Analysis
-
max time kernel
84s -
max time network
26s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 18:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3420e1a8010b0c0957e33532ed8b1dbc.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
3420e1a8010b0c0957e33532ed8b1dbc.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
3420e1a8010b0c0957e33532ed8b1dbc.exe
-
Size
19KB
-
MD5
3420e1a8010b0c0957e33532ed8b1dbc
-
SHA1
05f4bdc15c239e055690078d78e2e7d2710d997c
-
SHA256
c6f9179c5e09f5a5668680b35c8ba875cdf38df7cdbbeb14352fde9d8be28b7b
-
SHA512
7849bf3c683aaeec1762d99b77d2bfd70668ed82827c1731db660b86fa7b4053d46cc305c575047d196300cbe2368c84cb992f59aaa8a2a6b166df98dbe248c5
-
SSDEEP
384:6K/zPb8fSEIkgkHdbDSlQO5ATd68IP4//38LKCTYY+Z+Bdme/J:J/zz8Ddv+wZ68IPBKR+fmeh
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2128 WNLOGON.exe 2692 ahhcnna.exe 844 qxskuew.exe 588 WNLOGON.exe 1700 slvmpfl.exe 3024 cvkxkar.exe 2004 WNLOGON.exe 1476 jsvuvge.exe 2380 vmbkhsq.exe 2068 ukxmzkz.exe 2304 gmdclwe.exe 1888 cuyvnub.exe 1812 qxqcyjb.exe 1824 famxcmk.exe 2300 srhatuq.exe 2028 WNLOGON.exe 1456 memvtad.exe 2772 zosfwsd.exe 2128 WNLOGON.exe 2568 fwkifry.exe 476 qvofpqf.exe 2856 WNLOGON.exe 1220 snfdimn.exe 2652 ajpizxq.exe 2504 WNLOGON.exe 2200 yjoltnp.exe 1532 iiailmx.exe 2364 WNLOGON.exe 2976 doqdgjm.exe 2292 drcwunq.exe 2344 WNLOGON.exe 1804 fnfgpox.exe 1668 mvtykdg.exe 2940 WNLOGON.exe 2452 oxtgwuy.exe 1372 ackbkdb.exe 1728 WNLOGON.exe 2780 dmczczj.exe 2840 kuprwot.exe 2264 WNLOGON.exe 1124 flruudc.exe 2444 psvrecc.exe 1392 WNLOGON.exe 1180 ostbexr.exe 2008 eebwikw.exe 756 WNLOGON.exe 312 voezpdm.exe 1608 nddwurv.exe 2368 WNLOGON.exe 2068 ukxmzkz.exe 2304 gmdclwe.exe 784 WNLOGON.exe 952 qeqkxhv.exe 1812 qxqcyjb.exe 1140 WNLOGON.exe 884 aucdsei.exe 2140 wodjvjb.exe 2468 WNLOGON.exe 2252 gkdkbcr.exe 2960 naycvrb.exe 2092 WNLOGON.exe 2888 nhohmie.exe 2688 klrhtpx.exe 1956 WNLOGON.exe -
Loads dropped DLL 64 IoCs
pid Process 2260 3420e1a8010b0c0957e33532ed8b1dbc.exe 2260 3420e1a8010b0c0957e33532ed8b1dbc.exe 2128 WNLOGON.exe 2128 WNLOGON.exe 2692 ahhcnna.exe 2692 ahhcnna.exe 844 qxskuew.exe 844 qxskuew.exe 588 WNLOGON.exe 588 WNLOGON.exe 1700 slvmpfl.exe 1700 slvmpfl.exe 3024 cvkxkar.exe 3024 cvkxkar.exe 2004 WNLOGON.exe 2004 WNLOGON.exe 1476 jsvuvge.exe 1476 jsvuvge.exe 2380 vmbkhsq.exe 2380 vmbkhsq.exe 2068 ukxmzkz.exe 2068 ukxmzkz.exe 2304 gmdclwe.exe 2304 gmdclwe.exe 1888 cuyvnub.exe 1888 cuyvnub.exe 1812 qxqcyjb.exe 1812 qxqcyjb.exe 1824 famxcmk.exe 1824 famxcmk.exe 2300 srhatuq.exe 2300 srhatuq.exe 2028 WNLOGON.exe 2028 WNLOGON.exe 1456 memvtad.exe 1456 memvtad.exe 2772 zosfwsd.exe 2772 zosfwsd.exe 2128 WNLOGON.exe 2128 WNLOGON.exe 2568 fwkifry.exe 2568 fwkifry.exe 476 qvofpqf.exe 476 qvofpqf.exe 2856 WNLOGON.exe 2856 WNLOGON.exe 1220 snfdimn.exe 1220 snfdimn.exe 2652 ajpizxq.exe 2652 ajpizxq.exe 2504 WNLOGON.exe 2504 WNLOGON.exe 2200 yjoltnp.exe 2200 yjoltnp.exe 1532 iiailmx.exe 1532 iiailmx.exe 2364 WNLOGON.exe 2364 WNLOGON.exe 2976 doqdgjm.exe 2976 doqdgjm.exe 2292 drcwunq.exe 2292 drcwunq.exe 2344 WNLOGON.exe 2344 WNLOGON.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "vmbkhsq.exe" jsvuvge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" iiailmx.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" eulphqq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" fsxuqpq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "fkqnjye.exe" WNLOGON.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "cvkxkar.exe" slvmpfl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "qvofpqf.exe" fwkifry.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "yjoltnp.exe" WNLOGON.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" rszfdpn.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" 3420e1a8010b0c0957e33532ed8b1dbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" inxzdbz.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "mosabrh.exe" fkqnjye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "alhitzn.exe" WNLOGON.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "cwswcmy.exe" WNLOGON.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "nujzyfq.exe" lggpdej.