Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 19:19
Static task
static1
Behavioral task
behavioral1
Sample
17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe
Resource
win10v2004-20240709-en
General
-
Target
17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe
-
Size
384KB
-
MD5
439d4a59b2b1f8daf1e4f8533e7af59e
-
SHA1
79452ba43ca5aac885ff8875de49b2fb1cea1a2c
-
SHA256
17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6
-
SHA512
9df0965ba18ebb0655db4ebab62f37e25720f7aaaf781ee4495dd82f71cbbe80493348ce01c94044dde03b59f674fe75cb440eb6a278bb0f4f98bc351985c541
-
SSDEEP
6144:InqQjhIlSAzZ02GANJQttkEjiPISUOgW9X+hOGzC/NM:InRbnANJQttkmZzcukG2/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation OZFAK.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation LULU.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation FMUHH.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation DEXER.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation HKWWCS.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation ACFO.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation TFT.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation RUBPTFO.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation DHLURV.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation WQATHQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation CMAE.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation WXR.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation GFDFB.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation UUJV.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation XGATNJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation XWZAML.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation JDZIXQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation HOTM.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation RMNFTCJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation HXPYAW.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation EOMF.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation YOPQP.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation FCQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation RYWAT.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation GRSRR.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation QAHG.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation QYO.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation DFITFHE.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation QIX.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation HEFO.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation CQUGI.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation MOI.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation CTA.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation VQMBPP.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation KVJNNTV.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation USZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation RUTH.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation LWFMSR.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation WLKZMC.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation MXKOO.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation PBEYF.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation IVLXN.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation JMEI.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation YIFGZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation MQE.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation GYJI.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation LMTKL.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation CLIRGGR.