Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
acad2392f55ee3b75ee914661f7f1613.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acad2392f55ee3b75ee914661f7f1613.exe
Resource
win10v2004-20240226-en
General
-
Target
acad2392f55ee3b75ee914661f7f1613.exe
-
Size
263KB
-
MD5
acad2392f55ee3b75ee914661f7f1613
-
SHA1
aabc5065a60f23dda114fbe4240f1e4b8b533842
-
SHA256
c664712f1f4ba717816eed9c15d4d05f48a91bc5280d8ed1080f083c52a01a90
-
SHA512
1407546cc77c508a1b15c622306b69c44828f02b4bf25615751328df0c3badb3a09dae9aa69453673f3e44ceb74a8ae9e4ca3408884b6973ab116802a532e909
-
SSDEEP
3072:ZYUb5QoJ4g+Ri+Zj6Iz1ZdW4SrO7FSVpuh:ZY7xh6SZI4z7FSVpuh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wkciuri.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation whkivecl.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wwutidkw.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wfvqur.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wpvclved.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wvleesaf.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wvmq.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wkmol.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wwowrk.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wjgjggt.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wpele.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wgoemid.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wih.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation waefoxt.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wwg.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation whpvj.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation waqtkqv.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wntf.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wmikhjk.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wigsog.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wmoquo.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wxuyua.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wxqvc.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wgtju.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wto.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wnrd.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wcecyrj.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wbbrrydx.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wsnyq.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wbxrsdd.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation whxbrmyl.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation woqb.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wsuo.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wtfbsk.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wgmn.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wmbscqs.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wvims.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wgue.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wuopvi.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wnpycpye.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wdrijy.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wgollkiao.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wriuej.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wwaqwqnd.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wlsat.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wwtqsmro.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wkjwkgp.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wtqrm.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wybqlyx.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wdtmwy.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wxolaswyw.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wnkuu.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wwjukawh.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wkbawufss.