Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe
Resource
win10v2004-20240226-en
General
-
Target
8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe
-
Size
256KB
-
MD5
f9c1b9ef4892f43440f0ca209ba2ccea
-
SHA1
43b77bb94b2b5c54fef498b42648b51c9263c9c4
-
SHA256
8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3
-
SHA512
80b064c90019d9e5bb15d515d514173de1c677b599ab5a300b054dade96733555fd093b5510fb1d3e60765ac93b63bc50465527bfd715c7320217d32f130b3ee
-
SSDEEP
6144:Q+XSCgM6BtL7o5zePpxiFzxkEjiPISUOgW9X+h8:3wMKtL8MPpxi/kmZzcui
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation TVWMVC.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation CSAV.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation NFOU.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation QLYGNP.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation DIX.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation WVLK.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation KGFTRV.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation BMMWY.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation NLSC.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation CSIYI.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation BSSFSYJ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation EXKP.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation PTAKG.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ASYSH.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation AKD.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation FREKGDX.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation HLP.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation DBFT.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation EBRFD.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ZXRMR.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation HMV.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation STAFPWX.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation IXIBV.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation RKTL.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ZNXCBCP.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ENBWL.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation EAF.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation LBNSQ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation SOAQORU.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation MHS.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation GBYIZ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation QEERI.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation LASBHU.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation SGHMS.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation CTJGQR.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation LRZM.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation LFC.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation YSUZQVZ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation KGSKL.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation LPODS.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation CGBHEBP.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation NDPNWJF.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation WTVE.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation HMY.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation GZZWNIW.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation PAVI.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation NMFLY.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation UVEICCI.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation LQZ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ATVE.