Analysis
-
max time kernel
160s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe
-
Size
320KB
-
MD5
3ec55276c135dfb48c1874c735fc2e00
-
SHA1
0e00b9f177ce9a27883cba9a2c8bd2aec1523a7c
-
SHA256
37a692b7cd7955a858ea03cc3a43f609a6fad55ff8424645a7732765a881d3e9
-
SHA512
558506b362cf6c8b753293e606f6d69940dc73d84ed76e6fba0caf55cf3fd22569c67d9ae19225fdd67e2b21b549bde44acc02af0b24173351941efdd453c49e
-
SSDEEP
6144:AGuTZB2KKoEOfXoLYl/kEjWbjcSbcY+CA:AGuTf2KmGXoLm/kFbzs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation SUE.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation VSS.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation UOMRYV.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation SEIID.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation BTFM.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation EXCVXFY.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation UFWWFMF.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation IQI.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation KUF.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation PGITSXQ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation USS.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation RCGSZE.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation CNB.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WLMYJA.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation XZV.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation YCPF.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation ARZHJD.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WUC.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation ASDJV.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation JPJCBVA.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation CVUBA.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation FAHE.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation UCAAWL.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation VJSIOCT.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation HWFNHIH.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation GXCBI.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation ZDFDTM.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation MGSPN.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WORJU.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation PFDH.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation AVE.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation KKT.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation COAMS.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation FWXZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation JUVW.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation HERB.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation YLNPZJL.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation UOZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation LWHQG.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation HXWEAQ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation XSHB.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation WBZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation YKWQJSN.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation FPOAUPT.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation BORABFJ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation BZDC.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation TSCIO.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation FFI.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation OMFPRX.