Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
165s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe
Resource
win10v2004-20240226-en
General
-
Target
aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe
-
Size
320KB
-
MD5
8595e2ca3dc56d16c38d4f140c039748
-
SHA1
db425e51f9ea205dd6a58ec6e40b498ffec32b88
-
SHA256
aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4
-
SHA512
95dd167479694ea8e54e30d9a87098190ba727e8341b14d7a34a3d9d67ec75b1a424a8bfefae66968cb86e90c2faeaa51116be30ffdc9b477b11dd45a039b63d
-
SSDEEP
6144:hmd9Vmi7m+pbKbvP4uqHkEjWbjcSbcY+CA:hmdKwpbq1IkFbzs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation DVXY.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation MOI.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation YUB.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation JRD.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation YGVSP.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation DYWUB.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation VEBLS.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation RVTWXUL.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation APDIADM.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation MYB.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation XFLJN.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation NOV.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation VRWOHWI.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation TFFDS.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation IED.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation GFLHNG.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation ANFJCW.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation XHGBAZR.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation BAOKZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation WZOEV.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation VNVWWN.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation VGIIRU.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation TTQMTB.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation PKCAL.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation HRRHRF.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation ITIJLKX.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation MRHQN.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation TNQAE.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation JNQTUXM.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation RQNWE.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation TLYMYUA.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation EVLDAFK.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation UAP.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation LEX.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation NFOU.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation IHYQUPS.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation XAVHE.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation ZFUPCR.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation OZZYP.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation PJFMKI.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation LSEPTGY.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation UQLJOV.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation LASXIK.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation SDVAV.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation QJXRFB.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation YRULS.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation JYWRO.