Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe
Resource
win10v2004-20240802-en
General
-
Target
5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe
-
Size
289KB
-
MD5
94796ee5b62354f967affb902485a930
-
SHA1
97d2b3b229463ed26b06e99969cf4e834fad8188
-
SHA256
5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593d
-
SHA512
dcc9cab77d07df9200e7f6e648b9b0302047407394ddb962086ae4ea919ba8c02ee85e34829f351a3c554a93d5c27dacdbed142476e662a49648dc3623e940bb
-
SSDEEP
6144:UOIHIBVw49kOBGOFDw6pskECzJLaQVbU5:UroLJFE6qklJLJbU5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation HEP.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ODUPM.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation OLMJWUE.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation NYHUQ.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation TKSBVX.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation TXMDLCP.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation IPOLEE.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation YPYDIM.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation GKDZQXQ.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation GPTZC.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DCUU.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation HALAS.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WFS.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation LAMA.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation AMYMUXQ.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation FQF.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation JIJDSH.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation XKE.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation NOSX.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation RWYXNM.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation STAUVZ.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation EMYNJPH.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation PNFEZIH.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation KTP.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation UWANDVU.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation XLJYJQQ.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation GOAMGW.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation RGHXYX.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation YBWP.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation IBYCSC.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation GVXYGC.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation NNZO.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation SXYAJV.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation FMEAXH.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation XHFCD.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation SJXY.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation MCFM.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation LBNNRUW.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ATVE.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation JDM.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation PINCIP.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation KRDQNM.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation SRTOSDB.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DDQ.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ZJQMSK.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation IXLDTXF.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ATGZ.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation FGMMW.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation MYVICI.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation XCERJM.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation DXQ.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WPQK.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation XZHWEY.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation BUZ.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ZQTZJ.