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wuoxjviw.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wxryq.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wbntvt.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wunmr.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation walmh.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wshhru.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wck.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wxpbg.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wgwpp.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation wxnpjcl.exe -
Executes dropped EXE 64 IoCs
pid Process 4336 wkbcrv.exe 3176 wdyyy.exe 4220 wwowrk.exe 4312 wlhfogt.exe 2268 wjgjggt.exe 3268 wsawlja.exe 1224 wvfx.exe 4060 wgue.exe 3120 wuonmpaea.exe 4372 wixj.exe 372 wfxm.exe 4576 wwbdovc.exe 4952 wtmqmwld.exe 1428 wibsoo.exe 1384 wfvqur.exe 4616 wxuyua.exe 4264 wqvhu.exe 1296 wuoxjviw.exe 608 wxqvc.exe 4892 wrkxxi.exe 2880 woso.exe 5112 wehdrjs.exe 1384 wpele.exe 812 whodlpvi.exe 2872 wuopvi.exe 1800 wgoemid.exe 3276 wdoiekd.exe 372 waxw.exe 960 wwjlcnwtx.exe 3820 wkjwkgp.exe 4804 wmrib.exe 5112 waqtkqv.exe 2724 wxci.exe 2364 wclpoc.exe 3192 wlwewfweq.exe 5060 wpfjeoos.exe 2540 wnpycpye.exe 4440 wwqou.exe 3008 wtqrm.exe 2396 wykkyepfn.exe 1508 whdxe.exe 1384 wrwkjj.exe 2312 wnavunfrb.exe 3552 wveufr.exe 4984 wshhru.exe 4892 wklwm.exe 3944 wcecyrj.exe 4420 wxryq.exe 1004 wpkfej.exe 1532 wddpadtd.exe 4912 wdrijy.exe 4968 wpvclved.exe 1052 wmynwyg.exe 2332 wriuej.exe 4424 wnwrwok.exe 2968 wjntcq.exe 4432 wkcn.exe 2432 wsub.exe 1388 wgollkiao.exe 4620 wgmn.exe 3584 wpgbgjpk.exe 436 wypefllp.exe 4104 wacxoh.exe 4928 wvgjylduv.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wrwkjj.exe whdxe.exe File created C:\Windows\SysWOW64\wntf.exe wvims.exe File created C:\Windows\SysWOW64\wcplbu.exe wbbrrydx.exe File created C:\Windows\SysWOW64\wibsoo.exe wtmqmwld.exe File opened for modification C:\Windows\SysWOW64\wxqvc.exe wuoxjviw.exe File opened for modification C:\Windows\SysWOW64\wtqrm.exe wwqou.exe File created C:\Windows\SysWOW64\wpgbgjpk.exe wgmn.exe File created C:\Windows\SysWOW64\wacxoh.exe wypefllp.exe File created C:\Windows\SysWOW64\walmh.exe wgwpp.exe File created C:\Windows\SysWOW64\wvkb.exe wobtnk.exe File created C:\Windows\SysWOW64\wuopvi.exe whodlpvi.exe File opened for modification C:\Windows\SysWOW64\wuopvi.exe whodlpvi.exe File opened for modification C:\Windows\SysWOW64\woqb.exe wbxrsdd.exe File opened for modification C:\Windows\SysWOW64\wvmq.exe wdtmwy.exe File created C:\Windows\SysWOW64\wkmol.exe wwjukawh.exe File opened for modification C:\Windows\SysWOW64\wmikhjk.exe wdpwcgf.exe File opened for modification C:\Windows\SysWOW64\wakw.exe wkbawufss.exe File created C:\Windows\SysWOW64\wuonmpaea.exe wgue.exe File created C:\Windows\SysWOW64\wfwad.exe wbntvt.exe File opened for modification C:\Windows\SysWOW64\wigsog.exe wemcbu.exe File created C:\Windows\SysWOW64\waxw.exe wdoiekd.exe File created C:\Windows\SysWOW64\whdxe.exe wykkyepfn.exe File created C:\Windows\SysWOW64\wgwpp.exe wunmr.exe File created C:\Windows\SysWOW64\wyrupbvs.exe wedyxvj.exe File created C:\Windows\SysWOW64\wemcbu.exe wmikhjk.exe File opened for modification C:\Windows\SysWOW64\wdrijy.exe wddpadtd.exe File opened for modification C:\Windows\SysWOW64\wacxoh.exe wypefllp.exe File opened for modification C:\Windows\SysWOW64\wxryq.exe wcecyrj.exe File opened for modification C:\Windows\SysWOW64\woqoo.exe wsncc.exe File created C:\Windows\SysWOW64\wck.exe woqb.exe File opened for modification C:\Windows\SysWOW64\wbfof.exe wmbscqs.exe File opened for modification C:\Windows\SysWOW64\wdpwcgf.exe wdnoyk.exe File created C:\Windows\SysWOW64\wqkfkj.exe wigsog.exe File opened for modification C:\Windows\SysWOW64\wgue.exe wvfx.exe File opened for modification C:\Windows\SysWOW64\wwbdovc.exe wfxm.exe