Analysis
-
max time kernel
149s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 04:24
Static task
static1
Behavioral task
behavioral1
Sample
d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe
Resource
win10v2004-20240419-en
General
-
Target
d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe
-
Size
448KB
-
MD5
db2c95b84c57c44a8a8592c1f6cdcc38
-
SHA1
8f9216cf99f6393ceca693e5d69fd88d54e9cb41
-
SHA256
d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183
-
SHA512
7d1b03044e9661686953f869376b1c54a68a6476a911a865107a626cd7a2db1044ee0404138a8ffed614469c472c1bff0a0dfc09d1c58ef79704f8f3929d4f38
-
SSDEEP
6144:yDdxaOjFS7pQAnluY4Mzw5ykEjiPISUOgW9X+hOGzC/NM:UKq+SAlu0k5ykmZzcukG2/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation RKZLPZC.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation FRJUXU.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation PIIHDX.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation KDMPB.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation CHTBT.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation WBZP.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation HDTQQQU.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation HYWMVG.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation YXJXHZ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation BHEFEH.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation QGBMOKQ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation OGEC.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation JNCQGQT.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation YSYG.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation EAOV.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation XRTTC.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation YUGU.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation FOC.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation MBDLGID.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation ZIH.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation XWNRN.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation GFVFH.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation SBOUEBP.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation YPQ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation IBPGDEU.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation LBCKAK.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation RKOOZW.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation UXPYQJ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation AEODZUO.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation BDB.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation XFQHVB.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation CQOUFLC.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation YVAY.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation UKJYUZR.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation NNI.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation DJIFNPT.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation EEN.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation UZCO.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation DNMID.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation UXTWX.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation NVBWQB.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation SZB.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation FCR.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation QBJX.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation RGWAWD.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation QQI.