Analysis
-
max time kernel
104s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe
Resource
win10v2004-20240226-en
General
-
Target
3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe
-
Size
289KB
-
MD5
d8d438c89fce6e7114c3e8ec9c12872b
-
SHA1
7ef91106136756d91b9f74ff8ad04379bdb31842
-
SHA256
3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496
-
SHA512
6d152c2dc6c79543f21331a4916f754c9ea7c0c5cda70102736bac5386b6674d4522e7d320c36fa6abc49e8626432e268bc17eab34f508d297ae20e88448176d
-
SSDEEP
6144:80W6tQl9eaRjb9kdhqZSqCqtsgdKaxkECzJLaQVbU5:80WYQLeaReDqN/KaxklJLJbU5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 61 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation YHOWO.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation PCJVXR.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation PUFWM.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation PWBOO.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation CGJY.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation KMBD.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation XTIW.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation NHIMZS.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation NLDW.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation AWKZBV.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation WERFL.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation MLDHOYU.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ARAABOE.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation CZW.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation FSKF.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation QNTZAHH.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation TAC.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ZEQMW.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation KAQIGS.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation KQMFA.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation KHQ.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation GZUHOMR.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation RBYSFMR.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation VBXIIUD.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation RWWK.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation PZY.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation GBI.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation UGGKH.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation SKEJCV.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation QLT.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation HJMJKTR.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation YZJ.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation SUOZMHK.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation TFZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation QADWJMS.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation CNR.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation LCOTQLC.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation XUUX.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation LCJW.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation GRGZIVH.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation CJOQQM.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation QJG.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation BOKDWE.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation BEKSUIT.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation MTCNWS.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation DSPZIM.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation PEBBSM.