Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe
Resource
win10v2004-20240709-en
General
-
Target
437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe
-
Size
208KB
-
MD5
6dff8989a1d2d5ad484186f84c8c105e
-
SHA1
9880727335a963849d6bb7ed0d082be3e45296d6
-
SHA256
437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296
-
SHA512
f31a528f02ebad2eb4db37510e369f3cbed7a87a7543f8c204af65f54440ff7ed062c5edabbfc9e7c0621ac8248eebdd67c1034f7141b97b2eb56be9d3a238cc
-
SSDEEP
3072:PGXfAoDm58xr9uRDdxJaXN0AGZlNXPngEodk68bR+xx394NLthEjQT67:PGPAoC8xrsJZAGPNXPg/ibcx39QEj9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation FIUHWE.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation CJDIR.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation IAY.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation ERNMRQQ.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation CNME.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation MLBI.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation FXIQMG.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation ZKZWM.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation TYBNXBA.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation BBKTVHH.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation AGCD.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation MLGJP.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation FMGD.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation QYEF.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation INM.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation LQHMRYY.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation FCJIA.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation NXUM.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation YRM.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation GLBOFKI.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation QCHJ.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation SPUPKH.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation ZZWYD.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation WFCOSO.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation CFKB.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation ONYD.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation RJUWEDB.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation GUC.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation TMW.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation SLWKGWX.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation DEG.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation ABV.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation UNWFA.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation RKS.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation MXFRJAW.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation DDKA.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation EZOGSUR.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation 437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation TWMSCW.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation SEPGAHO.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation UZRKZOI.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation BPUBMSN.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation LCOTQLC.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation OKYO.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation FGR.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation HAY.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation BYG.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation WOZUQKJ.