Analysis
-
max time kernel
45s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.213cfd32e2da38286425cc9d36e9389f.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.213cfd32e2da38286425cc9d36e9389f.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.213cfd32e2da38286425cc9d36e9389f.exe
-
Size
208KB
-
MD5
213cfd32e2da38286425cc9d36e9389f
-
SHA1
faa3ea563aa19c5897c6116805db42a272e1adf2
-
SHA256
cbc97c82ea12518215510a3cb3982880eedda1232d52c1f204f23c98bd7998fc
-
SHA512
77313ccec5cd367ef3da45a48f9d4a431ef1c223ef0cfa2bbbdf247543c9ee06b123f97e881979915f1a4b5a1da17648e83ef241819a16e1a1118dc02be24d57
-
SSDEEP
3072:z4D0ZbTVnmUU8UYBGFLivSaWMEVm7LxX4NLthEjQT6j:zFVVnG8HGFLivSQ1QEj1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 35 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation JJWK.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation JRKI.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation EIF.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation KKCL.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation CURX.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation UNIEDL.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation AND.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation VMOIPUZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation GTD.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation CEXE.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation RNZO.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation AOQ.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation SJC.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation FSRTQM.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation DYULRDL.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation TIMGF.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation BPDG.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation NFBRZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation XUJZIUX.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation KWV.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation FDEH.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation NEAS.213cfd32e2da38286425cc9d36e9389f.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation KQC.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation RVGEEBO.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation CQTRYGC.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation BUO.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation HOPRU.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation ISRPMV.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation KVLRR.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation QNCTP.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation FKHKDBD.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation WPKEBT.exe Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation FFKGWVS.exe -
Executes dropped EXE 54 IoCs
pid Process 5012 CURX.exe 2400 WPKEBT.exe 3828 TIMGF.exe 4780 GTD.exe 1424 BPDG.exe 436 FFKGWVS.exe 3692 RNZO.exe 484 KQC.exe 928 UNIEDL.exe 3976 AOQ.exe 1660 JJWK.exe 4836 JRKI.exe 5004 BUO.exe 1076 EIF.exe 5080 AND.exe 4960 ISRPMV.exe 4940 HOPRU.exe 4884 KWV.exe 680 CEXE.exe 4140 KKCL.exe 1284 WerFault.exe 4960 WerFault.exe 4564 WerFault.exe 5004 FDEH.exe 2344 SJC.exe 1424 KVLRR.exe 2304 WerFault.exe 2084 QNCTP.exe 3468 WerFault.exe 4600 RVGEEBO.exe 2348 WerFault.exe 3520 NFBRZ.exe 1500 WerFault.exe 1964 WerFault.exe 2088 WerFault.exe 2620 FSRTQM.exe 1128 FKHKDBD.exe 488 CQTRYGC.exe 3840 cmd.exe 4740 backgroundTaskHost.exe 4336 DYULRDL.exe 1964 WerFault.exe 3468 WerFault.exe 3684 VMOIPUZ.exe 1304 backgroundTaskHost.exe 2516 WerFault.exe 4396 WerFault.exe 1664 Conhost.exe 4268 XUJZIUX.exe 1284 WerFault.exe 4408 cmd.exe 2280 Conhost.exe 1128 FKHKDBD.exe 3136 WerFault.exe -
Drops file in System32 directory 57 IoCs
description ioc Process File created C:\windows\SysWOW64\YQZO.exe Conhost.exe File created C:\windows\SysWOW64\FJIIED.exe FKHKDBD.exe File created C:\windows\SysWOW64\FDDLWT.exe.bat QNCTP.exe File created C:\windows\SysWOW64\FJIIED.exe.bat FKHKDBD.exe File created C:\windows\SysWOW64\RVGEEBO.exe.bat WerFault.exe File created C:\windows\SysWOW64\FDDLWT.exe QNCTP.exe File opened for modification C:\windows\SysWOW64\FDDLWT.exe QNCTP.exe File opened for modification C:\windows\SysWOW64\QSGP.exe WerFault.exe File created C:\windows\SysWOW64\RIHR.exe WerFault.exe File opened for modification C:\windows\SysWOW64\KKCL.exe CEXE.exe File opened for modification C:\windows\SysWOW64\RVGEEBO.exe WerFault.exe File created C:\windows\SysWOW64\RAIT.exe.bat VMOIPUZ.exe File created C:\windows\SysWOW64\BFPLZ.exe.bat WerFault.exe File created C:\windows\SysWOW64\KKCL.exe.bat CEXE.exe File opened for modification C:\windows\SysWOW64\SJC.exe FDEH.exe File created C:\windows\SysWOW64\FAJ.exe XUJZIUX.exe File created C:\windows\SysWOW64\HDUF.exe WerFault.exe File created C:\windows\SysWOW64\QSGP.exe WerFault.exe File created C:\windows\SysWOW64\SJC.exe FDEH.exe File opened for modification C:\windows\SysWOW64\BPDG.exe GTD.exe File created C:\windows\SysWOW64\SJC.exe.bat FDEH.exe File created C:\windows\SysWOW64\QSGP.exe.bat WerFault.exe File opened for modification C:\windows\SysWOW64\RAIT.exe VMOIPUZ.exe File opened for modification C:\windows\SysWOW64\BFPLZ.exe WerFault.exe File created C:\windows\SysWOW64\BPDG.exe GTD.exe File created C:\windows\SysWOW64\CRGZXFG.exe WerFault.exe File created C:\windows\SysWOW64\EIF.exe BUO.exe File created C:\windows\SysWOW64\CEXE.exe.bat KWV.exe File created C:\windows\SysWOW64\RIHR.exe.bat WerFault.exe File opened for modification C:\windows\SysWOW64\YQZO.exe Conhost.exe File opened for modification C:\windows\SysWOW64\RNZO.exe FFKGWVS.exe File opened for modification C:\windows\SysWOW64\KQC.exe RNZO.exe File created C:\windows\SysWOW64\KKCL.exe CEXE.exe File created C:\windows\SysWOW64\YQZO.exe.bat Conhost.exe File created C:\windows\SysWOW64\BPDG.exe.bat GTD.exe File opened for modification C:\windows\SysWOW64\CRGZXFG.exe WerFault.exe File opened for modification C:\windows\SysWOW64\RIHR.exe WerFault.exe File opened for modification C:\windows\SysWOW64\KCLFJJ.exe KKCL.exe File opened for modification C:\windows\SysWOW64\CEXE.exe KWV.exe File created C:\windows\SysWOW64\CRGZXFG.exe.bat WerFault.exe File opened for modification C:\windows\SysWOW64\FJIIED.exe FKHKDBD.exe File opened for modification C:\windows\SysWOW64\EIF.exe BUO.exe File created C:\windows\SysWOW64\RAIT.exe VMOIPUZ.exe File created C:\windows\SysWOW64\BFPLZ.exe WerFault.exe File created C:\windows\SysWOW64\KCLFJJ.exe KKCL.exe File created C:\windows\SysWOW64\KQC.exe RNZO.exe File created C:\windows\SysWOW64\KQC.exe.bat RNZO.exe File created C:\windows\SysWOW64\RNZO.exe FFKGWVS.exe File created C:\windows\SysWOW64\CEXE.exe KWV.exe File created C:\windows\SysWOW64\KCLFJJ.exe.bat KKCL.exe File opened for modification C:\windows\SysWOW64\HDUF.exe WerFault.exe File created C:\windows\SysWOW64\HDUF.exe.bat WerFault.exe File opened for modification C:\windows\SysWOW64\FAJ.exe XUJZIUX.exe File created C:\windows\SysWOW64\RNZO.exe.bat FFKGWVS.exe File created C:\windows\SysWOW64\RVGEEBO.exe WerFault.exe File created C:\windows\SysWOW64\FAJ.exe.bat XUJZIUX.exe File created C:\windows\SysWOW64\EIF.exe.bat BUO.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\windows\BRCYI.exe WerFault.exe File created C:\windows\WPKEBT.exe.bat CURX.exe File created C:\windows\UNIEDL.exe KQC.exe File created C:\windows\BUO.exe JRKI.exe File created C:\windows\BUO.exe.bat JRKI.exe File created C:\windows\system\PMX.exe.bat cmd.exe File created C:\windows\AND.exe.bat EIF.exe File created C:\windows\ISRPMV.exe WerFault.exe File opened for modification C:\windows\YXLWMOI.exe NFBRZ.exe File created C:\windows\USSBIP.exe WerFault.exe File opened for modification C:\windows\system\QNCTP.exe WerFault.exe File opened for modification C:\windows\system\ZUHN.exe DYULRDL.exe File created C:\windows\WPKEBT.exe CURX.exe File created C:\windows\AND.exe EIF.exe File opened for modification C:\windows\KWV.exe HOPRU.exe File opened for modification C:\windows\system\HELJZJ.exe SJC.exe File created C:\windows\system\QNCTP.exe WerFault.exe File opened for modification C:\windows\RYYYPZ.exe FSRTQM.exe File created C:\windows\system\POVMO.exe RVGEEBO.exe File created C:\windows\system\PTXQDY.exe CQTRYGC.exe File opened for modification C:\windows\system\CURX.exe NEAS.213cfd32e2da38286425cc9d36e9389f.exe File created C:\windows\system\JRKI.exe JJWK.exe File opened for modification C:\windows\system\POVMO.exe RVGEEBO.exe File created C:\windows\YXLWMOI.exe.bat NFBRZ.exe File created C:\windows\system\CQTRYGC.exe.bat FKHKDBD.exe File opened for modification C:\windows\system\SWXY.exe WerFault.exe File created C:\windows\system\HELJZJ.exe SJC.exe File created C:\windows\JJWK.exe.bat AOQ.exe File created C:\windows\system\SWXY.exe.bat WerFault.exe File opened for modification C:\windows\system\PMX.exe cmd.exe File created C:\windows\system\ZUHN.exe DYULRDL.exe File opened for modification C:\windows\XUJZIUX.exe Conhost.exe File created C:\windows\XUJZIUX.exe.bat Conhost.exe File created C:\windows\TIMGF.exe WPKEBT.exe File created C:\windows\system\CQTRYGC.exe FKHKDBD.exe File opened for modification C:\windows\system\CQTRYGC.exe FKHKDBD.exe File created C:\windows\RRN.exe.bat WerFault.exe File created C:\windows\XUJZIUX.exe Conhost.exe File opened for modification C:\windows\HLVON.exe WerFault.exe File created C:\windows\ISRPMV.exe.bat WerFault.exe File created C:\windows\system\SWXY.exe WerFault.exe File created C:\windows\EXTK.exe WerFault.exe File created C:\windows\system\ZUHN.exe.bat DYULRDL.exe File created C:\windows\system\QLT.exe.bat backgroundTaskHost.exe File created C:\windows\SQSB.exe cmd.exe File created C:\windows\system\FFKGWVS.exe BPDG.exe File opened for modification C:\windows\system\FFKGWVS.exe BPDG.exe File created C:\windows\RYYYPZ.exe FSRTQM.exe File created C:\windows\system\HOPRU.exe ISRPMV.exe File opened for modification C:\windows\system\GNME.exe WerFault.exe File created C:\windows\system\QLT.exe backgroundTaskHost.exe File opened for modification C:\windows\TIMGF.exe WPKEBT.exe File created C:\windows\UNIEDL.exe.bat KQC.exe File created C:\windows\KWV.exe.bat HOPRU.exe File created C:\windows\USSBIP.exe.bat WerFault.exe File opened for modification C:\windows\AND.exe EIF.exe File created C:\windows\system\HELJZJ.exe.bat SJC.exe File opened for modification C:\windows\EXTK.exe WerFault.exe File opened for modification C:\windows\USSBIP.exe WerFault.exe File opened for modification C:\windows\RKZLPZC.exe backgroundTaskHost.exe File created C:\windows\system\CURX.exe NEAS.213cfd32e2da38286425cc9d36e9389f.exe File created C:\windows\RKZLPZC.exe.bat backgroundTaskHost.exe File opened for modification C:\windows\GTD.exe TIMGF.exe File opened for modification C:\windows\system\JRKI.exe JJWK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 4820 3712 WerFault.exe 25 540 5012 WerFault.exe 93 928 2400 WerFault.exe 100 4600 3828 WerFault.exe 105 4872 4780 WerFault.exe 110 2620 1424 WerFault.exe 115 2988 436 WerFault.exe 122 4372 3692 WerFault.exe 128 3280 484 WerFault.exe 134 3664 928 WerFault.exe 138 2672 3976 WerFault.exe 144 3672 1660 WerFault.exe 149 2412 4836 WerFault.exe 155 4160 5004 WerFault.exe 159 4436 1076 WerFault.exe 165 1184 5080 WerFault.exe 172 3020 4960 WerFault.exe 176 388 4940 WerFault.exe 182 3468 4884 WerFault.exe 187 3208 680 WerFault.exe 192 2592 4140 WerFault.exe 196 492 1284 WerFault.exe 199 1876 