Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26/06/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe
Resource
win10v2004-20240508-en
General
-
Target
a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe
-
Size
289KB
-
MD5
6b174efad313abd4df83a766dcc23985
-
SHA1
e8149b99798ed214d522ad2225ce47e1ea3e81b4
-
SHA256
a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed
-
SHA512
88629ff0558658c9b5b6675ac45eab33180f16b09567fecc7073dd9f86eb4e428cf17418bf9740ee68f447ef8344c283948ed8999f9830911a3b151cdc705198
-
SSDEEP
3072:5A0EIRXX1P2UgAFxY3m5OZjSg9Z4hNeND55N4pLthECQT68VMJLaQljVvzUpz:5AzIdFuUgAFxm7SizNkECzJLaQVbU5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation IAH.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation UGGKH.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation MAGGVG.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation FBQ.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation HPVZHZO.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation PIO.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation FCIEWGY.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation UIGZ.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation QISHTQU.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation XEWCDR.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation SEQDK.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation ONCFFTD.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation NKGJWS.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation MMKOBFN.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation IONIVZ.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation MTYM.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation CTJGQR.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation NCKFXT.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation GSKLODP.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation UJVNUNO.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation EFKQM.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation HKKAL.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation OMMZYYK.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation PIUDL.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation HRWIPXB.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation VZDH.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation ZFQN.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation PLBE.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation LHFXM.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation JBJ.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation XIPPVA.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation JPF.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation TWPU.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation DNA.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation YBKXS.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation ESPQ.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation MBIJNU.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation VKTL.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation INUR.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation FUHADP.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation BTY.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation GAN.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation RWWK.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation PMT.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation KPMSRU.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation MLLHWO.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation VWPAJEF.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation DTGEK.