Overview
overview
10Static
static
10Dropper/Berbew.exe
windows7-x64
10Dropper/Berbew.exe
windows10-2004-x64
10Dropper/Phorphiex.exe
windows7-x64
10Dropper/Phorphiex.exe
windows10-2004-x64
10RAT/31.exe
windows7-x64
10RAT/31.exe
windows10-2004-x64
10RAT/XClient.exe
windows7-x64
10RAT/XClient.exe
windows10-2004-x64
10RAT/file.exe
windows7-x64
7RAT/file.exe
windows10-2004-x64
7Ransomware...-2.exe
windows7-x64
10Ransomware...-2.exe
windows10-2004-x64
10Ransomware...01.exe
windows7-x64
10Ransomware...01.exe
windows10-2004-x64
10Ransomware...lt.exe
windows7-x64
10Ransomware...lt.exe
windows10-2004-x64
10Stealers/Azorult.exe
windows7-x64
10Stealers/Azorult.exe
windows10-2004-x64
10Stealers/B...on.exe
windows7-x64
10Stealers/B...on.exe
windows10-2004-x64
10Stealers/Dridex.dll
windows7-x64
10Stealers/Dridex.dll
windows10-2004-x64
10Stealers/M..._2.exe
windows7-x64
10Stealers/M..._2.exe
windows10-2004-x64
10Stealers/lumma.exe
windows7-x64
10Stealers/lumma.exe
windows10-2004-x64
10Trojan/BetaBot.exe
windows7-x64
10Trojan/BetaBot.exe
windows10-2004-x64
10Trojan/Smo...er.exe
windows7-x64
10Trojan/Smo...er.exe
windows10-2004-x64
10Resubmissions
12-09-2024 02:23
240912-cvfznswere 1004-09-2024 00:09
240904-afvheascla 1003-09-2024 18:57
240903-xl8csavfrb 1003-09-2024 18:12
240903-ws828asgnm 10Analysis
-
max time kernel
150s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 18:12
Behavioral task
behavioral1
Sample
Dropper/Berbew.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Dropper/Berbew.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Dropper/Phorphiex.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Dropper/Phorphiex.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RAT/31.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
RAT/31.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RAT/XClient.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
RAT/XClient.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
RAT/file.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
RAT/file.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Ransomware/Client-2.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Ransomware/Client-2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Ransomware/criticalupdate01.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Ransomware/criticalupdate01.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Ransomware/default.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Ransomware/default.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Stealers/Azorult.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Stealers/Azorult.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Stealers/BlackMoon.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Stealers/BlackMoon.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Stealers/Dridex.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Stealers/Dridex.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Stealers/Masslogger/mouse_2.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Stealers/Masslogger/mouse_2.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Stealers/lumma.exe
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
Stealers/lumma.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Trojan/BetaBot.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Trojan/BetaBot.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Trojan/SmokeLoader.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Trojan/SmokeLoader.exe