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation EUL.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ERPC.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation PXOX.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation HQFJKJ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation DIH.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation CCNZJ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation PLLKZE.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation OPUKC.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation FZIKOT.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation IXPXW.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation QFFZMJE.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation UNMH.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation GVXYGC.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation TZQVU.exe -
Executes dropped EXE 64 IoCs
pid Process 2484 TVWMVC.exe 4568 BIASYA.exe 3588 SGHMS.exe 876 XJDS.exe 2452 HHRN.exe 1928 SZUXV.exe 2224 PAVI.exe 2544 ASYSH.exe 3000 EAF.exe 3972 EEXLVEN.exe 832 CTJGQR.exe 4076 BMMWY.exe 3744 AXWMHDF.exe 4468 EFDULV.exe 4504 XTO.exe 5052 VRCCHX.exe 3720 LBNSQ.exe 3248 HMV.exe 1140 FZUR.exe 3796 AKD.exe 2560 IQP.exe 1228 MGWWM.exe 3216 LRZM.exe 1840 WJCFDG.exe 3304 FREKGDX.exe 1752 LSLY.exe 1052 CSAV.exe 4044 KGSKL.exe 4440 ONLKZN.exe 1448 NYJIYA.exe 1580 PWPUOI.exe 412 SRGEZ.exe 4024 BSI.exe 628 LPODS.exe 1424 KAZL.exe 4060 EOVDDV.exe 4360 SYMTRY.exe 1144 HON.exe 2704 LETTK.exe 1624 CFIYXDB.exe 684 NXLRXK.exe 4584 QGM.exe 3152 NLSC.exe 432 CGBHEBP.exe 1952 ABA.exe 3232 VMJGPH.exe 2472 OPUKC.exe 3360 JSD.exe 868 JGD.exe 4356 WIL.exe 4484 ORNTK.exe 3152 MRVGTXY.exe 2840 DRX.exe 1840 LFC.exe 1660 NDPNWJF.exe 4460 GVXYGC.exe 1824 SOAQORU.exe 4276 STAFPWX.exe 1132 CRGZXFG.exe 4292 VJVKOGO.exe 4488 CAW.exe 3000 RVFOGO.exe 2472 BSLINW.exe 1100 LQZ.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\windows\SysWOW64\HQFJKJ.exe YDBCZK.exe File opened for modification C:\windows\SysWOW64\NJCHC.exe JGEMCWF.exe File opened for modification C:\windows\SysWOW64\DRWIAO.exe WAV.exe File opened for modification C:\windows\SysWOW64\NSS.exe XSCDFS.exe File opened for modification C:\windows\SysWOW64\FREKGDX.exe WJCFDG.exe File created C:\windows\SysWOW64\FREKGDX.exe.bat WJCFDG.exe File created C:\windows\SysWOW64\UTJHP.exe HQFJKJ.exe File opened for modification C:\windows\SysWOW64\JGEMCWF.exe BSSFSYJ.exe File created C:\windows\SysWOW64\WVEPU.exe BIZ.exe File created C:\windows\SysWOW64\UVEICCI.exe.bat XQGLV.exe File created C:\windows\SysWOW64\USDWUD.exe KUQC.exe File created C:\windows\SysWOW64\MBTTNFQ.exe VQQ.exe File created C:\windows\SysWOW64\LQZ.exe BSLINW.exe File created C:\windows\SysWOW64\UTJHP.exe.bat HQFJKJ.exe File created C:\windows\SysWOW64\JGEMCWF.exe.bat BSSFSYJ.exe File created C:\windows\SysWOW64\MWXJWUL.exe GBYIZ.exe File created C:\windows\SysWOW64\CPQDOOH.exe.bat RWNKOG.exe File created C:\windows\SysWOW64\DRWIAO.exe WAV.exe File created C:\windows\SysWOW64\KUQC.exe GMJC.exe File opened for modification C:\windows\SysWOW64\LSLY.exe FREKGDX.exe File created C:\windows\SysWOW64\DBFT.exe MQPV.exe File created C:\windows\SysWOW64\WTVE.exe DBFT.exe File created C:\windows\SysWOW64\NMFLY.exe HMY.exe File created C:\windows\SysWOW64\NJCHC.exe JGEMCWF.exe File created C:\windows\SysWOW64\WJCFDG.exe.bat LRZM.exe File created C:\windows\SysWOW64\LFC.exe DRX.exe File created C:\windows\SysWOW64\ERPC.exe UTJHP.exe File created C:\windows\SysWOW64\ERPC.exe.bat UTJHP.exe File created C:\windows\SysWOW64\MWXJWUL.exe.bat GBYIZ.exe File created C:\windows\SysWOW64\NSS.exe