Analysis
-
max time kernel
119s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe
Resource
win10v2004-20241007-en
General
-
Target
d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe
-
Size
448KB
-
MD5
e70b4bd8c73fc31e45b70f3fdc25fbc0
-
SHA1
014ad88900db361d35521dff1d0ae4bda7ed1ac1
-
SHA256
d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121
-
SHA512
b8694b316874c8f231fc3be4f95589aa3f15d3a9c2309b4b21c4b10aa2cab49b6f845ee57bce184e8d18d8064a456ca27b59c43bc7608968abbbe66bbfa990ad
-
SSDEEP
6144:AsOYejV06KkoVeJkslx4tkkT/ay++Jpm1QGg2kEjiPISUOgW9X+hOGzC/NM:3OYe+zi2tfpgNkmZzcukG2/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JAXQFX.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RKDRNV.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation DQT.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation VOT.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation QKGODW.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RSH.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation PKLYAOH.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CPLV.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JQGPDOL.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation MECDEX.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JQEQGZ.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation YMKNNEC.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation LCWO.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation GZNY.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation YULRGVW.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation MFYVIA.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation YASCXZK.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation VTYCIP.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation QYZ.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation XXOBTZD.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ZEKM.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HVZ.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation KGYWM.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation VMEIHVH.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation FKSDX.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation BGWS.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation BEY.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation JFY.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation FYS.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation QMAITJU.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation XFWHPB.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation VCRNMGK.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ILB.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation EIF.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation FWGC.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation LYLCM.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation GIVAXX.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ROI.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation QYSIVTW.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation RZHJVTO.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WBIPL.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation GBXMHP.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation BSXFM.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation YTO.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation IKC.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation YECC.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation MDRUBOP.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HNC.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation XHPB.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ZVNVQ.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation SLRR.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation GAERL.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation YVZKGH.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CPJWXZ.