Analysis
-
max time kernel
115s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2023, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
84e53c73da75ce80f906e6fb0e6e7770_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
84e53c73da75ce80f906e6fb0e6e7770_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
84e53c73da75ce80f906e6fb0e6e7770_exe32.exe
-
Size
440KB
-
MD5
84e53c73da75ce80f906e6fb0e6e7770
-
SHA1
4236cc48bb0f861268cf3a253e7340423df3fe9b
-
SHA256
3a9b09f1ee3b7cbfe206775914f93cfe9e269f9975b5c11cfe4a8c7108853ae0
-
SHA512
b7e7574dffe68fa3bb8917d760fcaa856a747075c33b0c55e2b96f21a84566d6ec1c8c3ced5ad1b57560e2a7eec3e4f452069cbdb042f8a26fb8662211c511ba
-
SSDEEP
12288:QT6SZhP46SCTbSwgS1IaPRJbDh4i0vm4OsKN5sTuGj:QThhP46SCTbSwgS1IaPRJbDh4i0vm4OG
Malware Config
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 187 4080 cmd.exe 188 4080 cmd.exe 193 4744 cmd.exe 194 4744 cmd.exe 216 4172 cmd.exe 217 4172 cmd.exe 279 688 cmd.exe 280 688 cmd.exe 301 4524 cmd.exe 302 4524 cmd.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation weeb.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wacvmpv.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wrmtjif.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wsrkjshly.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wsipduwu.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wctj.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wvdelh.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation whwur.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wwbbwb.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wepont.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wyg.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wdo.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation whwal.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wkkljb.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wxioue.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wtgssf.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wnbolh.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wdy.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wjuh.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wmwrgh.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wkiqe.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wtyyioqu.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wsksi.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wcfdoh.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wxnfkjum.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wqch.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wcmstaq.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wwauht.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation weehfka.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wbpxex.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wrqv.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wplhac.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wjlamw.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wfke.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wqrfxvpdj.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wbrouu.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation whc.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation whmfbs.