XSCDFS.exe File created C:\windows\SysWOW64\LQZ.exe.bat BSLINW.exe File created C:\windows\SysWOW64\BJPFDAO.exe.bat OMP.exe File created C:\windows\SysWOW64\DRWIAO.exe.bat WAV.exe File opened for modification C:\windows\SysWOW64\YLXWEO.exe FQF.exe File opened for modification C:\windows\SysWOW64\SGHMS.exe BIASYA.exe File created C:\windows\SysWOW64\FREKGDX.exe WJCFDG.exe File opened for modification C:\windows\SysWOW64\LFC.exe DRX.exe File created C:\windows\SysWOW64\HQFJKJ.exe.bat YDBCZK.exe File created C:\windows\SysWOW64\YLXWEO.exe.bat FQF.exe File opened for modification C:\windows\SysWOW64\GDDMF.exe LQZ.exe File created C:\windows\SysWOW64\NMFLY.exe.bat HMY.exe File opened for modification C:\windows\SysWOW64\BJPFDAO.exe OMP.exe File opened for modification C:\windows\SysWOW64\USDWUD.exe KUQC.exe File created C:\windows\SysWOW64\USDWUD.exe.bat KUQC.exe File opened for modification C:\windows\SysWOW64\XSCDFS.exe BMWO.exe File created C:\windows\SysWOW64\MBTTNFQ.exe.bat VQQ.exe File created C:\windows\SysWOW64\MLUKUDM.exe WVLK.exe File opened for modification C:\windows\SysWOW64\MLUKUDM.exe WVLK.exe File created C:\windows\SysWOW64\LMQXE.exe ATVE.exe File opened for modification C:\windows\SysWOW64\UVEICCI.exe XQGLV.exe File opened for modification C:\windows\SysWOW64\CVJLHMM.exe PXBZ.exe File opened for modification C:\windows\SysWOW64\GZZWNIW.exe NWNAI.exe File opened for modification C:\windows\SysWOW64\WOY.exe HLP.exe File created C:\windows\SysWOW64\BIZ.exe RKTL.exe File opened for modification C:\windows\SysWOW64\DBFT.exe MQPV.exe File created C:\windows\SysWOW64\DBFT.exe.bat MQPV.exe File opened for modification C:\windows\SysWOW64\ESYMCNV.exe NFOU.exe File opened for modification C:\windows\SysWOW64\PLLKZE.exe ZQB.exe File opened for modification C:\windows\SysWOW64\MBTTNFQ.exe VQQ.exe File opened for modification C:\windows\SysWOW64\XJDS.exe SGHMS.exe File created C:\windows\SysWOW64\WOY.exe HLP.exe File created C:\windows\SysWOW64\RWNKOG.exe.bat UVEICCI.exe File created C:\windows\SysWOW64\KGFTRV.exe.bat PTAKG.exe File created C:\windows\SysWOW64\EFDULV.exe.bat AXWMHDF.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\system\JGD.exe.bat JSD.exe File created C:\windows\EIQVX.exe WVEPU.exe File created C:\windows\system\HCGMSWA.exe.bat EMA.exe File created C:\windows\YDBCZK.exe KFVF.exe File opened for modification C:\windows\WZWHAK.exe FZIKOT.exe File opened for modification C:\windows\system\EDMR.exe YIAY.exe File created C:\windows\TZQVU.exe.bat EUL.exe File created C:\windows\system\DHGIZO.exe VWXHTK.exe File created C:\windows\system\UNMH.exe.bat QFFZMJE.exe File opened for modification C:\windows\CGBHEBP.exe NLSC.exe File opened for modification C:\windows\DIH.exe UVWAPWP.exe File created C:\windows\system\XTO.exe EFDULV.exe File opened for modification C:\windows\system\IXIBV.exe TACEO.exe File created C:\windows\system\NWNAI.exe PLLKZE.exe File created C:\windows\system\QFFZMJE.exe DIX.exe File opened for modification C:\windows\system\MQPV.exe XLJYJQQ.exe File created C:\windows\system\OMP.exe KDJTPE.exe File created C:\windows\VQQ.exe.bat UNMH.exe File created C:\windows\system\GOX.exe LASBHU.exe File opened for modification C:\windows\system\IXPXW.exe URPLUJQ.exe File created C:\windows\DIX.exe IXPXW.exe File opened for modification C:\windows\VRCCHX.exe XTO.exe File created C:\windows\system\EMA.exe.bat DRWIAO.exe File opened for modification C:\windows\DIX.exe IXPXW.exe File created C:\windows\system\DHGIZO.exe.bat VWXHTK.exe File opened for modification C:\windows\XLJYJQQ.exe NNDMB.exe File created C:\windows\ACN.exe.bat CCNZJ.exe File created C:\windows\system\SZUXV.exe HHRN.exe File created