Analysis
-
max time kernel
149s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe
Resource
win10v2004-20240226-en
General
-
Target
1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe
-
Size
448KB
-
MD5
411c8fa7d7b71729231ec23e62e023f9
-
SHA1
233eb141b5b030a4512962ad8ed6ef2bd458f0af
-
SHA256
1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7
-
SHA512
5b61f8132560162e7660d9cb1e04c3481489927916d16cd03879f1b4781d2b7dd3270864bb0a9cecc36cb8f5bbffbc725d04037c1954077eece21e446510ec5d
-
SSDEEP
6144:n+GxFNcONazpuImOeqwsMV0f2ukEjWbjcSbcY+CaQdaFOY4iGFYtR:nbFwilukFbz+xt4vF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation XDBVLEU.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation USUTUPT.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation YDRLS.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation EEHG.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation MDHWM.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation JLZVTAS.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation NOIZMQJ.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation KUWGR.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation AIUJS.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation TUTDUHS.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation QZN.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation OQD.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation JMTLMVD.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation FPQDQO.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation RJQFHN.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation MYEG.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation LCFY.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation JAXQFX.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation YCFZYD.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation DTEH.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation JYHUE.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation HNNEZY.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation MDCDVHA.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation SKPHE.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation FMUCWDU.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation LTZH.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation NBQ.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation NJH.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation NNNR.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation ZGHI.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation YVMCP.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation JOYUUM.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation OIHRYCP.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation JXP.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation DEXER.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation IEYG.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation BRNSTQB.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation DQU.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation FSSHPU.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation YKWQJSN.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation OCBGS.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation TSERVT.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation FPIOYC.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation BDEH.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation FAJ.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation EUL.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation VHTQYCW.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation LYY.