Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe
Resource
win10v2004-20240709-en
General
-
Target
cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe
-
Size
208KB
-
MD5
f855c6aeca4075998a9f52e8e0062142
-
SHA1
607be2097978a701e92897d69525498b042510e0
-
SHA256
cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8
-
SHA512
e07642edaa099df028516f8e5ae6ab0e76fff4cd7ac81b10f5d4a8606e1a627f1bcd3ffa9fa687baca883cd7368b074532907a3a8fae507a32fd12b8b9ff1bd5
-
SSDEEP
6144:vz7XlhJHu9CBoQvCY5q9IoqIEgeTwQEj9:77xDGC3geMQS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation BEPNX.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation MPCXDWC.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation UATIFU.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation MHWJLD.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation VWNSZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation NEOHF.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation FVGWCA.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation JRPRS.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation AXSRHOG.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation OVZDIKU.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation VFATAQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation CGWQT.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation CLXSVZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation PQGTD.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation CHUW.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation CGI.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation AWFJBG.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation OMR.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation UMY.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation BWJLX.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation VKOUHTE.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation XPN.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation FSQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation YWRANE.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation YNPFNPV.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation XJVPV.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation KTOFYBQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation GDF.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation KFJSPC.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation DIPK.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation SZEG.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation TCNK.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation QWNSO.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation CQUXRK.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation VKEXS.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation JLX.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation YYPQH.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation BNIR.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation JAGDMH.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation TWUGIGP.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation REWQ.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation IHK.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation KVX.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation PBCWJWY.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation TXJGRGI.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation HXL.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation YGLPVJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation INPALBX.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation EGYHREJ.