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation PPK.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation GQROI.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation OVEUT.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation HAU.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation HOU.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation BPSKY.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation AGAXPHS.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation WRQ.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation BFBD.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation BLOG.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation XDMHLKB.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation MPTI.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation TQVH.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation STGY.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation QFYVUQ.exe Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation SURHCS.exe -
Executes dropped EXE 64 IoCs
pid Process 212 AGCD.exe 3988 PWPUOI.exe 4128 TMW.exe 1036 XUYKDZG.exe 920 TAWH.exe 3516 ZADV.exe 216 HQEMAZZ.exe 2532 WLOZL.exe 4068 WOZUQKJ.exe 1408 GPTZC.exe 3548 GSFDHFM.exe 1004 FHRYUK.exe 3592 JKPT.exe 4952 WVXSQGS.exe 4760 MLGJP.exe 3988 KJR.exe 1568 OMQHKA.exe 1632 FRAZ.exe 2024 LCE.exe 3668 CCYDI.exe 1852 PNOC.exe 2188 DTO.exe 2120 HBVNK.exe 5044 FMGD.exe 3188 TXOCHRU.exe 512 VKTL.exe 2024 QFYVUQ.exe 3416 DDYG.exe 5032 FBEB.exe 2660 KGWQBGK.exe 3168 QCHJ.exe 3472 AZNDXDB.exe 1440 SURHCS.exe 4720 CSE.exe 3424 QYEF.exe 696 DBI.exe 4060 OBQ.exe 3020 UCX.exe 2076 ZUHN.exe 1788 SXLQIT.exe 2224 FIUHWE.exe 3508 WIWMABP.exe 2504 CJDIR.exe 2136 VMHDWT.exe 3696 NHYH.exe 2908 THGVKSC.exe 4380 INM.exe 2956 BFBD.exe 2024 IAY.exe 1744 LQHMRYY.exe 4104 TWMSCW.exe 4340 DUZMJF.exe 3188 CECCS.exe 3584 PPK.exe 640 YQMG.exe 448 ZTQ.exe 2328 HYD.exe 3168 ABHM.exe 920 ERNMRQQ.exe 4728 QZUMDI.exe 4140 CNME.exe 3588 EPWT.exe 3320 YDOKYRQ.exe 2308 XVE.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\ZADV.exe.bat TAWH.exe File opened for modification C:\windows\SysWOW64\DEG.exe UVEICCI.exe File opened for modification C:\windows\SysWOW64\XPA.exe MXFRJAW.exe File created C:\windows\SysWOW64\UCX.exe OBQ.exe File opened for modification C:\windows\SysWOW64\LQHMRYY.exe IAY.exe File created C:\windows\SysWOW64\TWMSCW.exe LQHMRYY.exe File created C:\windows\SysWOW64\UVEICCI.exe OVEUT.exe File opened for modification C:\windows\SysWOW64\DFBDSV.exe CCXZEFC.exe File opened for modification C:\windows\SysWOW64\FGR.exe QDIEH.exe File created C:\windows\SysWOW64\QIRT.exe DFBDSV.exe File created C:\windows\SysWOW64\AZNDXDB.exe QCHJ.exe File created C:\windows\SysWOW64\DBI.exe QYEF.exe File created C:\windows\SysWOW64\RVLBI.exe.bat CFKB.exe File opened for modification C:\windows\SysWOW64\HLL.exe BPUBMSN.exe File created C:\windows\SysWOW64\TMW.exe PWPUOI.exe File created C:\windows\SysWOW64\DEG.exe.bat UVEICCI.exe File created C:\windows\SysWOW64\XGBPURQ.exe TQVH.exe File created C:\windows\SysWOW64\THGVKSC.exe.bat NHYH.exe File created C:\windows\SysWOW64\NTNG.exe.bat XDMHLKB.exe File created C:\windows\SysWOW64\ZZWYD.exe.bat VWYDETO.exe File created C:\windows\SysWOW64\FGR.exe QDIEH.exe File created C:\windows\SysWOW64\IKBTGD.exe.bat SUACAQP.exe File opened for modification C:\windows\SysWOW64\TMW.exe PWPUOI.exe File created C:\windows\SysWOW64\DEG.exe UVEICCI.exe File created C:\windows\SysWOW64\DACAA.exe LXQ.exe File created C:\windows\SysWOW64\DACAA.exe.bat LXQ.exe File created C:\windows\SysWOW64\TMW.exe.bat PWPUOI.exe File created C:\windows\SysWOW64\KGWQBGK.exe FBEB.exe File created C:\windows\SysWOW64\SUACAQP.exe.bat