Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 23:05
Static task
static1
Behavioral task
behavioral1
Sample
9db15425411b48afe0d8e5ae56f647b2.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
9db15425411b48afe0d8e5ae56f647b2.exe
Resource
win10v2004-20240226-en
General
-
Target
9db15425411b48afe0d8e5ae56f647b2.exe
-
Size
208KB
-
MD5
9db15425411b48afe0d8e5ae56f647b2
-
SHA1
218f8049aaf1bc4a3f2b79147a72495965cfc0c4
-
SHA256
9f0d6526f9ef0200194801a1cbb5578e22a3dc30cded11f5a093e73a50489f0f
-
SHA512
e51ac2d8e0f471152f46b967f6558f120392cb69bf499477230178f67b9e7347ea6d84fa12d3fedc870ee0f87b4c962daae98cf143c2eb41c3c33361b93af79a
-
SSDEEP
3072:LjP3Xywnj68OY3eZrq8gRcXZcRqG6gzEhKqfXII6z4NLthEjQT67:f3X5OHY3eZrqRGkqcqA/zQEj9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation RJPZ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation OVON.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation CNYY.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation 9db15425411b48afe0d8e5ae56f647b2.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation OGS.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation KVLRR.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation SPUPKH.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation JODRYY.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation AZUIH.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation UHQQQBA.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation AXUNCO.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ZRYW.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation AEEISLQ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation GMBVR.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation FOKCAU.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ZGIHHT.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation YULRGVW.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation LJNXU.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation GGWIIF.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation VYORZEC.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation DGHH.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation OZC.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation QKNT.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation NTZNVRR.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation NYGY.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation KZI.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation AFOOIR.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation OMDB.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation SNMMWK.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation LQXGKVP.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation NZEAMI.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation TSGBBOW.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation FBN.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation HPLUBFF.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation VOZGQZ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation OWFWYMN.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation QJSEDCE.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation YLKGXQA.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation HYO.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation CHOSZ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation PIYICTZ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation KTU.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation IPCSUSN.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation MZUM.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation XBXB.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation HFQCSM.