Resource
win10v2004-20240802-en
General
-
Target
Stealers/BlackMoon.exe
-
Size
387KB
-
MD5
336efa7460c08e3d47f29121742eb010
-
SHA1
f41c36cd83879d170309dede056563d35741b87b
-
SHA256
e6dd3fa33ad938b07c8978691f86b73e9f6fd84104b92f42566498bdb6b2930e
-
SHA512
e8d118fbe907a00d89c2514af4de475a0ea54943076bf90174234f77f2ec093a1246a0d4e78d1104a0dcda150b5441d28f4f3d1e768ecb20ae86383a99863c14
-
SSDEEP
12288:n3C9ytvngQjpUXoSWlnwJv90aKToFqwfN:SgdnJVU4TlnwJ6Goo
Malware Config
Signatures
-
Detect Blackmoon payload 19 IoCs
Processes:
resource yara_rule behavioral19/memory/2108-14-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2348-23-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2532-64-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2892-43-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2824-77-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2068-117-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2728-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/1692-134-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/1388-152-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/984-162-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/768-170-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/1656-125-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2360-197-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/3024-233-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/1944-296-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/836-251-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2208-179-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/3048-99-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral19/memory/2268-3-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
Executes dropped EXE 64 IoCs
Processes:
bbthbn.exe9vjjp.exentbntn.exe3vpjv.exetnhhtt.exennbntb.exelxfrxll.exepjddj.exefxllrrf.exettbtnb.exeppjdp.exehhhthn.exepppjj.exetbnnnh.exedpvdp.exexxrxrxl.exetbnnth.exe5hnhhh.exejpjvp.exexfxlfrr.exejjjvj.exerrrlxlx.exenbtttn.exepvvjp.exexrrxlrf.exe9nbhbh.exeppjjd.exe9llfxfx.exennhtht.exe1ppdp.exexxrrxxl.exehhhthn.exevjddv.exexxxlfxr.exevpdpd.exejddjv.exe3rrxlrr.exetthbhh.exeddvpj.exepjdjp.exexffrlrr.exe7nhhtb.exepppjv.exevjpjd.exe7fflxlf.exefrlfxfr.exe1thntb.exedddvj.exepppvv.exefflxfll.exe5tnthn.exe9bthbh.exedjdvj.exefxfrrxx.exexrlrxfx.exenbhnbn.exejdppd.exeflfxxfx.exe3llrflf.exe5hthnn.exevjdjj.exevvddj.exefllfrrl.exe3ntbnh.exepid process 2108 bbthbn.exe 2348 9vjjp.exe 2892 ntbntn.exe 2896 3vpjv.exe 2532 tnhhtt.exe 2824 nnbntb.exe 2692 lxfrxll.exe 3048 pjddj.exe 2728 fxllrrf.exe 2068 ttbtnb.exe 1656 ppjdp.exe 1692 hhhthn.exe 2376 pppjj.exe 1388 tbnnnh.exe 984 dpvdp.exe 768 xxrxrxl.exe 2208 tbnnth.exe 2252 5hnhhh.exe 2360 jpjvp.exe 2064 xfxlfrr.exe 2552 jjjvj.exe 3036 rrrlxlx.exe 3024 nbtttn.exe 2248 pvvjp.exe 836 xrrxlrf.exe 1708 9nbhbh.exe 2632 ppjjd.exe 2352 9llfxfx.exe 1512 nnhtht.exe 1944 1ppdp.exe 2596 xxrrxxl.exe 2544 hhhthn.exe 2412 vjddv.exe 2924 xxxlfxr.exe 2580 vpdpd.exe 2892 jddjv.exe 2768 3rrxlrr.exe 2932 tthbhh.exe 2828 ddvpj.exe 2712 pjdjp.exe 3044 xffrlrr.exe 2692 7nhhtb.exe 2636 pppjv.exe 2220 vjpjd.exe 2512 7fflxlf.exe 372 frlfxfr.exe 1404 1thntb.exe 2408 dddvj.exe 2424 pppvv.exe 980 fflxfll.exe 1388 5tnthn.exe 1904 9bthbh.exe 2152 djdvj.exe 1940 fxfrrxx.exe 1988 xrlrxfx.exe 560 nbhnbn.exe 2360 jdppd.exe 280 flfxxfx.exe 536 3llrflf.exe 1960 5hthnn.exe 872 vjdjj.exe 1444 vvddj.exe 2248 fllfrrl.exe 1312 3ntbnh.exe -