EOCES.exe File created C:\windows\SysWOW64\DDKA.exe.bat JIFRCHK.exe File created C:\windows\SysWOW64\XPA.exe MXFRJAW.exe File opened for modification C:\windows\SysWOW64\QWHPRGK.exe CMD.exe File opened for modification C:\windows\SysWOW64\DBI.exe QYEF.exe File created C:\windows\SysWOW64\QIRT.exe.bat DFBDSV.exe File created C:\windows\SysWOW64\LCOTQLC.exe.bat FCGF.exe File opened for modification C:\windows\SysWOW64\YQMG.exe PPK.exe File opened for modification C:\windows\SysWOW64\MQE.exe HLL.exe File created C:\windows\SysWOW64\OJXX.exe.bat TOTOCXT.exe File opened for modification C:\windows\SysWOW64\KGWQBGK.exe FBEB.exe File opened for modification C:\windows\SysWOW64\SUACAQP.exe EOCES.exe File created C:\windows\SysWOW64\TWKUJH.exe.bat STGY.exe File created C:\windows\SysWOW64\FBEB.exe.bat DDYG.exe File opened for modification C:\windows\SysWOW64\OMQHKA.exe KJR.exe File created C:\windows\SysWOW64\VMHDWT.exe.bat CJDIR.exe File created C:\windows\SysWOW64\MLBI.exe SQWZPJA.exe File created C:\windows\SysWOW64\HLL.exe BPUBMSN.exe File created C:\windows\SysWOW64\WFCOSO.exe ZZWYD.exe File opened for modification C:\windows\SysWOW64\WFCOSO.exe ZZWYD.exe File opened for modification C:\windows\SysWOW64\LCOTQLC.exe FCGF.exe File opened for modification C:\windows\SysWOW64\DDKA.exe JIFRCHK.exe File created C:\windows\SysWOW64\LQHMRYY.exe.bat IAY.exe File created C:\windows\SysWOW64\ZTQ.exe.bat YQMG.exe File created C:\windows\SysWOW64\DFBDSV.exe.bat CCXZEFC.exe File created C:\windows\SysWOW64\MWEG.exe.bat MQE.exe File created C:\windows\SysWOW64\FPFUO.exe SMJWID.exe File created C:\windows\SysWOW64\FBEB.exe DDYG.exe File created C:\windows\SysWOW64\LQHMRYY.exe IAY.exe File created C:\windows\SysWOW64\OKYO.exe.bat PZOYL.exe File created C:\windows\SysWOW64\DBI.exe.bat QYEF.exe File created C:\windows\SysWOW64\XPA.exe.bat MXFRJAW.exe File created C:\windows\SysWOW64\RVLBI.exe CFKB.exe File created C:\windows\SysWOW64\FGR.exe.bat QDIEH.exe File created C:\windows\SysWOW64\LCE.exe FRAZ.exe File opened for modification C:\windows\SysWOW64\UCX.exe OBQ.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\system\LRPLW.exe.bat XVE.exe File created C:\windows\system\XDMHLKB.exe.bat SDETC.exe File created C:\windows\ROU.exe.bat RJUWEDB.exe File created C:\windows\GPTZC.exe.bat WOZUQKJ.exe File opened for modification C:\windows\UZM.exe KBG.exe File created C:\windows\QRWPWGZ.exe UZM.exe File created C:\windows\system\RUBRYTF.exe.bat BES.exe File created C:\windows\GQROI.exe.bat CAL.exe File created C:\windows\JIFRCHK.exe.bat ZKZWM.exe File created C:\windows\system\OQNTYXT.exe.bat ASNH.exe File opened for modification C:\windows\WOZUQKJ.exe WLOZL.exe File created C:\windows\system\PVHGSY.exe.bat NXUM.exe File opened for modification C:\windows\system\CAL.exe HMGWMR.exe File created C:\windows\system\HOU.exe HAU.exe File opened for modification C:\windows\system\PZOYL.exe YRM.exe File created C:\windows\FCSKYK.exe.bat EZOGSUR.exe File created C:\windows\system\PIQ.exe YXS.exe File opened for modification C:\windows\JKPT.exe FHRYUK.exe File created C:\windows\system\SXLQIT.exe ZUHN.exe File created C:\windows\NHYH.exe.bat VMHDWT.exe File created C:\windows\QZUMDI.exe ERNMRQQ.exe File opened for modification C:\windows\system\BES.exe VELEIV.exe File opened for modification C:\windows\OVEUT.exe GQROI.exe File created C:\windows\system\PZOYL.exe YRM.exe File opened for modification C:\windows\system\IKIRUY.exe LFQBE.exe File created C:\windows\AGCD.exe.bat 437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe File created C:\windows\system\ERNMRQQ.exe ABHM.exe File created C:\windows\system\BES.exe VELEIV.exe File created C:\windows\UZRKZOI.exe