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation STS.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation LKNJCT.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation HKFSRRF.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation MIDCLFC.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation 3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation APNN.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ZFK.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation FFLDO.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation MKQ.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation ZPQYHJI.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation TBXB.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation JLN.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation FNECZ.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation RZRGT.exe -
Executes dropped EXE 61 IoCs
pid Process 3104 CGJY.exe 5428 AWKZBV.exe 1448 YHOWO.exe 5980 PZY.exe 5544 MKQ.exe 5800 QLT.exe 3784 BOKDWE.exe 3564 GZUHOMR.exe 5176 ZFK.exe 648 LCJW.exe 2232 RBYSFMR.exe 2220 GRGZIVH.exe 3128 FFLDO.exe 5472 FNECZ.exe 5764 BEKSUIT.exe 116 KMBD.exe 5032 TFZ.exe 1720 STS.exe 5760 WERFL.exe 1416 ZPQYHJI.exe 4512 XTIW.exe 5204 CZW.exe 4404 PCJVXR.exe 2188 QADWJMS.exe 1940 ZEQMW.exe 2160 CJOQQM.exe 4816 FSKF.exe 3968 MLDHOYU.exe 2344 VBXIIUD.exe 3940 RZRGT.exe 2036 CNR.exe 4412 KAQIGS.exe 5084 MTCNWS.exe 4056 PUFWM.exe 3576 LKNJCT.exe 2420 GBI.exe 5900 RWWK.exe 6032 DSPZIM.exe 2200 QNTZAHH.exe 4036 HJMJKTR.exe 3376 NHIMZS.exe 2884 HKFSRRF.exe 1924 TAC.exe 1640 YZJ.exe 5372 ARAABOE.exe 5208 MIDCLFC.exe 4680 QJG.exe 4672 TBXB.exe 116 XUUX.exe 1480 KQMFA.exe 3324 PWBOO.exe 3384 SUOZMHK.exe 4320 SKEJCV.exe 4584 JLN.exe 4956 UGGKH.exe 4224 KHQ.exe 5748 LCOTQLC.exe 5336 NLDW.exe 2548 PEBBSM.exe 2588 APNN.exe 5172 FVNPZ.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\NLDW.exe LCOTQLC.exe File created C:\windows\SysWOW64\APNN.exe PEBBSM.exe File created C:\windows\SysWOW64\APNN.exe.bat PEBBSM.exe File created C:\windows\SysWOW64\MLDHOYU.exe.bat FSKF.exe File created C:\windows\SysWOW64\RZRGT.exe.bat VBXIIUD.exe File created C:\windows\SysWOW64\TBXB.exe QJG.exe File opened for modification C:\windows\SysWOW64\HJMJKTR.exe QNTZAHH.exe File created C:\windows\SysWOW64\HJMJKTR.exe.bat QNTZAHH.exe File created C:\windows\SysWOW64\HKFSRRF.exe NHIMZS.exe File created C:\windows\SysWOW64\KQMFA.exe.bat XUUX.exe File created C:\windows\SysWOW64\KHQ.exe UGGKH.exe File created C:\windows\SysWOW64\KMBD.exe.bat BEKSUIT.exe File created C:\windows\SysWOW64\WERFL.exe.bat STS.exe File opened for modification C:\windows\SysWOW64\CJOQQM.exe ZEQMW.exe File created C:\windows\SysWOW64\AWKZBV.exe.bat CGJY.exe File created C:\windows\SysWOW64\HKFSRRF.exe.bat NHIMZS.exe File created C:\windows\SysWOW64\TBXB.exe.bat QJG.exe File created C:\windows\SysWOW64\LCOTQLC.exe KHQ.exe File created C:\windows\SysWOW64\LCOTQLC.exe.bat KHQ.exe File opened for modification C:\windows\SysWOW64\FVNPZ.exe APNN.exe File created C:\windows\SysWOW64\MKQ.exe.bat PZY.exe File created C:\windows\SysWOW64\PUFWM.exe.bat MTCNWS.exe File opened for modification C:\windows\SysWOW64\KHQ.exe UGGKH.exe File created C:\windows\SysWOW64\XTIW.exe.bat ZPQYHJI.exe File created C:\windows\SysWOW64\ARAABOE.exe YZJ.exe File opened for modification C:\windows\SysWOW64\LCOTQLC.exe KHQ.exe File opened for modification C:\windows\SysWOW64\NLDW.exe LCOTQLC.exe File created C:\windows\SysWOW64\FVNPZ.exe APNN.exe File created C:\windows\SysWOW64\ZFK.exe.bat GZUHOMR.exe File created C:\windows\SysWOW64\KMBD.exe BEKSUIT.exe File created C:\windows\SysWOW64\ZPQYHJI.exe.bat WERFL.exe File created C:\windows\SysWOW64\HJMJKTR.exe QNTZAHH.exe