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation STBAO.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation IOG.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation MMIPFN.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation JOGSNUA.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation AEIMX.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation BRVJQQZ.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation TLBWW.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation JABFEV.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation YMA.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation XARCMKV.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation CPC.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation YLJUR.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation UZAY.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation XSWN.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation EXZ.exe -
Executes dropped EXE 64 IoCs
pid Process 1544 MEV.exe 2608 REWQ.exe 4600 WHA.exe 3812 TMYM.exe 1368 PSEJ.exe 408 KFJSPC.exe 4264 OVQST.exe 560 FWSFEAS.exe 4200 URBKP.exe 2960 EZDPTK.exe 2168 IHK.exe 4732 OCJXKF.exe 1816 SKP.exe 1872 FVGWCA.exe 2492 QOB.exe 3384 GECGRD.exe 988 ARH.exe 2244 PUYCNQ.exe 2908 KHDLXQG.exe 4584 WPJLJ.exe 4908 NAAJJ.exe 464 YGLPVJ.exe 880 AWFJBG.exe 4944 JEHOFDJ.exe 3708 ERLY.exe 1508 TMVKAQH.exe 1452 KVX.exe 5060 FICZO.exe 3664 UDL.exe 4672 NGPHM.exe 4440 EGR.exe 3996 XJVPV.exe 3012 TPAECDN.exe 5020 CPC.exe 2292 TCNK.exe 872 DLPPHCF.exe 3784 JLX.exe 560 JRPRS.exe 1588 PRWFBM.exe 400 AKZXJTA.exe 4440 WPF.exe 1816 IIAFY.exe 4244 XDS.exe 1664 ZBLMQU.exe 4304 KTOFYBQ.exe 988 ROLRAC.exe 2688 OMR.exe 3508 UMY.exe 1784 MPCXDWC.exe 3464 SPKL.exe 4016 YLJUR.exe 1364 HQT.exe 4264 KLYVR.exe 4900 IZPWOB.exe 4136 OZX.exe 544 IUCTP.exe 1924 DHHDRV.exe 3972 UIJ.exe 4076 YYPQH.exe 3024 CGWQT.exe 2032 OYZI.exe 4416 ROF.exe 2980 XPN.exe 4760 OALU.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\windows\SysWOW64\MEV.exe cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe File opened for modification C:\windows\SysWOW64\ABGTKUA.exe AWOFIHF.exe File created C:\windows\SysWOW64\ABGTKUA.exe.bat AWOFIHF.exe File opened for modification C:\windows\SysWOW64\VKEXS.exe PKW.exe File opened for modification C:\windows\SysWOW64\EGYHREJ.exe JTTYG.exe File created C:\windows\SysWOW64\MEV.exe.bat cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe File created C:\windows\SysWOW64\AKZXJTA.exe PRWFBM.exe File created C:\windows\SysWOW64\KTOFYBQ.exe.bat ZBLMQU.exe File opened for modification C:\windows\SysWOW64\DIPK.exe FSQ.exe File created C:\windows\SysWOW64\SDGOH.exe.bat DIPK.exe File created C:\windows\SysWOW64\IUKP.exe.bat PQGTD.exe File opened for modification C:\windows\SysWOW64\ONWO.exe INPALBX.exe File created C:\windows\SysWOW64\KGFV.exe EGYHREJ.exe File created C:\windows\SysWOW64\OVZDIKU.exe.bat FVXQFN.exe File created C:\windows\SysWOW64\MHWJLD.exe.bat CHUW.exe File created C:\windows\SysWOW64\SKP.exe.bat OCJXKF.exe File opened for modification C:\windows\SysWOW64\OMR.exe ROLRAC.exe File opened for modification C:\windows\SysWOW64\CGWQT.exe YYPQH.exe File created C:\windows\SysWOW64\BLLO.exe MQC.exe File opened for modification C:\windows\SysWOW64\VRNWHWQ.exe AEIMX.exe File created C:\windows\SysWOW64\SKP.exe OCJXKF.exe File created C:\windows\SysWOW64\EGR.exe.bat NGPHM.exe File created C:\windows\SysWOW64\XMFINK.exe UZAY.exe File opened for modification C:\windows\SysWOW64\SWJNHLS.exe CGI.exe File created C:\windows\SysWOW64\OSU.exe.bat RMOKNO.exe File created C:\windows\SysWOW64\KMQ.exe MMIPFN.exe File created C:\windows\SysWOW64\MHWJLD.exe CHUW.exe File opened for