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation CNSFIZ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation VXEPG.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation QIHVE.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation XCVN.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation OMDB.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation TKIVBLS.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation JOXF.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation RJSBXV.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation RFV.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation JNASNA.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation HWT.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation OYYOJ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation RJF.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation REVLYQI.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation ONQKTFV.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation XGATNJ.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation DGNPQDE.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation KCDVJ.exe -
Executes dropped EXE 64 IoCs
pid Process 4304 EEN.exe 3768 TZXRMU.exe 2572 RKOOZW.exe 4856 TIHI.exe 2620 ONUUIII.exe 2116 EIDYB.exe 3484 CTOO.exe 3312 BER.exe 432 OPHVYZ.exe 396 WCMJJ.exe 4476 AKTJV.exe 4704 OGEC.exe 228 MBDLGID.exe 3228 RGWAWD.exe 1956 OZXDA.exe 3664 OCO.exe 3968 CIOKYC.exe 2536 MFBX.exe 4756 SBNYU.exe 5020 LOY.exe 5040 HRH.exe 2712 UXPYQJ.exe 4476 JNCQGQT.exe 2880 ONQKTFV.exe 2324 ZGTDBM.exe 2040 HLYKE.exe 4152 BMNVV.exe 4288 LKTPC.exe 4940 CKHUP.exe 4020 AFHVUO.exe 1428 KDMPB.exe 3056 JOXF.exe 4052 YEKPS.exe 3244 PRVHHOP.exe 2012 OCYXQU.exe 512 NNBNZ.exe 2780 AXR.exe 2036 MLQK.exe 1536 QQI.exe 3460 UTGUI.exe 552 CHTBT.exe 1004 BXEW.exe 4568 ZIH.exe 4652 DYWUB.exe 3920 WBZP.exe 4064 VLCFPH.exe 396 KBDF.exe 4376 XEMVKNS.exe 548 WXWLKT.exe 2400 ZKONEFV.exe 4156 DNMID.exe 2952 HDTQQQU.exe 2856 HYWMVG.exe 4600 ZHLJIX.exe 3116 TUQ.exe 4588 UXTWX.exe 2128 LFIBKMR.exe 2264 NVBWQB.exe 3956 BGJUFL.exe 1636 KOLZIJW.exe 4204 WWAZ.exe 3784 YUGU.exe 2008 YXJXHZ.exe 4072 JQT.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\windows\SysWOW64\SBOUEBP.exe EQYV.exe File created C:\windows\SysWOW64\CPQDOOH.exe QBJX.exe File opened for modification C:\windows\SysWOW64\JXGJWKU.exe JNYIIGG.exe File created C:\windows\SysWOW64\UTGUI.exe QQI.exe File created C:\windows\SysWOW64\UZCO.exe IJJ.exe File created C:\windows\SysWOW64\ZFYN.exe RZMGZ.exe File created C:\windows\SysWOW64\OPHVYZ.exe BER.exe File opened for modification C:\windows\SysWOW64\AKTJV.exe WCMJJ.exe File opened for modification C:\windows\SysWOW64\VLCFPH.exe WBZP.exe File created C:\windows\SysWOW64\UXTWX.exe TUQ.exe File created C:\windows\SysWOW64\CNSFIZ.exe TPFL.exe File created C:\windows\SysWOW64\CPQDOOH.exe.bat QBJX.exe File created C:\windows\SysWOW64\UKJYUZR.exe VSG.exe File created C:\windows\SysWOW64\OCYXQU.exe PRVHHOP.exe File created C:\windows\SysWOW64\OCYXQU.exe.bat PRVHHOP.exe File opened for modification C:\windows\SysWOW64\JPDFX.exe UZCO.exe File created C:\windows\SysWOW64\NJZXNMC.exe YSYG.exe File opened for modification C:\windows\SysWOW64\TIHI.exe RKOOZW.exe File opened for modification C:\windows\SysWOW64\DNMID.exe ZKONEFV.exe File created C:\windows\SysWOW64\UKJYUZR.exe.bat VSG.exe File opened for modification C:\windows\SysWOW64\YSYG.exe UKJYUZR.exe File opened for modification C:\windows\SysWOW64\HYWMVG.exe HDTQQQU.exe File opened for modification C:\windows\SysWOW64\UZCO.exe IJJ.exe File created C:\windows\SysWOW64\QGBMOKQ.exe.bat IBPGDEU.exe File created C:\windows\SysWOW64\REEQFLJ.exe UDC.exe File