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation HHH.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation KXR.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation QXASNF.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation TIZ.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation WWTVWNT.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation PKABPVA.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation VWXIXL.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation AND.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation ODW.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation MKU.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation ADP.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation RHJJG.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation YYSI.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation XONMRLN.exe Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation PLDRCC.exe -
Executes dropped EXE 64 IoCs
pid Process 1352 DTEH.exe 4660 VWXIXL.exe 1744 HHH.exe 4940 BFVGWBW.exe 2936 MYEG.exe 2108 UBUBX.exe 4884 FPIOYC.exe 4056 JXP.exe 3832 AND.exe 2792 XONMRLN.exe 2996 LTZH.exe 3164 NRAJR.exe 3136 QZN.exe 2272 PKYGIVL.exe 4244 MDCDVHA.exe 2188 PLDRCC.exe 5096 LCFY.exe 4960 XUMJG.exe 1288 OCBGS.exe 3340 WSK.exe 1516 NBQ.exe 3420 MEX.exe 2360 GRUUK.exe 928 OQD.exe 3684 UQK.exe 4704 ODW.exe 3764 ZGHI.exe 1968 FMUCWDU.exe 692 JMTLMVD.exe 1272 JAXQFX.exe 4832 JOYUUM.exe 2992 EUL.exe 4852 FSSHPU.exe 864 VHTQYCW.exe 2676 EASUC.exe 4940 JRXZFHW.exe 1216 OIHRYCP.exe 3052 WGIHN.exe 1224 YKWQJSN.exe 928 DEXER.exe 2300 OWPE.exe 3496 KXR.exe 4968 WNKG.exe 3860 YVMCP.exe 4696 ATNWNP.exe 964 HOYNK.exe 5112 QXASNF.exe 4628 YCFZYD.exe 2252 TIZ.exe 3712 YDRLS.exe 3296 BRJUMD.exe 4396 SZXSYU.exe 1224 RKAIH.exe 2188 AIUJS.exe 2572 HNNEZY.exe 4040 LYY.exe 2444 FBV.exe 1564 IKWL.exe 1620 SCALV.exe 3252 MDHWM.exe 4968 UIUDP.exe 4244 JYHUE.exe 2408 EEHG.exe 3196 MKU.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\AIUJS.exe.bat RKAIH.exe File created C:\windows\SysWOW64\IKWL.exe.bat FBV.exe File created C:\windows\SysWOW64\JYHUE.exe UIUDP.exe File created C:\windows\SysWOW64\NJH.exe WJFSGWY.exe File created C:\windows\SysWOW64\WWTVWNT.exe SVR.exe File created C:\windows\SysWOW64\TUTDUHS.exe.bat BRNSTQB.exe File opened for modification C:\windows\SysWOW64\ODW.exe UQK.exe File opened for modification C:\windows\SysWOW64\YVMCP.exe WNKG.exe File opened for modification C:\windows\SysWOW64\TSERVT.exe MWHPDWL.exe File created C:\windows\SysWOW64\HOYNK.exe ATNWNP.exe File created C:\windows\SysWOW64\HOYNK.exe.bat ATNWNP.exe File opened for modification C:\windows\SysWOW64\MKU.exe EEHG.exe File created C:\windows\SysWOW64\HHH.exe.bat VWXIXL.exe File created C:\windows\SysWOW64\ODW.exe.bat UQK.exe File opened for modification C:\windows\SysWOW64\IKWL.exe FBV.exe File opened for modification C:\windows\SysWOW64\KXXD.exe RJQFHN.exe File opened for modification C:\windows\SysWOW64\NBQ.exe WSK.exe File created C:\windows\SysWOW64\DEXER.exe.bat YKWQJSN.exe File opened for modification C:\windows\SysWOW64\FPQDQO.exe IEYG.exe File opened for modification C:\windows\SysWOW64\TUTDUHS.exe BRNSTQB.exe File created C:\windows\SysWOW64\YYSI.exe.bat SKPHE.exe File created C:\windows\SysWOW64\XONMRLN.exe AND.exe File opened for modification C:\windows\SysWOW64\UIUDP.exe MDHWM.exe File opened for modification C:\windows\SysWOW64\NOIZMQJ.exe DQU.exe File created C:\windows\SysWOW64\EUYVBHG.exe KXXD.exe File created C:\windows\SysWOW64\NOIZMQJ.exe DQU.exe File opened for modification C:\windows\SysWOW64\JYHUE.exe UIUDP.exe File created C:\windows\SysWOW64\MWHPDWL.exe.bat PWX.exe File created