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation TPNIG.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation CPHI.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation GSWTYDX.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation BEEBOA.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation FPXKH.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation TJE.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HTI.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ISFRF.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation LXXCZPD.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation XGUTTR.exe -
Executes dropped EXE 64 IoCs
pid Process 3916 XJZAW.exe 3756 RXKQC.exe 4648 ZKXX.exe 3908 OAKOD.exe 1744 JLSNR.exe 4480 MECDEX.exe 3184 VMEIHVH.exe 4268 FKSDX.exe 1660 ISFRF.exe 1784 TLIKNY.exe 1920 WTDRDE.exe 1080 ROI.exe 2028 WOWDBT.exe 4372 LXXCZPD.exe 4916 CFLZ.exe 3164 MDRUBOP.exe 5028 CTEL.exe 3008 YTO.exe 1056 AHMEK.exe 4456 VCRNMGK.exe 2028 CIYJS.exe 5068 MFYVIA.exe 3756 SLRR.exe 1784 RWU.exe 1912 NCGKR.exe 1332 NEWYFG.exe 3652 JKR.exe 4456 YASCXZK.exe 4032 ILB.exe 1612 QYSIVTW.exe 2488 CPHI.exe 3740 DETJ.exe 4060 EIF.exe 2988 TYTE.exe 4460 ZTKFLI.exe 3872 VZR.exe 2480 GRMUNGS.exe 1680 RZHJVTO.exe 4152 CSK.exe 4024 DVAP.exe 4840 JQEQGZ.exe 2384 WBIPL.exe 4540 FMGD.exe 1908 PKLYAOH.exe 4172 LPYB.exe 3212 JQGPDOL.exe 4008 GBXMHP.exe 3720 BOC.exe 3828 MEX.exe 4828 GRUUK.exe 4956 FCR.exe 1324 GFVFH.exe 3672 BLHJSPI.exe 2288 KLJOW.exe 1576 FWGC.exe 4020 XRK.exe 4224 AHFMJO.exe 4912 XND.exe 4768 NNGOHC.exe 2384 VTYCIP.exe 996 LBBOZTG.exe 972 YMKNNEC.exe 1076 GSWTYDX.exe 3452 JAXQFX.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\windows\SysWOW64\ZWADP.exe.bat VOT.exe File created C:\windows\SysWOW64\NJCHC.exe DQT.exe File created C:\windows\SysWOW64\HVZ.exe.bat TPNIG.exe File created C:\windows\SysWOW64\WBIPL.exe JQEQGZ.exe File created C:\windows\SysWOW64\BOC.exe.bat GBXMHP.exe File created C:\windows\SysWOW64\XND.exe AHFMJO.exe File created C:\windows\SysWOW64\LBBOZTG.exe VTYCIP.exe File created C:\windows\SysWOW64\LBBOZTG.exe.bat VTYCIP.exe File created C:\windows\SysWOW64\GAERL.exe.bat RKDRNV.exe File created C:\windows\SysWOW64\HVZ.exe TPNIG.exe File created C:\windows\SysWOW64\EBMKG.exe.bat MJCCUX.exe File created C:\windows\SysWOW64\NCGKR.exe RWU.exe File created C:\windows\SysWOW64\MCQQX.exe NZTNFD.exe File opened for modification C:\windows\SysWOW64\QGGKVOA.exe KGYWM.exe File created C:\windows\SysWOW64\LCWO.exe.bat BEEBOA.exe File opened for modification C:\windows\SysWOW64\BLHJSPI.exe GFVFH.exe File created C:\windows\SysWOW64\SMZ.exe.bat BEY.exe File created C:\windows\SysWOW64\CSK.exe.bat RZHJVTO.exe File created C:\windows\SysWOW64\GFVFH.exe FCR.exe File created C:\windows\SysWOW64\FWGC.exe KLJOW.exe File created C:\windows\SysWOW64\GSWTYDX.exe.bat YMKNNEC.exe File opened for modification C:\windows\SysWOW64\HNC.exe FPXKH.exe File created C:\windows\SysWOW64\DETJ.exe.bat CPHI.exe File created C:\windows\SysWOW64\SMZ.exe BEY.exe File created C:\windows\SysWOW64\ZHGYIR.exe.bat YECC.exe File created C:\windows\SysWOW64\EIF.exe DETJ.exe File created C:\windows\SysWOW64\CFLZ.exe.bat LXXCZPD.exe File opened for modification C:\windows\SysWOW64\CPHI.exe QYSIVTW.exe File created C:\windows\SysWOW64\PKLYAOH.exe.bat FMGD.exe File created C:\windows\SysWOW64\BLHJSPI.exe.bat GFVFH.exe File created C:\windows\SysWOW64\VTYCIP.exe.bat NNGOHC.exe File created C:\windows\SysWOW64\FPXKH.exe SMZ.exe File created C:\windows\SysWOW64\EBMKG.exe MJCCUX.exe File created C:\windows\SysWOW64\WOWDBT.exe.bat ROI.exe File created C:\windows\SysWOW64\BLHJSPI.exe GFVFH.exe File created C:\windows\SysWOW64\HKIB.exe QKGODW.exe File opened for modification C:\windows\SysWOW64\GFVFH.exe FCR.exe File created C:\windows\SysWOW64\CSK.exe RZHJVTO.exe File opened for modification C:\windows\SysWOW64\JQEQGZ.exe DVAP.exe File created C:\windows\SysWOW64\FWGC.exe.bat KLJOW.exe