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation GKU.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation MZHK.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation HMGSV.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation KTRXBE.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation PWDOC.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation QSOCZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation AVR.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation LWKLA.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation MBAAAID.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation USFUNR.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation VVW.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation YOURJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation TKQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation UDNMVTC.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation MGQQIJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation DDYG.exe -
Executes dropped EXE 64 IoCs
pid Process 2444 SXP.exe 2640 PNOC.exe 2580 SOYSRU.exe 3468 YJJSXR.exe 612 RMNFTCJ.exe 3600 WXR.exe 924 DDYG.exe 3796 RYWAT.exe 1756 KBAVYAR.exe 1140 UUJV.exe 1912 BKDYXIP.exe 1932 AIRNDF.exe 1052 VVW.exe 2860 YDR.exe 232 VTE.exe 1896 LRSVBH.exe 780 AITUAVL.exe 536 YXT.exe 4456 QAXAF.exe 1400 CJDIR.exe 904 ATVE.exe 4308 HKWWCS.exe 3404 GSWTYDX.exe 1840 FDZJ.exe 4840 ENC.exe 4608 NLW.exe 4252 RBDAF.exe 372 ACFO.exe 1828 XSSX.exe 3064 IKC.exe 2244 XNTJVN.exe 4708 QIX.exe 4872 GRSRR.exe 4352 CWYOY.exe 3364 GPBXPC.exe 1416 RIWQXJB.exe 4804 QAHG.exe 4148 XGATNJ.exe 3932 HEFO.exe 3384 NZRHI.exe 2184 GSGSRH.exe 4304 HQOBCRI.exe 4472 GFAEP.exe 3844 HDHMZGG.exe 3512 BRZOKAO.exe 3024 XWZAML.exe 4796 RKQJGW.exe 2948 USZ.exe 1932 YIFGZ.exe 1936 AVR.exe 3552 DEXER.exe 4352 WHJA.exe 952 OZFAK.exe 3844 HCWDO.exe 3408 TFT.exe 3348 GQPH.exe 3100 FBFPV.exe 1928 NOREG.exe 536 JMEI.exe 2936 HXPYAW.exe 2724 FVC.exe 4252 JDJPUV.exe 1784 CQUGI.exe 4636 MOI.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\PNOC.exe SXP.exe File created C:\windows\SysWOW64\RPZTNPA.exe.bat LUV.exe File created C:\windows\SysWOW64\FCQ.exe DHLURV.exe File opened for modification C:\windows\SysWOW64\MBAAAID.exe ALUA.exe File opened for modification C:\windows\SysWOW64\MXKOO.exe SKF.exe File opened for modification C:\windows\SysWOW64\CQUGI.exe JDJPUV.exe File created C:\windows\SysWOW64\MKYSE.exe.bat SXT.exe File created C:\windows\SysWOW64\PBEYF.exe GBNMXO.exe File created C:\windows\SysWOW64\GSGSRH.exe.bat NZRHI.exe File created C:\windows\SysWOW64\ULOWCLK.exe.bat RUBPTFO.exe File created C:\windows\SysWOW64\QZX.exe MJRHD.exe File created C:\windows\SysWOW64\TFXGF.exe SCUKRY.exe File opened for modification C:\windows\SysWOW64\MQE.exe JDZIXQ.exe File created C:\windows\SysWOW64\RUBPTFO.exe FMUHH.exe File created C:\windows\SysWOW64\OKYO.exe.bat LCQ.exe File opened for modification C:\windows\SysWOW64\SVYTB.exe MZHK.exe File created C:\windows\SysWOW64\PNOC.exe.bat SXP.exe File created C:\windows\SysWOW64\GSGSRH.exe NZRHI.exe File created C:\windows\SysWOW64\GQPH.exe TFT.exe File created C:\windows\SysWOW64\GKDM.exe MXKOO.exe File created C:\windows\SysWOW64\VTE.exe.bat YDR.exe File created C:\windows\SysWOW64\SVYTB.exe MZHK.exe File created C:\windows\SysWOW64\GSWTYDX.exe HKWWCS.exe File created C:\windows\SysWOW64\HDHMZGG.exe.bat GFAEP.exe File opened for modification C:\windows\SysWOW64\DDKA.exe QSOCZ.exe File created C:\windows\SysWOW64\MXKOO.exe.bat SKF.exe File created C:\windows\SysWOW64\FYCYLOW.exe WQATHQ.exe File opened for modification C:\windows\SysWOW64\PBEYF.exe GBNMXO.exe File opened for modification C:\windows\SysWOW64\RIWQXJB.exe GPBXPC.exe