropped EXE
PID:4608 -
\??\c:\rrrxrrl.exec:\rrrxrrl.exe31⤵
- Executes dropped EXE
PID:4660 -
\??\c:\pjvjj.exec:\pjvjj.exe32⤵
- Executes dropped EXE
PID:2984 -
\??\c:\hbbbhn.exec:\hbbbhn.exe33⤵
- Executes dropped EXE
PID:1888 -
\??\c:\nthbnb.exec:\nthbnb.exe34⤵
- Executes dropped EXE
PID:840 -
\??\c:\htbtbn.exec:\htbtbn.exe35⤵
- Executes dropped EXE
PID:1272 -
\??\c:\ddjjp.exec:\ddjjp.exe36⤵
- Executes dropped EXE
PID:4356 -
\??\c:\pvpjp.exec:\pvpjp.exe37⤵
- Executes dropped EXE
PID:2204 -
\??\c:\tbhbhb.exec:\tbhbhb.exe38⤵
- Executes dropped EXE
PID:4616 -
\??\c:\fxxrfrf.exec:\fxxrfrf.exe39⤵
- Executes dropped EXE
PID:2420 -
\??\c:\3pdpp.exec:\3pdpp.exe40⤵
- Executes dropped EXE
PID:2952 -
\??\c:\htbhht.exec:\htbhht.exe41⤵
- Executes dropped EXE
PID:3516 -
\??\c:\lxlrxfr.exec:\lxlrxfr.exe42⤵
- Executes dropped EXE
PID:2476 -
\??\c:\vjvvv.exec:\vjvvv.exe43⤵
- Executes dropped EXE
PID:2236 -
\??\c:\fxrfrfr.exec:\fxrfrfr.exe44⤵
- Executes dropped EXE
PID:556 -
\??\c:\flllxlf.exec:\flllxlf.exe45⤵
- Executes dropped EXE
PID:1192 -
\??\c:\jjpjj.exec:\jjpjj.exe46⤵
- Executes dropped EXE
PID:1836 -
\??\c:\nbttbh.exec:\nbttbh.exe47⤵
- Executes dropped EXE
PID:1208 -
\??\c:\xlrrrxr.exec:\xlrrrxr.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3532 -
\??\c:\pjpdj.exec:\pjpdj.exe49⤵
- Executes dropped EXE
PID:4884 -
\??\c:\jjvjd.exec:\jjvjd.exe50⤵
- Executes dropped EXE
PID:1756 -
\??\c:\thnhnb.exec:\thnhnb.exe51⤵
- Executes dropped EXE
PID:628 -
\??\c:\rxlrrlx.exec:\rxlrrlx.exe52⤵
- Executes dropped EXE
PID:396 -
\??\c:\jjpvd.exec:\jjpvd.exe53⤵
- Executes dropped EXE
PID:3816 -
\??\c:\bnbhnn.exec:\bnbhnn.exe54⤵
- Executes dropped EXE
PID:1688 -
\??\c:\thtbbh.exec:\thtbbh.exe55⤵
- Executes dropped EXE
PID:636 -
\??\c:\xrfxxrr.exec:\xrfxxrr.exe56⤵
- Executes dropped EXE
PID:4064 -
\??\c:\rlxlxfx.exec:\rlxlxfx.exe57⤵
- Executes dropped EXE
PID:1088 -
\??\c:\nnnhth.exec:\nnnhth.exe58⤵
- Executes dropped EXE
PID:4784 -
\??\c:\rrrlrlr.exec:\rrrlrlr.exe59⤵
- Executes dropped EXE
PID:4544 -
\??\c:\lxrllxr.exec:\lxrllxr.exe60⤵
- Executes dropped EXE
PID:4568 -
\??\c:\flxxxxf.exec:\flxxxxf.exe61⤵
- Executes dropped EXE
PID:1108 -