File opened for modification C:\windows\SysWOW64\YMKNNEC.exe LBBOZTG.exe File created C:\windows\SysWOW64\YMKNNEC.exe.bat LBBOZTG.exe File opened for modification C:\windows\SysWOW64\VOT.exe HTI.exe File created C:\windows\SysWOW64\MDRUBOP.exe CFLZ.exe File opened for modification C:\windows\SysWOW64\WBIPL.exe JQEQGZ.exe File created C:\windows\SysWOW64\NNGOHC.exe.bat XND.exe File created C:\windows\SysWOW64\GSWTYDX.exe YMKNNEC.exe File opened for modification C:\windows\SysWOW64\XGUTTR.exe NJCHC.exe File created C:\windows\SysWOW64\JFY.exe ZHGYIR.exe File created C:\windows\SysWOW64\UAOFHG.exe RSH.exe File opened for modification C:\windows\SysWOW64\UAOFHG.exe RSH.exe File created C:\windows\SysWOW64\JLSNR.exe OAKOD.exe File created C:\windows\SysWOW64\AHMEK.exe.bat YTO.exe File opened for modification C:\windows\SysWOW64\EIF.exe DETJ.exe File created C:\windows\SysWOW64\WOWDBT.exe ROI.exe File created C:\windows\SysWOW64\PKLYAOH.exe FMGD.exe File opened for modification C:\windows\SysWOW64\KLJOW.exe BLHJSPI.exe File opened for modification C:\windows\SysWOW64\FPXKH.exe SMZ.exe File created C:\windows\SysWOW64\VOT.exe.bat HTI.exe File created C:\windows\SysWOW64\OAKOD.exe ZKXX.exe File opened for modification C:\windows\SysWOW64\GSWTYDX.exe YMKNNEC.exe File created C:\windows\SysWOW64\HNC.exe.bat FPXKH.exe File created C:\windows\SysWOW64\XGUTTR.exe NJCHC.exe File created C:\windows\SysWOW64\JFY.exe.bat ZHGYIR.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\windows\VGSNXPW.exe.bat TJE.exe File created C:\windows\GZNY.exe.bat VGSNXPW.exe File created C:\windows\system\HTI.exe.bat TIZ.exe File created C:\windows\CPJWXZ.exe NUA.exe File opened for modification C:\windows\system\YASCXZK.exe JKR.exe File created C:\windows\system\AHFMJO.exe.bat XRK.exe File created C:\windows\system\ECSVBX.exe.bat MCQQX.exe File opened for modification C:\windows\system\BGWS.exe GIVAXX.exe File opened for modification C:\windows\system\XQLLPS.exe ECSVBX.exe File created C:\windows\system\FYS.exe CPJWXZ.exe File created C:\windows\VMEIHVH.exe MECDEX.exe File created C:\windows\system\GBXMHP.exe.bat JQGPDOL.exe File opened for modification C:\windows\XRK.exe FWGC.exe File created C:\windows\JKR.exe.bat NEWYFG.exe File created C:\windows\YVZKGH.exe JFY.exe File opened for modification C:\windows\YVZKGH.exe JFY.exe File opened for modification C:\windows\TVF.exe HKIB.exe File created C:\windows\system\BEEBOA.exe BGWS.exe File created C:\windows\system\RKDRNV.exe.bat HNC.exe File created C:\windows\YBWP.exe.bat FYS.exe File opened for modification C:\windows\system\BONYD.exe YBWP.exe File created C:\windows\system\GRMUNGS.exe.bat VZR.exe File created C:\windows\system\AHFMJO.exe XRK.exe File created C:\windows\system\IKC.exe WSHMCLF.exe File created C:\windows\system\RXKQC.exe XJZAW.exe File created C:\windows\system\ZKXX.exe RXKQC.exe File created C:\windows\ZTKFLI.exe.bat TYTE.exe File created C:\windows\YULRGVW.exe.bat QGGKVOA.exe File created C:\windows\ROI.exe.bat WTDRDE.exe File created C:\windows\system\MFYVIA.exe CIYJS.exe File created C:\windows\system\KGYWM.exe.bat YIKE.exe File opened for modification C:\windows\TIZ.exe XHPB.exe File created C:\windows\YBWP.exe FYS.exe File opened for modification C:\windows\ZCARQF.exe ZWADP.exe File opened for modification C:\windows\YIKE.exe HVZ.exe File created C:\windows\system\MFYVIA.exe.bat CIYJS.exe File created C:\windows\LPYB.exe.bat PKLYAOH.exe File created C:\windows\HDUFA.exe GAERL.exe File created C:\windows\LYLCM.exe.bat JAXQFX.exe File created C:\windows\system\FKSDX.exe.bat VMEIHVH.exe File opened for modification C:\windows\system\MEX.exe BOC.exe File created C:\windows\XRK.exe.bat FWGC.exe File opened for modification C:\windows\system\RKDRNV.exe HNC.exe File created C:\windows\ISFRF.exe FKSDX.exe File created C:\windows\system\GRUUK.exe MEX.exe File created C:\windows\system\PNVYBX.exe BSXFM.exe File created C:\windows\SLRR.exe MFYVIA.exe File created C:\windows\system\KGYWM.exe