Analysis
-
max time kernel
24s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 09:20
Static task
static1
Behavioral task
behavioral1
Sample
665e2c1ba6da46930f6751a2c984dac5a83082e54efe5bd9f24fae53d082da48N.exe
Resource
win7-20240903-en
General
-
Target
665e2c1ba6da46930f6751a2c984dac5a83082e54efe5bd9f24fae53d082da48N.exe
-
Size
75KB
-
MD5
b7f69c53be6094db14af1ff834a1ae70
-
SHA1
e1ca6b42d31e6cbba701b12cc48ba599ce86246c
-
SHA256
665e2c1ba6da46930f6751a2c984dac5a83082e54efe5bd9f24fae53d082da48
-
SHA512
f2287ca08dcc70f7396a5665b09bd1a0ac78e5608a01d1ceb0ff349c4386e7f5f17f5b78ca534321041bf9016092f0283192a67054541658e0c61b70ea17aade
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIvuzk358nLA89OGvrFVHmPi:ymb3NkkiQ3mdBjFIvl358nLA89OMFVHD
Malware Config
Signatures
-
Blackmoon family
-
Detect Blackmoon payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2876-10-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2704-61-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1156-149-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1268-176-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2956-310-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/868-301-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/3028-292-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1740-248-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/772-221-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/540-158-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/952-140-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1352-130-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/1056-122-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2612-113-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2664-84-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2828-49-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2084-37-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral1/memory/2940-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
vdjjd.exelrfxrff.exenbbhhn.exe1dddj.exefrrllxr.exe1frflfx.exetbnhbt.exevddvd.exe3vpjd.exerflffrl.exefflxrll.exettbtnh.exebhbnbh.exe5ddvp.exedvjdj.exerfxrxrx.exerlrlllf.exetnnhnb.exetbttbn.exevpvpp.exefllrxll.exelllfxlf.exexflrxrr.exehbbtnn.exehntnhb.exedjvpv.exevvjjp.exelffrrll.exe9xlrrrf.exehnhbbt.exentbbbb.exedjddv.exedjjvv.exexlrxfrl.exelrlflff.exerxrrxll.exennhtnb.exenbtnnt.exejvjdj.exejpjjd.exevjdvj.exe7xlllfl.exeflxrrfr.exelrrflfx.exehtbnnb.exentnnth.exe9tbthb.exedjpjp.exepvjvj.exe5jpjd.exeffflfrl.exexfxxlxx.exenntttn.exe9thbht.exenttntn.exevddvv.exepvjdd.exe7vjdd.exeflrxxlr.exexffxfxr.exefffxxll.exehntntn.exehhnnbb.exetbbtht.exepid process 2940 vdjjd.exe 2084 lrfxrff.exe 2828 nbbhhn.exe 2704 1dddj.exe 2784 frrllxr.exe 2664 1frflfx.exe 2712 tbnhbt.exe 2560 vddvd.exe 2612 3vpjd.exe 1056 rflffrl.exe 1352 fflxrll.exe 952 ttbtnh.exe 1156 bhbnbh.exe 540 5ddvp.exe 2520 dvjdj.exe 1268 rfxrxrx.exe 2776 rlrlllf.exe 272 tnnhnb.exe 2400 tbttbn.exe 2144 vpvpp.exe 772 fllrxll.exe 344 lllfxlf.exe 1124 xflrxrr.exe 1740 hbbtnn.exe 600 hntnhb.exe 2232 djvpv.exe 1564 vvjjp.exe 1324 lffrrll.exe 3028 9xlrrrf.exe 868 hnhbbt.exe 2956 ntbbbb.exe 1404 djddv.exe 2692 djjvv.exe 2788 xlrxfrl.exe 2740 lrlflff.exe 2784 rxrrxll.exe 2664 nnhtnb.exe 2596 nbtnnt.exe 3012 jvjdj.exe 2392 jpjjd.exe 1088 vjdvj.exe 2688 7xlllfl.exe 532 flxrrfr.exe 1256 lrrflfx.exe 568 htbnnb.exe 2324 ntnnth.exe 1664 9tbthb.exe 2620 djpjp.exe 1816 pvjvj.exe 900 5jpjd.exe 1716 ffflfrl.exe 2864 xfxxlxx.exe 1536 nntttn.exe 448 9thbht.exe 664 nttntn.exe 772 vddvv.exe 2416 pvjdd.exe 908 7vjdd.exe 1960 flrxxlr.exe 940 xffxfxr.exe 3068 fffxxll.exe 2904 hntntn.exe 2960 hhnnbb.exe 2488 tbbtht.exe -