C:\windows\SysWOW64\TSERVT.exe.bat MWHPDWL.exe File opened for modification C:\windows\SysWOW64\AIUJS.exe RKAIH.exe File created C:\windows\SysWOW64\UIUDP.exe MDHWM.exe File created C:\windows\SysWOW64\KXXD.exe.bat RJQFHN.exe File created C:\windows\SysWOW64\TUTDUHS.exe BRNSTQB.exe File created C:\windows\SysWOW64\MWHPDWL.exe PWX.exe File opened for modification C:\windows\SysWOW64\BFVGWBW.exe HHH.exe File created C:\windows\SysWOW64\NJH.exe.bat WJFSGWY.exe File created C:\windows\SysWOW64\XONMRLN.exe.bat AND.exe File created C:\windows\SysWOW64\ODW.exe UQK.exe File opened for modification C:\windows\SysWOW64\WWTVWNT.exe SVR.exe File opened for modification C:\windows\SysWOW64\HHH.exe VWXIXL.exe File opened for modification C:\windows\SysWOW64\XONMRLN.exe AND.exe File created C:\windows\SysWOW64\MKU.exe EEHG.exe File opened for modification C:\windows\SysWOW64\EUYVBHG.exe KXXD.exe File created C:\windows\SysWOW64\NBQ.exe.bat WSK.exe File created C:\windows\SysWOW64\IKWL.exe FBV.exe File created C:\windows\SysWOW64\AIUJS.exe RKAIH.exe File opened for modification C:\windows\SysWOW64\DEXER.exe YKWQJSN.exe File opened for modification C:\windows\SysWOW64\HOYNK.exe ATNWNP.exe File created C:\windows\SysWOW64\DEXER.exe YKWQJSN.exe File created C:\windows\SysWOW64\JYHUE.exe.bat UIUDP.exe File created C:\windows\SysWOW64\USUTUPT.exe GJDWHS.exe File opened for modification C:\windows\SysWOW64\MWHPDWL.exe PWX.exe File opened for modification C:\windows\SysWOW64\YYSI.exe SKPHE.exe File created C:\windows\SysWOW64\HHH.exe VWXIXL.exe File opened for modification C:\windows\SysWOW64\YKWQJSN.exe WGIHN.exe File created C:\windows\SysWOW64\NBQ.exe WSK.exe File created C:\windows\SysWOW64\MKU.exe.bat EEHG.exe File created C:\windows\SysWOW64\YYSI.exe SKPHE.exe File created C:\windows\SysWOW64\BFVGWBW.exe HHH.exe File created C:\windows\SysWOW64\BFVGWBW.exe.bat HHH.exe File created C:\windows\SysWOW64\EUYVBHG.exe.bat KXXD.exe File created C:\windows\SysWOW64\YKWQJSN.exe.bat WGIHN.exe File created C:\windows\SysWOW64\UIUDP.exe.bat MDHWM.exe File created C:\windows\SysWOW64\FPQDQO.exe.bat IEYG.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\TIZ.exe.bat YCFZYD.exe File created C:\windows\WJFSGWY.exe BDEH.exe File created C:\windows\system\KUWGR.exe CPSSGP.exe File created C:\windows\PWX.exe.bat XDBVLEU.exe File created C:\windows\PKYGIVL.exe QZN.exe File opened for modification C:\windows\FMUCWDU.exe SUG.exe File opened for modification C:\windows\RKAIH.exe SZXSYU.exe File created C:\windows\system\UBUBX.exe MYEG.exe File created C:\windows\FMUCWDU.exe.bat SUG.exe File created C:\windows\system\OIHRYCP.exe JRXZFHW.exe File created C:\windows\BDEH.exe.bat WCWTIJM.exe File created C:\windows\EQW.exe.bat YYSI.exe File created C:\windows\system\OQD.exe.bat GRUUK.exe File opened for modification C:\windows\QXASNF.exe HOYNK.exe File created C:\windows\MDHWM.exe SCALV.exe File opened for modification C:\windows\RTC.exe PKABPVA.exe File opened for modification C:\windows\system\LTZH.exe XONMRLN.exe File created C:\windows\NRAJR.exe LTZH.exe File opened for modification C:\windows\system\JRXZFHW.exe EASUC.exe File created C:\windows\FKANZ.exe FPQDQO.exe File created C:\windows\system\QZN.exe NRAJR.exe File created C:\windows\system\JAXQFX.exe.bat JMTLMVD.exe File created C:\windows\LYY.exe HNNEZY.exe File created C:\windows\system\SKPHE.exe TSERVT.exe File opened for modification C:\windows\BRJUMD.exe YDRLS.exe File opened for modification C:\windows\system\PULTRFY.exe JLZVTAS.exe File opened for modification C:\windows\SCALV.exe IKWL.exe File created C:\windows\system\FAJ.exe.bat KUWGR.exe File opened for modification C:\windows\EQW.exe YYSI.exe File created