Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 01:58
Static task
static1
Behavioral task
behavioral1
Sample
ba3bd6064ab7a5f4e231232d993f2a10.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba3bd6064ab7a5f4e231232d993f2a10.exe
Resource
win10v2004-20240226-en
General
-
Target
ba3bd6064ab7a5f4e231232d993f2a10.exe
-
Size
209KB
-
MD5
ba3bd6064ab7a5f4e231232d993f2a10
-
SHA1
7f8372539943ee00b8aad794ed968e2bec2bec3a
-
SHA256
a649c2ae521eeb49475be0d2e04d5ea634f6dca7c32e2c5df7a5e9a6af332cb6
-
SHA512
102e025effaf838caf6191cf2985176dcd63d9759d2066f798fe16ea8d08544e328cff1fd0ba0b66b18487f90a5c6a59defc9035c5cc1f1dc77c1b5853048d64
-
SSDEEP
6144:7dmjvv0emGmGmGT/g4U11Ue1LCOfnM9/QAC3+bkEjR:7dmjvcF4U11UetCOfnoQAC3+bku
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation UITGEHV.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation FVSJO.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation WXME.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation CYGCU.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation KIJU.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation MQXVV.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation URPKOW.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation WKIFQPT.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation PZBTUXT.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation QMZUEBW.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation JZL.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation LBIGAL.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation KLS.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation XYJZTD.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation VBB.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation ZBGFZ.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation BEPQCV.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation GCN.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation BCGGO.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation GLY.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation CYW.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation QZT.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation KTPZ.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation HPZXPMY.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation WDNTN.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation YZV.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation CVP.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation XWYKO.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation RDTXA.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation FPUB.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation EHYFLRJ.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation KMYHD.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation CGIDFB.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation HDUF.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation EASUC.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation FDKSG.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation WVNUT.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation MWKMAQI.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation ETW.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation CBUQ.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation SYXNZL.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation TOLOJGZ.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation BSLINW.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation SVR.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation EXKP.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation VXG.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation FFHLFL.