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" juyzqtl.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "ajpizxq.exe" snfdimn.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" ajpizxq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "nddwurv.exe" voezpdm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "rtuaood.exe" hjfqtlp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "pilchmb.exe" fjhxpnb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "prdixpu.exe" kfpunwa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "jsvuvge.exe" WNLOGON.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" kuprwot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" gmdclwe.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" naycvrb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "ftgnkca.exe" WNLOGON.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" rtuaood.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" vmbkhsq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" zosfwsd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "sfoekms.exe" WNLOGON.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "rpormza.exe" cwswcmy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" iiailmx.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" gmdclwe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" eulphqq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "ncddduc.exe" euqkcxy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "ncddduc.exe" euqkcxy.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "raquahu.exe" jirutsq.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "drcwunq.exe" doqdgjm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "ukxmzkz.exe" WNLOGON.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "qjcmvaa.exe" WNLOGON.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" uilbotb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "lggpdej.exe" WNLOGON.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" nksjdhr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "zosfwsd.exe" memvtad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "snfdimn.exe" WNLOGON.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "mvtykdg.exe" fnfgpox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "aebsgxj.exe" pilchmb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "qxskuew.exe" ahhcnna.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "slvmpfl.exe" WNLOGON.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "fwkifry.exe" WNLOGON.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" qxqcyjb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" zpqputt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "ombvpyj.exe" WNLOGON.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" zosfwsd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "gmdclwe.exe" ukxmzkz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "bprhhew.exe" nksjdhr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "avwqstz.exe" ombvpyj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "supqijn.exe" WNLOGON.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "srhatuq.exe" famxcmk.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "psvrecc.exe" flruudc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "WNLOGON.exe" sopknvk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsock2 driver = "khfhncy.exe" fkqnjye.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Winsock2 driver = "WNLOGON.exe" rtuaood.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\rpormza.exe cwswcmy.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe WNLOGON.exe File opened for modification C:\WINDOWS\SysWOW64\WNLOGON.exe rszfdpn.exe File created C:\WINDOWS\SysWOW64\eulphqq.exe rhbrbmj.exe File opened for modification C:\WINDOWS\SysWOW64\tjtznvb.exe ncddduc.exe File created C:\WINDOWS\SysWOW64\avwqstz.exe ombvpyj.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe krkdwtp.exe File opened for modification C:\WINDOWS\SysWOW64\WNLOGON.exe avwqstz.exe File opened for modification C:\WINDOWS\SysWOW64\ahhcnna.