File opened for modification C:\windows\SysWOW64\GISN.exe CEUSFIT.exe File opened for modification C:\windows\SysWOW64\HXPYAW.exe JMEI.exe File created C:\windows\SysWOW64\MKYSE.exe SXT.exe File created C:\windows\SysWOW64\GYJI.exe.bat MKYSE.exe File created C:\windows\SysWOW64\AVMZD.exe KVJNNTV.exe File opened for modification C:\windows\SysWOW64\ULOWCLK.exe RUBPTFO.exe File created C:\windows\SysWOW64\GVQ.exe.bat USFUNR.exe File opened for modification C:\windows\SysWOW64\RUBPTFO.exe FMUHH.exe File created C:\windows\SysWOW64\MIMJV.exe BQC.exe File created C:\windows\SysWOW64\AITUAVL.exe LRSVBH.exe File opened for modification C:\windows\SysWOW64\WHJA.exe DEXER.exe File created C:\windows\SysWOW64\SVYTB.exe.bat MZHK.exe File opened for modification C:\windows\SysWOW64\KVJNNTV.exe GFDFB.exe File created C:\windows\SysWOW64\SOYSRU.exe PNOC.exe File opened for modification C:\windows\SysWOW64\SOYSRU.exe PNOC.exe File created C:\windows\SysWOW64\FYCYLOW.exe.bat WQATHQ.exe File opened for modification C:\windows\SysWOW64\GYJI.exe MKYSE.exe File created C:\windows\SysWOW64\WOLBIXQ.exe LRAV.exe File created C:\windows\SysWOW64\GYJI.exe MKYSE.exe File created C:\windows\SysWOW64\GRSRR.exe QIX.exe File created C:\windows\SysWOW64\WUYDSKB.exe HZOR.exe File created C:\windows\SysWOW64\CQUGI.exe JDJPUV.exe File opened for modification C:\windows\SysWOW64\BAMMG.exe FDOP.exe File opened for modification C:\windows\SysWOW64\NZRHI.exe HEFO.exe File opened for modification C:\windows\SysWOW64\AVR.exe YIFGZ.exe File created C:\windows\SysWOW64\KVJNNTV.exe.bat GFDFB.exe File created C:\windows\SysWOW64\YJJSXR.exe.bat SOYSRU.exe File opened for modification C:\windows\SysWOW64\AITUAVL.exe LRSVBH.exe File opened for modification C:\windows\SysWOW64\DEXER.exe AVR.exe File opened for modification C:\windows\SysWOW64\WOLBIXQ.exe LRAV.exe File opened for modification C:\windows\SysWOW64\IVLXN.exe TFXGF.exe File opened for modification C:\windows\SysWOW64\FCQ.exe DHLURV.exe File created C:\windows\SysWOW64\GFDFB.exe.bat CMAE.exe File opened for modification C:\windows\SysWOW64\GSWTYDX.exe HKWWCS.exe File created C:\windows\SysWOW64\IVLXN.exe TFXGF.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\windows\LRAV.exe NGIY.exe File created C:\windows\system\HKWWCS.exe.bat ATVE.exe File created C:\windows\YIFGZ.exe USZ.exe File opened for modification C:\windows\MOI.exe CQUGI.exe File created C:\windows\system\CLIRGGR.exe ULZFZ.exe File opened for modification C:\windows\system\CLIRGGR.exe ULZFZ.exe File created C:\windows\system\AKSQQLB.exe HOTM.exe File opened for modification C:\windows\NULNYA.exe LWKLA.exe File opened for modification C:\windows\system\GBNMXO.exe GYJI.exe File created C:\windows\VVW.exe.bat AIRNDF.exe File created C:\windows\system\IKC.exe XSSX.exe File opened for modification C:\windows\system\GFAEP.exe HQOBCRI.exe File created C:\windows\NOREG.exe FBFPV.exe File opened for modification C:\windows\ATXC.exe BAMMG.exe File created C:\windows\system\LWFMSR.exe.bat WGSD.exe File opened for modification C:\windows\system\PWDOC.exe YOPQP.exe File created C:\windows\system\HOTM.exe.bat YRZD.exe File created C:\windows\system\RBDAF.exe.bat NLW.exe File created C:\windows\system\GFAEP.exe HQOBCRI.exe File created C:\windows\system\POODSAU.exe WLKZMC.exe File created C:\windows\DHLURV.exe MGQQIJ.exe File created C:\windows\system\XXJ.exe.bat FCQ.exe File opened for modification C:\windows\system\CQBJ.exe GKDM.exe File created C:\windows\YXT.exe.bat AITUAVL.exe File created C:\windows\system\QIX.exe XNTJVN.exe File created C:\windows\YXT.exe AITUAVL.exe File created C:\windows\LRAV.exe.bat NGIY.exe File created C:\windows\system\RYWAT.exe.bat DDYG.exe File opened for modification C:\windows\VVW.exe