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation VKAHK.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation APNN.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation KRXO.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation EABTVR.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation FUHADP.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation OVY.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation JQS.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation YTWGG.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation SIXTT.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation VTYCIP.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation IOQHF.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation UXTWX.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation EPDPBM.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation KNSZJGD.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation XYY.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation EJWGAL.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation BHDDE.exe -
Executes dropped EXE 64 IoCs
pid Process 4104 CMKPOBS.exe 3116 TXNFPH.exe 3324 CZXN.exe 3036 XNUEKV.exe 2644 MSZ.exe 3708 QAUJCM.exe 1788 VBB.exe 3164 SGHMS.exe 3352 UEAO.exe 3400 YMP.exe 3112 UUJWOWX.exe 944 JXSI.exe 4856 RDTXA.exe 4680 YYC.exe 3044 ZBGFZ.exe 4380 TOLOJGZ.exe 3364 URPKOW.exe 4216 YZV.exe 4680 WVUT.exe 3044 XYY.exe 4592 CYGCU.exe 364 TONNG.exe 4080 PTKK.exe 3424 IOKN.exe 3704 HMV.exe 4100 ZHZMJ.exe 1336 RPB.exe 4088 AQDW.exe 4380 GQKKHB.exe 1668 TBGQMS.exe 5004 MWKMAQI.exe 3728 QMZUEBW.exe 3168 QPDQ.exe 3204 XKA.exe 3068 JDDV.exe 2132 FABSJJ.exe 4012 LBIGAL.exe 2240 TRJF.exe 4884 EHYFLRJ.exe 3972 QZT.exe 1344 KMYHD.exe 1420 HSDEKI.exe 2344 HDMYYUE.exe 3972 RASSGC.exe 4060 ROSHHHH.exe 1408 ATC.exe 1608 EJWGAL.exe 2104 KKE.exe 3604 EXJET.exe 320 PPEWCU.exe 3584 BIHPKCL.exe 4440 KIJU.exe 2884 SBSW.exe 4060 FEOUG.exe 1144 DEVIPXY.exe 1752 WHNTU.exe 1672 UXTWX.exe 3632 KNSZJGD.exe 2872 SIXTT.exe 2656 HDUF.exe 4364 MOQE.exe 1512 JTWBP.exe 3728 ZJDET.exe 2616 UWANDVU.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\WVNUT.exe.bat WDNTN.exe File created C:\windows\SysWOW64\FPUB.exe APNN.exe File created C:\windows\SysWOW64\PTKK.exe.bat TONNG.exe File created C:\windows\SysWOW64\WKF.exe.bat UWANDVU.exe File created C:\windows\SysWOW64\KCIDD.exe GMBVR.exe File created C:\windows\SysWOW64\CPQDOOH.exe.bat HBMUEO.exe File opened for modification C:\windows\SysWOW64\YETXJ.exe KTPZ.exe File created C:\windows\SysWOW64\RDTXA.exe JXSI.exe File created C:\windows\SysWOW64\CGHOM.exe.bat WKIFQPT.exe File opened for modification C:\windows\SysWOW64\KLS.exe RIGORN.exe File created C:\windows\SysWOW64\XTMXXS.exe CGHOM.exe File created C:\windows\SysWOW64\VKAHK.exe.bat KRXO.exe File created C:\windows\SysWOW64\FPUB.exe.bat APNN.exe File created C:\windows\SysWOW64\FBKXP.exe FVSJO.exe File opened for modification C:\windows\SysWOW64\ZBNJRG.exe XDMHLKB.exe File created C:\windows\SysWOW64\CGIDFB.exe.bat BDEH.exe File opened for modification C:\windows\SysWOW64\XWYKO.exe JQS.exe File created C:\windows\SysWOW64\XWYKO.exe.bat JQS.exe File opened for modification C:\windows\SysWOW64\KTPZ.exe SYXNZL.exe File created C:\windows\SysWOW64\UEAO.exe.bat SGHMS.exe File created C:\windows\SysWOW64\RDTXA.exe.bat JXSI.exe File opened for modification C:\windows\SysWOW64\GQKKHB.exe AQDW.exe File created C:\windows\SysWOW64\UXTWX.exe.bat WHNTU.exe File created C:\windows\SysWOW64\JLQDZI.exe.bat CVP.exe File opened for modification C:\windows\SysWOW64\PNAV.exe FPUB.exe File created C:\windows\SysWOW64\GQKKHB.exe AQDW.exe File opened for modification C:\windows\SysWOW64\VKAHK.exe KRXO.exe File