File opened for modification C:\windows\SysWOW64\TAC.exe HKFSRRF.exe File created C:\windows\SysWOW64\KHQ.exe.bat UGGKH.exe File opened for modification C:\windows\SysWOW64\YHOWO.exe AWKZBV.exe File opened for modification C:\windows\SysWOW64\MLDHOYU.exe FSKF.exe File opened for modification C:\windows\SysWOW64\PUFWM.exe MTCNWS.exe File created C:\windows\SysWOW64\CJOQQM.exe ZEQMW.exe File created C:\windows\SysWOW64\RZRGT.exe VBXIIUD.exe File opened for modification C:\windows\SysWOW64\RZRGT.exe VBXIIUD.exe File created C:\windows\SysWOW64\KQMFA.exe XUUX.exe File created C:\windows\SysWOW64\YHOWO.exe.bat AWKZBV.exe File created C:\windows\SysWOW64\TFZ.exe KMBD.exe File opened for modification C:\windows\SysWOW64\TFZ.exe KMBD.exe File opened for modification C:\windows\SysWOW64\XTIW.exe ZPQYHJI.exe File created C:\windows\SysWOW64\MLDHOYU.exe FSKF.exe File opened for modification C:\windows\SysWOW64\YZJ.exe TAC.exe File opened for modification C:\windows\SysWOW64\KQMFA.exe XUUX.exe File created C:\windows\SysWOW64\FVNPZ.exe.bat APNN.exe File opened for modification C:\windows\SysWOW64\GZUHOMR.exe BOKDWE.exe File opened for modification C:\windows\SysWOW64\KMBD.exe BEKSUIT.exe File created C:\windows\SysWOW64\TFZ.exe.bat KMBD.exe File opened for modification C:\windows\SysWOW64\AWKZBV.exe CGJY.exe File created C:\windows\SysWOW64\ZFK.exe GZUHOMR.exe File opened for modification C:\windows\SysWOW64\ZFK.exe GZUHOMR.exe File opened for modification C:\windows\SysWOW64\APNN.exe PEBBSM.exe File opened for modification C:\windows\SysWOW64\HKFSRRF.exe NHIMZS.exe File created C:\windows\SysWOW64\YZJ.exe TAC.exe File created C:\windows\SysWOW64\YZJ.exe.bat TAC.exe File opened for modification C:\windows\SysWOW64\WERFL.exe STS.exe File created C:\windows\SysWOW64\ZPQYHJI.exe WERFL.exe File created C:\windows\SysWOW64\TAC.exe HKFSRRF.exe File created C:\windows\SysWOW64\ARAABOE.exe.bat YZJ.exe File created C:\windows\SysWOW64\GZUHOMR.exe.bat BOKDWE.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\system\CGJY.exe 3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe File created C:\windows\system\BOKDWE.exe QLT.exe File created C:\windows\system\BEKSUIT.exe FNECZ.exe File created C:\windows\LKNJCT.exe PUFWM.exe File created C:\windows\system\SQZPSJ.exe.bat FVNPZ.exe File created C:\windows\system\MTCNWS.exe.bat KAQIGS.exe File created C:\windows\MIDCLFC.exe.bat ARAABOE.exe File created C:\windows\JLN.exe SKEJCV.exe File opened for modification C:\windows\JLN.exe SKEJCV.exe File opened for modification C:\windows\system\SQZPSJ.exe FVNPZ.exe File opened for modification C:\windows\system\PCJVXR.exe CZW.exe File created C:\windows\system\MTCNWS.exe KAQIGS.exe File created C:\windows\ZEQMW.exe QADWJMS.exe File opened for modification C:\windows\system\BEKSUIT.exe FNECZ.exe File created C:\windows\system\SKEJCV.exe SUOZMHK.exe File created C:\windows\system\PCJVXR.exe.bat CZW.exe File created C:\windows\system\VBXIIUD.exe.bat MLDHOYU.exe File opened for modification C:\windows\MIDCLFC.exe ARAABOE.exe File opened for modification C:\windows\system\DSPZIM.exe RWWK.exe File opened for modification C:\windows\NHIMZS.exe HJMJKTR.exe File created C:\windows\system\XUUX.exe TBXB.exe File opened for modification C:\windows\system\FFLDO.exe GRGZIVH.exe File opened for modification C:\windows\CZW.exe XTIW.exe File opened for modification C:\windows\ZEQMW.exe QADWJMS.exe File opened for modification C:\windows\system\KAQIGS.exe CNR.exe File created C:\windows\system\RWWK.exe.bat GBI.exe File created C:\windows\SUOZMHK.exe PWBOO.exe File created C:\windows\system\CGJY.exe.bat 3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe File created C:\windows\QJG.exe.bat