Processes:
resource yara_rule behavioral1/memory/2876-3-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2876-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-74-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1156-149-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1268-176-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2956-310-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/868-301-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/3028-292-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1740-248-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/772-221-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/540-158-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/952-140-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1352-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/1056-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2612-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-96-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2560-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-84-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2664-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2784-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2784-63-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-52-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2704-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-49-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-40-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2828-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-37-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2084-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral1/memory/2940-13-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dvjjj.exepdjjd.exejpdpj.exetbbnth.exevjjvj.exeflrffxx.exerxfxrlf.exetntnbt.exexrxxllx.exelfxflrf.exepvvjd.exerxrllxf.exehnntnb.exejvjdp.exe9jvjv.exehnhbbt.exe3dvdd.exehbtnth.exe1nnnht.exe3xlxfrx.exeffllflx.exe1fxrxrf.exexxrxlxl.exebhnhhb.exedjvpv.exerrrfrfx.exehntnnh.exellllrll.exevvjjv.exepdddv.exepvvjj.exenbbhhn.exelffrrll.exentthhb.exebbhnhn.exelxxllfl.exefffrfrf.exepdjvj.exelrlflff.exelxflrxl.exexfxrllr.exelrflfrr.exehnnbbn.exevjpvv.exexffffrl.exenbtbth.exexrlrfrr.exedpjdv.exebbbbth.exexlxrxll.exelfxfrfx.exelxrfxlf.exebhnttn.exe7frlfrr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jpdpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tbbnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language flrffxx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxfxrlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tntnbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrxxllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxflrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvjd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rxrllxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnntnb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jvjdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jvjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnhbbt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dvdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtnth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1nnnht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3xlxfrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffllflx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fxrxrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxrxlxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnhhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language djvpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rrrfrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hntnnh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llllrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdddv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pvvjj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbbhhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lffrrll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntthhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbhnhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxxllfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fffrfrf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pdjvj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrlflff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxflrxl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xfxrllr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lrflfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hnnbbn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjpvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xffffrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbtbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrlrfrr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dpjdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbbbth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xlxrxll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lfxfrfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lxrfxlf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhnttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7frlfrr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
665e2c1ba6da46930f6751a2c984dac5a83082e54efe5bd9f24fae53d082da48N.exevdjjd.exelrfxrff.exenbbhhn.exe1dddj.exefrrllxr.exe1frflfx.exetbnhbt.exevddvd.exe3vpjd.exerflffrl.exefflxrll.exettbtnh.exebhbnbh.exe5ddvp.exedvjdj.exedescription pid process target process PID 2876 wrote to memory of 2940 2876 665e2c1ba6da46930f6751a2c984dac5a83082e54efe5bd9f24fae53d082da48N.exe vdjjd.exe PID 2876 wrote to memory of 2940 2876 665e2c1ba6da46930f6751a2c984dac5a83082e54efe5bd9f24fae53d082da48N.exe vdjjd.exe PID 2876 wrote to memory of 2940 2876 665e2c1ba6da46930f6751a2c984dac5a83082e54efe5bd9f24fae53d082da48N.exe vdjjd.exe PID 2876 wrote to memory of 2940 2876 665e2c1ba6da46930f6751a2c984dac5a83082e54efe5bd9f24fae53d082da48N.exe vdjjd.exe PID 2940 wrote to memory of 2084 2940 vdjjd.exe lrfxrff.exe PID 2940 wrote to memory of 2084 2940 vdjjd.exe lrfxrff.exe PID 2940 wrote to memory of 2084 2940 vdjjd.exe lrfxrff.exe PID 2940 wrote to memory of 2084 2940 vdjjd.exe lrfxrff.exe PID 2084 wrote to memory of 2828 2084 lrfxrff.exe nbbhhn.exe PID 2084 wrote to memory of 2828 2084 lrfxrff.exe nbbhhn.exe