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation AKUISF.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation BFFEXF.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation UKYPV.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation GNP.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation OPGFOKJ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation SUJB.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation LLIBIC.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation YOFKOI.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation GENYU.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation PDCZT.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation BHBE.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ULWKK.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation ABUWG.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation OOPUAQ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation OEGKV.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation FSQSNCA.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation FLZKKJ.exe Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation YUQ.exe -
Executes dropped EXE 64 IoCs
pid Process 952 FUZ.exe 1360 LPL.exe 1220 AKUISF.exe 4832 SNMMWK.exe 4296 AXUNCO.exe 4648 LQXGKVP.exe 3664 NTZNVRR.exe 2140 XBB.exe 2852 REYY.exe 2408 VHWTZGR.exe 548 WKN.exe 1372 LAAGV.exe 3900 YGA.exe 4444 VMG.exe 4708 ZRYW.exe 4320 VZSEFMC.exe 624 MPRPJFS.exe 2880 FSQSNCA.exe 3008 UNNFPD.exe 3900 FLZKKJ.exe 1124 XGQO.exe 4012 FBN.exe 3720 GEXP.exe 3036 NZU.exe 624 RPO.exe 3676 RZX.exe 4564 YUUXDJU.exe 4784 YYMZNUD.exe 1804 HYO.exe 3360 JTA.exe 2092 LJNXU.exe 4948 HPLUBFF.exe 2148 LFFCE.exe 4808 SAKO.exe 4516 AGPV.exe 4016 GGWIIF.exe 3316 TRNH.exe 4896 AEEISLQ.exe 2092 UZJR.exe 2608 EXJET.exe 4052 NXLRXK.exe 2244 OAPMK.exe 1464 JOUWMAH.exe 4320 UGP.exe 3244 NZEAMI.exe 4896 TZMN.exe 2680 CHOSZ.exe 3332 EFHVFX.exe 3900 OKR.exe 1772 JQRYXFN.exe 5024 NYGY.exe 2232 KZI.exe 228 GENYU.exe 1784 PKYQKI.exe 5048 OUOOJC.exe 4700 BFFEXF.exe 464 JTJTI.exe 3380 IEUBRSJ.exe 536 KBAVYAR.exe 1540 QCHJ.exe 4788 KPMSRU.exe 3716 SUEHTHK.exe 3908 TXDDHQM.exe 4884 BLHJSPI.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\windows\SysWOW64\BFFEXF.exe OUOOJC.exe File created C:\windows\SysWOW64\TXDDHQM.exe.bat SUEHTHK.exe File created C:\windows\SysWOW64\VIOYC.exe PNPXXMZ.exe File created C:\windows\SysWOW64\GEXP.exe.bat FBN.exe File created C:\windows\SysWOW64\AGPV.exe.bat SAKO.exe File created C:\windows\SysWOW64\JQRYXFN.exe OKR.exe File created C:\windows\SysWOW64\KVLRR.exe LLIBIC.exe File created C:\windows\SysWOW64\EFHVFX.exe CHOSZ.exe File created C:\windows\SysWOW64\BHBE.exe.bat IPTT.exe File opened for modification C:\windows\SysWOW64\GNP.exe SHPB.exe File opened for modification C:\windows\SysWOW64\FLZKKJ.exe UNNFPD.exe File opened for modification C:\windows\SysWOW64\JLTYO.exe JBKXB.exe File created C:\windows\SysWOW64\OHWXJ.exe.bat OEGKV.exe File created C:\windows\SysWOW64\ABUWG.exe GNP.exe File opened for modification C:\windows\SysWOW64\OGS.exe YQRER.exe File created C:\windows\SysWOW64\OWJGO.exe ZGIHHT.exe File created C:\windows\SysWOW64\JLTYO.exe JBKXB.exe File created C:\windows\SysWOW64\MVOWEUS.exe TCYLVTK.exe File opened for modification C:\windows\SysWOW64\AXUNCO.exe SNMMWK.exe File opened for modification C:\windows\SysWOW64\GENYU.exe KZI.exe File opened for modification C:\windows\SysWOW64\TXDDHQM.exe SUEHTHK.exe File created C:\windows\SysWOW64\SNMMWK.exe.bat AKUISF.exe File created C:\windows\SysWOW64\IEUBRSJ.exe.bat JTJTI.exe File opened for modification C:\windows\SysWOW64\BLHJSPI.exe TXDDHQM.exe File created C:\windows\SysWOW64\MZUM.exe IJOMCG.exe File created C:\windows\SysWOW64\OWJGO.exe.bat ZGIHHT.exe File opened for