AIRNDF.exe File created C:\windows\ERTK.exe CTA.exe File created C:\windows\system\YOURJ.exe.bat ULOWCLK.exe File created C:\windows\system\ATVE.exe.bat CJDIR.exe File created C:\windows\YTLNX.exe.bat QNZZMH.exe File created C:\windows\system\RKS.exe.bat NULNYA.exe File created C:\windows\system\SXT.exe CZG.exe File opened for modification C:\windows\system\QIX.exe XNTJVN.exe File created C:\windows\system\YOPQP.exe KTRXBE.exe File created C:\windows\system\FDOP.exe WUYDSKB.exe File opened for modification C:\windows\KTRXBE.exe YQGKR.exe File created C:\windows\DFITFHE.exe.bat OKYO.exe File opened for modification C:\windows\system\QNZZMH.exe RUWRMTV.exe File created C:\windows\system\HZOR.exe.bat ERTK.exe File created C:\windows\system\OZFAK.exe WHJA.exe File opened for modification C:\windows\system\FBFPV.exe GQPH.exe File created C:\windows\MOI.exe.bat CQUGI.exe File created C:\windows\system\QNZZMH.exe RUWRMTV.exe File created C:\windows\HMGSV.exe YOURJ.exe File opened for modification C:\windows\system\XXJ.exe FCQ.exe File created C:\windows\KBAVYAR.exe.bat RYWAT.exe File created C:\windows\QAHG.exe.bat RIWQXJB.exe File created C:\windows\system\CQBJ.exe.bat GKDM.exe File created C:\windows\KTRXBE.exe.bat YQGKR.exe File created C:\windows\LRAV.exe NGIY.exe File created C:\windows\system\HKWWCS.exe ATVE.exe File opened for modification C:\windows\system\YOURJ.exe ULOWCLK.exe File created C:\windows\LUV.exe HMGSV.exe File opened for modification C:\windows\ENC.exe FDZJ.exe File opened for modification C:\windows\YIFGZ.exe USZ.exe File created C:\windows\JDJPUV.exe.bat FVC.exe File created C:\windows\YTLNX.exe QNZZMH.exe File opened for modification C:\windows\system\QSOCZ.exe AKSQQLB.exe File opened for modification C:\windows\system\RKS.exe NULNYA.exe File created C:\windows\system\SKF.exe.bat POODSAU.exe File opened for modification C:\windows\system\DDYG.exe WXR.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 4952 3928 WerFault.exe 81 3792 2444 WerFault.exe 89 1328 2640 WerFault.exe 96 4988 2580 WerFault.exe 101 4508 3468 WerFault.exe 106 3916 612 WerFault.exe 110 4764 3600 WerFault.exe 116 1704 924 WerFault.exe 121 3380 3796 WerFault.exe 126 3556 1756 WerFault.exe 131 4020 1140 WerFault.exe 136 3244 1912 WerFault.exe 141 3484 1932 WerFault.exe 146 4000 1052 WerFault.exe 151 3732 2860 WerFault.exe 156 4996 232 WerFault.exe 161 3552 1896 WerFault.exe 166 1332 780 WerFault.exe 171 4428 536 WerFault.exe 176 2940 4456 WerFault.exe 181 412 1400 WerFault.exe 186 4492 904 WerFault.exe 191 1940 4308 WerFault.exe 196 212 3404 WerFault.exe 201 1464 1840 WerFault.exe 206 5028 4840 WerFault.exe 211 4136 4608 WerFault.exe 216 3680 4252 WerFault.exe 221 1548 372 WerFault.exe 226 3300 1828 WerFault.exe 231 1400 3064 WerFault.exe 236 1404 2244 WerFault.exe 241 1468 4708 WerFault.exe 247 4396 4872 WerFault.exe 251 2440 4352 WerFault.exe 257 4608 3364 WerFault.exe 262 3880 1416 WerFault.exe 268 1964 4804 WerFault.exe 273 4528 4148 WerFault.exe 279 1932 3932 WerFault.exe 284 1244 3384 WerFault.exe 289 4712 2184 WerFault.exe 294 4916 4304 WerFault.exe 299 1824 4472 WerFault.exe 304 3364 3844 WerFault.exe 309 2428 3512 WerFault.exe 314 4456 3024 WerFault.exe 319 4936 4796 WerFault.exe 324 1468 2948 WerFault.exe 329 3316 1932 WerFault.exe 334 3868 1936 WerFault.exe 339 2240 3552 WerFault.exe 344 4316 4352 WerFault.exe 349 1248 952 WerFault.exe 354 376 3844 WerFault.exe 359 5040 3408 WerFault.exe 364 3648 3348 WerFault.exe 369 4764 3100 WerFault.exe 374 2212 1928 WerFault.exe 379 3240 536 WerFault.exe 384 2184 2936 WerFault.exe 389 1344 2724 WerFault.exe 394 2964 4252 WerFault.exe 399 4616 1784 WerFault.exe 404 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3928 