MIDCLFC.exe File opened for modification C:\windows\SUOZMHK.exe PWBOO.exe File created C:\windows\system\BOKDWE.exe.bat QLT.exe File created C:\windows\FNECZ.exe FFLDO.exe File opened for modification C:\windows\system\FSKF.exe CJOQQM.exe File opened for modification C:\windows\system\VBXIIUD.exe MLDHOYU.exe File opened for modification C:\windows\system\QLT.exe MKQ.exe File created C:\windows\system\PEBBSM.exe.bat NLDW.exe File created C:\windows\QADWJMS.exe.bat PCJVXR.exe File created C:\windows\QNTZAHH.exe.bat DSPZIM.exe File created C:\windows\CZW.exe.bat XTIW.exe File opened for modification C:\windows\system\PWBOO.exe KQMFA.exe File created C:\windows\system\SQZPSJ.exe FVNPZ.exe File created C:\windows\system\PWBOO.exe KQMFA.exe File opened for modification C:\windows\system\PEBBSM.exe NLDW.exe File opened for modification C:\windows\LCJW.exe ZFK.exe File created C:\windows\system\FFLDO.exe.bat GRGZIVH.exe File created C:\windows\system\BEKSUIT.exe.bat FNECZ.exe File created C:\windows\STS.exe TFZ.exe File opened for modification C:\windows\QNTZAHH.exe DSPZIM.exe File created C:\windows\system\XUUX.exe.bat TBXB.exe File created C:\windows\system\QLT.exe.bat MKQ.exe File created C:\windows\RBYSFMR.exe LCJW.exe File created C:\windows\RBYSFMR.exe.bat LCJW.exe File opened for modification C:\windows\system\GBI.exe LKNJCT.exe File opened for modification C:\windows\QJG.exe MIDCLFC.exe File opened for modification C:\windows\system\CGJY.exe 3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe File opened for modification C:\windows\LKNJCT.exe PUFWM.exe File created C:\windows\QNTZAHH.exe DSPZIM.exe File created C:\windows\system\PZY.exe YHOWO.exe File created C:\windows\system\UGGKH.exe JLN.exe File opened for modification C:\windows\RBYSFMR.exe LCJW.exe File created C:\windows\system\VBXIIUD.exe MLDHOYU.exe File opened for modification C:\windows\system\CNR.exe RZRGT.exe File created C:\windows\system\DSPZIM.exe RWWK.exe File created C:\windows\system\PEBBSM.exe NLDW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 4872 5428 WerFault.exe 99 3144 2620 WerFault.exe 90 4476 3104 WerFault.exe 94 5888 1448 WerFault.exe 103 4356 648 WerFault.exe 135 904 2232 WerFault.exe 139 5392 2220 WerFault.exe 145 5948 3128 WerFault.exe 150 2316 5472 WerFault.exe 157 768 5764 WerFault.exe 162 216 116 WerFault.exe 167 5796 5032 WerFault.exe 172 4360 1720 WerFault.exe 177 3376 5760 WerFault.exe 182 5164 1416 WerFault.exe 187 1924 4512 WerFault.exe 192 5404 5204 WerFault.exe 197 700 4404 WerFault.exe 202 4256 2188 WerFault.exe 207 6100 1940 WerFault.exe 213 3084 2160 WerFault.exe 218 3388 4816 WerFault.exe 223 3936 3968 WerFault.exe 228 1796 2344 WerFault.exe 233 1960 3940 WerFault.exe 238 3080 2036 WerFault.exe 243 3728 4412 WerFault.exe 250 3972 5084 WerFault.exe 256 5612 4056 WerFault.exe 261 4200 3576 WerFault.exe 267 1508 2420 WerFault.exe 272 6068 5900 WerFault.exe 279 4448 6032 WerFault.exe 284 2588 2200 WerFault.exe 289 2344 4036 WerFault.exe 294 1604 3376 WerFault.exe 299 1588 2884 WerFault.exe 304 2532 1924 WerFault.exe 309 5136 1640 WerFault.exe 314 4700 5372 WerFault.exe 319 4252 5208 WerFault.exe 324 5492 4680 WerFault.exe 329 3976 4672 WerFault.exe 334 6032 116 WerFault.exe 339 2200 1480 WerFault.exe 344 5032 3324 WerFault.exe 349 4164 3384 WerFault.exe 354 4092 4320 WerFault.exe 359 5084 4584 WerFault.exe 364 2468 4956 WerFault.exe 369 3888 4224 WerFault.exe 374 4300 5748 WerFault.exe 379 3804 5336 WerFault.exe 384 2040 2548 WerFault.exe 389 4868 2588 WerFault.exe 394 5940 5172 WerFault.exe 399 2324 6012 WerFault.exe 404 2104 2480 WerFault.exe 409 3948 2244 WerFault.exe 414 2196 448 WerFault.exe 419 3184 5084 WerFault.exe 424 924 5396 WerFault.exe 