Analysis
-
max time kernel
150s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 20:56
Behavioral task
behavioral1
Sample
0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe
Resource
win7-20240220-en
General
-
Target
0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe
-
Size
282KB
-
MD5
1dddabcb33a8af52dbd5d14a31f8bfa0
-
SHA1
af44bc450e24fa311d34cf1016396e4da3987509
-
SHA256
0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246
-
SHA512
f27c767a50c9629c4ef66e0a6a2e337a6b8d40503bd596ac4c1f83e4ae30774b23f00c5e4a57199c3b155d339b13caf8fcebe6cff469444600af84188b07cbf6
-
SSDEEP
6144:iXu/YXoz+PglGhhx9ebK7mOoS3C+kEjiPISUOgW9X+hOGzC/:GmYXoqPgl+9eaNv3C+kmZzcukG2/
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 17 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
Processes:
resource yara_rule C:\windows\system\IBLL.exe family_berbew C:\Windows\ZRSOL.exe family_berbew C:\windows\MNKWV.exe family_berbew C:\Windows\SysWOW64\TIHI.exe family_berbew C:\windows\SysWOW64\RFBLS.exe family_berbew C:\Windows\DTZ.exe family_berbew C:\windows\SysWOW64\ZJCPJUR.exe family_berbew C:\windows\TCJASVH.exe family_berbew C:\Windows\DFPBJIL.exe family_berbew C:\Windows\SysWOW64\BVIEW.exe family_berbew C:\Windows\System\QLJDDJI.exe family_berbew C:\Windows\PEMLLP.exe family_berbew C:\Windows\XCZTCZO.exe family_berbew C:\windows\KZHFML.exe family_berbew C:\windows\SysWOW64\BNSXCIM.exe family_berbew C:\Windows\KSWEEG.exe family_berbew C:\Windows\System\NODA.exe family_berbew -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
CWFLDSZ.exeINUQ.exeFCMD.exeRNZO.exeRKTL.exeVELEIV.exeFOH.exeWVZR.exeHEFO.exeUPWM.exeGRH.exeJNCQGQT.exeXJN.exeVMHIVDX.exeEGE.exeHVQB.exeAWN.exeFHXCVL.exeUAQP.exeKZLZPBS.exeKRPPFV.exeFPO.exeXGL.exeJCQN.exeTGESJEC.exeTDBOV.exeRVHAOC.exeUTNRMCM.exeZFWYI.exeZFUPCR.exeIAP.exeIBLL.exePHVUM.exeDXRR.exeMMHTUGD.exeGTSIYPI.exeWFEUPLX.exeABFRSMZ.exeAVM.exeZPG.exeYOURJ.exeXCZTCZO.exeUIGZ.exeZVIYMIM.exeDRPMZ.exeQNIEP.exeLBVNW.exeDFPBJIL.exeBVIEW.exeJZMR.exeQMZUEBW.exeCVP.exeNOV.exeMGQJMK.exeRZKDH.exeVKONKE.exePNGCRHP.exeZKONEFV.exeJPTHVPQ.exeHXWEAQ.exeXQWFTPM.exeIJOMCG.exeMZUM.exeNHIMZS.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation CWFLDSZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation INUQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation FCMD.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation RNZO.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation RKTL.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation VELEIV.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation FOH.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation WVZR.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HEFO.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation UPWM.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation GRH.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation JNCQGQT.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation XJN.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation VMHIVDX.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation EGE.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HVQB.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation AWN.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation FHXCVL.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation UAQP.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation KZLZPBS.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation KRPPFV.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation FPO.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation XGL.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation JCQN.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation TGESJEC.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation TDBOV.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation RVHAOC.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation UTNRMCM.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation ZFWYI.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation ZFUPCR.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation IAP.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation IBLL.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation PHVUM.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation DXRR.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation MMHTUGD.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation GTSIYPI.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation WFEUPLX.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation ABFRSMZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation AVM.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation ZPG.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation YOURJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation XCZTCZO.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation UIGZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation ZVIYMIM.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation DRPMZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation QNIEP.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation LBVNW.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation DFPBJIL.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation BVIEW.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation JZMR.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation QMZUEBW.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation CVP.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation NOV.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation MGQJMK.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation RZKDH.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation VKONKE.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation PNGCRHP.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation ZKONEFV.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation JPTHVPQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation HXWEAQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation XQWFTPM.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation IJOMCG.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation MZUM.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation NHIMZS.exe -