PID 2084 wrote to memory of 2828 2084 lrfxrff.exe nbbhhn.exe PID 2084 wrote to memory of 2828 2084 lrfxrff.exe nbbhhn.exe PID 2828 wrote to memory of 2704 2828 nbbhhn.exe 1dddj.exe PID 2828 wrote to memory of 2704 2828 nbbhhn.exe 1dddj.exe PID 2828 wrote to memory of 2704 2828 nbbhhn.exe 1dddj.exe PID 2828 wrote to memory of 2704 2828 nbbhhn.exe 1dddj.exe PID 2704 wrote to memory of 2784 2704 1dddj.exe frrllxr.exe PID 2704 wrote to memory of 2784 2704 1dddj.exe frrllxr.exe PID 2704 wrote to memory of 2784 2704 1dddj.exe frrllxr.exe PID 2704 wrote to memory of 2784 2704 1dddj.exe frrllxr.exe PID 2784 wrote to memory of 2664 2784 frrllxr.exe 1frflfx.exe PID 2784 wrote to memory of 2664 2784 frrllxr.exe 1frflfx.exe PID 2784 wrote to memory of 2664 2784 frrllxr.exe 1frflfx.exe PID 2784 wrote to memory of 2664 2784 frrllxr.exe 1frflfx.exe PID 2664 wrote to memory of 2712 2664 1frflfx.exe tbnhbt.exe PID 2664 wrote to memory of 2712 2664 1frflfx.exe tbnhbt.exe PID 2664 wrote to memory of 2712 2664 1frflfx.exe tbnhbt.exe PID 2664 wrote to memory of 2712 2664 1frflfx.exe tbnhbt.exe PID 2712 wrote to memory of 2560 2712 tbnhbt.exe vddvd.exe PID 2712 wrote to memory of 2560 2712 tbnhbt.exe vddvd.exe PID 2712 wrote to memory of 2560 2712 tbnhbt.exe vddvd.exe PID 2712 wrote to memory of 2560 2712 tbnhbt.exe vddvd.exe PID 2560 wrote to memory of 2612 2560 vddvd.exe 3vpjd.exe PID 2560 wrote to memory of 2612 2560 vddvd.exe 3vpjd.exe PID 2560 wrote to memory of 2612 2560 vddvd.exe 3vpjd.exe PID 2560 wrote to memory of 2612 2560 vddvd.exe 3vpjd.exe PID 2612 wrote to memory of 1056 2612 3vpjd.exe rflffrl.exe PID 2612 wrote to memory of 1056 2612 3vpjd.exe rflffrl.exe PID 2612 wrote to memory of 1056 2612 3vpjd.exe rflffrl.exe PID 2612 wrote to memory of 1056 2612 3vpjd.exe rflffrl.exe PID 1056 wrote to memory of 1352 1056 rflffrl.exe fflxrll.exe PID 1056 wrote to memory of 1352 1056 rflffrl.exe fflxrll.exe PID 1056 wrote to memory of 1352 1056 rflffrl.exe fflxrll.exe PID 1056 wrote to memory of 1352 1056 rflffrl.exe fflxrll.exe PID 1352 wrote to memory of 952 1352 fflxrll.exe ttbtnh.exe PID 1352 wrote to memory of 952 1352 fflxrll.exe ttbtnh.exe PID 1352 wrote to memory of 952 1352 fflxrll.exe ttbtnh.exe PID 1352 wrote to memory of 952 1352 fflxrll.exe ttbtnh.exe PID 952 wrote to memory of 1156 952 ttbtnh.exe bhbnbh.exe PID 952 wrote to memory of 1156 952 ttbtnh.exe bhbnbh.exe PID 952 wrote to memory of 1156 952 ttbtnh.exe bhbnbh.exe PID 952 wrote to memory of 1156 952 ttbtnh.exe bhbnbh.exe PID 1156 wrote to memory of 540 1156 bhbnbh.exe 5ddvp.exe PID 1156 wrote to memory of 540 1156 bhbnbh.exe 5ddvp.exe PID 1156 wrote to memory of 540 1156 bhbnbh.exe 5ddvp.exe PID 1156 wrote to memory of 540 1156 bhbnbh.exe 5ddvp.exe PID 540 wrote to memory of 2520 540 5ddvp.exe dvjdj.exe PID 540 wrote to memory of 2520 540 5ddvp.exe dvjdj.exe PID 540 wrote to memory of 2520 540 5ddvp.exe dvjdj.exe PID 540 wrote to memory of 2520 540 5ddvp.exe dvjdj.exe PID 2520 wrote to memory of 1268 2520 dvjdj.exe rfxrxrx.exe PID 2520 wrote to memory of 1268 2520 dvjdj.exe rfxrxrx.exe PID 2520 wrote to memory of 1268 2520 dvjdj.exe rfxrxrx.exe PID 2520 wrote to memory of 1268 2520 dvjdj.exe rfxrxrx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\665e2c1ba6da46930f6751a2c984dac5a83082e54efe5bd9f24fae53d082da48N.exe"C:\Users\Admin\AppData\Local\Temp\665e2c1ba6da46930f6751a2c984dac5a83082e54efe5bd9f24fae53d082da48N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2876 -