17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe 3928 17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe 2444 SXP.exe 2444 SXP.exe 2640 PNOC.exe 2640 PNOC.exe 2580 SOYSRU.exe 2580 SOYSRU.exe 3468 YJJSXR.exe 3468 YJJSXR.exe 612 RMNFTCJ.exe 612 RMNFTCJ.exe 3600 WXR.exe 3600 WXR.exe 924 DDYG.exe 924 DDYG.exe 3796 RYWAT.exe 3796 RYWAT.exe 1756 KBAVYAR.exe 1756 KBAVYAR.exe 1140 UUJV.exe 1140 UUJV.exe 1912 BKDYXIP.exe 1912 BKDYXIP.exe 1932 AIRNDF.exe 1932 AIRNDF.exe 1052 VVW.exe 1052 VVW.exe 2860 YDR.exe 2860 YDR.exe 232 VTE.exe 232 VTE.exe 1896 LRSVBH.exe 1896 LRSVBH.exe 780 AITUAVL.exe 780 AITUAVL.exe 536 YXT.exe 536 YXT.exe 4456 QAXAF.exe 4456 QAXAF.exe 1400 CJDIR.exe 1400 CJDIR.exe 904 ATVE.exe 904 ATVE.exe 4308 HKWWCS.exe 4308 HKWWCS.exe 3404 GSWTYDX.exe 3404 GSWTYDX.exe 1840 FDZJ.exe 1840 FDZJ.exe 4840 ENC.exe 4840 ENC.exe 4608 NLW.exe 4608 NLW.exe 4252 RBDAF.exe 4252 RBDAF.exe 372 ACFO.exe 372 ACFO.exe 1828 XSSX.exe 1828 XSSX.exe 3064 IKC.exe 3064 IKC.exe 2244 XNTJVN.exe 2244 XNTJVN.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3928 17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe 3928 17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe 2444 SXP.exe 2444 SXP.exe 2640 PNOC.exe 2640 PNOC.exe 2580 SOYSRU.exe 2580 SOYSRU.exe 3468 YJJSXR.exe 3468 YJJSXR.exe 612 RMNFTCJ.exe 612 RMNFTCJ.exe 3600 WXR.exe 3600 WXR.exe 924 DDYG.exe 924 DDYG.exe 3796 RYWAT.exe 3796 RYWAT.exe 1756 KBAVYAR.exe 1756 KBAVYAR.exe 1140 UUJV.exe 1140 UUJV.exe 1912 BKDYXIP.exe 1912 BKDYXIP.exe 1932 AIRNDF.exe 1932 AIRNDF.exe 1052 VVW.exe 1052 VVW.exe 2860 YDR.exe 2860 YDR.exe 232 VTE.exe 232 VTE.exe 1896 LRSVBH.exe 1896 LRSVBH.exe 780 AITUAVL.exe 780 AITUAVL.exe 536 YXT.exe 536 YXT.exe 4456 QAXAF.exe 4456 QAXAF.exe 1400 CJDIR.exe 1400 CJDIR.exe 904 ATVE.exe 904 ATVE.exe 4308 HKWWCS.exe 4308 HKWWCS.exe 3404 GSWTYDX.exe 3404 GSWTYDX.exe 1840 FDZJ.exe 1840 FDZJ.exe 4840 ENC.exe 4840 ENC.exe 4608 NLW.exe 4608 NLW.exe 4252 RBDAF.exe 4252 RBDAF.exe 372 ACFO.exe 372 ACFO.exe 1828 XSSX.exe 1828 XSSX.exe 3064 IKC.exe 3064 IKC.exe 2244 XNTJVN.exe 2244 XNTJVN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3928 wrote to memory of 2396 3928 17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe 85 PID 3928 wrote to memory of 2396 3928 17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe 85 PID 3928 wrote to memory of 2396 3928 17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe 85 PID 2396 wrote to memory of 2444 2396 cmd.exe 89 PID 2396 wrote to memory of 2444 2396 cmd.exe 89 PID 2396 wrote to memory of 2444 2396 cmd.exe 89 PID 2444 wrote to memory of 1564 2444 SXP.exe 92 PID 2444 wrote to memory of 1564 2444 SXP.exe 92 PID 2444 wrote to memory of 1564 2444 SXP.exe 92 PID 1564 wrote to memory of 2640 1564 cmd.exe 96 PID 1564 wrote to memory of 2640 1564 cmd.exe 96 PID 1564 wrote to memory of 2640 1564 cmd.exe 96 PID 2640 wrote to memory of 1828 2640 PNOC.exe 97 PID 2640 wrote to memory of 1828 2640 PNOC.exe 97 PID 2640 wrote to memory of 1828 2640 PNOC.exe 97 PID 1828 wrote to memory of 2580 1828 cmd.exe 101 PID 1828 wrote to memory of 2580 1828 cmd.exe 101 PID 1828 wrote to memory of 2580 1828 cmd.exe 101 PID 2580 wrote to memory of 60 2580 SOYSRU.exe 102 PID 2580 wrote to memory of 60 2580 SOYSRU.exe 102 PID 2580 wrote to memory of 60 2580 SOYSRU.exe 102 PID 60 wrote to memory of 3468 60 cmd.exe 106 PID 60 wrote to memory of 3468 60 cmd.exe 106 PID 60 wrote to memory of 3468 60 cmd.exe 106 PID 3468 wrote to memory of 2656 3468 YJJSXR.exe 107 PID 3468 wrote to memory of 2656 3468 YJJSXR.exe 107 PID 3468 wrote to memory of 2656 3468 YJJSXR.exe 107 PID 2656 wrote to memory of 612 2656 cmd.exe 110 PID 2656 wrote to memory of 612 2656 cmd.exe 110 PID 2656 wrote to memory of 612 2656 cmd.exe 110 