modification C:\windows\SysWOW64\OHWXJ.exe OEGKV.exe File opened for modification C:\windows\SysWOW64\FBN.exe XGQO.exe File created C:\windows\SysWOW64\JQRYXFN.exe.bat OKR.exe File created C:\windows\SysWOW64\SHPB.exe.bat BHBE.exe File created C:\windows\SysWOW64\JOUWMAH.exe OAPMK.exe File opened for modification C:\windows\SysWOW64\AITUAVL.exe VHJ.exe File created C:\windows\SysWOW64\BHBE.exe IPTT.exe File created C:\windows\SysWOW64\UFRZBBD.exe.bat UZRKZOI.exe File opened for modification C:\windows\SysWOW64\VHWTZGR.exe REYY.exe File created C:\windows\SysWOW64\LJNXU.exe JTA.exe File created C:\windows\SysWOW64\LJNXU.exe.bat JTA.exe File created C:\windows\SysWOW64\UHDS.exe XGB.exe File created C:\windows\SysWOW64\CBRO.exe.bat YLKGXQA.exe File opened for modification C:\windows\SysWOW64\OQX.exe VXI.exe File created C:\windows\SysWOW64\HDHMZGG.exe GAERL.exe File created C:\windows\SysWOW64\IPCSUSN.exe ACPMKUR.exe File created C:\windows\SysWOW64\VHWTZGR.exe.bat REYY.exe File opened for modification C:\windows\SysWOW64\UHDS.exe XGB.exe File created C:\windows\SysWOW64\YOFKOI.exe.bat QJSEDCE.exe File created C:\windows\SysWOW64\BLHJSPI.exe TXDDHQM.exe File created C:\windows\SysWOW64\LQXGKVP.exe AXUNCO.exe File created C:\windows\SysWOW64\LAAGV.exe WKN.exe File created C:\windows\SysWOW64\LAAGV.exe.bat WKN.exe File created C:\windows\SysWOW64\VDJBQHP.exe PIYICTZ.exe File opened for modification C:\windows\SysWOW64\YOFKOI.exe QJSEDCE.exe File created C:\windows\SysWOW64\UCV.exe OHWXJ.exe File created C:\windows\SysWOW64\NYGY.exe.bat JQRYXFN.exe File opened for modification C:\windows\SysWOW64\BHBE.exe IPTT.exe File opened for modification C:\windows\SysWOW64\VIOYC.exe PNPXXMZ.exe File opened for modification C:\windows\SysWOW64\XEGAFVO.exe RJPZ.exe File opened for modification C:\windows\SysWOW64\HDHMZGG.exe GAERL.exe File opened for modification C:\windows\SysWOW64\IPCSUSN.exe ACPMKUR.exe File opened for modification C:\windows\SysWOW64\OWJGO.exe ZGIHHT.exe File created C:\windows\SysWOW64\SNMMWK.exe AKUISF.exe File created C:\windows\SysWOW64\AXUNCO.exe.bat SNMMWK.exe File created C:\windows\SysWOW64\NZEAMI.exe.bat UGP.exe File created C:\windows\SysWOW64\TXDDHQM.exe SUEHTHK.exe File created C:\windows\SysWOW64\VXI.exe.bat AHH.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\system\YUUXDJU.exe.bat RZX.exe File created C:\windows\CNYY.exe.bat QKNT.exe File opened for modification C:\windows\system\UEJ.exe KGDUU.exe File created C:\windows\system\WKN.exe.bat VHWTZGR.exe File opened for modification C:\windows\system\JQUQDND.exe BLHJSPI.exe File created C:\windows\EZV.exe.bat JQUQDND.exe File opened for modification C:\windows\VTY.exe GYGND.exe File opened for modification C:\windows\system\YLKGXQA.exe FFL.exe File created C:\windows\system\XBB.exe.bat NTZNVRR.exe File created C:\windows\XIP.exe.bat RNYNNEU.exe File opened for modification C:\windows\system\AFOOIR.exe SZCIYT.exe File opened for modification C:\windows\system\QNLZ.exe OPGFOKJ.exe File created C:\windows\system\QJSEDCE.exe.bat YGOAY.exe File created C:\windows\system\QKNT.exe YBZODGC.exe File created C:\windows\system\FFL.exe.bat BPWIGW.exe File opened for modification C:\windows\system\VMG.exe YGA.exe File created C:\windows\system\NZU.exe GEXP.exe File opened for modification C:\windows\system\HYO.exe YYMZNUD.exe File opened for modification C:\windows\XIP.exe RNYNNEU.exe File opened for modification C:\windows\system\GPLVR.exe XMVICWM.exe File opened for modification C:\windows\JLYZA.exe DPNG.exe File created C:\windows\system\MKVTBV.exe.bat UKPWOE.exe File created C:\windows\KGDUU.exe CBRO.exe File opened for modification C:\windows\JZL.exe UKYPV.exe File opened for modification C:\windows\OPGFOKJ.exe ERSKZCA.exe File created