PUG.exe File opened for modification C:\windows\TENWUF.exe ABV.exe File created C:\windows\system\WRQ.exe FGR.exe File created C:\windows\IAY.exe.bat BFBD.exe File created C:\windows\SDETC.exe XPA.exe File opened for modification C:\windows\system\HAU.exe QVJIH.exe File created C:\windows\system\HOU.exe.bat HAU.exe File opened for modification C:\windows\TYBNXBA.exe DDKA.exe File created C:\windows\system\WLOZL.exe HQEMAZZ.exe File created C:\windows\system\HQEMAZZ.exe.bat ZADV.exe File created C:\windows\FMGD.exe.bat HBVNK.exe File created C:\windows\CSE.exe SURHCS.exe File created C:\windows\BLOG.exe.bat PVHGSY.exe File created C:\windows\DFITFHE.exe.bat OKYO.exe File created C:\windows\system\GUC.exe.bat LHXXEE.exe File created C:\windows\system\FOD.exe UNWFA.exe File created C:\windows\AGCD.exe 437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe File opened for modification C:\windows\system\NFM.exe LHY.exe File opened for modification C:\windows\BPSKY.exe UZRKZOI.exe File created C:\windows\system\AGAXPHS.exe DACAA.exe File opened for modification C:\windows\YXS.exe TWKUJH.exe File opened for modification C:\windows\VELEIV.exe IBPGDEU.exe File created C:\windows\FIUHWE.exe.bat SXLQIT.exe File created C:\windows\WIWMABP.exe.bat FIUHWE.exe File created C:\windows\system\SEPGAHO.exe.bat ABLKU.exe File opened for modification C:\windows\VWYDETO.exe PWRQURN.exe File created C:\windows\system\PZOYL.exe.bat YRM.exe File created C:\windows\XUYKDZG.exe.bat TMW.exe File created C:\windows\system\PUPD.exe AZSIE.exe File created C:\windows\system\PUPD.exe.bat AZSIE.exe File created C:\windows\TYBNXBA.exe DDKA.exe File opened for modification C:\windows\system\PIQ.exe YXS.exe File created C:\windows\SPUPKH.exe BPSKY.exe File opened for modification C:\windows\system\DDYG.exe QFYVUQ.exe File created C:\windows\system\ZUHN.exe.bat UCX.exe File created C:\windows\IAY.exe BFBD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 3296 4800 WerFault.exe 83 1536 212 WerFault.exe 91 2144 3988 WerFault.exe 97 1936 4128 WerFault.exe 104 4344 1036 WerFault.exe 109 4324 920 WerFault.exe 116 220 3516 WerFault.exe 121 3016 216 WerFault.exe 126 5104 2532 WerFault.exe 131 4580 4068 WerFault.exe 136 2504 1408 WerFault.exe 142 4240 3548 WerFault.exe 147 1440 1004 WerFault.exe 152 3444 3592 WerFault.exe 158 212 4952 WerFault.exe 163 3492 4760 WerFault.exe 168 1940 3988 WerFault.exe 174 2136 1568 WerFault.exe 179 4728 1632 WerFault.exe 184 972 2024 WerFault.exe 189 4752 3668 WerFault.exe 194 748 1852 WerFault.exe 199 1612 2188 WerFault.exe 204 3380 2120 WerFault.exe 209 4972 5044 WerFault.exe 214 3660 3188 WerFault.exe 219 4476 512 WerFault.exe 224 4752 2024 WerFault.exe 229 748 3416 WerFault.exe 234 1612 5032 WerFault.exe 239 2016 2660 WerFault.exe 244 5100 3168 WerFault.exe 249 4416 3472 WerFault.exe 254 3648 1440 WerFault.exe 259 1656 4720 WerFault.exe 264 1712 3424 WerFault.exe 269 2648 696 WerFault.exe 274 3720 4060 WerFault.exe 279 2880 3020 WerFault.exe 285 4512 2076 WerFault.exe 290 3576 1788 WerFault.exe 295 64 2224 WerFault.exe 300 2100 3508 WerFault.exe 305 4884 2504 WerFault.exe 310 2388 2136 WerFault.exe 317 1044 3696 WerFault.exe 322 4888 2908 WerFault.exe 327 1656 4380 WerFault.exe 332 1888 2956 WerFault.exe 337 4144 2024 WerFault.exe 342 3200 1744 WerFault.exe 347 3192 4104 WerFault.exe 352 756 4340 WerFault.exe 357 2076 3188 WerFault.exe 362 972 3584 WerFault.exe 367 1888 640 WerFault.exe 372 5044 448 WerFault.exe 377 1508 2328 WerFault.exe 382 3660 3168 WerFault.exe 386 1604 920 WerFault.exe 392 2372 4728 WerFault.exe 397 3088 4140 WerFault.exe 402 4740 3588 WerFault.exe 407 2660 3320 WerFault.exe 412 