4960 WerFault.exe 207 2412 4564 WerFault.exe 212 4360 5004 WerFault.exe 217 4288 2344 WerFault.exe 221 760 1424 WerFault.exe 227 404 2304 WerFault.exe 231 884 2084 WerFault.exe 237 5020 3468 WerFault.exe 242 764 4600 WerFault.exe 247 1372 2348 WerFault.exe 251 4960 3520 WerFault.exe 258 4572 1500 WerFault.exe 264 4912 1964 WerFault.exe 267 4412 2088 WerFault.exe 274 4832 2620 WerFault.exe 279 3616 1128 WerFault.exe 284 3116 488 WerFault.exe 287 5116 3840 WerFault.exe 293 3828 4740 WerFault.exe 298 1120 4336 WerFault.exe 304 3780 1964 WerFault.exe 310 4376 3468 WerFault.exe 313 2436 3684 WerFault.exe 318 3496 1304 WerFault.exe 325 2068 2516 WerFault.exe 327 4652 4396 WerFault.exe 335 1120 1664 WerFault.exe 340 3172 4268 WerFault.exe 344 1604 1284 WerFault.exe 348 1248 4408 WerFault.exe 355 1680 2280 WerFault.exe 358 2824 1128 WerFault.exe 366 4692 3136 WerFault.exe 369 4396 4372 WerFault.exe 374 3004 4916 WerFault.exe 379 2404 4560 WerFault.exe 385 4956 4376 WerFault.exe 389 4420 2904 WerFault.exe 395 3116 3344 WerFault.exe 400 4228 3684 WerFault.exe 405 1604 4740 WerFault.exe 409 1700 1284 WerFault.exe 415 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3712 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 3712 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 5012 CURX.exe 5012 CURX.exe 2400 WPKEBT.exe 2400 WPKEBT.exe 3828 TIMGF.exe 3828 TIMGF.exe 4780 GTD.exe 4780 GTD.exe 1424 BPDG.exe 1424 BPDG.exe 436 FFKGWVS.exe 436 FFKGWVS.exe 3692 RNZO.exe 3692 RNZO.exe 484 KQC.exe 484 KQC.exe 928 UNIEDL.exe 928 UNIEDL.exe 3976 AOQ.exe 3976 AOQ.exe 1660 JJWK.exe 1660 JJWK.exe 4836 JRKI.exe 4836 JRKI.exe 5004 BUO.exe 5004 BUO.exe 1076 EIF.exe 1076 EIF.exe 5080 AND.exe 5080 AND.exe 4960 ISRPMV.exe 4960 ISRPMV.exe 4940 HOPRU.exe 4940 HOPRU.exe 4884 KWV.exe 4884 KWV.exe 680 CEXE.exe 680 CEXE.exe 4140 KKCL.exe 4140 KKCL.exe 1284 WerFault.exe 1284 WerFault.exe 4960 WerFault.exe 4960 WerFault.exe 4564 WerFault.exe 4564 WerFault.exe 5004 FDEH.exe 5004 FDEH.exe 2344 SJC.exe 2344 SJC.exe 1424 KVLRR.exe 1424 KVLRR.exe 2304 WerFault.exe 2304 WerFault.exe 2084 QNCTP.exe 2084 QNCTP.exe 3468 WerFault.exe 3468 WerFault.exe 4600 RVGEEBO.exe 4600 RVGEEBO.exe 2348 WerFault.exe 2348 WerFault.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3712 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 3712 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 5012 CURX.exe 5012 CURX.exe 2400 WPKEBT.exe 2400 WPKEBT.exe 3828 TIMGF.exe 3828 TIMGF.exe 4780 GTD.exe 4780 GTD.exe 1424 BPDG.exe 1424 BPDG.exe 436 FFKGWVS.exe 436 FFKGWVS.exe 3692 RNZO.exe 3692 RNZO.exe 484 KQC.exe 484 KQC.exe 928 UNIEDL.exe 928 UNIEDL.exe 3976 AOQ.exe 3976 AOQ.exe 1660 JJWK.exe 1660 JJWK.exe 4836 JRKI.exe 4836 JRKI.exe 5004 BUO.exe 5004 BUO.exe 1076 EIF.exe 1076 EIF.exe 5080 AND.exe 5080 AND.exe 4960 ISRPMV.exe 4960 ISRPMV.exe 4940 HOPRU.exe 4940 HOPRU.exe 4884 KWV.exe 4884 KWV.exe 680 CEXE.exe 680 CEXE.exe 4140 KKCL.exe 4140 KKCL.exe 1284 WerFault.exe 1284 WerFault.exe 4960 WerFault.exe 4960 WerFault.exe 4564 WerFault.exe 4564 WerFault.exe 5004 FDEH.exe 5004 FDEH.exe 2344 SJC.exe 2344 SJC.exe 1424 KVLRR.exe 1424 KVLRR.exe 2304 WerFault.exe 2304 WerFault.exe 2084 QNCTP.exe 2084 QNCTP.exe 3468 WerFault.exe 3468 WerFault.exe 4600 RVGEEBO.exe 4600 RVGEEBO.exe 2348 WerFault.exe 2348 WerFault.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 336 3712 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 89 PID 3712 wrote to memory of 336 3712 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 89 PID 3712 wrote to memory of 336 3712 NEAS.213cfd32e2da38286425cc9d36e9389f.exe 89 PID 336 wrote to memory of 5012 336 cmd.exe 93 PID 336 wrote to memory of 5012 336 cmd.exe 93 PID 336 wrote to memory of 5012 336 cmd.exe 93 PID 5012 wrote to memory of 4772 5012 CURX.exe 96 PID 5012 wrote to memory of 4772 5012 CURX.exe 96 PID 5012 wrote to memory of 4772 5012 CURX.exe 96 PID 4772 wrote to memory of 2400 4772 cmd.exe 100 PID 4772 wrote to memory of 2400 4772 cmd.exe 100 PID 4772 wrote to memory of 2400 4772 cmd.exe 100 PID 2400 wrote to memory of 4864 2400 WPKEBT.exe 103 PID 2400 wrote to memory of 4864 2400 WPKEBT.exe 103 PID 2400 wrote to memory of 4864 2400 WPKEBT.exe 103 PID 4864 wrote to memory of 3828 4864 cmd.exe 105 PID 4864 wrote to memory of 3828 4864 cmd.exe 105 PID 4864 wrote to memory of 3828 4864 cmd.exe 105 PID 3828 wrote to memory of 3064 3828 TIMGF.exe 106 PID 3828 wrote to memory of 3064 3828 TIMGF.exe 106 PID 3828 wrote to memory of 3064 3828 TIMGF.exe 106 PID 3064 wrote to memory of 4780 3064 cmd.exe 110 PID 3064 wrote to memory of 4780 3064 cmd.exe 110 PID 3064 wrote to memory of 4780 3064 cmd.exe 110 PID 4780 wrote to memory of 4360 4780 GTD.exe 113 PID 4780 wrote to memory of 4360 4780 GTD.exe 113 PID 4780 wrote to memory of 4360 4780 GTD.exe 113 PID 4360 wrote to memory of 1424 4360 cmd.exe 115 PID 4360 wrote to memory of 1424 4360 cmd.exe 115 PID 4360 wrote to memory of 1424 4360 cmd.exe 115 PID 1424 wrote to memory of 4232 1424 BPDG.exe 118 PID 1424 wrote to memory of 4232 1424 BPDG.exe 118 PID 1424 wrote to memory of 4232 1424 BPDG.exe 118 PID 4232 wrote to memory of 436 4232 cmd.exe 122 PID 4232 wrote to memory of 436 4232 cmd.exe 122 PID 4232 wrote to memory of 436 4232 cmd.exe 122 PID 436 wrote to memory of 336 436 FFKGWVS.exe 124 PID 436 wrote to memory of 336 436 FFKGWVS.exe 124 PID 436 wrote to memory of 336 436 FFKGWVS.exe 124 PID 336 wrote to memory of 3692 336 cmd.exe 128 PID 336 wrote to memory of 3692 336 cmd.exe 128 PID 336 wrote to memory of 3692 336 cmd.exe 128 PID 3692 wrote to memory of 5004 3692 RNZO.exe 130 PID 3692 wrote to memory of 5004 3692 RNZO.exe 130 PID 3692 wrote to memory of 5004 3692 RNZO.exe 130 PID 5004 wrote to memory of 484 5004 cmd.exe 134 PID 5004 wrote to memory of 484 5004 cmd.exe 134 PID 5004 wrote to memory of 484 5004 cmd.exe 134 PID 484 wrote to memory of 1280 484 KQC.exe 135 PID 484 wrote to memory of 1280 484 KQC.exe 135 PID 484 wrote to memory of 1280 484 KQC.exe 135 PID 1280 wrote to memory of 928 1280 cmd.exe 138 PID 1280 wrote to memory of 928 1280 cmd.exe 138 PID 1280 wrote to memory of 928 1280 cmd.exe 138 PID 928 wrote to memory of 4572 928 UNIEDL.exe 140 PID 928 wrote to memory of 4572 928 UNIEDL.exe 140 PID 928 wrote to memory of 4572 928 UNIEDL.exe 140 PID 4572 wrote to memory of 3976 4572 cmd.exe 144 PID 4572 wrote to memory of 3976 4572 cmd.exe 144 PID 4572 wrote to memory of 3976 4572 cmd.exe 144 PID 3976 wrote to memory of 824 3976 AOQ.exe 146 PID 3976 wrote to memory of 824 3976 AOQ.exe 146 PID 3976 wrote to memory of 824 3976 AOQ.exe 146 PID 824 wrote to memory of 1660 824 cmd.exe 149
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.213cfd32e2da38286425cc9d36e9389f.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.213cfd32e2da38286425cc9d36e9389f.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CURX.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\windows\system\CURX.exeC:\windows\system\CURX.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WPKEBT.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\windows\WPKEBT.exeC:\windows\WPKEBT.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TIMGF.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\windows\TIMGF.exeC:\windows\TIMGF.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GTD.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\windows\GTD.exeC:\windows\GTD.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BPDG.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\windows\SysWOW64\BPDG.exeC:\windows\system32\BPDG.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FFKGWVS.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\windows\system\FFKGWVS.exeC:\windows\system\FFKGWVS.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RNZO.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\windows\SysWOW64\RNZO.exeC:\windows\system32\RNZO.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KQC.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\windows\SysWOW64\KQC.exeC:\windows\system32\KQC.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UNIEDL.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\windows\UNIEDL.exeC:\windows\UNIEDL.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AOQ.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\windows\AOQ.exeC:\windows\AOQ.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JJWK.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\windows\JJWK.exeC:\windows\JJWK.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JRKI.exe.bat" "24⤵PID:1424
-
C:\windows\system\JRKI.exeC:\windows\system\JRKI.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BUO.exe.bat" "26⤵PID:3544
-
C:\windows\BUO.exeC:\windows\BUO.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EIF.exe.bat" "28⤵PID:4972
-
C:\windows\SysWOW64\EIF.exeC:\windows\system32\EIF.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 100430⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AND.exe.bat" "30⤵PID:4624
-
C:\windows\AND.exeC:\windows\AND.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ATDQ.exe.bat" "32⤵PID:4236
-
C:\windows\ATDQ.exeC:\windows\ATDQ.exe33⤵PID:4960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HOPRU.exe.bat" "34⤵PID:4064
-
C:\windows\system\HOPRU.exeC:\windows\system\HOPRU.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KWV.exe.bat" "36⤵PID:3172
-
C:\windows\KWV.exeC:\windows\KWV.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CEXE.exe.bat" "38⤵PID:3964
-
C:\windows\SysWOW64\CEXE.exeC:\windows\system32\CEXE.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 680 -s 96040⤵
- Program crash
PID:3208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KKCL.exe.bat" "40⤵PID:2904
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 96038⤵
- Program crash
PID:3468
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4940 -s 97636⤵
- Program crash
PID:388
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 134034⤵
- Program crash
PID:3020
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 132432⤵
- Program crash
PID:1184
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 101228⤵
- Program crash
PID:4160
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 132426⤵
- Program crash
PID:2412
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 126824⤵
- Program crash
PID:3672
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 130422⤵
- Program crash
PID:2672
-
-
C:\windows\SysWOW64\KCLFJJ.exeC:\windows\system32\KCLFJJ.exe22⤵PID:1284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ISRPMV.exe.bat" "23⤵PID:4792
-
C:\windows\ISRPMV.exeC:\windows\ISRPMV.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HDUF.exe.bat" "25⤵PID:1924
-
C:\windows\SysWOW64\HDUF.exeC:\windows\system32\HDUF.exe26⤵PID:4564
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SWXY.exe.bat" "27⤵PID:1240
-
C:\windows\system\SWXY.exeC:\windows\system\SWXY.exe28⤵PID:5004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SJC.exe.bat" "29⤵PID:4600
-
C:\windows\SysWOW64\SJC.exeC:\windows\system32\SJC.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HELJZJ.exe.bat" "31⤵PID:1520
-
C:\windows\system\HELJZJ.exeC:\windows\system\HELJZJ.exe32⤵PID:1424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KMUGGVI.exe.bat" "33⤵PID:1760
-
C:\windows\system\KMUGGVI.exeC:\windows\system\KMUGGVI.exe34⤵PID:2304
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QNCTP.exe.bat" "35⤵PID:2620
-
C:\windows\system\QNCTP.exeC:\windows\system\QNCTP.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FDDLWT.exe.bat" "37⤵PID:1304
-