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation JSJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation LMHQZXF.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation TTGQRJN.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation MOAZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation ERS.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation NDGFWMR.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation FRUQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation FEOUG.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation BGJUFL.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation JNJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation SEQDK.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation JFBRK.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation ICBSG.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation GZQRHOO.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation HHKQNOE.exe Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation QAREA.exe -
Executes dropped EXE 64 IoCs
pid Process 2924 FWCWG.exe 4344 DVXY.exe 1620 DYWUB.exe 4924 FRUQ.exe 1668 WZOEV.exe 2884 MPBNLJ.exe 672 VNVWWN.exe 2028 GFLHNG.exe 1636 VGIIRU.exe 1080 FEOUG.exe 672 MRHQN.exe 1540 ANFJCW.exe 1872 ODZH.exe 456 BGJUFL.exe 1132 LEX.exe 2884 QJXRFB.exe 1596 JNJ.exe 2396 XAVHE.exe 2584 SOAQORU.exe 2108 LMHQZXF.exe 400 YWYON.exe 1872 RVTWXUL.exe 2168 OAL.exe 1612 MEK.exe 848 ICBSG.exe 3600 YIAY.exe 4648 TTGQRJN.exe 1636 DPIIN.exe 4568 GZQRHOO.exe 992 TNQAE.exe 4888 VMPD.exe 404 HHKQNOE.exe 1036 ZFUPCR.exe 2508 APDIADM.exe 1368 QAREA.exe 3056 MYB.exe 3684 EBHM.exe 3308 OZZYP.exe 3500 NFOU.exe 4360 FCGGLKJ.exe 2976 JNQTUXM.exe 2140 RQNWE.exe 5044 MOI.exe 2028 YUB.exe 448 XFLJN.exe 1396 TLYMYUA.exe 5040 NOV.exe 1568 GBGIWNK.exe 3104 VRWOHWI.exe 5032 UPXEWNR.exe 4436 FYELON.exe 4796 TTQMTB.exe 872 JRD.exe 4336 SXGHL.exe 1048 IILCX.exe 3776 XEJVMU.exe 1936 EVLDAFK.exe 812 PJFMKI.exe 1984 XHGBAZR.exe 1396 UAP.exe 4656 BEOHVVE.exe 2884 IPD.exe 2548 MOAZ.exe 3008 YGVSP.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\VRWOHWI.exe GBGIWNK.exe File created C:\windows\SysWOW64\IILCX.exe.bat SXGHL.exe File opened for modification C:\windows\SysWOW64\SOAQORU.exe XAVHE.exe File opened for modification C:\windows\SysWOW64\OAL.exe RVTWXUL.exe File opened for modification C:\windows\SysWOW64\YRULS.exe UQLJOV.exe File created C:\windows\SysWOW64\MPBNLJ.exe WZOEV.exe File created C:\windows\SysWOW64\VGIIRU.exe GFLHNG.exe File created C:\windows\SysWOW64\VRWOHWI.exe.bat GBGIWNK.exe File opened for modification C:\windows\SysWOW64\EVLDAFK.exe XEJVMU.exe File opened for modification C:\windows\SysWOW64\JYWRO.exe XQD.exe File created C:\windows\SysWOW64\OAL.exe.bat RVTWXUL.exe File created C:\windows\SysWOW64\JJQLFO.exe YRULS.exe File opened for modification C:\windows\SysWOW64\JFBRK.exe BAOKZ.exe File created C:\windows\SysWOW64\FRUQ.exe DYWUB.exe File opened for modification C:\windows\SysWOW64\XFLJN.exe YUB.exe File created C:\windows\SysWOW64\XFLJN.exe.bat YUB.exe File created C:\windows\SysWOW64\YRULS.exe UQLJOV.exe File created C:\windows\SysWOW64\FRUQ.exe.bat DYWUB.exe File created C:\windows\SysWOW64\LMHQZXF.exe SOAQORU.exe File opened for modification C:\windows\SysWOW64\UQLJOV.exe LSEPTGY.exe File created C:\windows\SysWOW64\ICBSG.exe.bat MEK.exe File opened for modification C:\windows\SysWOW64\UPXEWNR.exe VRWOHWI.exe File created C:\windows\SysWOW64\ANFJCW.exe.bat MRHQN.exe File created C:\windows\SysWOW64\GZQRHOO.exe DPIIN.exe File created C:\windows\SysWOW64\GZQRHOO.exe.bat DPIIN.exe File opened for modification C:\windows\SysWOW64\IILCX.exe SXGHL.exe File opened for modification C:\windows\SysWOW64\LMHQZXF.exe SOAQORU.exe File created C:\windows\SysWOW64\SEQDK.exe