opened for modification C:\windows\SysWOW64\RSPPB.exe MPTI.exe File created C:\windows\SysWOW64\VTYCIP.exe.bat ETW.exe File created C:\windows\SysWOW64\CGHOM.exe WKIFQPT.exe File created C:\windows\SysWOW64\EASUC.exe YIL.exe File opened for modification C:\windows\SysWOW64\KRXO.exe CYW.exe File created C:\windows\SysWOW64\HNC.exe KHF.exe File created C:\windows\SysWOW64\HNC.exe.bat KHF.exe File opened for modification C:\windows\SysWOW64\JDDV.exe XKA.exe File created C:\windows\SysWOW64\ATC.exe ROSHHHH.exe File opened for modification C:\windows\SysWOW64\BRTTN.exe CGIDFB.exe File created C:\windows\SysWOW64\CMKPOBS.exe ba3bd6064ab7a5f4e231232d993f2a10.exe File created C:\windows\SysWOW64\BEPQCV.exe ZBNJRG.exe File created C:\windows\SysWOW64\KTPZ.exe.bat SYXNZL.exe File opened for modification C:\windows\SysWOW64\GLY.exe QWRI.exe File opened for modification C:\windows\SysWOW64\KCIDD.exe GMBVR.exe File created C:\windows\SysWOW64\YETXJ.exe KTPZ.exe File opened for modification C:\windows\SysWOW64\APNN.exe QHLIDB.exe File opened for modification C:\windows\SysWOW64\YYC.exe RDTXA.exe File created C:\windows\SysWOW64\HDUF.exe.bat SIXTT.exe File created C:\windows\SysWOW64\PZRVST.exe PTRHRG.exe File created C:\windows\SysWOW64\RVGEEBO.exe DSC.exe File created C:\windows\SysWOW64\PCIKLO.exe WZEP.exe File created C:\windows\SysWOW64\PCIKLO.exe.bat WZEP.exe File created C:\windows\SysWOW64\CMKPOBS.exe.bat ba3bd6064ab7a5f4e231232d993f2a10.exe File created C:\windows\SysWOW64\UEAO.exe SGHMS.exe File created C:\windows\SysWOW64\DEVIPXY.exe FEOUG.exe File created C:\windows\SysWOW64\BRH.exe WRZ.exe File opened for modification C:\windows\SysWOW64\JLQDZI.exe CVP.exe File opened for modification C:\windows\SysWOW64\ZIMT.exe OPR.exe File opened for modification C:\windows\SysWOW64\CVP.exe BSLINW.exe File opened for modification C:\windows\SysWOW64\KRPPFV.exe PVKF.exe File created C:\windows\SysWOW64\KTPZ.exe SYXNZL.exe File created C:\windows\SysWOW64\KCIDD.exe.bat GMBVR.exe File opened for modification C:\windows\SysWOW64\PZBTUXT.exe JDCT.exe File opened for modification C:\windows\SysWOW64\ATC.exe ROSHHHH.exe File opened for modification C:\windows\SysWOW64\CPQDOOH.exe HBMUEO.exe File created C:\windows\SysWOW64\SGHMS.exe.bat VBB.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\DSC.exe.bat BVJ.exe File created C:\windows\system\WKIFQPT.exe.bat JZL.exe File created C:\windows\VSG.exe.bat XCVN.exe File created C:\windows\LGTWS.exe WJNZL.exe File opened for modification C:\windows\WZWHAK.exe LGTWS.exe File opened for modification C:\windows\SYXNZL.exe KDABQKY.exe File opened for modification C:\windows\TONNG.exe CYGCU.exe File opened for modification C:\windows\JDCT.exe UITGEHV.exe File opened for modification C:\windows\WRZ.exe MQXVV.exe File opened for modification C:\windows\ZSHPXJE.exe VKAHK.exe File created C:\windows\system\YZV.exe URPKOW.exe File created C:\windows\system\GMBVR.exe VTYCIP.exe File created C:\windows\XWZAML.exe CBUQ.exe File created C:\windows\system\XCVN.exe CPQDOOH.exe File created C:\windows\system\DCYSF.exe.bat BPU.exe File created C:\windows\system\WUE.exe.bat YETXJ.exe File created C:\windows\system\CYW.exe.bat NIVWQ.exe File opened for modification C:\windows\PTRHRG.exe RVGEEBO.exe File created C:\windows\system\WKIFQPT.exe JZL.exe File opened for modification C:\windows\system\OXLGC.exe HNC.exe File created C:\windows\system\JTWBP.exe MOQE.exe File opened for modification C:\windows\system\JXSI.exe UUJWOWX.exe File created C:\windows\system\OVY.exe VSG.exe File created C:\windows\BCGGO.exe DCYSF.exe File opened for modification C:\windows\system\MSZ.exe XNUEKV.exe File opened for modification C:\windows\RIGORN.exe QMCTMXU.exe File opened for modification