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation GNDG.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation BARKF.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation KRE.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation UQN.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation NKKO.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation TSAEX.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation ETOSRH.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation CJASCQ.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation JADMO.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation OFRSUE.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation RKYR.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation OIAKHN.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation ARPBQZR.exe Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation ABDSVX.exe -
Executes dropped EXE 64 IoCs
pid Process 2516 DFNZSQ.exe 1968 YKWQJSN.exe 2808 PFDH.exe 3816 OIAKHN.exe 3968 PGITSXQ.exe 3104 USS.exe 3872 AVE.exe 1668 BORABFJ.exe 884 NKKO.exe 2604 VSS.exe 3460 TSAEX.exe 468 ARPBQZR.exe 4040 JPJCBVA.exe 4568 ZDFDTM.exe 4500 LWHQG.exe 4468 RCGSZE.exe 3272 UOMRYV.exe 2520 VJSIOCT.exe 4300 YCPF.exe 3852 CVUBA.exe 4412 ARZHJD.exe 3556 HWFNHIH.exe 3424 FFI.exe 1188 COAMS.exe 1536 BZDC.exe 3672 BTFM.exe 4140 MGSPN.exe 4356 GXCBI.exe 3092 FAHE.exe 3480 ABDSVX.exe 3888 WUC.exe 4888 JADMO.exe 4716 FWXZ.exe 3920 HXWEAQ.exe 4248 ASDJV.exe 5008 ABOIO.exe 4632 FPOAUPT.exe 556 XSHB.exe 4356 SEIID.exe 2412 HERB.exe 4112 EXCVXFY.exe 3572 ETOSRH.exe 3084 SUE.exe 1472 OFRSUE.exe 5068 YLNPZJL.exe 1808 JUVW.exe 3788 BARKF.exe 2456 KRE.exe 5008 TSCIO.exe 2964 WLMYJA.exe 1732 WORJU.exe 3468 OMFPRX.exe 3944 KKT.exe 3064 UOZ.exe 1296 UFWWFMF.exe 3888 IQI.exe 5080 KUF.exe 3092 CNB.exe 216 GNDG.exe 3944 WBZ.exe 2120 UCAAWL.exe 228 UQN.exe 4108 CJASCQ.exe 1168 XZV.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\PFDH.exe.bat YKWQJSN.exe File opened for modification C:\windows\SysWOW64\PFDH.exe YKWQJSN.exe File created C:\windows\SysWOW64\BORABFJ.exe.bat AVE.exe File opened for modification C:\windows\SysWOW64\ARPBQZR.exe TSAEX.exe File created C:\windows\SysWOW64\RCGSZE.exe LWHQG.exe File opened for modification C:\windows\SysWOW64\FAHE.exe GXCBI.exe File created C:\windows\SysWOW64\JADMO.exe.bat WUC.exe File created C:\windows\SysWOW64\UFWWFMF.exe UOZ.exe File opened for modification C:\windows\SysWOW64\YKWQJSN.exe DFNZSQ.exe File opened for modification C:\windows\SysWOW64\WBZ.exe GNDG.exe File created C:\windows\SysWOW64\RKYR.exe.bat XZV.exe File created C:\windows\SysWOW64\GNDG.exe CNB.exe File created C:\windows\SysWOW64\JPJCBVA.exe ARPBQZR.exe File opened for modification C:\windows\SysWOW64\JPJCBVA.exe ARPBQZR.exe File created C:\windows\SysWOW64\GNDG.exe.bat CNB.exe File opened for modification C:\windows\SysWOW64\RKYR.exe XZV.exe File created C:\windows\SysWOW64\AVE.exe.bat USS.exe File created C:\windows\SysWOW64\LWHQG.exe.bat ZDFDTM.exe File created C:\windows\SysWOW64\YCPF.exe.bat VJSIOCT.exe File created C:\windows\SysWOW64\HXWEAQ.exe FWXZ.exe File opened for modification C:\windows\SysWOW64\UFWWFMF.exe UOZ.exe File created C:\windows\SysWOW64\PFDH.exe YKWQJSN.exe File created C:\windows\SysWOW64\YCPF.exe VJSIOCT.exe File opened for modification C:\windows\SysWOW64\ABOIO.exe ASDJV.exe File created C:\windows\SysWOW64\XSHB.exe.bat FPOAUPT.exe File opened for modification C:\windows\SysWOW64\EXCVXFY.exe HERB.exe File created C:\windows\SysWOW64\VJSIOCT.exe.bat UOMRYV.exe File opened for modification C:\windows\SysWOW64\BORABFJ.exe AVE.exe File