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\famxcmk.exe qxqcyjb.exe File opened for modification C:\WINDOWS\SysWOW64\psvrecc.exe flruudc.exe File opened for modification C:\WINDOWS\SysWOW64\sopknvk.exe aebsgxj.exe File created C:\WINDOWS\SysWOW64\bboxfwp.exe rccavxq.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe 3420e1a8010b0c0957e33532ed8b1dbc.exe File created C:\WINDOWS\SysWOW64\memvtad.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe WNLOGON.exe File opened for modification C:\WINDOWS\SysWOW64\iiailmx.exe yjoltnp.exe File created C:\WINDOWS\SysWOW64\mosabrh.exe fkqnjye.exe File created C:\WINDOWS\SysWOW64\rtuaood.exe hjfqtlp.exe File opened for modification C:\WINDOWS\SysWOW64\raquahu.exe jirutsq.exe File opened for modification C:\WINDOWS\SysWOW64\sjbhbkg.exe ftgnkca.exe File opened for modification C:\WINDOWS\SysWOW64\alhitzn.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\lggpdej.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe ahhcnna.exe File created C:\WINDOWS\SysWOW64\mvtykdg.exe fnfgpox.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe flruudc.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe avwqstz.exe File opened for modification C:\WINDOWS\SysWOW64\sfoekms.exe WNLOGON.exe File opened for modification C:\WINDOWS\SysWOW64\WNLOGON.exe fsxuqpq.exe File opened for modification C:\WINDOWS\SysWOW64\rccavxq.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\alhitzn.exe WNLOGON.exe File opened for modification C:\WINDOWS\SysWOW64\cuyvnub.exe gmdclwe.exe File opened for modification C:\WINDOWS\SysWOW64\qeqkxhv.exe WNLOGON.exe File opened for modification C:\WINDOWS\SysWOW64\WNLOGON.exe wodjvjb.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe gkdkbcr.exe File opened for modification C:\WINDOWS\SysWOW64\WNLOGON.exe wvwnpxo.exe File created C:\WINDOWS\SysWOW64\cdjmizo.exe qjcmvaa.exe File created C:\WINDOWS\SysWOW64\jirutsq.exe WNLOGON.exe File opened for modification C:\WINDOWS\SysWOW64\WNLOGON.exe ilcesbj.exe File opened for modification C:\WINDOWS\SysWOW64\qxskuew.exe ahhcnna.exe File opened for modification C:\WINDOWS\SysWOW64\bprhhew.exe nksjdhr.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\pilchmb.exe fjhxpnb.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe kfpunwa.exe File opened for modification C:\WINDOWS\SysWOW64\WNLOGON.exe nddwurv.exe File created C:\WINDOWS\SysWOW64\qxqcyjb.exe qeqkxhv.exe File created C:\WINDOWS\SysWOW64\fsxuqpq.exe sfoekms.exe File created C:\WINDOWS\SysWOW64\hjfqtlp.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\raquahu.exe jirutsq.exe File created C:\WINDOWS\SysWOW64\lzvuicn.exe WNLOGON.exe File opened for modification C:\WINDOWS\SysWOW64\ombvpyj.exe WNLOGON.exe File opened for modification C:\WINDOWS\SysWOW64\WNLOGON.exe exprxqv.exe File opened for modification C:\WINDOWS\SysWOW64\WNLOGON.exe nksjdhr.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe pilchmb.exe File opened for modification C:\WINDOWS\SysWOW64\WNLOGON.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe WNLOGON.exe File created C:\WINDOWS\SysWOW64\drcwunq.exe doqdgjm.exe File opened for modification C:\WINDOWS\SysWOW64\WNLOGON.exe mvtykdg.exe File opened for modification C:\WINDOWS\SysWOW64\kuprwot.exe dmczczj.exe File opened for modification C:\WINDOWS\SysWOW64\gmdclwe.exe ukxmzkz.exe File created C:\WINDOWS\SysWOW64\WNLOGON.exe WNLOGON.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2128 2260 3420e1a8010b0c0957e33532ed8b1dbc.exe 28 PID 2260 wrote to memory of 2128 2260 3420e1a8010b0c0957e33532ed8b1dbc.exe 28 PID 2260 wrote to memory of 2128 2260 3420e1a8010b0c0957e33532ed8b1dbc.exe 28 PID 2260 wrote to memory of 2128 2260 3420e1a8010b0c0957e33532ed8b1dbc.exe 28 PID 2128 wrote to memory of 2692 2128 WNLOGON.exe 32 PID 2128 wrote to memory of 2692 2128 WNLOGON.exe 32 PID 2128 wrote to memory of 2692 2128 WNLOGON.exe 32 PID 2128 wrote to memory of 2692 2128 WNLOGON.exe 32 PID 2692 wrote to memory of 844 2692 ahhcnna.exe 31 PID 2692 wrote to memory of 844 2692 ahhcnna.exe 31 PID 2692 wrote to memory of 844 2692 ahhcnna.exe 31 PID 2692 