created C:\windows\SysWOW64\SBOUEBP.exe.bat EQYV.exe File created C:\windows\SysWOW64\JPDFX.exe.bat UZCO.exe File created C:\windows\SysWOW64\IBPGDEU.exe GDWDXP.exe File created C:\windows\SysWOW64\FTVNF.exe.bat XFQHVB.exe File opened for modification C:\windows\SysWOW64\OPHVYZ.exe BER.exe File opened for modification C:\windows\SysWOW64\KBDF.exe VLCFPH.exe File created C:\windows\SysWOW64\GFVFH.exe FCR.exe File created C:\windows\SysWOW64\SBOUEBP.exe EQYV.exe File created C:\windows\SysWOW64\TYJNH.exe CQV.exe File opened for modification C:\windows\SysWOW64\YKWQJSN.exe DZOR.exe File opened for modification C:\windows\SysWOW64\MYTJGT.exe RDPZ.exe File created C:\windows\SysWOW64\QQI.exe.bat MLQK.exe File opened for modification C:\windows\SysWOW64\UTGUI.exe QQI.exe File created C:\windows\SysWOW64\KBDF.exe VLCFPH.exe File created C:\windows\SysWOW64\OJNAPM.exe.bat REVLYQI.exe File opened for modification C:\windows\SysWOW64\GDWDXP.exe MIECLV.exe File opened for modification C:\windows\SysWOW64\MBDLGID.exe OGEC.exe File opened for modification C:\windows\SysWOW64\MIECLV.exe YKWQJSN.exe File created C:\windows\SysWOW64\GDWDXP.exe.bat MIECLV.exe File opened for modification C:\windows\SysWOW64\WGN.exe GQMGOKC.exe File created C:\windows\SysWOW64\THRZ.exe AEODZUO.exe File created C:\windows\SysWOW64\TIHI.exe RKOOZW.exe File created C:\windows\SysWOW64\OPHVYZ.exe.bat BER.exe File opened for modification C:\windows\SysWOW64\PRVHHOP.exe YEKPS.exe File created C:\windows\SysWOW64\KBDF.exe.bat VLCFPH.exe File created C:\windows\SysWOW64\JQT.exe YXJXHZ.exe File opened for modification C:\windows\SysWOW64\RGWAWD.exe MBDLGID.exe File created C:\windows\SysWOW64\HYWMVG.exe HDTQQQU.exe File created C:\windows\SysWOW64\FAJ.exe CRAZLNW.exe File opened for modification C:\windows\SysWOW64\CNSFIZ.exe TPFL.exe File created C:\windows\SysWOW64\IBPGDEU.exe.bat GDWDXP.exe File created C:\windows\SysWOW64\FTVNF.exe XFQHVB.exe File created C:\windows\SysWOW64\BMNVV.exe.bat HLYKE.exe File opened for modification C:\windows\SysWOW64\QQI.exe MLQK.exe File opened for modification C:\windows\SysWOW64\XEMVKNS.exe KBDF.exe File created C:\windows\SysWOW64\SZB.exe CJAMHW.exe File opened for modification C:\windows\SysWOW64\GFVFH.exe FCR.exe File created C:\windows\SysWOW64\KOLZIJW.exe BGJUFL.exe File created C:\windows\SysWOW64\MIECLV.exe.bat YKWQJSN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\windows\CRAZLNW.exe HEVHB.exe File opened for modification C:\windows\SCALV.exe LMZMOWI.exe File created C:\windows\system\HDTQQQU.exe.bat DNMID.exe File opened for modification C:\windows\YUGU.exe WWAZ.exe File opened for modification C:\windows\system\FCR.exe SZB.exe File created C:\windows\EAOV.exe NPPF.exe File opened for modification C:\windows\VSG.exe XCVN.exe File created C:\windows\system\LMZMOWI.exe SUJB.exe File opened for modification C:\windows\RZMGZ.exe YHEVQ.exe File created C:\windows\AEODZUO.exe FRJUXU.exe File opened for modification C:\windows\MFBX.exe CIOKYC.exe File created C:\windows\system\YXJXHZ.exe.bat YUGU.exe File created C:\windows\system\DDYG.exe.bat JQT.exe File created C:\windows\QMRCNP.exe.bat SBOUEBP.exe File created C:\windows\system\BHZ.exe XRTTC.exe File created C:\windows\OMDB.exe.bat NJZXNMC.exe File created C:\windows\RZMGZ.exe.bat YHEVQ.exe File created C:\windows\system\TKIVBLS.exe THRZ.exe File opened for modification C:\windows\system\ONUUIII.exe TIHI.exe File created C:\windows\system\NNBNZ.exe.bat OCYXQU.exe File opened for modification C:\windows\CHTBT.exe UTGUI.exe File created C:\windows\QBJX.exe.bat LBCKAK.exe File opened for modification C:\windows\OMDB.exe NJZXNMC.exe File opened for modification C:\windows\GQMGOKC.exe