\??\c:\vdjjd.exec:\vdjjd.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2940 -
\??\c:\lrfxrff.exec:\lrfxrff.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2084 -
\??\c:\nbbhhn.exec:\nbbhhn.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
\??\c:\1dddj.exec:\1dddj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\frrllxr.exec:\frrllxr.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
\??\c:\1frflfx.exec:\1frflfx.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
\??\c:\tbnhbt.exec:\tbnhbt.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
\??\c:\vddvd.exec:\vddvd.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
\??\c:\3vpjd.exec:\3vpjd.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
\??\c:\rflffrl.exec:\rflffrl.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1056 -
\??\c:\fflxrll.exec:\fflxrll.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
\??\c:\ttbtnh.exec:\ttbtnh.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
\??\c:\bhbnbh.exec:\bhbnbh.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
\??\c:\5ddvp.exec:\5ddvp.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540 -
\??\c:\dvjdj.exec:\dvjdj.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
\??\c:\rfxrxrx.exec:\rfxrxrx.exe17⤵
- Executes dropped EXE
PID:1268 -
\??\c:\rlrlllf.exec:\rlrlllf.exe18⤵
- Executes dropped EXE
PID:2776 -
\??\c:\tnnhnb.exec:\tnnhnb.exe19⤵
- Executes dropped EXE
PID:272 -
\??\c:\tbttbn.exec:\tbttbn.exe20⤵
- Executes dropped EXE
PID:2400 -
\??\c:\vpvpp.exec:\vpvpp.exe21⤵
- Executes dropped EXE
PID:2144 -
\??\c:\fllrxll.exec:\fllrxll.exe22⤵
- Executes dropped EXE
PID:772 -
\??\c:\lllfxlf.exec:\lllfxlf.exe23⤵
- Executes dropped EXE
PID:344 -
\??\c:\xflrxrr.exec:\xflrxrr.exe24⤵
- Executes dropped EXE
PID:1124 -
\??\c:\hbbtnn.exec:\hbbtnn.exe25⤵
- Executes dropped EXE
PID:1740 -
\??\c:\hntnhb.exec:\hntnhb.exe26⤵
- Executes dropped EXE
PID:600 -
\??\c:\djvpv.exec:\djvpv.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232 -
\??\c:\vvjjp.exec:\vvjjp.exe28⤵
- Executes dropped EXE
PID:1564 -
\??\c:\lffrrll.exec:\lffrrll.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1324 -
\??\c:\9xlrrrf.exec:\9xlrrrf.exe30⤵
- Executes dropped EXE
PID:3028 -
\??\c:\hnhbbt.exec:\hnhbbt.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:868 -
\??\c:\ntbbbb.exec:\ntbbbb.exe32⤵
- Executes dropped EXE
PID:2956 -
\??\c:\djddv.exec:\djddv.exe33⤵
- Executes dropped EXE
PID:1404 -
\??\c:\djjvv.exec:\djjvv.exe34⤵
- Executes dropped EXE
PID:2692 -
\??\c:\xlrxfrl.exec:\xlrxfrl.exe35⤵
- Executes dropped EXE
PID:2788 -
\??\c:\lrlflff.exec:\lrlflff.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2740 -
\??\c:\rxrrxll.exec:\rxrrxll.exe37⤵
- Executes dropped EXE
PID:2784 -
\??\c:\nnhtnb.exec:\nnhtnb.exe38⤵
- Executes dropped EXE
PID:2664 -
\??\c:\nbtnnt.exec:\nbtnnt.exe39⤵
- Executes dropped EXE
PID:2596 -
\??\c:\jvjdj.exec:\jvjdj.exe40⤵
- Executes dropped EXE
PID:3012 -
\??\c:\jpjjd.exec:\jpjjd.exe41⤵
- Executes dropped EXE
PID:2392 -
\??\c:\vjdvj.exec:\vjdvj.exe42⤵
- Executes dropped EXE
PID:1088 -
\??\c:\7xlllfl.exec:\7xlllfl.exe43⤵
- Executes dropped EXE
PID:2688 -
\??\c:\flxrrfr.exec:\flxrrfr.exe44⤵
- Executes dropped EXE
PID:532 -