C:\windows\SysWOW64\FDDLWT.exeC:\windows\system32\FDDLWT.exe38⤵PID:3468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RVGEEBO.exe.bat" "39⤵PID:1964
-
C:\windows\SysWOW64\RVGEEBO.exeC:\windows\system32\RVGEEBO.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\POVMO.exe.bat" "41⤵PID:4240
-
C:\windows\system\POVMO.exeC:\windows\system\POVMO.exe42⤵PID:2348
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CRGZXFG.exe.bat" "43⤵PID:1424
-
C:\windows\SysWOW64\CRGZXFG.exeC:\windows\system32\CRGZXFG.exe44⤵PID:3520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YXLWMOI.exe.bat" "45⤵PID:2436
-
C:\windows\YXLWMOI.exeC:\windows\YXLWMOI.exe46⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 100847⤵
- Program crash
PID:4572
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EXTK.exe.bat" "47⤵PID:2516
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 97645⤵
- Executes dropped EXE
- Drops file in System32 directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4960
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 132843⤵
- Program crash
PID:1372 -
C:\windows\SysWOW64\FKHKDBD.exeC:\windows\system32\FKHKDBD.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 130445⤵PID:1680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EDPMJFR.exe.bat" "45⤵PID:3760
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 96041⤵
- Program crash
PID:764
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 129639⤵
- Program crash
PID:5020 -
C:\windows\YWIN.exeC:\windows\YWIN.exe40⤵PID:4916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CEOV.exe.bat" "41⤵PID:4236
-
C:\windows\SysWOW64\CEOV.exeC:\windows\system32\CEOV.exe42⤵PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 133643⤵
- Program crash
PID:2404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TPFL.exe.bat" "43⤵PID:3620
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 130041⤵
- Program crash
PID:3004
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 96037⤵
- Program crash
PID:884
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 96035⤵
- Program crash
PID:404
-
-
C:\windows\system\BEEBOA.exeC:\windows\system\BEEBOA.exe35⤵PID:1284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 97636⤵
- Program crash
PID:1700
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BXF.exe.bat" "36⤵PID:2764
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 133633⤵
- Program crash
PID:760 -
C:\windows\SysWOW64\QSGP.exeC:\windows\system32\QSGP.exe34⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 96035⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RIHR.exe.bat" "35⤵PID:3968
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 100431⤵
- Program crash
PID:4288
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 96029⤵
- Program crash
PID:4360
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 133627⤵
- Program crash
PID:2412
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 130025⤵
- Program crash
PID:1876
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 96023⤵
- Program crash
PID:492
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 124820⤵
- Program crash
PID:3664
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 484 -s 98818⤵
- Program crash
PID:3280
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3692 -s 96016⤵
- Program crash
PID:4372
-
-
C:\windows\SysWOW64\FAJ.exeC:\windows\system32\FAJ.exe16⤵PID:1284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BFPLZ.exe.bat" "17⤵PID:2516
-
C:\windows\SysWOW64\BFPLZ.exeC:\windows\system32\BFPLZ.exe18⤵PID:4408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 130819⤵
- Program crash
PID:1248
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SQSB.exe.bat" "19⤵PID:2592
-
-
C:\windows\IQMC.exeC:\windows\IQMC.exe19⤵PID:4288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HBVDLG.exe.bat" "20⤵PID:1932
-
C:\windows\SysWOW64\HBVDLG.exeC:\windows\system32\HBVDLG.exe21⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 100822⤵PID:2004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HONSUTU.exe.bat" "22⤵PID:5008
-
C:\windows\SysWOW64\OGIX.exeC:\windows\system32\OGIX.exe23⤵PID:336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PJUTJF.exe.bat" "24⤵PID:3444
-
C:\windows\system\PJUTJF.exeC:\windows\system\PJUTJF.exe25⤵PID:4408
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KPGX.exe.bat" "26⤵PID:2180
-
C:\windows\KPGX.exeC:\windows\KPGX.exe27⤵PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 98828⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PSC.exe.bat" "28⤵PID:4692
-
C:\windows\SysWOW64\PSC.exeC:\windows\system32\PSC.exe29⤵PID:5060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 100030⤵PID:4772
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TVY.exe.bat" "30⤵PID:1164
-
C:\windows\SysWOW64\IZLTFW.exeC:\windows\system32\IZLTFW.exe31⤵PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 96032⤵PID:4728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QKTULIA.exe.bat" "32⤵PID:2348
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 84026⤵PID:2712
-
-
C:\windows\SysWOW64\QDVH.exeC:\windows\system32\QDVH.exe26⤵PID:2608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 130427⤵PID:1384
-
C:\windows\system\XZT.exeC:\windows\system\XZT.exe28⤵PID:1284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZCDQ.exe.bat" "29⤵PID:3340
-
C:\windows\SysWOW64\ZCDQ.exeC:\windows\system32\ZCDQ.exe30⤵PID:2612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 124431⤵PID:4672
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BAWT.exe.bat" "31⤵PID:2480
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 99629⤵PID:544
-
C:\windows\SysWOW64\QGDJY.exeC:\windows\system32\QGDJY.exe30⤵PID:2080
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PRTYF.exe.bat" "31⤵PID:3520
-
C:\windows\SysWOW64\PRTYF.exeC:\windows\system32\PRTYF.exe32⤵PID:5116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 134433⤵PID:2068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JNYIIGG.exe.bat" "33⤵PID:1164
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 133631⤵PID:3060
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RGZCI.exe.bat" "27⤵PID:3200
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 336 -s 96024⤵PID:2304
-
-
-
-
C:\windows\SysWOW64\GJS.exeC:\windows\system32\GJS.exe22⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 96023⤵PID:2984
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YRVV.exe.bat" "23⤵PID:4372
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 96020⤵PID:2252
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 96017⤵
- Program crash
PID:1604
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 100814⤵
- Program crash
PID:2988
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 130412⤵
- Program crash
PID:2620
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 96810⤵
- Program crash
PID:4872
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 13248⤵
- Program crash
PID:4600
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 13246⤵
- Program crash
PID:928
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 12924⤵
- Program crash
PID:540
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3712 -s 13122⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3712 -ip 37121⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5012 -ip 50121⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2400 -ip 24001⤵PID:3032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3828 -ip 38281⤵PID:1840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4780 -ip 47801⤵PID:892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1424 -ip 14241⤵PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 436 -ip 4361⤵PID:1348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 3692 -ip 36921⤵PID:3304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 484 -ip 4841⤵PID:1924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 928 -ip 9281⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3976 -ip 39761⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1660 -ip 16601⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4836 -ip 48361⤵PID:3020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5004 -ip 50041⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1076 -ip 10761⤵PID:2516
-
C:\windows\EXTK.exeC:\windows\EXTK.exe2⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 9883⤵
- Program crash
PID:4912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GNME.exe.bat" "3⤵PID:4560
-
C:\windows\XUJZIUX.exeC:\windows\XUJZIUX.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 9605⤵
- Program crash
PID:3172
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FAJ.exe.bat" "5⤵PID:3692
-
C:\windows\system\ARZ.exeC:\windows\system\ARZ.exe6⤵PID:336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 336 -s 13167⤵PID:212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RHY.exe.bat" "7⤵PID:1880
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 5080 -ip 50801⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4960 -ip 49601⤵PID:3672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4940 -ip 49401⤵PID:5104
-
C:\windows\BOPBEQE.exeC:\windows\BOPBEQE.exe2⤵PID:4320
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LHY.exe.bat" "3⤵PID:4908
-
C:\windows\LHY.exeC:\windows\LHY.exe4⤵PID:3424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FDEH.exe.bat" "5⤵PID:1248
-
C:\windows\SysWOW64\FDEH.exeC:\windows\system32\FDEH.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\EWH.exe.bat" "7⤵PID:2068
-
C:\windows\system\EWH.exeC:\windows\system\EWH.exe8⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 9609⤵PID:2924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YQRER.exe.bat" "9⤵PID:1912
-
C:\windows\system\YQRER.exeC:\windows\system\YQRER.exe10⤵PID:336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UGA.exe.bat" "11⤵PID:4696
-
C:\windows\SysWOW64\UGA.exeC:\windows\system32\UGA.exe12⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 100813⤵PID:1120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UCMHAXM.exe.bat" "13⤵PID:4376
-
C:\windows\UCMHAXM.exeC:\windows\UCMHAXM.exe14⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 132015⤵PID:2188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PPRQ.exe.bat" "15⤵PID:4216
-
-
C:\windows\SysWOW64\KJDWTA.exeC:\windows\system32\KJDWTA.exe15⤵PID:2928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 127216⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1964
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QJK.exe.bat" "16⤵PID:544
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 336 -s 96011⤵PID:2612
-
C:\windows\GNU.exeC:\windows\GNU.exe12⤵PID:1660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 98813⤵PID:4520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RGXEL.exe.bat" "13⤵PID:2620
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 10007⤵PID:1932
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 9645⤵PID:3892
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 10043⤵PID:2396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4884 -ip 48841⤵PID:4788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 680 -ip 6801⤵PID:1664
-
C:\windows\SysWOW64\KKCL.exeC:\windows\system32\KKCL.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 9762⤵
- Program crash
PID:2592 -
C:\windows\SQSB.exeC:\windows\SQSB.exe3⤵PID:2280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YQZO.exe.bat" "4⤵PID:2972
-
C:\windows\SysWOW64\YQZO.exeC:\windows\system32\YQZO.exe5⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 9886⤵
- Program crash
PID:2824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FJIIED.exe.bat" "6⤵PID:3780