modification C:\windows\SysWOW64\ADYDMN.exe ZFWBOQV.exe File created C:\windows\SysWOW64\REWQ.exe MEV.exe File created C:\windows\SysWOW64\KHDLXQG.exe PUYCNQ.exe File created C:\windows\SysWOW64\JLX.exe DLPPHCF.exe File created C:\windows\SysWOW64\CGWQT.exe.bat YYPQH.exe File created C:\windows\SysWOW64\UFXR.exe.bat XARCMKV.exe File created C:\windows\SysWOW64\TFYQ.exe BCV.exe File opened for modification C:\windows\SysWOW64\BRVJQQZ.exe VRNWHWQ.exe File opened for modification C:\windows\SysWOW64\KFJSPC.exe PSEJ.exe File created C:\windows\SysWOW64\SWJNHLS.exe CGI.exe File created C:\windows\SysWOW64\XSWN.exe OSU.exe File created C:\windows\SysWOW64\REWQ.exe.bat MEV.exe File opened for modification C:\windows\SysWOW64\SKP.exe OCJXKF.exe File opened for modification C:\windows\SysWOW64\KHDLXQG.exe PUYCNQ.exe File created C:\windows\SysWOW64\PBJ.exe.bat JABFEV.exe File opened for modification C:\windows\SysWOW64\MHWJLD.exe CHUW.exe File created C:\windows\SysWOW64\SQGE.exe HXL.exe File created C:\windows\SysWOW64\PDUWJC.exe XVSRG.exe File created C:\windows\SysWOW64\OCJXKF.exe IHK.exe File created C:\windows\SysWOW64\KHDLXQG.exe.bat PUYCNQ.exe File created C:\windows\SysWOW64\KVX.exe TMVKAQH.exe File created C:\windows\SysWOW64\BWJLX.exe VWBXOZO.exe File opened for modification C:\windows\SysWOW64\BWJLX.exe VWBXOZO.exe File created C:\windows\SysWOW64\TOWS.exe KFU.exe File opened for modification C:\windows\SysWOW64\LAL.exe ZHIRIW.exe File created C:\windows\SysWOW64\JABFEV.exe.bat ONWO.exe File opened for modification C:\windows\SysWOW64\KTOFYBQ.exe ZBLMQU.exe File created C:\windows\SysWOW64\DHHDRV.exe.bat IUCTP.exe File created C:\windows\SysWOW64\PDUWJC.exe.bat XVSRG.exe File opened for modification C:\windows\SysWOW64\TFYQ.exe BCV.exe File created C:\windows\SysWOW64\OMR.exe ROLRAC.exe File created C:\windows\SysWOW64\BRVJQQZ.exe VRNWHWQ.exe File opened for modification C:\windows\SysWOW64\PSEJ.exe TMYM.exe File created C:\windows\SysWOW64\FWSFEAS.exe.bat OVQST.exe File created C:\windows\SysWOW64\AKZXJTA.exe.bat PRWFBM.exe File created C:\windows\SysWOW64\IUKP.exe PQGTD.exe File opened for modification C:\windows\SysWOW64\KGFV.exe EGYHREJ.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\UIJ.exe DHHDRV.exe File opened for modification C:\windows\system\MRO.exe SWJNHLS.exe File created C:\windows\LPZFBJ.exe.bat SSVZO.exe File created C:\windows\system\CTOWTFC.exe KLMRHZ.exe File opened for modification C:\windows\NMKPCXD.exe WZZXVB.exe File opened for modification C:\windows\system\AWFJBG.exe YGLPVJ.exe File opened for modification C:\windows\system\HQT.exe YLJUR.exe File created C:\windows\IHESX.exe JWOCX.exe File created C:\windows\YAYF.exe NHVNY.exe File opened for modification C:\windows\TXJGRGI.exe YKEXG.exe File created C:\windows\system\VKOUHTE.exe BWJLX.exe File created C:\windows\TLBWW.exe PDUWJC.exe File opened for modification C:\windows\BNIR.exe NCMTR.exe File created C:\windows\system\MRO.exe SWJNHLS.exe File created C:\windows\system\HZQ.exe.bat YQOSXE.exe File created C:\windows\PRWFBM.exe JRPRS.exe File created C:\windows\UATIFU.exe.bat OALU.exe File created C:\windows\system\FSQ.exe VKOUHTE.exe File created C:\windows\system\WPJLJ.exe.bat KHDLXQG.exe File created C:\windows\DLPPHCF.exe TCNK.exe File opened for modification C:\windows\system\WPF.exe AKZXJTA.exe File created C:\windows\system\AXSRHOG.exe.bat LCJN.exe File created C:\windows\FVXQFN.exe IPRB.exe File created C:\windows\FVXQFN.exe.bat IPRB.exe File created C:\windows\NLKYDP.exe OVZDIKU.exe File created C:\windows\KLMRHZ.exe GDF.exe File opened for modification C:\windows\system\QNR.exe YNPFNPV.exe File created C:\windows\system\CSWR.exe.bat WSOD.exe File created