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4800 437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe 4800 437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe 212 AGCD.exe 212 AGCD.exe 3988 PWPUOI.exe 3988 PWPUOI.exe 4128 TMW.exe 4128 TMW.exe 1036 XUYKDZG.exe 1036 XUYKDZG.exe 920 TAWH.exe 920 TAWH.exe 3516 ZADV.exe 3516 ZADV.exe 216 HQEMAZZ.exe 216 HQEMAZZ.exe 2532 WLOZL.exe 2532 WLOZL.exe 4068 WOZUQKJ.exe 4068 WOZUQKJ.exe 1408 GPTZC.exe 1408 GPTZC.exe 3548 GSFDHFM.exe 3548 GSFDHFM.exe 1004 FHRYUK.exe 1004 FHRYUK.exe 3592 JKPT.exe 3592 JKPT.exe 4952 WVXSQGS.exe 4952 WVXSQGS.exe 4760 MLGJP.exe 4760 MLGJP.exe 3988 KJR.exe 3988 KJR.exe 1568 OMQHKA.exe 1568 OMQHKA.exe 1632 FRAZ.exe 1632 FRAZ.exe 2024 LCE.exe 2024 LCE.exe 3668 CCYDI.exe 3668 CCYDI.exe 1852 PNOC.exe 1852 PNOC.exe 2188 DTO.exe 2188 DTO.exe 2120 HBVNK.exe 2120 HBVNK.exe 5044 FMGD.exe 5044 FMGD.exe 3188 TXOCHRU.exe 3188 TXOCHRU.exe 512 VKTL.exe 512 VKTL.exe 2024 QFYVUQ.exe 2024 QFYVUQ.exe 3416 DDYG.exe 3416 DDYG.exe 5032 FBEB.exe 5032 FBEB.exe 2660 KGWQBGK.exe 2660 KGWQBGK.exe 3168 QCHJ.exe 3168 QCHJ.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4800 437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe 4800 437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe 212 AGCD.exe 212 AGCD.exe 3988 PWPUOI.exe 3988 PWPUOI.exe 4128 TMW.exe 4128 TMW.exe 1036 XUYKDZG.exe 1036 XUYKDZG.exe 920 TAWH.exe 920 TAWH.exe 3516 ZADV.exe 3516 ZADV.exe 216 HQEMAZZ.exe 216 HQEMAZZ.exe 2532 WLOZL.exe 2532 WLOZL.exe 4068 WOZUQKJ.exe 4068 WOZUQKJ.exe 1408 GPTZC.exe 1408 GPTZC.exe 3548 GSFDHFM.exe 3548 GSFDHFM.exe 1004 FHRYUK.exe 1004 FHRYUK.exe 3592 JKPT.exe 3592 JKPT.exe 4952 WVXSQGS.exe 4952 WVXSQGS.exe 4760 MLGJP.exe 4760 MLGJP.exe 3988 KJR.exe 3988 KJR.exe 1568 OMQHKA.exe 1568 OMQHKA.exe 1632 FRAZ.exe 1632 FRAZ.exe 2024 LCE.exe 2024 LCE.exe 3668 CCYDI.exe 3668 CCYDI.exe 1852 PNOC.exe 1852 PNOC.exe 2188 DTO.exe 2188 DTO.exe 2120 HBVNK.exe 2120 HBVNK.exe 5044 FMGD.exe 5044 FMGD.exe 3188 TXOCHRU.exe 3188 TXOCHRU.exe 512 VKTL.exe 512 VKTL.exe 2024 QFYVUQ.exe 2024 QFYVUQ.exe 3416 DDYG.exe 3416 DDYG.exe 5032 FBEB.exe 5032 FBEB.exe 2660 KGWQBGK.exe 2660 KGWQBGK.exe 3168 QCHJ.exe 3168 QCHJ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 5052 4800 437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe 87 PID 4800 wrote to memory of 5052 4800 437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe 87 PID 4800 wrote to memory of 5052 4800 437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe 87 PID 5052 wrote to memory of 212 5052 cmd.exe 91 PID 5052 wrote to memory of 212 5052 cmd.exe 91 PID 5052 wrote to memory of 212 5052 cmd.exe 91 PID 212 wrote to memory of 3396 212 AGCD.exe 93 PID 212 wrote to memory of 3396 212 AGCD.exe 93 PID 212 wrote to memory of 3396 212 AGCD.exe 93 PID 3396 wrote to memory of 3988 3396 cmd.exe 97 PID 3396 wrote to memory of 3988 3396 cmd.exe 97 PID 3396 wrote to memory of 3988 3396 cmd.exe 97 PID 3988 wrote to memory of 2648 3988 PWPUOI.exe 100 PID 3988 wrote to memory of 2648 3988 PWPUOI.exe 100 PID 3988 wrote to memory of 2648 3988 PWPUOI.exe 100 PID 2648 wrote to memory of 4128 2648 cmd.exe 104 PID 2648 wrote to memory of 4128 2648 cmd.exe 104 PID 2648 wrote to memory of 4128 2648 cmd.exe 104 PID 4128 wrote to memory of 1408 4128 TMW.exe 105 PID 4128 wrote to memory of 1408 4128 TMW.exe 105 PID 4128 wrote to memory of 1408 4128 TMW.exe 105 PID 1408 wrote to memory of 1036 1408 cmd.exe 109 PID 1408 wrote to memory of 1036 1408 cmd.exe 109 PID 1408 wrote to memory of 1036 1408 cmd.exe 109 PID 1036 wrote to memory of 4420 1036 XUYKDZG.exe 112 PID 1036 wrote to memory of 4420 1036 XUYKDZG.exe 112 PID 1036 wrote to memory of 4420 1036 XUYKDZG.exe 112 PID 