created C:\windows\SysWOW64\ABOIO.exe.bat ASDJV.exe File created C:\windows\SysWOW64\EXCVXFY.exe.bat HERB.exe File created C:\windows\SysWOW64\ZYHI.exe RKYR.exe File created C:\windows\SysWOW64\USS.exe.bat PGITSXQ.exe File opened for modification C:\windows\SysWOW64\ARZHJD.exe CVUBA.exe File created C:\windows\SysWOW64\FAHE.exe GXCBI.exe File created C:\windows\SysWOW64\HXWEAQ.exe.bat FWXZ.exe File created C:\windows\SysWOW64\ABOIO.exe ASDJV.exe File created C:\windows\SysWOW64\IQI.exe UFWWFMF.exe File opened for modification C:\windows\SysWOW64\YCPF.exe VJSIOCT.exe File opened for modification C:\windows\SysWOW64\RCGSZE.exe LWHQG.exe File created C:\windows\SysWOW64\ARZHJD.exe CVUBA.exe File opened for modification C:\windows\SysWOW64\BZDC.exe COAMS.exe File opened for modification C:\windows\SysWOW64\JADMO.exe WUC.exe File created C:\windows\SysWOW64\SUE.exe ETOSRH.exe File opened for modification C:\windows\SysWOW64\SUE.exe ETOSRH.exe File created C:\windows\SysWOW64\JPJCBVA.exe.bat ARPBQZR.exe File opened for modification C:\windows\SysWOW64\ZYHI.exe RKYR.exe File created C:\windows\SysWOW64\ZYHI.exe.bat RKYR.exe File opened for modification C:\windows\SysWOW64\XSHB.exe FPOAUPT.exe File created C:\windows\SysWOW64\BZDC.exe.bat COAMS.exe File opened for modification C:\windows\SysWOW64\IQI.exe UFWWFMF.exe File opened for modification C:\windows\SysWOW64\AVE.exe USS.exe File created C:\windows\SysWOW64\USS.exe PGITSXQ.exe File opened for modification C:\windows\SysWOW64\USS.exe PGITSXQ.exe File created C:\windows\SysWOW64\AVE.exe USS.exe File created C:\windows\SysWOW64\LWHQG.exe ZDFDTM.exe File opened for modification C:\windows\SysWOW64\HXWEAQ.exe FWXZ.exe File created C:\windows\SysWOW64\UFWWFMF.exe.bat UOZ.exe File created C:\windows\SysWOW64\WBZ.exe GNDG.exe File created C:\windows\SysWOW64\YKWQJSN.exe DFNZSQ.exe File created C:\windows\SysWOW64\WBZ.exe.bat GNDG.exe File created C:\windows\SysWOW64\ARPBQZR.exe.bat TSAEX.exe File created C:\windows\SysWOW64\FAHE.exe.bat GXCBI.exe File created C:\windows\SysWOW64\JADMO.exe WUC.exe File created C:\windows\SysWOW64\XSHB.exe FPOAUPT.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\CNB.exe KUF.exe File created C:\windows\system\ZDFDTM.exe JPJCBVA.exe File opened for modification C:\windows\system\UOMRYV.exe RCGSZE.exe File opened for modification C:\windows\system\CVUBA.exe YCPF.exe File created C:\windows\system\BARKF.exe JUVW.exe File created C:\windows\system\WLMYJA.exe TSCIO.exe File opened for modification C:\windows\system\UCAAWL.exe WBZ.exe File created C:\windows\system\XZV.exe CJASCQ.exe File opened for modification C:\windows\system\XZV.exe CJASCQ.exe File created C:\windows\ABDSVX.exe.bat FAHE.exe File opened for modification C:\windows\FPOAUPT.exe ABOIO.exe File created C:\windows\KRE.exe.bat BARKF.exe File created C:\windows\system\WLMYJA.exe.bat TSCIO.exe File created C:\windows\KKT.exe.bat OMFPRX.exe File created C:\windows\system\MGSPN.exe.bat BTFM.exe File opened for modification C:\windows\ETOSRH.exe EXCVXFY.exe File created C:\windows\OFRSUE.exe SUE.exe File opened for modification C:\windows\system\BTFM.exe BZDC.exe File created C:\windows\WUC.exe.bat ABDSVX.exe File opened for modification C:\windows\FWXZ.exe JADMO.exe File opened for modification C:\windows\CNB.exe KUF.exe File opened for modification C:\windows\WEZYXQX.exe ZYHI.exe File created C:\windows\VSS.exe NKKO.exe File created C:\windows\FWXZ.exe JADMO.exe File opened for modification C:\windows\system\UOZ.exe KKT.exe File created C:\windows\PGITSXQ.exe.bat OIAKHN.exe File created C:\windows\system\HWFNHIH.exe.bat ARZHJD.exe