\??\c:\lrrflfx.exec:\lrrflfx.exe45⤵
- Executes dropped EXE
PID:1256 -
\??\c:\htbnnb.exec:\htbnnb.exe46⤵
- Executes dropped EXE
PID:568 -
\??\c:\ntnnth.exec:\ntnnth.exe47⤵
- Executes dropped EXE
PID:2324 -
\??\c:\9tbthb.exec:\9tbthb.exe48⤵
- Executes dropped EXE
PID:1664 -
\??\c:\djpjp.exec:\djpjp.exe49⤵
- Executes dropped EXE
PID:2620 -
\??\c:\pvjvj.exec:\pvjvj.exe50⤵
- Executes dropped EXE
PID:1816 -
\??\c:\5jpjd.exec:\5jpjd.exe51⤵
- Executes dropped EXE
PID:900 -
\??\c:\ffflfrl.exec:\ffflfrl.exe52⤵
- Executes dropped EXE
PID:1716 -
\??\c:\xfxxlxx.exec:\xfxxlxx.exe53⤵
- Executes dropped EXE
PID:2864 -
\??\c:\nntttn.exec:\nntttn.exe54⤵
- Executes dropped EXE
PID:1536 -
\??\c:\9thbht.exec:\9thbht.exe55⤵
- Executes dropped EXE
PID:448 -
\??\c:\nttntn.exec:\nttntn.exe56⤵
- Executes dropped EXE
PID:664 -
\??\c:\vddvv.exec:\vddvv.exe57⤵
- Executes dropped EXE
PID:772 -
\??\c:\pvjdd.exec:\pvjdd.exe58⤵
- Executes dropped EXE
PID:2416 -
\??\c:\7vjdd.exec:\7vjdd.exe59⤵
- Executes dropped EXE
PID:908 -
\??\c:\flrxxlr.exec:\flrxxlr.exe60⤵
- Executes dropped EXE
PID:1960 -
\??\c:\xffxfxr.exec:\xffxfxr.exe61⤵
- Executes dropped EXE
PID:940 -
\??\c:\fffxxll.exec:\fffxxll.exe62⤵
- Executes dropped EXE
PID:3068 -
\??\c:\hntntn.exec:\hntntn.exe63⤵
- Executes dropped EXE
PID:2904 -
\??\c:\hhnnbb.exec:\hhnnbb.exe64⤵
- Executes dropped EXE
PID:2960 -
\??\c:\tbbtht.exec:\tbbtht.exe65⤵
- Executes dropped EXE
PID:2488 -
\??\c:\vpdvv.exec:\vpdvv.exe66⤵PID:2512
-
\??\c:\flfrrxl.exec:\flfrrxl.exe67⤵PID:3024
-
\??\c:\3xfrrxl.exec:\3xfrrxl.exe68⤵PID:1744
-
\??\c:\bhnnhn.exec:\bhnnhn.exe69⤵PID:1860
-
\??\c:\hbhnbh.exec:\hbhnbh.exe70⤵PID:1788
-
\??\c:\5jjdp.exec:\5jjdp.exe71⤵PID:2320
-
\??\c:\dvvjj.exec:\dvvjj.exe72⤵PID:2308
-
\??\c:\frxlfrl.exec:\frxlfrl.exe73⤵PID:2068
-
\??\c:\xlllfxr.exec:\xlllfxr.exe74⤵PID:2716
-
\??\c:\hnnnth.exec:\hnnnth.exe75⤵PID:2600
-
\??\c:\hbhbht.exec:\hbhbht.exe76⤵PID:1164
-
\??\c:\3dvdd.exec:\3dvdd.exe77⤵
- System Location Discovery: System Language Discovery
PID:2564 -
\??\c:\vddjj.exec:\vddjj.exe78⤵PID:1852
-
\??\c:\jddjv.exec:\jddjv.exe79⤵PID:2360
-
\??\c:\rrxxrfl.exec:\rrxxrfl.exe80⤵PID:304
-
\??\c:\fxlrfrf.exec:\fxlrfrf.exe81⤵PID:1108
-
\??\c:\xllfrlx.exec:\xllfrlx.exe82⤵PID:396
-
\??\c:\5bbbtt.exec:\5bbbtt.exe83⤵PID:1956
-
\??\c:\hhhbnh.exec:\hhhbnh.exe84⤵PID:2060
-
\??\c:\9vpdj.exec:\9vpdj.exe85⤵PID:980
-
\??\c:\jjdvp.exec:\jjdvp.exe86⤵PID:2324
-
\??\c:\ppjjv.exec:\ppjjv.exe87⤵PID:2636
-
\??\c:\rrrfrfx.exec:\rrrfrfx.exe88⤵
- System Location Discovery: System Language Discovery
PID:2972 -
\??\c:\fxrxrrl.exec:\fxrxrrl.exe89⤵PID:2584
-
\??\c:\bbbbth.exec:\bbbbth.exe90⤵
- System Location Discovery: System Language Discovery
PID:900 -
\??\c:\nnbnhh.exec:\nnbnhh.exe91⤵PID:2432
-
\??\c:\ttntbh.exec:\ttntbh.exe92⤵PID:2864
-
\??\c:\jpdjd.exec:\jpdjd.exe93⤵PID:1536
-
\??\c:\dpjpj.exec:\dpjpj.exe94⤵PID:448
-
\??\c:\ppvjp.exec:\ppvjp.exe95⤵PID:664
-
\??\c:\frxxffl.exec:\frxxffl.exe96⤵PID:1376
-
\??\c:\fxrfrfr.exec:\fxrfrfr.exe97⤵PID:1640
-
\??\c:\nthtnt.exec:\nthtnt.exe98⤵PID:1540
-
\??\c:\hhnntb.exec:\hhnntb.exe99⤵PID:1728
-
\??\c:\3bnnth.exec:\3bnnth.exe100⤵PID:600
-
\??\c:\jdvjv.exec:\jdvjv.exe101⤵PID:2044
-
\??\c:\jjdjv.exec:\jjdjv.exe102⤵PID:996
-
\??\c:\llxflrl.exec:\llxflrl.exe103⤵PID:2648
-
\??\c:\rlfxxfx.exec:\rlfxxfx.exe104⤵PID:1608
-
\??\c:\xllllfl.exec:\xllllfl.exe105⤵PID:1588
-