4420 wrote to memory of 920 4420 cmd.exe 116 PID 4420 wrote to memory of 920 4420 cmd.exe 116 PID 4420 wrote to memory of 920 4420 cmd.exe 116 PID 920 wrote to memory of 2620 920 TAWH.exe 117 PID 920 wrote to memory of 2620 920 TAWH.exe 117 PID 920 wrote to memory of 2620 920 TAWH.exe 117 PID 2620 wrote to memory of 3516 2620 cmd.exe 121 PID 2620 wrote to memory of 3516 2620 cmd.exe 121 PID 2620 wrote to memory of 3516 2620 cmd.exe 121 PID 3516 wrote to memory of 3200 3516 ZADV.exe 122 PID 3516 wrote to memory of 3200 3516 ZADV.exe 122 PID 3516 wrote to memory of 3200 3516 ZADV.exe 122 PID 3200 wrote to memory of 216 3200 cmd.exe 126 PID 3200 wrote to memory of 216 3200 cmd.exe 126 PID 3200 wrote to memory of 216 3200 cmd.exe 126 PID 216 wrote to memory of 3932 216 HQEMAZZ.exe 127 PID 216 wrote to memory of 3932 216 HQEMAZZ.exe 127 PID 216 wrote to memory of 3932 216 HQEMAZZ.exe 127 PID 3932 wrote to memory of 2532 3932 cmd.exe 131 PID 3932 wrote to memory of 2532 3932 cmd.exe 131 PID 3932 wrote to memory of 2532 3932 cmd.exe 131 PID 2532 wrote to memory of 4888 2532 WLOZL.exe 133 PID 2532 wrote to memory of 4888 2532 WLOZL.exe 133 PID 2532 wrote to memory of 4888 2532 WLOZL.exe 133 PID 4888 wrote to memory of 4068 4888 cmd.exe 136 PID 4888 wrote to memory of 4068 4888 cmd.exe 136 PID 4888 wrote to memory of 4068 4888 cmd.exe 136 PID 4068 wrote to memory of 2560 4068 WOZUQKJ.exe 138 PID 4068 wrote to memory of 2560 4068 WOZUQKJ.exe 138 PID 4068 wrote to memory of 2560 4068 WOZUQKJ.exe 138 PID 2560 wrote to memory of 1408 2560 cmd.exe 142 PID 2560 wrote to memory of 1408 2560 cmd.exe 142 PID 2560 wrote to memory of 1408 2560 cmd.exe 142 PID 1408 wrote to memory of 1612 1408 GPTZC.exe 143 PID 1408 wrote to memory of 1612 1408 GPTZC.exe 143 PID 1408 wrote to memory of 1612 1408 GPTZC.exe 143 PID 1612 wrote to memory of 3548 1612 cmd.exe 147
Processes
-
C:\Users\Admin\AppData\Local\Temp\437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe"C:\Users\Admin\AppData\Local\Temp\437d1045e811737dc7da8fa6a8d660d02a96fc3b6f5f12ece5f68a9b1f993296.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\AGCD.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\windows\AGCD.exeC:\windows\AGCD.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\PWPUOI.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\windows\PWPUOI.exeC:\windows\PWPUOI.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TMW.exe.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\windows\SysWOW64\TMW.exeC:\windows\system32\TMW.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XUYKDZG.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\windows\XUYKDZG.exeC:\windows\XUYKDZG.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TAWH.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\windows\TAWH.exeC:\windows\TAWH.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZADV.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\windows\SysWOW64\ZADV.exeC:\windows\system32\ZADV.exe13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HQEMAZZ.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\windows\system\HQEMAZZ.exeC:\windows\system\HQEMAZZ.exe15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WLOZL.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\windows\system\WLOZL.exeC:\windows\system\WLOZL.exe17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WOZUQKJ.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\windows\WOZUQKJ.exeC:\windows\WOZUQKJ.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GPTZC.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\windows\GPTZC.exeC:\windows\GPTZC.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GSFDHFM.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\windows\GSFDHFM.exeC:\windows\GSFDHFM.exe23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3548 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FHRYUK.exe.bat" "24⤵PID:3256