C:\windows\system\LBNSQ.exe VRCCHX.exe File opened for modification C:\windows\HMV.exe LBNSQ.exe File created C:\windows\system\JSD.exe OPUKC.exe File opened for modification C:\windows\system\NDPNWJF.exe LFC.exe File created C:\windows\system\CZB.exe.bat VEYCQHZ.exe File created C:\windows\system\CQWMFF.exe.bat HDRV.exe File created C:\windows\system\EMA.exe DRWIAO.exe File created C:\windows\FZIKOT.exe VRGF.exe File created C:\windows\system\NYJIYA.exe ONLKZN.exe File opened for modification C:\windows\system\GABH.exe OXJV.exe File created C:\windows\DIX.exe.bat IXPXW.exe File created C:\windows\MYO.exe NJCHC.exe File created C:\windows\VMJGPH.exe ABA.exe File created C:\windows\system\ZNXCBCP.exe ACN.exe File created C:\windows\system\IXPXW.exe.bat URPLUJQ.exe File created C:\windows\HMV.exe.bat LBNSQ.exe File created C:\windows\system\ATVE.exe.bat GBFU.exe File created C:\windows\system\WVLK.exe VSHPISN.exe File opened for modification C:\windows\FQF.exe RVH.exe File opened for modification C:\windows\system\XTO.exe EFDULV.exe File created C:\windows\system\NDPNWJF.exe.bat LFC.exe File opened for modification C:\windows\system\CAW.exe VJVKOGO.exe File created C:\windows\VRGF.exe.bat CYQU.exe File created C:\windows\SRGEZ.exe PWPUOI.exe File created C:\windows\KDJTPE.exe CQWMFF.exe File created C:\windows\XRNS.exe.bat KGFTRV.exe File opened for modification C:\windows\system\GVXYGC.exe NDPNWJF.exe File created C:\windows\KDJTPE.exe.bat CQWMFF.exe File opened for modification C:\windows\WAV.exe CVJLHMM.exe File created C:\windows\system\VWI.exe SBRAMEB.exe File created C:\windows\FZUR.exe.bat HMV.exe File opened for modification C:\windows\LPODS.exe BSI.exe File opened for modification C:\windows\system\EOVDDV.exe KAZL.exe File created C:\windows\system\NNDMB.exe YSUZQVZ.exe File opened for modification C:\windows\system\ILNFEL.exe DIH.exe File opened for modification C:\windows\system\ZNXCBCP.exe ACN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 4284 1988 WerFault.exe 84 1424 2484 WerFault.exe 92 3640 4568 WerFault.exe 99 4588 3588 WerFault.exe 104 3152 876 WerFault.exe 109 3304 2452 WerFault.exe 114 3120 1928 WerFault.exe 121 4704 2224 WerFault.exe 128 4904 2544 WerFault.exe 133 4964 3000 WerFault.exe 138 3588 3972 WerFault.exe 143 868 832 WerFault.exe 149 2452 4076 WerFault.exe 154 2472 3744 WerFault.exe 159 2960 4468 WerFault.exe 166 4964 4504 WerFault.exe 170 3512 5052 WerFault.exe 176 1208 3720 WerFault.exe 181 4684 3248 WerFault.exe 186 1040 1140 WerFault.exe 191 760 3796 WerFault.exe 196 4864 2560 WerFault.exe 201 4712 1228 WerFault.exe 206 1008 3216 WerFault.exe 211 3720 1840 WerFault.exe 216 1244 3304 WerFault.exe 221 4584 1752 WerFault.exe 226 4488 1052 WerFault.exe 231 4368 4044 WerFault.exe 236 1120 4440 WerFault.exe 241 3548 1448 WerFault.exe 246 4856 1580 WerFault.exe 251 2840 412 WerFault.exe 256 2496 4024 WerFault.exe 261 4236 628 WerFault.exe 266 4088 1424 WerFault.exe 271 768 4060 WerFault.exe 277 3496 4360 WerFault.exe 282 2468 1144 WerFault.exe 287 3720 2704 WerFault.exe 292 2336 1624 WerFault.exe 297 380 684 WerFault.exe 302 4268 4584 WerFault.exe 307 1500 3152 WerFault.exe 312 3320 432 WerFault.exe 317 4280 1952 WerFault.exe 322 4756 3232 WerFault.exe 327 3528 2472 WerFault.exe 332 4568 3360 WerFault.exe 337 4248 868 WerFault.exe 342 3080 4356 WerFault.exe 347 4860 4484 WerFault.exe 352 3108 3152 WerFault.exe 357 3236 2840 WerFault.exe 362 2448 1840 WerFault.exe 367 2336 1660 WerFault.exe 372 1052 4460 WerFault.exe 377 4752 1824 WerFault.exe 382 3312 4276 WerFault.exe 387 432 1132 WerFault.exe 392 876 4292 WerFault.exe 397 4828 4488 WerFault.exe 402 3212 3000 WerFault.exe 407 3892 2472 WerFault.exe 412 