File created C:\windows\system\ASDJV.exe.bat HXWEAQ.exe File opened for modification C:\windows\OFRSUE.exe SUE.exe File created C:\windows\system\ZDFDTM.exe.bat JPJCBVA.exe File created C:\windows\system\UOMRYV.exe.bat RCGSZE.exe File created C:\windows\system\WORJU.exe.bat WLMYJA.exe File created C:\windows\WEZYXQX.exe.bat ZYHI.exe File created C:\windows\system\DFNZSQ.exe NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe File created C:\windows\system\DFNZSQ.exe.bat NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe File opened for modification C:\windows\PGITSXQ.exe OIAKHN.exe File opened for modification C:\windows\system\FFI.exe HWFNHIH.exe File created C:\windows\FPOAUPT.exe.bat ABOIO.exe File created C:\windows\system\KUF.exe.bat IQI.exe File opened for modification C:\windows\CJASCQ.exe UQN.exe File created C:\windows\PGITSXQ.exe OIAKHN.exe File opened for modification C:\windows\VSS.exe NKKO.exe File created C:\windows\system\COAMS.exe.bat FFI.exe File created C:\windows\TSCIO.exe KRE.exe File opened for modification C:\windows\OMFPRX.exe WORJU.exe File opened for modification C:\windows\system\COAMS.exe FFI.exe File created C:\windows\SEIID.exe XSHB.exe File created C:\windows\ETOSRH.exe EXCVXFY.exe File created C:\windows\system\TSAEX.exe VSS.exe File created C:\windows\ETOSRH.exe.bat EXCVXFY.exe File created C:\windows\WEZYXQX.exe ZYHI.exe File created C:\windows\NKKO.exe BORABFJ.exe File created C:\windows\KKT.exe OMFPRX.exe File created C:\windows\OMFPRX.exe WORJU.exe File created C:\windows\system\KUF.exe IQI.exe File opened for modification C:\windows\UQN.exe UCAAWL.exe File created C:\windows\NKKO.exe.bat BORABFJ.exe File created C:\windows\system\MGSPN.exe BTFM.exe File created C:\windows\system\GXCBI.exe MGSPN.exe File opened for modification C:\windows\WUC.exe ABDSVX.exe File created C:\windows\FWXZ.exe.bat JADMO.exe File opened for modification C:\windows\system\WORJU.exe WLMYJA.exe File created C:\windows\CJASCQ.exe.bat UQN.exe File opened for modification C:\windows\system\BARKF.exe JUVW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 59 IoCs
pid pid_target Process procid_target 4752 2632 WerFault.exe 89 3672 2516 WerFault.exe 98 2628 1968 WerFault.exe 104 1312 2808 WerFault.exe 109 2692 4568 WerFault.exe 156 2780 4500 WerFault.exe 161 644 4468 WerFault.exe 166 3936 3272 WerFault.exe 171 944 2520 WerFault.exe 176 4904 4300 WerFault.exe 181 2156 3852 WerFault.exe 186 3224 4412 WerFault.exe 191 3788 3556 WerFault.exe 198 2812 3424 WerFault.exe 203 4100 1188 WerFault.exe 208 4924 1536 WerFault.exe 214 884 3672 WerFault.exe 220 2156 4140 WerFault.exe 225 2668 4356 WerFault.exe 231 5080 3092 WerFault.exe 236 3608 3480 WerFault.exe 242 216 3888 WerFault.exe 247 4544 4888 WerFault.exe 252 744 4716 WerFault.exe 257 2432 3920 WerFault.exe 262 4016 4248 WerFault.exe 267 4992 5008 WerFault.exe 272 2380 4632 WerFault.exe 278 4500 556 WerFault.exe 283 1408 4356 WerFault.exe 288 492 2412 WerFault.exe 293 3292 4112 WerFault.exe 299 3144 3572 WerFault.exe 304 2056 3084 WerFault.exe 309 1336 1472 WerFault.exe 314 3208 5068 WerFault.exe 319 4400 1808 WerFault.exe 324 2672 3788 WerFault.exe 329 2120 2456 WerFault.exe 334 2380 5008 WerFault.exe 339 4476 2964 WerFault.exe 344 2368 1732 WerFault.exe 349 1528 3468 WerFault.exe 354 4716 3944 WerFault.exe 359 4840 3064 WerFault.exe 364 4412 1296 WerFault.exe 369 4332 3888 WerFault.exe 374 4380 5080 WerFault.exe 379 1528 3092 WerFault.exe 384 3732 216 WerFault.exe 389 2176 3944 WerFault.exe 395 5048 2120 WerFault.exe 400 1536 228 WerFault.exe 405 1500 4108 WerFault.exe 410 3132 1168 WerFault.exe 