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 10084⤵
- Program crash
PID:1680
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KCLFJJ.exe.bat" "2⤵PID:3976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4140 -ip 41401⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1284 -ip 12841⤵PID:2228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4960 -ip 49601⤵PID:2080
-
C:\windows\SysWOW64\QQLBUNV.exeC:\windows\system32\QQLBUNV.exe2⤵PID:3748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 9883⤵PID:3804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YIUCAZJ.exe.bat" "3⤵PID:1700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4564 -ip 45641⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 5004 -ip 50041⤵PID:1700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2344 -ip 23441⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1424 -ip 14241⤵PID:4780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2304 -ip 23041⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2084 -ip 20841⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3468 -ip 34681⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4600 -ip 46001⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2348 -ip 23481⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3520 -ip 35201⤵PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1500 -ip 15001⤵PID:1700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1964 -ip 19641⤵PID:3808
-
C:\windows\system\GNME.exeC:\windows\system\GNME.exe1⤵PID:2088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\USSBIP.exe.bat" "2⤵PID:4848
-
C:\windows\USSBIP.exeC:\windows\USSBIP.exe3⤵PID:2620
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RYYYPZ.exe.bat" "4⤵PID:4740
-
C:\windows\RYYYPZ.exeC:\windows\RYYYPZ.exe5⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 9886⤵
- Program crash
PID:3616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CQTRYGC.exe.bat" "6⤵PID:3724
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 9764⤵
- Program crash
PID:4832
-
-
C:\windows\SysWOW64\RGXEL.exeC:\windows\system32\RGXEL.exe4⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 12885⤵PID:4196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GBGIWNK.exe.bat" "5⤵PID:384
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 9642⤵
- Program crash
PID:4412 -
C:\windows\system\TYENN.exeC:\windows\system\TYENN.exe3⤵PID:4740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 10084⤵
- Program crash
PID:1604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BEEBOA.exe.bat" "4⤵PID:2304
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2088 -ip 20881⤵PID:4496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2620 -ip 26201⤵PID:640
-
C:\windows\system\CQTRYGC.exeC:\windows\system\CQTRYGC.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PTXQDY.exe.bat" "2⤵PID:4228
-
C:\windows\system\PTXQDY.exeC:\windows\system\PTXQDY.exe3⤵PID:3840
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PMX.exe.bat" "4⤵PID:4904
-
C:\windows\system\PMX.exeC:\windows\system\PMX.exe5⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RKZLPZC.exe.bat" "6⤵PID:4572
-
C:\windows\RKZLPZC.exeC:\windows\RKZLPZC.exe7⤵PID:4336
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZUHN.exe.bat" "8⤵PID:4760
-
C:\windows\system\ZUHN.exeC:\windows\system\ZUHN.exe9⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 126410⤵
- Program crash
PID:3780 -
C:\windows\SysWOW64\FJIIED.exeC:\windows\system32\FJIIED.exe11⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 98812⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BRCYI.exe.bat" "12⤵PID:212
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QSGP.exe.bat" "10⤵PID:760
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV111⤵PID:4572
-
-
C:\windows\YIL.exeC:\windows\YIL.exe11⤵PID:3932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3932 -s 96012⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UFIDA.exe.bat" "12⤵PID:1964
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 9888⤵
- Program crash
PID:1120
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4740 -s 9886⤵
- Program crash
PID:3828
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 9884⤵
- Program crash
PID:5116 -
C:\windows\system\SEZMCL.exeC:\windows\system\SEZMCL.exe5⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 9606⤵PID:388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DCLKOS.exe.bat" "6⤵PID:2612
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 488 -s 10082⤵
- Program crash
PID:3116
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1128 -ip 11281⤵PID:4672
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 488 -ip 4881⤵PID:1964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3840 -ip 38401⤵PID:640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4740 -ip 47401⤵PID:1076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 4336 -ip 43361⤵PID:764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1964 -ip 19641⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3468 -ip 34681⤵PID:1424
-
C:\windows\SysWOW64\RIHR.exeC:\windows\system32\RIHR.exe1⤵PID:3684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RAIT.exe.bat" "2⤵PID:3724
-
C:\windows\SysWOW64\RAIT.exeC:\windows\system32\RAIT.exe3⤵PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 13364⤵
- Program crash
PID:3496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QLT.exe.bat" "4⤵PID:4772
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 9602⤵
- Program crash
PID:2436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3684 -ip 36841⤵PID:4572
-
C:\windows\system\QLT.exeC:\windows\system\QLT.exe1⤵PID:2516
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HLVON.exe.bat" "2⤵PID:3028
-
C:\windows\HLVON.exeC:\windows\HLVON.exe3⤵PID:4396
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RRN.exe.bat" "4⤵PID:4436
-
C:\windows\RRN.exeC:\windows\RRN.exe5⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 9606⤵
- Program crash
PID:1120
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XUJZIUX.exe.bat" "6⤵PID:4560
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4396 -s 9604⤵
- Program crash
PID:4652
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 9602⤵
- Program crash
PID:2068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1304 -ip 13041⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2516 -ip 25161⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4396 -ip 43961⤵PID:1076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1664 -ip 16641⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 4268 -ip 42681⤵PID:4160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 1284 -ip 12841⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4408 -ip 44081⤵PID:984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2280 -ip 22801⤵PID:3292
-
C:\windows\ZTIHAS.exeC:\windows\ZTIHAS.exe2⤵PID:4848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 9683⤵PID:2292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NROEH.exe.bat" "3⤵PID:2608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1128 -ip 11281⤵PID:2348
-
C:\windows\SysWOW64\BCF.exeC:\windows\system32\BCF.exe2⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 10083⤵PID:3684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YIL.exe.bat" "3⤵PID:760
-
-
-
C:\windows\BRCYI.exeC:\windows\BRCYI.exe1⤵PID:4372
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 9602⤵
- Executes dropped EXE
- Drops file in Windows directory
- Program crash
PID:4396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YWIN.exe.bat" "2⤵PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3136 -ip 31361⤵PID:1392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4372 -ip 43721⤵PID:1700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4916 -ip 49161⤵PID:4584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4560 -ip 45601⤵PID:2844
-
C:\windows\TPFL.exeC:\windows\TPFL.exe1⤵PID:4376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VLKCLR.exe.bat" "2⤵PID:3828
-
C:\windows\VLKCLR.exeC:\windows\VLKCLR.exe3⤵PID:2904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QYOLNQQ.exe.bat" "4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3840 -
C:\windows\QYOLNQQ.exeC:\windows\QYOLNQQ.exe5⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 12686⤵
- Program crash
PID:3116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZLZ.exe.bat" "6⤵PID:3080
-
C:\windows\system\LIJJKMN.exeC:\windows\system\LIJJKMN.exe7⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 9768⤵PID:3328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RIRX.exe.bat" "8⤵PID:3356
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 9884⤵
- Program crash
PID:4420
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9602⤵
- Program crash
PID:4956 -
C:\windows\SysWOW64\TFZ.exeC:\windows\system32\TFZ.exe3⤵PID:2412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KSJB.exe.bat" "4⤵PID:4436
-
C:\windows\KSJB.exeC:\windows\KSJB.exe5⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 9886⤵PID:4480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FGGKTR.exe.bat" "6⤵PID:2404
-
-
C:\windows\QKTULIA.exeC:\windows\QKTULIA.exe6⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 13367⤵PID:3792
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QQLBUNV.exe.bat" "7⤵PID:2080
-
-
-
-
C:\windows\system\GCJRZH.exeC:\windows\system\GCJRZH.exe5⤵PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 9606⤵PID:4584
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IZLTFW.exe.bat" "6⤵PID:1164
-
C:\windows\system\JNYIIGG.exeC:\windows\system\JNYIIGG.exe7⤵PID:2752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 9888⤵PID:1348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JXGJWKU.exe.bat" "8⤵PID:3764
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 10084⤵PID:1700
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4376 -ip 43761⤵PID:3156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2904 -ip 29041⤵PID:3928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3344 -ip 33441⤵PID:4016
-
C:\windows\system\ZLZ.exeC:\windows\system\ZLZ.exe1⤵PID:3684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 9962⤵
- Program crash
PID:4228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TYENN.exe.bat" "2⤵PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3684 -ip 36841⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 4740 -ip 47401⤵PID:1880
-
C:\windows\system\RHY.exeC:\windows\system\RHY.exe2⤵PID:4196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 10043⤵PID:3136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TFZ.exe.bat" "3⤵PID:4956
-
-
-
C:\windows\SysWOW64\BXF.exeC:\windows\system32\BXF.exe1⤵PID:2020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 12962⤵PID:4496
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BCF.exe.bat" "2⤵PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 1284 -ip 12841⤵PID:4976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2020 -ip 20201⤵PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 3344 -ip 33441⤵PID:1876
-
C:\windows\system\UFIDA.exeC:\windows\system\UFIDA.exe1⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 12962⤵PID:3004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IQMC.exe.bat" "2⤵PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3932 -ip 39321⤵PID:2820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 3048 -ip 30481⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4288 -ip 42881⤵PID:2984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1844 -ip 18441⤵PID:2276
-