NNI.exe File opened for modification C:\windows\system\PWRQURN.exe XTN.exe File created C:\windows\system\TTH.exe.bat DJIFNPT.exe File opened for modification C:\windows\RVJYIY.exe SKYIZKU.exe File opened for modification C:\windows\system\JNYIIGG.exe VRMPC.exe File created C:\windows\system\OGEC.exe AKTJV.exe File created C:\windows\UXPYQJ.exe.bat HRH.exe File opened for modification C:\windows\ZIH.exe BXEW.exe File created C:\windows\system\WGQRU.exe JVISGKX.exe File opened for modification C:\windows\NNI.exe SCALV.exe File opened for modification C:\windows\XTN.exe PNI.exe File opened for modification C:\windows\system\TTH.exe DJIFNPT.exe File created C:\windows\UDC.exe.bat YVAY.exe File opened for modification C:\windows\AXR.exe NNBNZ.exe File created C:\windows\ZHLJIX.exe HYWMVG.exe File opened for modification C:\windows\XWNRN.exe DDYG.exe File created C:\windows\system\WAYMK.exe.bat ONTFAE.exe File opened for modification C:\windows\DFGY.exe KCDVJ.exe File created C:\windows\system\CQRGXT.exe.bat DFGY.exe File opened for modification C:\windows\system\OYYOJ.exe CQRGXT.exe File created C:\windows\system\KCDVJ.exe.bat AEXABHW.exe File created C:\windows\system\OYYOJ.exe.bat CQRGXT.exe File opened for modification C:\windows\STS.exe UIPF.exe File created C:\windows\system\LYQA.exe.bat YVZKGH.exe File created C:\windows\system\RDPZ.exe TSMJV.exe File opened for modification C:\windows\system\BXEW.exe CHTBT.exe File created C:\windows\BGJUFL.exe.bat NVBWQB.exe File opened for modification C:\windows\AEXABHW.exe SZK.exe File created C:\windows\YVZKGH.exe.bat QIHVE.exe File created C:\windows\system\JNASNA.exe ZFYN.exe File opened for modification C:\windows\system\ZGTDBM.exe ONQKTFV.exe File created C:\windows\system\MLQK.exe.bat AXR.exe File opened for modification C:\windows\WWAZ.exe KOLZIJW.exe File created C:\windows\VXEPG.exe.bat YSUZQVZ.exe File created C:\windows\HWT.exe.bat PWRQURN.exe File opened for modification C:\windows\system\XFQHVB.exe NHDMNT.exe File opened for modification C:\windows\system\DYWUB.exe ZIH.exe File opened for modification C:\windows\ZHLJIX.exe HYWMVG.exe File created C:\windows\system\XGATNJ.exe.bat OYYOJ.exe File opened for modification C:\windows\system\LBCKAK.exe WGQRU.exe File created C:\windows\OMDB.exe NJZXNMC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 2988 4644 WerFault.exe 84 3484 4304 WerFault.exe 92 3700 3768 WerFault.exe 98 2644 2572 WerFault.exe 103 3808 4856 WerFault.exe 110 4288 2620 WerFault.exe 117 1360 2116 WerFault.exe 124 4272 3484 WerFault.exe 130 2484 3312 WerFault.exe 135 2816 432 WerFault.exe 141 1092 396 WerFault.exe 146 2320 4476 WerFault.exe 151 4016 4704 WerFault.exe 156 636 228 WerFault.exe 162 2680 3228 WerFault.exe 167 216 1956 WerFault.exe 172 3960 3664 WerFault.exe 177 4852 3968 WerFault.exe 183 2092 2536 WerFault.exe 188 4300 4756 WerFault.exe 193 4496 5020 WerFault.exe 198 3104 5040 WerFault.exe 203 4832 2712 WerFault.exe 208 3088 4476 WerFault.exe 213 5012 2880 WerFault.exe 218 3264 2324 WerFault.exe 223 2084 2040 WerFault.exe 228 1820 4152 WerFault.exe 233 452 4288 WerFault.exe 238 3484 4940 WerFault.exe 243 3956 4020 WerFault.exe 248 4892 1428 WerFault.exe 253 4556 3056 WerFault.exe 258 3156 4052 WerFault.exe 263 4184 3244 WerFault.exe 268 3992 2012 WerFault.exe 274 3624 512 WerFault.exe 279 2412 2780 WerFault.exe 284 3620 2036 WerFault.exe 289 4716 1536 WerFault.exe 294 4736 3460 WerFault.exe 299 4640 552 WerFault.exe 304 1864 1004 WerFault.exe 309 4272 4568 WerFault.exe 315 4000 4652 WerFault.exe 320 4756 3920 WerFault.exe 325 4716 4064 WerFault.exe 330 2256 396 WerFault.exe 335 1992 4376 WerFault.exe 340 452 548 WerFault.exe 345 5076 2400 WerFault.exe 