Executes dropped EXE 64 IoCs
Processes:
IBLL.exeZRSOL.exeMNKWV.exeTIHI.exeRFBLS.exeKAS.exeDTZ.exeZJCPJUR.exeTCJASVH.exeLFNW.exeDFPBJIL.exeBVIEW.exeQLJDDJI.exePEMLLP.exeCGUKAA.exeXCZTCZO.exeKZHFML.exeBNSXCIM.exeKSWEEG.exeCVOPIL.exeNODA.exeJZMR.exeSZOESM.exeHPPV.exeJNCQGQT.exeGSA.exeHVQB.exeYWSOFGZ.exeATGAU.exeGUNODJB.exeVKONKE.exeXHU.exeIAXA.exeSYDN.exeWOJVTV.exeXJN.exeQMZUEBW.exeVMHIVDX.exeJPD.exeUIGZ.exeHSOYPMD.exeCGGPY.exeGWN.exeCEH.exeWRMGP.exeJCQN.exeRNZO.exePNGCRHP.exeCYC.exeZVIYMIM.exeEGE.exeDRPMZ.exePHVUM.exeYHYZPD.exeZKONEFV.exeDSIDH.exeZTKFLI.exeQJRIWB.exeZHLJIX.exeDXRR.exeNUX.exeWVZR.exeXYDMST.exeVJOCB.exepid process 3604 IBLL.exe 880 ZRSOL.exe 552 MNKWV.exe 3636 TIHI.exe 4836 RFBLS.exe 1116 KAS.exe 1124 DTZ.exe 4500 ZJCPJUR.exe 4808 TCJASVH.exe 2168 LFNW.exe 3580 DFPBJIL.exe 3008 BVIEW.exe 3832 QLJDDJI.exe 1584 PEMLLP.exe 376 CGUKAA.exe 5104 XCZTCZO.exe 4968 KZHFML.exe 2888 BNSXCIM.exe 5116 KSWEEG.exe 4044 CVOPIL.exe 1184 NODA.exe 3916 JZMR.exe 3612 SZOESM.exe 456 HPPV.exe 4460 JNCQGQT.exe 4788 GSA.exe 2040 HVQB.exe 5088 YWSOFGZ.exe 1184 ATGAU.exe 4368 GUNODJB.exe 220 VKONKE.exe 4796 XHU.exe 3376 IAXA.exe 4224 SYDN.exe 3788 WOJVTV.exe 400 XJN.exe 2080 QMZUEBW.exe 3008 VMHIVDX.exe 3136 JPD.exe 848 UIGZ.exe 1960 HSOYPMD.exe 2008 CGGPY.exe 408 GWN.exe 4808 CEH.exe 1404 WRMGP.exe 4556 JCQN.exe 2400 RNZO.exe 4516 PNGCRHP.exe 812 CYC.exe 1440 ZVIYMIM.exe 2936 EGE.exe 1612 DRPMZ.exe 1924 PHVUM.exe 1844 YHYZPD.exe 2928 ZKONEFV.exe 4028 DSIDH.exe 2912 ZTKFLI.exe 4560 QJRIWB.exe 3948 ZHLJIX.exe 1940 DXRR.exe 4460 NUX.exe 4604 WVZR.exe 4792 XYDMST.exe 5060 VJOCB.exe -
Drops file in System32 directory 64 IoCs
Processes:
JOWVX.exeHEFO.exeFXKLI.exeCWFLDSZ.exeZTA.exeJCQN.exeDXRR.exeZHLJIX.exeGBXMHP.exeWVEPU.exeLPZ.exeUTSOR.exeKZHFML.exeYWSOFGZ.exeUAQP.exeTGESJEC.exeJRF.exeOUSI.exeATGAU.exeVMHIVDX.exeUAP.exeTIHI.exeTCJASVH.exeXHU.exeWVZR.exeUWANDVU.exeQNIEP.exeRKTL.exeRQZ.exeGSA.exeVKONKE.exeJKVQG.exeUUP.exeHSHHG.exeCYC.exeYHYZPD.exeWDWYHTR.exeFHXCVL.exeNHIMZS.exeDTZ.exeHXWEAQ.exeJPTHVPQ.exeHBABS.exeGAGFNIP.exeDFPBJIL.exePHVUM.exeIJOMCG.exeNOV.exedescription ioc process File opened for modification C:\windows\SysWOW64\EKBFIXJ.exe JOWVX.exe File created C:\windows\SysWOW64\UPWM.exe.bat HEFO.exe File created C:\windows\SysWOW64\NLOA.exe FXKLI.exe File created C:\windows\SysWOW64\ZPG.exe CWFLDSZ.exe File created C:\windows\SysWOW64\VLKKHIG.exe.bat ZTA.exe File created C:\windows\SysWOW64\RNZO.exe JCQN.exe File opened for modification C:\windows\SysWOW64\NUX.exe DXRR.exe File created C:\windows\SysWOW64\DXRR.exe ZHLJIX.exe File created C:\windows\SysWOW64\CLFLVA.exe GBXMHP.exe File created C:\windows\SysWOW64\TAKMC.exe WVEPU.exe File created C:\windows\SysWOW64\HYTGHU.exe.bat LPZ.exe File created C:\windows\SysWOW64\RZKDH.exe.bat UTSOR.exe File created C:\windows\SysWOW64\BNSXCIM.exe KZHFML.exe File opened for modification C:\windows\SysWOW64\ATGAU.exe YWSOFGZ.exe File opened for modification C:\windows\SysWOW64\MVOHZ.exe UAQP.exe File created C:\windows\SysWOW64\KPTXWVF.exe TGESJEC.exe File created C:\windows\SysWOW64\PSNUT.exe JRF.exe File created C:\windows\SysWOW64\HXWEAQ.exe.bat OUSI.exe File opened for modification C:\windows\SysWOW64\GUNODJB.exe ATGAU.exe File created C:\windows\SysWOW64\JPD.exe.bat VMHIVDX.exe File created C:\windows\SysWOW64\MVOHZ.exe.bat UAQP.exe File opened for modification C:\windows\SysWOW64\NLOA.exe FXKLI.exe File created C:\windows\SysWOW64\NLOA.exe.bat FXKLI.exe File opened for modification C:\windows\SysWOW64\CNU.exe UAP.exe File created C:\windows\SysWOW64\RFBLS.exe TIHI.exe File created C:\windows\SysWOW64\LFNW.exe.bat TCJASVH.exe File created C:\windows\SysWOW64\IAXA.exe.bat XHU.exe File opened for modification C:\windows\SysWOW64\XYDMST.exe WVZR.exe File created C:\windows\SysWOW64\UZMR.exe.bat UWANDVU.exe File created C:\windows\SysWOW64\CVP.exe QNIEP.exe File created C:\windows\SysWOW64\JKVQG.exe RKTL.exe File created C:\windows\SysWOW64\KRPPFV.exe RQZ.exe File created C:\windows\SysWOW64\HVQB.exe GSA.exe File created C:\windows\SysWOW64\XHU.exe.bat VKONKE.exe File created C:\windows\SysWOW64\JKVQG.exe.bat RKTL.exe File created C:\windows\SysWOW64\WVEPU.exe JKVQG.exe File created C:\windows\SysWOW64\KPTXWVF.exe.bat TGESJEC.exe File created C:\windows\SysWOW64\HYTGHU.exe LPZ.exe File created C:\windows\SysWOW64\UAP.exe UUP.exe File created C:\windows\SysWOW64\VDQ.exe.bat HSHHG.exe File created C:\windows\SysWOW64\ATGAU.exe YWSOFGZ.exe File created C:\windows\SysWOW64\ZVIYMIM.exe.bat CYC.exe File created C:\windows\SysWOW64\ZKONEFV.exe.bat YHYZPD.exe File created C:\windows\SysWOW64\DXRR.exe.bat ZHLJIX.exe File created C:\windows\SysWOW64\OLYDLQ.exe WDWYHTR.exe File created