C:\windows\system\YDQ.exeC:\windows\system\YDQ.exe2⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 13003⤵PID:5000
-
C:\windows\MHYQ.exeC:\windows\MHYQ.exe4⤵PID:1248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 13445⤵PID:2068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XZT.exe.bat" "5⤵PID:1384
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KVLRR.exe.bat" "3⤵PID:3800
-
-
-
C:\windows\SysWOW64\HONSUTU.exeC:\windows\system32\HONSUTU.exe1⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9602⤵PID:4948
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PZWTAXJ.exe.bat" "2⤵PID:3352
-
-
C:\windows\PZWTAXJ.exeC:\windows\PZWTAXJ.exe1⤵PID:1184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1184 -s 10082⤵PID:2404
-
C:\windows\SysWOW64\FGGKTR.exeC:\windows\system32\FGGKTR.exe3⤵PID:3000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 9964⤵PID:4336
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OGIX.exe.bat" "4⤵PID:5008
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ARZ.exe.bat" "2⤵PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4376 -ip 43761⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 1184 -ip 11841⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 336 -ip 3361⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 4196 -ip 41961⤵PID:3520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2412 -ip 24121⤵PID:4372
-
C:\windows\system\YRVV.exeC:\windows\system\YRVV.exe2⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 12683⤵PID:4328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SEZMCL.exe.bat" "3⤵PID:5116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 2348 -ip 23481⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 3000 -ip 30001⤵PID:224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 336 -ip 3361⤵PID:760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4408 -ip 44081⤵PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 4908 -ip 49081⤵PID:1392
-
C:\windows\TVY.exeC:\windows\TVY.exe1⤵PID:4420
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HBD.exe.bat" "2⤵PID:2680
-
C:\windows\HBD.exeC:\windows\HBD.exe3⤵PID:4916
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KON.exe.bat" "4⤵PID:3116
-
C:\windows\SysWOW64\KON.exeC:\windows\system32\KON.exe5⤵PID:3172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 10006⤵PID:1392
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BOPBEQE.exe.bat" "6⤵PID:5104
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 13324⤵PID:4788
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 9602⤵PID:2820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 5060 -ip 50601⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 4420 -ip 44201⤵PID:4376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 648 -p 4916 -ip 49161⤵PID:3328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 3172 -ip 31721⤵PID:3992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4320 -ip 43201⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 3424 -ip 34241⤵PID:2708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 5004 -ip 50041⤵PID:3780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3116 -ip 31161⤵PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 336 -ip 3361⤵PID:4956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p -s WaaSMedicSvc1⤵PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1184 -ip 11841⤵PID:4336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3892 -ip 38921⤵PID:4260
-
C:\windows\system\PPRQ.exeC:\windows\system\PPRQ.exe1⤵PID:4588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PVREM.exe.bat" "2⤵PID:1588
-
C:\windows\PVREM.exeC:\windows\PVREM.exe3⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 9604⤵PID:212
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FKQPY.exe.bat" "4⤵PID:4188
-
-
-
C:\windows\system\GLA.exeC:\windows\system\GLA.exe3⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 9964⤵PID:2928
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\IOC.exe.bat" "4⤵PID:1328
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 13242⤵PID:3184
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 4588 -ip 45881⤵PID:2820
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 4728 -ip 47281⤵PID:2256
-
C:\windows\system\FKQPY.exeC:\windows\system\FKQPY.exe1⤵PID:3792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3792 -s 9882⤵PID:2680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GNU.exe.bat" "2⤵PID:2612
-
C:\windows\system\DCLKOS.exeC:\windows\system\DCLKOS.exe3⤵PID:1880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 9764⤵PID:680
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LHLZ.exe.bat" "4⤵PID:652
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3792 -ip 37921⤵PID:1268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 1660 -ip 16601⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3804 -ip 38041⤵PID:2608
-
C:\windows\GBGIWNK.exeC:\windows\GBGIWNK.exe1⤵PID:404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BWLZ.exe.bat" "2⤵PID:232
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2592
-
-
C:\windows\system\BWLZ.exeC:\windows\system\BWLZ.exe3⤵PID:3316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 9604⤵PID:2824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\URPVMD.exe.bat" "4⤵PID:544
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 9602⤵PID:4188
-
-
C:\windows\SysWOW64\QTYLKGV.exeC:\windows\system32\QTYLKGV.exe2⤵PID:3468
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QMHM.exe.bat" "3⤵PID:568
-
C:\windows\system\QMHM.exeC:\windows\system\QMHM.exe4⤵PID:3764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 9605⤵PID:1604
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DOD.exe.bat" "5⤵PID:1980
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 13443⤵PID:3800
-
-
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 640 -p 404 -ip 4041⤵PID:116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3316 -ip 33161⤵PID:224
-
C:\windows\system\URPVMD.exeC:\windows\system\URPVMD.exe1⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 9602⤵PID:4848
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CFPKNID.exe.bat" "2⤵PID:4256
-
-
C:\windows\CFPKNID.exeC:\windows\CFPKNID.exe1⤵PID:1120
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 9602⤵PID:3468
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QDVH.exe.bat" "2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 4388 -ip 43881⤵PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 1120 -ip 11201⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2608 -ip 26081⤵PID:2544
-
C:\windows\RGZCI.exeC:\windows\RGZCI.exe1⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 10042⤵PID:1224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ITJ.exe.bat" "2⤵PID:3380
-
-
C:\windows\ITJ.exeC:\windows\ITJ.exe1⤵PID:4648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 10082⤵PID:3116
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WQH.exe.bat" "2⤵PID:3996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 1680 -ip 16801⤵PID:1188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 4648 -ip 46481⤵PID:3800
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV12⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1664
-
-
C:\windows\SysWOW64\KVLRR.exeC:\windows\system32\KVLRR.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YBQOYR.exe.bat" "3⤵PID:2668
-
C:\windows\YBQOYR.exeC:\windows\YBQOYR.exe4⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BOV.exe.bat" "5⤵PID:5116
-
C:\windows\BOV.exeC:\windows\BOV.exe6⤵PID:4380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 9887⤵PID:368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MHYQ.exe.bat" "7⤵PID:5000
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 9605⤵PID:1680
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 12643⤵PID:2824
-
-
-
C:\windows\WQH.exeC:\windows\WQH.exe1⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 10082⤵PID:3136
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DMGSKR.exe.bat" "2⤵PID:2668
-
C:\windows\DMGSKR.exeC:\windows\DMGSKR.exe3⤵PID:3808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GCN.exe.bat" "4⤵PID:2712
-
C:\windows\SysWOW64\GCN.exeC:\windows\system32\GCN.exe5⤵PID:2688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FNYIWPE.exe.bat" "6⤵PID:4804
-
C:\windows\SysWOW64\FNYIWPE.exeC:\windows\system32\FNYIWPE.exe7⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 12768⤵PID:4280
-
C:\windows\SysWOW64\DLMZQG.exeC:\windows\system32\DLMZQG.exe9⤵PID:4240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CWLXPA.exe.bat" "10⤵PID:4376
-
C:\windows\SysWOW64\CWLXPA.exeC:\windows\system32\CWLXPA.exe11⤵PID:3048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HWSL.exe.bat" "12⤵PID:416
-
C:\windows\system\HWSL.exeC:\windows\system\HWSL.exe13⤵PID:788
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EWU.exe.bat" "14⤵PID:2244
-
C:\windows\EWU.exeC:\windows\EWU.exe15⤵PID:1520
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KXCBT.exe.bat" "16⤵PID:224
-
C:\windows\SysWOW64\KXCBT.exeC:\windows\system32\KXCBT.exe17⤵PID:4948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 124818⤵PID:3808
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FKHKDBD.exe.bat" "18⤵PID:1372
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 126816⤵PID:1428
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 788 -s 124414⤵PID:1880
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 98012⤵PID:1680
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 96010⤵PID:4916
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LIJJKMN.exe.bat" "8⤵PID:3080
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 10006⤵PID:4588
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3808 -s 13044⤵PID:384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4832 -ip 48321⤵PID:1636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 3808 -ip 38081⤵PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 2688 -ip 26881⤵PID:2544
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3804 -ip 38041⤵PID:1168
-
C:\windows\RIRX.exeC:\windows\RIRX.exe1⤵PID:2812
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CBMQC.exe.bat" "2⤵PID:2396
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2280
-
-
C:\windows\SysWOW64\CBMQC.exeC:\windows\system32\CBMQC.exe3⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 9604⤵PID:4360
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GJS.exe.bat" "4⤵PID:1844
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 9882⤵PID:3520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 624 -p 3344 -ip 33441⤵PID:336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2812 -ip 28121⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 4388 -ip 43881⤵PID:568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 1120 -ip 11201⤵PID:3552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 2924 -ip 29241⤵PID:2304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 2820 -ip 28201⤵PID:3376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1880 -ip 18801⤵PID:416
-
C:\windows\LHLZ.exeC:\windows\LHLZ.exe1⤵PID:1348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 13322⤵PID:5036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RSH.exe.bat" "2⤵PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 1348 -ip 13481⤵PID:636
-
C:\windows\RSH.exeC:\windows\RSH.exe1⤵PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4388 -s 9882⤵PID:4292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YDQ.exe.bat" "2⤵PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 4388 -ip 43881⤵PID:2764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 232 -ip 2321⤵PID:3764