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1988 8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe 1988 8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe 2484 TVWMVC.exe 2484 TVWMVC.exe 4568 BIASYA.exe 4568 BIASYA.exe 3588 SGHMS.exe 3588 SGHMS.exe 876 XJDS.exe 876 XJDS.exe 2452 HHRN.exe 2452 HHRN.exe 1928 SZUXV.exe 1928 SZUXV.exe 2224 PAVI.exe 2224 PAVI.exe 2544 ASYSH.exe 2544 ASYSH.exe 3000 EAF.exe 3000 EAF.exe 3972 EEXLVEN.exe 3972 EEXLVEN.exe 832 CTJGQR.exe 832 CTJGQR.exe 4076 BMMWY.exe 4076 BMMWY.exe 3744 AXWMHDF.exe 3744 AXWMHDF.exe 4468 EFDULV.exe 4468 EFDULV.exe 4504 XTO.exe 4504 XTO.exe 5052 VRCCHX.exe 5052 VRCCHX.exe 3720 LBNSQ.exe 3720 LBNSQ.exe 3248 HMV.exe 3248 HMV.exe 1140 FZUR.exe 1140 FZUR.exe 3796 AKD.exe 3796 AKD.exe 2560 IQP.exe 2560 IQP.exe 1228 MGWWM.exe 1228 MGWWM.exe 3216 LRZM.exe 3216 LRZM.exe 1840 WJCFDG.exe 1840 WJCFDG.exe 3304 FREKGDX.exe 3304 FREKGDX.exe 1752 LSLY.exe 1752 LSLY.exe 1052 CSAV.exe 1052 CSAV.exe 4044 KGSKL.exe 4044 KGSKL.exe 4440 ONLKZN.exe 4440 ONLKZN.exe 1448 NYJIYA.exe 1448 NYJIYA.exe 1580 PWPUOI.exe 1580 PWPUOI.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1988 8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe 1988 8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe 2484 TVWMVC.exe 2484 TVWMVC.exe 4568 BIASYA.exe 4568 BIASYA.exe 3588 SGHMS.exe 3588 SGHMS.exe 876 XJDS.exe 876 XJDS.exe 2452 HHRN.exe 2452 HHRN.exe 1928 SZUXV.exe 1928 SZUXV.exe 2224 PAVI.exe 2224 PAVI.exe 2544 ASYSH.exe 2544 ASYSH.exe 3000 EAF.exe 3000 EAF.exe 3972 EEXLVEN.exe 3972 EEXLVEN.exe 832 CTJGQR.exe 832 CTJGQR.exe 4076 BMMWY.exe 4076 BMMWY.exe 3744 AXWMHDF.exe 3744 AXWMHDF.exe 4468 EFDULV.exe 4468 EFDULV.exe 4504 XTO.exe 4504 XTO.exe 5052 VRCCHX.exe 5052 VRCCHX.exe 3720 LBNSQ.exe 3720 LBNSQ.exe 3248 HMV.exe 3248 HMV.exe 1140 FZUR.exe 1140 FZUR.exe 3796 AKD.exe 3796 AKD.exe 2560 IQP.exe 2560 IQP.exe 1228 MGWWM.exe 1228 MGWWM.exe 3216 LRZM.exe 3216 LRZM.exe 1840 WJCFDG.exe 1840 WJCFDG.exe 3304 FREKGDX.exe 3304 FREKGDX.exe 1752 LSLY.exe 1752 LSLY.exe 1052 CSAV.exe 1052 CSAV.exe 4044 KGSKL.exe 4044 KGSKL.exe 4440 ONLKZN.exe 4440 ONLKZN.exe 1448 NYJIYA.exe 1448 NYJIYA.exe 1580 PWPUOI.exe 1580 PWPUOI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1988 wrote to memory of 3120 1988 8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe 88 PID 1988 wrote to memory of 3120 1988 8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe 88 PID 1988 wrote to memory of 3120 1988 8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe 88 PID 3120 wrote to memory of 2484 3120 cmd.exe 92 PID 3120 wrote to memory of 2484 3120 cmd.exe 92 PID 3120 wrote to memory of 2484 3120 cmd.exe 92 PID 2484 wrote to memory of 4468 2484 TVWMVC.exe 95 PID 2484 wrote to memory of 4468 2484 TVWMVC.exe 95 PID 2484 wrote to memory of 4468 2484 TVWMVC.exe 95 PID 4468 wrote to memory of 4568 4468 cmd.exe 99 PID 4468 wrote to memory of 4568 4468 cmd.exe 99 PID 4468 wrote to memory of 4568 4468 cmd.exe 99 PID 4568 wrote to memory of 3992 4568 BIASYA.exe 100 PID 4568 wrote to memory of 3992 4568 BIASYA.exe 100 PID 4568 wrote to memory of 3992 4568 BIASYA.exe 100 PID 3992 wrote to memory of 3588 3992 cmd.exe 104 PID 3992 wrote to memory of 3588 3992 cmd.exe 104 PID 3992 wrote to memory of 3588 3992 cmd.exe 104 PID 3588 wrote to memory of 2232 3588 SGHMS.exe 105 PID 3588 wrote to memory of 2232 3588 SGHMS.exe 105 PID 3588 wrote to memory of 2232 3588 SGHMS.exe 105 PID 2232 wrote to memory of 876 2232 cmd.exe 109 PID 2232 wrote to memory of 876 2232 cmd.exe 109 PID 2232 wrote to memory of 876 2232 cmd.exe 109 PID 876 wrote to memory of 620 876 XJDS.exe 110 PID 876 wrote to memory of 620 876 XJDS.exe 110 PID 876 wrote to