C:\windows\system\MRO.exe.bat SWJNHLS.exe File opened for modification C:\windows\JWOCX.exe PBJ.exe File created C:\windows\IUCTP.exe OZX.exe File created C:\windows\system\KFU.exe EFNZKV.exe File created C:\windows\SZEG.exe.bat MYWSDLK.exe File created C:\windows\OSDHIJ.exe TFYQ.exe File created C:\windows\system\QOB.exe.bat FVGWCA.exe File opened for modification C:\windows\VOL.exe QDHD.exe File created C:\windows\TXJGRGI.exe YKEXG.exe File created C:\windows\PBPTN.exe VOL.exe File created C:\windows\ZFWBOQV.exe.bat BEPNX.exe File created C:\windows\PUYCNQ.exe ARH.exe File opened for modification C:\windows\system\TPAECDN.exe XJVPV.exe File opened for modification C:\windows\UATIFU.exe OALU.exe File created C:\windows\WSOD.exe.bat LAL.exe File created C:\windows\system\TMN.exe.bat IUKP.exe File created C:\windows\system\SMVLNYZ.exe.bat HUS.exe File created C:\windows\system\PKW.exe.bat LUQJW.exe File opened for modification C:\windows\system\ZBLMQU.exe XDS.exe File created C:\windows\system\QNR.exe.bat YNPFNPV.exe File created C:\windows\LUQJW.exe.bat CTOWTFC.exe File created C:\windows\JOGSNUA.exe.bat JAGDMH.exe File opened for modification C:\windows\system\SMVLNYZ.exe HUS.exe File created C:\windows\HXL.exe.bat MKGCVU.exe File opened for modification C:\windows\system\OVQST.exe KFJSPC.exe File opened for modification C:\windows\DLPPHCF.exe TCNK.exe File created C:\windows\LCJN.exe.bat BUH.exe File created C:\windows\system\MYWSDLK.exe.bat ZVA.exe File created C:\windows\system\XDS.exe.bat IIAFY.exe File created C:\windows\system\TMN.exe IUKP.exe File opened for modification C:\windows\NHVNY.exe KMQ.exe File opened for modification C:\windows\TLBWW.exe PDUWJC.exe File opened for modification C:\windows\SZEG.exe MYWSDLK.exe File created C:\windows\system\YQOSXE.exe.bat SQGE.exe File created C:\windows\system\OVQST.exe.bat KFJSPC.exe File created C:\windows\URBKP.exe FWSFEAS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 448 3640 WerFault.exe 82 3400 1544 WerFault.exe 90 1796 2608 WerFault.exe 96 4720 4600 WerFault.exe 101 2212 3812 WerFault.exe 106 4412 1368 WerFault.exe 111 2456 408 WerFault.exe 116 812 4264 WerFault.exe 121 4512 560 WerFault.exe 126 2624 4200 WerFault.exe 131 524 2960 WerFault.exe 136 2608 2168 WerFault.exe 141 1780 4732 WerFault.exe 146 4628 1816 WerFault.exe 151 2020 1872 WerFault.exe 156 2120 2492 WerFault.exe 161 872 3384 WerFault.exe 166 3404 988 WerFault.exe 171 5072 2244 WerFault.exe 176 5084 2908 WerFault.exe 181 856 4584 WerFault.exe 186 3972 4908 WerFault.exe 191 3024 464 WerFault.exe 196 772 880 WerFault.exe 201 3692 4944 WerFault.exe 206 1428 3708 WerFault.exe 211 3920 1508 WerFault.exe 216 4360 1452 WerFault.exe 221 444 5060 WerFault.exe 226 2908 3664 WerFault.exe 231 3984 4672 WerFault.exe 236 944 4440 WerFault.exe 241 868 3996 WerFault.exe 246 880 3012 WerFault.exe 251 3136 5020 WerFault.exe 256 2456 2292 WerFault.exe 261 1880 872 WerFault.exe 266 1512 3784 WerFault.exe 271 1948 560 WerFault.exe 276 3984 1588 WerFault.exe 281 2556 400 WerFault.exe 288 3468 4440 WerFault.exe 293 3012 1816 WerFault.exe 298 640 4244 WerFault.exe 303 2508 1664 WerFault.exe 307 1704 4304 WerFault.exe 313 2752 988 WerFault.exe 319 1008 2688 WerFault.exe 324 2976 3508 WerFault.exe 329 852 1784 WerFault.exe 334 4324 3464 WerFault.exe 339 3136 4016 WerFault.exe 344 2888 1364 WerFault.exe 349 1912 4264 WerFault.exe 354 4304 4900 WerFault.exe 359 988 4136 WerFault.exe 364 4584 544 WerFault.exe 369 5040 1924 WerFault.exe 374 4588 3972 WerFault.exe 379 2712 4076 WerFault.exe 384 640 3024 WerFault.exe 389 2672 2032 WerFault.exe 394 3712 4416 WerFault.exe 399 1456 2980 WerFault.exe 404 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3640 cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe 3640 cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe 1544 MEV.exe 1544 MEV.exe 2608 REWQ.exe 2608 REWQ.exe 4600 WHA.exe 4600 WHA.exe 3812 TMYM.exe 3812 TMYM.exe 1368 PSEJ.exe 1368 PSEJ.exe 408 KFJSPC.exe 408 KFJSPC.exe 4264 OVQST.exe 4264 OVQST.exe 560 FWSFEAS.exe 560 FWSFEAS.exe 4200 URBKP.exe 4200 URBKP.exe 2960 EZDPTK.exe 2960 EZDPTK.exe 2168 IHK.exe 2168 IHK.exe 4732 OCJXKF.exe 4732 OCJXKF.exe 1816 SKP.exe 1816 SKP.exe 1872 FVGWCA.exe 1872 FVGWCA.exe 2492 QOB.exe 2492 QOB.exe 3384 GECGRD.exe 3384 GECGRD.exe 988 ARH.exe 988 ARH.exe 2244 PUYCNQ.exe 2244 PUYCNQ.exe 2908 KHDLXQG.exe 2908 KHDLXQG.exe 4584 WPJLJ.exe 4584 WPJLJ.exe 4908 NAAJJ.exe 4908 NAAJJ.exe 464 YGLPVJ.exe 464 YGLPVJ.exe 880 AWFJBG.exe 880 AWFJBG.exe 4944 JEHOFDJ.exe 4944 JEHOFDJ.exe 3708 ERLY.exe 3708 ERLY.exe 1508 TMVKAQH.exe 1508 TMVKAQH.exe 1452 KVX.exe 1452 KVX.exe 5060 FICZO.exe 5060 FICZO.exe 3664 UDL.exe 3664 UDL.exe 4672 NGPHM.exe 4672 NGPHM.exe 4440 EGR.exe 4440 EGR.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3640 cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe 3640 cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe 1544 MEV.exe 1544 MEV.exe 2608 REWQ.exe 2608 REWQ.exe 4600 WHA.exe 4600 WHA.exe 3812 TMYM.exe 3812 TMYM.exe 1368 PSEJ.exe 1368 PSEJ.exe 408 KFJSPC.exe 408 KFJSPC.exe 4264 OVQST.exe 4264 OVQST.exe 560 FWSFEAS.exe 560 FWSFEAS.exe 4200 URBKP.exe 4200 URBKP.exe 2960 EZDPTK.exe 2960 EZDPTK.exe 2168 IHK.exe 2168 IHK.exe 4732 OCJXKF.exe 4732 OCJXKF.exe 1816 SKP.exe 1816 SKP.exe 1872 FVGWCA.exe 1872 FVGWCA.exe 2492 QOB.exe 2492 QOB.exe 3384 GECGRD.exe 3384 GECGRD.exe 988 ARH.exe 988 ARH.exe 2244 PUYCNQ.exe 2244 PUYCNQ.exe 2908 KHDLXQG.exe 2908 KHDLXQG.exe 4584 WPJLJ.exe 4584 WPJLJ.exe 4908 NAAJJ.exe 4908 NAAJJ.exe 464 YGLPVJ.exe 464 YGLPVJ.exe 880 AWFJBG.exe 880 AWFJBG.exe 4944 JEHOFDJ.exe 4944 JEHOFDJ.exe 3708 ERLY.exe 3708 ERLY.exe 1508 TMVKAQH.exe 1508 TMVKAQH.exe 1452 KVX.exe 1452 KVX.exe 5060 FICZO.exe 5060 FICZO.exe 3664 UDL.exe 3664 UDL.exe 4672 NGPHM.exe 4672 NGPHM.exe 4440 EGR.exe 4440 EGR.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3640 wrote to memory of 4572 3640 cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe 86 PID 3640 wrote to memory of 4572 3640 cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe 86 PID 3640 wrote to memory of 4572 3640 cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe 86 PID 4572 wrote to memory of 1544 4572 cmd.exe 90 PID 4572 wrote to memory of 1544 4572 cmd.exe 90 PID 4572 wrote to memory of 1544 4572 cmd.exe 90 PID 1544 wrote to memory of 1680 1544 MEV.exe 92 PID 1544 wrote to memory of 1680 1544 MEV.exe 92 PID 1544 wrote to memory of 1680 1544 MEV.exe 92 PID 1680 wrote to memory of 2608 1680 cmd.exe 96 PID 1680 wrote to memory of 2608 1680 cmd.exe 96 PID 1680 wrote to memory of 2608 1680 cmd.exe 96 PID 2608 wrote to memory of 3100 2608 REWQ.exe 97 PID 2608 wrote to memory of 3100 2608 REWQ.exe 97 PID 2608 wrote to memory of 3100 2608 REWQ.exe 97 PID 3100 wrote to memory of 4600 3100 cmd.exe 101 PID 3100 wrote to memory of 4600 3100 cmd.exe 101 PID 3100 wrote to memory of 4600 3100 cmd.exe 101 PID 4600 wrote to memory of 5052 4600 WHA.exe 102 PID 4600 wrote to memory of 5052 4600 WHA.exe 102 PID 4600 wrote to memory of 5052 4600 WHA.exe 102 PID 5052 wrote to memory of 3812 5052 cmd.exe 106 PID 5052 wrote to memory of 3812 5052 cmd.exe 106 PID 5052 wrote to memory of 3812 5052 cmd.exe 106 PID 3812 wrote to memory of 2612 3812 TMYM.exe 107 PID 3812 wrote to memory of 2612 3812 TMYM.exe 107 PID 3812 wrote to memory of 2612 3812 TMYM.exe 107 PID 2612 wrote to memory of 1368 2612 cmd.exe 111 PID 2612 wrote