Processes:
resource yara_rule behavioral19/memory/2108-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2348-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2892-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2892-33-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2532-56-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2532-64-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2896-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2896-45-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2892-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2824-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2692-79-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2824-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2824-67-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2068-117-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2728-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/1692-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/1388-152-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/984-162-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/768-170-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/1656-125-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2360-197-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/3024-233-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/1944-296-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/836-251-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2208-179-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/3048-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/3048-90-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/3048-89-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral19/memory/2268-3-0x0000000000400000-0x0000000000429000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dvpdp.exehbtbtb.exevjvpj.exehbhbhn.exe1dvdj.exe1vpjv.exe9jvvv.exetnhtht.exenhntbh.exe5hhtbh.exe5thtbb.exehbtnnt.exexxxfxfr.exedvjpd.exebbtbht.exexrrxllx.exe7ntttn.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvpdp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtbtb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vjvpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbhbhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1dvdj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1vpjv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9jvvv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tnhtht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nhntbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5hhtbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5thtbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hbtnnt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xxxfxfr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvjpd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbtbht.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrrxllx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ntttn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
BlackMoon.exebbthbn.exe9vjjp.exentbntn.exe3vpjv.exetnhhtt.exennbntb.exelxfrxll.exepjddj.exefxllrrf.exettbtnb.exeppjdp.exehhhthn.exepppjj.exetbnnnh.exedpvdp.exedescription pid process target process PID 2268 wrote to memory of 2108 2268 BlackMoon.exe bbthbn.exe PID 2268 wrote to memory of 2108 2268 BlackMoon.exe bbthbn.exe PID 2268 wrote to memory of 2108 2268 BlackMoon.exe bbthbn.exe PID 2268 wrote to memory of 2108 2268 BlackMoon.exe bbthbn.exe PID 2108 wrote to memory of 2348 2108 bbthbn.exe 9vjjp.exe PID 2108 wrote to memory of 2348 2108 bbthbn.exe 9vjjp.exe PID 2108 wrote to memory of 2348 2108 bbthbn.exe 9vjjp.exe PID 2108 wrote to memory of 2348 2108 bbthbn.exe 9vjjp.exe PID 2348 wrote to memory of 2892 2348 9vjjp.exe 1bbnbb.exe PID 2348 wrote to memory of 2892 2348 9vjjp.exe 1bbnbb.exe PID 2348 wrote to memory of 2892 2348 9vjjp.exe 1bbnbb.exe PID 2348 wrote to memory of 2892 2348 9vjjp.exe 1bbnbb.exe PID 2892 wrote to memory of 2896 2892 ntbntn.exe 3vpjv.exe PID 2892 wrote to memory of 2896 2892 ntbntn.exe 3vpjv.exe PID 2892 wrote to memory of 2896 2892 ntbntn.exe 3vpjv.exe PID 2892 wrote to memory of 2896 2892 ntbntn.exe 3vpjv.exe PID 2896 wrote to memory of 2532 2896 3vpjv.exe tnhhtt.exe PID 2896 wrote to memory of 2532 2896 3vpjv.exe tnhhtt.exe PID 2896 wrote to memory of 2532 2896 3vpjv.exe tnhhtt.exe PID 2896 wrote to memory of 2532 2896 3vpjv.exe tnhhtt.exe PID 2532 wrote to memory of 2824 2532 tnhhtt.exe nnbntb.exe PID 2532 wrote to memory of 2824 2532 tnhhtt.exe nnbntb.exe PID 2532 wrote to memory of 2824 2532 tnhhtt.exe nnbntb.exe PID 2532 wrote to memory of 2824 2532 tnhhtt.exe nnbntb.exe PID 2824 wrote to memory of 2692 2824 nnbntb.exe 7nhhtb.exe PID 2824 wrote to memory of 2692 2824 nnbntb.exe 7nhhtb.exe PID 2824 wrote to memory of 2692 2824 nnbntb.exe 7nhhtb.exe PID 2824 wrote to memory of 2692 2824 nnbntb.exe 7nhhtb.exe PID 2692 wrote to memory of 3048 2692 lxfrxll.exe pjddj.exe PID 2692 wrote to memory of 3048 2692 lxfrxll.exe pjddj.exe PID 2692 wrote to memory of 3048 2692 lxfrxll.exe pjddj.exe PID 2692 wrote to memory of 3048 2692 lxfrxll.exe pjddj.exe PID 3048 wrote to memory of 2728 3048 pjddj.exe fxllrrf.exe PID 3048 wrote to memory of 2728 3048 pjddj.exe fxllrrf.exe PID 3048 wrote to memory of 2728 3048 pjddj.exe fxllrrf.exe PID 3048 wrote to memory of 2728 3048 pjddj.exe fxllrrf.exe PID 2728 wrote to memory of 2068 2728 fxllrrf.exe ttbtnb.exe PID 2728 wrote to memory of 2068 2728 fxllrrf.exe ttbtnb.exe PID 2728 wrote to memory of 2068 2728 fxllrrf.exe ttbtnb.exe PID 2728 wrote to memory of 2068 2728 fxllrrf.exe ttbtnb.exe PID 2068 wrote to memory of 1656 2068 ttbtnb.exe ppjdp.exe PID 2068 wrote to memory of 1656 2068 ttbtnb.exe ppjdp.exe PID 2068 wrote to memory of 1656 2068 ttbtnb.exe ppjdp.exe PID 2068 wrote to memory of 1656 2068 ttbtnb.exe ppjdp.exe PID 1656 wrote to memory of 1692 1656 ppjdp.exe hhhthn.exe PID 1656 wrote to memory of 1692 1656 ppjdp.exe hhhthn.exe PID 1656 wrote to memory of 1692 1656 ppjdp.exe hhhthn.exe PID 1656 wrote to memory of 1692 1656 ppjdp.exe hhhthn.exe PID 1692 wrote to memory of 2376 1692 hhhthn.exe hbtbbb.exe PID 1692 wrote to memory of 2376 1692 hhhthn.exe hbtbbb.exe PID 1692 wrote to memory of 2376 1692 hhhthn.exe hbtbbb.exe PID 1692 wrote to memory of 2376 1692 hhhthn.exe hbtbbb.exe PID 2376 wrote to memory of 1388 2376 pppjj.exe 5tnthn.exe PID 2376 wrote to memory of 1388 2376 pppjj.exe 5tnthn.exe PID 2376 wrote