-
C:\windows\SysWOW64\JXGJWKU.exeC:\windows\system32\JXGJWKU.exe2⤵PID:1604
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NFBRZ.exe.bat" "3⤵PID:416
-
C:\windows\system\NFBRZ.exeC:\windows\system\NFBRZ.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PDGLO.exe.bat" "5⤵PID:2680
-
C:\windows\PDGLO.exeC:\windows\PDGLO.exe6⤵PID:384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VDOZXUZ.exe.bat" "7⤵PID:2868
-
C:\windows\SysWOW64\VDOZXUZ.exeC:\windows\system32\VDOZXUZ.exe8⤵PID:2252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZTIHAS.exe.bat" "9⤵PID:3292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 13329⤵PID:4724
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 9767⤵PID:4596
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 10085⤵PID:3124
-
-
-
C:\windows\QPIZX.exeC:\windows\QPIZX.exe4⤵PID:3800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 9605⤵PID:3132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DAMGCC.exe.bat" "5⤵PID:4380
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 10043⤵PID:3156
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1424 -ip 14241⤵PID:416
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:680
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵PID:3640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 2252 -ip 22521⤵PID:1328
-
C:\windows\system\IOC.exeC:\windows\system\IOC.exe2⤵PID:1960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VRGF.exe.bat" "3⤵PID:388
-
C:\windows\VRGF.exeC:\windows\VRGF.exe4⤵PID:1680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XOZZJ.exe.bat" "5⤵PID:368
-
C:\windows\system\XOZZJ.exeC:\windows\system\XOZZJ.exe6⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 13447⤵PID:2820
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GCJRZH.exe.bat" "7⤵PID:4436
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 9605⤵PID:4912
-
C:\windows\system\IXPXW.exeC:\windows\system\IXPXW.exe6⤵PID:3208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ECVMD.exe.bat" "7⤵PID:1960
-
C:\windows\SysWOW64\ECVMD.exeC:\windows\system32\ECVMD.exe8⤵PID:1284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MNVNRJQ.exe.bat" "9⤵PID:3616
-
C:\windows\system\MNVNRJQ.exeC:\windows\system\MNVNRJQ.exe10⤵PID:5116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DYULRDL.exe.bat" "11⤵PID:4604
-
C:\windows\DYULRDL.exeC:\windows\DYULRDL.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 134013⤵PID:3000
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TOTOCXT.exe.bat" "13⤵PID:640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 132411⤵PID:4380
-
C:\windows\system\DAMGCC.exeC:\windows\system\DAMGCC.exe12⤵PID:1084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1084 -s 96013⤵PID:4004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DLMZQG.exe.bat" "13⤵PID:4280
-
-
-
-
C:\windows\SysWOW64\VMOIPUZ.exeC:\windows\system32\VMOIPUZ.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LPYUA.exe.bat" "12⤵PID:2896
-
C:\windows\system\LPYUA.exeC:\windows\system\LPYUA.exe13⤵PID:3532
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UAWBI.exe.bat" "14⤵PID:4088
-
C:\windows\UAWBI.exeC:\windows\UAWBI.exe15⤵PID:2292
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FSRTQM.exe.bat" "16⤵PID:4280
-
C:\windows\SysWOW64\FSRTQM.exeC:\windows\system32\FSRTQM.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LSZHZG.exe.bat" "18⤵PID:5008
-
C:\windows\LSZHZG.exeC:\windows\LSZHZG.exe19⤵PID:2248
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HYE.exe.bat" "20⤵PID:3760
-
C:\windows\HYE.exeC:\windows\HYE.exe21⤵PID:1424
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\EEKBV.exe.bat" "22⤵PID:3372
-
C:\windows\system\EEKBV.exeC:\windows\system\EEKBV.exe23⤵PID:1280
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TUYLD.exe.bat" "24⤵PID:3912
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV125⤵PID:4560
-
-
C:\windows\system\TUYLD.exeC:\windows\system\TUYLD.exe25⤵PID:1960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KEOJD.exe.bat" "26⤵PID:4160
-
C:\windows\system\KEOJD.exeC:\windows\system\KEOJD.exe27⤵PID:4772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JUHM.exe.bat" "28⤵PID:3424
-
C:\windows\SysWOW64\JUHM.exeC:\windows\system32\JUHM.exe29⤵PID:2928
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HNYB.exe.bat" "30⤵PID:384
-
C:\windows\HNYB.exeC:\windows\HNYB.exe31⤵PID:2412
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WIHOIOH.exe.bat" "32⤵PID:3888
-
C:\windows\WIHOIOH.exeC:\windows\WIHOIOH.exe33⤵PID:4584
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LGN.exe.bat" "34⤵PID:2672
-
C:\windows\SysWOW64\LGN.exeC:\windows\system32\LGN.exe35⤵PID:4896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TTNR.exe.bat" "36⤵PID:3156
-
C:\windows\SysWOW64\TTNR.exeC:\windows\system32\TTNR.exe37⤵PID:4376
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BZSY.exe.bat" "38⤵PID:4956
-
C:\windows\BZSY.exeC:\windows\BZSY.exe39⤵PID:3268
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZZZM.exe.bat" "40⤵PID:1680
-
C:\windows\SysWOW64\ZZZM.exeC:\windows\system32\ZZZM.exe41⤵PID:3976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VFFJZN.exe.bat" "42⤵PID:4708
-
C:\windows\SysWOW64\VFFJZN.exeC:\windows\system32\VFFJZN.exe43⤵PID:2896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WIJNFDM.exe.bat" "44⤵PID:4472
-
C:\windows\SysWOW64\WIJNFDM.exeC:\windows\system32\WIJNFDM.exe45⤵PID:3892
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DYKEMY.exe.bat" "46⤵PID:1424
-
C:\windows\system\DYKEMY.exeC:\windows\system\DYKEMY.exe47⤵PID:3512
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AVQ.exe.bat" "48⤵PID:4672
-
C:\windows\system\AVQ.exeC:\windows\system\AVQ.exe49⤵PID:844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 100048⤵PID:640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 96046⤵PID:5000
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 124844⤵PID:2752
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 91642⤵PID:4652
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3268 -s 100840⤵PID:1588
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 133238⤵PID:3736
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 130436⤵PID:4672
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4584 -s 96034⤵PID:60
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 87232⤵PID:1500
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 96030⤵PID:3764
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 131628⤵PID:2980
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 96026⤵PID:1428
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 127624⤵PID:1164
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 88822⤵PID:4388
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 96820⤵PID:388
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 97618⤵PID:2928
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 121616⤵PID:1520
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 134814⤵PID:224
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3684 -s 134412⤵PID:4880
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 10009⤵PID:3644
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 13367⤵PID:4948
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 10043⤵PID:1284
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4380 -ip 43801⤵PID:3708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1248 -ip 12481⤵PID:3208
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1284 -ip 12841⤵PID:384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2612 -ip 26121⤵PID:4240
-
C:\windows\BAWT.exeC:\windows\BAWT.exe1⤵PID:2412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 9762⤵PID:3804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GLA.exe.bat" "2⤵PID:1588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2412 -ip 24121⤵PID:1384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 4412 -ip 44121⤵PID:788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 1960 -ip 19601⤵PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 1680 -ip 16801⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 652 -ip 6521⤵PID:1700
-
C:\windows\YIUCAZJ.exeC:\windows\YIUCAZJ.exe2⤵PID:4288
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AGN.exe.bat" "3⤵PID:3996
-
C:\windows\system\AGN.exeC:\windows\system\AGN.exe4⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 12685⤵PID:1872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FJRD.exe.bat" "5⤵PID:3124
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4288 -s 9603⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3468 -ip 34681⤵PID:3996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2404 -ip 24041⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 4948 -ip 49481⤵PID:2792
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3748 -ip 37481⤵PID:1188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 4288 -ip 42881⤵PID:956
-
C:\windows\FJRD.exeC:\windows\FJRD.exe1⤵PID:3844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3844 -s 9882⤵PID:456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QGDJY.exe.bat" "2⤵PID:544
-
C:\windows\system\QJK.exeC:\windows\system\QJK.exe3⤵PID:3828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 12724⤵PID:388
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VMOIPUZ.exe.bat" "4⤵PID:5116
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 4412 -ip 44121⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 3844 -ip 38441⤵PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2080 -ip 20801⤵PID:1520
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 5116 -ip 51161⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2752 -ip 27521⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1604 -ip 16041⤵PID:1520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3520 -ip 35201⤵PID:3080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 384 -ip 3841⤵PID:1348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2252 -ip 22521⤵PID:1280
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4740
-
C:\windows\system\NROEH.exeC:\windows\system\NROEH.exe1⤵PID:2256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RHIMKB.exe.bat" "2⤵PID:2612
-
C:\windows\RHIMKB.exeC:\windows\RHIMKB.exe3⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 9604⤵PID:956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\IXPXW.exe.bat" "4⤵PID:4912
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 12762⤵PID:2668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4848 -ip 48481⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2256 -ip 22561⤵PID:4832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1128 -ip 11281⤵PID:4916
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 3208 -ip 32081⤵PID:2276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 1284 -ip 12841⤵PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 5116 -ip 51161⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2304
-
C:\windows\system\TOTOCXT.exeC:\windows\system\TOTOCXT.exe1⤵PID:2980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 13322⤵PID:788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QTYLKGV.exe.bat" "2⤵PID:404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 4336 -ip 43361⤵PID:1508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 2980 -ip 29801⤵PID:2868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3468 -ip 34681⤵PID:3344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 3764 -ip 37641⤵PID:4584
-
C:\windows\system\DOD.exeC:\windows\system\DOD.exe1⤵PID:1240
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VSU.exe.bat" "2⤵PID:956