wrote to memory of 844 2692 ahhcnna.exe 31 PID 844 wrote to memory of 588 844 qxskuew.exe 30 PID 844 wrote to memory of 588 844 qxskuew.exe 30 PID 844 wrote to memory of 588 844 qxskuew.exe 30 PID 844 wrote to memory of 588 844 qxskuew.exe 30 PID 588 wrote to memory of 1700 588 WNLOGON.exe 29 PID 588 wrote to memory of 1700 588 WNLOGON.exe 29 PID 588 wrote to memory of 1700 588 WNLOGON.exe 29 PID 588 wrote to memory of 1700 588 WNLOGON.exe 29 PID 1700 wrote to memory of 3024 1700 slvmpfl.exe 33 PID 1700 wrote to memory of 3024 1700 slvmpfl.exe 33 PID 1700 wrote to memory of 3024 1700 slvmpfl.exe 33 PID 1700 wrote to memory of 3024 1700 slvmpfl.exe 33 PID 3024 wrote to memory of 2004 3024 cvkxkar.exe 34 PID 3024 wrote to memory of 2004 3024 cvkxkar.exe 34 PID 3024 wrote to memory of 2004 3024 cvkxkar.exe 34 PID 3024 wrote to memory of 2004 3024 cvkxkar.exe 34 PID 2004 wrote to memory of 1476 2004 WNLOGON.exe 35 PID 2004 wrote to memory of 1476 2004 WNLOGON.exe 35 PID 2004 wrote to memory of 1476 2004 WNLOGON.exe 35 PID 2004 wrote to memory of 1476 2004 WNLOGON.exe 35 PID 1476 wrote to memory of 2380 1476 jsvuvge.exe 36 PID 1476 wrote to memory of 2380 1476 jsvuvge.exe 36 PID 1476 wrote to memory of 2380 1476 jsvuvge.exe 36 PID 1476 wrote to memory of 2380 1476 jsvuvge.exe 36 PID 2380 wrote to memory of 2068 2380 vmbkhsq.exe 79 PID 2380 wrote to memory of 2068 2380 vmbkhsq.exe 79 PID 2380 wrote to memory of 2068 2380 vmbkhsq.exe 79 PID 2380 wrote to memory of 2068 2380 vmbkhsq.exe 79 PID 2068 wrote to memory of 2304 2068 ukxmzkz.exe 80 PID 2068 wrote to memory of 2304 2068 ukxmzkz.exe 80 PID 2068 wrote to memory of 2304 2068 ukxmzkz.exe 80 PID 2068 wrote to memory of 2304 2068 ukxmzkz.exe 80 PID 2304 wrote to memory of 1888 2304 gmdclwe.exe 40 PID 2304 wrote to memory of 1888 2304 gmdclwe.exe 40 PID 2304 wrote to memory of 1888 2304 gmdclwe.exe 40 PID 2304 wrote to memory of 1888 2304 gmdclwe.exe 40 PID 1888 wrote to memory of 1812 1888 cuyvnub.exe 83 PID 1888 wrote to memory of 1812 1888 cuyvnub.exe 83 PID 1888 wrote to memory of 1812 1888 cuyvnub.exe 83 PID 1888 wrote to memory of 1812 1888 cuyvnub.exe 83 PID 1812 wrote to memory of 1824 1812 qxqcyjb.exe 41 PID 1812 wrote to memory of 1824 1812 qxqcyjb.exe 41 PID 1812 wrote to memory of 1824 1812 qxqcyjb.exe 41 PID 1812 wrote to memory of 1824 1812 qxqcyjb.exe 41 PID 1824 wrote to memory of 2300 1824 famxcmk.exe 43 PID 1824 wrote to memory of 2300 1824 famxcmk.exe 43 PID 1824 wrote to memory of 2300 1824 famxcmk.exe 43 PID 1824 wrote to memory of 2300 1824 famxcmk.exe 43 PID 2300 wrote to memory of 2028 2300 srhatuq.exe 45 PID 2300 wrote to memory of 2028 2300 srhatuq.exe 45 PID 2300 wrote to memory of 2028 2300 srhatuq.exe 45 PID 2300 wrote to memory of 2028 2300 srhatuq.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\3420e1a8010b0c0957e33532ed8b1dbc.exe"C:\Users\Admin\AppData\Local\Temp\3420e1a8010b0c0957e33532ed8b1dbc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\USERS\ADMIN\APPDATA\LOCAL\TEMP\3420E1A8010B0C0957E33532ED8B1DBC.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\WINDOWS\SysWOW64\ahhcnna.exe"C:\WINDOWS\SYSTEM32\ahhcnna.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2692
-
-
-
C:\WINDOWS\SysWOW64\slvmpfl.exe"C:\WINDOWS\SYSTEM32\slvmpfl.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\WINDOWS\SysWOW64\cvkxkar.exe"C:\WINDOWS\SYSTEM32\cvkxkar.exe" mElTC:\WINDOWS\SYSWOW64\SLVMPFL.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\CVKXKAR.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\WINDOWS\SysWOW64\jsvuvge.exe"C:\WINDOWS\SYSTEM32\jsvuvge.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\WINDOWS\SysWOW64\vmbkhsq.exe"C:\WINDOWS\SYSTEM32\vmbkhsq.exe" mElTC:\WINDOWS\SYSWOW64\JSVUVGE.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\VMBKHSQ.EXE6⤵PID:2068
-
C:\WINDOWS\SysWOW64\vbzpyat.exe"C:\WINDOWS\SYSTEM32\vbzpyat.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE7⤵PID:2304
-
C:\WINDOWS\SysWOW64\cuyvnub.exe"C:\WINDOWS\SYSTEM32\cuyvnub.exe" mElTC:\WINDOWS\SYSWOW64\VBZPYAT.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888
-