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation LFIBKMR.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation OYR.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation XUMJG.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation MFBX.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation BVPOWR.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation ICDR.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation LRMKZCI.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation TYUIT.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation IGEWCQ.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation MOT.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation HRZS.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation QKIS.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation LXFBJU.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation EMQF.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation NVM.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation VGJVYV.exe -
Executes dropped EXE 64 IoCs
pid Process 212 LHM.exe 4636 AMSDXVU.exe 1976 FFGGKTD.exe 2992 SPKEPK.exe 1304 LDJKUMU.exe 4948 ZOSBJ.exe 5084 XYCR.exe 2016 SMHAUC.exe 1568 WCO.exe 4404 JFKHLER.exe 4332 ESPQ.exe 1308 MFBX.exe 4460 BVPOWR.exe 2204 CYS.exe 1940 CTJGQR.exe 376 OMMZYYK.exe 2120 WAQFAX.exe 2432 ODU.exe 4228 ETVAVIW.exe 3628 OQJV.exe 4488 PTKK.exe 1812 OEV.exe 3088 YEXFZ.exe 3484 ICDR.exe 2652 NCKFXT.exe 3884 KDMPB.exe 3468 VWPAJEF.exe 3788 ULIDW.exe 2276 JBJ.exe 4292 CENYJ.exe 2808 KKSFT.exe 3848 UIGZ.exe 624 PDKJLB.exe 3924 XIPPVA.exe 1864 PMT.exe 3008 BUZTN.exe 3596 WPECXIM.exe 2372 HHUNPJU.exe 4868 GSKLODP.exe 1068 OYXSZCL.exe 2852 DTGEK.exe 3716 MBIJNU.exe 3768 AMQACX.exe 372 GZQJGAZ.exe 3980 ONCPRY.exe 4512 IAH.exe 2544 VLQXHJ.exe 4784 NLSC.exe 3036 AWABZRC.exe 736 EEPBL.exe 4920 JEQD.exe 3296 QURDWBV.exe 1496 LFIBKMR.exe 2068 QISHTQU.exe 4048 OYR.exe 1564 FGGP.exe 1584 HEZRQQM.exe 5072 XUMJG.exe 1604 VKTL.exe 4520 XIZG.exe 3552 WSK.exe 4964 PTRHRG.exe 2828 TWPU.exe 2204 XEWCDR.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\GZQJGAZ.exe.bat AMQACX.exe File opened for modification C:\windows\SysWOW64\DDDEL.exe ONCFFTD.exe File created C:\windows\SysWOW64\EMQF.exe LRMKZCI.exe File created C:\windows\SysWOW64\WCO.exe SMHAUC.exe File opened for modification C:\windows\SysWOW64\GSKLODP.exe HHUNPJU.exe File created C:\windows\SysWOW64\SVMPGO.exe MDEBXL.exe File opened for modification C:\windows\SysWOW64\EMQF.exe LRMKZCI.exe File opened for modification C:\windows\SysWOW64\SMTUC.exe IONIVZ.exe File created C:\windows\SysWOW64\YBKXS.exe.bat JGFDQH.exe File opened for modification C:\windows\SysWOW64\IMTEAGG.exe JMMHOP.exe File created C:\windows\SysWOW64\NCKFXT.exe.bat ICDR.exe File opened for modification C:\windows\SysWOW64\XEWCDR.exe TWPU.exe File created C:\windows\SysWOW64\DDDEL.exe.bat ONCFFTD.exe File opened for modification C:\windows\SysWOW64\CRY.exe POCJSBS.exe File created C:\windows\SysWOW64\HPVZHZO.exe.bat ZCQTXBS.exe File created C:\windows\SysWOW64\PIO.exe.bat ASFI.exe File created C:\windows\SysWOW64\JXGJWKU.exe BSUDLMZ.exe File created C:\windows\SysWOW64\JMMHOP.exe.bat UGGKH.exe File created C:\windows\SysWOW64\ICDR.exe YEXFZ.exe File created C:\windows\SysWOW64\GSKLODP.exe.bat HHUNPJU.exe File created C:\windows\SysWOW64\OYXSZCL.exe.bat GSKLODP.exe File created C:\windows\SysWOW64\IKAXFN.exe.bat BUZ.exe File opened for modification C:\windows\SysWOW64\JGFDQH.exe YTGFLGD.exe File created C:\windows\SysWOW64\JBJ.exe ULIDW.exe File opened for modification C:\windows\SysWOW64\GZQJGAZ.exe AMQACX.exe File opened for modification C:\windows\SysWOW64\IPM.exe EZFMVX.exe File created C:\windows\SysWOW64\XEWCDR.exe TWPU.exe File created C:\windows\SysWOW64\EGLTV.exe.bat