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation TIOBTY.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation BWH.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation CKMCOU.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation JNRMHG.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation BGWS.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation RQIOFV.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation WBT.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation HPJWJP.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation TVMEDT.exe -
Executes dropped EXE 64 IoCs
pid Process 3728 LENI.exe 2152 HEP.exe 2028 AXTK.exe 1736 PNU.exe 4116 RLZWYEY.exe 1952 QWCMGK.exe 1556 SRTOSDB.exe 5060 GPTZC.exe 4512 XCERJM.exe 3044 DXQ.exe 5084 DDQ.exe 4536 IIIWPIM.exe 3020 EJKYTM.exe 976 OJME.exe 1128 WPQK.exe 3764 RZHJVTO.exe 1380 TXMDLCP.exe 1692 ODUPM.exe 2340 AVCAW.exe 5076 KTP.exe 1288 ZJQMSK.exe 4052 UWANDVU.exe 3008 CKMCOU.exe 4092 IXLDTXF.exe 3612 GVXYGC.exe 4396 OBJMQ.exe 3540 ATMXZQ.exe 5064 DJTF.exe 4508 SEFYR.exe 4672 NNZO.exe 2560 XKE.exe 2600 BSLINW.exe 2068 LBNNRUW.exe 4196 NOSX.exe 5100 RWYXNM.exe 3488 HMZWU.exe 5048 JKNQ.exe 4188 JNRMHG.exe 5056 HNZ.exe 4984 GYBQHOD.exe 1992 ATGZ.exe 4292 ATVE.exe 4196 SXYAJV.exe 1068 GHHZPF.exe 1800 ONHNZKN.exe 1556 QLNI.exe 4924 UTBISLJ.exe 1128 WOY.exe 4756 KMGD.exe 4116 VENOOXQ.exe 372 HUUWAI.exe 2760 ZPG.exe 3000 RYAXR.exe 704 JBMA.exe 1352 BGWS.exe 1356 ZZZ.exe 2448 XZHWEY.exe 1212 BCF.exe 3848 XFNISC.exe 4584 IYQ.exe 4540 KVWVI.exe 2672 FGMMW.exe 4892 FMEAXH.exe 1944 EEPQG.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\SEFYR.exe.bat DJTF.exe File opened for modification C:\windows\SysWOW64\WOY.exe UTBISLJ.exe File created C:\windows\SysWOW64\KMGD.exe.bat WOY.exe File created C:\windows\SysWOW64\EEPQG.exe.bat FMEAXH.exe File created C:\windows\SysWOW64\FDRP.exe.bat NDCS.exe File opened for modification C:\windows\SysWOW64\AERFX.exe QGLKP.exe File opened for modification C:\windows\SysWOW64\IBYCSC.exe OOTS.exe File opened for modification C:\windows\SysWOW64\GYBQHOD.exe HNZ.exe File created C:\windows\SysWOW64\QLNI.exe ONHNZKN.exe File created C:\windows\SysWOW64\BGQVWNH.exe.bat JDM.exe File opened for modification C:\windows\SysWOW64\YPYDIM.exe DCUU.exe File created C:\windows\SysWOW64\SJXY.exe RGTCOQX.exe File created C:\windows\SysWOW64\XKE.exe.bat NNZO.exe File created C:\windows\SysWOW64\HNZ.exe.bat JNRMHG.exe File opened for modification C:\windows\SysWOW64\VZFGO.exe BGQVWNH.exe File opened for modification C:\windows\SysWOW64\SVV.exe TKSBVX.exe File opened for modification C:\windows\SysWOW64\NMRFKKN.exe WZGNU.exe File opened for modification C:\windows\SysWOW64\QWCMGK.exe RLZWYEY.exe File created C:\windows\SysWOW64\QLNI.exe.bat ONHNZKN.exe File created C:\windows\SysWOW64\BCF.exe XZHWEY.exe File created C:\windows\SysWOW64\SFCOHGR.exe BUZ.exe File created C:\windows\SysWOW64\EMYNJPH.exe.bat AERFX.exe File created C:\windows\SysWOW64\TKSBVX.exe YONK.exe File created C:\windows\SysWOW64\SVV.exe TKSBVX.exe File created C:\windows\SysWOW64\HEP.exe LENI.exe File created C:\windows\SysWOW64\KTP.exe AVCAW.exe File opened for modification C:\windows\SysWOW64\BGQVWNH.exe JDM.exe File created C:\windows\SysWOW64\FRREP.exe FDRP.exe File created C:\windows\SysWOW64\EVLDAFK.exe LAMA.exe File created C:\windows\SysWOW64\SEFYR.exe DJTF.exe File opened for modification C:\windows\SysWOW64\JKNQ.exe HMZWU.exe File created C:\windows\SysWOW64\YPYDIM.exe DCUU.exe File created C:\windows\SysWOW64\SFCOHGR.exe.bat BUZ.exe File opened for modification C:\windows\SysWOW64\ZQTZJ.exe JAMWXJ.exe File created C:\windows\SysWOW64\TIOBTY.exe OHZ.exe File created C:\windows\SysWOW64\OUICT.exe.bat IUA.exe File created C:\windows\SysWOW64\OLMJWUE.exe.bat MYVICI.exe File created C:\windows\SysWOW64\JIJDSH.exe.bat WDBRQVW.exe File created C:\windows\SysWOW64\JKNQ.exe.bat HMZWU.exe File created C:\windows\SysWOW64\ONHNZKN.exe.bat GHHZPF.exe File created C:\windows\SysWOW64\KLMKL.exe.bat