C:\windows\SysWOW64\NMKJGJ.exe.bat FHXCVL.exe File created C:\windows\SysWOW64\INUQ.exe NHIMZS.exe File created C:\windows\SysWOW64\CNU.exe.bat UAP.exe File opened for modification C:\windows\SysWOW64\ZJCPJUR.exe DTZ.exe File created C:\windows\SysWOW64\HVQB.exe.bat GSA.exe File created C:\windows\SysWOW64\HSHHG.exe.bat HXWEAQ.exe File opened for modification C:\windows\SysWOW64\IAXA.exe XHU.exe File opened for modification C:\windows\SysWOW64\KSXDBF.exe JPTHVPQ.exe File created C:\windows\SysWOW64\EKBFIXJ.exe JOWVX.exe File created C:\windows\SysWOW64\EKBFIXJ.exe.bat JOWVX.exe File created C:\windows\SysWOW64\MVOHZ.exe UAQP.exe File created C:\windows\SysWOW64\CWFLDSZ.exe HBABS.exe File created C:\windows\SysWOW64\ULOWCLK.exe.bat GAGFNIP.exe File created C:\windows\SysWOW64\BVIEW.exe.bat DFPBJIL.exe File created C:\windows\SysWOW64\YHYZPD.exe PHVUM.exe File created C:\windows\SysWOW64\MZUM.exe.bat IJOMCG.exe File opened for modification C:\windows\SysWOW64\HBABS.exe NOV.exe File created C:\windows\SysWOW64\CNU.exe UAP.exe File opened for modification C:\windows\SysWOW64\RZKDH.exe UTSOR.exe -
Drops file in Windows directory 64 IoCs
Processes:
XYDMST.exeNKAIWS.exeZPG.exeLKNJCT.exeWKXMDS.exeVDQ.exeNODA.exeQJRIWB.exeEDE.exeTAKMC.exeDAZIU.exeYOURJ.exeONYD.exeIBLL.exeMMHTUGD.exeZDE.exeBVIEW.exeUZMR.exeCGYEDXU.exeNMU.exeTACEO.exeMCG.exeWOJVTV.exeEKBFIXJ.exeKYRRQT.exeUPWM.exeABFRSMZ.exeIAXA.exeJBG.exeZGIHC.exeKOQXQV.exeZDJCEZG.exeSTN.exeDRPMZ.exeDSIDH.exeAVM.exeLBVNW.exeKAS.exeJPD.exeHSOYPMD.exeWRMGP.exeTDBOV.exePSNUT.exeXQWFTPM.exeNLOA.exeCVOPIL.exeEGE.exeCLFLVA.exeNMKJGJ.exeCPV.exePJPSM.exeLFNW.exeKPTXWVF.exedescription ioc process File opened for modification C:\windows\system\VJOCB.exe XYDMST.exe File created C:\windows\XHFCD.exe NKAIWS.exe File created C:\windows\system\FPO.exe.bat ZPG.exe File created C:\windows\system\AABTKA.exe LKNJCT.exe File created C:\windows\UAQP.exe.bat WKXMDS.exe File opened for modification C:\windows\XBJA.exe VDQ.exe File opened for modification C:\windows\JZMR.exe NODA.exe File created C:\windows\ZHLJIX.exe QJRIWB.exe File created C:\windows\system\GBXMHP.exe.bat EDE.exe File opened for modification C:\windows\ARL.exe TAKMC.exe File opened for modification C:\windows\SVR.exe DAZIU.exe File opened for modification C:\windows\system\UTSOR.exe YOURJ.exe File created C:\windows\DID.exe.bat ONYD.exe File created C:\windows\ZRSOL.exe.bat IBLL.exe File opened for modification C:\windows\system\GBXMHP.exe EDE.exe File created C:\windows\HPQSJ.exe MMHTUGD.exe File created C:\windows\system\ZGIHC.exe.bat ZDE.exe File created C:\windows\system\QLJDDJI.exe BVIEW.exe File created C:\windows\system\NDPNWJF.exe UZMR.exe File opened for modification C:\windows\system\FOH.exe CGYEDXU.exe File created C:\windows\IZZKL.exe NMU.exe File opened for modification C:\windows\system\QLJDDJI.exe BVIEW.exe File created C:\windows\system\VJOCB.exe XYDMST.exe File opened for modification C:\windows\system\AVM.exe TACEO.exe File opened for modification C:\windows\system\FXKLI.exe MCG.exe File created C:\windows\system\XJN.exe.bat WOJVTV.exe File created C:\windows\system\TACEO.exe.bat EKBFIXJ.exe File opened for modification C:\windows\LBVNW.exe KYRRQT.exe File opened for modification C:\windows\NKAIWS.exe UPWM.exe File opened for modification C:\windows\XGL.exe ABFRSMZ.exe File opened for modification C:\windows\SYDN.exe IAXA.exe File created C:\windows\system\XJN.exe WOJVTV.exe File created C:\windows\MPLT.exe JBG.exe File opened for modification C:\windows\system\TACEO.exe EKBFIXJ.exe File created C:\windows\system\UTNRMCM.exe.bat ZGIHC.exe File created C:\windows\system\QPY.exe KOQXQV.exe File created C:\windows\VELEIV.exe ZDJCEZG.exe File opened for modification C:\windows\system\IJOMCG.exe STN.exe File created C:\windows\system\PHVUM.exe DRPMZ.exe File created C:\windows\ZTKFLI.exe DSIDH.exe File created C:\windows\system\ZFWYI.exe AVM.exe File opened for modification C:\windows\AWN.exe LBVNW.exe File opened for modification C:\windows\DTZ.exe KAS.exe File opened for modification C:\windows\UIGZ.exe JPD.exe File created C:\windows\system\CGGPY.exe HSOYPMD.exe File created C:\windows\system\JCQN.exe WRMGP.exe File opened for modification C:\windows\ZDJCEZG.exe TDBOV.exe File created C:\windows\system\QLJDDJI.exe.bat BVIEW.exe File created C:\windows\system\LPZ.exe PSNUT.exe File created C:\windows\system\PYYSX.exe.bat XQWFTPM.exe File opened for modification C:\windows\CGYEDXU.exe NLOA.exe File created C:\windows\system\FOH.exe.bat CGYEDXU.exe File created C:\windows\SVR.exe.bat DAZIU.exe File created C:\windows\system\NODA.exe CVOPIL.exe File created C:\windows\system\DRPMZ.exe EGE.exe File opened for modification C:\windows\ZTKFLI.exe DSIDH.exe File created C:\windows\system\JBG.exe.bat CLFLVA.exe File created C:\windows\system\IAP.exe.bat NMKJGJ.exe File opened for modification C:\windows\system\FCMD.exe CPV.exe File created C:\windows\OUSI.exe.bat PJPSM.exe File created C:\windows\DFPBJIL.exe.bat LFNW.exe File created C:\windows\SYDN.exe IAXA.exe File created C:\windows\ZTKFLI.exe.bat DSIDH.exe File created C:\windows\ZFUPCR.exe KPTXWVF.