CIFGO.exe File opened for modification C:\windows\SysWOW64\IKAXFN.exe BUZ.exe File created C:\windows\SysWOW64\UFNB.exe.bat NVM.exe File created C:\windows\SysWOW64\BBIFG.exe CRY.exe File created C:\windows\SysWOW64\IONIVZ.exe.bat PLBE.exe File opened for modification C:\windows\SysWOW64\MTYM.exe TYUIT.exe File opened for modification C:\windows\SysWOW64\LDJKUMU.exe SPKEPK.exe File created C:\windows\SysWOW64\ZOSBJ.exe LDJKUMU.exe File created C:\windows\SysWOW64\BVPOWR.exe.bat MFBX.exe File created C:\windows\SysWOW64\IPM.exe EZFMVX.exe File created C:\windows\SysWOW64\IPM.exe.bat EZFMVX.exe File created C:\windows\SysWOW64\XDTE.exe.bat EKLT.exe File created C:\windows\SysWOW64\PTKK.exe OQJV.exe File created C:\windows\SysWOW64\ICDR.exe.bat YEXFZ.exe File created C:\windows\SysWOW64\JEQD.exe.bat EEPBL.exe File opened for modification C:\windows\SysWOW64\AFNS.exe KPMSRU.exe File created C:\windows\SysWOW64\INUR.exe YPOFGIT.exe File opened for modification C:\windows\SysWOW64\MDEBXL.exe MPMMW.exe File opened for modification C:\windows\SysWOW64\UTZJVW.exe SVMPGO.exe File created C:\windows\SysWOW64\UFNB.exe NVM.exe File opened for modification C:\windows\SysWOW64\BVPOWR.exe MFBX.exe File created C:\windows\SysWOW64\OQJV.exe ETVAVIW.exe File opened for modification C:\windows\SysWOW64\JBJ.exe ULIDW.exe File created C:\windows\SysWOW64\AFNS.exe KPMSRU.exe File created C:\windows\SysWOW64\MDEBXL.exe MPMMW.exe File created C:\windows\SysWOW64\AKGCB.exe.bat RWWK.exe File created C:\windows\SysWOW64\ASFI.exe VNVTKR.exe File created C:\windows\SysWOW64\IMTEAGG.exe.bat JMMHOP.exe File created C:\windows\SysWOW64\SDLTUR.exe SYLFSM.exe File created C:\windows\SysWOW64\XEWCDR.exe.bat TWPU.exe File created C:\windows\SysWOW64\UTZJVW.exe.bat SVMPGO.exe File created C:\windows\SysWOW64\SMTUC.exe IONIVZ.exe File created C:\windows\SysWOW64\SMTUC.exe.bat IONIVZ.exe File created C:\windows\SysWOW64\HIGOF.exe.bat PNAV.exe File created C:\windows\SysWOW64\CKUGGUO.exe.bat IMTEAGG.exe File created C:\windows\SysWOW64\MZE.exe KLZZGII.exe File created C:\windows\SysWOW64\GZQJGAZ.exe AMQACX.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\system\HDWTC.exe BDO.exe File opened for modification C:\windows\ODU.exe WAQFAX.exe File created C:\windows\system\QURDWBV.exe JEQD.exe File opened for modification C:\windows\system\SJKELD.exe MOT.exe File created C:\windows\SKRMYK.exe OCLE.exe File opened for modification C:\windows\system\ZFQN.exe ZCARQF.exe File created C:\windows\RFJ.exe.bat PHVYWY.exe File created C:\windows\ULIDW.exe.bat VWPAJEF.exe File opened for modification C:\windows\system\DTGEK.exe OYXSZCL.exe File created C:\windows\EEPBL.exe.bat AWABZRC.exe File created C:\windows\system\CIFGO.exe.bat SKRMYK.exe File opened for modification C:\windows\system\OLK.exe LXFBJU.exe File created C:\windows\system\EJV.exe POMPU.exe File opened for modification C:\windows\XYCR.exe ZOSBJ.exe File created C:\windows\ABDSVX.exe.bat FYVCHN.exe File opened for modification C:\windows\system\CYS.exe BVPOWR.exe File opened for modification C:\windows\HHUNPJU.exe WPECXIM.exe File created C:\windows\system\ZCQTXBS.exe.bat BBIFG.exe File opened for modification C:\windows\GAN.exe ZFQN.exe File created C:\windows\system\VGJVYV.exe.bat NAFPVWQ.exe File created C:\windows\system\PHVYWY.exe.bat UJVNUNO.exe File created C:\windows\system\LRMKZCI.exe BTY.exe File created C:\windows\PLBE.exe NXFVFJL.exe File created C:\windows\system\RWWK.exe.bat SMTUC.exe File opened for modification C:\windows\system\FCIEWGY.exe MZE.exe File opened for modification C:\windows\system\CTJGQR.exe CYS.exe File created C:\windows\system\AIRNDF.exe.bat AFNS.exe File created C:\windows\FMUCWDU.exe UTZJVW.exe File created C:\windows\VZDH.exe JRXZFHW.exe File created