RQIOFV.exe File created C:\windows\SysWOW64\JAMWXJ.exe GKDZQXQ.exe File opened for modification C:\windows\SysWOW64\TIOBTY.exe OHZ.exe File opened for modification C:\windows\SysWOW64\EPWSMJ.exe KRDQNM.exe File created C:\windows\SysWOW64\OOTS.exe.bat JIJDSH.exe File opened for modification C:\windows\SysWOW64\SFCOHGR.exe BUZ.exe File opened for modification C:\windows\SysWOW64\KLMKL.exe RQIOFV.exe File opened for modification C:\windows\SysWOW64\LZTZU.exe MGQJMK.exe File created C:\windows\SysWOW64\IBYCSC.exe.bat OOTS.exe File created C:\windows\SysWOW64\AVCAW.exe ODUPM.exe File created C:\windows\SysWOW64\JAMWXJ.exe.bat GKDZQXQ.exe File created C:\windows\SysWOW64\OUICT.exe IUA.exe File created C:\windows\SysWOW64\HPJWJP.exe MCFM.exe File created C:\windows\SysWOW64\NOSX.exe.bat LBNNRUW.exe File created C:\windows\SysWOW64\JKNQ.exe HMZWU.exe File created C:\windows\SysWOW64\GYBQHOD.exe HNZ.exe File created C:\windows\SysWOW64\WOY.exe.bat UTBISLJ.exe File opened for modification C:\windows\SysWOW64\KMGD.exe WOY.exe File opened for modification C:\windows\SysWOW64\XZHWEY.exe ZZZ.exe File created C:\windows\SysWOW64\KFXEPPM.exe.bat EEPQG.exe File opened for modification C:\windows\SysWOW64\FDRP.exe NDCS.exe File created C:\windows\SysWOW64\EPWSMJ.exe.bat KRDQNM.exe File created C:\windows\SysWOW64\YEDRND.exe DRZH.exe File created C:\windows\SysWOW64\JNRMHG.exe.bat JKNQ.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\EJKYTM.exe.bat IIIWPIM.exe File created C:\windows\HMZWU.exe.bat RWYXNM.exe File created C:\windows\FMEAXH.exe FGMMW.exe File created C:\windows\LXQ.exe.bat HPJWJP.exe File created C:\windows\system\AXTK.exe HEP.exe File opened for modification C:\windows\OJME.exe EJKYTM.exe File opened for modification C:\windows\NNZO.exe SEFYR.exe File opened for modification C:\windows\system\IYQ.exe XFNISC.exe File created C:\windows\WNKG.exe YPYDIM.exe File created C:\windows\system\STAUVZ.exe.bat KOVOKBG.exe File created C:\windows\system\MCFM.exe.bat AMYMUXQ.exe File opened for modification C:\windows\system\RGHXYX.exe GOAMGW.exe File opened for modification C:\windows\DZKQYEN.exe RGHXYX.exe File created C:\windows\system\OHZ.exe LZTZU.exe File created C:\windows\XCERJM.exe.bat GPTZC.exe File created C:\windows\HUUWAI.exe.bat VENOOXQ.exe File opened for modification C:\windows\system\XFNISC.exe BCF.exe File opened for modification C:\windows\system\FGMMW.exe KVWVI.exe File created C:\windows\system\IYQ.exe.bat XFNISC.exe File opened for modification C:\windows\IPOLEE.exe XWLAV.exe File opened for modification C:\windows\system\OHZ.exe LZTZU.exe File created C:\windows\DRZH.exe.bat BWH.exe File created C:\windows\system\WFS.exe PPRQ.exe File created C:\windows\system\OBJMQ.exe.bat GVXYGC.exe File created C:\windows\system\BSLINW.exe XKE.exe File opened for modification C:\windows\system\LQXJQCQ.exe DNOW.exe File opened for modification C:\windows\system\ARVCTC.exe LWE.exe File created C:\windows\WPQK.exe.bat OJME.exe File created C:\windows\ATMXZQ.exe OBJMQ.exe File created C:\windows\HMZWU.exe RWYXNM.exe File created C:\windows\system\DNOW.exe IPOLEE.exe File created C:\windows\IXLDTXF.exe CKMCOU.exe File created C:\windows\XHFCD.exe KFXEPPM.exe File created C:\windows\WPQK.exe OJME.exe File created C:\windows\SXYAJV.exe ATVE.exe File opened for modification C:\windows\system\GHHZPF.exe SXYAJV.exe File opened for modification C:\windows\system\YONK.exe AEKCK.exe File created C:\windows\system\DJTF.exe ATMXZQ.exe File created C:\windows\system\WFS.exe.bat PPRQ.exe File opened for modification C:\windows\system\GKDZQXQ.exe EMYNJPH.exe File created C:\windows\MYVICI.exe.bat AFSPCBZ.exe File created C:\windows\system\IUA.exe.bat SJXY.exe File opened for modification C:\windows\system\AFSPCBZ.exe OUICT.exe File created C:\windows\system\ATVE.exe ATGZ.exe File opened for modification C:\windows\UTBISLJ.exe QLNI.exe File created C:\windows\ZPG.exe.bat HUUWAI.exe File created C:\windows\system\STAUVZ.exe KOVOKBG.exe File opened for modification