IHYQUPS.exe File opened for modification C:\windows\SysWOW64\SDVAV.exe JFBRK.exe File created C:\windows\SysWOW64\MPBNLJ.exe.bat WZOEV.exe File opened for modification C:\windows\SysWOW64\ANFJCW.exe MRHQN.exe File opened for modification C:\windows\SysWOW64\TFFDS.exe LASXIK.exe File created C:\windows\SysWOW64\TFFDS.exe.bat LASXIK.exe File opened for modification C:\windows\SysWOW64\VRWOHWI.exe GBGIWNK.exe File created C:\windows\SysWOW64\WZOEV.exe.bat FRUQ.exe File opened for modification C:\windows\SysWOW64\VGIIRU.exe GFLHNG.exe File created C:\windows\SysWOW64\JYWRO.exe.bat XQD.exe File created C:\windows\SysWOW64\EVLDAFK.exe XEJVMU.exe File created C:\windows\SysWOW64\VEBLS.exe KYLVQZN.exe File created C:\windows\SysWOW64\VEBLS.exe.bat KYLVQZN.exe File created C:\windows\SysWOW64\UQLJOV.exe LSEPTGY.exe File opened for modification C:\windows\SysWOW64\FRUQ.exe DYWUB.exe File created C:\windows\SysWOW64\FEOUG.exe.bat VGIIRU.exe File opened for modification C:\windows\SysWOW64\GZQRHOO.exe DPIIN.exe File opened for modification C:\windows\SysWOW64\RCNPDGV.exe VEBLS.exe File created C:\windows\SysWOW64\UPXEWNR.exe VRWOHWI.exe File created C:\windows\SysWOW64\YRULS.exe.bat UQLJOV.exe File created C:\windows\SysWOW64\MOAZ.exe.bat IPD.exe File created C:\windows\SysWOW64\RCNPDGV.exe.bat VEBLS.exe File created C:\windows\SysWOW64\JYWRO.exe XQD.exe File created C:\windows\SysWOW64\FEOUG.exe VGIIRU.exe File created C:\windows\SysWOW64\XEJVMU.exe.bat IILCX.exe File created C:\windows\SysWOW64\TFFDS.exe LASXIK.exe File created C:\windows\SysWOW64\YIAY.exe.bat ICBSG.exe File created C:\windows\SysWOW64\IILCX.exe SXGHL.exe File opened for modification C:\windows\SysWOW64\VEBLS.exe KYLVQZN.exe File opened for modification C:\windows\SysWOW64\JJQLFO.exe YRULS.exe File created C:\windows\SysWOW64\WZOEV.exe FRUQ.exe File opened for modification C:\windows\SysWOW64\FEOUG.exe VGIIRU.exe File created C:\windows\SysWOW64\HUTBO.exe.bat JJQLFO.exe File created C:\windows\SysWOW64\SDVAV.exe.bat JFBRK.exe File opened for modification C:\windows\SysWOW64\WZOEV.exe FRUQ.exe File opened for modification C:\windows\SysWOW64\SEQDK.exe IHYQUPS.exe File created C:\windows\SysWOW64\UAP.exe.bat XHGBAZR.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\system\FCGGLKJ.exe.bat NFOU.exe File created C:\windows\TLYMYUA.exe XFLJN.exe File opened for modification C:\windows\system\KYLVQZN.exe PKCAL.exe File created C:\windows\IHYQUPS.exe.bat HRRHRF.exe File opened for modification C:\windows\system\GQTC.exe RCNPDGV.exe File created C:\windows\system\HRRHRF.exe.bat FBV.exe File created C:\windows\system\VNVWWN.exe.bat MPBNLJ.exe File created C:\windows\QAREA.exe APDIADM.exe File created C:\windows\MYB.exe.bat QAREA.exe File created C:\windows\SXGHL.exe.bat JRD.exe File created C:\windows\JRD.exe TTQMTB.exe File created C:\windows\QJXRFB.exe.bat LEX.exe File opened for modification C:\windows\APDIADM.exe ZFUPCR.exe File created C:\windows\QAREA.exe.bat APDIADM.exe File created C:\windows\system\RQNWE.exe.bat JNQTUXM.exe File created C:\windows\system\PJFMKI.exe EVLDAFK.exe File created C:\windows\system\ERS.exe.bat YGVSP.exe File created C:\windows\system\BAOKZ.exe IED.exe File created C:\windows\ITIJLKX.exe SDVAV.exe File created C:\windows\APDIADM.exe.bat ZFUPCR.exe File opened for modification C:\windows\MYB.exe QAREA.exe File opened for modification C:\windows\GBGIWNK.exe NOV.exe File created C:\windows\system\TTQMTB.exe FYELON.exe File opened for modification C:\windows\system\LEX.exe BGJUFL.exe File created C:\windows\system\MEK.exe OAL.exe File created C:\windows\DPIIN.exe.bat TTGQRJN.exe File created C:\windows\ZFUPCR.exe.bat HHKQNOE.exe File opened for modification