C:\windows\JYXB.exe.bat ZAJHL.exe File created C:\windows\AMQACX.exe.bat MBIJNU.exe File opened for modification C:\windows\VKTL.exe XUMJG.exe File created C:\windows\system\QKIS.exe ZCTU.exe File created C:\windows\system\FKSOUKQ.exe HKKAL.exe File opened for modification C:\windows\VAVMVJI.exe SEQDK.exe File created C:\windows\system\CTJGQR.exe.bat CYS.exe File opened for modification C:\windows\system\VNVTKR.exe QKRVFAK.exe File created C:\windows\ABDSVX.exe FYVCHN.exe File opened for modification C:\windows\system\BSUDLMZ.exe CZR.exe File created C:\windows\system\TWPU.exe.bat PTRHRG.exe File opened for modification C:\windows\system\LXFBJU.exe QKIS.exe File created C:\windows\system\RZGFZ.exe PBSLK.exe File created C:\windows\system\BDO.exe.bat RFJ.exe File created C:\windows\system\LHFXM.exe.bat WREGGYU.exe File created C:\windows\FYVCHN.exe.bat HDWTC.exe File created C:\windows\system\DTGEK.exe.bat OYXSZCL.exe File created C:\windows\PTRHRG.exe.bat WSK.exe File created C:\windows\system\QKIS.exe.bat ZCTU.exe File created C:\windows\system\USHF.exe IKAXFN.exe File opened for modification C:\windows\system\RWWK.exe SMTUC.exe File created C:\windows\system\GXF.exe.bat AKGCB.exe File created C:\windows\VAVMVJI.exe.bat SEQDK.exe File created C:\windows\KDMPB.exe.bat NCKFXT.exe File created C:\windows\VLQXHJ.exe IAH.exe File created C:\windows\system\AHFMJO.exe.bat PPCUB.exe File created C:\windows\ZWTG.exe.bat MLLHWO.exe File created C:\windows\LHM.exe a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe File created C:\windows\GAN.exe ZFQN.exe File opened for modification C:\windows\system\FKSOUKQ.exe HKKAL.exe File created C:\windows\SYLFSM.exe CKUGGUO.exe File created C:\windows\VAVMVJI.exe SEQDK.exe File opened for modification C:\windows\VWPAJEF.exe KDMPB.exe File opened for modification C:\windows\ZWTG.exe MLLHWO.exe File opened for modification C:\windows\VZDH.exe JRXZFHW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 2792 4576 WerFault.exe 80 4216 212 WerFault.exe 84 2040 4636 WerFault.exe 91 3804 1976 WerFault.exe 96 1940 2992 WerFault.exe 101 3656 1304 WerFault.exe 106 4940 4948 WerFault.exe 111 2432 5084 WerFault.exe 116 2276 2016 WerFault.exe 121 4472 1568 WerFault.exe 126 3772 4404 WerFault.exe 131 1244 4332 WerFault.exe 136 3716 1308 WerFault.exe 141 1928 4460 WerFault.exe 146 4140 2204 WerFault.exe 151 4768 1940 WerFault.exe 156 2564 376 WerFault.exe 161 2220 2120 WerFault.exe 166 4516 2432 WerFault.exe 171 1300 4228 WerFault.exe 176 4376 3628 WerFault.exe 181 4400 4488 WerFault.exe 186 3828 1812 WerFault.exe 191 1416 3088 WerFault.exe 196 3324 3484 WerFault.exe 201 3684 2652 WerFault.exe 206 2796 3884 WerFault.exe 211 3576 3468 WerFault.exe 216 4992 3788 WerFault.exe 221 1312 2276 WerFault.exe 226 3772 4292 WerFault.exe 231 1568 2808 WerFault.exe 236 2444 3848 WerFault.exe 241 3108 624 WerFault.exe 246 2296 3924 WerFault.exe 251 3964 1864 WerFault.exe 256 3396 3008 WerFault.exe 261 2392 3596 WerFault.exe 267 3316 2372 WerFault.exe 273 748 4868 WerFault.exe 278 2892 1068 WerFault.exe 283 4792 2852 WerFault.exe 288 3952 3716 WerFault.exe 293 4440 3768 WerFault.exe 298 1760 372 WerFault.exe 303 1308 3980 WerFault.exe 308 3964 4512 WerFault.exe 313 1692 2544 WerFault.exe 318 4516 4784 WerFault.exe 323 2372 3036 WerFault.exe 328 1476 736 WerFault.exe 333 2116 4920 WerFault.exe 338 4176 3296 WerFault.exe 343 1856 1496 WerFault.exe 348 1880 2068 WerFault.exe 353 3104 4048 WerFault.exe 358 2220 1564 WerFault.exe 365 3128 1584 WerFault.exe 371 656 5072 WerFault.exe 376 1872 1604 WerFault.exe 381 4692 4520 WerFault.exe 386 2264 3552 WerFault.exe 392 2236 4964 WerFault.exe 397 3324 2828 WerFault.exe 402 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4576 