C:\windows\system\DTEH.exe 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe File created C:\windows\PLDRCC.exe MDCDVHA.exe File created C:\windows\QXASNF.exe HOYNK.exe File created C:\windows\system\SZXSYU.exe.bat BRJUMD.exe File opened for modification C:\windows\system\VWXIXL.exe DTEH.exe File created C:\windows\system\VHTQYCW.exe.bat FSSHPU.exe File created C:\windows\WCWTIJM.exe.bat MKU.exe File created C:\windows\system\NNNR.exe USUTUPT.exe File created C:\windows\MDCDVHA.exe PKYGIVL.exe File opened for modification C:\windows\LCFY.exe PLDRCC.exe File opened for modification C:\windows\system\JOYUUM.exe JAXQFX.exe File created C:\windows\system\VHTQYCW.exe FSSHPU.exe File created C:\windows\MDCDVHA.exe.bat PKYGIVL.exe File created C:\windows\system\ZGHI.exe.bat ODW.exe File created C:\windows\system\WGIHN.exe.bat OIHRYCP.exe File opened for modification C:\windows\LYY.exe HNNEZY.exe File opened for modification C:\windows\system\WSK.exe OCBGS.exe File created C:\windows\FMUCWDU.exe SUG.exe File opened for modification C:\windows\GJDWHS.exe RTC.exe File created C:\windows\JLZVTAS.exe NNNR.exe File created C:\windows\GJDWHS.exe.bat RTC.exe File created C:\windows\JLZVTAS.exe.bat NNNR.exe File opened for modification C:\windows\system\MEX.exe NBQ.exe File created C:\windows\system\OQD.exe GRUUK.exe File created C:\windows\system\OIHRYCP.exe.bat JRXZFHW.exe File created C:\windows\GJDWHS.exe RTC.exe File created C:\windows\AND.exe JXP.exe File created C:\windows\PKYGIVL.exe.bat QZN.exe File opened for modification C:\windows\system\YCFZYD.exe QXASNF.exe File created C:\windows\RHJJG.exe.bat PULTRFY.exe File opened for modification C:\windows\MDCDVHA.exe PKYGIVL.exe File created C:\windows\ATNWNP.exe.bat YVMCP.exe File created C:\windows\WCWTIJM.exe MKU.exe File created C:\windows\SVR.exe.bat FKANZ.exe File created C:\windows\system\XUMJG.exe LCFY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 1448 2304 WerFault.exe 87 1584 1352 WerFault.exe 95 4704 4660 WerFault.exe 101 4464 1744 WerFault.exe 106 4064 4940 WerFault.exe 111 4788 2936 WerFault.exe 116 3216 2108 WerFault.exe 121 2476 4884 WerFault.exe 126 4872 4056 WerFault.exe 131 1516 3832 WerFault.exe 137 2100 2792 WerFault.exe 146 2308 2996 WerFault.exe 151 4600 3164 WerFault.exe 157 4952 3136 WerFault.exe 162 2236 2272 WerFault.exe 168 3684 4244 WerFault.exe 173 4868 2188 WerFault.exe 178 2304 5096 WerFault.exe 184 3392 4960 WerFault.exe 189 4524 1288 WerFault.exe 194 3252 3340 WerFault.exe 200 1448 1516 WerFault.exe 205 4612 3420 WerFault.exe 210 2536 2360 WerFault.exe 215 4452 928 WerFault.exe 220 3196 3684 WerFault.exe 225 1408 4704 WerFault.exe 230 3068 3764 WerFault.exe 235 1224 2188 WerFault.exe 240 1720 1968 WerFault.exe 244 3372 692 WerFault.exe 250 2252 1272 WerFault.exe 255 1656 4832 WerFault.exe 260 3256 2992 WerFault.exe 265 4976 4852 WerFault.exe 270 4556 864 WerFault.exe 274 3372 2676 WerFault.exe 280 4728 4940 WerFault.exe 285 4960 1216 WerFault.exe 290 2424 3052 WerFault.exe 296 672 1224 WerFault.exe 301 2876 928 WerFault.exe 306 4552 2300 WerFault.exe 311 2572 3496 WerFault.exe 316 952 4968 WerFault.exe 321 992 3860 WerFault.exe 325 2444 4696 WerFault.exe 331 1724 964 WerFault.exe 336 2188 5112 WerFault.exe 341 2572 4628 WerFault.exe 346 2248 2252 WerFault.exe 351 2236 3712 WerFault.exe 356 1376 3296 WerFault.exe 361 3212 4396 WerFault.exe 366 3252 1224 WerFault.exe 371 4856 2188 WerFault.exe 376 3256 2572 WerFault.exe 381 4120 4040 WerFault.exe 386 2056 2444 WerFault.exe 391 4728 1564 WerFault.exe 396 4420 1620 WerFault.exe 401 3388 3252 WerFault.exe 406 764 4968 WerFault.exe 411 2308 4244 WerFault.exe 416 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2304 