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wim.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wpkgpil.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wlxhv.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation whirfaqa.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wfuq.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wpyirfx.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wendpnr.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wosobvn.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wtsato.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wdvcthyt.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wmbvcgfo.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation webqftr.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wrenq.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wjafirm.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wqcwxi.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wvoeop.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wtxuj.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wlkbyek.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wxsnobrd.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation weka.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wltwytgi.exe Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation wseto.exe -
Executes dropped EXE 64 IoCs
pid Process 1780 wqrfxvpdj.exe 3772 wrkdsgs.exe 4996 wxbmmo.exe 2480 wuhrrmb.exe 232 wbhl.exe 3580 wtgssf.exe 2144 weeb.exe 4208 wkfsrmef.exe 2356 wkiqe.exe 4064 wtigvi.exe 4496 whirfaqa.exe 1256 wjafirm.exe 1456 wxnfkjum.exe 3796 wojx.exe 3200 wacvmpv.exe 4328 whdpnx.exe 4504 wcmstaq.exe 4452 wvisbg.exe 1428 wfuq.exe 1752 wxqrhpd.exe 3364 wnqdrh.exe 4696 wqch.exe 4220 wendpnr.exe 1944 wdo.exe 1780 wmwrgh.exe 4800 wlkbyek.exe 3380 wbrouu.exe 1428 woryf.exe 3732 wegage.exe 2956 wnbolh.exe 3000 wepont.exe 2524 woxrk.exe 2056 whwal.exe 4308 wqcwxi.exe 2272 wbr.exe 2708 wsrkjshly.exe 1700 wulfenh.exe 3300 wyg.exe 872 wmgicpctp.exe 1184 wwauht.exe 4504 wseto.exe 1852 whdt.exe 3908 wvdelh.exe 2516 wrmtjif.exe 2084 wtltsahs.exe 2012 whmfbs.exe 500 wdy.exe 1944 wntpxa.exe 1868 weehfka.exe 4504 wseto.exe 4080 cmd.exe 1796 wmmmfg.exe 3516 wosobvn.exe 4744 cmd.exe 2240 WerFault.exe 1384 wqlmvfqyy.exe 3768 wnucug.exe 3076 wtyyioqu.exe 4060 wim.exe 3792 weka.exe 2704 wrotsd.exe 1168 wpyirfx.exe 4348 Conhost.exe 4172 cmd.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wrenq.exe wjlamw.exe File opened for modification C:\Windows\SysWOW64\wuhrrmb.exe wxbmmo.exe File created C:\Windows\SysWOW64\wtgssf.exe wbhl.exe File created C:\Windows\SysWOW64\wcmstaq.exe whdpnx.exe File created C:\Windows\SysWOW64\woxrk.exe wepont.exe File opened for modification C:\Windows\SysWOW64\wcjdn.exe wwauht.exe File opened for modification C:\Windows\SysWOW64\wyobju.exe wdvcthyt.exe File opened for modification C:\Windows\SysWOW64\wvisbg.exe wcmstaq.exe File opened for modification C:\Windows\SysWOW64\wegage.exe woryf.exe File created C:\Windows\SysWOW64\wrotsd.exe weka.exe File created C:\Windows\SysWOW64\wsyrqf.exe wyobju.exe File opened for modification C:\Windows\SysWOW64\wskgn.exe cmd.exe File opened for modification C:\Windows\SysWOW64\wwbbwb.exe wjuh.exe File created C:\Windows\SysWOW64\wrqv.exe wtxuj.exe File created C:\Windows\SysWOW64\wjlamw.exe