C:\windows\GPTZC.exe SRTOSDB.exe File opened for modification C:\windows\CKMCOU.exe UWANDVU.exe File created C:\windows\system\OHZ.exe.bat LZTZU.exe File created C:\windows\system\CGL.exe.bat HALAS.exe File created C:\windows\MYVICI.exe AFSPCBZ.exe File created C:\windows\system\BWH.exe.bat NYHUQ.exe File opened for modification C:\windows\system\TVMEDT.exe PNFEZIH.exe File created C:\windows\OJME.exe EJKYTM.exe File created C:\windows\CKMCOU.exe UWANDVU.exe File created C:\windows\system\OBJMQ.exe GVXYGC.exe File opened for modification C:\windows\DCUU.exe FRREP.exe File created C:\windows\SRTOSDB.exe.bat QWCMGK.exe File created C:\windows\VENOOXQ.exe KMGD.exe File created C:\windows\system\NYHUQ.exe.bat TLD.exe File created C:\windows\system\PNFEZIH.exe YEDRND.exe File created C:\windows\system\LWE.exe STAUVZ.exe File created C:\windows\system\AMYMUXQ.exe SGTGKZU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 4324 3680 WerFault.exe 81 1464 3728 WerFault.exe 86 2204 2152 WerFault.exe 92 2404 2028 WerFault.exe 97 840 1736 WerFault.exe 102 2784 4116 WerFault.exe 107 2128 1952 WerFault.exe 112 2560 1556 WerFault.exe 117 732 5060 WerFault.exe 122 540 4512 WerFault.exe 127 4968 3044 WerFault.exe 134 3932 5084 WerFault.exe 139 416 4536 WerFault.exe 146 4024 3020 WerFault.exe 151 4988 976 WerFault.exe 156 2864 1128 WerFault.exe 162 3272 3764 WerFault.exe 167 4756 1380 WerFault.exe 172 3120 1692 WerFault.exe 177 1168 2340 WerFault.exe 184 2260 5076 WerFault.exe 189 4672 1288 WerFault.exe 194 2564 4052 WerFault.exe 199 2312 3008 WerFault.exe 204 2244 4092 WerFault.exe 209 2028 3612 WerFault.exe 214 3704 4396 WerFault.exe 219 4900 3540 WerFault.exe 224 4436 5064 WerFault.exe 229 2376 4508 WerFault.exe 234 1072 4672 WerFault.exe 239 2952 2560 WerFault.exe 244 4556 2600 WerFault.exe 249 3164 2068 WerFault.exe 254 4132 4196 WerFault.exe 259 4420 5100 WerFault.exe 264 3896 3488 WerFault.exe 270 4460 5048 WerFault.exe 275 1900 4188 WerFault.exe 280 2736 5056 WerFault.exe 285 2448 4984 WerFault.exe 290 3784 1992 WerFault.exe 296 3324 4292 WerFault.exe 301 5044 4196 WerFault.exe 306 4164 1068 WerFault.exe 311 2348 1800 WerFault.exe 316 3524 1556 WerFault.exe 321 2600 4924 WerFault.exe 326 4440 1128 WerFault.exe 331 1360 4756 WerFault.exe 336 2024 4116 WerFault.exe 341 3016 372 WerFault.exe 346 1848 2760 WerFault.exe 351 4460 3000 WerFault.exe 356 4556 704 WerFault.exe 361 4532 1352 WerFault.exe 366 4324 1356 WerFault.exe 371 4328 2448 WerFault.exe 376 4496 1212 WerFault.exe 381 4140 3848 WerFault.exe 386 2404 4584 WerFault.exe 391 3664 4540 WerFault.exe 396 2312 2672 WerFault.exe 401 3320 4892 WerFault.exe 406 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LWE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DJTF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZQTZJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VZFGO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TXMDLCP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YBWP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TVMEDT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ONHNZKN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CJCXWBL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OBJMQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OOTS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JBMA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KLMKL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYVICI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DRZH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EMYNJPH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VTSY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IBYCSC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WZGNU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AVCAW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PINCIP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GGLMWEY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AXTK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FDRP