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 2304 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 1352 DTEH.exe 1352 DTEH.exe 4660 VWXIXL.exe 4660 VWXIXL.exe 1744 HHH.exe 1744 HHH.exe 4940 BFVGWBW.exe 4940 BFVGWBW.exe 2936 MYEG.exe 2936 MYEG.exe 2108 UBUBX.exe 2108 UBUBX.exe 4884 FPIOYC.exe 4884 FPIOYC.exe 4056 JXP.exe 4056 JXP.exe 3832 AND.exe 3832 AND.exe 2792 XONMRLN.exe 2792 XONMRLN.exe 2996 LTZH.exe 2996 LTZH.exe 3164 NRAJR.exe 3164 NRAJR.exe 3136 QZN.exe 3136 QZN.exe 2272 PKYGIVL.exe 2272 PKYGIVL.exe 4244 MDCDVHA.exe 4244 MDCDVHA.exe 2188 PLDRCC.exe 2188 PLDRCC.exe 5096 LCFY.exe 5096 LCFY.exe 4960 XUMJG.exe 4960 XUMJG.exe 1288 OCBGS.exe 1288 OCBGS.exe 3340 WSK.exe 3340 WSK.exe 1516 NBQ.exe 1516 NBQ.exe 3420 MEX.exe 3420 MEX.exe 2360 GRUUK.exe 2360 GRUUK.exe 928 OQD.exe 928 OQD.exe 3684 UQK.exe 3684 UQK.exe 4704 ODW.exe 4704 ODW.exe 2188 SUG.exe 2188 SUG.exe 1968 FMUCWDU.exe 1968 FMUCWDU.exe 692 JMTLMVD.exe 692 JMTLMVD.exe 1272 JAXQFX.exe 1272 JAXQFX.exe 4832 JOYUUM.exe 4832 JOYUUM.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2304 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 2304 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 1352 DTEH.exe 1352 DTEH.exe 4660 VWXIXL.exe 4660 VWXIXL.exe 1744 HHH.exe 1744 HHH.exe 4940 BFVGWBW.exe 4940 BFVGWBW.exe 2936 MYEG.exe 2936 MYEG.exe 2108 UBUBX.exe 2108 UBUBX.exe 4884 FPIOYC.exe 4884 FPIOYC.exe 4056 JXP.exe 4056 JXP.exe 3832 AND.exe 3832 AND.exe 2792 XONMRLN.exe 2792 XONMRLN.exe 2996 LTZH.exe 2996 LTZH.exe 3164 NRAJR.exe 3164 NRAJR.exe 3136 QZN.exe 3136 QZN.exe 2272 PKYGIVL.exe 2272 PKYGIVL.exe 4244 MDCDVHA.exe 4244 MDCDVHA.exe 2188 PLDRCC.exe 2188 PLDRCC.exe 5096 LCFY.exe 5096 LCFY.exe 4960 XUMJG.exe 4960 XUMJG.exe 1288 OCBGS.exe 1288 OCBGS.exe 3340 WSK.exe 3340 WSK.exe 1516 NBQ.exe 1516 NBQ.exe 3420 MEX.exe 3420 MEX.exe 2360 GRUUK.exe 2360 GRUUK.exe 928 OQD.exe 928 OQD.exe 3684 UQK.exe 3684 UQK.exe 4704 ODW.exe 4704 ODW.exe 2188 SUG.exe 2188 SUG.exe 1968 FMUCWDU.exe 1968 FMUCWDU.exe 692 JMTLMVD.exe 692 JMTLMVD.exe 1272 JAXQFX.exe 1272 JAXQFX.exe 4832 JOYUUM.exe 4832 JOYUUM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 3420 2304 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 91 PID 2304 wrote to memory of 3420 2304 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 91 PID 2304 wrote to memory of 3420 2304 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 91 PID 3420 wrote to memory of 1352 3420 cmd.exe 95 PID 3420 wrote to memory of 1352 3420 cmd.exe 95 PID 3420 wrote to memory of 1352 3420 cmd.exe 95 PID 1352 wrote to memory of 3136 1352 DTEH.exe 97 PID 1352 wrote to memory of 3136 1352 DTEH.exe 97 PID 1352 wrote to memory of 3136 1352 DTEH.exe 97 PID 3136 wrote to memory of 4660 3136 cmd.exe 101 PID 3136 wrote to memory of 4660 3136 cmd.exe 101 PID 3136 wrote to memory of 4660 3136 cmd.exe 101 PID 4660 wrote to memory of 5012 4660 VWXIXL.exe 102 PID 4660 wrote to memory of 5012 4660 VWXIXL.exe 102 PID 4660 wrote to memory of 5012 4660 VWXIXL.exe 102 PID 5012 wrote to memory of 1744 5012 cmd.exe 106 PID 5012 wrote to memory of 1744 5012 cmd.exe 106 PID 5012 wrote to memory of 1744 5012 cmd.exe 106 PID 1744 wrote to memory of 992 1744 HHH.exe 107 PID 1744 wrote to memory of 992 1744 HHH.exe 107 PID 1744 wrote to memory of 992 1744 HHH.exe 107 PID 992 wrote to memory of 4940 992 cmd.exe 111 PID 992 wrote to memory of 4940 992 cmd.exe 111 PID 992 wrote to memory of 4940 992 cmd.exe 111 PID 4940 wrote to memory of 3308 4940 BFVGWBW.exe 112 PID 4940 wrote to memory of 3308 4940 BFVGWBW.exe 112 PID 4940 wrote to memory of 3308 4940 BFVGWBW.exe 112 PID 3308 wrote to memory of 2936 3308 cmd.exe 116 PID 3308 wrote to memory of 2936 3308 cmd.exe 