whc.exe File created C:\Windows\SysWOW64\wvcbm.exe wxsnobrd.exe File created C:\Windows\SysWOW64\whdpnx.exe wacvmpv.exe File created C:\Windows\SysWOW64\wxqrhpd.exe wfuq.exe File created C:\Windows\SysWOW64\wuvwua.exe wwbbwb.exe File opened for modification C:\Windows\SysWOW64\wim.exe wtyyioqu.exe File created C:\Windows\SysWOW64\wpkgpil.exe wsyrqf.exe File opened for modification C:\Windows\SysWOW64\wmwrgh.exe wdo.exe File opened for modification C:\Windows\SysWOW64\wsyrqf.exe wyobju.exe File opened for modification C:\Windows\SysWOW64\wulfenh.exe wsrkjshly.exe File created C:\Windows\SysWOW64\wctj.exe WerFault.exe File opened for modification C:\Windows\SysWOW64\wrkdsgs.exe wqrfxvpdj.exe File created C:\Windows\SysWOW64\wvdelh.exe whdt.exe File opened for modification C:\Windows\SysWOW64\whmfbs.exe wtltsahs.exe File created C:\Windows\SysWOW64\wvrnrmv.exe wvoeop.exe File created C:\Windows\SysWOW64\wltwytgi.exe wkkljb.exe File created C:\Windows\SysWOW64\webqftr.exe wrqv.exe File created C:\Windows\SysWOW64\wqis.exe wpyirfx.exe File created C:\Windows\SysWOW64\wmshg.exe Conhost.exe File opened for modification C:\Windows\SysWOW64\wrqv.exe wtxuj.exe File opened for modification C:\Windows\SysWOW64\wde.exe wplhac.exe File created C:\Windows\SysWOW64\wqrfxvpdj.exe 84e53c73da75ce80f906e6fb0e6e7770_exe32.exe File created C:\Windows\SysWOW64\wtigvi.exe wkiqe.exe File opened for modification C:\Windows\SysWOW64\wnqdrh.exe wxqrhpd.exe File opened for modification C:\Windows\SysWOW64\wvdelh.exe whdt.exe File opened for modification C:\Windows\SysWOW64\weehfka.exe wntpxa.exe File opened for modification C:\Windows\SysWOW64\wnbvjife.exe wgff.exe File opened for modification C:\Windows\SysWOW64\whirfaqa.exe wtigvi.exe File opened for modification C:\Windows\SysWOW64\wosobvn.exe wmmmfg.exe File created C:\Windows\SysWOW64\wxsnobrd.exe wde.exe File created C:\Windows\SysWOW64\wtltsahs.exe wrmtjif.exe File created C:\Windows\SysWOW64\weehfka.exe wntpxa.exe File created C:\Windows\SysWOW64\wlyrecb.exe wsksi.exe File opened for modification C:\Windows\SysWOW64\weka.exe wim.exe File opened for modification C:\Windows\SysWOW64\wpyirfx.exe wrotsd.exe File created C:\Windows\SysWOW64\wde.exe wplhac.exe File opened for modification C:\Windows\SysWOW64\whdpnx.exe wacvmpv.exe File created C:\Windows\SysWOW64\wim.exe wtyyioqu.exe File opened for modification C:\Windows\SysWOW64\wjuh.exe wvrnrmv.exe File created C:\Windows\SysWOW64\wrkdsgs.exe wqrfxvpdj.exe File created C:\Windows\SysWOW64\wuhrrmb.exe wxbmmo.exe File created C:\Windows\SysWOW64\wcfdoh.exe wfke.exe File opened for modification C:\Windows\SysWOW64\weeb.exe wtgssf.exe File opened for modification C:\Windows\SysWOW64\wtltsahs.exe wrmtjif.exe File created C:\Windows\SysWOW64\whmfbs.exe wtltsahs.exe File opened for modification C:\Windows\SysWOW64\wkkljb.exe wbpxex.exe File opened for modification C:\Windows\SysWOW64\wvpujwe.exe wuqub.exe File created C:\Windows\SysWOW64\wseto.exe weehfka.exe File opened for modification C:\Windows\SysWOW64\wseto.exe weehfka.exe File opened for modification C:\Windows\SysWOW64\wtigvi.exe wkiqe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 26 IoCs