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 4576 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 212 LHM.exe 212 LHM.exe 4636 AMSDXVU.exe 4636 AMSDXVU.exe 1976 FFGGKTD.exe 1976 FFGGKTD.exe 2992 SPKEPK.exe 2992 SPKEPK.exe 1304 LDJKUMU.exe 1304 LDJKUMU.exe 4948 ZOSBJ.exe 4948 ZOSBJ.exe 5084 XYCR.exe 5084 XYCR.exe 2016 SMHAUC.exe 2016 SMHAUC.exe 1568 WCO.exe 1568 WCO.exe 4404 JFKHLER.exe 4404 JFKHLER.exe 4332 ESPQ.exe 4332 ESPQ.exe 1308 MFBX.exe 1308 MFBX.exe 4460 BVPOWR.exe 4460 BVPOWR.exe 2204 CYS.exe 2204 CYS.exe 1940 CTJGQR.exe 1940 CTJGQR.exe 376 OMMZYYK.exe 376 OMMZYYK.exe 2120 WAQFAX.exe 2120 WAQFAX.exe 2432 ODU.exe 2432 ODU.exe 4228 ETVAVIW.exe 4228 ETVAVIW.exe 3628 OQJV.exe 3628 OQJV.exe 4488 PTKK.exe 4488 PTKK.exe 1812 OEV.exe 1812 OEV.exe 3088 YEXFZ.exe 3088 YEXFZ.exe 3484 ICDR.exe 3484 ICDR.exe 2652 NCKFXT.exe 2652 NCKFXT.exe 3884 KDMPB.exe 3884 KDMPB.exe 3468 VWPAJEF.exe 3468 VWPAJEF.exe 3788 ULIDW.exe 3788 ULIDW.exe 2276 JBJ.exe 2276 JBJ.exe 4292 CENYJ.exe 4292 CENYJ.exe 2808 KKSFT.exe 2808 KKSFT.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4576 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 4576 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 212 LHM.exe 212 LHM.exe 4636 AMSDXVU.exe 4636 AMSDXVU.exe 1976 FFGGKTD.exe 1976 FFGGKTD.exe 2992 SPKEPK.exe 2992 SPKEPK.exe 1304 LDJKUMU.exe 1304 LDJKUMU.exe 4948 ZOSBJ.exe 4948 ZOSBJ.exe 5084 XYCR.exe 5084 XYCR.exe 2016 SMHAUC.exe 2016 SMHAUC.exe 1568 WCO.exe 1568 WCO.exe 4404 JFKHLER.exe 4404 JFKHLER.exe 4332 ESPQ.exe 4332 ESPQ.exe 1308 MFBX.exe 1308 MFBX.exe 4460 BVPOWR.exe 4460 BVPOWR.exe 2204 CYS.exe 2204 CYS.exe 1940 CTJGQR.exe 1940 CTJGQR.exe 376 OMMZYYK.exe 376 OMMZYYK.exe 2120 WAQFAX.exe 2120 WAQFAX.exe 2432 ODU.exe 2432 ODU.exe 4228 ETVAVIW.exe 4228 ETVAVIW.exe 3628 OQJV.exe 3628 OQJV.exe 4488 PTKK.exe 4488 PTKK.exe 1812 OEV.exe 1812 OEV.exe 3088 YEXFZ.exe 3088 YEXFZ.exe 3484 ICDR.exe 3484 ICDR.exe 2652 NCKFXT.exe 2652 NCKFXT.exe 3884 KDMPB.exe 3884 KDMPB.exe 3468 VWPAJEF.exe 3468 VWPAJEF.exe 3788 ULIDW.exe 3788 ULIDW.exe 2276 JBJ.exe 2276 JBJ.exe 4292 CENYJ.exe 4292 CENYJ.exe 2808 KKSFT.exe 2808 KKSFT.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4576 wrote to memory of 4760 4576 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 81 PID 4576 wrote to memory of 4760 4576 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 81 PID 4576 wrote to memory of 4760 4576 a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe 81 PID 4760 wrote to memory of 212 4760 cmd.exe 84 PID 4760 wrote to memory of 212 4760 cmd.exe 84 PID 4760 wrote to memory of 212 4760 cmd.exe 84 PID 212 wrote to memory of 1328 212 LHM.exe 87 PID 212 wrote to memory of 1328 212 LHM.exe 87 PID 212 wrote to memory of 1328 212 LHM.exe 87 PID 1328 wrote to memory of 4636 1328 cmd.exe 91 PID 1328 wrote to memory of 4636 1328 cmd.exe 91 PID 1328 wrote to memory of 4636 1328 cmd.exe 91 PID 4636 wrote to memory of 1864 4636 AMSDXVU.exe 92 PID 4636 wrote to memory of 1864 4636 AMSDXVU.exe 92 PID 4636 wrote to memory of 1864 4636 AMSDXVU.exe 92 PID 1864 wrote to memory of 1976 1864 cmd.exe 96 PID 1864 wrote to memory of 1976 1864 cmd.exe 96 PID 1864 wrote to memory of 1976 1864 cmd.exe 96 PID 1976 wrote to memory of 2244 1976 FFGGKTD.exe 97 PID 1976 wrote to memory of 2244 1976 FFGGKTD.exe 97 PID 1976 wrote to memory of 2244 1976 FFGGKTD.exe 97 PID 2244 wrote to memory of 2992 2244 cmd.exe 101 PID 2244 wrote to memory of 2992 2244 cmd.exe 101 PID 2244 wrote to memory of 2992 2244 cmd.exe 101 PID 2992 wrote to memory of 3088 2992 SPKEPK.exe 102 PID 2992 wrote to memory of 3088 2992 SPKEPK.exe 102 PID 2992 wrote to memory of 3088 2992 SPKEPK.exe 102 PID 3088 wrote to memory of 1304 3088 cmd.exe 106 PID 3088 wrote to memory of 1304 3088 cmd.exe 106 PID 3088 