to memory of 1388 2376 pppjj.exe 5tnthn.exe PID 2376 wrote to memory of 1388 2376 pppjj.exe 5tnthn.exe PID 1388 wrote to memory of 984 1388 tbnnnh.exe dpvdp.exe PID 1388 wrote to memory of 984 1388 tbnnnh.exe dpvdp.exe PID 1388 wrote to memory of 984 1388 tbnnnh.exe dpvdp.exe PID 1388 wrote to memory of 984 1388 tbnnnh.exe dpvdp.exe PID 984 wrote to memory of 768 984 dpvdp.exe tbttht.exe PID 984 wrote to memory of 768 984 dpvdp.exe tbttht.exe PID 984 wrote to memory of 768 984 dpvdp.exe tbttht.exe PID 984 wrote to memory of 768 984 dpvdp.exe tbttht.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Stealers\BlackMoon.exe"C:\Users\Admin\AppData\Local\Temp\Stealers\BlackMoon.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
\??\c:\bbthbn.exec:\bbthbn.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
\??\c:\9vjjp.exec:\9vjjp.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2348 -
\??\c:\ntbntn.exec:\ntbntn.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
\??\c:\3vpjv.exec:\3vpjv.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
\??\c:\tnhhtt.exec:\tnhhtt.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\nnbntb.exec:\nnbntb.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
\??\c:\lxfrxll.exec:\lxfrxll.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
\??\c:\pjddj.exec:\pjddj.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3048 -
\??\c:\fxllrrf.exec:\fxllrrf.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
\??\c:\ttbtnb.exec:\ttbtnb.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
\??\c:\ppjdp.exec:\ppjdp.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\hhhthn.exec:\hhhthn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
\??\c:\pppjj.exec:\pppjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
\??\c:\tbnnnh.exec:\tbnnnh.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\dpvdp.exec:\dpvdp.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:984 -
\??\c:\xxrxrxl.exec:\xxrxrxl.exe17⤵
- Executes dropped EXE
PID:768 -
\??\c:\tbnnth.exec:\tbnnth.exe18⤵
- Executes dropped EXE
PID:2208 -
\??\c:\5hnhhh.exec:\5hnhhh.exe19⤵
- Executes dropped EXE
PID:2252 -
\??\c:\jpjvp.exec:\jpjvp.exe20⤵
- Executes dropped EXE
PID:2360 -
\??\c:\xfxlfrr.exec:\xfxlfrr.exe21⤵
- Executes dropped EXE
PID:2064 -
\??\c:\jjjvj.exec:\jjjvj.exe22⤵
- Executes dropped EXE
PID:2552 -
\??\c:\rrrlxlx.exec:\rrrlxlx.exe23⤵
- Executes dropped EXE
PID:3036 -
\??\c:\nbtttn.exec:\nbtttn.exe24⤵
- Executes dropped EXE
PID:3024 -
\??\c:\pvvjp.exec:\pvvjp.exe25⤵
- Executes dropped EXE
PID:2248 -
\??\c:\xrrxlrf.exec:\xrrxlrf.exe26⤵
- Executes dropped EXE
PID:836 -
\??\c:\9nbhbh.exec:\9nbhbh.exe27⤵
- Executes dropped EXE
PID:1708 -
\??\c:\ppjjd.exec:\ppjjd.exe28⤵
- Executes dropped EXE
PID:2632 -
\??\c:\9llfxfx.exec:\9llfxfx.exe29⤵
- Executes dropped EXE
PID:2352 -
\??\c:\nnhtht.exec:\nnhtht.exe30⤵
- Executes dropped EXE
PID:1512 -
\??\c:\1ppdp.exec:\1ppdp.exe31⤵
- Executes dropped EXE
PID:1944 -
\??\c:\xxrrxxl.exec:\xxrrxxl.exe32⤵
- Executes dropped EXE
PID:2596 -
\??\c:\hhhthn.exec:\hhhthn.exe33⤵
- Executes dropped EXE
PID:2544 -
\??\c:\vjddv.exec:\vjddv.exe34⤵
- Executes dropped EXE
PID:2412 -
\??\c:\xxxlfxr.exec:\xxxlfxr.exe35⤵
- Executes dropped EXE
PID:2924 -
\??\c:\vpdpd.exec:\vpdpd.exe36⤵
- Executes dropped EXE
PID:2580 -
\??\c:\jddjv.exec:\jddjv.exe37⤵
- Executes dropped EXE