YIKE.exe File created C:\windows\ZTKFLI.exe TYTE.exe File created C:\windows\FMGD.exe WBIPL.exe File opened for modification C:\windows\ISFRF.exe FKSDX.exe File created C:\windows\system\RWU.exe.bat SLRR.exe File created C:\windows\YVZKGH.exe.bat JFY.exe File created C:\windows\XFWHPB.exe YULRGVW.exe File opened for modification C:\windows\system\ZKXX.exe RXKQC.exe File created C:\windows\system\FCR.exe GRUUK.exe File opened for modification C:\windows\WSHMCLF.exe XXOBTZD.exe File opened for modification C:\windows\system\PNVYBX.exe BSXFM.exe File opened for modification C:\windows\system\HTI.exe TIZ.exe File created C:\windows\MJCCUX.exe UAOFHG.exe File opened for modification C:\windows\system\FKSDX.exe VMEIHVH.exe File opened for modification C:\windows\system\TLIKNY.exe ISFRF.exe File created C:\windows\system\XXOBTZD.exe CBKSI.exe File opened for modification C:\windows\system\KGYWM.exe YIKE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 680 348 WerFault.exe 82 5036 3916 WerFault.exe 90 368 3756 WerFault.exe 96 3740 4648 WerFault.exe 101 3368 3908 WerFault.exe 106 4412 1744 WerFault.exe 111 4432 4480 WerFault.exe 116 4408 3184 WerFault.exe 121 2432 4268 WerFault.exe 126 1128 1660 WerFault.exe 131 2080 1784 WerFault.exe 136 1508 1920 WerFault.exe 141 4568 1080 WerFault.exe 146 1292 2028 WerFault.exe 151 2820 4372 WerFault.exe 158 2156 4916 WerFault.exe 165 4736 3164 WerFault.exe 170 2304 5028 WerFault.exe 175 1920 3008 WerFault.exe 182 2864 1056 WerFault.exe 187 4932 4456 WerFault.exe 192 1500 2028 WerFault.exe 198 4052 5068 WerFault.exe 205 2432 3756 WerFault.exe 210 3784 1784 WerFault.exe 216 4804 1912 WerFault.exe 221 1484 1332 WerFault.exe 226 4064 3652 WerFault.exe 231 2544 4456 WerFault.exe 236 4208 4032 WerFault.exe 241 3208 1612 WerFault.exe 246 3556 2488 WerFault.exe 251 2864 3740 WerFault.exe 258 1200 4060 WerFault.exe 263 3316 2988 WerFault.exe 268 1052 4460 WerFault.exe 273 3224 3872 WerFault.exe 278 908 2480 WerFault.exe 283 1520 1680 WerFault.exe 288 2672 4152 WerFault.exe 293 4608 4024 WerFault.exe 298 4372 4840 WerFault.exe 303 2544 2384 WerFault.exe 308 2156 4540 WerFault.exe 312 3624 1908 WerFault.exe 318 1560 4172 WerFault.exe 323 4968 3212 WerFault.exe 328 4020 4008 WerFault.exe 333 3372 3720 WerFault.exe 338 2492 3828 WerFault.exe 343 1160 4828 WerFault.exe 348 2644 4956 WerFault.exe 353 1620 1324 WerFault.exe 358 1920 3672 WerFault.exe 363 3744 2288 WerFault.exe 368 4132 1576 WerFault.exe 373 5036 4020 WerFault.exe 378 1896 4224 WerFault.exe 383 2988 4912 WerFault.exe 388 3912 4768 WerFault.exe 393 1712 2384 WerFault.exe 398 1168 996 WerFault.exe 403 3940 972 WerFault.exe 408 1856 1076 WerFault.exe 413 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ILB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LBBOZTG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QYZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WOWDBT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LXXCZPD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BEEBOA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CPLV.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WTDRDE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VZR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DVAP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LCWO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XBAFLW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XHPB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AHFMJO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MDRUBOP.