-
-
-
-
-
-
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\QXSKUEW.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:588
-
C:\WINDOWS\SysWOW64\qxskuew.exe"C:\WINDOWS\SYSTEM32\qxskuew.exe" mElTC:\WINDOWS\SYSWOW64\AHHCNNA.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:844
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\CUYVNUB.EXE1⤵PID:1812
-
C:\WINDOWS\SysWOW64\famxcmk.exe"C:\WINDOWS\SYSTEM32\famxcmk.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\WINDOWS\SysWOW64\srhatuq.exe"C:\WINDOWS\SYSTEM32\srhatuq.exe" mElTC:\WINDOWS\SYSWOW64\FAMXCMK.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\SRHATUQ.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2028 -
C:\WINDOWS\SysWOW64\memvtad.exe"C:\WINDOWS\SYSTEM32\memvtad.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1456 -
C:\WINDOWS\SysWOW64\zosfwsd.exe"C:\WINDOWS\SYSTEM32\zosfwsd.exe" mElTC:\WINDOWS\SYSWOW64\MEMVTAD.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2772 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\ZOSFWSD.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2128 -
C:\WINDOWS\SysWOW64\fwkifry.exe"C:\WINDOWS\SYSTEM32\fwkifry.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2568 -
C:\WINDOWS\SysWOW64\qvofpqf.exe"C:\WINDOWS\SYSTEM32\qvofpqf.exe" mElTC:\WINDOWS\SYSWOW64\FWKIFRY.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:476 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\QVOFPQF.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2856 -
C:\WINDOWS\SysWOW64\snfdimn.exe"C:\WINDOWS\SYSTEM32\snfdimn.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1220 -
C:\WINDOWS\SysWOW64\ajpizxq.exe"C:\WINDOWS\SYSTEM32\ajpizxq.exe" mElTC:\WINDOWS\SYSWOW64\SNFDIMN.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2652 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\AJPIZXQ.EXE13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:2504 -
C:\WINDOWS\SysWOW64\yjoltnp.exe"C:\WINDOWS\SYSTEM32\yjoltnp.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2200 -
C:\WINDOWS\SysWOW64\iiailmx.exe"C:\WINDOWS\SYSTEM32\iiailmx.exe" mElTC:\WINDOWS\SYSWOW64\YJOLTNP.EXE15⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1532 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\IIAILMX.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2364 -
C:\WINDOWS\SysWOW64\doqdgjm.exe"C:\WINDOWS\SYSTEM32\doqdgjm.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:2976 -
C:\WINDOWS\SysWOW64\drcwunq.exe"C:\WINDOWS\SYSTEM32\drcwunq.exe" mElTC:\WINDOWS\SYSWOW64\DOQDGJM.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2292 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\DRCWUNQ.EXE19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2344 -
C:\WINDOWS\SysWOW64\fnfgpox.exe"C:\WINDOWS\SYSTEM32\fnfgpox.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE20⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1804 -
C:\WINDOWS\SysWOW64\mvtykdg.exe"C:\WINDOWS\SYSTEM32\mvtykdg.exe" mElTC:\WINDOWS\SYSWOW64\FNFGPOX.EXE21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1668 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\MVTYKDG.EXE22⤵
- Executes dropped EXE
PID:2940 -
C:\WINDOWS\SysWOW64\oxtgwuy.exe"C:\WINDOWS\SYSTEM32\oxtgwuy.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE23⤵
- Executes dropped EXE
PID:2452 -
C:\WINDOWS\SysWOW64\ackbkdb.exe"C:\WINDOWS\SYSTEM32\ackbkdb.exe" mElTC:\WINDOWS\SYSWOW64\OXTGWUY.EXE24⤵
- Executes dropped EXE
PID:1372 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\ACKBKDB.EXE25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1728 -
C:\WINDOWS\SysWOW64\dmczczj.exe"C:\WINDOWS\SYSTEM32\dmczczj.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2780 -
C:\WINDOWS\SysWOW64\kuprwot.exe"C:\WINDOWS\SYSTEM32\kuprwot.exe" mElTC:\WINDOWS\SYSWOW64\DMCZCZJ.EXE27⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2840 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\KUPRWOT.EXE28⤵
- Executes dropped EXE
PID:2264 -
C:\WINDOWS\SysWOW64\flruudc.exe"C:\WINDOWS\SYSTEM32\flruudc.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE29⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1124 -