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4196 3732 WerFault.exe 0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe 4176 3604 WerFault.exe IBLL.exe 4496 880 WerFault.exe ZRSOL.exe 2200 552 WerFault.exe MNKWV.exe 4268 3636 WerFault.exe TIHI.exe 1832 4836 WerFault.exe RFBLS.exe 2504 1116 WerFault.exe KAS.exe 5008 1124 WerFault.exe DTZ.exe 3776 4500 WerFault.exe ZJCPJUR.exe 552 4808 WerFault.exe TCJASVH.exe 4080 2168 WerFault.exe LFNW.exe 4024 3580 WerFault.exe DFPBJIL.exe 4732 3008 WerFault.exe BVIEW.exe 524 3832 WerFault.exe QLJDDJI.exe 1544 1584 WerFault.exe PEMLLP.exe 2400 376 WerFault.exe CGUKAA.exe 220 5104 WerFault.exe XCZTCZO.exe 3188 4968 WerFault.exe KZHFML.exe 844 2888 WerFault.exe BNSXCIM.exe 3948 5116 WerFault.exe KSWEEG.exe 552 4044 WerFault.exe CVOPIL.exe 4752 1184 WerFault.exe NODA.exe 344 3916 WerFault.exe JZMR.exe 3248 3612 WerFault.exe SZOESM.exe 3008 456 WerFault.exe HPPV.exe 4824 4460 WerFault.exe JNCQGQT.exe 2972 4788 WerFault.exe GSA.exe 2948 2040 WerFault.exe HVQB.exe 4808 5088 WerFault.exe YWSOFGZ.exe 2080 1184 WerFault.exe ATGAU.exe 1656 4368 WerFault.exe GUNODJB.exe 4836 220 WerFault.exe VKONKE.exe 5016 4796 WerFault.exe XHU.exe 2616 3376 WerFault.exe IAXA.exe 1128 4224 WerFault.exe SYDN.exe 1240 3788 WerFault.exe WOJVTV.exe 3980 400 WerFault.exe XJN.exe 4724 2080 WerFault.exe QMZUEBW.exe 3612 3008 WerFault.exe VMHIVDX.exe 4060 3136 WerFault.exe JPD.exe 684 848 WerFault.exe UIGZ.exe 5084 1960 WerFault.exe HSOYPMD.exe 1208 2008 WerFault.exe CGGPY.exe 3280 408 WerFault.exe GWN.exe 4368 4808 WerFault.exe CEH.exe 4444 1404 WerFault.exe WRMGP.exe 1928 4556 WerFault.exe JCQN.exe 3372 2400 WerFault.exe RNZO.exe 404 4516 WerFault.exe PNGCRHP.exe 2084 812 WerFault.exe CYC.exe 4008 1440 WerFault.exe ZVIYMIM.exe 2992 2936 WerFault.exe EGE.exe 4080 1612 WerFault.exe DRPMZ.exe 4336 1924 WerFault.exe PHVUM.exe 2328 1844 WerFault.exe YHYZPD.exe 4364 2928 WerFault.exe ZKONEFV.exe 3256 4028 WerFault.exe DSIDH.exe 2276 2912 WerFault.exe ZTKFLI.exe 2052 4560 WerFault.exe QJRIWB.exe 2032 3948 WerFault.exe ZHLJIX.exe 4556 1940 WerFault.exe DXRR.exe 3408 4460 WerFault.exe NUX.exe 1960 4604 WerFault.exe WVZR.exe 1092 4792 WerFault.exe XYDMST.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exeIBLL.exeZRSOL.exeMNKWV.exeTIHI.exeRFBLS.exeKAS.exeDTZ.exeZJCPJUR.exeTCJASVH.exeLFNW.exeDFPBJIL.exeBVIEW.exeQLJDDJI.exePEMLLP.exeCGUKAA.exeXCZTCZO.exeKZHFML.exeBNSXCIM.exeKSWEEG.exeCVOPIL.exeNODA.exeJZMR.exeSZOESM.exeHPPV.exeJNCQGQT.exeGSA.exeHVQB.exeYWSOFGZ.exeATGAU.exeGUNODJB.exeVKONKE.exepid process 3732 0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe 3732 0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe 3604 IBLL.exe 3604 IBLL.exe 880 ZRSOL.exe 880 ZRSOL.exe 552 MNKWV.exe 552 MNKWV.exe 3636 TIHI.exe 3636 TIHI.exe 4836 RFBLS.exe 4836 RFBLS.exe 1116 KAS.exe 1116 KAS.exe 1124 DTZ.exe 1124 DTZ.exe 4500 ZJCPJUR.exe 4500 ZJCPJUR.exe 4808 TCJASVH.exe 4808 TCJASVH.exe 2168 LFNW.exe 2168 LFNW.exe 3580 DFPBJIL.exe 3580 DFPBJIL.exe 3008 BVIEW.exe 3008 BVIEW.exe 3832 QLJDDJI.exe 3832 QLJDDJI.exe 1584 PEMLLP.exe 1584 PEMLLP.exe 376 CGUKAA.exe 376 CGUKAA.exe 5104 XCZTCZO.exe 5104 XCZTCZO.exe 4968 KZHFML.exe 4968 KZHFML.exe 2888 BNSXCIM.exe 2888 BNSXCIM.exe 5116 KSWEEG.exe 5116 KSWEEG.exe 4044 CVOPIL.exe 4044 CVOPIL.exe 1184 NODA.exe 1184 NODA.exe 3916 JZMR.exe 3916 JZMR.exe 3612 SZOESM.exe 3612 SZOESM.exe 456 HPPV.exe 456 HPPV.exe 4460 JNCQGQT.exe 4460 JNCQGQT.exe 4788 GSA.exe 4788 GSA.exe 2040 HVQB.exe 2040 HVQB.exe 5088 YWSOFGZ.exe 5088 YWSOFGZ.exe 1184 ATGAU.exe 1184 ATGAU.exe 4368 GUNODJB.exe 4368 GUNODJB.exe 220 VKONKE.exe 220 VKONKE.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exeIBLL.exeZRSOL.exeMNKWV.exeTIHI.exeRFBLS.exeKAS.exeDTZ.exeZJCPJUR.exeTCJASVH.exeLFNW.exeDFPBJIL.exeBVIEW.exeQLJDDJI.exePEMLLP.exeCGUKAA.exeXCZTCZO.exeKZHFML.exeBNSXCIM.exeKSWEEG.exeCVOPIL.exeNODA.exeJZMR.exeSZOESM.exeHPPV.exeJNCQGQT.exeGSA.exeHVQB.exeYWSOFGZ.exeATGAU.exeGUNODJB.exeVKONKE.exepid process 3732 0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe 3732 0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe 3604 IBLL.exe 3604 IBLL.exe 880 ZRSOL.exe 880 ZRSOL.exe 552 MNKWV.exe 552 MNKWV.exe 3636 TIHI.exe 3636 TIHI.exe 4836 RFBLS.exe 4836 RFBLS.exe 1116 KAS.exe 1116 KAS.exe 1124 DTZ.exe 1124 DTZ.exe 4500 ZJCPJUR.exe 4500 ZJCPJUR.exe 4808 TCJASVH.exe 4808 TCJASVH.exe 2168 LFNW.exe 2168 LFNW.exe 3580 DFPBJIL.exe 3580 DFPBJIL.exe 3008 BVIEW.exe 3008 BVIEW.exe 3832 QLJDDJI.exe 3832 QLJDDJI.exe 1584 PEMLLP.exe 1584 PEMLLP.exe 376 CGUKAA.exe 376 CGUKAA.exe 5104 XCZTCZO.exe 5104 XCZTCZO.exe 4968 KZHFML.exe 4968 KZHFML.exe 2888 BNSXCIM.exe 2888 BNSXCIM.exe 5116 KSWEEG.exe 5116 KSWEEG.exe 4044 CVOPIL.exe 4044 CVOPIL.exe 1184 NODA.exe 1184 NODA.exe 3916 JZMR.exe 3916 JZMR.exe 3612 SZOESM.exe 3612 SZOESM.exe 456 HPPV.exe 456 HPPV.exe 4460 JNCQGQT.exe 4460 JNCQGQT.exe 4788 GSA.exe 4788 GSA.exe 2040 HVQB.exe 2040 HVQB.exe 5088 YWSOFGZ.exe 5088 YWSOFGZ.exe 1184 ATGAU.exe 1184 ATGAU.exe 4368 GUNODJB.exe 4368 GUNODJB.exe 220 VKONKE.exe 220 VKONKE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.execmd.exeIBLL.execmd.exeZRSOL.execmd.exeMNKWV.execmd.exeTIHI.execmd.exeRFBLS.execmd.exeKAS.execmd.exeDTZ.execmd.exeZJCPJUR.execmd.exeTCJASVH.execmd.exeLFNW.execmd.exedescription pid process target process PID 3732 wrote to memory of 5068 3732 0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe cmd.exe PID 3732 wrote to memory of 5068 3732 0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe cmd.exe PID 3732 wrote to memory of 5068 3732 0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe cmd.exe PID 5068 wrote to memory of 3604 5068 cmd.exe IBLL.exe PID 5068 wrote to memory of 3604 5068 cmd.exe IBLL.exe PID 5068 wrote to memory of 3604 5068 cmd.exe IBLL.exe PID 3604 wrote to memory of 4716 3604 IBLL.exe cmd.exe PID 3604 wrote to memory of 4716 3604 