116 PID 3308 wrote to memory of 2936 3308 cmd.exe 116 PID 2936 wrote to memory of 4208 2936 MYEG.exe 148 PID 2936 wrote to memory of 4208 2936 MYEG.exe 148 PID 2936 wrote to memory of 4208 2936 MYEG.exe 148 PID 4208 wrote to memory of 2108 4208 cmd.exe 121 PID 4208 wrote to memory of 2108 4208 cmd.exe 121 PID 4208 wrote to memory of 2108 4208 cmd.exe 121 PID 2108 wrote to memory of 836 2108 UBUBX.exe 153 PID 2108 wrote to memory of 836 2108 UBUBX.exe 153 PID 2108 wrote to memory of 836 2108 UBUBX.exe 153 PID 836 wrote to memory of 4884 836 cmd.exe 126 PID 836 wrote to memory of 4884 836 cmd.exe 126 PID 836 wrote to memory of 4884 836 cmd.exe 126 PID 4884 wrote to memory of 4120 4884 FPIOYC.exe 127 PID 4884 wrote to memory of 4120 4884 FPIOYC.exe 127 PID 4884 wrote to memory of 4120 4884 FPIOYC.exe 127 PID 4120 wrote to memory of 4056 4120 cmd.exe 131 PID 4120 wrote to memory of 4056 4120 cmd.exe 131 PID 4120 wrote to memory of 4056 4120 cmd.exe 131 PID 4056 wrote to memory of 4700 4056 JXP.exe 165 PID 4056 wrote to memory of 4700 4056 JXP.exe 165 PID 4056 wrote to memory of 4700 4056 JXP.exe 165 PID 4700 wrote to memory of 3832 4700 cmd.exe 137 PID 4700 wrote to memory of 3832 4700 cmd.exe 137 PID 4700 wrote to memory of 3832 4700 cmd.exe 137 PID 3832 wrote to memory of 5104 3832 AND.exe 141 PID 3832 wrote to memory of 5104 3832 AND.exe 141 PID 3832 wrote to memory of 5104 3832 AND.exe 141 PID 5104 wrote to memory of 2792 5104 cmd.exe 146 PID 5104 wrote to memory of 2792 5104 cmd.exe 146 PID 5104 wrote to memory of 2792 5104 cmd.exe 146 PID 2792 wrote to memory of 4208 2792 XONMRLN.exe 148 PID 2792 wrote to memory of 4208 2792 XONMRLN.exe 148 PID 2792 wrote to memory of 4208 2792 XONMRLN.exe 148 PID 4208 wrote to memory of 2996 4208 cmd.exe 187
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe"C:\Users\Admin\AppData\Local\Temp\1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DTEH.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\windows\system\DTEH.exeC:\windows\system\DTEH.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VWXIXL.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\windows\system\VWXIXL.exeC:\windows\system\VWXIXL.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HHH.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\windows\SysWOW64\HHH.exeC:\windows\system32\HHH.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BFVGWBW.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\windows\SysWOW64\BFVGWBW.exeC:\windows\system32\BFVGWBW.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MYEG.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\windows\system\MYEG.exeC:\windows\system\MYEG.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UBUBX.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\windows\system\UBUBX.exeC:\windows\system\UBUBX.exe13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FPIOYC.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\windows\system\FPIOYC.exeC:\windows\system\FPIOYC.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JXP.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\windows\JXP.exeC:\windows\JXP.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AND.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\windows\AND.exeC:\windows\AND.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XONMRLN.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\windows\SysWOW64\XONMRLN.exeC:\windows\system32\XONMRLN.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LTZH.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\windows\system\LTZH.exeC:\windows\system\LTZH.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NRAJR.exe.bat" "24⤵PID:836
-