to memory of 1368 2612 cmd.exe 111 PID 2612 wrote to memory of 1368 2612 cmd.exe 111 PID 1368 wrote to memory of 396 1368 PSEJ.exe 112 PID 1368 wrote to memory of 396 1368 PSEJ.exe 112 PID 1368 wrote to memory of 396 1368 PSEJ.exe 112 PID 396 wrote to memory of 408 396 cmd.exe 116 PID 396 wrote to memory of 408 396 cmd.exe 116 PID 396 wrote to memory of 408 396 cmd.exe 116 PID 408 wrote to memory of 2120 408 KFJSPC.exe 117 PID 408 wrote to memory of 2120 408 KFJSPC.exe 117 PID 408 wrote to memory of 2120 408 KFJSPC.exe 117 PID 2120 wrote to memory of 4264 2120 cmd.exe 121 PID 2120 wrote to memory of 4264 2120 cmd.exe 121 PID 2120 wrote to memory of 4264 2120 cmd.exe 121 PID 4264 wrote to memory of 2528 4264 OVQST.exe 122 PID 4264 wrote to memory of 2528 4264 OVQST.exe 122 PID 4264 wrote to memory of 2528 4264 OVQST.exe 122 PID 2528 wrote to memory of 560 2528 cmd.exe 126 PID 2528 wrote to memory of 560 2528 cmd.exe 126 PID 2528 wrote to memory of 560 2528 cmd.exe 126 PID 560 wrote to memory of 1412 560 FWSFEAS.exe 127 PID 560 wrote to memory of 1412 560 FWSFEAS.exe 127 PID 560 wrote to memory of 1412 560 FWSFEAS.exe 127 PID 1412 wrote to memory of 4200 1412 cmd.exe 131 PID 1412 wrote to memory of 4200 1412 cmd.exe 131 PID 1412 wrote to memory of 4200 1412 cmd.exe 131 PID 4200 wrote to memory of 1172 4200 URBKP.exe 132 PID 4200 wrote to memory of 1172 4200 URBKP.exe 132 PID 4200 wrote to memory of 1172 4200 URBKP.exe 132 PID 1172 wrote to memory of 2960 1172 cmd.exe 136 PID 1172 wrote to memory of 2960 1172 cmd.exe 136 PID 1172 wrote to memory of 2960 1172 cmd.exe 136 PID 2960 wrote to memory of 208 2960 EZDPTK.exe 137 PID 2960 wrote to memory of 208 2960 EZDPTK.exe 137 PID 2960 wrote to memory of 208 2960 EZDPTK.exe 137 PID 208 wrote to memory of 2168 208 cmd.exe 141
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe"C:\Users\Admin\AppData\Local\Temp\cf8d3d1bd0b465c7a232958b097ed0ea344e6ed93b0e31939896c4f5b84eede8.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MEV.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\windows\SysWOW64\MEV.exeC:\windows\system32\MEV.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\REWQ.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\windows\SysWOW64\REWQ.exeC:\windows\system32\REWQ.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WHA.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\windows\WHA.exeC:\windows\WHA.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TMYM.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\windows\system\TMYM.exeC:\windows\system\TMYM.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PSEJ.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\windows\SysWOW64\PSEJ.exeC:\windows\system32\PSEJ.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KFJSPC.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\windows\SysWOW64\KFJSPC.exeC:\windows\system32\KFJSPC.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OVQST.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\windows\system\OVQST.exeC:\windows\system\OVQST.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FWSFEAS.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\windows\SysWOW64\FWSFEAS.exeC:\windows\system32\FWSFEAS.exe17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\URBKP.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\windows\URBKP.exeC:\windows\URBKP.exe19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EZDPTK.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\windows\EZDPTK.exeC:\windows\EZDPTK.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IHK.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\windows\IHK.exeC:\windows\IHK.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OCJXKF.exe.bat" "24⤵PID:3392