C:\WINDOWS\SysWOW64\psvrecc.exe"C:\WINDOWS\SYSTEM32\psvrecc.exe" mElTC:\WINDOWS\SYSWOW64\FLRUUDC.EXE30⤵
- Executes dropped EXE
PID:2444 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\PSVRECC.EXE31⤵
- Executes dropped EXE
PID:1392 -
C:\WINDOWS\SysWOW64\ostbexr.exe"C:\WINDOWS\SYSTEM32\ostbexr.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE32⤵
- Executes dropped EXE
PID:1180 -
C:\WINDOWS\SysWOW64\eebwikw.exe"C:\WINDOWS\SYSTEM32\eebwikw.exe" mElTC:\WINDOWS\SYSWOW64\OSTBEXR.EXE33⤵
- Executes dropped EXE
PID:2008 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\EEBWIKW.EXE34⤵
- Executes dropped EXE
PID:756 -
C:\WINDOWS\SysWOW64\voezpdm.exe"C:\WINDOWS\SYSTEM32\voezpdm.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE35⤵
- Executes dropped EXE
- Adds Run key to start application
PID:312 -
C:\WINDOWS\SysWOW64\nddwurv.exe"C:\WINDOWS\SYSTEM32\nddwurv.exe" mElTC:\WINDOWS\SYSWOW64\VOEZPDM.EXE36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1608 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\NDDWURV.EXE37⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2368 -
C:\WINDOWS\SysWOW64\ukxmzkz.exe"C:\WINDOWS\SYSTEM32\ukxmzkz.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE38⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\WINDOWS\SysWOW64\gmdclwe.exe"C:\WINDOWS\SYSTEM32\gmdclwe.exe" mElTC:\WINDOWS\SYSWOW64\UKXMZKZ.EXE39⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\GMDCLWE.EXE40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:784 -
C:\WINDOWS\SysWOW64\qeqkxhv.exe"C:\WINDOWS\SYSTEM32\qeqkxhv.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:952 -
C:\WINDOWS\SysWOW64\qxqcyjb.exe"C:\WINDOWS\SYSTEM32\qxqcyjb.exe" mElTC:\WINDOWS\SYSWOW64\QEQKXHV.EXE42⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\QXQCYJB.EXE43⤵
- Executes dropped EXE
PID:1140 -
C:\WINDOWS\SysWOW64\aucdsei.exe"C:\WINDOWS\SYSTEM32\aucdsei.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE44⤵
- Executes dropped EXE
PID:884 -
C:\WINDOWS\SysWOW64\wodjvjb.exe"C:\WINDOWS\SYSTEM32\wodjvjb.exe" mElTC:\WINDOWS\SYSWOW64\AUCDSEI.EXE45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2140 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\WODJVJB.EXE46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2468 -
C:\WINDOWS\SysWOW64\gkdkbcr.exe"C:\WINDOWS\SYSTEM32\gkdkbcr.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2252 -
C:\WINDOWS\SysWOW64\naycvrb.exe"C:\WINDOWS\SYSTEM32\naycvrb.exe" mElTC:\WINDOWS\SYSWOW64\GKDKBCR.EXE48⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2960 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\NAYCVRB.EXE49⤵
- Executes dropped EXE
PID:2092 -
C:\WINDOWS\SysWOW64\nhohmie.exe"C:\WINDOWS\SYSTEM32\nhohmie.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE50⤵
- Executes dropped EXE
PID:2888 -
C:\WINDOWS\SysWOW64\klrhtpx.exe"C:\WINDOWS\SYSTEM32\klrhtpx.exe" mElTC:\WINDOWS\SYSWOW64\NHOHMIE.EXE51⤵
- Executes dropped EXE
PID:2688 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\KLRHTPX.EXE52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1956 -
C:\WINDOWS\SysWOW64\lzvuicn.exe"C:\WINDOWS\SYSTEM32\lzvuicn.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE53⤵PID:1036
-
C:\WINDOWS\SysWOW64\wvwnpxo.exe"C:\WINDOWS\SYSTEM32\wvwnpxo.exe" mElTC:\WINDOWS\SYSWOW64\LZVUICN.EXE54⤵
- Drops file in System32 directory
PID:1644 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\WVWNPXO.EXE55⤵PID:1148
-
C:\WINDOWS\SysWOW64\aebsgxj.exe"C:\WINDOWS\SYSTEM32\aebsgxj.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE56⤵
- Drops file in System32 directory
PID:2032 -
C:\WINDOWS\SysWOW64\sopknvk.exe"C:\WINDOWS\SYSTEM32\sopknvk.exe" mElTC:\WINDOWS\SYSWOW64\AEBSGXJ.EXE57⤵
- Adds Run key to start application
PID:2324 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\SOPKNVK.EXE58⤵PID:3004
-
C:\WINDOWS\SysWOW64\rszfdpn.exe"C:\WINDOWS\SYSTEM32\rszfdpn.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE59⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1504 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\RSZFDPN.EXE60⤵PID:2384
-