pid pid_target Process procid_target 4832 4328 WerFault.exe 136 4640 4452 WerFault.exe 145 2672 1780 WerFault.exe 169 5052 1700 WerFault.exe 208 3032 1852 WerFault.exe 225 1632 2516 WerFault.exe 233 1788 2084 WerFault.exe 236 1292 4080 WerFault.exe 258 2308 4080 WerFault.exe 258 2884 2240 WerFault.exe 274 2240 1704 WerFault.exe 313 1200 1704 WerFault.exe 313 3732 1704 WerFault.exe 313 4584 1704 WerFault.exe 313 5080 4944 WerFault.exe 348 4756 1280 WerFault.exe 351 4584 492 WerFault.exe 356 4288 3336 WerFault.exe 372 4624 3336 WerFault.exe 372 2096 1292 WerFault.exe 394 3876 688 WerFault.exe 414 4332 5004 WerFault.exe 422 2312 4644 WerFault.exe 469 1236 924 WerFault.exe 519 3724 5004 WerFault.exe 563 3076 5004 WerFault.exe 563 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 660 wrote to memory of 1780 660 84e53c73da75ce80f906e6fb0e6e7770_exe32.exe 83 PID 660 wrote to memory of 1780 660 84e53c73da75ce80f906e6fb0e6e7770_exe32.exe 83 PID 660 wrote to memory of 1780 660 84e53c73da75ce80f906e6fb0e6e7770_exe32.exe 83 PID 660 wrote to memory of 2620 660 84e53c73da75ce80f906e6fb0e6e7770_exe32.exe 85 PID 660 wrote to memory of 2620 660 84e53c73da75ce80f906e6fb0e6e7770_exe32.exe 85 PID 660 wrote to memory of 2620 660 84e53c73da75ce80f906e6fb0e6e7770_exe32.exe 85 PID 1780 wrote to memory of 3772 1780 wqrfxvpdj.exe 87 PID 1780 wrote to memory of 3772 1780 wqrfxvpdj.exe 87 PID 1780 wrote to memory of 3772 1780 wqrfxvpdj.exe 87 PID 1780 wrote to memory of 2152 1780 wqrfxvpdj.exe 88 PID 1780 wrote to memory of 2152 1780 wqrfxvpdj.exe 88 PID 1780 wrote to memory of 2152 1780 wqrfxvpdj.exe 88 PID 3772 wrote to memory of 4996 3772 wrkdsgs.exe 92 PID 3772 wrote to memory of 4996 3772 wrkdsgs.exe 92 PID 3772 wrote to memory of 4996 3772 wrkdsgs.exe 92 PID 3772 wrote to memory of 2644 3772 wrkdsgs.exe 93 PID 3772 wrote to memory of 2644 3772 wrkdsgs.exe 93 PID 3772 wrote to memory of 2644 3772 wrkdsgs.exe 93 PID 4996 wrote to memory of 2480 4996 wxbmmo.exe 96 PID 4996 wrote to memory of 2480 4996 wxbmmo.exe 96 PID 4996 wrote to memory of 2480 4996 wxbmmo.exe 96 PID 4996 wrote to memory of 2824 4996 wxbmmo.exe 97 PID 4996 wrote to memory of 2824 4996 wxbmmo.exe 97 PID 4996 wrote to memory of 2824 4996 wxbmmo.exe 97 PID 2480 wrote to memory of 232 2480 wuhrrmb.exe 100 PID 2480 wrote to memory of 232 2480 wuhrrmb.exe 100 PID 2480 wrote to memory of 232 2480 wuhrrmb.exe 100 PID 2480 wrote to memory of 2708 2480 wuhrrmb.exe 102 PID 2480 wrote to memory of 2708 2480 wuhrrmb.exe 102 PID 2480 wrote to memory of 2708 2480 wuhrrmb.exe 102 PID 232 wrote to memory of 3580 232 wbhl.exe 103 PID 232 wrote to memory of 3580 232 wbhl.exe 103 PID 232 wrote to memory of 3580 232 wbhl.exe 103 PID 232 wrote to memory of 3148 232 wbhl.exe 104 PID 232 wrote to memory of 3148 232 wbhl.exe 104 PID 232 wrote to memory of 3148 232 wbhl.exe 104 PID 3580 wrote to memory of 2144 3580 wtgssf.exe 107 PID 3580 wrote to memory of 2144 3580 wtgssf.exe 107 PID 3580 wrote to memory of 2144 3580 wtgssf.exe 107 PID 3580 wrote to memory of 4784 3580 wtgssf.exe 108 PID 3580 wrote to memory of 4784 3580 wtgssf.exe 108 PID 3580 wrote to memory of 4784 3580 wtgssf.exe 108 PID 2144 wrote to memory of 4208 2144 weeb.exe 110 PID 2144 wrote to memory of 4208 2144 weeb.exe 110 PID 2144 wrote to memory of 4208 2144 weeb.exe 110 PID 2144 wrote to memory of 4648 2144 weeb.exe 111 PID 2144 wrote to memory of 4648 2144 weeb.exe 111 PID 2144 wrote to memory of 4648 