429 3960 5136 WerFault.exe 434 4444 6088 WerFault.exe 439 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2620 3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe 2620 3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe 3104 CGJY.exe 3104 CGJY.exe 5428 AWKZBV.exe 5428 AWKZBV.exe 1448 YHOWO.exe 1448 YHOWO.exe 5980 PZY.exe 5980 PZY.exe 5544 MKQ.exe 5544 MKQ.exe 5800 QLT.exe 5800 QLT.exe 3784 BOKDWE.exe 3784 BOKDWE.exe 3564 GZUHOMR.exe 3564 GZUHOMR.exe 5176 ZFK.exe 5176 ZFK.exe 648 LCJW.exe 648 LCJW.exe 2232 RBYSFMR.exe 2232 RBYSFMR.exe 2220 GRGZIVH.exe 2220 GRGZIVH.exe 3128 FFLDO.exe 3128 FFLDO.exe 5472 FNECZ.exe 5472 FNECZ.exe 5764 BEKSUIT.exe 5764 BEKSUIT.exe 116 KMBD.exe 116 KMBD.exe 5032 TFZ.exe 5032 TFZ.exe 1720 STS.exe 1720 STS.exe 5760 WERFL.exe 5760 WERFL.exe 1416 ZPQYHJI.exe 1416 ZPQYHJI.exe 4512 XTIW.exe 4512 XTIW.exe 5204 CZW.exe 5204 CZW.exe 4404 PCJVXR.exe 4404 PCJVXR.exe 2188 QADWJMS.exe 2188 QADWJMS.exe 1940 ZEQMW.exe 1940 ZEQMW.exe 2160 CJOQQM.exe 2160 CJOQQM.exe 4816 FSKF.exe 4816 FSKF.exe 3968 MLDHOYU.exe 3968 MLDHOYU.exe 2344 VBXIIUD.exe 2344 VBXIIUD.exe 3940 RZRGT.exe 3940 RZRGT.exe 2036 CNR.exe 2036 CNR.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2620 3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe 2620 3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe 3104 CGJY.exe 3104 CGJY.exe 5428 AWKZBV.exe 5428 AWKZBV.exe 1448 YHOWO.exe 1448 YHOWO.exe 5980 PZY.exe 5980 PZY.exe 5544 MKQ.exe 5544 MKQ.exe 5800 QLT.exe 5800 QLT.exe 3784 BOKDWE.exe 3784 BOKDWE.exe 3564 GZUHOMR.exe 3564 GZUHOMR.exe 5176 ZFK.exe 5176 ZFK.exe 648 LCJW.exe 648 LCJW.exe 2232 RBYSFMR.exe 2232 RBYSFMR.exe 2220 GRGZIVH.exe 2220 GRGZIVH.exe 3128 FFLDO.exe 3128 FFLDO.exe 5472 FNECZ.exe 5472 FNECZ.exe 5764 BEKSUIT.exe 5764 BEKSUIT.exe 116 KMBD.exe 116 KMBD.exe 5032 TFZ.exe 5032 TFZ.exe 1720 STS.exe 1720 STS.exe 5760 WERFL.exe 5760 WERFL.exe 1416 ZPQYHJI.exe 1416 ZPQYHJI.exe 4512 XTIW.exe 4512 XTIW.exe 5204 CZW.exe 5204 CZW.exe 4404 PCJVXR.exe 4404 PCJVXR.exe 2188 QADWJMS.exe 2188 QADWJMS.exe 1940 ZEQMW.exe 1940 ZEQMW.exe 2160 CJOQQM.exe 2160 CJOQQM.exe 4816 FSKF.exe 4816 FSKF.exe 3968 MLDHOYU.exe 3968 MLDHOYU.exe 2344 VBXIIUD.exe 2344 VBXIIUD.exe 3940 RZRGT.exe 3940 RZRGT.exe 2036 CNR.exe 2036 CNR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 4992 2620 3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe 91 PID 2620 wrote to memory of 4992 2620 3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe 91 PID 2620 wrote to memory of 4992 2620 3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe 91 PID 4992 wrote to memory of 3104 4992 cmd.exe 94 PID 4992 wrote to memory of 3104 4992 cmd.exe 94 PID 4992 wrote to memory of 3104 4992 cmd.exe 94 PID 3104 wrote to memory of 4252 3104 CGJY.exe 96 PID 3104 wrote to memory of 4252 3104 CGJY.exe 96 PID 3104 wrote to memory of 4252 3104 CGJY.exe 96 PID 4252 wrote to memory of 5428 4252 cmd.exe 99 PID 4252 wrote to memory of 5428 4252 cmd.exe 99 PID 4252 wrote to memory of 5428 4252 cmd.exe 99 PID 5428 wrote to memory of 5332 5428 AWKZBV.exe 100 PID 5428 wrote to memory of 5332 5428 AWKZBV.exe 100 PID 5428 wrote to memory of 5332 5428 AWKZBV.exe 100 PID 5332 wrote to memory of 1448 5332 cmd.exe 103 PID 5332 wrote to memory of 1448 5332 cmd.exe 103 PID 5332 wrote to memory of 1448 5332 cmd.exe 103 PID 1448 wrote to memory of 5936 1448 YHOWO.exe 107 PID 1448 wrote to memory of 5936 1448 YHOWO.exe 107 PID 1448 wrote to memory of 5936 1448 YHOWO.exe 107 PID 5936 wrote to memory of 5980 5936 cmd.exe 111 PID 5936 wrote to memory of 5980 5936 cmd.exe 111 PID 5936 wrote to memory of 5980 5936 cmd.exe 111 PID 5980 wrote to memory of 3308 5980 PZY.exe 112 PID 5980 wrote to memory of 3308 5980 