C:\windows\PKCAL.exe ERS.exe File opened for modification C:\windows\IHYQUPS.exe HRRHRF.exe File opened for modification C:\windows\system\TTQMTB.exe FYELON.exe File opened for modification C:\windows\XAVHE.exe JNJ.exe File opened for modification C:\windows\HHKQNOE.exe VMPD.exe File created C:\windows\HHKQNOE.exe.bat VMPD.exe File created C:\windows\TLYMYUA.exe.bat XFLJN.exe File created C:\windows\system\FYELON.exe UPXEWNR.exe File created C:\windows\PKCAL.exe.bat ERS.exe File opened for modification C:\windows\LSEPTGY.exe SEQDK.exe File created C:\windows\MRHQN.exe FEOUG.exe File created C:\windows\system\ODZH.exe.bat ANFJCW.exe File created C:\windows\VMPD.exe.bat TNQAE.exe File opened for modification C:\windows\QAREA.exe APDIADM.exe File created C:\windows\YUB.exe.bat MOI.exe File created C:\windows\BEOHVVE.exe.bat UAP.exe File created C:\windows\system\JSJ.exe.bat NDGFWMR.exe File created C:\windows\DVXY.exe FWCWG.exe File created C:\windows\system\VNVWWN.exe MPBNLJ.exe File opened for modification C:\windows\BGJUFL.exe ODZH.exe File opened for modification C:\windows\EBHM.exe MYB.exe File opened for modification C:\windows\QJXRFB.exe LEX.exe File created C:\windows\BEOHVVE.exe UAP.exe File created C:\windows\system\BAOKZ.exe.bat IED.exe File created C:\windows\system\KYLVQZN.exe.bat PKCAL.exe File opened for modification C:\windows\NDGFWMR.exe SROET.exe File created C:\windows\TNQAE.exe GZQRHOO.exe File created C:\windows\APDIADM.exe ZFUPCR.exe File created C:\windows\system\TTQMTB.exe.bat FYELON.exe File created C:\windows\system\ERS.exe YGVSP.exe File created C:\windows\SROET.exe ITIJLKX.exe File created C:\windows\system\FWCWG.exe.bat aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe File created C:\windows\XAVHE.exe.bat JNJ.exe File opened for modification C:\windows\TNQAE.exe GZQRHOO.exe File opened for modification C:\windows\XHGBAZR.exe PJFMKI.exe File created C:\windows\EBHM.exe MYB.exe File created C:\windows\system\FCGGLKJ.exe NFOU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 5048 3644 WerFault.exe 94 3092 2924 WerFault.exe 101 3480 4344 WerFault.exe 108 3764 1620 WerFault.exe 113 1208 4924 WerFault.exe 118 4240 1668 WerFault.exe 124 3772 2884 WerFault.exe 129 5076 672 WerFault.exe 134 3640 2028 WerFault.exe 139 824 1636 WerFault.exe 146 3028 1080 WerFault.exe 153 3680 672 WerFault.exe 159 1636 1540 WerFault.exe 164 364 1872 WerFault.exe 169 1044 456 WerFault.exe 174 4024 1132 WerFault.exe 180 372 2884 WerFault.exe 185 3600 1596 WerFault.exe 192 1132 2396 WerFault.exe 196 1612 2584 WerFault.exe 202 1132 2108 WerFault.exe 207 2868 400 WerFault.exe 212 1120 1872 WerFault.exe 217 404 2168 WerFault.exe 222 1956 1612 WerFault.exe 226 3384 1636 WerFault.exe 245 876 4568 WerFault.exe 251 676 992 WerFault.exe 256 3856 4888 WerFault.exe 261 3776 404 WerFault.exe 266 5008 1036 WerFault.exe 271 3500 2508 WerFault.exe 276 2640 1368 WerFault.exe 281 4104 3056 WerFault.exe 286 1960 3684 WerFault.exe 291 992 3308 WerFault.exe 296 2548 3500 WerFault.exe 301 400 4360 WerFault.exe 306 5032 2976 WerFault.exe 311 1604 2140 WerFault.exe 316 1036 5044 WerFault.exe 321 2736 2028 WerFault.exe 326 2616 448 WerFault.exe 331 2544 1396 WerFault.exe 336 3696 5040 WerFault.exe 341 2792 1568 WerFault.exe 346 4404 3104 WerFault.exe 351 1608 5032 WerFault.exe 356 1232 4436 WerFault.exe 361 2868 4796 WerFault.exe 366 448 872 WerFault.exe 372 3768 4336 WerFault.exe 377 660 1048 WerFault.exe 382 1384 3776 WerFault.exe 387 224 1936 WerFault.exe 393 2028 812 WerFault.exe 398 4880 1984 WerFault.exe 403 2508 1396 WerFault.exe 408 1188 4656 WerFault.exe 413 4392 2884 WerFault.exe 418 1048 2548 WerFault.exe 422 4316 3008 WerFault.exe 428 2180 4124 