PID 612 wrote to memory of 2008 612 RMNFTCJ.exe 112 PID 612 wrote to memory of 2008 612 RMNFTCJ.exe 112 PID 612 wrote to memory of 2008 612 RMNFTCJ.exe 112 PID 2008 wrote to memory of 3600 2008 cmd.exe 116 PID 2008 wrote to memory of 3600 2008 cmd.exe 116 PID 2008 wrote to memory of 3600 2008 cmd.exe 116 PID 3600 wrote to memory of 3436 3600 WXR.exe 117 PID 3600 wrote to memory of 3436 3600 WXR.exe 117 PID 3600 wrote to memory of 3436 3600 WXR.exe 117 PID 3436 wrote to memory of 924 3436 cmd.exe 121 PID 3436 wrote to memory of 924 3436 cmd.exe 121 PID 3436 wrote to memory of 924 3436 cmd.exe 121 PID 924 wrote to memory of 3348 924 DDYG.exe 122 PID 924 wrote to memory of 3348 924 DDYG.exe 122 PID 924 wrote to memory of 3348 924 DDYG.exe 122 PID 3348 wrote to memory of 3796 3348 cmd.exe 126 PID 3348 wrote to memory of 3796 3348 cmd.exe 126 PID 3348 wrote to memory of 3796 3348 cmd.exe 126 PID 3796 wrote to memory of 780 3796 RYWAT.exe 127 PID 3796 wrote to memory of 780 3796 RYWAT.exe 127 PID 3796 wrote to memory of 780 3796 RYWAT.exe 127 PID 780 wrote to memory of 1756 780 cmd.exe 131 PID 780 wrote to memory of 1756 780 cmd.exe 131 PID 780 wrote to memory of 1756 780 cmd.exe 131 PID 1756 wrote to memory of 4468 1756 KBAVYAR.exe 132 PID 1756 wrote to memory of 4468 1756 KBAVYAR.exe 132 PID 1756 wrote to memory of 4468 1756 KBAVYAR.exe 132 PID 4468 wrote to memory of 1140 4468 cmd.exe 136 PID 4468 wrote to memory of 1140 4468 cmd.exe 136 PID 4468 wrote to memory of 1140 4468 cmd.exe 136 PID 1140 wrote to memory of 2432 1140 UUJV.exe 137 PID 1140 wrote to memory of 2432 1140 UUJV.exe 137 PID 1140 wrote to memory of 2432 1140 UUJV.exe 137 PID 2432 wrote to memory of 1912 2432 cmd.exe 141
Processes
-
C:\Users\Admin\AppData\Local\Temp\17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe"C:\Users\Admin\AppData\Local\Temp\17d990d130c81daff90003d5d64c5fd196a600adc165b957334460b99a202ae6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SXP.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\windows\SXP.exeC:\windows\SXP.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PNOC.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\windows\SysWOW64\PNOC.exeC:\windows\system32\PNOC.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SOYSRU.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\windows\SysWOW64\SOYSRU.exeC:\windows\system32\SOYSRU.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YJJSXR.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\windows\SysWOW64\YJJSXR.exeC:\windows\system32\YJJSXR.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RMNFTCJ.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\windows\system\RMNFTCJ.exeC:\windows\system\RMNFTCJ.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WXR.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\windows\SysWOW64\WXR.exeC:\windows\system32\WXR.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DDYG.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\windows\system\DDYG.exeC:\windows\system\DDYG.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RYWAT.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\windows\system\RYWAT.exeC:\windows\system\RYWAT.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\KBAVYAR.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:780 -
C:\windows\KBAVYAR.exeC:\windows\KBAVYAR.exe19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UUJV.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\windows\UUJV.exeC:\windows\UUJV.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BKDYXIP.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\windows\system\BKDYXIP.exeC:\windows\system\BKDYXIP.exe23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AIRNDF.exe.bat" "24⤵PID:2640