C:\windows\system\HXPIZQA.exe VFUPRA.exe File opened for modification C:\windows\YIL.exe FFHLFL.exe File created C:\windows\system\YCFZYD.exe.bat DPAQ.exe File opened for modification C:\windows\system\DCYSF.exe BPU.exe File opened for modification C:\windows\system\LIOHSYX.exe PCIKLO.exe File created C:\windows\system\MOQE.exe HDUF.exe File created C:\windows\system\TOLOJGZ.exe.bat ZBGFZ.exe File opened for modification C:\windows\LRCTV.exe OMW.exe File opened for modification C:\windows\system\BHDDE.exe GLY.exe File created C:\windows\system\XCVN.exe.bat CPQDOOH.exe File created C:\windows\system\SPNOBP.exe.bat BEPQCV.exe File created C:\windows\YTWGG.exe LIOHSYX.exe File opened for modification C:\windows\system\XNUEKV.exe CZXN.exe File created C:\windows\QWRI.exe IQZ.exe File created C:\windows\SVR.exe EQLPYAH.exe File created C:\windows\system\HXPIZQA.exe.bat VFUPRA.exe File opened for modification C:\windows\system\FVSJO.exe OXLGC.exe File opened for modification C:\windows\system\EPDPBM.exe LMZMOWI.exe File created C:\windows\system\MSBHBXJ.exe VERX.exe File created C:\windows\GYXUIO.exe.bat YTWGG.exe File created C:\windows\TRJF.exe LBIGAL.exe File opened for modification C:\windows\ETW.exe LQTBZU.exe File created C:\windows\system\FUHADP.exe.bat JOBDWG.exe File created C:\windows\system\XYJZTD.exe DJIFNPT.exe File created C:\windows\system\SBSW.exe KIJU.exe File opened for modification C:\windows\system\TOLOJGZ.exe ZBGFZ.exe File created C:\windows\FDKSG.exe BVQKCS.exe File created C:\windows\BPU.exe.bat PWRQURN.exe File created C:\windows\system\MSZ.exe.bat XNUEKV.exe File opened for modification C:\windows\HXC.exe ACFO.exe File created C:\windows\system\TXNFPH.exe.bat CMKPOBS.exe File created C:\windows\system\WSD.exe MSBHBXJ.exe File opened for modification C:\windows\system\BIHPKCL.exe PPEWCU.exe File opened for modification C:\windows\system\KDFZAIS.exe EABTVR.exe File created C:\windows\system\OYVMJ.exe RSPPB.exe File created C:\windows\SYXNZL.exe KDABQKY.exe File created C:\windows\YTWGG.exe.bat LIOHSYX.exe File created C:\windows\system\BHDDE.exe GLY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 4660 3752 WerFault.exe 90 2704 4104 WerFault.exe 98 2252 3116 WerFault.exe 104 1156 3324 WerFault.exe 111 4884 3036 WerFault.exe 118 2344 2644 WerFault.exe 123 4144 3708 WerFault.exe 128 3116 1788 WerFault.exe 133 4100 3164 WerFault.exe 139 4532 3352 WerFault.exe 144 1844 3400 WerFault.exe 149 4144 3112 WerFault.exe 154 3788 944 WerFault.exe 159 64 4856 WerFault.exe 165 3972 4680 WerFault.exe 170 1068 3044 WerFault.exe 175 5076 4380 WerFault.exe 180 1028 3364 WerFault.exe 186 2044 4216 WerFault.exe 191 2704 4680 WerFault.exe 196 4440 3044 WerFault.exe 201 4884 4592 WerFault.exe 206 1072 364 WerFault.exe 211 4088 4080 WerFault.exe 217 3324 3424 WerFault.exe 222 3168 3704 WerFault.exe 227 1920 4100 WerFault.exe 232 1192 1336 WerFault.exe 237 1720 4088 WerFault.exe 242 4224 4380 WerFault.exe 247 2636 1668 WerFault.exe 252 1968 5004 WerFault.exe 257 3920 3728 WerFault.exe 262 2176 3168 WerFault.exe 267 696 3204 WerFault.exe 272 3712 3068 WerFault.exe 277 4440 2132 WerFault.exe 282 4596 4012 WerFault.exe 287 1408 2240 WerFault.exe 292 3844 4884 WerFault.exe 297 4852 3972 WerFault.exe 303 3640 1344 WerFault.exe 309 4884 1420 WerFault.exe 315 2784 2344 WerFault.exe 320 1680 3972 WerFault.exe 325 2484 4060 WerFault.exe 330 1720 1408 WerFault.exe 334 4440 1608 WerFault.exe 340 3972 2104 WerFault.exe 345 3168 3604 WerFault.exe 350 3408 320 WerFault.exe 355 2344 3584 WerFault.exe 360 4012 4440 WerFault.exe 365 1668 2884 WerFault.exe 370 4700 4060 WerFault.exe 375 3096 1144 WerFault.exe 380 1152 1752 WerFault.exe 385 3752 1672 WerFault.exe 390 3324 3632 WerFault.exe 395 3164 2872 