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FMGD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BLHJSPI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ZHGYIR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TIZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YULRGVW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language YASCXZK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RSH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RZHJVTO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XRK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XXOBTZD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CIYJS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XFWHPB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IKC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QGGKVOA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CBKSI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HNC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 348 d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe 348 d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe 3916 XJZAW.exe 3916 XJZAW.exe 3756 RXKQC.exe 3756 RXKQC.exe 4648 ZKXX.exe 4648 ZKXX.exe 3908 OAKOD.exe 3908 OAKOD.exe 1744 JLSNR.exe 1744 JLSNR.exe 4480 MECDEX.exe 4480 MECDEX.exe 3184 VMEIHVH.exe 3184 VMEIHVH.exe 4268 FKSDX.exe 4268 FKSDX.exe 1660 ISFRF.exe 1660 ISFRF.exe 1784 TLIKNY.exe 1784 TLIKNY.exe 1920 WTDRDE.exe 1920 WTDRDE.exe 1080 ROI.exe 1080 ROI.exe 2028 WOWDBT.exe 2028 WOWDBT.exe 4372 LXXCZPD.exe 4372 LXXCZPD.exe 4916 CFLZ.exe 4916 CFLZ.exe 3164 MDRUBOP.exe 3164 MDRUBOP.exe 5028 CTEL.exe 5028 CTEL.exe 3008 YTO.exe 3008 YTO.exe 1056 AHMEK.exe 1056 AHMEK.exe 4456 VCRNMGK.exe 4456 VCRNMGK.exe 2028 CIYJS.exe 2028 CIYJS.exe 5068 MFYVIA.exe 5068 MFYVIA.exe 3756 SLRR.exe 3756 SLRR.exe 1784 RWU.exe 1784 RWU.exe 1912 NCGKR.exe 1912 NCGKR.exe 1332 NEWYFG.exe 1332 NEWYFG.exe 3652 JKR.exe 3652 JKR.exe 4456 YASCXZK.exe 4456 YASCXZK.exe 4032 ILB.exe 4032 ILB.exe 1612 QYSIVTW.exe 1612 QYSIVTW.exe 2488 CPHI.exe 2488 CPHI.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 348 d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe 348 d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe 3916 XJZAW.exe 3916 XJZAW.exe 3756 RXKQC.exe 3756 RXKQC.exe 4648 ZKXX.exe 4648 ZKXX.exe 3908 OAKOD.exe 3908 OAKOD.exe 1744 JLSNR.exe 1744 JLSNR.exe 4480 MECDEX.exe 4480 MECDEX.exe 3184 VMEIHVH.exe 3184 VMEIHVH.exe 4268 FKSDX.exe 4268 FKSDX.exe 1660 ISFRF.exe 1660 ISFRF.exe 1784 TLIKNY.exe 1784 TLIKNY.exe 1920 WTDRDE.exe 1920 WTDRDE.exe 1080 ROI.exe 1080 ROI.exe 2028 WOWDBT.exe 2028 WOWDBT.exe 4372 LXXCZPD.exe 4372 LXXCZPD.exe 4916 CFLZ.exe 4916 CFLZ.exe 3164 MDRUBOP.exe 3164 MDRUBOP.exe 5028 CTEL.exe 5028 CTEL.exe 3008 YTO.exe 3008 YTO.exe 1056 AHMEK.exe 1056 AHMEK.exe 4456 VCRNMGK.exe 4456 VCRNMGK.exe 2028 CIYJS.exe 2028 CIYJS.exe 5068 MFYVIA.exe 5068 MFYVIA.exe 3756 SLRR.exe 3756 SLRR.exe 1784 RWU.exe 1784 RWU.exe 1912 NCGKR.exe 1912 NCGKR.exe 1332 NEWYFG.exe 1332 NEWYFG.exe 3652 JKR.exe 3652 JKR.exe 4456 YASCXZK.exe 4456 YASCXZK.exe 4032 ILB.exe 4032 ILB.exe 1612 QYSIVTW.exe 1612 QYSIVTW.exe 2488 CPHI.exe 2488 CPHI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 348 wrote to memory of 4916 348 d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe 86 PID 348 wrote to memory of 4916 348 d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe 86 PID 348 wrote to memory of 4916 348 d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe 86 PID 4916 wrote to memory of 3916 4916 cmd.exe 90 PID 4916 wrote to memory of 3916 4916 cmd.exe 90 PID 4916 wrote to memory of 3916 4916 cmd.exe 90 PID 3916 wrote to memory of 1792 3916 XJZAW.exe 92 PID 3916 wrote to memory of 1792 3916 XJZAW.exe 92 PID 3916 wrote to memory of 1792 3916 XJZAW.exe 92 PID 1792 wrote to memory of 3756 1792 cmd.exe 96 PID 1792 wrote to memory of 3756 1792 cmd.exe 96 PID 1792 wrote to memory of 3756 1792 cmd.exe 96 PID 3756 wrote to memory of 1808 3756 RXKQC.exe 97 PID 3756 wrote to memory of 1808 3756 RXKQC.exe 97 PID 3756 wrote to memory of 1808 3756 RXKQC.exe 97 PID 1808 wrote to memory of 4648 1808 cmd.exe 101 PID 1808 wrote to memory of 4648 1808 cmd.exe 101 PID 1808 wrote to memory of 4648 1808 cmd.exe 101 PID 4648 wrote to memory of 2596 4648 ZKXX.exe 102 PID 4648 wrote to memory of 2596 4648 ZKXX.exe 102 PID 4648 wrote to memory of 2596 4648 ZKXX.exe 102 PID 2596 wrote to memory