2144 weeb.exe 111 PID 4208 wrote to memory of 2356 4208 wkfsrmef.exe 113 PID 4208 wrote to memory of 2356 4208 wkfsrmef.exe 113 PID 4208 wrote to memory of 2356 4208 wkfsrmef.exe 113 PID 4208 wrote to memory of 4920 4208 wkfsrmef.exe 114 PID 4208 wrote to memory of 4920 4208 wkfsrmef.exe 114 PID 4208 wrote to memory of 4920 4208 wkfsrmef.exe 114 PID 2356 wrote to memory of 4064 2356 wkiqe.exe 117 PID 2356 wrote to memory of 4064 2356 wkiqe.exe 117 PID 2356 wrote to memory of 4064 2356 wkiqe.exe 117 PID 2356 wrote to memory of 2688 2356 wkiqe.exe 120 PID 2356 wrote to memory of 2688 2356 wkiqe.exe 120 PID 2356 wrote to memory of 2688 2356 wkiqe.exe 120 PID 4064 wrote to memory of 4496 4064 wtigvi.exe 121 PID 4064 wrote to memory of 4496 4064 wtigvi.exe 121 PID 4064 wrote to memory of 4496 4064 wtigvi.exe 121 PID 4064 wrote to memory of 2864 4064 wtigvi.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\84e53c73da75ce80f906e6fb0e6e7770_exe32.exe"C:\Users\Admin\AppData\Local\Temp\84e53c73da75ce80f906e6fb0e6e7770_exe32.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\wqrfxvpdj.exe"C:\Windows\system32\wqrfxvpdj.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\wrkdsgs.exe"C:\Windows\system32\wrkdsgs.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\wxbmmo.exe"C:\Windows\system32\wxbmmo.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\wuhrrmb.exe"C:\Windows\system32\wuhrrmb.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\wbhl.exe"C:\Windows\system32\wbhl.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\wtgssf.exe"C:\Windows\system32\wtgssf.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\weeb.exe"C:\Windows\system32\weeb.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\wkfsrmef.exe"C:\Windows\system32\wkfsrmef.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\wkiqe.exe"C:\Windows\system32\wkiqe.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\wtigvi.exe"C:\Windows\system32\wtigvi.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\whirfaqa.exe"C:\Windows\system32\whirfaqa.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\wjafirm.exe"C:\Windows\system32\wjafirm.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
PID:1256 -
C:\Windows\SysWOW64\wxnfkjum.exe"C:\Windows\system32\wxnfkjum.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
PID:1456 -
C:\Windows\SysWOW64\wojx.exe"C:\Windows\system32\wojx.exe"15⤵
- Executes dropped EXE
PID:3796 -
C:\Windows\SysWOW64\wacvmpv.exe"C:\Windows\system32\wacvmpv.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3200 -
C:\Windows\SysWOW64\whdpnx.exe"C:\Windows\system32\whdpnx.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4328 -
C:\Windows\SysWOW64\wcmstaq.exe"C:\Windows\system32\wcmstaq.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4504 -
C:\Windows\SysWOW64\wvisbg.exe"C:\Windows\system32\wvisbg.exe"19⤵
- Executes dropped EXE
PID:4452 -
C:\Windows\SysWOW64\wfuq.exe"C:\Windows\system32\wfuq.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1428 -
C:\Windows\SysWOW64\wxqrhpd.exe"C:\Windows\system32\wxqrhpd.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\wnqdrh.exe"C:\Windows\system32\wnqdrh.exe"22⤵
- Executes dropped EXE
PID:3364 -
C:\Windows\SysWOW64\wqch.exe"C:\Windows\system32\wqch.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:4696 -