WerFault.exe 433 3744 2428 WerFault.exe 438 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3644 aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe 3644 aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe 2924 FWCWG.exe 2924 FWCWG.exe 4344 DVXY.exe 4344 DVXY.exe 1620 DYWUB.exe 1620 DYWUB.exe 4924 FRUQ.exe 4924 FRUQ.exe 1668 WZOEV.exe 1668 WZOEV.exe 2884 MPBNLJ.exe 2884 MPBNLJ.exe 672 VNVWWN.exe 672 VNVWWN.exe 2028 GFLHNG.exe 2028 GFLHNG.exe 1636 VGIIRU.exe 1636 VGIIRU.exe 1080 FEOUG.exe 1080 FEOUG.exe 672 MRHQN.exe 672 MRHQN.exe 1540 ANFJCW.exe 1540 ANFJCW.exe 1872 ODZH.exe 1872 ODZH.exe 456 BGJUFL.exe 456 BGJUFL.exe 1132 LEX.exe 1132 LEX.exe 2884 QJXRFB.exe 2884 QJXRFB.exe 1596 JNJ.exe 1596 JNJ.exe 2396 XAVHE.exe 2396 XAVHE.exe 2584 SOAQORU.exe 2584 SOAQORU.exe 2108 LMHQZXF.exe 2108 LMHQZXF.exe 400 YWYON.exe 400 YWYON.exe 1872 RVTWXUL.exe 1872 RVTWXUL.exe 2168 OAL.exe 2168 OAL.exe 1612 MEK.exe 1612 MEK.exe 848 ICBSG.exe 848 ICBSG.exe 3600 YIAY.exe 3600 YIAY.exe 4648 TTGQRJN.exe 4648 TTGQRJN.exe 1636 DPIIN.exe 1636 DPIIN.exe 4568 GZQRHOO.exe 4568 GZQRHOO.exe 992 TNQAE.exe 992 TNQAE.exe 4888 VMPD.exe 4888 VMPD.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3644 aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe 3644 aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe 2924 FWCWG.exe 2924 FWCWG.exe 4344 DVXY.exe 4344 DVXY.exe 1620 DYWUB.exe 1620 DYWUB.exe 4924 FRUQ.exe 4924 FRUQ.exe 1668 WZOEV.exe 1668 WZOEV.exe 2884 MPBNLJ.exe 2884 MPBNLJ.exe 672 VNVWWN.exe 672 VNVWWN.exe 2028 GFLHNG.exe 2028 GFLHNG.exe 1636 VGIIRU.exe 1636 VGIIRU.exe 1080 FEOUG.exe 1080 FEOUG.exe 672 MRHQN.exe 672 MRHQN.exe 1540 ANFJCW.exe 1540 ANFJCW.exe 1872 ODZH.exe 1872 ODZH.exe 456 BGJUFL.exe 456 BGJUFL.exe 1132 LEX.exe 1132 LEX.exe 2884 QJXRFB.exe 2884 QJXRFB.exe 1596 JNJ.exe 1596 JNJ.exe 2396 XAVHE.exe 2396 XAVHE.exe 2584 SOAQORU.exe 2584 SOAQORU.exe 2108 LMHQZXF.exe 2108 LMHQZXF.exe 400 YWYON.exe 400 YWYON.exe 1872 RVTWXUL.exe 1872 RVTWXUL.exe 2168 OAL.exe 2168 OAL.exe 1612 MEK.exe 1612 MEK.exe 848 ICBSG.exe 848 ICBSG.exe 3600 YIAY.exe 3600 YIAY.exe 4648 TTGQRJN.exe 4648 TTGQRJN.exe 1636 DPIIN.exe 1636 DPIIN.exe 4568 GZQRHOO.exe 4568 GZQRHOO.exe 992 TNQAE.exe 992 TNQAE.exe 4888 VMPD.exe 4888 VMPD.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3644 wrote to memory of 1796 3644 aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe 98 PID 3644 wrote to memory of 1796 3644 aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe 98 PID 3644 wrote to memory of 1796 3644 aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe 98 PID 1796 wrote to memory of 2924 1796 cmd.exe 101 PID 1796 wrote to memory of 2924 1796 cmd.exe 101 PID 1796 wrote to memory of 2924 1796 cmd.exe 101 PID 2924 wrote to memory of 3500 2924 FWCWG.exe 104 PID 2924 wrote to memory of 3500 2924 FWCWG.exe 104 PID 2924 wrote to memory of 3500 2924 FWCWG.exe 104 PID 3500 wrote to memory of 4344 3500 cmd.exe 108 PID 3500 wrote to memory of 4344 3500 cmd.exe 108 PID 3500 wrote to memory of 4344 3500 cmd.exe 108 PID 4344 wrote to memory of 824 4344 DVXY.exe 109 PID 4344 wrote to memory of 824 4344 DVXY.exe 109 PID 4344 wrote to memory of 824 4344 DVXY.exe 109 PID 824 wrote to memory of 1620 824 cmd.exe 113 PID 824 wrote to memory of 1620 824 cmd.exe 113 PID 824 wrote to memory of 1620 824 cmd.exe 113 PID 1620 wrote to memory of 3680 1620 DYWUB.exe 114 PID 1620 wrote to memory of 3680 1620 DYWUB.exe 114 PID 1620 wrote to memory of 3680 1620 DYWUB.exe 114 PID 3680 wrote to memory of 4924 3680 cmd.exe 118 PID 3680 wrote to memory of 4924 3680 cmd.exe 118 PID 3680 wrote to memory of 4924 3680 cmd.exe 118 PID 4924 wrote to memory of 4976 4924 FRUQ.exe 137 PID 4924 wrote to memory of 4976 