of 3908 2596 cmd.exe 106 PID 2596 wrote to memory of 3908 2596 cmd.exe 106 PID 2596 wrote to memory of 3908 2596 cmd.exe 106 PID 3908 wrote to memory of 4796 3908 OAKOD.exe 107 PID 3908 wrote to memory of 4796 3908 OAKOD.exe 107 PID 3908 wrote to memory of 4796 3908 OAKOD.exe 107 PID 4796 wrote to memory of 1744 4796 cmd.exe 111 PID 4796 wrote to memory of 1744 4796 cmd.exe 111 PID 4796 wrote to memory of 1744 4796 cmd.exe 111 PID 1744 wrote to memory of 2336 1744 JLSNR.exe 112 PID 1744 wrote to memory of 2336 1744 JLSNR.exe 112 PID 1744 wrote to memory of 2336 1744 JLSNR.exe 112 PID 2336 wrote to memory of 4480 2336 cmd.exe 116 PID 2336 wrote to memory of 4480 2336 cmd.exe 116 PID 2336 wrote to memory of 4480 2336 cmd.exe 116 PID 4480 wrote to memory of 4188 4480 MECDEX.exe 117 PID 4480 wrote to memory of 4188 4480 MECDEX.exe 117 PID 4480 wrote to memory of 4188 4480 MECDEX.exe 117 PID 4188 wrote to memory of 3184 4188 cmd.exe 121 PID 4188 wrote to memory of 3184 4188 cmd.exe 121 PID 4188 wrote to memory of 3184 4188 cmd.exe 121 PID 3184 wrote to memory of 4392 3184 VMEIHVH.exe 122 PID 3184 wrote to memory of 4392 3184 VMEIHVH.exe 122 PID 3184 wrote to memory of 4392 3184 VMEIHVH.exe 122 PID 4392 wrote to memory of 4268 4392 cmd.exe 126 PID 4392 wrote to memory of 4268 4392 cmd.exe 126 PID 4392 wrote to memory of 4268 4392 cmd.exe 126 PID 4268 wrote to memory of 1572 4268 FKSDX.exe 127 PID 4268 wrote to memory of 1572 4268 FKSDX.exe 127 PID 4268 wrote to memory of 1572 4268 FKSDX.exe 127 PID 1572 wrote to memory of 1660 1572 cmd.exe 131 PID 1572 wrote to memory of 1660 1572 cmd.exe 131 PID 1572 wrote to memory of 1660 1572 cmd.exe 131 PID 1660 wrote to memory of 3164 1660 ISFRF.exe 132 PID 1660 wrote to memory of 3164 1660 ISFRF.exe 132 PID 1660 wrote to memory of 3164 1660 ISFRF.exe 132 PID 3164 wrote to memory of 1784 3164 cmd.exe 136 PID 3164 wrote to memory of 1784 3164 cmd.exe 136 PID 3164 wrote to memory of 1784 3164 cmd.exe 136 PID 1784 wrote to memory of 1900 1784 TLIKNY.exe 137 PID 1784 wrote to memory of 1900 1784 TLIKNY.exe 137 PID 1784 wrote to memory of 1900 1784 TLIKNY.exe 137 PID 1900 wrote to memory of 1920 1900 cmd.exe 141
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe"C:\Users\Admin\AppData\Local\Temp\d4d3893fde967246cde6d862b50bf55ef13a8337867b33bbe8ca577adc8c6121N.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XJZAW.exe.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\windows\XJZAW.exeC:\windows\XJZAW.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RXKQC.exe.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\windows\system\RXKQC.exeC:\windows\system\RXKQC.exe5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ZKXX.exe.bat" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\windows\system\ZKXX.exeC:\windows\system\ZKXX.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\OAKOD.exe.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\windows\SysWOW64\OAKOD.exeC:\windows\system32\OAKOD.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JLSNR.exe.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\windows\SysWOW64\JLSNR.exeC:\windows\system32\JLSNR.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MECDEX.exe.bat" "12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\windows\SysWOW64\MECDEX.exeC:\windows\system32\MECDEX.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\VMEIHVH.exe.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\windows\VMEIHVH.exeC:\windows\VMEIHVH.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FKSDX.exe.bat" "16⤵
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\windows\system\FKSDX.exeC:\windows\system\FKSDX.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ISFRF.exe.bat" "18⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\windows\ISFRF.exeC:\windows\ISFRF.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\TLIKNY.exe.bat" "20⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\windows\system\TLIKNY.exeC:\windows\system\TLIKNY.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\WTDRDE.exe.bat" "22⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\windows\system\WTDRDE.exeC:\windows\system\WTDRDE.exe23⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ROI.exe.bat" "24⤵PID:2928