C:\Windows\SysWOW64\wendpnr.exe"C:\Windows\system32\wendpnr.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:4220 -
C:\Windows\SysWOW64\wdo.exe"C:\Windows\system32\wdo.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\wmwrgh.exe"C:\Windows\system32\wmwrgh.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\wlkbyek.exe"C:\Windows\system32\wlkbyek.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\wbrouu.exe"C:\Windows\system32\wbrouu.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
PID:3380 -
C:\Windows\SysWOW64\woryf.exe"C:\Windows\system32\woryf.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1428 -
C:\Windows\SysWOW64\wegage.exe"C:\Windows\system32\wegage.exe"30⤵
- Executes dropped EXE
PID:3732 -
C:\Windows\SysWOW64\wnbolh.exe"C:\Windows\system32\wnbolh.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\wepont.exe"C:\Windows\system32\wepont.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3000 -
C:\Windows\SysWOW64\woxrk.exe"C:\Windows\system32\woxrk.exe"33⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\whwal.exe"C:\Windows\system32\whwal.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\wqcwxi.exe"C:\Windows\system32\wqcwxi.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:4308 -
C:\Windows\SysWOW64\wbr.exe"C:\Windows\system32\wbr.exe"36⤵
- Executes dropped EXE
PID:2272 -
C:\Windows\SysWOW64\wsrkjshly.exe"C:\Windows\system32\wsrkjshly.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\wulfenh.exe"C:\Windows\system32\wulfenh.exe"38⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\wyg.exe"C:\Windows\system32\wyg.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:3300 -
C:\Windows\SysWOW64\wmgicpctp.exe"C:\Windows\system32\wmgicpctp.exe"40⤵
- Executes dropped EXE
PID:872 -
C:\Windows\SysWOW64\wwauht.exe"C:\Windows\system32\wwauht.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1184 -
C:\Windows\SysWOW64\wcjdn.exe"C:\Windows\system32\wcjdn.exe"42⤵PID:4504
-
C:\Windows\SysWOW64\whdt.exe"C:\Windows\system32\whdt.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1852 -
C:\Windows\SysWOW64\wvdelh.exe"C:\Windows\system32\wvdelh.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:3908 -
C:\Windows\SysWOW64\wrmtjif.exe"C:\Windows\system32\wrmtjif.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2516 -
C:\Windows\SysWOW64\wtltsahs.exe"C:\Windows\system32\wtltsahs.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\whmfbs.exe"C:\Windows\system32\whmfbs.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\wdy.exe"C:\Windows\system32\wdy.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:500 -
C:\Windows\SysWOW64\wntpxa.exe"C:\Windows\system32\wntpxa.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\weehfka.exe"C:\Windows\system32\weehfka.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1868 -
C:\Windows\SysWOW64\wseto.exe"C:\Windows\system32\wseto.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:4504 -
C:\Windows\SysWOW64\wqdwg.exe"C:\Windows\system32\wqdwg.exe"52⤵PID:4080
-
C:\Windows\SysWOW64\wmmmfg.exe"C:\Windows\system32\wmmmfg.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1796 -
C:\Windows\SysWOW64\wosobvn.exe"C:\Windows\system32\wosobvn.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
PID:3516 -
C:\Windows\SysWOW64\wymcfyt.exe"C:\Windows\system32\wymcfyt.exe"55⤵PID:4744
-