memory of 620 876 XJDS.exe 110 PID 620 wrote to memory of 2452 620 cmd.exe 114 PID 620 wrote to memory of 2452 620 cmd.exe 114 PID 620 wrote to memory of 2452 620 cmd.exe 114 PID 2452 wrote to memory of 868 2452 HHRN.exe 117 PID 2452 wrote to memory of 868 2452 HHRN.exe 117 PID 2452 wrote to memory of 868 2452 HHRN.exe 117 PID 868 wrote to memory of 1928 868 cmd.exe 121 PID 868 wrote to memory of 1928 868 cmd.exe 121 PID 868 wrote to memory of 1928 868 cmd.exe 121 PID 1928 wrote to memory of 1120 1928 SZUXV.exe 124 PID 1928 wrote to memory of 1120 1928 SZUXV.exe 124 PID 1928 wrote to memory of 1120 1928 SZUXV.exe 124 PID 1120 wrote to memory of 2224 1120 cmd.exe 128 PID 1120 wrote to memory of 2224 1120 cmd.exe 128 PID 1120 wrote to memory of 2224 1120 cmd.exe 128 PID 2224 wrote to memory of 4064 2224 PAVI.exe 129 PID 2224 wrote to memory of 4064 2224 PAVI.exe 129 PID 2224 wrote to memory of 4064 2224 PAVI.exe 129 PID 4064 wrote to memory of 2544 4064 cmd.exe 133 PID 4064 wrote to memory of 2544 4064 cmd.exe 133 PID 4064 wrote to memory of 2544 4064 cmd.exe 133 PID 2544 wrote to memory of 4956 2544 ASYSH.exe 134 PID 2544 wrote to memory of 4956 2544 ASYSH.exe 134 PID 2544 wrote to memory of 4956 2544 ASYSH.exe 134 PID 4956 wrote to memory of 3000 4956 cmd.exe 138 PID 4956 wrote to memory of 3000 4956 cmd.exe 138 PID 4956 wrote to memory of 3000 4956 cmd.exe 138 PID 3000 wrote to memory of 3196 3000 EAF.exe 139 PID 3000 wrote to memory of 3196 3000 EAF.exe 139 PID 3000 wrote to memory of 3196 3000 EAF.exe 139 PID 3196 wrote to memory of 3972 3196 cmd.exe 143 PID 3196 wrote to memory of 3972 3196 cmd.exe 143 PID 3196 wrote to memory of 3972 3196 cmd.exe 143 PID 3972 wrote to memory of 4488 3972 EEXLVEN.exe 145 PID 3972 wrote to memory of 4488 3972 EEXLVEN.exe 145 PID 3972 wrote to memory of 4488 3972 EEXLVEN.exe 145 PID 4488 wrote to memory of 832 4488 cmd.exe 149
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe"C:\Users\Admin\AppData\Local\Temp\8c7182d7b48c22b0c69d3199cae67a3f9e60bd95d8fac146bd57f2f8d62555c3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TVWMVC.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\windows\system\TVWMVC.exeC:\windows\system\TVWMVC.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BIASYA.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\windows\BIASYA.exeC:\windows\BIASYA.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SGHMS.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\windows\SysWOW64\SGHMS.exeC:\windows\system32\SGHMS.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XJDS.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\windows\SysWOW64\XJDS.exeC:\windows\system32\XJDS.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HHRN.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:620 -
C:\windows\HHRN.exeC:\windows\HHRN.exe11⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SZUXV.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:868 -
C:\windows\system\SZUXV.exeC:\windows\system\SZUXV.exe13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PAVI.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\windows\system\PAVI.exeC:\windows\system\PAVI.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ASYSH.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\windows\system\ASYSH.exeC:\windows\system\ASYSH.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EAF.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\windows\SysWOW64\EAF.exeC:\windows\system32\EAF.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EEXLVEN.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\windows\EEXLVEN.exeC:\windows\EEXLVEN.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CTJGQR.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\windows\system\CTJGQR.exeC:\windows\system\CTJGQR.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BMMWY.exe.bat" "24⤵PID:1972