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HEP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LENI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ATGZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QLNI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WPQK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ARVCTC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KTP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZJQMSK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CKMCOU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TKSBVX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NOSX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NDCS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3680 5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe 3680 5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe 3728 LENI.exe 3728 LENI.exe 2152 HEP.exe 2152 HEP.exe 2028 AXTK.exe 2028 AXTK.exe 1736 PNU.exe 1736 PNU.exe 4116 RLZWYEY.exe 4116 RLZWYEY.exe 1952 QWCMGK.exe 1952 QWCMGK.exe 1556 SRTOSDB.exe 1556 SRTOSDB.exe 5060 GPTZC.exe 5060 GPTZC.exe 4512 XCERJM.exe 4512 XCERJM.exe 3044 DXQ.exe 3044 DXQ.exe 5084 DDQ.exe 5084 DDQ.exe 4536 IIIWPIM.exe 4536 IIIWPIM.exe 3020 EJKYTM.exe 3020 EJKYTM.exe 976 OJME.exe 976 OJME.exe 1128 WPQK.exe 1128 WPQK.exe 3764 RZHJVTO.exe 3764 RZHJVTO.exe 1380 TXMDLCP.exe 1380 TXMDLCP.exe 1692 ODUPM.exe 1692 ODUPM.exe 2340 AVCAW.exe 2340 AVCAW.exe 5076 KTP.exe 5076 KTP.exe 1288 ZJQMSK.exe 1288 ZJQMSK.exe 4052 UWANDVU.exe 4052 UWANDVU.exe 3008 CKMCOU.exe 3008 CKMCOU.exe 4092 IXLDTXF.exe 4092 IXLDTXF.exe 3612 GVXYGC.exe 3612 GVXYGC.exe 4396 OBJMQ.exe 4396 OBJMQ.exe 3540 ATMXZQ.exe 3540 ATMXZQ.exe 5064 DJTF.exe 5064 DJTF.exe 4508 SEFYR.exe 4508 SEFYR.exe 4672 NNZO.exe 4672 NNZO.exe 2560 XKE.exe 2560 XKE.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3680 5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe 3680 5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe 3728 LENI.exe 3728 LENI.exe 2152 HEP.exe 2152 HEP.exe 2028 AXTK.exe 2028 AXTK.exe 1736 PNU.exe 1736 PNU.exe 4116 RLZWYEY.exe 4116 RLZWYEY.exe 1952 QWCMGK.exe 1952 QWCMGK.exe 1556 SRTOSDB.exe 1556 SRTOSDB.exe 5060 GPTZC.exe 5060 GPTZC.exe 4512 XCERJM.exe 4512 XCERJM.exe 3044 DXQ.exe 3044 DXQ.exe 5084 DDQ.exe 5084 DDQ.exe 4536 IIIWPIM.exe 4536 IIIWPIM.exe 3020 EJKYTM.exe 3020 EJKYTM.exe 976 OJME.exe 976 OJME.exe 1128 WPQK.exe 1128 WPQK.exe 3764 RZHJVTO.exe 3764 RZHJVTO.exe 1380 TXMDLCP.exe 1380 TXMDLCP.exe 1692 ODUPM.exe 1692 ODUPM.exe 2340 AVCAW.exe 2340 AVCAW.exe 5076 KTP.exe 5076 KTP.exe 1288 ZJQMSK.exe 1288 ZJQMSK.exe 4052 UWANDVU.exe 4052 UWANDVU.exe 3008 CKMCOU.exe 3008 CKMCOU.exe 4092 IXLDTXF.exe 4092 IXLDTXF.exe 3612 GVXYGC.exe 3612 GVXYGC.exe 4396 OBJMQ.exe 4396 OBJMQ.exe 3540 ATMXZQ.exe 3540 ATMXZQ.exe 5064 DJTF.exe 5064 DJTF.exe 4508 SEFYR.exe 4508 SEFYR.exe 4672 NNZO.exe 4672 NNZO.exe 2560 XKE.exe 2560 XKE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3680 wrote to memory of 748 3680 5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe 82 PID 3680 wrote to memory of 748 3680 5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe 82 PID 3680 wrote to memory of 748 3680 5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe 82 PID 748 wrote to memory of 3728 748 cmd.exe 86 PID 748 wrote to memory of 3728 748 cmd.exe 86 PID 748 wrote to memory of 3728 748 cmd.exe 86 PID 3728 wrote to memory of 3568 3728 LENI.exe 88 PID 3728 wrote to memory of 3568 3728 LENI.exe 88 PID 3728 wrote to memory of 3568 3728 LENI.exe 88 PID 3568 wrote to memory of 2152 3568 cmd.exe 92 PID 3568 wrote to memory of 2152 3568 cmd.exe 92 PID 3568 wrote to memory of 2152 3568 cmd.exe 92 PID 2152 wrote to memory of 4216 2152 HEP.exe 93 PID 2152 wrote to memory of 4216 2152 HEP.exe 93 PID 2152 wrote to memory of 4216 2152 HEP.exe 93 PID 4216 wrote to memory of 2028 4216 cmd.exe 97 PID 4216 wrote to memory of 2028 4216 cmd.exe 97 PID 4216 wrote to memory of 2028 4216 cmd.exe 97 PID 2028 wrote to memory of 3468 2028 AXTK.exe 98 PID 2028 wrote to memory