C:\Windows\SysWOW64\wpcd.exe"C:\Windows\system32\wpcd.exe"56⤵PID:2240
-
C:\Windows\SysWOW64\wqlmvfqyy.exe"C:\Windows\system32\wqlmvfqyy.exe"57⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\SysWOW64\wnucug.exe"C:\Windows\system32\wnucug.exe"58⤵
- Executes dropped EXE
PID:3768 -
C:\Windows\SysWOW64\wtyyioqu.exe"C:\Windows\system32\wtyyioqu.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3076 -
C:\Windows\SysWOW64\wim.exe"C:\Windows\system32\wim.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4060 -
C:\Windows\SysWOW64\weka.exe"C:\Windows\system32\weka.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3792 -
C:\Windows\SysWOW64\wrotsd.exe"C:\Windows\system32\wrotsd.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\wpyirfx.exe"C:\Windows\system32\wpyirfx.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1168 -
C:\Windows\SysWOW64\wqis.exe"C:\Windows\system32\wqis.exe"64⤵PID:4348
-
C:\Windows\SysWOW64\wmshg.exe"C:\Windows\system32\wmshg.exe"65⤵PID:4172
-
C:\Windows\SysWOW64\wvluk.exe"C:\Windows\system32\wvluk.exe"66⤵PID:944
-
C:\Windows\SysWOW64\wpkdlmym.exe"C:\Windows\system32\wpkdlmym.exe"67⤵PID:3696
-
C:\Windows\SysWOW64\whwur.exe"C:\Windows\system32\whwur.exe"68⤵
- Checks computer location settings
PID:1704 -
C:\Windows\SysWOW64\wvoeop.exe"C:\Windows\system32\wvoeop.exe"69⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2884 -
C:\Windows\SysWOW64\wvrnrmv.exe"C:\Windows\system32\wvrnrmv.exe"70⤵
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\wjuh.exe"C:\Windows\system32\wjuh.exe"71⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4900 -
C:\Windows\SysWOW64\wwbbwb.exe"C:\Windows\system32\wwbbwb.exe"72⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3456 -
C:\Windows\SysWOW64\wuvwua.exe"C:\Windows\system32\wuvwua.exe"73⤵PID:4348
-
C:\Windows\SysWOW64\wsipduwu.exe"C:\Windows\system32\wsipduwu.exe"74⤵
- Checks computer location settings
PID:4552 -
C:\Windows\SysWOW64\wtsato.exe"C:\Windows\system32\wtsato.exe"75⤵
- Checks computer location settings
PID:4220 -
C:\Windows\SysWOW64\wqvnfs.exe"C:\Windows\system32\wqvnfs.exe"76⤵PID:1752
-
C:\Windows\SysWOW64\wyobju.exe"C:\Windows\system32\wyobju.exe"77⤵
- Drops file in System32 directory
PID:4944 -
C:\Windows\SysWOW64\wsyrqf.exe"C:\Windows\system32\wsyrqf.exe"78⤵
- Drops file in System32 directory
PID:1280 -
C:\Windows\SysWOW64\wpkgpil.exe"C:\Windows\system32\wpkgpil.exe"79⤵
- Checks computer location settings
PID:492 -
C:\Windows\SysWOW64\wmbvcgfo.exe"C:\Windows\system32\wmbvcgfo.exe"80⤵
- Checks computer location settings
PID:3008 -
C:\Windows\SysWOW64\wbpxex.exe"C:\Windows\system32\wbpxex.exe"81⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3300 -
C:\Windows\SysWOW64\wkkljb.exe"C:\Windows\system32\wkkljb.exe"82⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4280 -
C:\Windows\SysWOW64\wltwytgi.exe"C:\Windows\system32\wltwytgi.exe"83⤵
- Checks computer location settings
PID:3336 -
C:\Windows\SysWOW64\wtxuj.exe"C:\Windows\system32\wtxuj.exe"84⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3192 -
C:\Windows\SysWOW64\wrqv.exe"C:\Windows\system32\wrqv.exe"85⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1772 -
C:\Windows\SysWOW64\webqftr.exe"C:\Windows\system32\webqftr.exe"86⤵
- Checks computer location settings
PID:3828 -