IBLL.exe cmd.exe PID 3604 wrote to memory of 4716 3604 IBLL.exe cmd.exe PID 4716 wrote to memory of 880 4716 cmd.exe ZRSOL.exe PID 4716 wrote to memory of 880 4716 cmd.exe ZRSOL.exe PID 4716 wrote to memory of 880 4716 cmd.exe ZRSOL.exe PID 880 wrote to memory of 1240 880 ZRSOL.exe Conhost.exe PID 880 wrote to memory of 1240 880 ZRSOL.exe Conhost.exe PID 880 wrote to memory of 1240 880 ZRSOL.exe Conhost.exe PID 1240 wrote to memory of 552 1240 cmd.exe MNKWV.exe PID 1240 wrote to memory of 552 1240 cmd.exe MNKWV.exe PID 1240 wrote to memory of 552 1240 cmd.exe MNKWV.exe PID 552 wrote to memory of 4044 552 MNKWV.exe cmd.exe PID 552 wrote to memory of 4044 552 MNKWV.exe cmd.exe PID 552 wrote to memory of 4044 552 MNKWV.exe cmd.exe PID 4044 wrote to memory of 3636 4044 cmd.exe TIHI.exe PID 4044 wrote to memory of 3636 4044 cmd.exe TIHI.exe PID 4044 wrote to memory of 3636 4044 cmd.exe TIHI.exe PID 3636 wrote to memory of 1468 3636 TIHI.exe cmd.exe PID 3636 wrote to memory of 1468 3636 TIHI.exe cmd.exe PID 3636 wrote to memory of 1468 3636 TIHI.exe cmd.exe PID 1468 wrote to memory of 4836 1468 cmd.exe RFBLS.exe PID 1468 wrote to memory of 4836 1468 cmd.exe RFBLS.exe PID 1468 wrote to memory of 4836 1468 cmd.exe RFBLS.exe PID 4836 wrote to memory of 4620 4836 RFBLS.exe cmd.exe PID 4836 wrote to memory of 4620 4836 RFBLS.exe cmd.exe PID 4836 wrote to memory of 4620 4836 RFBLS.exe cmd.exe PID 4620 wrote to memory of 1116 4620 cmd.exe KAS.exe PID 4620 wrote to memory of 1116 4620 cmd.exe KAS.exe PID 4620 wrote to memory of 1116 4620 cmd.exe KAS.exe PID 1116 wrote to memory of 3788 1116 KAS.exe cmd.exe PID 1116 wrote to memory of 3788 1116 KAS.exe cmd.exe PID 1116 wrote to memory of 3788 1116 KAS.exe cmd.exe PID 3788 wrote to memory of 1124 3788 cmd.exe DTZ.exe PID 3788 wrote to memory of 1124 3788 cmd.exe DTZ.exe PID 3788 wrote to memory of 1124 3788 cmd.exe DTZ.exe PID 1124 wrote to memory of 4008 1124 DTZ.exe cmd.exe PID 1124 wrote to memory of 4008 1124 DTZ.exe cmd.exe PID 1124 wrote to memory of 4008 1124 DTZ.exe cmd.exe PID 4008 wrote to memory of 4500 4008 cmd.exe ZJCPJUR.exe PID 4008 wrote to memory of 4500 4008 cmd.exe ZJCPJUR.exe PID 4008 wrote to memory of 4500 4008 cmd.exe ZJCPJUR.exe PID 4500 wrote to memory of 4496 4500 ZJCPJUR.exe cmd.exe PID 4500 wrote to memory of 4496 4500 ZJCPJUR.exe cmd.exe PID 4500 wrote to memory of 4496 4500 ZJCPJUR.exe cmd.exe PID 4496 wrote to memory of 4808 4496 cmd.exe TCJASVH.exe PID 4496 wrote to memory of 4808 4496 cmd.exe TCJASVH.exe PID 4496 wrote to memory of 4808 4496 cmd.exe TCJASVH.exe PID 4808 wrote to memory of 376 4808 TCJASVH.exe cmd.exe PID 4808 wrote to memory of 376 4808 TCJASVH.exe cmd.exe PID 4808 wrote to memory of 376 4808 TCJASVH.exe cmd.exe PID 376 wrote to memory of 2168 376 cmd.exe LFNW.exe PID 376 wrote to memory of 2168 376 cmd.exe LFNW.exe PID 376 wrote to memory of 2168 376 cmd.exe LFNW.exe PID 2168 wrote to memory of 3612 2168 LFNW.exe cmd.exe PID 2168 wrote to memory of 3612 2168 LFNW.exe cmd.exe PID 2168 wrote to memory of 3612 2168 LFNW.exe cmd.exe PID 3612 wrote to memory of 3580 3612 cmd.exe DFPBJIL.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe"C:\Users\Admin\AppData\Local\Temp\0dfe3d8158f64c497e62344493f2f6ae5a87be1a4ed09b477cc66e28f3d68246.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\IBLL.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\windows\system\IBLL.exeC:\windows\system\IBLL.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZRSOL.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\windows\ZRSOL.exeC:\windows\ZRSOL.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MNKWV.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\windows\MNKWV.exeC:\windows\MNKWV.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TIHI.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\windows\SysWOW64\TIHI.exeC:\windows\system32\TIHI.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RFBLS.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\windows\SysWOW64\RFBLS.exeC:\windows\system32\RFBLS.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KAS.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\windows\KAS.exeC:\windows\KAS.exe13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DTZ.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\windows\DTZ.exeC:\windows\DTZ.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZJCPJUR.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV117⤵PID:1240
-
C:\windows\SysWOW64\ZJCPJUR.exeC:\windows\system32\ZJCPJUR.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TCJASVH.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\windows\TCJASVH.exeC:\windows\TCJASVH.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LFNW.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:376 -
C:\windows\SysWOW64\LFNW.exeC:\windows\system32\LFNW.exe21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DFPBJIL.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\windows\DFPBJIL.exeC:\windows\DFPBJIL.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BVIEW.exe.bat" "24⤵PID:5088
-
C:\windows\SysWOW64\BVIEW.exeC:\windows\system32\BVIEW.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QLJDDJI.exe.bat" "26⤵PID:4460
-
C:\windows\system\QLJDDJI.exeC:\windows\system\QLJDDJI.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PEMLLP.exe.bat" "28⤵PID:2148
-
C:\windows\PEMLLP.exeC:\windows\PEMLLP.exe29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CGUKAA.exe.bat" "30⤵PID:4584