-
C:\windows\SysWOW64\OCJXKF.exeC:\windows\system32\OCJXKF.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SKP.exe.bat" "26⤵PID:756
-
C:\windows\SysWOW64\SKP.exeC:\windows\system32\SKP.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FVGWCA.exe.bat" "28⤵PID:2196
-
C:\windows\FVGWCA.exeC:\windows\FVGWCA.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QOB.exe.bat" "30⤵PID:1968
-
C:\windows\system\QOB.exeC:\windows\system\QOB.exe31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GECGRD.exe.bat" "32⤵PID:1648
-
C:\windows\GECGRD.exeC:\windows\GECGRD.exe33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ARH.exe.bat" "34⤵PID:1672
-
C:\windows\system\ARH.exeC:\windows\system\ARH.exe35⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PUYCNQ.exe.bat" "36⤵PID:3108
-
C:\windows\PUYCNQ.exeC:\windows\PUYCNQ.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KHDLXQG.exe.bat" "38⤵PID:4340
-
C:\windows\SysWOW64\KHDLXQG.exeC:\windows\system32\KHDLXQG.exe39⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WPJLJ.exe.bat" "40⤵PID:4700
-
C:\windows\system\WPJLJ.exeC:\windows\system\WPJLJ.exe41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NAAJJ.exe.bat" "42⤵PID:3500
-
C:\windows\system\NAAJJ.exeC:\windows\system\NAAJJ.exe43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YGLPVJ.exe.bat" "44⤵PID:5052
-
C:\windows\YGLPVJ.exeC:\windows\YGLPVJ.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AWFJBG.exe.bat" "46⤵PID:3652
-
C:\windows\system\AWFJBG.exeC:\windows\system\AWFJBG.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:880 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JEHOFDJ.exe.bat" "48⤵PID:2612
-
C:\windows\system\JEHOFDJ.exeC:\windows\system\JEHOFDJ.exe49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ERLY.exe.bat" "50⤵PID:404
-
C:\windows\system\ERLY.exeC:\windows\system\ERLY.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TMVKAQH.exe.bat" "52⤵PID:2216
-
C:\windows\TMVKAQH.exeC:\windows\TMVKAQH.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KVX.exe.bat" "54⤵PID:4692
-
C:\windows\SysWOW64\KVX.exeC:\windows\system32\KVX.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FICZO.exe.bat" "56⤵PID:3404
-
C:\windows\SysWOW64\FICZO.exeC:\windows\system32\FICZO.exe57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UDL.exe.bat" "58⤵PID:2624
-
C:\windows\system\UDL.exeC:\windows\system\UDL.exe59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\NGPHM.exe.bat" "60⤵PID:3400
-
C:\windows\system\NGPHM.exeC:\windows\system\NGPHM.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EGR.exe.bat" "62⤵PID:1168
-
C:\windows\SysWOW64\EGR.exeC:\windows\system32\EGR.exe63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XJVPV.exe.bat" "64⤵PID:524
-
C:\windows\system\XJVPV.exeC:\windows\system\XJVPV.exe65⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3996 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TPAECDN.exe.bat" "66⤵PID:3028
-
C:\windows\system\TPAECDN.exeC:\windows\system\TPAECDN.exe67⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CPC.exe.bat" "68⤵PID:4380
-
C:\windows\system\CPC.exeC:\windows\system\CPC.exe69⤵
- Checks computer location settings
- Executes dropped EXE
PID:5020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TCNK.exe.bat" "70⤵PID:3916
-
C:\windows\TCNK.exeC:\windows\TCNK.exe71⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DLPPHCF.exe.bat" "72⤵PID:4204
-
C:\windows\DLPPHCF.exeC:\windows\DLPPHCF.exe73⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JLX.exe.bat" "74⤵PID:4348
-
C:\windows\SysWOW64\JLX.exeC:\windows\system32\JLX.exe75⤵
- Checks computer location settings
- Executes dropped EXE