350 3684 4156 WerFault.exe 355 2588 2952 WerFault.exe 360 3880 2856 WerFault.exe 365 2960 4600 WerFault.exe 370 4832 3116 WerFault.exe 375 4348 4588 WerFault.exe 380 4768 2128 WerFault.exe 385 4956 2264 WerFault.exe 390 2936 3956 WerFault.exe 395 3188 1636 WerFault.exe 400 4288 4204 WerFault.exe 405 3380 3784 WerFault.exe 410 2532 2008 WerFault.exe 415 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4644 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 4644 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 4304 EEN.exe 4304 EEN.exe 3768 TZXRMU.exe 3768 TZXRMU.exe 2572 RKOOZW.exe 2572 RKOOZW.exe 4856 TIHI.exe 4856 TIHI.exe 2620 ONUUIII.exe 2620 ONUUIII.exe 2116 EIDYB.exe 2116 EIDYB.exe 3484 CTOO.exe 3484 CTOO.exe 3312 BER.exe 3312 BER.exe 432 OPHVYZ.exe 432 OPHVYZ.exe 396 WCMJJ.exe 396 WCMJJ.exe 4476 AKTJV.exe 4476 AKTJV.exe 4704 OGEC.exe 4704 OGEC.exe 228 MBDLGID.exe 228 MBDLGID.exe 3228 RGWAWD.exe 3228 RGWAWD.exe 1956 OZXDA.exe 1956 OZXDA.exe 3664 OCO.exe 3664 OCO.exe 3968 CIOKYC.exe 3968 CIOKYC.exe 2536 MFBX.exe 2536 MFBX.exe 4756 SBNYU.exe 4756 SBNYU.exe 5020 LOY.exe 5020 LOY.exe 5040 HRH.exe 5040 HRH.exe 2712 UXPYQJ.exe 2712 UXPYQJ.exe 4476 JNCQGQT.exe 4476 JNCQGQT.exe 2880 ONQKTFV.exe 2880 ONQKTFV.exe 2324 ZGTDBM.exe 2324 ZGTDBM.exe 2040 HLYKE.exe 2040 HLYKE.exe 4152 BMNVV.exe 4152 BMNVV.exe 4288 LKTPC.exe 4288 LKTPC.exe 4940 CKHUP.exe 4940 CKHUP.exe 4020 AFHVUO.exe 4020 AFHVUO.exe 1428 KDMPB.exe 1428 KDMPB.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4644 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 4644 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 4304 EEN.exe 4304 EEN.exe 3768 TZXRMU.exe 3768 TZXRMU.exe 2572 RKOOZW.exe 2572 RKOOZW.exe 4856 TIHI.exe 4856 TIHI.exe 2620 ONUUIII.exe 2620 ONUUIII.exe 2116 EIDYB.exe 2116 EIDYB.exe 3484 CTOO.exe 3484 CTOO.exe 3312 BER.exe 3312 BER.exe 432 OPHVYZ.exe 432 OPHVYZ.exe 396 WCMJJ.exe 396 WCMJJ.exe 4476 AKTJV.exe 4476 AKTJV.exe 4704 OGEC.exe 4704 OGEC.exe 228 MBDLGID.exe 228 MBDLGID.exe 3228 RGWAWD.exe 3228 RGWAWD.exe 1956 OZXDA.exe 1956 OZXDA.exe 3664 OCO.exe 3664 OCO.exe 3968 CIOKYC.exe 3968 CIOKYC.exe 2536 MFBX.exe 2536 MFBX.exe 4756 SBNYU.exe 4756 SBNYU.exe 5020 LOY.exe 5020 LOY.exe 5040 HRH.exe 5040 HRH.exe 2712 UXPYQJ.exe 2712 UXPYQJ.exe 4476 JNCQGQT.exe 4476 JNCQGQT.exe 2880 ONQKTFV.exe 2880 ONQKTFV.exe 2324 ZGTDBM.exe 2324 ZGTDBM.exe 2040 HLYKE.exe 2040 HLYKE.exe 4152 BMNVV.exe 4152 BMNVV.exe 4288 LKTPC.exe 4288 LKTPC.exe 4940 CKHUP.exe 4940 CKHUP.exe 4020 AFHVUO.exe 4020 AFHVUO.exe 1428 KDMPB.exe 1428 KDMPB.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4704 4644 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 88 PID 4644 wrote to memory of 4704 4644 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 88 PID 4644 wrote to memory of 4704 4644 d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe 88 PID 4704 wrote to memory of 4304 4704 cmd.exe 92 PID 4704 wrote to memory of 4304 4704 cmd.exe 92 PID 4704 wrote to memory of 4304 4704 cmd.exe 92 PID 4304 wrote to memory of 1092 4304 EEN.exe 94 PID 4304 wrote to memory of 1092 4304 EEN.exe 94 PID 4304 wrote to memory of 1092 4304 EEN.exe 94 PID 1092 wrote to memory of 3768 1092 cmd.exe 98 PID 1092 wrote to memory of 3768 1092 cmd.exe 98 PID 1092 wrote to memory of 3768 1092 cmd.exe 98 PID 3768 wrote to memory of 4056 3768 TZXRMU.exe 99 PID 3768 wrote to memory of 4056 3768 TZXRMU.exe 99 PID 3768 wrote to memory of 4056 3768 TZXRMU.exe 99 PID 4056 wrote to memory of 2572 4056 cmd.exe 103 PID 4056 wrote to memory of 2572 4056 cmd.exe 103 PID 4056 wrote to memory of 2572 4056 cmd.exe 103 PID 2572 wrote to memory of 4908 2572 RKOOZW.exe 106 PID 2572 wrote to memory of 4908 2572 