C:\WINDOWS\SysWOW64\bprhhew.exe"C:\WINDOWS\SYSTEM32\bprhhew.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE61⤵PID:2228
-
C:\WINDOWS\SysWOW64\ilcesbj.exe"C:\WINDOWS\SYSTEM32\ilcesbj.exe" mElTC:\WINDOWS\SYSWOW64\BPRHHEW.EXE62⤵
- Drops file in System32 directory
PID:1660 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\ILCESBJ.EXE63⤵PID:1928
-
C:\WINDOWS\SysWOW64\khfhncy.exe"C:\WINDOWS\SYSTEM32\khfhncy.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE64⤵PID:2232
-
C:\WINDOWS\SysWOW64\zpqputt.exe"C:\WINDOWS\SYSTEM32\zpqputt.exe" mElTC:\WINDOWS\SYSWOW64\KHFHNCY.EXE65⤵
- Adds Run key to start application
PID:2872 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\ZPQPUTT.EXE66⤵PID:2836
-
C:\WINDOWS\SysWOW64\rhbrbmj.exe"C:\WINDOWS\SYSTEM32\rhbrbmj.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE67⤵
- Drops file in System32 directory
PID:2416 -
C:\WINDOWS\SysWOW64\eulphqq.exe"C:\WINDOWS\SYSTEM32\eulphqq.exe" mElTC:\WINDOWS\SYSWOW64\RHBRBMJ.EXE68⤵
- Adds Run key to start application
PID:2568 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\EULPHQQ.EXE69⤵PID:780
-
C:\WINDOWS\SysWOW64\dtizhlf.exe"C:\WINDOWS\SYSTEM32\dtizhlf.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE70⤵PID:2156
-
C:\WINDOWS\SysWOW64\tjtznvb.exe"C:\WINDOWS\SYSTEM32\tjtznvb.exe" mElTC:\WINDOWS\SYSWOW64\DTIZHLF.EXE71⤵PID:1392
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\TJTZNVB.EXE72⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1700 -
C:\WINDOWS\SysWOW64\sfoekms.exe"C:\WINDOWS\SYSTEM32\sfoekms.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE73⤵
- Drops file in System32 directory
PID:2008 -
C:\WINDOWS\SysWOW64\fsxuqpq.exe"C:\WINDOWS\SYSTEM32\fsxuqpq.exe" mElTC:\WINDOWS\SYSWOW64\SFOEKMS.EXE74⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1100 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\FSXUQPQ.EXE75⤵
- Adds Run key to start application
PID:2172 -
C:\WINDOWS\SysWOW64\ftgnkca.exe"C:\WINDOWS\SYSTEM32\ftgnkca.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE76⤵
- Drops file in System32 directory
PID:2272 -
C:\WINDOWS\SysWOW64\sjbhbkg.exe"C:\WINDOWS\SYSTEM32\sjbhbkg.exe" mElTC:\WINDOWS\SYSWOW64\FTGNKCA.EXE77⤵PID:3044
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\SJBHBKG.EXE78⤵PID:1652
-
C:\WINDOWS\SysWOW64\rccavxq.exe"C:\WINDOWS\SYSTEM32\rccavxq.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE79⤵
- Drops file in System32 directory
PID:3004 -
C:\WINDOWS\SysWOW64\bboxfwp.exe"C:\WINDOWS\SYSTEM32\bboxfwp.exe" mElTC:\WINDOWS\SYSWOW64\RCCAVXQ.EXE80⤵PID:1168
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\BBOXFWP.EXE81⤵PID:1212
-
C:\WINDOWS\SysWOW64\ttrinof.exe"C:\WINDOWS\SYSTEM32\ttrinof.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE82⤵PID:2132
-
C:\WINDOWS\SysWOW64\hujnqzz.exe"C:\WINDOWS\SYSTEM32\hujnqzz.exe" mElTC:\WINDOWS\SYSWOW64\TTRINOF.EXE83⤵PID:616
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\HUJNQZZ.EXE84⤵
- Adds Run key to start application
PID:2220 -
C:\WINDOWS\SysWOW64\fkqnjye.exe"C:\WINDOWS\SYSTEM32\fkqnjye.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE85⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1928 -
C:\WINDOWS\SysWOW64\mosabrh.exe"C:\WINDOWS\SYSTEM32\mosabrh.exe" mElTC:\WINDOWS\SYSWOW64\FKQNJYE.EXE86⤵PID:2084
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\MOSABRH.EXE87⤵
- Drops file in System32 directory
PID:2844 -
C:\WINDOWS\SysWOW64\hjfqtlp.exe"C:\WINDOWS\SYSTEM32\hjfqtlp.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE88⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2836 -
C:\WINDOWS\SysWOW64\rtuaood.exe"C:\WINDOWS\SYSTEM32\rtuaood.exe" mElTC:\WINDOWS\SYSWOW64\HJFQTLP.EXE89⤵
- Adds Run key to start application
PID:1124 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\RTUAOOD.EXE90⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1404 -
C:\WINDOWS\SysWOW64\alhitzn.exe"C:\WINDOWS\SYSTEM32\alhitzn.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE91⤵PID:780
-
C:\WINDOWS\SysWOW64\ncddduc.exe"C:\WINDOWS\SYSTEM32\ncddduc.exe" mElTC:\WINDOWS\SYSWOW64\ALHITZN.EXE92⤵
- Drops file in System32 directory
PID:2156 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\NCDDDUC.EXE93⤵