-
C:\windows\SysWOW64\FHRYUK.exeC:\windows\system32\FHRYUK.exe25⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1004 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JKPT.exe.bat" "26⤵PID:756
-
C:\windows\JKPT.exeC:\windows\JKPT.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WVXSQGS.exe.bat" "28⤵PID:3136
-
C:\windows\WVXSQGS.exeC:\windows\WVXSQGS.exe29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MLGJP.exe.bat" "30⤵PID:3448
-
C:\windows\system\MLGJP.exeC:\windows\system\MLGJP.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KJR.exe.bat" "32⤵PID:2336
-
C:\windows\SysWOW64\KJR.exeC:\windows\system32\KJR.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OMQHKA.exe.bat" "34⤵PID:1488
-
C:\windows\SysWOW64\OMQHKA.exeC:\windows\system32\OMQHKA.exe35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FRAZ.exe.bat" "36⤵PID:3240
-
C:\windows\FRAZ.exeC:\windows\FRAZ.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LCE.exe.bat" "38⤵PID:3392
-
C:\windows\SysWOW64\LCE.exeC:\windows\system32\LCE.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\CCYDI.exe.bat" "40⤵PID:4168
-
C:\windows\system\CCYDI.exeC:\windows\system\CCYDI.exe41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PNOC.exe.bat" "42⤵PID:1536
-
C:\windows\SysWOW64\PNOC.exeC:\windows\system32\PNOC.exe43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DTO.exe.bat" "44⤵PID:1336
-
C:\windows\DTO.exeC:\windows\DTO.exe45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HBVNK.exe.bat" "46⤵PID:3528
-
C:\windows\system\HBVNK.exeC:\windows\system\HBVNK.exe47⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2120 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FMGD.exe.bat" "48⤵PID:2464
-
C:\windows\FMGD.exeC:\windows\FMGD.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TXOCHRU.exe.bat" "50⤵PID:436
-
C:\windows\TXOCHRU.exeC:\windows\TXOCHRU.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VKTL.exe.bat" "52⤵PID:2076
-
C:\windows\VKTL.exeC:\windows\VKTL.exe53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QFYVUQ.exe.bat" "54⤵PID:4432
-
C:\windows\QFYVUQ.exeC:\windows\QFYVUQ.exe55⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DDYG.exe.bat" "56⤵PID:2468
-
C:\windows\system\DDYG.exeC:\windows\system\DDYG.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3416 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FBEB.exe.bat" "58⤵PID:5076
-
C:\windows\SysWOW64\FBEB.exeC:\windows\system32\FBEB.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KGWQBGK.exe.bat" "60⤵PID:1544
-
C:\windows\SysWOW64\KGWQBGK.exeC:\windows\system32\KGWQBGK.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QCHJ.exe.bat" "62⤵PID:1508
-
C:\windows\QCHJ.exeC:\windows\QCHJ.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AZNDXDB.exe.bat" "64⤵PID:4808
-
C:\windows\SysWOW64\AZNDXDB.exeC:\windows\system32\AZNDXDB.exe65⤵
- Executes dropped EXE
PID:3472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SURHCS.exe.bat" "66⤵PID:1004
-
C:\windows\system\SURHCS.exeC:\windows\system\SURHCS.exe67⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CSE.exe.bat" "68⤵PID:3692
-
C:\windows\CSE.exeC:\windows\CSE.exe69⤵
- Executes dropped EXE
PID:4720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QYEF.exe.bat" "70⤵PID:184
-
C:\windows\QYEF.exeC:\windows\QYEF.exe71⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DBI.exe.bat" "72⤵PID:1932
-
C:\windows\SysWOW64\DBI.exeC:\windows\system32\DBI.exe73⤵
- Executes dropped EXE