415 3920 1324 WerFault.exe 420 1244 3460 WerFault.exe 425 540 216 WerFault.exe 431 4956 4208 WerFault.exe 436 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe 2632 NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe 2516 DFNZSQ.exe 2516 DFNZSQ.exe 1968 YKWQJSN.exe 1968 YKWQJSN.exe 2808 PFDH.exe 2808 PFDH.exe 3816 OIAKHN.exe 3816 OIAKHN.exe 3968 PGITSXQ.exe 3968 PGITSXQ.exe 3104 USS.exe 3104 USS.exe 3872 AVE.exe 3872 AVE.exe 1668 BORABFJ.exe 1668 BORABFJ.exe 884 NKKO.exe 884 NKKO.exe 2604 VSS.exe 2604 VSS.exe 3460 TSAEX.exe 3460 TSAEX.exe 468 ARPBQZR.exe 468 ARPBQZR.exe 4040 JPJCBVA.exe 4040 JPJCBVA.exe 4568 ZDFDTM.exe 4568 ZDFDTM.exe 4500 LWHQG.exe 4500 LWHQG.exe 4468 RCGSZE.exe 4468 RCGSZE.exe 3272 UOMRYV.exe 3272 UOMRYV.exe 2520 VJSIOCT.exe 2520 VJSIOCT.exe 4300 YCPF.exe 4300 YCPF.exe 3852 CVUBA.exe 3852 CVUBA.exe 4412 ARZHJD.exe 4412 ARZHJD.exe 3556 HWFNHIH.exe 3556 HWFNHIH.exe 3424 FFI.exe 3424 FFI.exe 1188 COAMS.exe 1188 COAMS.exe 1536 BZDC.exe 1536 BZDC.exe 3672 BTFM.exe 3672 BTFM.exe 4140 MGSPN.exe 4140 MGSPN.exe 4356 GXCBI.exe 4356 GXCBI.exe 3092 FAHE.exe 3092 FAHE.exe 3480 ABDSVX.exe 3480 ABDSVX.exe 3888 WUC.exe 3888 WUC.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2632 NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe 2632 NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe 2516 DFNZSQ.exe 2516 DFNZSQ.exe 1968 YKWQJSN.exe 1968 YKWQJSN.exe 2808 PFDH.exe 2808 PFDH.exe 3816 OIAKHN.exe 3816 OIAKHN.exe 3968 PGITSXQ.exe 3968 PGITSXQ.exe 3104 USS.exe 3104 USS.exe 3872 AVE.exe 3872 AVE.exe 1668 BORABFJ.exe 1668 BORABFJ.exe 884 NKKO.exe 884 NKKO.exe 2604 VSS.exe 2604 VSS.exe 3460 TSAEX.exe 3460 TSAEX.exe 468 ARPBQZR.exe 468 ARPBQZR.exe 4040 JPJCBVA.exe 4040 JPJCBVA.exe 4568 ZDFDTM.exe 4568 ZDFDTM.exe 4500 LWHQG.exe 4500 LWHQG.exe 4468 RCGSZE.exe 4468 RCGSZE.exe 3272 UOMRYV.exe 3272 UOMRYV.exe 2520 VJSIOCT.exe 2520 VJSIOCT.exe 4300 YCPF.exe 4300 YCPF.exe 3852 CVUBA.exe 3852 CVUBA.exe 4412 ARZHJD.exe 4412 ARZHJD.exe 3556 HWFNHIH.exe 3556 HWFNHIH.exe 3424 FFI.exe 3424 FFI.exe 1188 COAMS.exe 1188 COAMS.exe 1536 BZDC.exe 1536 BZDC.exe 3672 BTFM.exe 3672 BTFM.exe 4140 MGSPN.exe 4140 MGSPN.exe 4356 GXCBI.exe 4356 GXCBI.exe 3092 FAHE.exe 3092 FAHE.exe 3480 ABDSVX.exe 3480 ABDSVX.exe 3888 WUC.exe 3888 WUC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2792 2632 NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe 95 PID 2632 wrote to memory of 2792 2632 NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe 95 PID 2632 wrote to memory of 2792 2632 NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe 95 PID 2792 wrote to memory of 2516 2792 cmd.exe 98 PID 2792 wrote to memory of 2516 2792 cmd.exe 98 PID 2792 wrote to memory of 2516 2792 cmd.exe 98 PID 2516 wrote to memory of 4828 2516 DFNZSQ.exe 100 PID 2516 wrote to memory of 4828 2516 DFNZSQ.exe 100 PID 2516 wrote to memory of 4828 2516 DFNZSQ.exe 100 PID 4828 wrote to memory of 1968 4828 cmd.exe 104 PID 4828 wrote to memory of 1968 4828 cmd.exe 104 PID 4828 wrote to memory of 1968 4828 cmd.exe 104 PID 1968 wrote to memory of 2380 1968 YKWQJSN.exe 105 PID 1968 wrote to memory of 2380 1968 YKWQJSN.exe 105 PID 1968 wrote to memory of 2380 1968 YKWQJSN.exe 105 PID 2380 wrote to memory of 2808 2380 cmd.exe 109 PID 2380 wrote to memory of 2808 2380 cmd.exe 109 PID 2380 wrote to memory of 2808 2380 cmd.exe 109 PID 2808 wrote to memory of 3716 2808 PFDH.exe 110 PID 2808 wrote to memory of 3716 2808 PFDH.exe 110 PID 2808 wrote to memory of 3716 2808 PFDH.exe 110 PID 3716 wrote to memory of 3816 3716 cmd.exe 113 PID 3716 wrote to memory of 3816 3716 cmd.exe 113 PID 3716 wrote to memory