C:\windows\system\BPWIGW.exe.bat XHQABD.exe File opened for modification C:\windows\system\YYMZNUD.exe YUUXDJU.exe File opened for modification C:\windows\ULWKK.exe OQX.exe File created C:\windows\system\AKUISF.exe.bat LPL.exe File created C:\windows\system\YUUXDJU.exe RZX.exe File created C:\windows\system\VYORZEC.exe PDCZT.exe File created C:\windows\JZL.exe.bat UKYPV.exe File created C:\windows\system\AFOOIR.exe.bat SZCIYT.exe File created C:\windows\system\SUJB.exe.bat OMDB.exe File created C:\windows\system\JQUQDND.exe.bat BLHJSPI.exe File created C:\windows\YUQ.exe.bat GMBVR.exe File created C:\windows\AETETL.exe.bat VDJBQHP.exe File created C:\windows\HIS.exe.bat MVOWEUS.exe File created C:\windows\system\VYORZEC.exe.bat PDCZT.exe File opened for modification C:\windows\system\DGHH.exe VOZGQZ.exe File created C:\windows\UZKON.exe.bat OZC.exe File created C:\windows\system\FOKCAU.exe.bat HDHMZGG.exe File created C:\windows\URDDLKI.exe.bat SUJB.exe File created C:\windows\PIYICTZ.exe SPWYYP.exe File opened for modification C:\windows\system\QKNT.exe YBZODGC.exe File created C:\windows\UHQQQBA.exe.bat XBXB.exe File created C:\windows\system\YYMZNUD.exe.bat YUUXDJU.exe File created C:\windows\CHOSZ.exe TZMN.exe File opened for modification C:\windows\CHOSZ.exe TZMN.exe File created C:\windows\system\DDTGKC.exe.bat VYORZEC.exe File opened for modification C:\windows\system\AKUISF.exe LPL.exe File opened for modification C:\windows\system\NTZNVRR.exe LQXGKVP.exe File opened for modification C:\windows\system\WKN.exe VHWTZGR.exe File created C:\windows\ULWKK.exe.bat OQX.exe File created C:\windows\YLIS.exe.bat YGIDTL.exe File created C:\windows\system\ZGIHHT.exe OGS.exe File created C:\windows\VTY.exe.bat GYGND.exe File created C:\windows\system\UGGKH.exe.bat JODRYY.exe File created C:\windows\system\FFL.exe BPWIGW.exe File created C:\windows\VZSEFMC.exe.bat ZRYW.exe File created C:\windows\system\OAPMK.exe.bat NXLRXK.exe File created C:\windows\EZV.exe JQUQDND.exe File created C:\windows\HFQCSM.exe UHQQQBA.exe File created C:\windows\system\EXJET.exe UZJR.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 4444 4412 WerFault.exe 85 3624 952 WerFault.exe 93 3988 1360 WerFault.exe 99 2244 1220 WerFault.exe 106 2668 4832 WerFault.exe 111 4368 4296 WerFault.exe 118 3240 4648 WerFault.exe 123 3724 3664 WerFault.exe 128 2944 2140 WerFault.exe 134 1804 2852 WerFault.exe 139 1960 2408 WerFault.exe 144 4100 548 WerFault.exe 149 4860 1372 WerFault.exe 156 1168 3900 WerFault.exe 161 440 4444 WerFault.exe 166 2136 4708 WerFault.exe 171 2408 4320 WerFault.exe 176 3784 624 WerFault.exe 181 5040 2880 WerFault.exe 186 4988 3008 WerFault.exe 191 2032 3900 WerFault.exe 196 2920 1124 WerFault.exe 201 1308 4012 WerFault.exe 206 2160 3720 WerFault.exe 211 4368 3036 WerFault.exe 216 5040 624 WerFault.exe 221 1780 3676 WerFault.exe 226 2228 4564 WerFault.exe 231 1316 4784 WerFault.exe 236 4068 1804 WerFault.exe 241 4288 3360 WerFault.exe 246 4308 2092 WerFault.exe 251 4860 4948 WerFault.exe 256 1468 2148 WerFault.exe 261 1860 4808 WerFault.exe 266 3840 4516 WerFault.exe 271 3592 4016 WerFault.exe 276 2980 3316 WerFault.exe 281 4664 4896 WerFault.exe 286 1148 2092 WerFault.exe 292 2148 2608 WerFault.exe 297 3900 4052 WerFault.exe 302 1772 2244 WerFault.exe 307 3520 1464 WerFault.exe 312 3488 4320 WerFault.exe 317 2956 3244 WerFault.exe 322 1148 4896 WerFault.exe 327 952 2680 WerFault.exe 332 3328 3332 WerFault.exe 337 2664 3900 WerFault.exe 342 4132 1772 WerFault.exe 347 4792 5024 WerFault.exe 352 4480 2232 WerFault.exe 357 2880 228 WerFault.exe 362 2044 1784 WerFault.exe 367 4008 5048 WerFault.exe 372 792 4700 WerFault.exe 377 3668 464 WerFault.exe 382 3720 3380 WerFault.exe 387 2956 536 WerFault.exe 392 3780 