C:\windows\NRAJR.exeC:\windows\NRAJR.exe25⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QZN.exe.bat" "26⤵PID:3480
-
C:\windows\system\QZN.exeC:\windows\system\QZN.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PKYGIVL.exe.bat" "28⤵PID:3872
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV129⤵PID:4700
-
-
C:\windows\PKYGIVL.exeC:\windows\PKYGIVL.exe29⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MDCDVHA.exe.bat" "30⤵PID:2580
-
C:\windows\MDCDVHA.exeC:\windows\MDCDVHA.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PLDRCC.exe.bat" "32⤵PID:3320
-
C:\windows\PLDRCC.exeC:\windows\PLDRCC.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LCFY.exe.bat" "34⤵PID:4984
-
C:\windows\LCFY.exeC:\windows\LCFY.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XUMJG.exe.bat" "36⤵PID:5092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV137⤵PID:2996
-
-
C:\windows\system\XUMJG.exeC:\windows\system\XUMJG.exe37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OCBGS.exe.bat" "38⤵PID:1168
-
C:\windows\system\OCBGS.exeC:\windows\system\OCBGS.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WSK.exe.bat" "40⤵PID:1968
-
C:\windows\system\WSK.exeC:\windows\system\WSK.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NBQ.exe.bat" "42⤵PID:4004
-
C:\windows\SysWOW64\NBQ.exeC:\windows\system32\NBQ.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MEX.exe.bat" "44⤵PID:4820
-
C:\windows\system\MEX.exeC:\windows\system\MEX.exe45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GRUUK.exe.bat" "46⤵PID:3644
-
C:\windows\system\GRUUK.exeC:\windows\system\GRUUK.exe47⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OQD.exe.bat" "48⤵PID:3740
-
C:\windows\system\OQD.exeC:\windows\system\OQD.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UQK.exe.bat" "50⤵PID:4960
-
C:\windows\UQK.exeC:\windows\UQK.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ODW.exe.bat" "52⤵PID:2792
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:4984
-
-
C:\windows\SysWOW64\ODW.exeC:\windows\system32\ODW.exe53⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZGHI.exe.bat" "54⤵PID:1208
-
C:\windows\system\ZGHI.exeC:\windows\system\ZGHI.exe55⤵
- Checks computer location settings
- Executes dropped EXE
PID:3764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SUG.exe.bat" "56⤵PID:2724
-
C:\windows\SUG.exeC:\windows\SUG.exe57⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FMUCWDU.exe.bat" "58⤵PID:672
-
C:\windows\FMUCWDU.exeC:\windows\FMUCWDU.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JMTLMVD.exe.bat" "60⤵PID:3552
-
C:\windows\JMTLMVD.exeC:\windows\JMTLMVD.exe61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JAXQFX.exe.bat" "62⤵PID:2572
-
C:\windows\system\JAXQFX.exeC:\windows\system\JAXQFX.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1272 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JOYUUM.exe.bat" "64⤵PID:4536
-
C:\windows\system\JOYUUM.exeC:\windows\system\JOYUUM.exe65⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\EUL.exe.bat" "66⤵PID:4476
-
C:\windows\system\EUL.exeC:\windows\system\EUL.exe67⤵
- Checks computer location settings
- Executes dropped EXE
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FSSHPU.exe.bat" "68⤵PID:1724
-
C:\windows\FSSHPU.exeC:\windows\FSSHPU.exe69⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VHTQYCW.exe.bat" "70⤵PID:3252
-
C:\windows\system\VHTQYCW.exeC:\windows\system\VHTQYCW.exe71⤵
- Checks computer location settings
- Executes dropped EXE
PID:864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EASUC.exe.bat" "72⤵PID:624
-
C:\windows\SysWOW64\EASUC.exeC:\windows\system32\EASUC.exe73⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JRXZFHW.exe.bat" "74⤵PID:4244