WerFault.exe 400 3068 2656 WerFault.exe 404 4348 4364 WerFault.exe 410 2132 1512 WerFault.exe 415 3028 3728 WerFault.exe 420 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3752 ba3bd6064ab7a5f4e231232d993f2a10.exe 3752 ba3bd6064ab7a5f4e231232d993f2a10.exe 4104 CMKPOBS.exe 4104 CMKPOBS.exe 3116 TXNFPH.exe 3116 TXNFPH.exe 3324 CZXN.exe 3324 CZXN.exe 3036 XNUEKV.exe 3036 XNUEKV.exe 2644 MSZ.exe 2644 MSZ.exe 3708 QAUJCM.exe 3708 QAUJCM.exe 1788 VBB.exe 1788 VBB.exe 3164 SGHMS.exe 3164 SGHMS.exe 3352 UEAO.exe 3352 UEAO.exe 3400 YMP.exe 3400 YMP.exe 3112 UUJWOWX.exe 3112 UUJWOWX.exe 944 JXSI.exe 944 JXSI.exe 4856 RDTXA.exe 4856 RDTXA.exe 4680 YYC.exe 4680 YYC.exe 3044 ZBGFZ.exe 3044 ZBGFZ.exe 4380 TOLOJGZ.exe 4380 TOLOJGZ.exe 3364 URPKOW.exe 3364 URPKOW.exe 4216 YZV.exe 4216 YZV.exe 4680 WVUT.exe 4680 WVUT.exe 3044 XYY.exe 3044 XYY.exe 4592 CYGCU.exe 4592 CYGCU.exe 364 TONNG.exe 364 TONNG.exe 4080 PTKK.exe 4080 PTKK.exe 3424 IOKN.exe 3424 IOKN.exe 3704 HMV.exe 3704 HMV.exe 4100 ZHZMJ.exe 4100 ZHZMJ.exe 1336 RPB.exe 1336 RPB.exe 4088 AQDW.exe 4088 AQDW.exe 4380 GQKKHB.exe 4380 GQKKHB.exe 1668 TBGQMS.exe 1668 TBGQMS.exe 5004 MWKMAQI.exe 5004 MWKMAQI.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3752 ba3bd6064ab7a5f4e231232d993f2a10.exe 3752 ba3bd6064ab7a5f4e231232d993f2a10.exe 4104 CMKPOBS.exe 4104 CMKPOBS.exe 3116 TXNFPH.exe 3116 TXNFPH.exe 3324 CZXN.exe 3324 CZXN.exe 3036 XNUEKV.exe 3036 XNUEKV.exe 2644 MSZ.exe 2644 MSZ.exe 3708 QAUJCM.exe 3708 QAUJCM.exe 1788 VBB.exe 1788 VBB.exe 3164 SGHMS.exe 3164 SGHMS.exe 3352 UEAO.exe 3352 UEAO.exe 3400 YMP.exe 3400 YMP.exe 3112 UUJWOWX.exe 3112 UUJWOWX.exe 944 JXSI.exe 944 JXSI.exe 4856 RDTXA.exe 4856 RDTXA.exe 4680 YYC.exe 4680 YYC.exe 3044 ZBGFZ.exe 3044 ZBGFZ.exe 4380 TOLOJGZ.exe 4380 TOLOJGZ.exe 3364 URPKOW.exe 3364 URPKOW.exe 4216 YZV.exe 4216 YZV.exe 4680 WVUT.exe 4680 WVUT.exe 3044 XYY.exe 3044 XYY.exe 4592 CYGCU.exe 4592 CYGCU.exe 364 TONNG.exe 364 TONNG.exe 4080 PTKK.exe 4080 PTKK.exe 3424 IOKN.exe 3424 IOKN.exe 3704 HMV.exe 3704 HMV.exe 4100 ZHZMJ.exe 4100 ZHZMJ.exe 1336 RPB.exe 1336 RPB.exe 4088 AQDW.exe 4088 AQDW.exe 4380 GQKKHB.exe 4380 GQKKHB.exe 1668 TBGQMS.exe 1668 TBGQMS.exe 5004 MWKMAQI.exe 5004 MWKMAQI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3752 wrote to memory of 2616 3752 ba3bd6064ab7a5f4e231232d993f2a10.exe 94 PID 3752 wrote to memory of 2616 3752 ba3bd6064ab7a5f4e231232d993f2a10.exe 94 PID 3752 wrote to memory of 2616 3752 ba3bd6064ab7a5f4e231232d993f2a10.exe 94 PID 2616 wrote to memory of 4104 2616 cmd.exe 98 PID 2616 wrote to memory of 4104 2616 cmd.exe 98 PID 2616 wrote to memory of 4104 2616 cmd.exe 98 PID 4104 wrote to memory of 3256 4104 CMKPOBS.exe 100 PID 4104 wrote to memory of 3256 4104 CMKPOBS.exe 100 PID 4104 wrote to memory of 3256 4104 CMKPOBS.exe 100 PID 3256 wrote to memory of 3116 3256 cmd.exe 104 PID 3256 wrote to memory of 3116 3256 cmd.exe 104 PID 3256 wrote to memory of 3116 3256 cmd.exe 104 PID 3116 wrote to memory of 3124 3116 TXNFPH.exe 107 PID 3116 wrote to memory of 3124 3116 TXNFPH.exe 107 PID 3116 wrote to memory of 3124 3116 TXNFPH.exe 107 PID 3124 wrote to memory of 3324 3124 cmd.exe 111 PID 3124 wrote to memory of 3324 3124 cmd.exe 111 PID 3124 wrote to memory of 3324 3124 cmd.exe 111 PID 3324 wrote to memory of 4868 3324 CZXN.exe 114 PID 3324 wrote to memory of 4868 3324 CZXN.exe 114 PID 3324 wrote to memory of 4868 3324 CZXN.exe 114 PID 4868 wrote to memory of 3036 4868 cmd.exe 118 PID 4868 wrote to memory of 3036 4868 cmd.exe 118 PID 4868 wrote to memory of 3036 4868 cmd.exe 118 PID 3036 wrote to memory of 4516 3036 XNUEKV.exe 119 PID 3036 wrote to memory of 4516 3036 XNUEKV.exe 119 PID 3036 wrote to memory of 4516 3036 XNUEKV.exe 119 PID 4516 wrote to memory of 2644 