of 3816 3716 cmd.exe 113 PID 3816 wrote to memory of 5076 3816 OIAKHN.exe 115 PID 3816 wrote to memory of 5076 3816 OIAKHN.exe 115 PID 3816 wrote to memory of 5076 3816 OIAKHN.exe 115 PID 5076 wrote to memory of 3968 5076 cmd.exe 118 PID 5076 wrote to memory of 3968 5076 cmd.exe 118 PID 5076 wrote to memory of 3968 5076 cmd.exe 118 PID 3968 wrote to memory of 3932 3968 PGITSXQ.exe 119 PID 3968 wrote to memory of 3932 3968 PGITSXQ.exe 119 PID 3968 wrote to memory of 3932 3968 PGITSXQ.exe 119 PID 3932 wrote to memory of 3104 3932 cmd.exe 122 PID 3932 wrote to memory of 3104 3932 cmd.exe 122 PID 3932 wrote to memory of 3104 3932 cmd.exe 122 PID 3104 wrote to memory of 4776 3104 USS.exe 123 PID 3104 wrote to memory of 4776 3104 USS.exe 123 PID 3104 wrote to memory of 4776 3104 USS.exe 123 PID 4776 wrote to memory of 3872 4776 cmd.exe 126 PID 4776 wrote to memory of 3872 4776 cmd.exe 126 PID 4776 wrote to memory of 3872 4776 cmd.exe 126 PID 3872 wrote to memory of 4248 3872 AVE.exe 127 PID 3872 wrote to memory of 4248 3872 AVE.exe 127 PID 3872 wrote to memory of 4248 3872 AVE.exe 127 PID 4248 wrote to memory of 1668 4248 cmd.exe 130 PID 4248 wrote to memory of 1668 4248 cmd.exe 130 PID 4248 wrote to memory of 1668 4248 cmd.exe 130 PID 1668 wrote to memory of 1996 1668 BORABFJ.exe 131 PID 1668 wrote to memory of 1996 1668 BORABFJ.exe 131 PID 1668 wrote to memory of 1996 1668 BORABFJ.exe 131 PID 1996 wrote to memory of 884 1996 cmd.exe 134 PID 1996 wrote to memory of 884 1996 cmd.exe 134 PID 1996 wrote to memory of 884 1996 cmd.exe 134 PID 884 wrote to memory of 4140 884 NKKO.exe 135 PID 884 wrote to memory of 4140 884 NKKO.exe 135 PID 884 wrote to memory of 4140 884 NKKO.exe 135 PID 4140 wrote to memory of 2604 4140 cmd.exe 138 PID 4140 wrote to memory of 2604 4140 cmd.exe 138 PID 4140 wrote to memory of 2604 4140 cmd.exe 138 PID 2604 wrote to memory of 824 2604 VSS.exe 139 PID 2604 wrote to memory of 824 2604 VSS.exe 139 PID 2604 wrote to memory of 824 2604 VSS.exe 139 PID 824 wrote to memory of 3460 824 cmd.exe 142
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.3ec55276c135dfb48c1874c735fc2e00_JC.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DFNZSQ.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\windows\system\DFNZSQ.exeC:\windows\system\DFNZSQ.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YKWQJSN.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\windows\SysWOW64\YKWQJSN.exeC:\windows\system32\YKWQJSN.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PFDH.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\windows\SysWOW64\PFDH.exeC:\windows\system32\PFDH.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OIAKHN.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\windows\OIAKHN.exeC:\windows\OIAKHN.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PGITSXQ.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\windows\PGITSXQ.exeC:\windows\PGITSXQ.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\USS.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\windows\SysWOW64\USS.exeC:\windows\system32\USS.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AVE.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\windows\SysWOW64\AVE.exeC:\windows\system32\AVE.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BORABFJ.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\windows\SysWOW64\BORABFJ.exeC:\windows\system32\BORABFJ.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NKKO.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\windows\NKKO.exeC:\windows\NKKO.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VSS.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\windows\VSS.exeC:\windows\VSS.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TSAEX.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\windows\system\TSAEX.exeC:\windows\system\TSAEX.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ARPBQZR.exe.bat" "24⤵PID:1536