RKOOZW.exe 106 PID 2572 wrote to memory of 4908 2572 RKOOZW.exe 106 PID 4908 wrote to memory of 4856 4908 cmd.exe 110 PID 4908 wrote to memory of 4856 4908 cmd.exe 110 PID 4908 wrote to memory of 4856 4908 cmd.exe 110 PID 4856 wrote to memory of 5064 4856 TIHI.exe 113 PID 4856 wrote to memory of 5064 4856 TIHI.exe 113 PID 4856 wrote to memory of 5064 4856 TIHI.exe 113 PID 5064 wrote to memory of 2620 5064 cmd.exe 117 PID 5064 wrote to memory of 2620 5064 cmd.exe 117 PID 5064 wrote to memory of 2620 5064 cmd.exe 117 PID 2620 wrote to memory of 408 2620 ONUUIII.exe 120 PID 2620 wrote to memory of 408 2620 ONUUIII.exe 120 PID 2620 wrote to memory of 408 2620 ONUUIII.exe 120 PID 408 wrote to memory of 2116 408 cmd.exe 124 PID 408 wrote to memory of 2116 408 cmd.exe 124 PID 408 wrote to memory of 2116 408 cmd.exe 124 PID 2116 wrote to memory of 5024 2116 EIDYB.exe 126 PID 2116 wrote to memory of 5024 2116 EIDYB.exe 126 PID 2116 wrote to memory of 5024 2116 EIDYB.exe 126 PID 5024 wrote to memory of 3484 5024 cmd.exe 130 PID 5024 wrote to memory of 3484 5024 cmd.exe 130 PID 5024 wrote to memory of 3484 5024 cmd.exe 130 PID 3484 wrote to memory of 3748 3484 CTOO.exe 131 PID 3484 wrote to memory of 3748 3484 CTOO.exe 131 PID 3484 wrote to memory of 3748 3484 CTOO.exe 131 PID 3748 wrote to memory of 3312 3748 cmd.exe 135 PID 3748 wrote to memory of 3312 3748 cmd.exe 135 PID 3748 wrote to memory of 3312 3748 cmd.exe 135 PID 3312 wrote to memory of 4496 3312 BER.exe 137 PID 3312 wrote to memory of 4496 3312 BER.exe 137 PID 3312 wrote to memory of 4496 3312 BER.exe 137 PID 4496 wrote to memory of 432 4496 cmd.exe 141 PID 4496 wrote to memory of 432 4496 cmd.exe 141 PID 4496 wrote to memory of 432 4496 cmd.exe 141 PID 432 wrote to memory of 5040 432 OPHVYZ.exe 142 PID 432 wrote to memory of 5040 432 OPHVYZ.exe 142 PID 432 wrote to memory of 5040 432 OPHVYZ.exe 142 PID 5040 wrote to memory of 396 5040 cmd.exe 146 PID 5040 wrote to memory of 396 5040 cmd.exe 146 PID 5040 wrote to memory of 396 5040 cmd.exe 146 PID 396 wrote to memory of 3920 396 WCMJJ.exe 147 PID 396 wrote to memory of 3920 396 WCMJJ.exe 147 PID 396 wrote to memory of 3920 396 WCMJJ.exe 147 PID 3920 wrote to memory of 4476 3920 cmd.exe 151
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe"C:\Users\Admin\AppData\Local\Temp\d9c1b1c573e275c5be6d52957e701bc30da803ed8a5dae727ba81fe4c9642183.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EEN.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\windows\EEN.exeC:\windows\EEN.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TZXRMU.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\windows\TZXRMU.exeC:\windows\TZXRMU.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RKOOZW.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\windows\system\RKOOZW.exeC:\windows\system\RKOOZW.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TIHI.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\windows\SysWOW64\TIHI.exeC:\windows\system32\TIHI.exe9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ONUUIII.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\windows\system\ONUUIII.exeC:\windows\system\ONUUIII.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EIDYB.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\windows\SysWOW64\EIDYB.exeC:\windows\system32\EIDYB.exe13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CTOO.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\windows\system\CTOO.exeC:\windows\system\CTOO.exe15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BER.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\windows\system\BER.exeC:\windows\system\BER.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OPHVYZ.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\windows\SysWOW64\OPHVYZ.exeC:\windows\system32\OPHVYZ.exe19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WCMJJ.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\windows\WCMJJ.exeC:\windows\WCMJJ.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AKTJV.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\windows\SysWOW64\AKTJV.exeC:\windows\system32\AKTJV.exe23⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OGEC.exe.bat" "24⤵PID:3632