-
C:\windows\system\BMMWY.exeC:\windows\system\BMMWY.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AXWMHDF.exe.bat" "26⤵PID:4024
-
C:\windows\system\AXWMHDF.exeC:\windows\system\AXWMHDF.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EFDULV.exe.bat" "28⤵PID:4476
-
C:\windows\SysWOW64\EFDULV.exeC:\windows\system32\EFDULV.exe29⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XTO.exe.bat" "30⤵PID:4280
-
C:\windows\system\XTO.exeC:\windows\system\XTO.exe31⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VRCCHX.exe.bat" "32⤵PID:3016
-
C:\windows\VRCCHX.exeC:\windows\VRCCHX.exe33⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LBNSQ.exe.bat" "34⤵PID:2828
-
C:\windows\system\LBNSQ.exeC:\windows\system\LBNSQ.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HMV.exe.bat" "36⤵PID:3392
-
C:\windows\HMV.exeC:\windows\HMV.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FZUR.exe.bat" "38⤵PID:3336
-
C:\windows\FZUR.exeC:\windows\FZUR.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AKD.exe.bat" "40⤵PID:2468
-
C:\windows\SysWOW64\AKD.exeC:\windows\system32\AKD.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IQP.exe.bat" "42⤵PID:1552
-
C:\windows\IQP.exeC:\windows\IQP.exe43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MGWWM.exe.bat" "44⤵PID:2336
-
C:\windows\system\MGWWM.exeC:\windows\system\MGWWM.exe45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LRZM.exe.bat" "46⤵PID:2828
-
C:\windows\system\LRZM.exeC:\windows\system\LRZM.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WJCFDG.exe.bat" "48⤵PID:3848
-
C:\windows\SysWOW64\WJCFDG.exeC:\windows\system32\WJCFDG.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FREKGDX.exe.bat" "50⤵PID:2912
-
C:\windows\SysWOW64\FREKGDX.exeC:\windows\system32\FREKGDX.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LSLY.exe.bat" "52⤵PID:4552
-
C:\windows\SysWOW64\LSLY.exeC:\windows\system32\LSLY.exe53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CSAV.exe.bat" "54⤵PID:4520
-
C:\windows\SysWOW64\CSAV.exeC:\windows\system32\CSAV.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KGSKL.exe.bat" "56⤵PID:684
-
C:\windows\system\KGSKL.exeC:\windows\system\KGSKL.exe57⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ONLKZN.exe.bat" "58⤵PID:3268
-
C:\windows\ONLKZN.exeC:\windows\ONLKZN.exe59⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NYJIYA.exe.bat" "60⤵PID:5044
-
C:\windows\system\NYJIYA.exeC:\windows\system\NYJIYA.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PWPUOI.exe.bat" "62⤵PID:2556
-
C:\windows\PWPUOI.exeC:\windows\PWPUOI.exe63⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SRGEZ.exe.bat" "64⤵PID:2928
-
C:\windows\SRGEZ.exeC:\windows\SRGEZ.exe65⤵
- Executes dropped EXE
PID:412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BSI.exe.bat" "66⤵PID:3248
-
C:\windows\system\BSI.exeC:\windows\system\BSI.exe67⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LPODS.exe.bat" "68⤵PID:1040
-
C:\windows\LPODS.exeC:\windows\LPODS.exe69⤵
- Checks computer location settings
- Executes dropped EXE
PID:628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KAZL.exe.bat" "70⤵PID:1752
-
C:\windows\SysWOW64\KAZL.exeC:\windows\system32\KAZL.exe71⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\EOVDDV.exe.bat" "72⤵PID:4608
-
C:\windows\system\EOVDDV.exeC:\windows\system\EOVDDV.exe73⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SYMTRY.exe.bat" "74⤵PID:4676
-