wrote to memory of 1304 3088 cmd.exe 106 PID 1304 wrote to memory of 920 1304 LDJKUMU.exe 107 PID 1304 wrote to memory of 920 1304 LDJKUMU.exe 107 PID 1304 wrote to memory of 920 1304 LDJKUMU.exe 107 PID 920 wrote to memory of 4948 920 cmd.exe 111 PID 920 wrote to memory of 4948 920 cmd.exe 111 PID 920 wrote to memory of 4948 920 cmd.exe 111 PID 4948 wrote to memory of 992 4948 ZOSBJ.exe 112 PID 4948 wrote to memory of 992 4948 ZOSBJ.exe 112 PID 4948 wrote to memory of 992 4948 ZOSBJ.exe 112 PID 992 wrote to memory of 5084 992 cmd.exe 116 PID 992 wrote to memory of 5084 992 cmd.exe 116 PID 992 wrote to memory of 5084 992 cmd.exe 116 PID 5084 wrote to memory of 1688 5084 XYCR.exe 117 PID 5084 wrote to memory of 1688 5084 XYCR.exe 117 PID 5084 wrote to memory of 1688 5084 XYCR.exe 117 PID 1688 wrote to memory of 2016 1688 cmd.exe 121 PID 1688 wrote to memory of 2016 1688 cmd.exe 121 PID 1688 wrote to memory of 2016 1688 cmd.exe 121 PID 2016 wrote to memory of 4544 2016 SMHAUC.exe 122 PID 2016 wrote to memory of 4544 2016 SMHAUC.exe 122 PID 2016 wrote to memory of 4544 2016 SMHAUC.exe 122 PID 4544 wrote to memory of 1568 4544 cmd.exe 126 PID 4544 wrote to memory of 1568 4544 cmd.exe 126 PID 4544 wrote to memory of 1568 4544 cmd.exe 126 PID 1568 wrote to memory of 2752 1568 WCO.exe 127 PID 1568 wrote to memory of 2752 1568 WCO.exe 127 PID 1568 wrote to memory of 2752 1568 WCO.exe 127 PID 2752 wrote to memory of 4404 2752 cmd.exe 131 PID 2752 wrote to memory of 4404 2752 cmd.exe 131 PID 2752 wrote to memory of 4404 2752 cmd.exe 131 PID 4404 wrote to memory of 4760 4404 JFKHLER.exe 132 PID 4404 wrote to memory of 4760 4404 JFKHLER.exe 132 PID 4404 wrote to memory of 4760 4404 JFKHLER.exe 132 PID 4760 wrote to memory of 4332 4760 cmd.exe 136
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe"C:\Users\Admin\AppData\Local\Temp\a3451057977e34cb4163bc3a5ff2a24bfaeb21e06113e9952ebfe76e3ec3a6ed.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LHM.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\windows\LHM.exeC:\windows\LHM.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AMSDXVU.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\windows\AMSDXVU.exeC:\windows\AMSDXVU.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FFGGKTD.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\windows\FFGGKTD.exeC:\windows\FFGGKTD.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SPKEPK.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\windows\SPKEPK.exeC:\windows\SPKEPK.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LDJKUMU.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\windows\SysWOW64\LDJKUMU.exeC:\windows\system32\LDJKUMU.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZOSBJ.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:920 -
C:\windows\SysWOW64\ZOSBJ.exeC:\windows\system32\ZOSBJ.exe13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XYCR.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\windows\XYCR.exeC:\windows\XYCR.exe15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SMHAUC.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\windows\system\SMHAUC.exeC:\windows\system\SMHAUC.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WCO.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\windows\SysWOW64\WCO.exeC:\windows\system32\WCO.exe19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JFKHLER.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\windows\SysWOW64\JFKHLER.exeC:\windows\system32\JFKHLER.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ESPQ.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\windows\ESPQ.exeC:\windows\ESPQ.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MFBX.exe.bat" "24⤵PID:3372
-