4516 cmd.exe 123 PID 4516 wrote to memory of 2644 4516 cmd.exe 123 PID 4516 wrote to memory of 2644 4516 cmd.exe 123 PID 2644 wrote to memory of 3416 2644 MSZ.exe 124 PID 2644 wrote to memory of 3416 2644 MSZ.exe 124 PID 2644 wrote to memory of 3416 2644 MSZ.exe 124 PID 3416 wrote to memory of 3708 3416 cmd.exe 128 PID 3416 wrote to memory of 3708 3416 cmd.exe 128 PID 3416 wrote to memory of 3708 3416 cmd.exe 128 PID 3708 wrote to memory of 2420 3708 QAUJCM.exe 129 PID 3708 wrote to memory of 2420 3708 QAUJCM.exe 129 PID 3708 wrote to memory of 2420 3708 QAUJCM.exe 129 PID 2420 wrote to memory of 1788 2420 cmd.exe 133 PID 2420 wrote to memory of 1788 2420 cmd.exe 133 PID 2420 wrote to memory of 1788 2420 cmd.exe 133 PID 1788 wrote to memory of 4808 1788 VBB.exe 134 PID 1788 wrote to memory of 4808 1788 VBB.exe 134 PID 1788 wrote to memory of 4808 1788 VBB.exe 134 PID 4808 wrote to memory of 3164 4808 cmd.exe 139 PID 4808 wrote to memory of 3164 4808 cmd.exe 139 PID 4808 wrote to memory of 3164 4808 cmd.exe 139 PID 3164 wrote to memory of 4836 3164 SGHMS.exe 140 PID 3164 wrote to memory of 4836 3164 SGHMS.exe 140 PID 3164 wrote to memory of 4836 3164 SGHMS.exe 140 PID 4836 wrote to memory of 3352 4836 cmd.exe 144 PID 4836 wrote to memory of 3352 4836 cmd.exe 144 PID 4836 wrote to memory of 3352 4836 cmd.exe 144 PID 3352 wrote to memory of 3620 3352 UEAO.exe 145 PID 3352 wrote to memory of 3620 3352 UEAO.exe 145 PID 3352 wrote to memory of 3620 3352 UEAO.exe 145 PID 3620 wrote to memory of 3400 3620 cmd.exe 149 PID 3620 wrote to memory of 3400 3620 cmd.exe 149 PID 3620 wrote to memory of 3400 3620 cmd.exe 149 PID 3400 wrote to memory of 4456 3400 YMP.exe 150 PID 3400 wrote to memory of 4456 3400 YMP.exe 150 PID 3400 wrote to memory of 4456 3400 YMP.exe 150 PID 4456 wrote to memory of 3112 4456 cmd.exe 154
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba3bd6064ab7a5f4e231232d993f2a10.exe"C:\Users\Admin\AppData\Local\Temp\ba3bd6064ab7a5f4e231232d993f2a10.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CMKPOBS.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\windows\SysWOW64\CMKPOBS.exeC:\windows\system32\CMKPOBS.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TXNFPH.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\windows\system\TXNFPH.exeC:\windows\system\TXNFPH.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CZXN.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\windows\SysWOW64\CZXN.exeC:\windows\system32\CZXN.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XNUEKV.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\windows\system\XNUEKV.exeC:\windows\system\XNUEKV.exe9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MSZ.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\windows\system\MSZ.exeC:\windows\system\MSZ.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QAUJCM.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\windows\system\QAUJCM.exeC:\windows\system\QAUJCM.exe13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VBB.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\windows\system\VBB.exeC:\windows\system\VBB.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SGHMS.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\windows\SysWOW64\SGHMS.exeC:\windows\system32\SGHMS.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UEAO.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\windows\SysWOW64\UEAO.exeC:\windows\system32\UEAO.exe19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YMP.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\windows\YMP.exeC:\windows\YMP.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UUJWOWX.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\windows\UUJWOWX.exeC:\windows\UUJWOWX.exe23⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JXSI.exe.bat" "24⤵PID:2544