1540 WerFault.exe 397 4072 4788 WerFault.exe 402 3984 3716 WerFault.exe 407 1852 3908 WerFault.exe 412 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4412 9db15425411b48afe0d8e5ae56f647b2.exe 4412 9db15425411b48afe0d8e5ae56f647b2.exe 952 FUZ.exe 952 FUZ.exe 1360 LPL.exe 1360 LPL.exe 1220 AKUISF.exe 1220 AKUISF.exe 4832 SNMMWK.exe 4832 SNMMWK.exe 4296 AXUNCO.exe 4296 AXUNCO.exe 4648 LQXGKVP.exe 4648 LQXGKVP.exe 3664 NTZNVRR.exe 3664 NTZNVRR.exe 2140 XBB.exe 2140 XBB.exe 2852 REYY.exe 2852 REYY.exe 2408 VHWTZGR.exe 2408 VHWTZGR.exe 548 WKN.exe 548 WKN.exe 1372 LAAGV.exe 1372 LAAGV.exe 3900 YGA.exe 3900 YGA.exe 4444 VMG.exe 4444 VMG.exe 4708 ZRYW.exe 4708 ZRYW.exe 4320 VZSEFMC.exe 4320 VZSEFMC.exe 624 MPRPJFS.exe 624 MPRPJFS.exe 2880 FSQSNCA.exe 2880 FSQSNCA.exe 3008 UNNFPD.exe 3008 UNNFPD.exe 3900 FLZKKJ.exe 3900 FLZKKJ.exe 1124 XGQO.exe 1124 XGQO.exe 4012 FBN.exe 4012 FBN.exe 3720 GEXP.exe 3720 GEXP.exe 3036 NZU.exe 3036 NZU.exe 624 RPO.exe 624 RPO.exe 3676 RZX.exe 3676 RZX.exe 4564 YUUXDJU.exe 4564 YUUXDJU.exe 4784 YYMZNUD.exe 4784 YYMZNUD.exe 1804 HYO.exe 1804 HYO.exe 3360 JTA.exe 3360 JTA.exe 2092 LJNXU.exe 2092 LJNXU.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4412 9db15425411b48afe0d8e5ae56f647b2.exe 4412 9db15425411b48afe0d8e5ae56f647b2.exe 952 FUZ.exe 952 FUZ.exe 1360 LPL.exe 1360 LPL.exe 1220 AKUISF.exe 1220 AKUISF.exe 4832 SNMMWK.exe 4832 SNMMWK.exe 4296 AXUNCO.exe 4296 AXUNCO.exe 4648 LQXGKVP.exe 4648 LQXGKVP.exe 3664 NTZNVRR.exe 3664 NTZNVRR.exe 2140 XBB.exe 2140 XBB.exe 2852 REYY.exe 2852 REYY.exe 2408 VHWTZGR.exe 2408 VHWTZGR.exe 548 WKN.exe 548 WKN.exe 1372 LAAGV.exe 1372 LAAGV.exe 3900 YGA.exe 3900 YGA.exe 4444 VMG.exe 4444 VMG.exe 4708 ZRYW.exe 4708 ZRYW.exe 4320 VZSEFMC.exe 4320 VZSEFMC.exe 624 MPRPJFS.exe 624 MPRPJFS.exe 2880 FSQSNCA.exe 2880 FSQSNCA.exe 3008 UNNFPD.exe 3008 UNNFPD.exe 3900 FLZKKJ.exe 3900 FLZKKJ.exe 1124 XGQO.exe 1124 XGQO.exe 4012 FBN.exe 4012 FBN.exe 3720 GEXP.exe 3720 GEXP.exe 3036 NZU.exe 3036 NZU.exe 624 RPO.exe 624 RPO.exe 3676 RZX.exe 3676 RZX.exe 4564 YUUXDJU.exe 4564 YUUXDJU.exe 4784 YYMZNUD.exe 4784 YYMZNUD.exe 1804 HYO.exe 1804 HYO.exe 3360 JTA.exe 3360 JTA.exe 2092 LJNXU.exe 2092 LJNXU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4412 wrote to memory of 1148 4412 9db15425411b48afe0d8e5ae56f647b2.exe 89 PID 4412 wrote to memory of 1148 4412 9db15425411b48afe0d8e5ae56f647b2.exe 89 PID 4412 wrote to memory of 1148 4412 9db15425411b48afe0d8e5ae56f647b2.exe 89 PID 1148 wrote to memory of 952 1148 cmd.exe 93 PID 1148 wrote to memory of 952 1148 cmd.exe 93 PID 1148 wrote to memory of 952 1148 cmd.exe 93 PID 952 wrote to memory of 4672 952 FUZ.exe 95 PID 952 wrote to memory of 4672 952 FUZ.exe 95 PID 952 wrote to memory of 4672 952 FUZ.exe 95 PID 4672 wrote to memory of 1360 4672 cmd.exe 99 PID 4672 wrote to memory of 1360 4672 cmd.exe 99 PID 4672 wrote to memory of 1360 4672 cmd.exe 99 PID 1360 wrote to memory of 3308 1360 LPL.exe 102 PID 1360 wrote to memory of 3308 1360 LPL.exe 102 PID 1360 wrote to memory of 3308 1360 LPL.exe 102 PID 3308 wrote to memory of 1220 3308 cmd.exe 106 PID 3308 wrote to memory of 1220 3308 cmd.exe 106 PID 3308 wrote to memory of 1220 3308 cmd.exe 106 PID 1220 wrote to memory of 4012 1220 AKUISF.exe 107 PID 1220 wrote to memory of 4012 1220 AKUISF.exe 107 PID 1220 wrote to memory of 4012 1220 AKUISF.exe 107 PID 4012 wrote to memory of 4832 4012 cmd.exe 111 PID 4012 wrote to memory of 4832 4012 cmd.exe 111 PID 4012 wrote to memory of 4832 4012 cmd.exe 111 PID 4832 wrote to memory of 4792 4832 SNMMWK.exe 114 PID 4832 wrote to memory of 4792 4832 SNMMWK.exe 114 PID 4832 wrote to memory of 4792 4832 SNMMWK.exe 114 PID 4792 wrote to memory of 4296 4792 cmd.exe 118 PID 4792 wrote to memory of 4296 4792 cmd.exe 