C:\windows\SysWOW64\SYMTRY.exeC:\windows\system32\SYMTRY.exe75⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HON.exe.bat" "76⤵PID:4276
-
C:\windows\HON.exeC:\windows\HON.exe77⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LETTK.exe.bat" "78⤵PID:2504
-
C:\windows\SysWOW64\LETTK.exeC:\windows\system32\LETTK.exe79⤵
- Executes dropped EXE
PID:2704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CFIYXDB.exe.bat" "80⤵PID:3640
-
C:\windows\system\CFIYXDB.exeC:\windows\system\CFIYXDB.exe81⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NXLRXK.exe.bat" "82⤵PID:1968
-
C:\windows\system\NXLRXK.exeC:\windows\system\NXLRXK.exe83⤵
- Executes dropped EXE
PID:684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QGM.exe.bat" "84⤵PID:1572
-
C:\windows\SysWOW64\QGM.exeC:\windows\system32\QGM.exe85⤵
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NLSC.exe.bat" "86⤵PID:2420
-
C:\windows\system\NLSC.exeC:\windows\system\NLSC.exe87⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CGBHEBP.exe.bat" "88⤵PID:4484
-
C:\windows\CGBHEBP.exeC:\windows\CGBHEBP.exe89⤵
- Checks computer location settings
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ABA.exe.bat" "90⤵PID:1208
-
C:\windows\system\ABA.exeC:\windows\system\ABA.exe91⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VMJGPH.exe.bat" "92⤵PID:4304
-
C:\windows\VMJGPH.exeC:\windows\VMJGPH.exe93⤵
- Executes dropped EXE
PID:3232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OPUKC.exe.bat" "94⤵PID:928
-
C:\windows\system\OPUKC.exeC:\windows\system\OPUKC.exe95⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JSD.exe.bat" "96⤵PID:4856
-
C:\windows\system\JSD.exeC:\windows\system\JSD.exe97⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JGD.exe.bat" "98⤵PID:912
-
C:\windows\system\JGD.exeC:\windows\system\JGD.exe99⤵
- Executes dropped EXE
PID:868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WIL.exe.bat" "100⤵PID:3936
-
C:\windows\WIL.exeC:\windows\WIL.exe101⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ORNTK.exe.bat" "102⤵PID:3588
-
C:\windows\system\ORNTK.exeC:\windows\system\ORNTK.exe103⤵
- Executes dropped EXE
PID:4484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MRVGTXY.exe.bat" "104⤵PID:2600
-
C:\windows\system\MRVGTXY.exeC:\windows\system\MRVGTXY.exe105⤵
- Executes dropped EXE
PID:3152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DRX.exe.bat" "106⤵PID:4060
-
C:\windows\system\DRX.exeC:\windows\system\DRX.exe107⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LFC.exe.bat" "108⤵PID:4620
-
C:\windows\SysWOW64\LFC.exeC:\windows\system32\LFC.exe109⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NDPNWJF.exe.bat" "110⤵PID:2120
-
C:\windows\system\NDPNWJF.exeC:\windows\system\NDPNWJF.exe111⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GVXYGC.exe.bat" "112⤵PID:3512
-
C:\windows\system\GVXYGC.exeC:\windows\system\GVXYGC.exe113⤵
- Checks computer location settings
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SOAQORU.exe.bat" "114⤵PID:1228
-
C:\windows\SysWOW64\SOAQORU.exeC:\windows\system32\SOAQORU.exe115⤵
- Checks computer location settings
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\STAFPWX.exe.bat" "116⤵PID:4728
-
C:\windows\system\STAFPWX.exeC:\windows\system\STAFPWX.exe117⤵
- Checks computer location settings
- Executes dropped EXE
PID:4276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CRGZXFG.exe.bat" "118⤵PID:2560
-
C:\windows\SysWOW64\CRGZXFG.exeC:\windows\system32\CRGZXFG.exe119⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VJVKOGO.exe.bat" "120⤵PID:2444
-
C:\windows\VJVKOGO.exeC:\windows\VJVKOGO.exe121⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CAW.exe.bat" "122⤵PID:3148
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-