PID:2892 -
\??\c:\3rrxlrr.exec:\3rrxlrr.exe38⤵
- Executes dropped EXE
PID:2768 -
\??\c:\tthbhh.exec:\tthbhh.exe39⤵
- Executes dropped EXE
PID:2932 -
\??\c:\ddvpj.exec:\ddvpj.exe40⤵
- Executes dropped EXE
PID:2828 -
\??\c:\pjdjp.exec:\pjdjp.exe41⤵
- Executes dropped EXE
PID:2712 -
\??\c:\xffrlrr.exec:\xffrlrr.exe42⤵
- Executes dropped EXE
PID:3044 -
\??\c:\7nhhtb.exec:\7nhhtb.exe43⤵
- Executes dropped EXE
PID:2692 -
\??\c:\pppjv.exec:\pppjv.exe44⤵
- Executes dropped EXE
PID:2636 -
\??\c:\vjpjd.exec:\vjpjd.exe45⤵
- Executes dropped EXE
PID:2220 -
\??\c:\7fflxlf.exec:\7fflxlf.exe46⤵
- Executes dropped EXE
PID:2512 -
\??\c:\frlfxfr.exec:\frlfxfr.exe47⤵
- Executes dropped EXE
PID:372 -
\??\c:\1thntb.exec:\1thntb.exe48⤵
- Executes dropped EXE
PID:1404 -
\??\c:\dddvj.exec:\dddvj.exe49⤵
- Executes dropped EXE
PID:2408 -
\??\c:\pppvv.exec:\pppvv.exe50⤵
- Executes dropped EXE
PID:2424 -
\??\c:\fflxfll.exec:\fflxfll.exe51⤵
- Executes dropped EXE
PID:980 -
\??\c:\5tnthn.exec:\5tnthn.exe52⤵
- Executes dropped EXE
PID:1388 -
\??\c:\9bthbh.exec:\9bthbh.exe53⤵
- Executes dropped EXE
PID:1904 -
\??\c:\djdvj.exec:\djdvj.exe54⤵
- Executes dropped EXE
PID:2152 -
\??\c:\fxfrrxx.exec:\fxfrrxx.exe55⤵
- Executes dropped EXE
PID:1940 -
\??\c:\xrlrxfx.exec:\xrlrxfx.exe56⤵
- Executes dropped EXE
PID:1988 -
\??\c:\nbhnbn.exec:\nbhnbn.exe57⤵
- Executes dropped EXE
PID:560 -
\??\c:\jdppd.exec:\jdppd.exe58⤵
- Executes dropped EXE
PID:2360 -
\??\c:\flfxxfx.exec:\flfxxfx.exe59⤵
- Executes dropped EXE
PID:280 -
\??\c:\3llrflf.exec:\3llrflf.exe60⤵
- Executes dropped EXE
PID:536 -
\??\c:\5hthnn.exec:\5hthnn.exe61⤵
- Executes dropped EXE
PID:1960 -
\??\c:\vjdjj.exec:\vjdjj.exe62⤵
- Executes dropped EXE
PID:872 -
\??\c:\vvddj.exec:\vvddj.exe63⤵
- Executes dropped EXE
PID:1444 -
\??\c:\fllfrrl.exec:\fllfrrl.exe64⤵
- Executes dropped EXE
PID:2248 -
\??\c:\3ntbnh.exec:\3ntbnh.exe65⤵
- Executes dropped EXE
PID:1312 -
\??\c:\tbhtnn.exec:\tbhtnn.exe66⤵PID:2572
-
\??\c:\ppjvj.exec:\ppjvj.exe67⤵PID:1336
-
\??\c:\fllrrxl.exec:\fllrrxl.exe68⤵PID:2356
-
\??\c:\fxrllxf.exec:\fxrllxf.exe69⤵PID:2456
-
\??\c:\1thntb.exec:\1thntb.exe70⤵PID:1736
-
\??\c:\pppdp.exec:\pppdp.exe71⤵PID:888
-
\??\c:\3xxlrxf.exec:\3xxlrxf.exe72⤵PID:2428
-
\??\c:\nhtntn.exec:\nhtntn.exe73⤵PID:1968
-
\??\c:\vvdjd.exec:\vvdjd.exe74⤵PID:2144
-
\??\c:\9pdpj.exec:\9pdpj.exe75⤵PID:2056
-
\??\c:\3rlxllr.exec:\3rlxllr.exe76⤵PID:3012
-
\??\c:\thhtht.exec:\thhtht.exe77⤵PID:2580
-
\??\c:\1bbnbb.exec:\1bbnbb.exe78⤵PID:2892
-
\??\c:\vvdjp.exec:\vvdjp.exe79⤵PID:2800
-
\??\c:\lrrfxxl.exec:\lrrfxxl.exe80⤵PID:2716
-
\??\c:\lffrxlx.exec:\lffrxlx.exe81⤵PID:2724
-
\??\c:\ttthbn.exec:\ttthbn.exe82⤵PID:2540
-
\??\c:\dddvj.exec:\dddvj.exe83⤵PID:2328
-
\??\c:\dddjv.exec:\dddjv.exe84⤵PID:3044
-
\??\c:\ffxxlrf.exec:\ffxxlrf.exe85⤵PID:3032
-
\??\c:\httthb.exec:\httthb.exe86⤵PID:2944
-
\??\c:\nhhhnn.exec:\nhhhnn.exe87⤵PID:780
-
\??\c:\ddvpj.exec:\ddvpj.exe88⤵PID:2468
-
\??\c:\vdjpj.exec:\vdjpj.exe89⤵PID:2780
-
\??\c:\rrrfrfr.exec:\rrrfrfr.exe90⤵PID:652
-
\??\c:\bhbhnb.exec:\bhbhnb.exe91⤵PID:2148
-
\??\c:\vdpdp.exec:\vdpdp.exe92⤵PID:1924
-
\??\c:\1vdpv.exec:\1vdpv.exe93⤵PID:1248
-
\??\c:\frrxlxr.exec:\frrxlxr.exe94⤵PID:2568
-
\??\c:\bbbnnt.exec:\bbbnnt.exe95⤵PID:2072
-
\??\c:\5bbbnb.exec:\5bbbnb.exe96⤵PID:584
-
\??\c:\vvpdd.exec:\vvpdd.exe97⤵PID:1940
-
\??\c:\lllrlrl.exec:\lllrlrl.exe98⤵PID:2052
-