C:\windows\MFBX.exeC:\windows\MFBX.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BVPOWR.exe.bat" "26⤵PID:2068
-
C:\windows\SysWOW64\BVPOWR.exeC:\windows\system32\BVPOWR.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CYS.exe.bat" "28⤵PID:856
-
C:\windows\system\CYS.exeC:\windows\system\CYS.exe29⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CTJGQR.exe.bat" "30⤵PID:5080
-
C:\windows\system\CTJGQR.exeC:\windows\system\CTJGQR.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OMMZYYK.exe.bat" "32⤵PID:4728
-
C:\windows\OMMZYYK.exeC:\windows\OMMZYYK.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WAQFAX.exe.bat" "34⤵PID:4384
-
C:\windows\system\WAQFAX.exeC:\windows\system\WAQFAX.exe35⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ODU.exe.bat" "36⤵PID:4948
-
C:\windows\ODU.exeC:\windows\ODU.exe37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ETVAVIW.exe.bat" "38⤵PID:1604
-
C:\windows\SysWOW64\ETVAVIW.exeC:\windows\system32\ETVAVIW.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OQJV.exe.bat" "40⤵PID:2016
-
C:\windows\SysWOW64\OQJV.exeC:\windows\system32\OQJV.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PTKK.exe.bat" "42⤵PID:1740
-
C:\windows\SysWOW64\PTKK.exeC:\windows\system32\PTKK.exe43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OEV.exe.bat" "44⤵PID:3620
-
C:\windows\system\OEV.exeC:\windows\system\OEV.exe45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YEXFZ.exe.bat" "46⤵PID:2664
-
C:\windows\YEXFZ.exeC:\windows\YEXFZ.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3088 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ICDR.exe.bat" "48⤵PID:4480
-
C:\windows\SysWOW64\ICDR.exeC:\windows\system32\ICDR.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NCKFXT.exe.bat" "50⤵PID:5080
-
C:\windows\SysWOW64\NCKFXT.exeC:\windows\system32\NCKFXT.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KDMPB.exe.bat" "52⤵PID:1816
-
C:\windows\KDMPB.exeC:\windows\KDMPB.exe53⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VWPAJEF.exe.bat" "54⤵PID:1688
-
C:\windows\VWPAJEF.exeC:\windows\VWPAJEF.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ULIDW.exe.bat" "56⤵PID:3104
-
C:\windows\ULIDW.exeC:\windows\ULIDW.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JBJ.exe.bat" "58⤵PID:2120
-
C:\windows\SysWOW64\JBJ.exeC:\windows\system32\JBJ.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CENYJ.exe.bat" "60⤵PID:656
-
C:\windows\SysWOW64\CENYJ.exeC:\windows\system32\CENYJ.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KKSFT.exe.bat" "62⤵PID:5072
-
C:\windows\system\KKSFT.exeC:\windows\system\KKSFT.exe63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UIGZ.exe.bat" "64⤵PID:4672
-
C:\windows\UIGZ.exeC:\windows\UIGZ.exe65⤵
- Checks computer location settings
- Executes dropped EXE
PID:3848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PDKJLB.exe.bat" "66⤵PID:3888
-
C:\windows\PDKJLB.exeC:\windows\PDKJLB.exe67⤵
- Executes dropped EXE
PID:624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XIPPVA.exe.bat" "68⤵PID:4440
-
C:\windows\system\XIPPVA.exeC:\windows\system\XIPPVA.exe69⤵
- Checks computer location settings
- Executes dropped EXE
PID:3924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PMT.exe.bat" "70⤵PID:2784
-
C:\windows\PMT.exeC:\windows\PMT.exe71⤵
- Checks computer location settings
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BUZTN.exe.bat" "72⤵PID:3012
-
C:\windows\BUZTN.exeC:\windows\BUZTN.exe73⤵
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WPECXIM.exe.bat" "74⤵PID:1948
-
C:\windows\SysWOW64\WPECXIM.exeC:\windows\system32\WPECXIM.exe75⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HHUNPJU.exe.bat" "76⤵PID:4940
-
C:\windows\HHUNPJU.exeC:\windows\HHUNPJU.exe77⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GSKLODP.exe.bat" "78⤵PID:2748