4924 FRUQ.exe 137 PID 4924 wrote to memory of 4976 4924 FRUQ.exe 137 PID 4976 wrote to memory of 1668 4976 cmd.exe 124 PID 4976 wrote to memory of 1668 4976 cmd.exe 124 PID 4976 wrote to memory of 1668 4976 cmd.exe 124 PID 1668 wrote to memory of 2952 1668 WZOEV.exe 125 PID 1668 wrote to memory of 2952 1668 WZOEV.exe 125 PID 1668 wrote to memory of 2952 1668 WZOEV.exe 125 PID 2952 wrote to memory of 2884 2952 cmd.exe 129 PID 2952 wrote to memory of 2884 2952 cmd.exe 129 PID 2952 wrote to memory of 2884 2952 cmd.exe 129 PID 2884 wrote to memory of 4876 2884 MPBNLJ.exe 130 PID 2884 wrote to memory of 4876 2884 MPBNLJ.exe 130 PID 2884 wrote to memory of 4876 2884 MPBNLJ.exe 130 PID 4876 wrote to memory of 672 4876 cmd.exe 159 PID 4876 wrote to memory of 672 4876 cmd.exe 159 PID 4876 wrote to memory of 672 4876 cmd.exe 159 PID 672 wrote to memory of 1080 672 VNVWWN.exe 153 PID 672 wrote to memory of 1080 672 VNVWWN.exe 153 PID 672 wrote to memory of 1080 672 VNVWWN.exe 153 PID 1080 wrote to memory of 2028 1080 cmd.exe 139 PID 1080 wrote to memory of 2028 1080 cmd.exe 139 PID 1080 wrote to memory of 2028 1080 cmd.exe 139 PID 2028 wrote to memory of 1208 2028 GFLHNG.exe 155 PID 2028 wrote to memory of 1208 2028 GFLHNG.exe 155 PID 2028 wrote to memory of 1208 2028 GFLHNG.exe 155 PID 1208 wrote to memory of 1636 1208 cmd.exe 168 PID 1208 wrote to memory of 1636 1208 cmd.exe 168 PID 1208 wrote to memory of 1636 1208 cmd.exe 168 PID 1636 wrote to memory of 4532 1636 VGIIRU.exe 149 PID 1636 wrote to memory of 4532 1636 VGIIRU.exe 149 PID 1636 wrote to memory of 4532 1636 VGIIRU.exe 149 PID 4532 wrote to memory of 1080 4532 cmd.exe 153 PID 4532 wrote to memory of 1080 4532 cmd.exe 153 PID 4532 wrote to memory of 1080 4532 cmd.exe 153 PID 1080 wrote to memory of 4344 1080 FEOUG.exe 154 PID 1080 wrote to memory of 4344 1080 FEOUG.exe 154 PID 1080 wrote to memory of 4344 1080 FEOUG.exe 154 PID 4344 wrote to memory of 672 4344 cmd.exe 159
Processes
-
C:\Users\Admin\AppData\Local\Temp\aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe"C:\Users\Admin\AppData\Local\Temp\aebcd4f236369977e1c6fd9307eca7beff9f405d788f6a158ffe4a4a8870d8c4.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FWCWG.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\windows\system\FWCWG.exeC:\windows\system\FWCWG.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DVXY.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\windows\DVXY.exeC:\windows\DVXY.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DYWUB.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\windows\system\DYWUB.exeC:\windows\system\DYWUB.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FRUQ.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\windows\SysWOW64\FRUQ.exeC:\windows\system32\FRUQ.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WZOEV.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\windows\SysWOW64\WZOEV.exeC:\windows\system32\WZOEV.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MPBNLJ.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\windows\SysWOW64\MPBNLJ.exeC:\windows\system32\MPBNLJ.exe13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VNVWWN.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\windows\system\VNVWWN.exeC:\windows\system\VNVWWN.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GFLHNG.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV117⤵PID:4976
-
-