PZY.exe 112 PID 5980 wrote to memory of 3308 5980 PZY.exe 112 PID 3308 wrote to memory of 5544 3308 cmd.exe 115 PID 3308 wrote to memory of 5544 3308 cmd.exe 115 PID 3308 wrote to memory of 5544 3308 cmd.exe 115 PID 5544 wrote to memory of 5268 5544 MKQ.exe 116 PID 5544 wrote to memory of 5268 5544 MKQ.exe 116 PID 5544 wrote to memory of 5268 5544 MKQ.exe 116 PID 5268 wrote to memory of 5800 5268 cmd.exe 119 PID 5268 wrote to memory of 5800 5268 cmd.exe 119 PID 5268 wrote to memory of 5800 5268 cmd.exe 119 PID 5800 wrote to memory of 768 5800 QLT.exe 120 PID 5800 wrote to memory of 768 5800 QLT.exe 120 PID 5800 wrote to memory of 768 5800 QLT.exe 120 PID 768 wrote to memory of 3784 768 cmd.exe 123 PID 768 wrote to memory of 3784 768 cmd.exe 123 PID 768 wrote to memory of 3784 768 cmd.exe 123 PID 3784 wrote to memory of 888 3784 BOKDWE.exe 124 PID 3784 wrote to memory of 888 3784 BOKDWE.exe 124 PID 3784 wrote to memory of 888 3784 BOKDWE.exe 124 PID 888 wrote to memory of 3564 888 cmd.exe 127 PID 888 wrote to memory of 3564 888 cmd.exe 127 PID 888 wrote to memory of 3564 888 cmd.exe 127 PID 3564 wrote to memory of 2008 3564 GZUHOMR.exe 128 PID 3564 wrote to memory of 2008 3564 GZUHOMR.exe 128 PID 3564 wrote to memory of 2008 3564 GZUHOMR.exe 128 PID 2008 wrote to memory of 5176 2008 cmd.exe 131 PID 2008 wrote to memory of 5176 2008 cmd.exe 131 PID 2008 wrote to memory of 5176 2008 cmd.exe 131 PID 5176 wrote to memory of 2192 5176 ZFK.exe 132 PID 5176 wrote to memory of 2192 5176 ZFK.exe 132 PID 5176 wrote to memory of 2192 5176 ZFK.exe 132 PID 2192 wrote to memory of 648 2192 cmd.exe 135 PID 2192 wrote to memory of 648 2192 cmd.exe 135 PID 2192 wrote to memory of 648 2192 cmd.exe 135 PID 648 wrote to memory of 3020 648 LCJW.exe 136 PID 648 wrote to memory of 3020 648 LCJW.exe 136 PID 648 wrote to memory of 3020 648 LCJW.exe 136 PID 3020 wrote to memory of 2232 3020 cmd.exe 139
Processes
-
C:\Users\Admin\AppData\Local\Temp\3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe"C:\Users\Admin\AppData\Local\Temp\3321057cb281adf6eaa8ecd5bd88cc3232a174fa464ca2cf141ed80e39d61496.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CGJY.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\windows\system\CGJY.exeC:\windows\system\CGJY.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AWKZBV.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\windows\SysWOW64\AWKZBV.exeC:\windows\system32\AWKZBV.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YHOWO.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:5332 -
C:\windows\SysWOW64\YHOWO.exeC:\windows\system32\YHOWO.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PZY.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:5936 -
C:\windows\system\PZY.exeC:\windows\system\PZY.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MKQ.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\windows\SysWOW64\MKQ.exeC:\windows\system32\MKQ.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QLT.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:5268 -
C:\windows\system\QLT.exeC:\windows\system\QLT.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BOKDWE.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\windows\system\BOKDWE.exeC:\windows\system\BOKDWE.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GZUHOMR.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\windows\SysWOW64\GZUHOMR.exeC:\windows\system32\GZUHOMR.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZFK.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\windows\SysWOW64\ZFK.exeC:\windows\system32\ZFK.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LCJW.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\windows\LCJW.exeC:\windows\LCJW.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RBYSFMR.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\windows\RBYSFMR.exeC:\windows\RBYSFMR.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GRGZIVH.exe.bat" "24⤵PID:5084