\??\c:\hhtbtt.exec:\hhtbtt.exe99⤵PID:1484
-
\??\c:\5htthn.exec:\5htthn.exe100⤵PID:2548
-
\??\c:\pvvpj.exec:\pvvpj.exe101⤵PID:2324
-
\??\c:\fffrxlf.exec:\fffrxlf.exe102⤵PID:3036
-
\??\c:\9ffllrf.exec:\9ffllrf.exe103⤵PID:2336
-
\??\c:\bbbtnh.exec:\bbbtnh.exe104⤵PID:1896
-
\??\c:\jdddj.exec:\jdddj.exe105⤵PID:1660
-
\??\c:\vvpdv.exec:\vvpdv.exe106⤵PID:1504
-
\??\c:\fxrrffl.exec:\fxrrffl.exe107⤵PID:1312
-
\??\c:\hbbhbh.exec:\hbbhbh.exe108⤵PID:264
-
\??\c:\jjjvp.exec:\jjjvp.exe109⤵PID:884
-
\??\c:\jjdvv.exec:\jjdvv.exe110⤵PID:1512
-
\??\c:\lfffllr.exec:\lfffllr.exe111⤵PID:2092
-
\??\c:\ttbhth.exec:\ttbhth.exe112⤵PID:2268
-
\??\c:\hbtnnt.exec:\hbtnnt.exe113⤵
- System Location Discovery: System Language Discovery
PID:2312 -
\??\c:\vvvdv.exec:\vvvdv.exe114⤵PID:2808
-
\??\c:\fxrflrx.exec:\fxrflrx.exe115⤵PID:2860
-
\??\c:\bttbnt.exec:\bttbnt.exe116⤵PID:2764
-
\??\c:\ttnnbh.exec:\ttnnbh.exe117⤵PID:2904
-
\??\c:\dvvjd.exec:\dvvjd.exe118⤵PID:580
-
\??\c:\fllxlxx.exec:\fllxlxx.exe119⤵PID:2748
-
\??\c:\fffrlxl.exec:\fffrlxl.exe120⤵PID:304
-
\??\c:\tbhtth.exec:\tbhtth.exe121⤵PID:2784
-
\??\c:\3pvpv.exec:\3pvpv.exe122⤵PID:2736
-
\??\c:\fllflff.exec:\fllflff.exe123⤵PID:2724
-
\??\c:\llrlxlf.exec:\llrlxlf.exe124⤵PID:2676
-
\??\c:\nhttnb.exec:\nhttnb.exe125⤵PID:2612
-
\??\c:\pjjdj.exec:\pjjdj.exe126⤵PID:2156
-
\??\c:\lrlfrlr.exec:\lrlfrlr.exe127⤵PID:2520
-
\??\c:\lxrlxxx.exec:\lxrlxxx.exe128⤵PID:2024
-
\??\c:\jjdpp.exec:\jjdpp.exe129⤵PID:780
-
\??\c:\xxxlxff.exec:\xxxlxff.exe130⤵PID:2592
-
\??\c:\fllxrll.exec:\fllxrll.exe131⤵PID:2096
-
\??\c:\nhnhth.exec:\nhnhth.exe132⤵PID:1148
-
\??\c:\3vppp.exec:\3vppp.exe133⤵PID:2104
-
\??\c:\rxrxxff.exec:\rxrxxff.exe134⤵PID:1308
-
\??\c:\3bhnnn.exec:\3bhnnn.exe135⤵PID:1324
-
\??\c:\1vpjv.exec:\1vpjv.exe136⤵
- System Location Discovery: System Language Discovery
PID:2344 -
\??\c:\1ffflrf.exec:\1ffflrf.exe137⤵PID:2100
-
\??\c:\nnnnnb.exec:\nnnnnb.exe138⤵PID:752
-
\??\c:\hbbhnb.exec:\hbbhnb.exe139⤵PID:1424
-
\??\c:\djpjp.exec:\djpjp.exe140⤵PID:2720
-
\??\c:\ddpvd.exec:\ddpvd.exe141⤵PID:2648
-
\??\c:\lfrllrx.exec:\lfrllrx.exe142⤵PID:956
-
\??\c:\hhnthh.exec:\hhnthh.exe143⤵PID:2396
-
\??\c:\tnhtht.exec:\tnhtht.exe144⤵
- System Location Discovery: System Language Discovery
PID:1316 -
\??\c:\ppjdp.exec:\ppjdp.exe145⤵PID:1452
-
\??\c:\7fxrflf.exec:\7fxrflf.exe146⤵PID:836
-
\??\c:\ffffxfr.exec:\ffffxfr.exe147⤵PID:936
-
\??\c:\hbnnht.exec:\hbnnht.exe148⤵PID:2948
-
\??\c:\vpddv.exec:\vpddv.exe149⤵PID:2524
-
\??\c:\ppddj.exec:\ppddj.exe150⤵PID:1936
-
\??\c:\rlxxrrf.exec:\rlxxrrf.exe151⤵PID:1740
-
\??\c:\xxxlffx.exec:\xxxlffx.exe152⤵PID:2740
-
\??\c:\3htbbt.exec:\3htbbt.exe153⤵PID:1744
-
\??\c:\ttntht.exec:\ttntht.exe154⤵PID:2268
-
\??\c:\ddvpp.exec:\ddvpp.exe155⤵PID:2312
-
\??\c:\5rlrxfl.exec:\5rlrxfl.exe156⤵PID:2544
-
\??\c:\llxlfrx.exec:\llxlfrx.exe157⤵PID:1172
-
\??\c:\bbnntt.exec:\bbnntt.exe158⤵PID:2764
-
\??\c:\1bbbnb.exec:\1bbbnb.exe159⤵PID:2792
-
\??\c:\1vppv.exec:\1vppv.exe160⤵PID:2684
-
\??\c:\xxrxfrx.exec:\xxrxfrx.exe161⤵PID:2932
-
\??\c:\xxxlxxx.exec:\xxxlxxx.exe162⤵PID:2936
-
\??\c:\bbntbb.exec:\bbntbb.exe163⤵PID:2964
-
\??\c:\dvjpj.exec:\dvjpj.exe164⤵PID:2680
-
\??\c:\9jvvv.exec:\9jvvv.exe165⤵
- System Location Discovery: System Language Discovery
PID:2340 -
\??\c:\5frfllx.exec:\5frfllx.exe166⤵PID:2676
-
\??\c:\1hbhnh.exec:\1hbhnh.exe167⤵PID:2612
-
\??\c:\hbhtht.exec:\hbhtht.exe168⤵PID:300