of 3468 2028 AXTK.exe 98 PID 2028 wrote to memory of 3468 2028 AXTK.exe 98 PID 3468 wrote to memory of 1736 3468 cmd.exe 102 PID 3468 wrote to memory of 1736 3468 cmd.exe 102 PID 3468 wrote to memory of 1736 3468 cmd.exe 102 PID 1736 wrote to memory of 2780 1736 PNU.exe 103 PID 1736 wrote to memory of 2780 1736 PNU.exe 103 PID 1736 wrote to memory of 2780 1736 PNU.exe 103 PID 2780 wrote to memory of 4116 2780 cmd.exe 107 PID 2780 wrote to memory of 4116 2780 cmd.exe 107 PID 2780 wrote to memory of 4116 2780 cmd.exe 107 PID 4116 wrote to memory of 2764 4116 RLZWYEY.exe 108 PID 4116 wrote to memory of 2764 4116 RLZWYEY.exe 108 PID 4116 wrote to memory of 2764 4116 RLZWYEY.exe 108 PID 2764 wrote to memory of 1952 2764 cmd.exe 112 PID 2764 wrote to memory of 1952 2764 cmd.exe 112 PID 2764 wrote to memory of 1952 2764 cmd.exe 112 PID 1952 wrote to memory of 1056 1952 QWCMGK.exe 113 PID 1952 wrote to memory of 1056 1952 QWCMGK.exe 113 PID 1952 wrote to memory of 1056 1952 QWCMGK.exe 113 PID 1056 wrote to memory of 1556 1056 cmd.exe 117 PID 1056 wrote to memory of 1556 1056 cmd.exe 117 PID 1056 wrote to memory of 1556 1056 cmd.exe 117 PID 1556 wrote to memory of 5040 1556 SRTOSDB.exe 118 PID 1556 wrote to memory of 5040 1556 SRTOSDB.exe 118 PID 1556 wrote to memory of 5040 1556 SRTOSDB.exe 118 PID 5040 wrote to memory of 5060 5040 cmd.exe 122 PID 5040 wrote to memory of 5060 5040 cmd.exe 122 PID 5040 wrote to memory of 5060 5040 cmd.exe 122 PID 5060 wrote to memory of 2696 5060 GPTZC.exe 123 PID 5060 wrote to memory of 2696 5060 GPTZC.exe 123 PID 5060 wrote to memory of 2696 5060 GPTZC.exe 123 PID 2696 wrote to memory of 4512 2696 cmd.exe 127 PID 2696 wrote to memory of 4512 2696 cmd.exe 127 PID 2696 wrote to memory of 4512 2696 cmd.exe 127 PID 4512 wrote to memory of 648 4512 XCERJM.exe 130 PID 4512 wrote to memory of 648 4512 XCERJM.exe 130 PID 4512 wrote to memory of 648 4512 XCERJM.exe 130 PID 648 wrote to memory of 3044 648 cmd.exe 134 PID 648 wrote to memory of 3044 648 cmd.exe 134 PID 648 wrote to memory of 3044 648 cmd.exe 134 PID 3044 wrote to memory of 4896 3044 DXQ.exe 135 PID 3044 wrote to memory of 4896 3044 DXQ.exe 135 PID 3044 wrote to memory of 4896 3044 DXQ.exe 135 PID 4896 wrote to memory of 5084 4896 cmd.exe 139
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe"C:\Users\Admin\AppData\Local\Temp\5e0353ae94d6464c1a5233d8cf40e783afe8bf50c80ef66f8db14919f503593dN.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\LENI.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:748 -
C:\windows\system\LENI.exeC:\windows\system\LENI.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HEP.exe.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\windows\SysWOW64\HEP.exeC:\windows\system32\HEP.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AXTK.exe.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\windows\system\AXTK.exeC:\windows\system\AXTK.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\PNU.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\windows\system\PNU.exeC:\windows\system\PNU.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RLZWYEY.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\windows\RLZWYEY.exeC:\windows\RLZWYEY.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QWCMGK.exe.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\windows\SysWOW64\QWCMGK.exeC:\windows\system32\QWCMGK.exe13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SRTOSDB.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\windows\SRTOSDB.exeC:\windows\SRTOSDB.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\GPTZC.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\windows\GPTZC.exeC:\windows\GPTZC.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XCERJM.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\windows\XCERJM.exeC:\windows\XCERJM.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DXQ.exe.bat" "20⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\windows\system\DXQ.exeC:\windows\system\DXQ.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DDQ.exe.bat" "22⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\windows\DDQ.exeC:\windows\DDQ.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5084 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\IIIWPIM.exe.bat" "24⤵PID:2340