C:\windows\system\GFLHNG.exeC:\windows\system\GFLHNG.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VGIIRU.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\windows\SysWOW64\VGIIRU.exeC:\windows\system32\VGIIRU.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FEOUG.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\windows\SysWOW64\FEOUG.exeC:\windows\system32\FEOUG.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MRHQN.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\windows\MRHQN.exeC:\windows\MRHQN.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ANFJCW.exe.bat" "24⤵PID:2884
-
C:\windows\SysWOW64\ANFJCW.exeC:\windows\system32\ANFJCW.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ODZH.exe.bat" "26⤵PID:1232
-
C:\windows\system\ODZH.exeC:\windows\system\ODZH.exe27⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BGJUFL.exe.bat" "28⤵PID:1132
-
C:\windows\BGJUFL.exeC:\windows\BGJUFL.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LEX.exe.bat" "30⤵PID:4988
-
C:\windows\system\LEX.exeC:\windows\system\LEX.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QJXRFB.exe.bat" "32⤵PID:2924
-
C:\windows\QJXRFB.exeC:\windows\QJXRFB.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JNJ.exe.bat" "34⤵PID:3140
-
C:\windows\SysWOW64\JNJ.exeC:\windows\system32\JNJ.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XAVHE.exe.bat" "36⤵PID:4024
-
C:\windows\XAVHE.exeC:\windows\XAVHE.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SOAQORU.exe.bat" "38⤵PID:364
-
C:\windows\SysWOW64\SOAQORU.exeC:\windows\system32\SOAQORU.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LMHQZXF.exe.bat" "40⤵PID:992
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV141⤵PID:2924
-
-
C:\windows\SysWOW64\LMHQZXF.exeC:\windows\system32\LMHQZXF.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YWYON.exe.bat" "42⤵PID:5076
-
C:\windows\system\YWYON.exeC:\windows\system\YWYON.exe43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RVTWXUL.exe.bat" "44⤵PID:1248
-
C:\windows\RVTWXUL.exeC:\windows\RVTWXUL.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OAL.exe.bat" "46⤵PID:1100
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV147⤵PID:1596
-
-
C:\windows\SysWOW64\OAL.exeC:\windows\system32\OAL.exe47⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MEK.exe.bat" "48⤵PID:2236
-
C:\windows\system\MEK.exeC:\windows\system\MEK.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ICBSG.exe.bat" "50⤵PID:4860
-
C:\windows\SysWOW64\ICBSG.exeC:\windows\system32\ICBSG.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YIAY.exe.bat" "52⤵PID:1604
-
C:\windows\SysWOW64\YIAY.exeC:\windows\system32\YIAY.exe53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TTGQRJN.exe.bat" "54⤵PID:1788
-
C:\windows\system\TTGQRJN.exeC:\windows\system\TTGQRJN.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DPIIN.exe.bat" "56⤵PID:4104
-
C:\windows\DPIIN.exeC:\windows\DPIIN.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GZQRHOO.exe.bat" "58⤵PID:4048
-
C:\windows\SysWOW64\GZQRHOO.exeC:\windows\system32\GZQRHOO.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TNQAE.exe.bat" "60⤵PID:1788
-
C:\windows\TNQAE.exeC:\windows\TNQAE.exe61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VMPD.exe.bat" "62⤵PID:2616
-
C:\windows\VMPD.exeC:\windows\VMPD.exe63⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HHKQNOE.exe.bat" "64⤵PID:4632
-
C:\windows\HHKQNOE.exeC:\windows\HHKQNOE.exe65⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZFUPCR.exe.bat" "66⤵PID:4124
-
C:\windows\ZFUPCR.exeC:\windows\ZFUPCR.exe67⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\APDIADM.exe.bat" "68⤵PID:1260
-
C:\windows\APDIADM.exeC:\windows\APDIADM.exe69⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QAREA.exe.bat" "70⤵PID:3028
-
C:\windows\QAREA.exeC:\windows\QAREA.exe71⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MYB.exe.bat" "72⤵PID:3768
-
C:\windows\MYB.exeC:\windows\MYB.exe73⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EBHM.exe.bat" "74⤵PID:1788