\??\c:\htnntt.exec:\htnntt.exe62⤵
- Executes dropped EXE
PID:1848 -
\??\c:\nbbthh.exec:\nbbthh.exe63⤵
- Executes dropped EXE
PID:1008 -
\??\c:\rffllrx.exec:\rffllrx.exe64⤵
- Executes dropped EXE
PID:3684 -
\??\c:\htntbh.exec:\htntbh.exe65⤵
- Executes dropped EXE
PID:2640 -
\??\c:\frlfxlf.exec:\frlfxlf.exe66⤵PID:4124
-
\??\c:\btbhbb.exec:\btbhbb.exe67⤵PID:1064
-
\??\c:\xfrflff.exec:\xfrflff.exe68⤵PID:4424
-
\??\c:\xfllllx.exec:\xfllllx.exe69⤵PID:2560
-
\??\c:\rxlxxll.exec:\rxlxxll.exe70⤵PID:4280
-
\??\c:\lfflrfr.exec:\lfflrfr.exe71⤵PID:4640
-
\??\c:\lrfrrlr.exec:\lrfrrlr.exe72⤵PID:4432
-
\??\c:\dvpvd.exec:\dvpvd.exe73⤵PID:768
-
\??\c:\llxxffl.exec:\llxxffl.exe74⤵PID:1484
-
\??\c:\dvjvv.exec:\dvjvv.exe75⤵PID:1224
-
\??\c:\fffxlff.exec:\fffxlff.exe76⤵PID:5052
-
\??\c:\1xxrllf.exec:\1xxrllf.exe77⤵PID:4384
-
\??\c:\xxxlxxl.exec:\xxxlxxl.exe78⤵PID:808
-
\??\c:\llflxxf.exec:\llflxxf.exe79⤵PID:900
-
\??\c:\fxllrxx.exec:\fxllrxx.exe80⤵PID:4284
-
\??\c:\rrxrrxl.exec:\rrxrrxl.exe81⤵PID:2744
-
\??\c:\jppjp.exec:\jppjp.exe82⤵PID:2600
-
\??\c:\vvvdj.exec:\vvvdj.exe83⤵PID:4644
-
\??\c:\xfxrlxf.exec:\xfxrlxf.exe84⤵PID:4512
-
\??\c:\xrrrllf.exec:\xrrrllf.exe85⤵PID:1192
-
\??\c:\pjddv.exec:\pjddv.exe86⤵PID:3472
-
\??\c:\lxrxllx.exec:\lxrxllx.exe87⤵PID:3432
-
\??\c:\xrxflxl.exec:\xrxflxl.exe88⤵PID:4940
-
\??\c:\jpdpd.exec:\jpdpd.exe89⤵PID:4952
-
\??\c:\xrlxffl.exec:\xrlxffl.exe90⤵PID:1640
-
\??\c:\pjjvp.exec:\pjjvp.exe91⤵PID:396
-
\??\c:\djppv.exec:\djppv.exe92⤵PID:3688
-
\??\c:\3bhhbt.exec:\3bhhbt.exe93⤵PID:4696
-
\??\c:\rxrfllf.exec:\rxrfllf.exe94⤵PID:4904
-
\??\c:\pdpjv.exec:\pdpjv.exe95⤵PID:3972
-
\??\c:\frxlrrx.exec:\frxlrrx.exe96⤵PID:1600
-
\??\c:\xlxxlxf.exec:\xlxxlxf.exe97⤵PID:3884
-
\??\c:\vvvpp.exec:\vvvpp.exe98⤵PID:3992
-
\??\c:\5vpdv.exec:\5vpdv.exe99⤵PID:4664
-
\??\c:\lfrrrrf.exec:\lfrrrrf.exe100⤵PID:3976
-
\??\c:\vvvjv.exec:\vvvjv.exe101⤵PID:3860
-
\??\c:\nntbtn.exec:\nntbtn.exe102⤵PID:3276
-
\??\c:\xlrxffx.exec:\xlrxffx.exe103⤵PID:4244
-
\??\c:\vpjjv.exec:\vpjjv.exe104⤵PID:3616
-
\??\c:\dpppj.exec:\dpppj.exe105⤵PID:3204
-
\??\c:\bnhbnt.exec:\bnhbnt.exe106⤵PID:4424
-
\??\c:\ffxffff.exec:\ffxffff.exe107⤵PID:2560