-
C:\windows\system\IIIWPIM.exeC:\windows\system\IIIWPIM.exe25⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\EJKYTM.exe.bat" "26⤵PID:3432
-
C:\windows\EJKYTM.exeC:\windows\EJKYTM.exe27⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\OJME.exe.bat" "28⤵PID:2936
-
C:\windows\OJME.exeC:\windows\OJME.exe29⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\WPQK.exe.bat" "30⤵PID:1656
-
C:\windows\WPQK.exeC:\windows\WPQK.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RZHJVTO.exe.bat" "32⤵
- System Location Discovery: System Language Discovery
PID:2636 -
C:\windows\system\RZHJVTO.exeC:\windows\system\RZHJVTO.exe33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TXMDLCP.exe.bat" "34⤵PID:3416
-
C:\windows\TXMDLCP.exeC:\windows\TXMDLCP.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ODUPM.exe.bat" "36⤵PID:648
-
C:\windows\SysWOW64\ODUPM.exeC:\windows\system32\ODUPM.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AVCAW.exe.bat" "38⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\windows\SysWOW64\AVCAW.exeC:\windows\system32\AVCAW.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KTP.exe.bat" "40⤵PID:3164
-
C:\windows\SysWOW64\KTP.exeC:\windows\system32\KTP.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZJQMSK.exe.bat" "42⤵
- System Location Discovery: System Language Discovery
PID:5064 -
C:\windows\system\ZJQMSK.exeC:\windows\system\ZJQMSK.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\UWANDVU.exe.bat" "44⤵PID:4612
-
C:\windows\system\UWANDVU.exeC:\windows\system\UWANDVU.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CKMCOU.exe.bat" "46⤵PID:2784
-
C:\windows\CKMCOU.exeC:\windows\CKMCOU.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\IXLDTXF.exe.bat" "48⤵PID:4316
-
C:\windows\IXLDTXF.exeC:\windows\IXLDTXF.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4092 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GVXYGC.exe.bat" "50⤵PID:648
-
C:\windows\system\GVXYGC.exeC:\windows\system\GVXYGC.exe51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\OBJMQ.exe.bat" "52⤵
- System Location Discovery: System Language Discovery
PID:4752 -
C:\windows\system\OBJMQ.exeC:\windows\system\OBJMQ.exe53⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ATMXZQ.exe.bat" "54⤵PID:1692
-
C:\windows\ATMXZQ.exeC:\windows\ATMXZQ.exe55⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\DJTF.exe.bat" "56⤵PID:4844
-
C:\windows\system\DJTF.exeC:\windows\system\DJTF.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\SEFYR.exe.bat" "58⤵
- System Location Discovery: System Language Discovery
PID:1212 -
C:\windows\SysWOW64\SEFYR.exeC:\windows\system32\SEFYR.exe59⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NNZO.exe.bat" "60⤵PID:3516
-
C:\windows\NNZO.exeC:\windows\NNZO.exe61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XKE.exe.bat" "62⤵PID:2568
-
C:\windows\SysWOW64\XKE.exeC:\windows\system32\XKE.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BSLINW.exe.bat" "64⤵
- System Location Discovery: System Language Discovery
PID:4316 -
C:\windows\system\BSLINW.exeC:\windows\system\BSLINW.exe65⤵
- Executes dropped EXE
PID:2600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LBNNRUW.exe.bat" "66⤵PID:2228
-
C:\windows\SysWOW64\LBNNRUW.exeC:\windows\system32\LBNNRUW.exe67⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NOSX.exe.bat" "68⤵PID:4464
-
C:\windows\SysWOW64\NOSX.exeC:\windows\system32\NOSX.exe69⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\RWYXNM.exe.bat" "70⤵PID:1252
-
C:\windows\RWYXNM.exeC:\windows\RWYXNM.exe71⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:5100 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HMZWU.exe.bat" "72⤵PID:4844
-
C:\windows\HMZWU.exeC:\windows\HMZWU.exe73⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JKNQ.exe.bat" "74⤵