-
C:\windows\system\AIRNDF.exeC:\windows\system\AIRNDF.exe25⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VVW.exe.bat" "26⤵PID:852
-
C:\windows\VVW.exeC:\windows\VVW.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YDR.exe.bat" "28⤵PID:3956
-
C:\windows\SysWOW64\YDR.exeC:\windows\system32\YDR.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VTE.exe.bat" "30⤵PID:3368
-
C:\windows\SysWOW64\VTE.exeC:\windows\system32\VTE.exe31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:232 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LRSVBH.exe.bat" "32⤵PID:556
-
C:\windows\system\LRSVBH.exeC:\windows\system\LRSVBH.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AITUAVL.exe.bat" "34⤵PID:3000
-
C:\windows\SysWOW64\AITUAVL.exeC:\windows\system32\AITUAVL.exe35⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:780 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YXT.exe.bat" "36⤵PID:1724
-
C:\windows\YXT.exeC:\windows\YXT.exe37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QAXAF.exe.bat" "38⤵PID:3324
-
C:\windows\system\QAXAF.exeC:\windows\system\QAXAF.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CJDIR.exe.bat" "40⤵PID:968
-
C:\windows\CJDIR.exeC:\windows\CJDIR.exe41⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ATVE.exe.bat" "42⤵PID:4224
-
C:\windows\system\ATVE.exeC:\windows\system\ATVE.exe43⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HKWWCS.exe.bat" "44⤵PID:3488
-
C:\windows\system\HKWWCS.exeC:\windows\system\HKWWCS.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4308 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GSWTYDX.exe.bat" "46⤵PID:612
-
C:\windows\SysWOW64\GSWTYDX.exeC:\windows\system32\GSWTYDX.exe47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FDZJ.exe.bat" "48⤵PID:3080
-
C:\windows\SysWOW64\FDZJ.exeC:\windows\system32\FDZJ.exe49⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ENC.exe.bat" "50⤵PID:3384
-
C:\windows\ENC.exeC:\windows\ENC.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NLW.exe.bat" "52⤵PID:1192
-
C:\windows\system\NLW.exeC:\windows\system\NLW.exe53⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RBDAF.exe.bat" "54⤵PID:1896
-
C:\windows\system\RBDAF.exeC:\windows\system\RBDAF.exe55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ACFO.exe.bat" "56⤵PID:2216
-
C:\windows\SysWOW64\ACFO.exeC:\windows\system32\ACFO.exe57⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XSSX.exe.bat" "58⤵PID:2936
-
C:\windows\system\XSSX.exeC:\windows\system\XSSX.exe59⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\IKC.exe.bat" "60⤵PID:1504
-
C:\windows\system\IKC.exeC:\windows\system\IKC.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XNTJVN.exe.bat" "62⤵PID:4080
-
C:\windows\XNTJVN.exeC:\windows\XNTJVN.exe63⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QIX.exe.bat" "64⤵PID:3240
-
C:\windows\system\QIX.exeC:\windows\system\QIX.exe65⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GRSRR.exe.bat" "66⤵PID:1936
-
C:\windows\SysWOW64\GRSRR.exeC:\windows\system32\GRSRR.exe67⤵
- Checks computer location settings
- Executes dropped EXE
PID:4872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CWYOY.exe.bat" "68⤵PID:3608
-
C:\windows\SysWOW64\CWYOY.exeC:\windows\system32\CWYOY.exe69⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GPBXPC.exe.bat" "70⤵PID:2588
-
C:\windows\SysWOW64\GPBXPC.exeC:\windows\system32\GPBXPC.exe71⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\RIWQXJB.exe.bat" "72⤵PID:2740
-
C:\windows\SysWOW64\RIWQXJB.exeC:\windows\system32\RIWQXJB.exe73⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QAHG.exe.bat" "74⤵PID:2768
-
C:\windows\QAHG.exeC:\windows\QAHG.exe75⤵
- Checks computer location settings
- Executes dropped EXE