PID:3784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JRPRS.exe.bat" "76⤵PID:4360
-
C:\windows\JRPRS.exeC:\windows\JRPRS.exe77⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PRWFBM.exe.bat" "78⤵PID:448
-
C:\windows\PRWFBM.exeC:\windows\PRWFBM.exe79⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AKZXJTA.exe.bat" "80⤵PID:3396
-
C:\windows\SysWOW64\AKZXJTA.exeC:\windows\system32\AKZXJTA.exe81⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WPF.exe.bat" "82⤵PID:4048
-
C:\windows\system\WPF.exeC:\windows\system\WPF.exe83⤵
- Executes dropped EXE
PID:4440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IIAFY.exe.bat" "84⤵PID:3212
-
C:\windows\IIAFY.exeC:\windows\IIAFY.exe85⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XDS.exe.bat" "86⤵PID:3620
-
C:\windows\system\XDS.exeC:\windows\system\XDS.exe87⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4244 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZBLMQU.exe.bat" "88⤵PID:4880
-
C:\windows\system\ZBLMQU.exeC:\windows\system\ZBLMQU.exe89⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KTOFYBQ.exe.bat" "90⤵PID:2672
-
C:\windows\SysWOW64\KTOFYBQ.exeC:\windows\system32\KTOFYBQ.exe91⤵
- Checks computer location settings
- Executes dropped EXE
PID:4304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ROLRAC.exe.bat" "92⤵PID:3792
-
C:\windows\ROLRAC.exeC:\windows\ROLRAC.exe93⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OMR.exe.bat" "94⤵PID:652
-
C:\windows\SysWOW64\OMR.exeC:\windows\system32\OMR.exe95⤵
- Checks computer location settings
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UMY.exe.bat" "96⤵PID:3364
-
C:\windows\system\UMY.exeC:\windows\system\UMY.exe97⤵
- Checks computer location settings
- Executes dropped EXE
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\MPCXDWC.exe.bat" "98⤵PID:1908
-
C:\windows\MPCXDWC.exeC:\windows\MPCXDWC.exe99⤵
- Checks computer location settings
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SPKL.exe.bat" "100⤵PID:4504
-
C:\windows\SPKL.exeC:\windows\SPKL.exe101⤵
- Executes dropped EXE
PID:3464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YLJUR.exe.bat" "102⤵PID:4820
-
C:\windows\system\YLJUR.exeC:\windows\system\YLJUR.exe103⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HQT.exe.bat" "104⤵PID:4792
-
C:\windows\system\HQT.exeC:\windows\system\HQT.exe105⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KLYVR.exe.bat" "106⤵PID:3384
-
C:\windows\system\KLYVR.exeC:\windows\system\KLYVR.exe107⤵
- Executes dropped EXE
PID:4264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IZPWOB.exe.bat" "108⤵PID:408
-
C:\windows\IZPWOB.exeC:\windows\IZPWOB.exe109⤵
- Executes dropped EXE
PID:4900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OZX.exe.bat" "110⤵PID:228
-
C:\windows\SysWOW64\OZX.exeC:\windows\system32\OZX.exe111⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IUCTP.exe.bat" "112⤵PID:2448
-
C:\windows\IUCTP.exeC:\windows\IUCTP.exe113⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DHHDRV.exe.bat" "114⤵PID:5112
-
C:\windows\SysWOW64\DHHDRV.exeC:\windows\system32\DHHDRV.exe115⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UIJ.exe.bat" "116⤵PID:2556
-
C:\windows\UIJ.exeC:\windows\UIJ.exe117⤵
- Executes dropped EXE
PID:3972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\YYPQH.exe.bat" "118⤵PID:1692
-
C:\windows\YYPQH.exeC:\windows\YYPQH.exe119⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CGWQT.exe.bat" "120⤵PID:320
-
C:\windows\SysWOW64\CGWQT.exeC:\windows\system32\CGWQT.exe121⤵
- Checks computer location settings
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OYZI.exe.bat" "122⤵PID:5028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-