\??\c:\tbhhnh.exec:\tbhhnh.exe106⤵PID:2080
-
\??\c:\nbbtth.exec:\nbbtth.exe107⤵PID:2912
-
\??\c:\1djdj.exec:\1djdj.exe108⤵PID:468
-
\??\c:\pvddj.exec:\pvddj.exe109⤵PID:2812
-
\??\c:\xlxrxll.exec:\xlxrxll.exe110⤵
- System Location Discovery: System Language Discovery
PID:2672 -
\??\c:\xlrllff.exec:\xlrllff.exe111⤵PID:2764
-
\??\c:\bnttbt.exec:\bnttbt.exe112⤵PID:2684
-
\??\c:\hnnhnb.exec:\hnnhnb.exe113⤵PID:1508
-
\??\c:\7dpdd.exec:\7dpdd.exe114⤵PID:2608
-
\??\c:\9djvd.exec:\9djvd.exe115⤵PID:2668
-
\??\c:\frrlxxr.exec:\frrlxxr.exe116⤵PID:1436
-
\??\c:\frlfrff.exec:\frlfrff.exe117⤵PID:2988
-
\??\c:\bhbbhb.exec:\bhbbhb.exe118⤵PID:1948
-
\??\c:\hnbbbn.exec:\hnbbbn.exe119⤵PID:2832
-
\??\c:\dpvvd.exec:\dpvvd.exe120⤵PID:1944
-
\??\c:\jppdp.exec:\jppdp.exe121⤵PID:532
-
\??\c:\rxrllxf.exec:\rxrllxf.exe122⤵
- System Location Discovery: System Language Discovery
PID:1256 -
\??\c:\lxlrxrf.exec:\lxlrxrf.exe123⤵PID:568
-
\??\c:\tbbttt.exec:\tbbttt.exe124⤵PID:676
-
\??\c:\nnthnh.exec:\nnthnh.exe125⤵PID:1664
-
\??\c:\pjpdp.exec:\pjpdp.exe126⤵PID:2028
-
\??\c:\pvdvd.exec:\pvdvd.exe127⤵PID:2016
-
\??\c:\9lllrxl.exec:\9lllrxl.exe128⤵PID:2408
-
\??\c:\3ffxfxr.exec:\3ffxfxr.exe129⤵PID:2852
-
\??\c:\3fxlffl.exec:\3fxlffl.exe130⤵PID:3020
-
\??\c:\tbthhb.exec:\tbthhb.exe131⤵PID:2412
-
\??\c:\nttnnh.exec:\nttnnh.exe132⤵PID:1040
-
\??\c:\pvpvd.exec:\pvpvd.exe133⤵PID:1348
-
\??\c:\djpdj.exec:\djpdj.exe134⤵PID:1344
-
\??\c:\rxffllr.exec:\rxffllr.exe135⤵PID:896
-
\??\c:\rxfxfxl.exec:\rxfxfxl.exe136⤵PID:292
-
\??\c:\frrrxxf.exec:\frrrxxf.exe137⤵PID:2004
-
\??\c:\ntbhnh.exec:\ntbhnh.exe138⤵PID:2204
-
\??\c:\nntnbt.exec:\nntnbt.exe139⤵PID:1624
-
\??\c:\vpvpd.exec:\vpvpd.exe140⤵PID:408
-
\??\c:\jjvjv.exec:\jjvjv.exe141⤵PID:2116
-
\??\c:\pdjvd.exec:\pdjvd.exe142⤵PID:2192
-
\??\c:\5lffflr.exec:\5lffflr.exe143⤵PID:1616
-
\??\c:\rxfflfl.exec:\rxfflfl.exe144⤵PID:2332
-
\??\c:\hnntth.exec:\hnntth.exe145⤵PID:2640
-
\??\c:\nbbnbt.exec:\nbbnbt.exe146⤵PID:1744
-
\??\c:\bnnbbt.exec:\bnnbbt.exe147⤵PID:2828
-
\??\c:\jdjvv.exec:\jdjvv.exe148⤵PID:1788
-
\??\c:\1pvjp.exec:\1pvjp.exe149⤵PID:2580
-
\??\c:\3lxlrlx.exec:\3lxlrlx.exe150⤵PID:2792
-
\??\c:\rxxffxf.exec:\rxxffxf.exe151⤵PID:2820
-
\??\c:\nbthbn.exec:\nbthbn.exe152⤵PID:2556
-
\??\c:\bnthtb.exec:\bnthtb.exe153⤵PID:2056
-
\??\c:\hhnhhb.exec:\hhnhhb.exe154⤵PID:2720
-
\??\c:\vdvvj.exec:\vdvvj.exe155⤵PID:3012
-
\??\c:\pppjd.exec:\pppjd.exe156⤵PID:2680
-
\??\c:\lxxllfl.exec:\lxxllfl.exe157⤵
- System Location Discovery: System Language Discovery
PID:1568 -
\??\c:\lxxrlfx.exec:\lxxrlfx.exe158⤵PID:304
-
\??\c:\frrlrrr.exec:\frrlrrr.exe159⤵PID:2888
-
\??\c:\ttnntn.exec:\ttnntn.exe160⤵PID:2808
-
\??\c:\htnnbt.exec:\htnnbt.exe161⤵PID:2052
-
\??\c:\jvvpv.exec:\jvvpv.exe162⤵PID:2060
-
\??\c:\jpvvd.exec:\jpvvd.exe163⤵PID:2520
-
\??\c:\rxxrfrr.exec:\rxxrfrr.exe164⤵PID:1272
-
\??\c:\3lrllfx.exec:\3lrllfx.exe165⤵PID:2796
-
\??\c:\bhnthn.exec:\bhnthn.exe166⤵PID:2800
-
\??\c:\tbbtbn.exec:\tbbtbn.exe167⤵PID:272
-
\??\c:\pjdjd.exec:\pjdjd.exe168⤵PID:348
-
\??\c:\rrxrllx.exec:\rrxrllx.exe169⤵PID:2400
-
\??\c:\hnntnb.exec:\hnntnb.exe170⤵
- System Location Discovery: System Language Discovery
PID:300 -
\??\c:\1nnnht.exec:\1nnnht.exe171⤵
- System Location Discovery: System Language Discovery
PID:948 -
\??\c:\bnntbt.exec:\bnntbt.exe172⤵PID:2280
-
\??\c:\dvpvd.exec:\dvpvd.exe173⤵PID:2616
-
\??\c:\jpjjd.exec:\jpjjd.exe174⤵PID:2348