-
C:\windows\SysWOW64\CGUKAA.exeC:\windows\system32\CGUKAA.exe31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XCZTCZO.exe.bat" "32⤵PID:4100
-
C:\windows\XCZTCZO.exeC:\windows\XCZTCZO.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KZHFML.exe.bat" "34⤵PID:1372
-
C:\windows\KZHFML.exeC:\windows\KZHFML.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BNSXCIM.exe.bat" "36⤵PID:4172
-
C:\windows\SysWOW64\BNSXCIM.exeC:\windows\system32\BNSXCIM.exe37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KSWEEG.exe.bat" "38⤵PID:4776
-
C:\windows\KSWEEG.exeC:\windows\KSWEEG.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CVOPIL.exe.bat" "40⤵PID:2812
-
C:\windows\system\CVOPIL.exeC:\windows\system\CVOPIL.exe41⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NODA.exe.bat" "42⤵PID:4920
-
C:\windows\system\NODA.exeC:\windows\system\NODA.exe43⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JZMR.exe.bat" "44⤵PID:2008
-
C:\windows\JZMR.exeC:\windows\JZMR.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SZOESM.exe.bat" "46⤵PID:3788
-
C:\windows\SZOESM.exeC:\windows\SZOESM.exe47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HPPV.exe.bat" "48⤵PID:812
-
C:\windows\system\HPPV.exeC:\windows\system\HPPV.exe49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JNCQGQT.exe.bat" "50⤵PID:2548
-
C:\windows\JNCQGQT.exeC:\windows\JNCQGQT.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GSA.exe.bat" "52⤵PID:1956
-
C:\windows\GSA.exeC:\windows\GSA.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HVQB.exe.bat" "54⤵PID:1068
-
C:\windows\SysWOW64\HVQB.exeC:\windows\system32\HVQB.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YWSOFGZ.exe.bat" "56⤵PID:1832
-
C:\windows\YWSOFGZ.exeC:\windows\YWSOFGZ.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ATGAU.exe.bat" "58⤵PID:404
-
C:\windows\SysWOW64\ATGAU.exeC:\windows\system32\ATGAU.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GUNODJB.exe.bat" "60⤵PID:2928
-
C:\windows\SysWOW64\GUNODJB.exeC:\windows\system32\GUNODJB.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VKONKE.exe.bat" "62⤵PID:3184
-
C:\windows\system\VKONKE.exeC:\windows\system\VKONKE.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XHU.exe.bat" "64⤵PID:228
-
C:\windows\SysWOW64\XHU.exeC:\windows\system32\XHU.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IAXA.exe.bat" "66⤵PID:1496
-
C:\windows\SysWOW64\IAXA.exeC:\windows\system32\IAXA.exe67⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SYDN.exe.bat" "68⤵PID:552
-
C:\windows\SYDN.exeC:\windows\SYDN.exe69⤵
- Executes dropped EXE
PID:4224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WOJVTV.exe.bat" "70⤵PID:3468
-
C:\windows\WOJVTV.exeC:\windows\WOJVTV.exe71⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XJN.exe.bat" "72⤵PID:4436
-
C:\windows\system\XJN.exeC:\windows\system\XJN.exe73⤵
- Checks computer location settings
- Executes dropped EXE
PID:400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QMZUEBW.exe.bat" "74⤵PID:4148
-
C:\windows\system\QMZUEBW.exeC:\windows\system\QMZUEBW.exe75⤵
- Checks computer location settings
- Executes dropped EXE
PID:2080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VMHIVDX.exe.bat" "76⤵PID:2548
-
C:\windows\system\VMHIVDX.exeC:\windows\system\VMHIVDX.exe77⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JPD.exe.bat" "78⤵PID:844
-
C:\windows\SysWOW64\JPD.exeC:\windows\system32\JPD.exe79⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UIGZ.exe.bat" "80⤵PID:4588
-
C:\windows\UIGZ.exeC:\windows\UIGZ.exe81⤵
- Checks computer location settings
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HSOYPMD.exe.bat" "82⤵PID:2032
-
C:\windows\HSOYPMD.exeC:\windows\HSOYPMD.exe83⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CGGPY.exe.bat" "84⤵PID:1196
-
C:\windows\system\CGGPY.exeC:\windows\system\CGGPY.exe85⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GWN.exe.bat" "86⤵PID:812
-
C:\windows\GWN.exeC:\windows\GWN.exe87⤵
- Executes dropped EXE
PID:408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CEH.exe.bat" "88⤵PID:3300
-
C:\windows\CEH.exeC:\windows\CEH.exe89⤵
- Executes dropped EXE
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WRMGP.exe.bat" "90⤵PID:3256
-
C:\windows\WRMGP.exeC:\windows\WRMGP.exe91⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JCQN.exe.bat" "92⤵PID:1956
-
C:\windows\system\JCQN.exeC:\windows\system\JCQN.exe93⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RNZO.exe.bat" "94⤵PID:2920
-
C:\windows\SysWOW64\RNZO.exeC:\windows\system32\RNZO.exe95⤵
- Checks computer location settings
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PNGCRHP.exe.bat" "96⤵PID:4272
-
C:\windows\system\PNGCRHP.exeC:\windows\system\PNGCRHP.exe97⤵
- Checks computer location settings
- Executes dropped EXE
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CYC.exe.bat" "98⤵PID:2440
-
C:\windows\system\CYC.exeC:\windows\system\CYC.exe99⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZVIYMIM.exe.bat" "100⤵PID:736
-
C:\windows\SysWOW64\ZVIYMIM.exeC:\windows\system32\ZVIYMIM.exe101⤵
- Checks computer location settings
- Executes dropped EXE
PID:1440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EGE.exe.bat" "102⤵PID:3848
-
C:\windows\EGE.exeC:\windows\EGE.exe103⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DRPMZ.exe.bat" "104⤵PID:3604
-
C:\windows\system\DRPMZ.exeC:\windows\system\DRPMZ.exe105⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PHVUM.exe.bat" "106⤵PID:3324