118 PID 4792 wrote to memory of 4296 4792 cmd.exe 118 PID 4296 wrote to memory of 3904 4296 AXUNCO.exe 119 PID 4296 wrote to memory of 3904 4296 AXUNCO.exe 119 PID 4296 wrote to memory of 3904 4296 AXUNCO.exe 119 PID 3904 wrote to memory of 4648 3904 cmd.exe 123 PID 3904 wrote to memory of 4648 3904 cmd.exe 123 PID 3904 wrote to memory of 4648 3904 cmd.exe 123 PID 4648 wrote to memory of 2956 4648 LQXGKVP.exe 124 PID 4648 wrote to memory of 2956 4648 LQXGKVP.exe 124 PID 4648 wrote to memory of 2956 4648 LQXGKVP.exe 124 PID 2956 wrote to memory of 3664 2956 cmd.exe 128 PID 2956 wrote to memory of 3664 2956 cmd.exe 128 PID 2956 wrote to memory of 3664 2956 cmd.exe 128 PID 3664 wrote to memory of 1528 3664 NTZNVRR.exe 130 PID 3664 wrote to memory of 1528 3664 NTZNVRR.exe 130 PID 3664 wrote to memory of 1528 3664 NTZNVRR.exe 130 PID 1528 wrote to memory of 2140 1528 cmd.exe 134 PID 1528 wrote to memory of 2140 1528 cmd.exe 134 PID 1528 wrote to memory of 2140 1528 cmd.exe 134 PID 2140 wrote to memory of 2152 2140 XBB.exe 135 PID 2140 wrote to memory of 2152 2140 XBB.exe 135 PID 2140 wrote to memory of 2152 2140 XBB.exe 135 PID 2152 wrote to memory of 2852 2152 cmd.exe 139 PID 2152 wrote to memory of 2852 2152 cmd.exe 139 PID 2152 wrote to memory of 2852 2152 cmd.exe 139 PID 2852 wrote to memory of 4544 2852 REYY.exe 140 PID 2852 wrote to memory of 4544 2852 REYY.exe 140 PID 2852 wrote to memory of 4544 2852 REYY.exe 140 PID 4544 wrote to memory of 2408 4544 cmd.exe 144 PID 4544 wrote to memory of 2408 4544 cmd.exe 144 PID 4544 wrote to memory of 2408 4544 cmd.exe 144 PID 2408 wrote to memory of 3668 2408 VHWTZGR.exe 145 PID 2408 wrote to memory of 3668 2408 VHWTZGR.exe 145 PID 2408 wrote to memory of 3668 2408 VHWTZGR.exe 145 PID 3668 wrote to memory of 548 3668 cmd.exe 149
Processes
-
C:\Users\Admin\AppData\Local\Temp\9db15425411b48afe0d8e5ae56f647b2.exe"C:\Users\Admin\AppData\Local\Temp\9db15425411b48afe0d8e5ae56f647b2.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FUZ.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\windows\FUZ.exeC:\windows\FUZ.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LPL.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\windows\system\LPL.exeC:\windows\system\LPL.exe5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AKUISF.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\windows\system\AKUISF.exeC:\windows\system\AKUISF.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SNMMWK.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\windows\SysWOW64\SNMMWK.exeC:\windows\system32\SNMMWK.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AXUNCO.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\windows\SysWOW64\AXUNCO.exeC:\windows\system32\AXUNCO.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LQXGKVP.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\windows\SysWOW64\LQXGKVP.exeC:\windows\system32\LQXGKVP.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NTZNVRR.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\windows\system\NTZNVRR.exeC:\windows\system\NTZNVRR.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XBB.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\windows\system\XBB.exeC:\windows\system\XBB.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\REYY.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\windows\REYY.exeC:\windows\REYY.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VHWTZGR.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\windows\SysWOW64\VHWTZGR.exeC:\windows\system32\VHWTZGR.exe21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WKN.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\windows\system\WKN.exeC:\windows\system\WKN.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LAAGV.exe.bat" "24⤵PID:3116