-
C:\windows\ROI.exeC:\windows\ROI.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WOWDBT.exe.bat" "26⤵PID:1056
-
C:\windows\SysWOW64\WOWDBT.exeC:\windows\system32\WOWDBT.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LXXCZPD.exe.bat" "28⤵PID:4924
-
C:\windows\LXXCZPD.exeC:\windows\LXXCZPD.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CFLZ.exe.bat" "30⤵PID:2176
-
C:\windows\SysWOW64\CFLZ.exeC:\windows\system32\CFLZ.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\MDRUBOP.exe.bat" "32⤵PID:3104
-
C:\windows\SysWOW64\MDRUBOP.exeC:\windows\system32\MDRUBOP.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CTEL.exe.bat" "34⤵PID:3872
-
C:\windows\CTEL.exeC:\windows\CTEL.exe35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YTO.exe.bat" "36⤵PID:620
-
C:\windows\system\YTO.exeC:\windows\system\YTO.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\AHMEK.exe.bat" "38⤵PID:2012
-
C:\windows\SysWOW64\AHMEK.exeC:\windows\system32\AHMEK.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VCRNMGK.exe.bat" "40⤵PID:4896
-
C:\windows\SysWOW64\VCRNMGK.exeC:\windows\system32\VCRNMGK.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\CIYJS.exe.bat" "42⤵PID:4592
-
C:\windows\CIYJS.exeC:\windows\CIYJS.exe43⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MFYVIA.exe.bat" "44⤵PID:468
-
C:\windows\system\MFYVIA.exeC:\windows\system\MFYVIA.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\SLRR.exe.bat" "46⤵PID:4916
-
C:\windows\SLRR.exeC:\windows\SLRR.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RWU.exe.bat" "48⤵
- System Location Discovery: System Language Discovery
PID:4684 -
C:\windows\system\RWU.exeC:\windows\system\RWU.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NCGKR.exe.bat" "50⤵PID:888
-
C:\windows\SysWOW64\NCGKR.exeC:\windows\system32\NCGKR.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\NEWYFG.exe.bat" "52⤵
- System Location Discovery: System Language Discovery
PID:4812 -
C:\windows\NEWYFG.exeC:\windows\NEWYFG.exe53⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JKR.exe.bat" "54⤵PID:4060
-
C:\windows\JKR.exeC:\windows\JKR.exe55⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\YASCXZK.exe.bat" "56⤵PID:4632
-
C:\windows\system\YASCXZK.exeC:\windows\system\YASCXZK.exe57⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\ILB.exe.bat" "58⤵
- System Location Discovery: System Language Discovery
PID:3376 -
C:\windows\system\ILB.exeC:\windows\system\ILB.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\QYSIVTW.exe.bat" "60⤵
- System Location Discovery: System Language Discovery
PID:1052 -
C:\windows\system\QYSIVTW.exeC:\windows\system\QYSIVTW.exe61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CPHI.exe.bat" "62⤵PID:4080
-
C:\windows\SysWOW64\CPHI.exeC:\windows\system32\CPHI.exe63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\DETJ.exe.bat" "64⤵PID:1456
-
C:\windows\SysWOW64\DETJ.exeC:\windows\system32\DETJ.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\EIF.exe.bat" "66⤵PID:3668
-
C:\windows\SysWOW64\EIF.exeC:\windows\system32\EIF.exe67⤵
- Checks computer location settings
- Executes dropped EXE
PID:4060 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\TYTE.exe.bat" "68⤵PID:1840
-
C:\windows\TYTE.exeC:\windows\TYTE.exe69⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\ZTKFLI.exe.bat" "70⤵PID:3372
-
C:\windows\ZTKFLI.exeC:\windows\ZTKFLI.exe71⤵
- Executes dropped EXE
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VZR.exe.bat" "72⤵
- System Location Discovery: System Language Discovery
PID:4316 -
C:\windows\SysWOW64\VZR.exeC:\windows\system32\VZR.exe73⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GRMUNGS.exe.bat" "74⤵PID:4052
-