-
C:\windows\system\VSU.exeC:\windows\system\VSU.exe3⤵PID:1128
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BSCCQ.exe.bat" "4⤵PID:4376
-
C:\windows\SysWOW64\BSCCQ.exeC:\windows\system32\BSCCQ.exe5⤵PID:788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 788 -s 10086⤵PID:1328
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QPIZX.exe.bat" "6⤵PID:416
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1128 -s 9604⤵PID:4292
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 9602⤵PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1240 -ip 12401⤵PID:1876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1128 -ip 11281⤵PID:1856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 788 -ip 7881⤵PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3800 -ip 38001⤵PID:3692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 1084 -ip 10841⤵PID:3424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4240 -ip 42401⤵PID:3076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 3048 -ip 30481⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 788 -ip 7881⤵PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1520 -ip 15201⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 728 -p 4948 -ip 49481⤵PID:2924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 1128 -ip 11281⤵PID:3968
-
C:\windows\EDPMJFR.exeC:\windows\EDPMJFR.exe1⤵PID:2904
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XYHPO.exe.bat" "2⤵PID:1508
-
C:\windows\XYHPO.exeC:\windows\XYHPO.exe3⤵PID:4696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4696 -s 9604⤵PID:3292
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KJDWTA.exe.bat" "4⤵PID:3892
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 13042⤵PID:4228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 2904 -ip 29041⤵PID:552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4696 -ip 46961⤵PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 2928 -ip 29281⤵PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 3828 -ip 38281⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3684 -ip 36841⤵PID:1868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3532 -ip 35321⤵PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2292 -ip 22921⤵PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2620 -ip 26201⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2248 -ip 22481⤵PID:3124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1424 -ip 14241⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1280 -ip 12801⤵PID:1660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1960 -ip 19601⤵PID:2688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4772 -ip 47721⤵PID:1932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 2928 -ip 29281⤵PID:3048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 2412 -ip 24121⤵PID:4260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4584 -ip 45841⤵PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 684 -p 4896 -ip 48961⤵PID:568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 672 -p 4376 -ip 43761⤵PID:3780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 3268 -ip 32681⤵PID:4588
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 3976 -ip 39761⤵PID:2928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2896 -ip 28961⤵PID:1636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 3892 -ip 38921⤵PID:2272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3512 -ip 35121⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD56e59409a1a04ae246ff20dca42745f14
SHA1484f308ca26a649518fc40618127d069ccc802af
SHA256d3a34d8d7fb096c779789c834335095975e97aac46edd5c0c9e808d66ab0810a
SHA512048a34046b87f85c4c911c7f609cb12df2f1342454589b8a1ab9790ce9f26a5e812bd07a9b80c6e94d8b29458575f3f89fdbfc11cda2f3920d0a73daf80be9f8
-
Filesize
208KB
MD5fe739f0a100458db686e095bb051d43a
SHA13f57d52f8f3cbef0bd5a32acb16c5ee85d255303
SHA256d702dfa9efdf3595de03a1a3a16b6ed16365307f35fae5f52e78f919f0bfa81c
SHA5121911b9c62f1cda04ce402ac65e01faae105e91ffa2a4cecf0afaace49640c21b267167a516ae437baa6eabc51bc2196ddb0fb2b89c4a5a476a69e56ef43648b2
-
Filesize
208KB
MD52b74e3fd6287b760492b269cad63cbad
SHA179c29b32f0b84d64b8ca25d4f6d8a47e8433d984
SHA256f5a9da3f1911a16723f66fccd00c90afe9b872e4b43bbfdc076088df9d1d2177
SHA51289cd34afd05c32352df5c844a0951cde96cfae33de77c7770ca0c2996de894ff4c0e9d2b5484b28ea3bb616ceb04e626d34ac96f89afbb207357c62f454f0926
-
Filesize
208KB
MD550923cc89cd471c96795fcf1536baaa7
SHA147ee4e8f21f37a469e1ba2b448c1da9e2d47db23
SHA256b718f6e71428ea3b4f4f168cf491bc086569eb3eeda103d60f28357aea944f3e
SHA512ef49098609a9793768289e2463434e537651202ef78458135b1b5905cce8e69a7ae6ed75f09cdfd1ea433124fd718c3189192d0c1e2fb7f5b8dff2347d7d58b9
-
Filesize
208KB
MD59834fcd5ca0c5ef89084295817fcd949
SHA1ee5c90ec6c2938c50cbbb6a70d405ecd16057c55
SHA256546ff3238d88f019be17e21a360261609e2ee45064d062994e55cde186452ed2
SHA512b3623f8ff2f1584c5da63c1b4615d871654262f2f84a09b9352004274a41e1317717e5bbbf256345bfb1d81664bfda01e2357edaf4132c5a6a73d7785ec37838
-
Filesize
208KB
MD5344e3b8556c4aaa32ef6049d56c6b1e4
SHA16d9526110c1c5fbc9594acba34cf0a6a83f554f2
SHA2563cc560122e6524e71d1ab0f48d06396fe6b1fc86ed9d06f630f0cbaa9eee2f6e
SHA512adfe7687e19fcbeebafc1d02f1ee85227d344ddc763a5ba4fb0d2ae7a1815aff1b3172fabb521be4eda2f712180bd4fec8713047666316b908b6ea5ba60741ce
-
Filesize
208KB
MD5c8d5058fa4671735e22a717db899cdc8
SHA179d7b190efcf268773e62331a0778eea8529a273
SHA25660edc28dc41841c21b1ffc0382da91dd98254590d60cbb43ad6353706e8d76fb
SHA512cda5ebbf458920e60082bdf745c597ead48219e1b9efa8ef8e82a56259406f9ef6aae5d1e9a066dc4b30cd692a59dfa30bbe8f3b50de7ca5aca45aa40869e264
-
Filesize
208KB
MD5a4912bc4d2a80c30318069c4900ac8f7
SHA175d082520959aa541664a9858ce01fa80a0c38b0
SHA2563afe17a1fbae6b99faedde1f039f7a34d32bdcc8a279cb62018caff265b7b98c
SHA51217a9cc59938f4c82cdd2c002de03a87edc5345482f0c494e68460bcdd5bdf9351fccca535293da97741c5a3e852609d6a52e3a789313a772993eb062a689f159
-
Filesize
208KB
MD5c8d5058fa4671735e22a717db899cdc8
SHA179d7b190efcf268773e62331a0778eea8529a273
SHA25660edc28dc41841c21b1ffc0382da91dd98254590d60cbb43ad6353706e8d76fb
SHA512cda5ebbf458920e60082bdf745c597ead48219e1b9efa8ef8e82a56259406f9ef6aae5d1e9a066dc4b30cd692a59dfa30bbe8f3b50de7ca5aca45aa40869e264
-
Filesize
208KB
MD550923cc89cd471c96795fcf1536baaa7
SHA147ee4e8f21f37a469e1ba2b448c1da9e2d47db23
SHA256b718f6e71428ea3b4f4f168cf491bc086569eb3eeda103d60f28357aea944f3e
SHA512ef49098609a9793768289e2463434e537651202ef78458135b1b5905cce8e69a7ae6ed75f09cdfd1ea433124fd718c3189192d0c1e2fb7f5b8dff2347d7d58b9
-
Filesize
208KB
MD5619a37fb3489a4478d9b0ede7fe55165
SHA1fbc3e2f37387a6c303ba5807d70b81c7cbb8deda
SHA256e7afbc3116357cf82604755aed9c4d8bd3213444395d82de6f31f397bb8c60d0
SHA5125849bd0912bf197a2a75a270b597fb02eb9a9e0ed5a1133dc3600f7320c6a989986ef33a2813c1f8e609fa0db8eba6a2105b95317867e50b5074f4af466d750c
-
Filesize
208KB
MD58217ecf787d28ae24fcb4ee8024e81be
SHA15febcaf607d90c678025a2efc01b50c8cb2925bf
SHA256ff9d7d5031a0e976fb5368dc1f882dee801ba1df0aa3d20655c165c85233b760
SHA5127df1637cfd6b371b0f19937237ab995df545a32d3ce53064aadb94eb35712f9ec3b35c5f25e3c60be760fa9f52312c6096b2657327e0d7fc89f1901135f6e041
-
Filesize
208KB
MD561292c4ade46810101e0f1e896372617
SHA1f7d25d36d407d2d240d14513969f81758a2e6af1
SHA2565c1686939a6641cf6505a412e34a6d3ff8c74a11dc5459d4ae0f8c95507ca81e
SHA512427d03c1848db4fc145d296682da5e582928a003668b2978bca8a923db47f7bd05b9e7c55dd2c5bdb7001fe716b75b06847611f2b0feb29fa23748ec62704841
-
Filesize
208KB
MD561292c4ade46810101e0f1e896372617
SHA1f7d25d36d407d2d240d14513969f81758a2e6af1
SHA2565c1686939a6641cf6505a412e34a6d3ff8c74a11dc5459d4ae0f8c95507ca81e
SHA512427d03c1848db4fc145d296682da5e582928a003668b2978bca8a923db47f7bd05b9e7c55dd2c5bdb7001fe716b75b06847611f2b0feb29fa23748ec62704841
-
Filesize
208KB
MD5db80a10627cda6dd678a9a05bed73318
SHA198501cba2f1dd767a82e0a08da47cea4a0ac1d36
SHA2569e96abb2ddcb0e7506b9ad3b55a2deabdff3f815aa349b5684d86bddd648ea48
SHA5122b40df8d1fd1ecb535c43b93e473825e8d35f35a0b2587b656b7bfd192caa2797367cd7cab52fd2929765305d28446bd174f1da90325721b332fcfc92b7c2b82
-
Filesize
208KB
MD5e81c9884f1b5049b2bebb500ed64cabf
SHA121ede7a602a885736e6d9bbd1090754a2f19c7cf
SHA2567a5ddba5cdfd49eb886dbcb7b369680cab7df32e436eb2e78d89369d50fa76b1
SHA5122053d64adb94ab87880c7cd6e1a6944660de372e1ec539f1d090fa95f92bd50174332cfccdacc350b48e991ad2c037e22500f22aa57c7485f712355ac4286083
-
Filesize
208KB
MD54befb9a8540a63eb20227fb6147d015a
SHA1b4550aae6f50202fb37022104add4442d17b77b1
SHA2569a1e48929864562466305619268d5dcf80e996561bdd3597b09a3b9098939f16
SHA5127693dbbb784e5805145307205e13d6afd9680a49b10c4aa45cda9a1848111cadaee54113873f64f9519ecc145bfe127711d55cfa6e5a76b7c9568d62da5cb9ea
-
Filesize
208KB
MD541f3290ef1a30f40537602310dd3ae13
SHA12b88f5d9da93d651d8db1d6f94fdcac71343508c
SHA256cbbe1c503153fd7e83288f032b0c3f4dd9f8882ae01b4551a17f76a939b8407c
SHA512776b1718315be63d51de7cabea5b823986d969616b1e6f111a66221cacd777a68ff672fa6adbbd8b4f8647eaa066ddad551b13a56b2007d1bcde374073770054
-
Filesize
208KB
MD59b74d4103f9dd4c11cbdbd50928198cc
SHA10b154d6933012c3f55456b986fe247b67be44481
SHA25693987c13686eccb4f525e9761fbdca1dff30e6fb17bce6b3d8984e877022225a
SHA5127edd9ffaa82e37f46e013dd61692e7ef26d55632a670ca90b651d0688aee3062ff833daa0cb556f917b696bdf1e724020fd383214de3e9b712a32a16c8188667
-
Filesize
208KB
MD57d3f009a36c7813aa64ae0260a1202fa
SHA1c3efca2b41e85352aff85abbbc0106d8b76666b0
SHA256b56987dcc38ca83968591a55fbd0ce306728af99423000fa9ef09c0ae289e4b4
SHA512aba5481822252d8de227c77a0e14488ae04dd82c7a2acca3ca829ea5fb952ee710b6ed1f0307e7d538836e04e9dafb77bed6faeb26858faaefb72ebcf2065995
-
Filesize
208KB
MD5473ee58c9c8901225121762e5d40e745
SHA135677650ab2713f5033202b6fbfe0a80b56a2b40
SHA25673b0fbaf19c29f518ed3f23a9c7028c2ff2fe4c5164e3374dc970bce4ade4f22
SHA51267b5ed9ff56d1df13c6b9090ab8bb0340de18445337e623a79668bff4c824be4a1e1fe77ceaadd4fc2c2dea2b10fb62ad95ce769f6b5db944d8a49f0383b7e33
-
Filesize
208KB
MD5473ee58c9c8901225121762e5d40e745
SHA135677650ab2713f5033202b6fbfe0a80b56a2b40
SHA25673b0fbaf19c29f518ed3f23a9c7028c2ff2fe4c5164e3374dc970bce4ade4f22
SHA51267b5ed9ff56d1df13c6b9090ab8bb0340de18445337e623a79668bff4c824be4a1e1fe77ceaadd4fc2c2dea2b10fb62ad95ce769f6b5db944d8a49f0383b7e33
-
Filesize
208KB
MD56e59409a1a04ae246ff20dca42745f14
SHA1484f308ca26a649518fc40618127d069ccc802af
SHA256d3a34d8d7fb096c779789c834335095975e97aac46edd5c0c9e808d66ab0810a
SHA512048a34046b87f85c4c911c7f609cb12df2f1342454589b8a1ab9790ce9f26a5e812bd07a9b80c6e94d8b29458575f3f89fdbfc11cda2f3920d0a73daf80be9f8
-
Filesize
52B
MD5fa6eb10d01f3bc90fcdc9ecb1a81d648
SHA1fb36aa8b9ea0ee323b2fba51f5decf2e5ec1fe47
SHA256532473fdb569418adf9a7499fd024f03100bea5a323a44bfd66afd838eb3ea8f
SHA512ade435a4d63a42ca1a03254e4f23d1f14545d760ab74208d4625de82be4d251fbb05c88fb785323fe6af4f4c832038926914c771b0d58b178734ecc3c9055e80
-
Filesize
208KB
MD5fe739f0a100458db686e095bb051d43a
SHA13f57d52f8f3cbef0bd5a32acb16c5ee85d255303
SHA256d702dfa9efdf3595de03a1a3a16b6ed16365307f35fae5f52e78f919f0bfa81c
SHA5121911b9c62f1cda04ce402ac65e01faae105e91ffa2a4cecf0afaace49640c21b267167a516ae437baa6eabc51bc2196ddb0fb2b89c4a5a476a69e56ef43648b2
-
Filesize
52B
MD5a208fe332e5c4a05983e252af4909b9b
SHA171a3333d7bcd6556d234d9d68ef0f774ac0008ea
SHA25633ecf536d1a3cae4981ff0655bd36abd1b706065ad9bb1cc6e5b1c2240a35d69
SHA51216fcfba8af1029b4639f43ad91402b7b1398e30056c90698b6c00aa4ba815ac9f1e9f3aff6092005994c178f1d4fa95058a5281411c9d9a973a7db115b556498
-
Filesize
208KB
MD52b74e3fd6287b760492b269cad63cbad
SHA179c29b32f0b84d64b8ca25d4f6d8a47e8433d984
SHA256f5a9da3f1911a16723f66fccd00c90afe9b872e4b43bbfdc076088df9d1d2177