-
C:\windows\SysWOW64\ARPBQZR.exeC:\windows\system32\ARPBQZR.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JPJCBVA.exe.bat" "26⤵PID:3900
-
C:\windows\SysWOW64\JPJCBVA.exeC:\windows\system32\JPJCBVA.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZDFDTM.exe.bat" "28⤵PID:384
-
C:\windows\system\ZDFDTM.exeC:\windows\system\ZDFDTM.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LWHQG.exe.bat" "30⤵PID:3944
-
C:\windows\SysWOW64\LWHQG.exeC:\windows\system32\LWHQG.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RCGSZE.exe.bat" "32⤵PID:5068
-
C:\windows\SysWOW64\RCGSZE.exeC:\windows\system32\RCGSZE.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UOMRYV.exe.bat" "34⤵PID:3920
-
C:\windows\system\UOMRYV.exeC:\windows\system\UOMRYV.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VJSIOCT.exe.bat" "36⤵PID:2284
-
C:\windows\SysWOW64\VJSIOCT.exeC:\windows\system32\VJSIOCT.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YCPF.exe.bat" "38⤵PID:1212
-
C:\windows\SysWOW64\YCPF.exeC:\windows\system32\YCPF.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CVUBA.exe.bat" "40⤵PID:4148
-
C:\windows\system\CVUBA.exeC:\windows\system\CVUBA.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ARZHJD.exe.bat" "42⤵PID:2948
-
C:\windows\SysWOW64\ARZHJD.exeC:\windows\system32\ARZHJD.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HWFNHIH.exe.bat" "44⤵PID:4856
-
C:\windows\system\HWFNHIH.exeC:\windows\system\HWFNHIH.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FFI.exe.bat" "46⤵PID:3476
-
C:\windows\system\FFI.exeC:\windows\system\FFI.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\COAMS.exe.bat" "48⤵PID:1532
-
C:\windows\system\COAMS.exeC:\windows\system\COAMS.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BZDC.exe.bat" "50⤵PID:4040
-
C:\windows\SysWOW64\BZDC.exeC:\windows\system32\BZDC.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BTFM.exe.bat" "52⤵PID:4240
-
C:\windows\system\BTFM.exeC:\windows\system\BTFM.exe53⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MGSPN.exe.bat" "54⤵PID:4888
-
C:\windows\system\MGSPN.exeC:\windows\system\MGSPN.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GXCBI.exe.bat" "56⤵PID:2052
-
C:\windows\system\GXCBI.exeC:\windows\system\GXCBI.exe57⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FAHE.exe.bat" "58⤵PID:4560
-
C:\windows\SysWOW64\FAHE.exeC:\windows\system32\FAHE.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ABDSVX.exe.bat" "60⤵PID:2468
-
C:\windows\ABDSVX.exeC:\windows\ABDSVX.exe61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WUC.exe.bat" "62⤵PID:3064
-
C:\windows\WUC.exeC:\windows\WUC.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JADMO.exe.bat" "64⤵PID:4608
-
C:\windows\SysWOW64\JADMO.exeC:\windows\system32\JADMO.exe65⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FWXZ.exe.bat" "66⤵PID:1296
-
C:\windows\FWXZ.exeC:\windows\FWXZ.exe67⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HXWEAQ.exe.bat" "68⤵PID:4412
-
C:\windows\SysWOW64\HXWEAQ.exeC:\windows\system32\HXWEAQ.exe69⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ASDJV.exe.bat" "70⤵PID:4356
-
C:\windows\system\ASDJV.exeC:\windows\system\ASDJV.exe71⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ABOIO.exe.bat" "72⤵PID:1528
-