- System Location Discovery: System Language Discovery
PID:3000 -
C:\windows\SysWOW64\JKNQ.exeC:\windows\system32\JKNQ.exe75⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JNRMHG.exe.bat" "76⤵PID:3416
-
C:\windows\SysWOW64\JNRMHG.exeC:\windows\system32\JNRMHG.exe77⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4188 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\HNZ.exe.bat" "78⤵PID:4560
-
C:\windows\SysWOW64\HNZ.exeC:\windows\system32\HNZ.exe79⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GYBQHOD.exe.bat" "80⤵PID:3592
-
C:\windows\SysWOW64\GYBQHOD.exeC:\windows\system32\GYBQHOD.exe81⤵
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ATGZ.exe.bat" "82⤵PID:4832
-
C:\windows\ATGZ.exeC:\windows\ATGZ.exe83⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ATVE.exe.bat" "84⤵
- System Location Discovery: System Language Discovery
PID:2244 -
C:\windows\system\ATVE.exeC:\windows\system\ATVE.exe85⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SXYAJV.exe.bat" "86⤵PID:2208
-
C:\windows\SXYAJV.exeC:\windows\SXYAJV.exe87⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GHHZPF.exe.bat" "88⤵PID:1580
-
C:\windows\system\GHHZPF.exeC:\windows\system\GHHZPF.exe89⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ONHNZKN.exe.bat" "90⤵
- System Location Discovery: System Language Discovery
PID:4140 -
C:\windows\SysWOW64\ONHNZKN.exeC:\windows\system32\ONHNZKN.exe91⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\QLNI.exe.bat" "92⤵PID:2376
-
C:\windows\SysWOW64\QLNI.exeC:\windows\system32\QLNI.exe93⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\UTBISLJ.exe.bat" "94⤵PID:4124
-
C:\windows\UTBISLJ.exeC:\windows\UTBISLJ.exe95⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WOY.exe.bat" "96⤵PID:4304
-
C:\windows\SysWOW64\WOY.exeC:\windows\system32\WOY.exe97⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KMGD.exe.bat" "98⤵PID:2816
-
C:\windows\SysWOW64\KMGD.exeC:\windows\system32\KMGD.exe99⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VENOOXQ.exe.bat" "100⤵PID:2244
-
C:\windows\VENOOXQ.exeC:\windows\VENOOXQ.exe101⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4116 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\HUUWAI.exe.bat" "102⤵PID:2272
-
C:\windows\HUUWAI.exeC:\windows\HUUWAI.exe103⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZPG.exe.bat" "104⤵PID:4564
-
C:\windows\ZPG.exeC:\windows\ZPG.exe105⤵
- Executes dropped EXE
PID:2760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RYAXR.exe.bat" "106⤵
- System Location Discovery: System Language Discovery
PID:4816 -
C:\windows\system\RYAXR.exeC:\windows\system\RYAXR.exe107⤵
- Executes dropped EXE
PID:3000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\JBMA.exe.bat" "108⤵PID:2376
-
C:\windows\system\JBMA.exeC:\windows\system\JBMA.exe109⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:704 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\BGWS.exe.bat" "110⤵PID:2500
-
C:\windows\system\BGWS.exeC:\windows\system\BGWS.exe111⤵
- Checks computer location settings
- Executes dropped EXE
PID:1352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\ZZZ.exe.bat" "112⤵PID:4004
-
C:\windows\SysWOW64\ZZZ.exeC:\windows\system32\ZZZ.exe113⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XZHWEY.exe.bat" "114⤵PID:2092
-
C:\windows\SysWOW64\XZHWEY.exeC:\windows\system32\XZHWEY.exe115⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BCF.exe.bat" "116⤵PID:1168
-
C:\windows\SysWOW64\BCF.exeC:\windows\system32\BCF.exe117⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\XFNISC.exe.bat" "118⤵PID:4756
-
C:\windows\system\XFNISC.exeC:\windows\system\XFNISC.exe119⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3848 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\IYQ.exe.bat" "120⤵PID:1668
-
C:\windows\system\IYQ.exeC:\windows\system\IYQ.exe121⤵
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\KVWVI.exe.bat" "122⤵PID:4816
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-