-
C:\windows\system\JXSI.exeC:\windows\system\JXSI.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RDTXA.exe.bat" "26⤵PID:4364
-
C:\windows\SysWOW64\RDTXA.exeC:\windows\system32\RDTXA.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YYC.exe.bat" "28⤵PID:4428
-
C:\windows\SysWOW64\YYC.exeC:\windows\system32\YYC.exe29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZBGFZ.exe.bat" "30⤵PID:224
-
C:\windows\SysWOW64\ZBGFZ.exeC:\windows\system32\ZBGFZ.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TOLOJGZ.exe.bat" "32⤵PID:2696
-
C:\windows\system\TOLOJGZ.exeC:\windows\system\TOLOJGZ.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\URPKOW.exe.bat" "34⤵PID:4684
-
C:\windows\URPKOW.exeC:\windows\URPKOW.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YZV.exe.bat" "36⤵PID:2040
-
C:\windows\system\YZV.exeC:\windows\system\YZV.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WVUT.exe.bat" "38⤵PID:1040
-
C:\windows\system\WVUT.exeC:\windows\system\WVUT.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XYY.exe.bat" "40⤵PID:3792
-
C:\windows\system\XYY.exeC:\windows\system\XYY.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CYGCU.exe.bat" "42⤵PID:3612
-
C:\windows\system\CYGCU.exeC:\windows\system\CYGCU.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TONNG.exe.bat" "44⤵PID:3632
-
C:\windows\TONNG.exeC:\windows\TONNG.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PTKK.exe.bat" "46⤵PID:4532
-
C:\windows\SysWOW64\PTKK.exeC:\windows\system32\PTKK.exe47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\IOKN.exe.bat" "48⤵PID:5024
-
C:\windows\system\IOKN.exeC:\windows\system\IOKN.exe49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HMV.exe.bat" "50⤵PID:776
-
C:\windows\HMV.exeC:\windows\HMV.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZHZMJ.exe.bat" "52⤵PID:3564
-
C:\windows\system\ZHZMJ.exeC:\windows\system\ZHZMJ.exe53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RPB.exe.bat" "54⤵PID:4348
-
C:\windows\system\RPB.exeC:\windows\system\RPB.exe55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AQDW.exe.bat" "56⤵PID:3416
-
C:\windows\AQDW.exeC:\windows\AQDW.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GQKKHB.exe.bat" "58⤵PID:2280
-
C:\windows\SysWOW64\GQKKHB.exeC:\windows\system32\GQKKHB.exe59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TBGQMS.exe.bat" "60⤵PID:4592
-
C:\windows\system\TBGQMS.exeC:\windows\system\TBGQMS.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MWKMAQI.exe.bat" "62⤵PID:4884
-
C:\windows\SysWOW64\MWKMAQI.exeC:\windows\system32\MWKMAQI.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QMZUEBW.exe.bat" "64⤵PID:3092
-
C:\windows\system\QMZUEBW.exeC:\windows\system\QMZUEBW.exe65⤵
- Checks computer location settings
- Executes dropped EXE
PID:3728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QPDQ.exe.bat" "66⤵PID:4088
-
C:\windows\system\QPDQ.exeC:\windows\system\QPDQ.exe67⤵
- Executes dropped EXE
PID:3168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XKA.exe.bat" "68⤵PID:3632
-
C:\windows\system\XKA.exeC:\windows\system\XKA.exe69⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JDDV.exe.bat" "70⤵PID:3004
-
C:\windows\SysWOW64\JDDV.exeC:\windows\system32\JDDV.exe71⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FABSJJ.exe.bat" "72⤵PID:1208
-
C:\windows\SysWOW64\FABSJJ.exeC:\windows\system32\FABSJJ.exe73⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LBIGAL.exe.bat" "74⤵PID:4104
-
C:\windows\SysWOW64\LBIGAL.exeC:\windows\system32\LBIGAL.exe75⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TRJF.exe.bat" "76⤵PID:5104
-