PID:696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OBQ.exe.bat" "74⤵PID:2268
-
C:\windows\OBQ.exeC:\windows\OBQ.exe75⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\UCX.exe.bat" "76⤵PID:2308
-
C:\windows\SysWOW64\UCX.exeC:\windows\system32\UCX.exe77⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZUHN.exe.bat" "78⤵PID:3672
-
C:\windows\system\ZUHN.exeC:\windows\system\ZUHN.exe79⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\SXLQIT.exe.bat" "80⤵PID:1044
-
C:\windows\system\SXLQIT.exeC:\windows\system\SXLQIT.exe81⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FIUHWE.exe.bat" "82⤵PID:3516
-
C:\windows\FIUHWE.exeC:\windows\FIUHWE.exe83⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WIWMABP.exe.bat" "84⤵PID:4968
-
C:\windows\WIWMABP.exeC:\windows\WIWMABP.exe85⤵
- Executes dropped EXE
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CJDIR.exe.bat" "86⤵PID:1712
-
C:\windows\CJDIR.exeC:\windows\CJDIR.exe87⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VMHDWT.exe.bat" "88⤵PID:2852
-
C:\windows\SysWOW64\VMHDWT.exeC:\windows\system32\VMHDWT.exe89⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NHYH.exe.bat" "90⤵PID:4052
-
C:\windows\NHYH.exeC:\windows\NHYH.exe91⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\THGVKSC.exe.bat" "92⤵PID:2720
-
C:\windows\SysWOW64\THGVKSC.exeC:\windows\system32\THGVKSC.exe93⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\INM.exe.bat" "94⤵PID:1068
-
C:\windows\SysWOW64\INM.exeC:\windows\system32\INM.exe95⤵
- Checks computer location settings
- Executes dropped EXE
PID:4380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BFBD.exe.bat" "96⤵PID:4284
-
C:\windows\SysWOW64\BFBD.exeC:\windows\system32\BFBD.exe97⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IAY.exe.bat" "98⤵PID:2332
-
C:\windows\IAY.exeC:\windows\IAY.exe99⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LQHMRYY.exe.bat" "100⤵PID:748
-
C:\windows\SysWOW64\LQHMRYY.exeC:\windows\system32\LQHMRYY.exe101⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\TWMSCW.exe.bat" "102⤵PID:4884
-
C:\windows\SysWOW64\TWMSCW.exeC:\windows\system32\TWMSCW.exe103⤵
- Checks computer location settings
- Executes dropped EXE
PID:4104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DUZMJF.exe.bat" "104⤵PID:4236
-
C:\windows\SysWOW64\DUZMJF.exeC:\windows\system32\DUZMJF.exe105⤵
- Executes dropped EXE
PID:4340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CECCS.exe.bat" "106⤵PID:1148
-
C:\windows\CECCS.exeC:\windows\CECCS.exe107⤵
- Executes dropped EXE
PID:3188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PPK.exe.bat" "108⤵PID:3932
-
C:\windows\system\PPK.exeC:\windows\system\PPK.exe109⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\YQMG.exe.bat" "110⤵PID:1852
-
C:\windows\SysWOW64\YQMG.exeC:\windows\system32\YQMG.exe111⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZTQ.exe.bat" "112⤵PID:1724
-
C:\windows\SysWOW64\ZTQ.exeC:\windows\system32\ZTQ.exe113⤵
- Executes dropped EXE
PID:448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\HYD.exe.bat" "114⤵PID:976
-
C:\windows\system\HYD.exeC:\windows\system\HYD.exe115⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ABHM.exe.bat" "116⤵PID:3672
-
C:\windows\system\ABHM.exeC:\windows\system\ABHM.exe117⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ERNMRQQ.exe.bat" "118⤵PID:1992
-
C:\windows\system\ERNMRQQ.exeC:\windows\system\ERNMRQQ.exe119⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\QZUMDI.exe.bat" "120⤵PID:3696
-
C:\windows\QZUMDI.exeC:\windows\QZUMDI.exe121⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CNME.exe.bat" "122⤵PID:212
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-