C:\windows\system\GRMUNGS.exeC:\windows\system\GRMUNGS.exe75⤵
- Executes dropped EXE
PID:2480 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\RZHJVTO.exe.bat" "76⤵
- System Location Discovery: System Language Discovery
PID:4172 -
C:\windows\system\RZHJVTO.exeC:\windows\system\RZHJVTO.exe77⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\CSK.exe.bat" "78⤵PID:2984
-
C:\windows\SysWOW64\CSK.exeC:\windows\system32\CSK.exe79⤵
- Executes dropped EXE
PID:4152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\DVAP.exe.bat" "80⤵PID:1660
-
C:\windows\DVAP.exeC:\windows\DVAP.exe81⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\JQEQGZ.exe.bat" "82⤵
- System Location Discovery: System Language Discovery
PID:2448 -
C:\windows\SysWOW64\JQEQGZ.exeC:\windows\system32\JQEQGZ.exe83⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\WBIPL.exe.bat" "84⤵PID:60
-
C:\windows\SysWOW64\WBIPL.exeC:\windows\system32\WBIPL.exe85⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\FMGD.exe.bat" "86⤵PID:1876
-
C:\windows\FMGD.exeC:\windows\FMGD.exe87⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\PKLYAOH.exe.bat" "88⤵PID:2476
-
C:\windows\SysWOW64\PKLYAOH.exeC:\windows\system32\PKLYAOH.exe89⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\LPYB.exe.bat" "90⤵PID:4384
-
C:\windows\LPYB.exeC:\windows\LPYB.exe91⤵
- Executes dropped EXE
PID:4172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\JQGPDOL.exe.bat" "92⤵PID:3888
-
C:\windows\JQGPDOL.exeC:\windows\JQGPDOL.exe93⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GBXMHP.exe.bat" "94⤵PID:888
-
C:\windows\system\GBXMHP.exeC:\windows\system\GBXMHP.exe95⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BOC.exe.bat" "96⤵PID:3744
-
C:\windows\SysWOW64\BOC.exeC:\windows\system32\BOC.exe97⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3720 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\MEX.exe.bat" "98⤵PID:4376
-
C:\windows\system\MEX.exeC:\windows\system\MEX.exe99⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\GRUUK.exe.bat" "100⤵PID:1808
-
C:\windows\system\GRUUK.exeC:\windows\system\GRUUK.exe101⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\FCR.exe.bat" "102⤵
- System Location Discovery: System Language Discovery
PID:4052 -
C:\windows\system\FCR.exeC:\windows\system\FCR.exe103⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\GFVFH.exe.bat" "104⤵PID:4348
-
C:\windows\SysWOW64\GFVFH.exeC:\windows\system32\GFVFH.exe105⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\BLHJSPI.exe.bat" "106⤵PID:5040
-
C:\windows\SysWOW64\BLHJSPI.exeC:\windows\system32\BLHJSPI.exe107⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\KLJOW.exe.bat" "108⤵PID:4932
-
C:\windows\SysWOW64\KLJOW.exeC:\windows\system32\KLJOW.exe109⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\FWGC.exe.bat" "110⤵
- System Location Discovery: System Language Discovery
PID:972 -
C:\windows\SysWOW64\FWGC.exeC:\windows\system32\FWGC.exe111⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\XRK.exe.bat" "112⤵
- System Location Discovery: System Language Discovery
PID:544 -
C:\windows\XRK.exeC:\windows\XRK.exe113⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system\AHFMJO.exe.bat" "114⤵PID:4268
-
C:\windows\system\AHFMJO.exeC:\windows\system\AHFMJO.exe115⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\XND.exe.bat" "116⤵
- System Location Discovery: System Language Discovery
PID:3720 -
C:\windows\SysWOW64\XND.exeC:\windows\system32\XND.exe117⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\NNGOHC.exe.bat" "118⤵PID:4052
-
C:\windows\SysWOW64\NNGOHC.exeC:\windows\system32\NNGOHC.exe119⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\VTYCIP.exe.bat" "120⤵
- System Location Discovery: System Language Discovery
PID:3576 -
C:\windows\SysWOW64\VTYCIP.exeC:\windows\system32\VTYCIP.exe121⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\windows\system32\LBBOZTG.exe.bat" "122⤵PID:4208
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-