-
C:\windows\SysWOW64\GSKLODP.exeC:\windows\system32\GSKLODP.exe79⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4868 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OYXSZCL.exe.bat" "80⤵PID:4160
-
C:\windows\SysWOW64\OYXSZCL.exeC:\windows\system32\OYXSZCL.exe81⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DTGEK.exe.bat" "82⤵PID:316
-
C:\windows\system\DTGEK.exeC:\windows\system\DTGEK.exe83⤵
- Checks computer location settings
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MBIJNU.exe.bat" "84⤵PID:5040
-
C:\windows\SysWOW64\MBIJNU.exeC:\windows\system32\MBIJNU.exe85⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3716 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AMQACX.exe.bat" "86⤵PID:4772
-
C:\windows\AMQACX.exeC:\windows\AMQACX.exe87⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GZQJGAZ.exe.bat" "88⤵PID:2320
-
C:\windows\SysWOW64\GZQJGAZ.exeC:\windows\system32\GZQJGAZ.exe89⤵
- Executes dropped EXE
PID:372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ONCPRY.exe.bat" "90⤵PID:4204
-
C:\windows\system\ONCPRY.exeC:\windows\system\ONCPRY.exe91⤵
- Executes dropped EXE
PID:3980 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\IAH.exe.bat" "92⤵PID:952
-
C:\windows\SysWOW64\IAH.exeC:\windows\system32\IAH.exe93⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VLQXHJ.exe.bat" "94⤵PID:1688
-
C:\windows\VLQXHJ.exeC:\windows\VLQXHJ.exe95⤵
- Executes dropped EXE
PID:2544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NLSC.exe.bat" "96⤵PID:5056
-
C:\windows\system\NLSC.exeC:\windows\system\NLSC.exe97⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AWABZRC.exe.bat" "98⤵PID:5052
-
C:\windows\SysWOW64\AWABZRC.exeC:\windows\system32\AWABZRC.exe99⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EEPBL.exe.bat" "100⤵PID:4896
-
C:\windows\EEPBL.exeC:\windows\EEPBL.exe101⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JEQD.exe.bat" "102⤵PID:1312
-
C:\windows\SysWOW64\JEQD.exeC:\windows\system32\JEQD.exe103⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QURDWBV.exe.bat" "104⤵PID:1740
-
C:\windows\system\QURDWBV.exeC:\windows\system\QURDWBV.exe105⤵
- Executes dropped EXE
PID:3296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LFIBKMR.exe.bat" "106⤵PID:2788
-
C:\windows\LFIBKMR.exeC:\windows\LFIBKMR.exe107⤵
- Checks computer location settings
- Executes dropped EXE
PID:1496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QISHTQU.exe.bat" "108⤵PID:2760
-
C:\windows\SysWOW64\QISHTQU.exeC:\windows\system32\QISHTQU.exe109⤵
- Checks computer location settings
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OYR.exe.bat" "110⤵PID:5076
-
C:\windows\OYR.exeC:\windows\OYR.exe111⤵
- Checks computer location settings
- Executes dropped EXE
PID:4048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FGGP.exe.bat" "112⤵PID:1876
-
C:\windows\SysWOW64\FGGP.exeC:\windows\system32\FGGP.exe113⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HEZRQQM.exe.bat" "114⤵PID:1304
-
C:\windows\HEZRQQM.exeC:\windows\HEZRQQM.exe115⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XUMJG.exe.bat" "116⤵PID:1988
-
C:\windows\system\XUMJG.exeC:\windows\system\XUMJG.exe117⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:5072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VKTL.exe.bat" "118⤵PID:4924
-
C:\windows\VKTL.exeC:\windows\VKTL.exe119⤵
- Checks computer location settings
- Executes dropped EXE
PID:1604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XIZG.exe.bat" "120⤵PID:2836
-
C:\windows\system\XIZG.exeC:\windows\system\XIZG.exe121⤵
- Executes dropped EXE
PID:4520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WSK.exe.bat" "122⤵PID:3764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-