-
\??\c:\pjvdd.exec:\pjvdd.exe108⤵PID:2200
-
\??\c:\bnhnbt.exec:\bnhnbt.exe109⤵PID:3304
-
\??\c:\hhtbbn.exec:\hhtbbn.exe110⤵PID:2880
-
\??\c:\pjppj.exec:\pjppj.exe111⤵PID:2120
-
\??\c:\htbbbt.exec:\htbbbt.exe112⤵PID:2984
-
\??\c:\bnbthn.exec:\bnbthn.exe113⤵PID:1488
-
\??\c:\fxxfffx.exec:\fxxfffx.exe114⤵PID:4764
-
\??\c:\btnbth.exec:\btnbth.exe115⤵PID:2660
-
\??\c:\hththn.exec:\hththn.exe116⤵PID:4404
-
\??\c:\ddvdd.exec:\ddvdd.exe117⤵PID:3080
-
\??\c:\pddjp.exec:\pddjp.exe118⤵PID:2824
-
\??\c:\bntbtt.exec:\bntbtt.exe119⤵PID:1872
-
\??\c:\9ntbbt.exec:\9ntbbt.exe120⤵PID:5056
-
\??\c:\lfxflrx.exec:\lfxflrx.exe121⤵PID:4788
-
\??\c:\llxfrxl.exec:\llxfrxl.exe122⤵PID:4456
-
\??\c:\9tnnhb.exec:\9tnnhb.exe123⤵PID:4436
-
\??\c:\rffllrf.exec:\rffllrf.exe124⤵PID:3192
-
\??\c:\vvpjv.exec:\vvpjv.exe125⤵PID:2224
-
\??\c:\hthnnt.exec:\hthnnt.exe126⤵PID:1180
-
\??\c:\ntbnbh.exec:\ntbnbh.exe127⤵PID:3536
-
\??\c:\vdpvp.exec:\vdpvp.exe128⤵PID:628
-
\??\c:\xffffff.exec:\xffffff.exe129⤵PID:5100
-
\??\c:\jppvd.exec:\jppvd.exe130⤵PID:2584
-
\??\c:\hbbtnn.exec:\hbbtnn.exe131⤵PID:3148
-
\??\c:\flfrlfx.exec:\flfrlfx.exe132⤵PID:2608
-
\??\c:\nbthhn.exec:\nbthhn.exe133⤵PID:4784
-
\??\c:\jpjdp.exec:\jpjdp.exe134⤵PID:920
-
\??\c:\xlxrllf.exec:\xlxrllf.exe135⤵PID:5068
-
\??\c:\nthhhn.exec:\nthhhn.exe136⤵PID:3440
-
\??\c:\thtttt.exec:\thtttt.exe137⤵PID:3744
-
\??\c:\ppjdv.exec:\ppjdv.exe138⤵PID:1460
-
\??\c:\jppjv.exec:\jppjv.exe139⤵
- System Location Discovery: System Language Discovery
PID:2720 -
\??\c:\xlllllf.exec:\xlllllf.exe140⤵PID:368
-
\??\c:\pdjdv.exec:\pdjdv.exe141⤵
- System Location Discovery: System Language Discovery
PID:2808 -
\??\c:\bhtbbb.exec:\bhtbbb.exe142⤵PID:4280
-
\??\c:\thhhtt.exec:\thhhtt.exe143⤵PID:2200
-
\??\c:\rflrlxr.exec:\rflrlxr.exe144⤵PID:3304
-
\??\c:\7flrxxx.exec:\7flrxxx.exe145⤵PID:2748
-
\??\c:\ppjjj.exec:\ppjjj.exe146⤵PID:3156
-
\??\c:\btntth.exec:\btntth.exe147⤵PID:2984
-
\??\c:\lrlxfxl.exec:\lrlxfxl.exe148⤵PID:1220
-
\??\c:\bttbbt.exec:\bttbbt.exe149⤵PID:4532
-
\??\c:\fflflrf.exec:\fflflrf.exe150⤵PID:1072
-
\??\c:\vppvv.exec:\vppvv.exe151⤵PID:736
-
\??\c:\bbtbbn.exec:\bbtbbn.exe152⤵