-
C:\windows\EBHM.exeC:\windows\EBHM.exe75⤵
- Executes dropped EXE
PID:3684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OZZYP.exe.bat" "76⤵PID:1544
-
C:\windows\OZZYP.exeC:\windows\OZZYP.exe77⤵
- Checks computer location settings
- Executes dropped EXE
PID:3308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NFOU.exe.bat" "78⤵PID:1080
-
C:\windows\system\NFOU.exeC:\windows\system\NFOU.exe79⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FCGGLKJ.exe.bat" "80⤵PID:404
-
C:\windows\system\FCGGLKJ.exeC:\windows\system\FCGGLKJ.exe81⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JNQTUXM.exe.bat" "82⤵PID:2992
-
C:\windows\SysWOW64\JNQTUXM.exeC:\windows\system32\JNQTUXM.exe83⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RQNWE.exe.bat" "84⤵PID:4964
-
C:\windows\system\RQNWE.exeC:\windows\system\RQNWE.exe85⤵
- Checks computer location settings
- Executes dropped EXE
PID:2140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MOI.exe.bat" "86⤵PID:3300
-
C:\windows\MOI.exeC:\windows\MOI.exe87⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:5044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YUB.exe.bat" "88⤵PID:4568
-
C:\windows\YUB.exeC:\windows\YUB.exe89⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XFLJN.exe.bat" "90⤵PID:1372
-
C:\windows\SysWOW64\XFLJN.exeC:\windows\system32\XFLJN.exe91⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TLYMYUA.exe.bat" "92⤵PID:4544
-
C:\windows\TLYMYUA.exeC:\windows\TLYMYUA.exe93⤵
- Checks computer location settings
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NOV.exe.bat" "94⤵PID:1960
-
C:\windows\NOV.exeC:\windows\NOV.exe95⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:5040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GBGIWNK.exe.bat" "96⤵PID:3028
-
C:\windows\GBGIWNK.exeC:\windows\GBGIWNK.exe97⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VRWOHWI.exe.bat" "98⤵PID:3856
-
C:\windows\SysWOW64\VRWOHWI.exeC:\windows\system32\VRWOHWI.exe99⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UPXEWNR.exe.bat" "100⤵PID:2416
-
C:\windows\SysWOW64\UPXEWNR.exeC:\windows\system32\UPXEWNR.exe101⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FYELON.exe.bat" "102⤵PID:2244
-
C:\windows\system\FYELON.exeC:\windows\system\FYELON.exe103⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TTQMTB.exe.bat" "104⤵PID:3652
-
C:\windows\system\TTQMTB.exeC:\windows\system\TTQMTB.exe105⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JRD.exe.bat" "106⤵PID:2612
-
C:\windows\JRD.exeC:\windows\JRD.exe107⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SXGHL.exe.bat" "108⤵PID:544
-
C:\windows\SXGHL.exeC:\windows\SXGHL.exe109⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IILCX.exe.bat" "110⤵PID:1536
-
C:\windows\SysWOW64\IILCX.exeC:\windows\system32\IILCX.exe111⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XEJVMU.exe.bat" "112⤵PID:4476
-
C:\windows\SysWOW64\XEJVMU.exeC:\windows\system32\XEJVMU.exe113⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EVLDAFK.exe.bat" "114⤵PID:3008
-
C:\windows\SysWOW64\EVLDAFK.exeC:\windows\system32\EVLDAFK.exe115⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PJFMKI.exe.bat" "116⤵PID:5008
-
C:\windows\system\PJFMKI.exeC:\windows\system\PJFMKI.exe117⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XHGBAZR.exe.bat" "118⤵PID:956
-
C:\windows\XHGBAZR.exeC:\windows\XHGBAZR.exe119⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UAP.exe.bat" "120⤵PID:3344
-
C:\windows\SysWOW64\UAP.exeC:\windows\system32\UAP.exe121⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BEOHVVE.exe.bat" "122⤵PID:1568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-