-
C:\windows\system\OGEC.exeC:\windows\system\OGEC.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MBDLGID.exe.bat" "26⤵PID:2060
-
C:\windows\SysWOW64\MBDLGID.exeC:\windows\system32\MBDLGID.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RGWAWD.exe.bat" "28⤵PID:4260
-
C:\windows\SysWOW64\RGWAWD.exeC:\windows\system32\RGWAWD.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OZXDA.exe.bat" "30⤵PID:1072
-
C:\windows\OZXDA.exeC:\windows\OZXDA.exe31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OCO.exe.bat" "32⤵PID:4872
-
C:\windows\OCO.exeC:\windows\OCO.exe33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CIOKYC.exe.bat" "34⤵PID:2884
-
C:\windows\system\CIOKYC.exeC:\windows\system\CIOKYC.exe35⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MFBX.exe.bat" "36⤵PID:2812
-
C:\windows\MFBX.exeC:\windows\MFBX.exe37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SBNYU.exe.bat" "38⤵PID:972
-
C:\windows\system\SBNYU.exeC:\windows\system\SBNYU.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LOY.exe.bat" "40⤵PID:788
-
C:\windows\LOY.exeC:\windows\LOY.exe41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HRH.exe.bat" "42⤵PID:772
-
C:\windows\HRH.exeC:\windows\HRH.exe43⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UXPYQJ.exe.bat" "44⤵PID:2416
-
C:\windows\UXPYQJ.exeC:\windows\UXPYQJ.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JNCQGQT.exe.bat" "46⤵PID:452
-
C:\windows\JNCQGQT.exeC:\windows\JNCQGQT.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ONQKTFV.exe.bat" "48⤵PID:1592
-
C:\windows\SysWOW64\ONQKTFV.exeC:\windows\system32\ONQKTFV.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZGTDBM.exe.bat" "50⤵PID:512
-
C:\windows\system\ZGTDBM.exeC:\windows\system\ZGTDBM.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HLYKE.exe.bat" "52⤵PID:3696
-
C:\windows\SysWOW64\HLYKE.exeC:\windows\system32\HLYKE.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BMNVV.exe.bat" "54⤵PID:3808
-
C:\windows\SysWOW64\BMNVV.exeC:\windows\system32\BMNVV.exe55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LKTPC.exe.bat" "56⤵PID:5020
-
C:\windows\system\LKTPC.exeC:\windows\system\LKTPC.exe57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CKHUP.exe.bat" "58⤵PID:4872
-
C:\windows\system\CKHUP.exeC:\windows\system\CKHUP.exe59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AFHVUO.exe.bat" "60⤵PID:2060
-
C:\windows\AFHVUO.exeC:\windows\AFHVUO.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KDMPB.exe.bat" "62⤵PID:2352
-
C:\windows\KDMPB.exeC:\windows\KDMPB.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JOXF.exe.bat" "64⤵PID:3696
-
C:\windows\JOXF.exeC:\windows\JOXF.exe65⤵
- Checks computer location settings
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YEKPS.exe.bat" "66⤵PID:4592
-
C:\windows\YEKPS.exeC:\windows\YEKPS.exe67⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PRVHHOP.exe.bat" "68⤵PID:3524
-
C:\windows\SysWOW64\PRVHHOP.exeC:\windows\system32\PRVHHOP.exe69⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OCYXQU.exe.bat" "70⤵PID:3448
-
C:\windows\SysWOW64\OCYXQU.exeC:\windows\system32\OCYXQU.exe71⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NNBNZ.exe.bat" "72⤵PID:4432