- System Location Discovery: System Language Discovery
PID:4956 -
\??\c:\vvdpp.exec:\vvdpp.exe153⤵PID:3152
-
\??\c:\hhhhnn.exec:\hhhhnn.exe154⤵PID:2420
-
\??\c:\jjpdp.exec:\jjpdp.exe155⤵PID:3080
-
\??\c:\vvdvd.exec:\vvdvd.exe156⤵PID:3592
-
\??\c:\bntbbh.exec:\bntbbh.exe157⤵PID:2600
-
\??\c:\pvddd.exec:\pvddd.exe158⤵PID:2236
-
\??\c:\htbhth.exec:\htbhth.exe159⤵PID:4448
-
\??\c:\vjddv.exec:\vjddv.exe160⤵PID:1208
-
\??\c:\jjvvp.exec:\jjvvp.exe161⤵PID:3340
-
\??\c:\xrxrffl.exec:\xrxrffl.exe162⤵PID:3532
-
\??\c:\jpdpd.exec:\jpdpd.exe163⤵PID:3432
-
\??\c:\hnhhnb.exec:\hnhhnb.exe164⤵PID:2208
-
\??\c:\pjppj.exec:\pjppj.exe165⤵PID:3512
-
\??\c:\rrlxxrr.exec:\rrlxxrr.exe166⤵PID:2064
-
\??\c:\vjdvv.exec:\vjdvv.exe167⤵PID:396
-
\??\c:\5nbhnb.exec:\5nbhnb.exe168⤵PID:1248
-
\??\c:\rxrfrxf.exec:\rxrfrxf.exe169⤵PID:3692
-
\??\c:\vjjdj.exec:\vjjdj.exe170⤵PID:2628
-
\??\c:\hbttth.exec:\hbttth.exe171⤵PID:1492
-
\??\c:\xxxrfrx.exec:\xxxrfrx.exe172⤵PID:2072
-
\??\c:\dvjvj.exec:\dvjvj.exe173⤵PID:2888
-
\??\c:\nnnhhb.exec:\nnnhhb.exe174⤵PID:1848
-
\??\c:\flrllxf.exec:\flrllxf.exe175⤵PID:3744
-
\??\c:\pdjvd.exec:\pdjvd.exe176⤵PID:5020
-
\??\c:\nbnbhh.exec:\nbnbhh.exe177⤵PID:4704
-
\??\c:\dpvjj.exec:\dpvjj.exe178⤵PID:3668
-
\??\c:\rrllrfl.exec:\rrllrfl.exe179⤵PID:4424
-
\??\c:\9ddjj.exec:\9ddjj.exe180⤵PID:4976
-
\??\c:\lxlfrxl.exec:\lxlfrxl.exe181⤵PID:4432
-
\??\c:\vdvjj.exec:\vdvjj.exe182⤵PID:2964
-
\??\c:\rrlxxrl.exec:\rrlxxrl.exe183⤵PID:4828
-
\??\c:\tbttbt.exec:\tbttbt.exe184⤵PID:1068
-
\??\c:\lxlffrf.exec:\lxlffrf.exe185⤵PID:4676
-
\??\c:\vddvd.exec:\vddvd.exe186⤵PID:1272
-
\??\c:\lxxfrff.exec:\lxxfrff.exe187⤵PID:4384
-
\??\c:\ppdpv.exec:\ppdpv.exe188⤵PID:4144
-
\??\c:\tbhbhh.exec:\tbhbhh.exe189⤵PID:1652
-
\??\c:\ddvdv.exec:\ddvdv.exe190⤵PID:3820
-
\??\c:\hbnbht.exec:\hbnbht.exe191⤵PID:900
-
\??\c:\djjdj.exec:\djjdj.exe192⤵
- System Location Discovery: System Language Discovery
PID:4892 -
\??\c:\jpvvp.exec:\jpvvp.exe193⤵PID:4284
-
\??\c:\llxllfl.exec:\llxllfl.exe194⤵PID:5072
-
\??\c:\jjvvd.exec:\jjvvd.exe195⤵PID:2588
-
\??\c:\flllfrr.exec:\flllfrr.exe196⤵PID:4788
-
\??\c:\lxxrfxx.exec:\lxxrfxx.exe197⤵PID:3460
-
\??\c:\bbtbth.exec:\bbtbth.exe198⤵PID:3332