SHA51289cd34afd05c32352df5c844a0951cde96cfae33de77c7770ca0c2996de894ff4c0e9d2b5484b28ea3bb616ceb04e626d34ac96f89afbb207357c62f454f0926
-
Filesize
54B
MD51eea184bcf1dfd88b0ae3e5fd622e167
SHA14c00924f6cc1af82a70c533fa231a1c3a2039bfb
SHA25645bea1ecc409fbf38c6bb0657b2b0d897abfc11c6da69a73b7dd108069ac0662
SHA5124f2292bd6c1c5355e91fdbd95680ae1db9842ac32026aaabd3792d8e4e42a3b41daac31c7ba068013f3d3658e2ecce6a7cf7cc2154bffe2f2d5dff9c1dacdd4d
-
Filesize
208KB
MD550923cc89cd471c96795fcf1536baaa7
SHA147ee4e8f21f37a469e1ba2b448c1da9e2d47db23
SHA256b718f6e71428ea3b4f4f168cf491bc086569eb3eeda103d60f28357aea944f3e
SHA512ef49098609a9793768289e2463434e537651202ef78458135b1b5905cce8e69a7ae6ed75f09cdfd1ea433124fd718c3189192d0c1e2fb7f5b8dff2347d7d58b9
-
Filesize
52B
MD52c1f87dbdc61b9319d5a4deea2932ba4
SHA12ac9a2f0d7ac34b953a65d9572264346cdba0cf9
SHA2569d2467af537cf77a63aba1f7fe656c8715d407eeca789f2bfdc187221349847a
SHA512c65293958977a7774fec1ecbebba8d844bde25fd0ae842a9193c50ad00aab8b6765820f7c9b518dc5f257a0e8d726e62b1b4b35143024f391c49ad1644a77f1f
-
Filesize
208KB
MD59834fcd5ca0c5ef89084295817fcd949
SHA1ee5c90ec6c2938c50cbbb6a70d405ecd16057c55
SHA256546ff3238d88f019be17e21a360261609e2ee45064d062994e55cde186452ed2
SHA512b3623f8ff2f1584c5da63c1b4615d871654262f2f84a09b9352004274a41e1317717e5bbbf256345bfb1d81664bfda01e2357edaf4132c5a6a73d7785ec37838
-
Filesize
52B
MD5ebf9a4c64343f4dc71094493776d133d
SHA19f3c90e53930926eae64de30d422f962247b526e
SHA25697d4e7f331c3e2846e099659e898829c22fd5c288d6a7236658c506217aa3a74
SHA512fdaed665d7116c42072ab99924a72d31e8cc9e27a667793ea5e4227b729ff77e6a2f31fa84a632b9ec0e9591cfb809c11718102446f7d31313c584273f083345
-
Filesize
58B
MD529517c7082e2a27f19f235a3a3b52486
SHA190951788fa627d66df4f1d386b1afd08c2cfccca
SHA256de85d2e172b886d66df816e8b74185938bc5e1b2971f3a337cf6c9ef0f886580
SHA51255751aff7cc934c3cf3ea7236d99120f553de6a14de8195f0f216c0607ad4fbe0f4f9f5b44a9981a2f6e7838c60fa6ca98a70c0a95a46250efebbe3075b0ac3f
-
Filesize
208KB
MD5344e3b8556c4aaa32ef6049d56c6b1e4
SHA16d9526110c1c5fbc9594acba34cf0a6a83f554f2
SHA2563cc560122e6524e71d1ab0f48d06396fe6b1fc86ed9d06f630f0cbaa9eee2f6e
SHA512adfe7687e19fcbeebafc1d02f1ee85227d344ddc763a5ba4fb0d2ae7a1815aff1b3172fabb521be4eda2f712180bd4fec8713047666316b908b6ea5ba60741ce
-
Filesize
54B
MD5c39ec70d0914fe6e75b13e875c0e8c36
SHA15a68b24ee5ceefabe7515ab8db6730c596f0e804
SHA256bb0d338b4dd3586c0e376546ae26922c0abfc31708d775390d33a2808af2a108
SHA5122b7ea48f064d4c67866d06c825afd100c5a04ba960e8ea2335a428192cd7339db7279f68348fd06fa91b541236aa3748173c3463614ab06c17cf03fdb125bd47
-
Filesize
208KB
MD5c8d5058fa4671735e22a717db899cdc8
SHA179d7b190efcf268773e62331a0778eea8529a273
SHA25660edc28dc41841c21b1ffc0382da91dd98254590d60cbb43ad6353706e8d76fb
SHA512cda5ebbf458920e60082bdf745c597ead48219e1b9efa8ef8e82a56259406f9ef6aae5d1e9a066dc4b30cd692a59dfa30bbe8f3b50de7ca5aca45aa40869e264
-
Filesize
52B
MD5b3fa691043bab6276cb90d17707267c8
SHA10add66024e40ad3b97f155fce697dd3a93c20871
SHA256e11d5aa465d862dc48c5e90b709bc226bc9b51fb1ef0396df7c9018fe3db6b98
SHA5128df9a752c5345b9429b072a18d18c777f72952bd138f7ce991157c83a798ca4654372cae00b54405505eba764365689d1a1264203e17496e272f2708ce3b62dc
-
Filesize
208KB
MD5a4912bc4d2a80c30318069c4900ac8f7
SHA175d082520959aa541664a9858ce01fa80a0c38b0
SHA2563afe17a1fbae6b99faedde1f039f7a34d32bdcc8a279cb62018caff265b7b98c
SHA51217a9cc59938f4c82cdd2c002de03a87edc5345482f0c494e68460bcdd5bdf9351fccca535293da97741c5a3e852609d6a52e3a789313a772993eb062a689f159
-
Filesize
72B
MD54cd616b0c8e886912588eed65fe17c3c
SHA1b813c3b75d31650b826b1f6fddfe41745835e09b
SHA2565cfa182f7f6cccee6574628e09999e2dc777d72d422252f1199a953506166c15
SHA512e6b81d86f3ce236c9d4fb2f35640c63f0ae8dddf9b362d9982f86e63c1799b69723195a25166c601fbe71de1e5d323c8d31cbcdaa818e5014e5a7a64a5deca16
-
Filesize
208KB
MD5c8d5058fa4671735e22a717db899cdc8
SHA179d7b190efcf268773e62331a0778eea8529a273
SHA25660edc28dc41841c21b1ffc0382da91dd98254590d60cbb43ad6353706e8d76fb
SHA512cda5ebbf458920e60082bdf745c597ead48219e1b9efa8ef8e82a56259406f9ef6aae5d1e9a066dc4b30cd692a59dfa30bbe8f3b50de7ca5aca45aa40869e264
-
Filesize
72B
MD5da91b010c58d1da9982b999cbc431ae8
SHA17cc8fd5c8f10221f03bd5b43ac324ff2f1915a51
SHA256fc2defc3eb8790adc86fb464d6037d379b283f42d5aff9581725fa31e075713f
SHA512cfd69dbe75c5ef78efc2fc1263d6caa0d2dfa7c20b169dc55e0de5260e7333b60dac8eb95751c977d94e8744193fc7571355442601135d0549617c8e70cbaee4
-
Filesize
208KB
MD550923cc89cd471c96795fcf1536baaa7
SHA147ee4e8f21f37a469e1ba2b448c1da9e2d47db23
SHA256b718f6e71428ea3b4f4f168cf491bc086569eb3eeda103d60f28357aea944f3e
SHA512ef49098609a9793768289e2463434e537651202ef78458135b1b5905cce8e69a7ae6ed75f09cdfd1ea433124fd718c3189192d0c1e2fb7f5b8dff2347d7d58b9
-
Filesize
70B
MD5884550483c23cce56007a5d4d0ccc01a
SHA1da29ead5e9c57b1e89247c8ba0b26a66649db3f0
SHA2566681e78c45fc3ee34a88c35614dcda0e7bbaa6cefce4db3a4a188d594cac94a5
SHA51285750424fe90ac5723cf70b98ae23600bac050430378ff8ed4189cf7d81d00e3ee2508790f5e814a4aafda1cf7ec215362e93d99d12d6b7d9f2468161d34fafd
-
Filesize
208KB
MD5619a37fb3489a4478d9b0ede7fe55165
SHA1fbc3e2f37387a6c303ba5807d70b81c7cbb8deda
SHA256e7afbc3116357cf82604755aed9c4d8bd3213444395d82de6f31f397bb8c60d0
SHA5125849bd0912bf197a2a75a270b597fb02eb9a9e0ed5a1133dc3600f7320c6a989986ef33a2813c1f8e609fa0db8eba6a2105b95317867e50b5074f4af466d750c
-
Filesize
76B
MD53e5759231429f40200e771f9dba75e6c
SHA1229fcb1ffb1233f5be9994c4c4d68a1681d7c1be
SHA25640a0382f5b8b9a6a16cf6e3e527578cab746c4e5b0e923a14c7dcd049afcf2bf
SHA512d9c4327b218a5c423efed361aff59166225566d2823102399e21362b9fb1cb9572eeda86625e3c082fa44ef8a4b36bd6d02a1c721a1dc47b0aeb25d5e6b7d35d
-
Filesize
208KB
MD58217ecf787d28ae24fcb4ee8024e81be
SHA15febcaf607d90c678025a2efc01b50c8cb2925bf
SHA256ff9d7d5031a0e976fb5368dc1f882dee801ba1df0aa3d20655c165c85233b760
SHA5127df1637cfd6b371b0f19937237ab995df545a32d3ce53064aadb94eb35712f9ec3b35c5f25e3c60be760fa9f52312c6096b2657327e0d7fc89f1901135f6e041
-
Filesize
72B
MD530d99e7d7bb421ecaa0793c5828c8533
SHA1775968c26be27281df9ccd50a2b0aebe989bf707
SHA256db0392b633b8ec57b6fb3f939b8f065c95163ce884d1907ee4b5c0c76c1e3b6a
SHA512379d9b163d77828ebd2a35012cdaaef33d391ef90b8f076be27f8e1f5617045e9f5dcd0245e0cc12e5db1495e32491eb87fd53c5af740efb8f7eb13f1df45d1a
-
Filesize
208KB
MD561292c4ade46810101e0f1e896372617
SHA1f7d25d36d407d2d240d14513969f81758a2e6af1
SHA2565c1686939a6641cf6505a412e34a6d3ff8c74a11dc5459d4ae0f8c95507ca81e
SHA512427d03c1848db4fc145d296682da5e582928a003668b2978bca8a923db47f7bd05b9e7c55dd2c5bdb7001fe716b75b06847611f2b0feb29fa23748ec62704841
-
Filesize
70B
MD5782cdf4aac9c8a93a10f04b67e1387d1
SHA182e5bf1fef4811d7255c56b7830d1d7f18dc1a53
SHA256de61de18ee39592c6203d16d5c3a31df152b632474db8bb82a6a91e2a3a5396b
SHA512841b9592d5583133d0712713422dc863a795aaf11e3e392207e4b97c314e65250ed6a5e3768612c12bb78878bd59698d06cd95128b75eab4c8d89774e51ff570
-
Filesize
208KB
MD561292c4ade46810101e0f1e896372617
SHA1f7d25d36d407d2d240d14513969f81758a2e6af1
SHA2565c1686939a6641cf6505a412e34a6d3ff8c74a11dc5459d4ae0f8c95507ca81e
SHA512427d03c1848db4fc145d296682da5e582928a003668b2978bca8a923db47f7bd05b9e7c55dd2c5bdb7001fe716b75b06847611f2b0feb29fa23748ec62704841
-
Filesize
72B
MD55c0de56c0850818b9e05ee7d6fbf0f62
SHA1710a8252a86fc7f6d7f55c80b4c03d09b76a6724
SHA256120625de9bddbfa8c2bb0c7b5808c23dbbb35e334bd804bf98057e3237880808
SHA512864ea317074c4e8e78463da0bbfcbe265e2f5f082113a247dd2db6000ca7e5c7ba749c005f0badb56d42b7416dc90416ac859d315aefe1b360639147f6530adc
-
Filesize
208KB
MD59b74d4103f9dd4c11cbdbd50928198cc
SHA10b154d6933012c3f55456b986fe247b67be44481
SHA25693987c13686eccb4f525e9761fbdca1dff30e6fb17bce6b3d8984e877022225a
SHA5127edd9ffaa82e37f46e013dd61692e7ef26d55632a670ca90b651d0688aee3062ff833daa0cb556f917b696bdf1e724020fd383214de3e9b712a32a16c8188667
-
Filesize
56B
MD501fc3e8b7498496343cb38989ce9947f
SHA130b45d4ee4187d484d01913b03ec52f8e1658f36
SHA256b2ca2f9e2fdd995f1060548cd6379e24f3cb05f349857fa3e8d209918fdf1763
SHA512487dba56fcb3dd7eb5d692c4d36913742514ce5bbc0dc5304aeb05d5bb7dd47b651be4dd6b1f5fe590cf89d7caf8f44a7199bb535b83e64d9fd5c96407671750
-
Filesize
208KB
MD57d3f009a36c7813aa64ae0260a1202fa
SHA1c3efca2b41e85352aff85abbbc0106d8b76666b0
SHA256b56987dcc38ca83968591a55fbd0ce306728af99423000fa9ef09c0ae289e4b4
SHA512aba5481822252d8de227c77a0e14488ae04dd82c7a2acca3ca829ea5fb952ee710b6ed1f0307e7d538836e04e9dafb77bed6faeb26858faaefb72ebcf2065995
-
Filesize
58B
MD51e571d0c7fb26636bd4c62768758c5f1
SHA16992d5a9c1e0aea12b32a1beba2e92318c735d52
SHA256fe4d0d8556d804e0606be521ab2c8890bfe9522ef0de2cadc996020e310ba001
SHA512b339f1a0443fc15e64a13afefd8becc396511668ec2affd8541959fe742c956b81b3f0c64c572e29ec9ce0d05a567e39d64789e81e2b4c932d1f84dad856f2e2
-
Filesize
208KB
MD5473ee58c9c8901225121762e5d40e745
SHA135677650ab2713f5033202b6fbfe0a80b56a2b40
SHA25673b0fbaf19c29f518ed3f23a9c7028c2ff2fe4c5164e3374dc970bce4ade4f22
SHA51267b5ed9ff56d1df13c6b9090ab8bb0340de18445337e623a79668bff4c824be4a1e1fe77ceaadd4fc2c2dea2b10fb62ad95ce769f6b5db944d8a49f0383b7e33
-
Filesize
58B
MD588bfae80f3053eafeb004a16f614df53
SHA118d9b8772fae7053acc1385607bddf3c1a99b5bf
SHA2569ec8f5d79f3764c0b3b11b6684ef8103f8560d8b7d820031dc5e6acc646503f0
SHA51297cd6ffaca9dde83a810dd65d6c58ec3ea8759e4735c9ff2c4f19f6bf3122c9822ce4a81a15499ced8f38892928f24679f6b7732afabe834a1873605ee121725
-
Filesize
208KB
MD5db80a10627cda6dd678a9a05bed73318
SHA198501cba2f1dd767a82e0a08da47cea4a0ac1d36
SHA2569e96abb2ddcb0e7506b9ad3b55a2deabdff3f815aa349b5684d86bddd648ea48
SHA5122b40df8d1fd1ecb535c43b93e473825e8d35f35a0b2587b656b7bfd192caa2797367cd7cab52fd2929765305d28446bd174f1da90325721b332fcfc92b7c2b82
-
Filesize
68B
MD5de8a2aada8d2e63d6710c0fc3a3a83e1
SHA141e0c454542110234595c3aba87f78127d0fd035
SHA256e8a10a097be585a6580ac7bc9c22a17fb63aa4ea479611f6884ac0f7571a064a
SHA51230eae6511cd0bb5ac2449251aa87387b271a557b5445279dd5fee083d8b5351ece7ef0837712f4aaf029c503fd0ae621db8076f9b7f0c71b3b58e717f26309b6
-
Filesize
208KB
MD5e81c9884f1b5049b2bebb500ed64cabf
SHA121ede7a602a885736e6d9bbd1090754a2f19c7cf
SHA2567a5ddba5cdfd49eb886dbcb7b369680cab7df32e436eb2e78d89369d50fa76b1
SHA5122053d64adb94ab87880c7cd6e1a6944660de372e1ec539f1d090fa95f92bd50174332cfccdacc350b48e991ad2c037e22500f22aa57c7485f712355ac4286083
-
Filesize
74B
MD59ddafdcad2766754da2eb9bcacfc741b
SHA1438c411b8ac5739f4ef54c0bd56c38b45206cd3c
SHA256f8324fd23705d6b25db6bb1c925df7e2f2e364d7f6294da116c0a109775b4389
SHA512cee622eeb9bd927124dda731f66d592b8aa965c0021d8fb1a00ac7097329daa3b07486af0dd0de22d8e4c36ff24cb64d71d6d17ad1a43a807f310db4b5423e1d
-
Filesize
208KB
MD54befb9a8540a63eb20227fb6147d015a
SHA1b4550aae6f50202fb37022104add4442d17b77b1
SHA2569a1e48929864562466305619268d5dcf80e996561bdd3597b09a3b9098939f16
SHA5127693dbbb784e5805145307205e13d6afd9680a49b10c4aa45cda9a1848111cadaee54113873f64f9519ecc145bfe127711d55cfa6e5a76b7c9568d62da5cb9ea
-
Filesize
70B
MD5a80bc01f2b420e26d2d147f81448a6bc
SHA177294e5c0c57e14862a927a478af2be4fa654e51
SHA2561b730c3a60d2e3887aa2a639a96e8ced161788ffa6b8699eac00554732f90f46
SHA5120d936296abcc10a0169bf079f8f052cf9ac829977329fb3bf5cc549522c10abb686ac595a139f14b440e21ca019d4f4c3328d6eecee64b25eb78f66c4f1d8d92
-
Filesize
208KB
MD541f3290ef1a30f40537602310dd3ae13
SHA12b88f5d9da93d651d8db1d6f94fdcac71343508c
SHA256cbbe1c503153fd7e83288f032b0c3f4dd9f8882ae01b4551a17f76a939b8407c
SHA512776b1718315be63d51de7cabea5b823986d969616b1e6f111a66221cacd777a68ff672fa6adbbd8b4f8647eaa066ddad551b13a56b2007d1bcde374073770054
-
Filesize
68B
MD55c15222997527e4c64172ab3389890a2
SHA1705b7fe942a438586c6e2bf50f84fbec89dfa965
SHA256f641bc4f8d696f8ef5d0d8a73e8f9526aa01861f7997bd22439649e8ea5e61ea
SHA5121a92fe69931751ee82d36d82cbe4ea56147b601429a9b81c141ccdadfdff84db890cf17f987ae37598120428dca5c7e97d8da1d071d0dfd0f3eafbb629ac5ec4