-
\??\c:\djddv.exec:\djddv.exe169⤵PID:2512
-
\??\c:\dvpdp.exec:\dvpdp.exe170⤵
- System Location Discovery: System Language Discovery
PID:1992 -
\??\c:\xrfrxlx.exec:\xrfrxlx.exe171⤵PID:1876
-
\??\c:\hbtbbb.exec:\hbtbbb.exe172⤵PID:2376
-
\??\c:\hbnntn.exec:\hbnntn.exe173⤵PID:2096
-
\??\c:\pppdv.exec:\pppdv.exe174⤵PID:980
-
\??\c:\rrfflrf.exec:\rrfflrf.exe175⤵PID:1376
-
\??\c:\xxrrxxr.exec:\xxrrxxr.exe176⤵PID:1904
-
\??\c:\tbthtn.exec:\tbthtn.exe177⤵PID:1092
-
\??\c:\7ppdp.exec:\7ppdp.exe178⤵PID:2060
-
\??\c:\1vpvd.exec:\1vpvd.exe179⤵PID:1156
-
\??\c:\7xrfrxl.exec:\7xrfrxl.exe180⤵PID:2240
-
\??\c:\xffxxlx.exec:\xffxxlx.exe181⤵PID:2020
-
\??\c:\hhbbnt.exec:\hhbbnt.exe182⤵PID:2968
-
\??\c:\ppjjv.exec:\ppjjv.exe183⤵PID:2172
-
\??\c:\1dvdj.exec:\1dvdj.exe184⤵PID:692
-
\??\c:\lfxrfll.exec:\lfxrfll.exe185⤵PID:1920
-
\??\c:\xrflrrf.exec:\xrflrrf.exe186⤵PID:616
-
\??\c:\hhbhtt.exec:\hhbhtt.exe187⤵PID:2132
-
\??\c:\ppjpv.exec:\ppjpv.exe188⤵PID:992
-
\??\c:\jjdvj.exec:\jjdvj.exe189⤵PID:1088
-
\??\c:\rxrxxll.exec:\rxrxxll.exe190⤵PID:976
-
\??\c:\3lxrxfl.exec:\3lxrxfl.exe191⤵PID:2256
-
\??\c:\5nhbtb.exec:\5nhbtb.exe192⤵PID:1512
-
\??\c:\3dppv.exec:\3dppv.exe193⤵PID:2260
-
\??\c:\jjdvj.exec:\jjdvj.exe194⤵PID:2856
-
\??\c:\5xfrfxx.exec:\5xfrfxx.exe195⤵PID:2804
-
\??\c:\hbbhnn.exec:\hbbhnn.exe196⤵PID:1968
-
\??\c:\thbnht.exec:\thbnht.exe197⤵PID:2864
-
\??\c:\7jpjj.exec:\7jpjj.exe198⤵PID:2816
-
\??\c:\jjpvp.exec:\jjpvp.exe199⤵PID:1964
-
\??\c:\xxrxxfr.exec:\xxrxxfr.exe200⤵PID:2844
-
\??\c:\bbntht.exec:\bbntht.exe201⤵PID:2880
-
\??\c:\hbnthh.exec:\hbnthh.exe202⤵PID:2848
-
\??\c:\1jjdd.exec:\1jjdd.exe203⤵PID:2832
-
\??\c:\pvpvj.exec:\pvpvj.exe204⤵PID:2200
-
\??\c:\fxllxfr.exec:\fxllxfr.exe205⤵PID:2212
-
\??\c:\7bnntt.exec:\7bnntt.exe206⤵PID:2700
-
\??\c:\vvvjv.exec:\vvvjv.exe207⤵PID:2636
-
\??\c:\ppdjv.exec:\ppdjv.exe208⤵PID:2220
-
\??\c:\ffxlxxr.exec:\ffxlxxr.exe209⤵PID:1580
-
\??\c:\7rlllxl.exec:\7rlllxl.exe210⤵PID:2080
-
\??\c:\9bttbb.exec:\9bttbb.exe211⤵PID:1404
-
\??\c:\1pddv.exec:\1pddv.exe212⤵PID:756
-
\??\c:\7dvvj.exec:\7dvvj.exe213⤵PID:1004
-
\??\c:\llffxxl.exec:\llffxxl.exe214⤵PID:576
-
\??\c:\7fllxxl.exec:\7fllxxl.exe215⤵PID:1296
-
\??\c:\bbnbtt.exec:\bbnbtt.exe216⤵PID:1136
-
\??\c:\tbttht.exec:\tbttht.exe217⤵PID:768
-
\??\c:\dddjv.exec:\dddjv.exe218⤵PID:2140
-
\??\c:\jdvdp.exec:\jdvdp.exe219⤵PID:2228
-
\??\c:\rllfxxr.exec:\rllfxxr.exe220⤵PID:2168
-
\??\c:\bbnthb.exec:\bbnthb.exe221⤵PID:2164
-
\??\c:\tnhbnn.exec:\tnhbnn.exe222⤵PID:664
-
\??\c:\5jjpd.exec:\5jjpd.exe223⤵PID:2980
-
\??\c:\ppjjd.exec:\ppjjd.exe224⤵PID:3016
-
\??\c:\fxlxfrf.exec:\fxlxfrf.exe225⤵PID:828
-
\??\c:\ttnhth.exec:\ttnhth.exe226⤵PID:1880
-
\??\c:\5bnthh.exec:\5bnthh.exe227⤵PID:1532
-
\??\c:\ppvpj.exec:\ppvpj.exe228⤵PID:2076
-
\??\c:\vvpdp.exec:\vvpdp.exe229⤵PID:920
-
\??\c:\1rrflfl.exec:\1rrflfl.exe230⤵PID:2316
-
\??\c:\hhhtbn.exec:\hhhtbn.exe231⤵PID:1636
-
\??\c:\bhnhhn.exec:\bhnhhn.exe232⤵PID:1852
-
\??\c:\5pvpp.exec:\5pvpp.exe233⤵PID:1772
-
\??\c:\pdddj.exec:\pdddj.exe234⤵PID:2124
-
\??\c:\fxxllfx.exec:\fxxllfx.exe235⤵PID:2428
-
\??\c:\btntnt.exec:\btntnt.exe236⤵PID:544
-
\??\c:\ttbtht.exec:\ttbtht.exe237⤵PID:2144
-
\??\c:\jjdjv.exec:\jjdjv.exe238⤵PID:2056
-
\??\c:\vpjvv.exec:\vpjvv.exe239⤵PID:2860
-
\??\c:\xrxrxrf.exec:\xrxrxrf.exe240⤵PID:2604
-
\??\c:\nnhttt.exec:\nnhttt.exe241⤵PID:2796
-
\??\c:\ttthtt.exec:\ttthtt.exe242⤵PID:2684