-
\??\c:\vdjjd.exec:\vdjjd.exe175⤵PID:896
-
\??\c:\xllrfrf.exec:\xllrfrf.exe176⤵PID:292
-
\??\c:\rlxrflr.exec:\rlxrflr.exe177⤵PID:2504
-
\??\c:\llfxlfx.exec:\llfxlfx.exe178⤵PID:1240
-
\??\c:\htbthh.exec:\htbthh.exe179⤵PID:2136
-
\??\c:\htnhbb.exec:\htnhbb.exe180⤵PID:2936
-
\??\c:\nnbhtt.exec:\nnbhtt.exe181⤵PID:2648
-
\??\c:\dvpvd.exec:\dvpvd.exe182⤵PID:1380
-
\??\c:\5vjdp.exec:\5vjdp.exe183⤵PID:1588
-
\??\c:\djvdp.exec:\djvdp.exe184⤵PID:2332
-
\??\c:\rllrflx.exec:\rllrflx.exe185⤵PID:2248
-
\??\c:\frlxfrx.exec:\frlxfrx.exe186⤵PID:1404
-
\??\c:\htnnbt.exec:\htnnbt.exe187⤵PID:2812
-
\??\c:\bbnhtb.exec:\bbnhtb.exe188⤵PID:2804
-
\??\c:\nbhbht.exec:\nbhbht.exe189⤵PID:1912
-
\??\c:\vdvjd.exec:\vdvjd.exe190⤵PID:2716
-
\??\c:\pjvvd.exec:\pjvvd.exe191⤵PID:2548
-
\??\c:\lrrxlfr.exec:\lrrxlfr.exe192⤵PID:2596
-
\??\c:\ffrxlrf.exec:\ffrxlrf.exe193⤵PID:2668
-
\??\c:\xlrlxll.exec:\xlrlxll.exe194⤵PID:1656
-
\??\c:\hntnnh.exec:\hntnnh.exe195⤵
- System Location Discovery: System Language Discovery
PID:2360 -
\??\c:\nthhtt.exec:\nthhtt.exe196⤵PID:2880
-
\??\c:\7hbntb.exec:\7hbntb.exe197⤵PID:2832
-
\??\c:\3vvpp.exec:\3vvpp.exe198⤵PID:2020
-
\??\c:\jvdvv.exec:\jvdvv.exe199⤵PID:796
-
\??\c:\rrrxxrl.exec:\rrrxxrl.exe200⤵PID:2104
-
\??\c:\3xlxfrx.exec:\3xlxfrx.exe201⤵
- System Location Discovery: System Language Discovery
PID:1652 -
\??\c:\rxxxxrr.exec:\rxxxxrr.exe202⤵PID:1712
-
\??\c:\bbnhht.exec:\bbnhht.exe203⤵PID:332
-
\??\c:\3btnhb.exec:\3btnhb.exe204⤵PID:2604
-
\??\c:\ttnbhb.exec:\ttnbhb.exe205⤵PID:2568
-
\??\c:\jddvp.exec:\jddvp.exe206⤵PID:2800
-
\??\c:\pdddj.exec:\pdddj.exe207⤵PID:2852
-
\??\c:\vdvjd.exec:\vdvjd.exe208⤵PID:2372
-
\??\c:\7rxrxll.exec:\7rxrxll.exe209⤵PID:2400
-
\??\c:\lrxfrlf.exec:\lrxfrlf.exe210⤵PID:300
-
\??\c:\rfxffff.exec:\rfxffff.exe211⤵PID:344
-
\??\c:\hnntnt.exec:\hnntnt.exe212⤵PID:2280
-
\??\c:\1hnnbb.exec:\1hnnbb.exe213⤵PID:2616
-
\??\c:\tthbbt.exec:\tthbbt.exe214⤵PID:2348
-
\??\c:\jpjdd.exec:\jpjdd.exe215⤵PID:1696
-
\??\c:\vppjj.exec:\vppjj.exe216⤵PID:3008
-
\??\c:\1pvjd.exec:\1pvjd.exe217⤵PID:2504
-
\??\c:\flfflll.exec:\flfflll.exe218⤵PID:316
-
\??\c:\rxrffrr.exec:\rxrffrr.exe219⤵PID:2136
-
\??\c:\ntnbtn.exec:\ntnbtn.exe220⤵PID:2936
-
\??\c:\nthbht.exec:\nthbht.exe221⤵PID:2648
-
\??\c:\pvvvd.exec:\pvvvd.exe222⤵PID:1380
-
\??\c:\djdvd.exec:\djdvd.exe223⤵PID:1588
-
\??\c:\jvpdp.exec:\jvpdp.exe224⤵PID:2332
-
\??\c:\5flxxlr.exec:\5flxxlr.exe225⤵PID:2248
-
\??\c:\frxlxlr.exec:\frxlxlr.exe226⤵PID:1404
-
\??\c:\xlrlxlr.exec:\xlrlxlr.exe227⤵PID:2812
-
\??\c:\nnhbnt.exec:\nnhbnt.exe228⤵PID:2592
-
\??\c:\tbnhbn.exec:\tbnhbn.exe229⤵PID:1912
-
\??\c:\dpvdd.exec:\dpvdd.exe230⤵PID:2716
-
\??\c:\vjpvv.exec:\vjpvv.exe231⤵
- System Location Discovery: System Language Discovery
PID:2548 -
\??\c:\vvdvd.exec:\vvdvd.exe232⤵PID:2596
-
\??\c:\rxxrrll.exec:\rxxrrll.exe233⤵PID:2392
-
\??\c:\flrrxrx.exec:\flrrxrx.exe234⤵PID:1656
-
\??\c:\lxflrxl.exec:\lxflrxl.exe235⤵
- System Location Discovery: System Language Discovery
PID:2360 -
\??\c:\bhnbbb.exec:\bhnbbb.exe236⤵PID:2880
-
\??\c:\tnnthn.exec:\tnnthn.exe237⤵PID:2832
-
\??\c:\pjdpj.exec:\pjdpj.exe238⤵PID:2020
-
\??\c:\jjjjj.exec:\jjjjj.exe239⤵PID:796
-
\??\c:\5ddpv.exec:\5ddpv.exe240⤵PID:2104
-
\??\c:\lxfxfxx.exec:\lxfxfxx.exe241⤵PID:1652
-
\??\c:\llllrll.exec:\llllrll.exe242⤵
- System Location Discovery: System Language Discovery
PID:1712