-
C:\windows\system\PHVUM.exeC:\windows\system\PHVUM.exe107⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YHYZPD.exe.bat" "108⤵PID:4064
-
C:\windows\SysWOW64\YHYZPD.exeC:\windows\system32\YHYZPD.exe109⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZKONEFV.exe.bat" "110⤵PID:4888
-
C:\windows\SysWOW64\ZKONEFV.exeC:\windows\system32\ZKONEFV.exe111⤵
- Checks computer location settings
- Executes dropped EXE
PID:2928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DSIDH.exe.bat" "112⤵PID:3136
-
C:\windows\DSIDH.exeC:\windows\DSIDH.exe113⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZTKFLI.exe.bat" "114⤵PID:4932
-
C:\windows\ZTKFLI.exeC:\windows\ZTKFLI.exe115⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QJRIWB.exe.bat" "116⤵PID:844
-
C:\windows\system\QJRIWB.exeC:\windows\system\QJRIWB.exe117⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZHLJIX.exe.bat" "118⤵PID:116
-
C:\windows\ZHLJIX.exeC:\windows\ZHLJIX.exe119⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DXRR.exe.bat" "120⤵PID:408
-
C:\windows\SysWOW64\DXRR.exeC:\windows\system32\DXRR.exe121⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NUX.exe.bat" "122⤵PID:4048
-
C:\windows\SysWOW64\NUX.exeC:\windows\system32\NUX.exe123⤵
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WVZR.exe.bat" "124⤵PID:4740
-
C:\windows\system\WVZR.exeC:\windows\system\WVZR.exe125⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XYDMST.exe.bat" "126⤵PID:3980
-
C:\windows\SysWOW64\XYDMST.exeC:\windows\system32\XYDMST.exe127⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VJOCB.exe.bat" "128⤵PID:1556
-
C:\windows\system\VJOCB.exeC:\windows\system\VJOCB.exe129⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KOLZIJW.exe.bat" "130⤵PID:3776
-
C:\windows\SysWOW64\KOLZIJW.exeC:\windows\system32\KOLZIJW.exe131⤵PID:2536
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EBQJ.exe.bat" "132⤵PID:4808
-
C:\windows\EBQJ.exeC:\windows\EBQJ.exe133⤵PID:3756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UWANDVU.exe.bat" "134⤵PID:376
-
C:\windows\system\UWANDVU.exeC:\windows\system\UWANDVU.exe135⤵
- Drops file in System32 directory
PID:3188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UZMR.exe.bat" "136⤵PID:2032
-
C:\windows\SysWOW64\UZMR.exeC:\windows\system32\UZMR.exe137⤵
- Drops file in Windows directory
PID:4804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NDPNWJF.exe.bat" "138⤵PID:3208
-
C:\windows\system\NDPNWJF.exeC:\windows\system\NDPNWJF.exe139⤵PID:4364
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\EDE.exe.bat" "140⤵PID:1788
-
C:\windows\system\EDE.exeC:\windows\system\EDE.exe141⤵
- Drops file in Windows directory
PID:1592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GBXMHP.exe.bat" "142⤵PID:2368
-
C:\windows\system\GBXMHP.exeC:\windows\system\GBXMHP.exe143⤵
- Drops file in System32 directory
PID:4340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CLFLVA.exe.bat" "144⤵PID:2132
-
C:\windows\SysWOW64\CLFLVA.exeC:\windows\system32\CLFLVA.exe145⤵
- Drops file in Windows directory
PID:844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JBG.exe.bat" "146⤵PID:2100
-
C:\windows\system\JBG.exeC:\windows\system\JBG.exe147⤵
- Drops file in Windows directory
PID:4408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MPLT.exe.bat" "148⤵PID:4324
-
C:\windows\MPLT.exeC:\windows\MPLT.exe149⤵PID:3376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JPTHVPQ.exe.bat" "150⤵PID:4468
-
C:\windows\system\JPTHVPQ.exeC:\windows\system\JPTHVPQ.exe151⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KSXDBF.exe.bat" "152⤵PID:4172
-
C:\windows\SysWOW64\KSXDBF.exeC:\windows\system32\KSXDBF.exe153⤵PID:3220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QNIEP.exe.bat" "154⤵PID:1028
-
C:\windows\system\QNIEP.exeC:\windows\system\QNIEP.exe155⤵
- Checks computer location settings
- Drops file in System32 directory
PID:404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CVP.exe.bat" "156⤵PID:2256
-
C:\windows\SysWOW64\CVP.exeC:\windows\system32\CVP.exe157⤵
- Checks computer location settings
PID:1664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VYBIGCX.exe.bat" "158⤵PID:2912
-
C:\windows\VYBIGCX.exeC:\windows\VYBIGCX.exe159⤵PID:1068
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KOC.exe.bat" "160⤵PID:2232
-
C:\windows\system\KOC.exeC:\windows\system\KOC.exe161⤵PID:4328
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MMHTUGD.exe.bat" "162⤵PID:116
-
C:\windows\SysWOW64\MMHTUGD.exeC:\windows\system32\MMHTUGD.exe163⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HPQSJ.exe.bat" "164⤵PID:524
-
C:\windows\HPQSJ.exeC:\windows\HPQSJ.exe165⤵PID:4452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LFESV.exe.bat" "166⤵PID:1940
-
C:\windows\SysWOW64\LFESV.exeC:\windows\system32\LFESV.exe167⤵PID:220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZDE.exe.bat" "168⤵PID:4968
-
C:\windows\SysWOW64\ZDE.exeC:\windows\system32\ZDE.exe169⤵
- Drops file in Windows directory
PID:4580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZGIHC.exe.bat" "170⤵PID:848
-
C:\windows\system\ZGIHC.exeC:\windows\system\ZGIHC.exe171⤵
- Drops file in Windows directory
PID:2500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UTNRMCM.exe.bat" "172⤵PID:3044
-
C:\windows\system\UTNRMCM.exeC:\windows\system\UTNRMCM.exe173⤵
- Checks computer location settings
PID:1524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JOWVX.exe.bat" "174⤵PID:3744
-