-
C:\windows\system\GRGZIVH.exeC:\windows\system\GRGZIVH.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FFLDO.exe.bat" "26⤵PID:4572
-
C:\windows\system\FFLDO.exeC:\windows\system\FFLDO.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FNECZ.exe.bat" "28⤵PID:5348
-
C:\windows\FNECZ.exeC:\windows\FNECZ.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BEKSUIT.exe.bat" "30⤵PID:5468
-
C:\windows\system\BEKSUIT.exeC:\windows\system\BEKSUIT.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KMBD.exe.bat" "32⤵PID:5820
-
C:\windows\SysWOW64\KMBD.exeC:\windows\system32\KMBD.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TFZ.exe.bat" "34⤵PID:556
-
C:\windows\SysWOW64\TFZ.exeC:\windows\system32\TFZ.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\STS.exe.bat" "36⤵PID:5184
-
C:\windows\STS.exeC:\windows\STS.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WERFL.exe.bat" "38⤵PID:5192
-
C:\windows\SysWOW64\WERFL.exeC:\windows\system32\WERFL.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZPQYHJI.exe.bat" "40⤵PID:4112
-
C:\windows\SysWOW64\ZPQYHJI.exeC:\windows\system32\ZPQYHJI.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XTIW.exe.bat" "42⤵PID:5160
-
C:\windows\SysWOW64\XTIW.exeC:\windows\system32\XTIW.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CZW.exe.bat" "44⤵PID:1836
-
C:\windows\CZW.exeC:\windows\CZW.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PCJVXR.exe.bat" "46⤵PID:1052
-
C:\windows\system\PCJVXR.exeC:\windows\system\PCJVXR.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QADWJMS.exe.bat" "48⤵PID:924
-
C:\windows\QADWJMS.exeC:\windows\QADWJMS.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZEQMW.exe.bat" "50⤵PID:4280
-
C:\windows\ZEQMW.exeC:\windows\ZEQMW.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CJOQQM.exe.bat" "52⤵PID:5168
-
C:\windows\SysWOW64\CJOQQM.exeC:\windows\system32\CJOQQM.exe53⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FSKF.exe.bat" "54⤵PID:3964
-
C:\windows\system\FSKF.exeC:\windows\system\FSKF.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MLDHOYU.exe.bat" "56⤵PID:768
-
C:\windows\SysWOW64\MLDHOYU.exeC:\windows\system32\MLDHOYU.exe57⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\VBXIIUD.exe.bat" "58⤵PID:116
-
C:\windows\system\VBXIIUD.exeC:\windows\system\VBXIIUD.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RZRGT.exe.bat" "60⤵PID:5796
-
C:\windows\SysWOW64\RZRGT.exeC:\windows\system32\RZRGT.exe61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CNR.exe.bat" "62⤵PID:772
-
C:\windows\system\CNR.exeC:\windows\system\CNR.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KAQIGS.exe.bat" "64⤵PID:5996
-
C:\windows\system\KAQIGS.exeC:\windows\system\KAQIGS.exe65⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MTCNWS.exe.bat" "66⤵PID:5164
-
C:\windows\system\MTCNWS.exeC:\windows\system\MTCNWS.exe67⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:5084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PUFWM.exe.bat" "68⤵PID:2488
-
C:\windows\SysWOW64\PUFWM.exeC:\windows\system32\PUFWM.exe69⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LKNJCT.exe.bat" "70⤵PID:4676
-
C:\windows\LKNJCT.exeC:\windows\LKNJCT.exe71⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GBI.exe.bat" "72⤵PID:1524
-
C:\windows\system\GBI.exeC:\windows\system\GBI.exe73⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RWWK.exe.bat" "74⤵PID:948
-