PID:4804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XGATNJ.exe.bat" "76⤵PID:4920
-
C:\windows\system\XGATNJ.exeC:\windows\system\XGATNJ.exe77⤵
- Checks computer location settings
- Executes dropped EXE
PID:4148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HEFO.exe.bat" "78⤵PID:3912
-
C:\windows\system\HEFO.exeC:\windows\system\HEFO.exe79⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NZRHI.exe.bat" "80⤵PID:3560
-
C:\windows\SysWOW64\NZRHI.exeC:\windows\system32\NZRHI.exe81⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GSGSRH.exe.bat" "82⤵PID:4320
-
C:\windows\SysWOW64\GSGSRH.exeC:\windows\system32\GSGSRH.exe83⤵
- Executes dropped EXE
PID:2184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HQOBCRI.exe.bat" "84⤵PID:2460
-
C:\windows\system\HQOBCRI.exeC:\windows\system\HQOBCRI.exe85⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GFAEP.exe.bat" "86⤵PID:3444
-
C:\windows\system\GFAEP.exeC:\windows\system\GFAEP.exe87⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HDHMZGG.exe.bat" "88⤵PID:4344
-
C:\windows\SysWOW64\HDHMZGG.exeC:\windows\system32\HDHMZGG.exe89⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\BRZOKAO.exe.bat" "90⤵PID:2724
-
C:\windows\BRZOKAO.exeC:\windows\BRZOKAO.exe91⤵
- Executes dropped EXE
PID:3512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XWZAML.exe.bat" "92⤵PID:968
-
C:\windows\XWZAML.exeC:\windows\XWZAML.exe93⤵
- Checks computer location settings
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RKQJGW.exe.bat" "94⤵PID:464
-
C:\windows\RKQJGW.exeC:\windows\RKQJGW.exe95⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\USZ.exe.bat" "96⤵PID:1856
-
C:\windows\USZ.exeC:\windows\USZ.exe97⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2948 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YIFGZ.exe.bat" "98⤵PID:1464
-
C:\windows\YIFGZ.exeC:\windows\YIFGZ.exe99⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AVR.exe.bat" "100⤵PID:2080
-
C:\windows\SysWOW64\AVR.exeC:\windows\system32\AVR.exe101⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DEXER.exe.bat" "102⤵PID:4136
-
C:\windows\SysWOW64\DEXER.exeC:\windows\system32\DEXER.exe103⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3552 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WHJA.exe.bat" "104⤵PID:2236
-
C:\windows\SysWOW64\WHJA.exeC:\windows\system32\WHJA.exe105⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OZFAK.exe.bat" "106⤵PID:4840
-
C:\windows\system\OZFAK.exeC:\windows\system\OZFAK.exe107⤵
- Checks computer location settings
- Executes dropped EXE
PID:952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HCWDO.exe.bat" "108⤵PID:4612
-
C:\windows\system\HCWDO.exeC:\windows\system\HCWDO.exe109⤵
- Executes dropped EXE
PID:3844 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TFT.exe.bat" "110⤵PID:3960
-
C:\windows\TFT.exeC:\windows\TFT.exe111⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GQPH.exe.bat" "112⤵PID:2400
-
C:\windows\SysWOW64\GQPH.exeC:\windows\system32\GQPH.exe113⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FBFPV.exe.bat" "114⤵PID:5088
-
C:\windows\system\FBFPV.exeC:\windows\system\FBFPV.exe115⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NOREG.exe.bat" "116⤵PID:4968
-
C:\windows\NOREG.exeC:\windows\NOREG.exe117⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JMEI.exe.bat" "118⤵PID:4944
-
C:\windows\system\JMEI.exeC:\windows\system\JMEI.exe119⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HXPYAW.exe.bat" "120⤵PID:4832
-
C:\windows\SysWOW64\HXPYAW.exeC:\windows\system32\HXPYAW.exe121⤵
- Checks computer location settings
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FVC.exe.bat" "122⤵PID:1780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-