C:\windows\TRJF.exeC:\windows\TRJF.exe77⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EHYFLRJ.exe.bat" "78⤵PID:3296
-
C:\windows\SysWOW64\EHYFLRJ.exeC:\windows\system32\EHYFLRJ.exe79⤵
- Checks computer location settings
- Executes dropped EXE
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QZT.exe.bat" "80⤵PID:1336
-
C:\windows\system\QZT.exeC:\windows\system\QZT.exe81⤵
- Checks computer location settings
- Executes dropped EXE
PID:3972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KMYHD.exe.bat" "82⤵PID:64
-
C:\windows\KMYHD.exeC:\windows\KMYHD.exe83⤵
- Checks computer location settings
- Executes dropped EXE
PID:1344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HSDEKI.exe.bat" "84⤵PID:3696
-
C:\windows\SysWOW64\HSDEKI.exeC:\windows\system32\HSDEKI.exe85⤵
- Executes dropped EXE
PID:1420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HDMYYUE.exe.bat" "86⤵PID:1460
-
C:\windows\HDMYYUE.exeC:\windows\HDMYYUE.exe87⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RASSGC.exe.bat" "88⤵PID:4472
-
C:\windows\RASSGC.exeC:\windows\RASSGC.exe89⤵
- Executes dropped EXE
PID:3972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ROSHHHH.exe.bat" "90⤵PID:2620
-
C:\windows\SysWOW64\ROSHHHH.exeC:\windows\system32\ROSHHHH.exe91⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ATC.exe.bat" "92⤵PID:4360
-
C:\windows\SysWOW64\ATC.exeC:\windows\system32\ATC.exe93⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\EJWGAL.exe.bat" "94⤵PID:1968
-
C:\windows\system\EJWGAL.exeC:\windows\system\EJWGAL.exe95⤵
- Checks computer location settings
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KKE.exe.bat" "96⤵PID:3028
-
C:\windows\SysWOW64\KKE.exeC:\windows\system32\KKE.exe97⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\EXJET.exe.bat" "98⤵PID:4940
-
C:\windows\system\EXJET.exeC:\windows\system\EXJET.exe99⤵
- Executes dropped EXE
PID:3604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PPEWCU.exe.bat" "100⤵PID:1668
-
C:\windows\PPEWCU.exeC:\windows\PPEWCU.exe101⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BIHPKCL.exe.bat" "102⤵PID:4328
-
C:\windows\system\BIHPKCL.exeC:\windows\system\BIHPKCL.exe103⤵
- Executes dropped EXE
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KIJU.exe.bat" "104⤵PID:4224
-
C:\windows\system\KIJU.exeC:\windows\system\KIJU.exe105⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SBSW.exe.bat" "106⤵PID:3044
-
C:\windows\system\SBSW.exeC:\windows\system\SBSW.exe107⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FEOUG.exe.bat" "108⤵PID:4340
-
C:\windows\SysWOW64\FEOUG.exeC:\windows\system32\FEOUG.exe109⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DEVIPXY.exe.bat" "110⤵PID:3324
-
C:\windows\SysWOW64\DEVIPXY.exeC:\windows\system32\DEVIPXY.exe111⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WHNTU.exe.bat" "112⤵PID:3564
-
C:\windows\SysWOW64\WHNTU.exeC:\windows\system32\WHNTU.exe113⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UXTWX.exe.bat" "114⤵PID:5044
-
C:\windows\SysWOW64\UXTWX.exeC:\windows\system32\UXTWX.exe115⤵
- Checks computer location settings
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KNSZJGD.exe.bat" "116⤵PID:4348
-
C:\windows\SysWOW64\KNSZJGD.exeC:\windows\system32\KNSZJGD.exe117⤵
- Checks computer location settings
- Executes dropped EXE
PID:3632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SIXTT.exe.bat" "118⤵PID:3728
-
C:\windows\SIXTT.exeC:\windows\SIXTT.exe119⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HDUF.exe.bat" "120⤵PID:2784
-
C:\windows\SysWOW64\HDUF.exeC:\windows\system32\HDUF.exe121⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2656 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MOQE.exe.bat" "122⤵PID:3584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-