C:\windows\SysWOW64\JOWVX.exeC:\windows\system32\JOWVX.exe175⤵
- Drops file in System32 directory
PID:4428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EKBFIXJ.exe.bat" "176⤵PID:1440
-
C:\windows\SysWOW64\EKBFIXJ.exeC:\windows\system32\EKBFIXJ.exe177⤵
- Drops file in Windows directory
PID:3720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TACEO.exe.bat" "178⤵PID:4928
-
C:\windows\system\TACEO.exeC:\windows\system\TACEO.exe179⤵
- Drops file in Windows directory
PID:4336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AVM.exe.bat" "180⤵PID:1128
-
C:\windows\system\AVM.exeC:\windows\system\AVM.exe181⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZFWYI.exe.bat" "182⤵PID:1240
-
C:\windows\system\ZFWYI.exeC:\windows\system\ZFWYI.exe183⤵
- Checks computer location settings
PID:4708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KYRRQT.exe.bat" "184⤵PID:4800
-
C:\windows\KYRRQT.exeC:\windows\KYRRQT.exe185⤵
- Drops file in Windows directory
PID:1592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LBVNW.exe.bat" "186⤵PID:4700
-
C:\windows\LBVNW.exeC:\windows\LBVNW.exe187⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AWN.exe.bat" "188⤵PID:3396
-
C:\windows\AWN.exeC:\windows\AWN.exe189⤵
- Checks computer location settings
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ICRGRCQ.exe.bat" "190⤵PID:3772
-
C:\windows\SysWOW64\ICRGRCQ.exeC:\windows\system32\ICRGRCQ.exe191⤵PID:1216
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RKTL.exe.bat" "192⤵PID:4928
-
C:\windows\system\RKTL.exeC:\windows\system\RKTL.exe193⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JKVQG.exe.bat" "194⤵PID:4148
-
C:\windows\SysWOW64\JKVQG.exeC:\windows\system32\JKVQG.exe195⤵
- Drops file in System32 directory
PID:524 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WVEPU.exe.bat" "196⤵PID:1556
-
C:\windows\SysWOW64\WVEPU.exeC:\windows\system32\WVEPU.exe197⤵
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TAKMC.exe.bat" "198⤵PID:4588
-
C:\windows\SysWOW64\TAKMC.exeC:\windows\system32\TAKMC.exe199⤵
- Drops file in Windows directory
PID:4492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ARL.exe.bat" "200⤵PID:1584
-
C:\windows\ARL.exeC:\windows\ARL.exe201⤵PID:4956
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KOQXQV.exe.bat" "202⤵PID:5104
-
C:\windows\system\KOQXQV.exeC:\windows\system\KOQXQV.exe203⤵
- Drops file in Windows directory
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QPY.exe.bat" "204⤵PID:2100
-
C:\windows\system\QPY.exeC:\windows\system\QPY.exe205⤵PID:4268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WKXMDS.exe.bat" "206⤵PID:2900
-
C:\windows\SysWOW64\WKXMDS.exeC:\windows\system32\WKXMDS.exe207⤵
- Drops file in Windows directory
PID:3332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UAQP.exe.bat" "208⤵PID:5088
-
C:\windows\UAQP.exeC:\windows\UAQP.exe209⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MVOHZ.exe.bat" "210⤵PID:1216
-
C:\windows\SysWOW64\MVOHZ.exeC:\windows\system32\MVOHZ.exe211⤵PID:2972
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WDWYHTR.exe.bat" "212⤵PID:4388
-
C:\windows\WDWYHTR.exeC:\windows\WDWYHTR.exe213⤵
- Drops file in System32 directory
PID:220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OLYDLQ.exe.bat" "214⤵PID:4480
-
C:\windows\SysWOW64\OLYDLQ.exeC:\windows\system32\OLYDLQ.exe215⤵PID:2220
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HEFO.exe.bat" "216⤵PID:5084
-
C:\windows\system\HEFO.exeC:\windows\system\HEFO.exe217⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UPWM.exe.bat" "218⤵PID:2232
-
C:\windows\SysWOW64\UPWM.exeC:\windows\system32\UPWM.exe219⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NKAIWS.exe.bat" "220⤵PID:2732
-
C:\windows\NKAIWS.exeC:\windows\NKAIWS.exe221⤵
- Drops file in Windows directory
PID:4812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XHFCD.exe.bat" "222⤵PID:4008
-
C:\windows\XHFCD.exeC:\windows\XHFCD.exe223⤵PID:4500
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GQHHHY.exe.bat" "224⤵PID:472
-
C:\windows\GQHHHY.exeC:\windows\GQHHHY.exe225⤵PID:4964
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XQWFTPM.exe.bat" "226⤵PID:1224
-
C:\windows\system\XQWFTPM.exeC:\windows\system\XQWFTPM.exe227⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PYYSX.exe.bat" "228⤵PID:4408
-
C:\windows\system\PYYSX.exeC:\windows\system\PYYSX.exe229⤵PID:3996
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TGESJEC.exe.bat" "230⤵PID:1688
-
C:\windows\SysWOW64\TGESJEC.exeC:\windows\system32\TGESJEC.exe231⤵
- Checks computer location settings
- Drops file in System32 directory
PID:416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KPTXWVF.exe.bat" "232⤵PID:1056
-
C:\windows\SysWOW64\KPTXWVF.exeC:\windows\system32\KPTXWVF.exe233⤵
- Drops file in Windows directory
PID:3948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZFUPCR.exe.bat" "234⤵PID:1092
-
C:\windows\ZFUPCR.exeC:\windows\ZFUPCR.exe235⤵
- Checks computer location settings
PID:4032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\USZ.exe.bat" "236⤵PID:4476
-
C:\windows\USZ.exeC:\windows\USZ.exe237⤵PID:4892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TDBOV.exe.bat" "238⤵PID:3388
-
C:\windows\system\TDBOV.exeC:\windows\system\TDBOV.exe239⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZDJCEZG.exe.bat" "240⤵PID:636
-
C:\windows\ZDJCEZG.exeC:\windows\ZDJCEZG.exe241⤵
- Drops file in Windows directory
PID:3736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VELEIV.exe.bat" "242⤵PID:4500