-
C:\windows\system\NNBNZ.exeC:\windows\system\NNBNZ.exe73⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AXR.exe.bat" "74⤵PID:4476
-
C:\windows\AXR.exeC:\windows\AXR.exe75⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MLQK.exe.bat" "76⤵PID:2120
-
C:\windows\system\MLQK.exeC:\windows\system\MLQK.exe77⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QQI.exe.bat" "78⤵PID:1428
-
C:\windows\SysWOW64\QQI.exeC:\windows\system32\QQI.exe79⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UTGUI.exe.bat" "80⤵PID:4392
-
C:\windows\SysWOW64\UTGUI.exeC:\windows\system32\UTGUI.exe81⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CHTBT.exe.bat" "82⤵PID:4600
-
C:\windows\CHTBT.exeC:\windows\CHTBT.exe83⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BXEW.exe.bat" "84⤵PID:3048
-
C:\windows\system\BXEW.exeC:\windows\system\BXEW.exe85⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZIH.exe.bat" "86⤵PID:452
-
C:\windows\ZIH.exeC:\windows\ZIH.exe87⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DYWUB.exe.bat" "88⤵PID:5052
-
C:\windows\system\DYWUB.exeC:\windows\system\DYWUB.exe89⤵
- Executes dropped EXE
PID:4652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WBZP.exe.bat" "90⤵PID:3684
-
C:\windows\system\WBZP.exeC:\windows\system\WBZP.exe91⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VLCFPH.exe.bat" "92⤵PID:5000
-
C:\windows\SysWOW64\VLCFPH.exeC:\windows\system32\VLCFPH.exe93⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KBDF.exe.bat" "94⤵PID:3228
-
C:\windows\SysWOW64\KBDF.exeC:\windows\system32\KBDF.exe95⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XEMVKNS.exe.bat" "96⤵PID:4148
-
C:\windows\SysWOW64\XEMVKNS.exeC:\windows\system32\XEMVKNS.exe97⤵
- Executes dropped EXE
PID:4376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WXWLKT.exe.bat" "98⤵PID:3048
-
C:\windows\WXWLKT.exeC:\windows\WXWLKT.exe99⤵
- Executes dropped EXE
PID:548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZKONEFV.exe.bat" "100⤵PID:4852
-
C:\windows\SysWOW64\ZKONEFV.exeC:\windows\system32\ZKONEFV.exe101⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DNMID.exe.bat" "102⤵PID:2344
-
C:\windows\SysWOW64\DNMID.exeC:\windows\system32\DNMID.exe103⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HDTQQQU.exe.bat" "104⤵PID:1776
-
C:\windows\system\HDTQQQU.exeC:\windows\system\HDTQQQU.exe105⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HYWMVG.exe.bat" "106⤵PID:2032
-
C:\windows\SysWOW64\HYWMVG.exeC:\windows\system32\HYWMVG.exe107⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZHLJIX.exe.bat" "108⤵PID:4744
-
C:\windows\ZHLJIX.exeC:\windows\ZHLJIX.exe109⤵
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TUQ.exe.bat" "110⤵PID:3784
-
C:\windows\SysWOW64\TUQ.exeC:\windows\system32\TUQ.exe111⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UXTWX.exe.bat" "112⤵PID:4100
-
C:\windows\SysWOW64\UXTWX.exeC:\windows\system32\UXTWX.exe113⤵
- Checks computer location settings
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LFIBKMR.exe.bat" "114⤵PID:4072
-
C:\windows\LFIBKMR.exeC:\windows\LFIBKMR.exe115⤵
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NVBWQB.exe.bat" "116⤵PID:4640
-
C:\windows\system\NVBWQB.exeC:\windows\system\NVBWQB.exe117⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BGJUFL.exe.bat" "118⤵PID:3312
-
C:\windows\BGJUFL.exeC:\windows\BGJUFL.exe119⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KOLZIJW.exe.bat" "120⤵PID:2584
-
C:\windows\SysWOW64\KOLZIJW.exeC:\windows\system32\KOLZIJW.exe121⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WWAZ.exe.bat" "122⤵PID:4000
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-