C:\Windows\SysWOW64\wgsfh.exe"C:\Windows\system32\wgsfh.exe"87⤵PID:572
-
C:\Windows\SysWOW64\whc.exe"C:\Windows\system32\whc.exe"88⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2516 -
C:\Windows\SysWOW64\wjlamw.exe"C:\Windows\system32\wjlamw.exe"89⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1292 -
C:\Windows\SysWOW64\wrenq.exe"C:\Windows\system32\wrenq.exe"90⤵
- Checks computer location settings
PID:1212 -
C:\Windows\SysWOW64\wwouxlny.exe"C:\Windows\system32\wwouxlny.exe"91⤵PID:1972
-
C:\Windows\SysWOW64\wxioue.exe"C:\Windows\system32\wxioue.exe"92⤵
- Checks computer location settings
PID:1812 -
C:\Windows\SysWOW64\wuh.exe"C:\Windows\system32\wuh.exe"93⤵PID:4496
-
C:\Windows\SysWOW64\welrxjdr.exe"C:\Windows\system32\welrxjdr.exe"94⤵PID:3696
-
C:\Windows\SysWOW64\wnbvjife.exe"C:\Windows\system32\wnbvjife.exe"95⤵PID:688
-
C:\Windows\SysWOW64\wplhac.exe"C:\Windows\system32\wplhac.exe"96⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\wde.exe"C:\Windows\system32\wde.exe"97⤵
- Drops file in System32 directory
PID:5004 -
C:\Windows\SysWOW64\wxsnobrd.exe"C:\Windows\system32\wxsnobrd.exe"98⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1452 -
C:\Windows\SysWOW64\wvcbm.exe"C:\Windows\system32\wvcbm.exe"99⤵PID:4356
-
C:\Windows\SysWOW64\wfke.exe"C:\Windows\system32\wfke.exe"100⤵
- Checks computer location settings
- Drops file in System32 directory
PID:5028 -
C:\Windows\SysWOW64\wcfdoh.exe"C:\Windows\system32\wcfdoh.exe"101⤵
- Checks computer location settings
PID:2988 -
C:\Windows\SysWOW64\wsksi.exe"C:\Windows\system32\wsksi.exe"102⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1972 -
C:\Windows\SysWOW64\wlyrecb.exe"C:\Windows\system32\wlyrecb.exe"103⤵PID:232
-
C:\Windows\SysWOW64\wyckf.exe"C:\Windows\system32\wyckf.exe"104⤵PID:3148
-
C:\Windows\SysWOW64\wdvcthyt.exe"C:\Windows\system32\wdvcthyt.exe"105⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\wfgljbm.exe"C:\Windows\system32\wfgljbm.exe"106⤵PID:4524
-
C:\Windows\SysWOW64\wskgn.exe"C:\Windows\system32\wskgn.exe"107⤵PID:4464
-
C:\Windows\SysWOW64\wctj.exe"C:\Windows\system32\wctj.exe"108⤵
- Checks computer location settings
PID:2352 -
C:\Windows\SysWOW64\wlxhv.exe"C:\Windows\system32\wlxhv.exe"109⤵
- Checks computer location settings
PID:2056 -
C:\Windows\SysWOW64\wuqub.exe"C:\Windows\system32\wuqub.exe"110⤵
- Drops file in System32 directory
PID:4092 -
C:\Windows\SysWOW64\wvpujwe.exe"C:\Windows\system32\wvpujwe.exe"111⤵PID:2840
-
C:\Windows\SysWOW64\wgk.exe"C:\Windows\system32\wgk.exe"112⤵PID:4644
-
C:\Windows\SysWOW64\wsocr.exe"C:\Windows\system32\wsocr.exe"113⤵PID:5048
-
C:\Windows\SysWOW64\woro.exe"C:\Windows\system32\woro.exe"114⤵PID:3912
-
C:\Windows\SysWOW64\wtav.exe"C:\Windows\system32\wtav.exe"115⤵PID:4884
-
C:\Windows\SysWOW64\wdalcknld.exe"C:\Windows\system32\wdalcknld.exe"116⤵PID:2824
-
C:\Windows\SysWOW64\wrtuxe.exe"C:\Windows\system32\wrtuxe.exe"117⤵PID:4736
-
C:\Windows\SysWOW64\woejvgg.exe"C:\Windows\system32\woejvgg.exe"118⤵PID:3428
-
C:\Windows\SysWOW64\wgncdq.exe"C:\Windows\system32\wgncdq.exe"119⤵PID:3836
-
C:\Windows\SysWOW64\wmxjjbfpr.exe"C:\Windows\system32\wmxjjbfpr.exe"120⤵PID:4332
-
C:\Windows\SysWOW64\wdaye.exe"C:\Windows\system32\wdaye.exe"121⤵PID:3364
-
C:\Windows\SysWOW64\wmtm.exe"C:\Windows\system32\wmtm.exe"122⤵PID:2860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-