- Drops file in System32 directory
PID:1392 -
C:\WINDOWS\SysWOW64\krkdwtp.exe"C:\WINDOWS\SYSTEM32\krkdwtp.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE94⤵
- Drops file in System32 directory
PID:1768 -
C:\WINDOWS\SysWOW64\rljitvy.exe"C:\WINDOWS\SYSTEM32\rljitvy.exe" mElTC:\WINDOWS\SYSWOW64\KRKDWTP.EXE95⤵PID:1576
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\RLJITVY.EXE96⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2364 -
C:\WINDOWS\SysWOW64\ombvpyj.exe"C:\WINDOWS\SYSTEM32\ombvpyj.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE97⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1528 -
C:\WINDOWS\SysWOW64\avwqstz.exe"C:\WINDOWS\SYSTEM32\avwqstz.exe" mElTC:\WINDOWS\SYSWOW64\OMBVPYJ.EXE98⤵
- Drops file in System32 directory
PID:1036 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\AVWQSTZ.EXE99⤵PID:1268
-
C:\WINDOWS\SysWOW64\pzdgxov.exe"C:\WINDOWS\SYSTEM32\pzdgxov.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE100⤵PID:1500
-
C:\WINDOWS\SysWOW64\uilbotb.exe"C:\WINDOWS\SYSTEM32\uilbotb.exe" mElTC:\WINDOWS\SYSWOW64\PZDGXOV.EXE101⤵
- Adds Run key to start application
PID:2544 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\UILBOTB.EXE102⤵
- Adds Run key to start application
PID:1936 -
C:\WINDOWS\SysWOW64\qjcmvaa.exe"C:\WINDOWS\SYSTEM32\qjcmvaa.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE103⤵
- Drops file in System32 directory
PID:1140 -
C:\WINDOWS\SysWOW64\cdjmizo.exe"C:\WINDOWS\SYSTEM32\cdjmizo.exe" mElTC:\WINDOWS\SYSWOW64\QJCMVAA.EXE104⤵PID:2828
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\CDJMIZO.EXE105⤵
- Adds Run key to start application
PID:1456 -
C:\WINDOWS\SysWOW64\cwswcmy.exe"C:\WINDOWS\SYSTEM32\cwswcmy.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE106⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2784 -
C:\WINDOWS\SysWOW64\rpormza.exe"C:\WINDOWS\SYSTEM32\rpormza.exe" mElTC:\WINDOWS\SYSWOW64\CWSWCMY.EXE107⤵PID:2736
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\RPORMZA.EXE108⤵
- Drops file in System32 directory
PID:2468 -
C:\WINDOWS\SysWOW64\jirutsq.exe"C:\WINDOWS\SYSTEM32\jirutsq.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE109⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2136 -
C:\WINDOWS\SysWOW64\raquahu.exe"C:\WINDOWS\SYSTEM32\raquahu.exe" mElTC:\WINDOWS\SYSWOW64\JIRUTSQ.EXE110⤵PID:1484
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\RAQUAHU.EXE111⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2768 -
C:\WINDOWS\SysWOW64\lggpdej.exe"C:\WINDOWS\SYSTEM32\lggpdej.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE112⤵
- Adds Run key to start application
PID:2012 -
C:\WINDOWS\SysWOW64\nujzyfq.exe"C:\WINDOWS\SYSTEM32\nujzyfq.exe" mElTC:\WINDOWS\SYSWOW64\LGGPDEJ.EXE113⤵PID:1712
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\NUJZYFQ.EXE114⤵PID:568
-
C:\WINDOWS\SysWOW64\fjhxpnb.exe"C:\WINDOWS\SYSTEM32\fjhxpnb.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE115⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1104 -
C:\WINDOWS\SysWOW64\pilchmb.exe"C:\WINDOWS\SYSTEM32\pilchmb.exe" mElTC:\WINDOWS\SYSWOW64\FJHXPNB.EXE116⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1148 -
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\PILCHMB.EXE117⤵
- Drops file in System32 directory
PID:1144 -
C:\WINDOWS\SysWOW64\kfpunwa.exe"C:\WINDOWS\SYSTEM32\kfpunwa.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE118⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:440 -
C:\WINDOWS\SysWOW64\prdixpu.exe"C:\WINDOWS\SYSTEM32\prdixpu.exe" mElTC:\WINDOWS\SYSWOW64\KFPUNWA.EXE119⤵PID:2088
-
C:\WINDOWS\SysWOW64\WNLOGON.exe"C:\WINDOWS\SYSTEM32\WNLOGON.exe" mElTC:\WINDOWS\SYSWOW64\PRDIXPU.EXE120⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1652 -
C:\WINDOWS\SysWOW64\supqijn.exe"C:\WINDOWS\SYSTEM32\supqijn.exe" mElTC:\WINDOWS\SYSWOW64\WNLOGON.EXE121⤵PID:1992
-
C:\WINDOWS\SysWOW64\nksjdhr.exe"C:\WINDOWS\SYSTEM32\nksjdhr.exe" mElTC:\WINDOWS\SYSWOW64\SUPQIJN.EXE122⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2384
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-