-
C:\windows\SysWOW64\LAAGV.exeC:\windows\system32\LAAGV.exe25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YGA.exe.bat" "26⤵PID:3488
-
C:\windows\system\YGA.exeC:\windows\system\YGA.exe27⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VMG.exe.bat" "28⤵PID:4668
-
C:\windows\system\VMG.exeC:\windows\system\VMG.exe29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZRYW.exe.bat" "30⤵PID:4268
-
C:\windows\ZRYW.exeC:\windows\ZRYW.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VZSEFMC.exe.bat" "32⤵PID:3444
-
C:\windows\VZSEFMC.exeC:\windows\VZSEFMC.exe33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MPRPJFS.exe.bat" "34⤵PID:1464
-
C:\windows\system\MPRPJFS.exeC:\windows\system\MPRPJFS.exe35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FSQSNCA.exe.bat" "36⤵PID:772
-
C:\windows\system\FSQSNCA.exeC:\windows\system\FSQSNCA.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UNNFPD.exe.bat" "38⤵PID:2592
-
C:\windows\SysWOW64\UNNFPD.exeC:\windows\system32\UNNFPD.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FLZKKJ.exe.bat" "40⤵PID:1780
-
C:\windows\SysWOW64\FLZKKJ.exeC:\windows\system32\FLZKKJ.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XGQO.exe.bat" "42⤵PID:4268
-
C:\windows\SysWOW64\XGQO.exeC:\windows\system32\XGQO.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FBN.exe.bat" "44⤵PID:1560
-
C:\windows\SysWOW64\FBN.exeC:\windows\system32\FBN.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GEXP.exe.bat" "46⤵PID:1176
-
C:\windows\SysWOW64\GEXP.exeC:\windows\system32\GEXP.exe47⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NZU.exe.bat" "48⤵PID:264
-
C:\windows\system\NZU.exeC:\windows\system\NZU.exe49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RPO.exe.bat" "50⤵PID:4664
-
C:\windows\system\RPO.exeC:\windows\system\RPO.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RZX.exe.bat" "52⤵PID:4860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV153⤵PID:2592
-
-
C:\windows\system\RZX.exeC:\windows\system\RZX.exe53⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YUUXDJU.exe.bat" "54⤵PID:1168
-
C:\windows\system\YUUXDJU.exeC:\windows\system\YUUXDJU.exe55⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YYMZNUD.exe.bat" "56⤵PID:4052
-
C:\windows\system\YYMZNUD.exeC:\windows\system\YYMZNUD.exe57⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HYO.exe.bat" "58⤵PID:4064
-
C:\windows\system\HYO.exeC:\windows\system\HYO.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JTA.exe.bat" "60⤵PID:3592
-
C:\windows\SysWOW64\JTA.exeC:\windows\system32\JTA.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3360 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LJNXU.exe.bat" "62⤵PID:1832
-
C:\windows\SysWOW64\LJNXU.exeC:\windows\system32\LJNXU.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HPLUBFF.exe.bat" "64⤵PID:4232
-
C:\windows\SysWOW64\HPLUBFF.exeC:\windows\system32\HPLUBFF.exe65⤵
- Checks computer location settings
- Executes dropped EXE
PID:4948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LFFCE.exe.bat" "66⤵PID:2288
-
C:\windows\LFFCE.exeC:\windows\LFFCE.exe67⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SAKO.exe.bat" "68⤵PID:1136
-
C:\windows\SAKO.exeC:\windows\SAKO.exe69⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AGPV.exe.bat" "70⤵PID:876
-
C:\windows\SysWOW64\AGPV.exeC:\windows\system32\AGPV.exe71⤵
- Executes dropped EXE
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GGWIIF.exe.bat" "72⤵PID:1852
-
C:\windows\SysWOW64\GGWIIF.exeC:\windows\system32\GGWIIF.exe73⤵
- Checks computer location settings
- Executes dropped EXE
PID:4016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TRNH.exe.bat" "74⤵PID:4312
-
C:\windows\system\TRNH.exeC:\windows\system\TRNH.exe75⤵