C:\windows\SysWOW64\ABOIO.exeC:\windows\system32\ABOIO.exe73⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FPOAUPT.exe.bat" "74⤵PID:4620
-
C:\windows\FPOAUPT.exeC:\windows\FPOAUPT.exe75⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XSHB.exe.bat" "76⤵PID:4328
-
C:\windows\SysWOW64\XSHB.exeC:\windows\system32\XSHB.exe77⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SEIID.exe.bat" "78⤵PID:3024
-
C:\windows\SEIID.exeC:\windows\SEIID.exe79⤵
- Checks computer location settings
- Executes dropped EXE
PID:4356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HERB.exe.bat" "80⤵PID:1472
-
C:\windows\system\HERB.exeC:\windows\system\HERB.exe81⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EXCVXFY.exe.bat" "82⤵PID:2604
-
C:\windows\SysWOW64\EXCVXFY.exeC:\windows\system32\EXCVXFY.exe83⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ETOSRH.exe.bat" "84⤵PID:1688
-
C:\windows\ETOSRH.exeC:\windows\ETOSRH.exe85⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SUE.exe.bat" "86⤵PID:3472
-
C:\windows\SysWOW64\SUE.exeC:\windows\system32\SUE.exe87⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OFRSUE.exe.bat" "88⤵PID:4240
-
C:\windows\OFRSUE.exeC:\windows\OFRSUE.exe89⤵
- Checks computer location settings
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YLNPZJL.exe.bat" "90⤵PID:3608
-
C:\windows\YLNPZJL.exeC:\windows\YLNPZJL.exe91⤵
- Checks computer location settings
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JUVW.exe.bat" "92⤵PID:2780
-
C:\windows\SysWOW64\JUVW.exeC:\windows\system32\JUVW.exe93⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BARKF.exe.bat" "94⤵PID:4108
-
C:\windows\system\BARKF.exeC:\windows\system\BARKF.exe95⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KRE.exe.bat" "96⤵PID:2856
-
C:\windows\KRE.exeC:\windows\KRE.exe97⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TSCIO.exe.bat" "98⤵PID:636
-
C:\windows\TSCIO.exeC:\windows\TSCIO.exe99⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WLMYJA.exe.bat" "100⤵PID:3628
-
C:\windows\system\WLMYJA.exeC:\windows\system\WLMYJA.exe101⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WORJU.exe.bat" "102⤵PID:1628
-
C:\windows\system\WORJU.exeC:\windows\system\WORJU.exe103⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OMFPRX.exe.bat" "104⤵PID:1752
-
C:\windows\OMFPRX.exeC:\windows\OMFPRX.exe105⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KKT.exe.bat" "106⤵PID:4112
-
C:\windows\KKT.exeC:\windows\KKT.exe107⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UOZ.exe.bat" "108⤵PID:4500
-
C:\windows\system\UOZ.exeC:\windows\system\UOZ.exe109⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UFWWFMF.exe.bat" "110⤵PID:4588
-
C:\windows\SysWOW64\UFWWFMF.exeC:\windows\system32\UFWWFMF.exe111⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IQI.exe.bat" "112⤵PID:1188
-
C:\windows\SysWOW64\IQI.exeC:\windows\system32\IQI.exe113⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KUF.exe.bat" "114⤵PID:3096
-
C:\windows\system\KUF.exeC:\windows\system\KUF.exe115⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:5080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CNB.exe.bat" "116⤵PID:4768
-
C:\windows\CNB.exeC:\windows\CNB.exe117⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GNDG.exe.bat" "118⤵PID:4904
-
C:\windows\SysWOW64\GNDG.exeC:\windows\system32\GNDG.exe119⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WBZ.exe.bat" "120⤵PID:2784
-
C:\windows\SysWOW64\WBZ.exeC:\windows\system32\WBZ.exe121⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UCAAWL.exe.bat" "122⤵PID:4844
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-