-
C:\windows\system\JRXZFHW.exeC:\windows\system\JRXZFHW.exe75⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OIHRYCP.exe.bat" "76⤵PID:3460
-
C:\windows\system\OIHRYCP.exeC:\windows\system\OIHRYCP.exe77⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WGIHN.exe.bat" "78⤵PID:4024
-
C:\windows\system\WGIHN.exeC:\windows\system\WGIHN.exe79⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YKWQJSN.exe.bat" "80⤵PID:3764
-
C:\windows\SysWOW64\YKWQJSN.exeC:\windows\system32\YKWQJSN.exe81⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DEXER.exe.bat" "82⤵PID:1208
-
C:\windows\SysWOW64\DEXER.exeC:\windows\system32\DEXER.exe83⤵
- Checks computer location settings
- Executes dropped EXE
PID:928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OWPE.exe.bat" "84⤵PID:3212
-
C:\windows\OWPE.exeC:\windows\OWPE.exe85⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KXR.exe.bat" "86⤵PID:4208
-
C:\windows\system\KXR.exeC:\windows\system\KXR.exe87⤵
- Checks computer location settings
- Executes dropped EXE
PID:3496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WNKG.exe.bat" "88⤵PID:3384
-
C:\windows\WNKG.exeC:\windows\WNKG.exe89⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YVMCP.exe.bat" "90⤵PID:2676
-
C:\windows\SysWOW64\YVMCP.exeC:\windows\system32\YVMCP.exe91⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ATNWNP.exe.bat" "92⤵PID:4268
-
C:\windows\ATNWNP.exeC:\windows\ATNWNP.exe93⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HOYNK.exe.bat" "94⤵PID:4904
-
C:\windows\SysWOW64\HOYNK.exeC:\windows\system32\HOYNK.exe95⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QXASNF.exe.bat" "96⤵PID:1728
-
C:\windows\QXASNF.exeC:\windows\QXASNF.exe97⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:5112 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YCFZYD.exe.bat" "98⤵PID:4600
-
C:\windows\system\YCFZYD.exeC:\windows\system\YCFZYD.exe99⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TIZ.exe.bat" "100⤵PID:3120
-
C:\windows\TIZ.exeC:\windows\TIZ.exe101⤵
- Checks computer location settings
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YDRLS.exe.bat" "102⤵PID:3244
-
C:\windows\system\YDRLS.exeC:\windows\system\YDRLS.exe103⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BRJUMD.exe.bat" "104⤵PID:3388
-
C:\windows\BRJUMD.exeC:\windows\BRJUMD.exe105⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SZXSYU.exe.bat" "106⤵PID:4120
-
C:\windows\system\SZXSYU.exeC:\windows\system\SZXSYU.exe107⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RKAIH.exe.bat" "108⤵PID:3384
-
C:\windows\RKAIH.exeC:\windows\RKAIH.exe109⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AIUJS.exe.bat" "110⤵PID:4016
-
C:\windows\SysWOW64\AIUJS.exeC:\windows\system32\AIUJS.exe111⤵
- Checks computer location settings
- Executes dropped EXE
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HNNEZY.exe.bat" "112⤵PID:4688
-
C:\windows\HNNEZY.exeC:\windows\HNNEZY.exe113⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LYY.exe.bat" "114⤵PID:992
-
C:\windows\LYY.exeC:\windows\LYY.exe115⤵
- Checks computer location settings
- Executes dropped EXE
PID:4040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FBV.exe.bat" "116⤵PID:4948
-
C:\windows\system\FBV.exeC:\windows\system\FBV.exe117⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IKWL.exe.bat" "118⤵PID:4380
-
C:\windows\SysWOW64\IKWL.exeC:\windows\system32\IKWL.exe119⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SCALV.exe.bat" "120⤵PID:3304
-
C:\windows\SCALV.exeC:\windows\SCALV.exe121⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MDHWM.exe.bat" "122⤵PID:3340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-