- Executes dropped EXE
PID:3316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AEEISLQ.exe.bat" "76⤵PID:956
-
C:\windows\AEEISLQ.exeC:\windows\AEEISLQ.exe77⤵
- Checks computer location settings
- Executes dropped EXE
PID:4896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UZJR.exe.bat" "78⤵PID:4652
-
C:\windows\SysWOW64\UZJR.exeC:\windows\system32\UZJR.exe79⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\EXJET.exe.bat" "80⤵PID:2304
-
C:\windows\system\EXJET.exeC:\windows\system\EXJET.exe81⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NXLRXK.exe.bat" "82⤵PID:3120
-
C:\windows\system\NXLRXK.exeC:\windows\system\NXLRXK.exe83⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OAPMK.exe.bat" "84⤵PID:3416
-
C:\windows\system\OAPMK.exeC:\windows\system\OAPMK.exe85⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JOUWMAH.exe.bat" "86⤵PID:3872
-
C:\windows\SysWOW64\JOUWMAH.exeC:\windows\system32\JOUWMAH.exe87⤵
- Executes dropped EXE
PID:1464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UGP.exe.bat" "88⤵PID:1616
-
C:\windows\UGP.exeC:\windows\UGP.exe89⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NZEAMI.exe.bat" "90⤵PID:4296
-
C:\windows\SysWOW64\NZEAMI.exeC:\windows\system32\NZEAMI.exe91⤵
- Checks computer location settings
- Executes dropped EXE
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TZMN.exe.bat" "92⤵PID:4652
-
C:\windows\SysWOW64\TZMN.exeC:\windows\system32\TZMN.exe93⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CHOSZ.exe.bat" "94⤵PID:736
-
C:\windows\CHOSZ.exeC:\windows\CHOSZ.exe95⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EFHVFX.exe.bat" "96⤵PID:2044
-
C:\windows\SysWOW64\EFHVFX.exeC:\windows\system32\EFHVFX.exe97⤵
- Executes dropped EXE
PID:3332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OKR.exe.bat" "98⤵PID:1560
-
C:\windows\SysWOW64\OKR.exeC:\windows\system32\OKR.exe99⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JQRYXFN.exe.bat" "100⤵PID:792
-
C:\windows\SysWOW64\JQRYXFN.exeC:\windows\system32\JQRYXFN.exe101⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NYGY.exe.bat" "102⤵PID:3404
-
C:\windows\SysWOW64\NYGY.exeC:\windows\system32\NYGY.exe103⤵
- Checks computer location settings
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KZI.exe.bat" "104⤵PID:3808
-
C:\windows\system\KZI.exeC:\windows\system\KZI.exe105⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GENYU.exe.bat" "106⤵PID:3240
-
C:\windows\SysWOW64\GENYU.exeC:\windows\system32\GENYU.exe107⤵
- Checks computer location settings
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PKYQKI.exe.bat" "108⤵PID:2640
-
C:\windows\PKYQKI.exeC:\windows\PKYQKI.exe109⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OUOOJC.exe.bat" "110⤵PID:5040
-
C:\windows\OUOOJC.exeC:\windows\OUOOJC.exe111⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BFFEXF.exe.bat" "112⤵PID:1860
-
C:\windows\SysWOW64\BFFEXF.exeC:\windows\system32\BFFEXF.exe113⤵
- Checks computer location settings
- Executes dropped EXE
PID:4700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JTJTI.exe.bat" "114⤵PID:3844
-
C:\windows\system\JTJTI.exeC:\windows\system\JTJTI.exe115⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IEUBRSJ.exe.bat" "116⤵PID:264
-
C:\windows\SysWOW64\IEUBRSJ.exeC:\windows\system32\IEUBRSJ.exe117⤵
- Executes dropped EXE
PID:3380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KBAVYAR.exe.bat" "118⤵PID:1396
-
C:\windows\KBAVYAR.exeC:\windows\KBAVYAR.exe119⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QCHJ.exe.bat" "120⤵PID:4348
-
C:\windows\QCHJ.exeC:\windows\QCHJ.exe121⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KPMSRU.exe.bat" "122⤵PID:1372
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-