C:\windows\system\RWWK.exeC:\windows\system\RWWK.exe75⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:5900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DSPZIM.exe.bat" "76⤵PID:5384
-
C:\windows\system\DSPZIM.exeC:\windows\system\DSPZIM.exe77⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:6032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QNTZAHH.exe.bat" "78⤵PID:5172
-
C:\windows\QNTZAHH.exeC:\windows\QNTZAHH.exe79⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HJMJKTR.exe.bat" "80⤵PID:3396
-
C:\windows\SysWOW64\HJMJKTR.exeC:\windows\system32\HJMJKTR.exe81⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NHIMZS.exe.bat" "82⤵PID:4144
-
C:\windows\NHIMZS.exeC:\windows\NHIMZS.exe83⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HKFSRRF.exe.bat" "84⤵PID:2264
-
C:\windows\SysWOW64\HKFSRRF.exeC:\windows\system32\HKFSRRF.exe85⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TAC.exe.bat" "86⤵PID:1096
-
C:\windows\SysWOW64\TAC.exeC:\windows\system32\TAC.exe87⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YZJ.exe.bat" "88⤵PID:1988
-
C:\windows\SysWOW64\YZJ.exeC:\windows\system32\YZJ.exe89⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ARAABOE.exe.bat" "90⤵PID:5312
-
C:\windows\SysWOW64\ARAABOE.exeC:\windows\system32\ARAABOE.exe91⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:5372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MIDCLFC.exe.bat" "92⤵PID:5204
-
C:\windows\MIDCLFC.exeC:\windows\MIDCLFC.exe93⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:5208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QJG.exe.bat" "94⤵PID:5944
-
C:\windows\QJG.exeC:\windows\QJG.exe95⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TBXB.exe.bat" "96⤵PID:1508
-
C:\windows\SysWOW64\TBXB.exeC:\windows\system32\TBXB.exe97⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XUUX.exe.bat" "98⤵PID:3936
-
C:\windows\system\XUUX.exeC:\windows\system\XUUX.exe99⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KQMFA.exe.bat" "100⤵PID:464
-
C:\windows\SysWOW64\KQMFA.exeC:\windows\system32\KQMFA.exe101⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PWBOO.exe.bat" "102⤵PID:4824
-
C:\windows\system\PWBOO.exeC:\windows\system\PWBOO.exe103⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SUOZMHK.exe.bat" "104⤵PID:5376
-
C:\windows\SUOZMHK.exeC:\windows\SUOZMHK.exe105⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SKEJCV.exe.bat" "106⤵PID:5008
-
C:\windows\system\SKEJCV.exeC:\windows\system\SKEJCV.exe107⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JLN.exe.bat" "108⤵PID:4488
-
C:\windows\JLN.exeC:\windows\JLN.exe109⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UGGKH.exe.bat" "110⤵PID:1976
-
C:\windows\system\UGGKH.exeC:\windows\system\UGGKH.exe111⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KHQ.exe.bat" "112⤵PID:532
-
C:\windows\SysWOW64\KHQ.exeC:\windows\system32\KHQ.exe113⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LCOTQLC.exe.bat" "114⤵PID:220
-
C:\windows\SysWOW64\LCOTQLC.exeC:\windows\system32\LCOTQLC.exe115⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:5748 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NLDW.exe.bat" "116⤵PID:5392
-
C:\windows\SysWOW64\NLDW.exeC:\windows\system32\NLDW.exe117⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:5336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PEBBSM.exe.bat" "118⤵PID:2640
-
C:\windows\system\PEBBSM.exeC:\windows\system\PEBBSM.exe119⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\APNN.exe.bat" "120⤵PID:1608
-
C:\windows\SysWOW64\APNN.exeC:\windows\system32\APNN.exe121⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FVNPZ.exe.bat" "122⤵PID:5424
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-