-
\??\c:\lxflrrf.exec:\lxflrrf.exe199⤵PID:3192
-
\??\c:\hbtbnt.exec:\hbtbnt.exe200⤵PID:1452
-
\??\c:\dpvdv.exec:\dpvdv.exe201⤵PID:1180
-
\??\c:\rlfrfrx.exec:\rlfrfrx.exe202⤵PID:4708
-
\??\c:\jddpj.exec:\jddpj.exe203⤵PID:3384
-
\??\c:\5ttnnn.exec:\5ttnnn.exe204⤵PID:2064
-
\??\c:\jpdvd.exec:\jpdvd.exe205⤵PID:3376
-
\??\c:\hnbhbh.exec:\hnbhbh.exe206⤵PID:3160
-
\??\c:\pdpdv.exec:\pdpdv.exe207⤵PID:2144
-
\??\c:\bnntth.exec:\bnntth.exe208⤵PID:1792
-
\??\c:\vvjvv.exec:\vvjvv.exe209⤵
- System Location Discovery: System Language Discovery
PID:3992 -
\??\c:\tntttn.exec:\tntttn.exe210⤵PID:5068
-
\??\c:\lxfxflx.exec:\lxfxflx.exe211⤵PID:3508
-
\??\c:\1bttbt.exec:\1bttbt.exe212⤵PID:4856
-
\??\c:\pvvvv.exec:\pvvvv.exe213⤵PID:3744
-
\??\c:\xrfffrr.exec:\xrfffrr.exe214⤵PID:2432
-
\??\c:\tnnhtt.exec:\tnnhtt.exe215⤵PID:3468
-
\??\c:\lxxxrxf.exec:\lxxxrxf.exe216⤵PID:2720
-
\??\c:\tnthhh.exec:\tnthhh.exe217⤵PID:1908
-
\??\c:\vpjpd.exec:\vpjpd.exe218⤵
- System Location Discovery: System Language Discovery
PID:720 -
\??\c:\ntbbnb.exec:\ntbbnb.exe219⤵PID:4640
-
\??\c:\vdjpd.exec:\vdjpd.exe220⤵PID:4308
-
\??\c:\rfrrlrx.exec:\rfrrlrx.exe221⤵PID:4432
-
\??\c:\tbtnbb.exec:\tbtnbb.exe222⤵PID:4756
-
\??\c:\frrrlll.exec:\frrrlll.exe223⤵PID:3772
-
\??\c:\nnnbnb.exec:\nnnbnb.exe224⤵PID:1488
-
\??\c:\fxlfxfx.exec:\fxlfxfx.exe225⤵PID:4676
-
\??\c:\9jddj.exec:\9jddj.exe226⤵PID:2660
-
\??\c:\ttnhhh.exec:\ttnhhh.exe227⤵PID:5076
-
\??\c:\9vdjj.exec:\9vdjj.exe228⤵PID:8
-
\??\c:\hnnnhb.exec:\hnnnhb.exe229⤵PID:1652
-
\??\c:\xlrlrrr.exec:\xlrlrrr.exe230⤵PID:3152
-
\??\c:\pdddv.exec:\pdddv.exe231⤵
- System Location Discovery: System Language Discovery
PID:2420 -
\??\c:\ntnbhh.exec:\ntnbhh.exe232⤵PID:3080
-
\??\c:\fxrrrrx.exec:\fxrrrrx.exe233⤵PID:4644
-
\??\c:\nhhhhn.exec:\nhhhhn.exe234⤵PID:3016
-
\??\c:\5lxlrfr.exec:\5lxlrfr.exe235⤵PID:5096
-
\??\c:\nbtbtb.exec:\nbtbtb.exe236⤵PID:4436
-
\??\c:\xxxflrr.exec:\xxxflrr.exe237⤵PID:2224
-
\??\c:\bnnthb.exec:\bnnthb.exe238⤵PID:1452
-
\??\c:\xllrxff.exec:\xllrxff.exe239⤵PID:1808
-
\??\c:\nbtttb.exec:\nbtttb.exe240⤵PID:4896
-
\??\c:\dpjdp.exec:\dpjdp.exe241⤵PID:2584
-
\??\c:\nnbbht.exec:\nnbbht.exe242⤵PID:1228