File opened for modification C:\Windows\SysWOW64\wwjlcnwtx.exe waxw.exe File created C:\Windows\SysWOW64\wmrib.exe wkjwkgp.exe File opened for modification C:\Windows\SysWOW64\wwutidkw.exe wrkmb.exe File created C:\Windows\SysWOW64\wqvhu.exe wxuyua.exe File created C:\Windows\SysWOW64\wgoemid.exe wuopvi.exe File opened for modification C:\Windows\SysWOW64\wkmol.exe wwjukawh.exe File created C:\Windows\SysWOW64\wwbuqoqxh.exe wgwgvb.exe File created C:\Windows\SysWOW64\wnwrwok.exe wriuej.exe File opened for modification C:\Windows\SysWOW64\wto.exe wxlkofh.exe File opened for modification C:\Windows\SysWOW64\wgplee.exe wck.exe File created C:\Windows\SysWOW64\woqoo.exe wsncc.exe File created C:\Windows\SysWOW64\wotxpiidl.exe woqoo.exe File opened for modification C:\Windows\SysWOW64\wvleesaf.exe wehoki.exe File created C:\Windows\SysWOW64\wwg.exe waefoxt.exe File created C:\Windows\SysWOW64\wtfbsk.exe wsuo.exe File created C:\Windows\SysWOW64\wsawlja.exe wjgjggt.exe File opened for modification C:\Windows\SysWOW64\wqvhu.exe wxuyua.exe File created C:\Windows\SysWOW64\wbbrrydx.exe wmtsdeff.exe File opened for modification C:\Windows\SysWOW64\wtywa.exe wfykpw.exe File opened for modification C:\Windows\SysWOW64\wuoxjviw.exe wqvhu.exe File opened for modification C:\Windows\SysWOW64\wypefllp.exe wpgbgjpk.exe File created C:\Windows\SysWOW64\wwjukawh.exe wfef.exe File opened for modification C:\Windows\SysWOW64\wmoquo.exe wqkfkj.exe File opened for modification C:\Windows\SysWOW64\wtmqmwld.exe wwbdovc.exe File opened for modification C:\Windows\SysWOW64\wfvqur.exe wibsoo.exe File opened for modification C:\Windows\SysWOW64\wwaqwqnd.exe wfwad.exe File created C:\Windows\SysWOW64\wwtqsmro.exe wkciuri.exe File created C:\Windows\SysWOW64\waefoxt.exe wnkuu.exe File opened for modification C:\Windows\SysWOW64\whpvj.exe wtfbsk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 3552 2364 WerFault.exe 196 1724 3192 WerFault.exe 199 2708 1508 WerFault.exe 221 228 4928 WerFault.exe 292 1112 4928 WerFault.exe 292 3208 1376 WerFault.exe 317 4148 2880 WerFault.exe 412 1344 2880 WerFault.exe 412 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 4336 2724 acad2392f55ee3b75ee914661f7f1613.exe 91 PID 2724 wrote to memory of 4336 2724 acad2392f55ee3b75ee914661f7f1613.exe 91 PID 2724 wrote to memory of 4336 2724 acad2392f55ee3b75ee914661f7f1613.exe 91 PID 2724 wrote to memory of 4920 2724 acad2392f55ee3b75ee914661f7f1613.exe 93 PID 2724 wrote to memory of 4920 2724 acad2392f55ee3b75ee914661f7f1613.exe 93 PID 2724 wrote to memory of 4920 2724 acad2392f55ee3b75ee914661f7f1613.exe 93 PID 4336 wrote to memory of 3176 4336 wkbcrv.exe 95 PID 4336 wrote to memory of 3176 4336 wkbcrv.exe 95 PID 4336 wrote to memory of 3176 4336 wkbcrv.exe 95 PID 4336 wrote to memory of 4348 4336 wkbcrv.exe 97 PID 4336 wrote to memory of 4348 4336 wkbcrv.exe 97 PID 4336 wrote to memory of 4348 4336 wkbcrv.exe 97 PID 3176 wrote to memory of 4220 3176 wdyyy.exe 99 PID 3176 wrote to memory of 4220 3176 wdyyy.exe 99 PID 3176 wrote to memory of 4220 3176 wdyyy.exe 99 PID 3176 wrote to memory of 2200 3176 wdyyy.exe 100 PID 3176 wrote to memory of 2200 3176 wdyyy.exe 100 PID 3176 wrote to memory of 2200 3176 wdyyy.exe 100 PID 4220 wrote to memory of 4312 4220 wwowrk.exe 103 PID 4220 wrote to memory of 4312 4220 wwowrk.exe 103 PID 4220 wrote to memory of 4312 4220 wwowrk.exe 103 PID 4220 wrote to memory of 4172 4220 wwowrk.exe 104 PID 4220 wrote to memory of 4172 4220 wwowrk.exe 104 PID 4220 wrote to memory of 4172 4220 wwowrk.exe 104 PID 4312 wrote to memory of 2268 4312 wlhfogt.exe 106 PID 4312 wrote to memory of 2268 4312 wlhfogt.exe 106 PID 4312 wrote to memory of 2268 4312 wlhfogt.exe 106 PID 4312 wrote to memory of 3904 4312 wlhfogt.exe 108 PID 4312 wrote to memory of 3904 4312 wlhfogt.exe 108 PID 4312 wrote to memory of 3904 4312 wlhfogt.exe 108 PID 2268 wrote to memory of 3268 2268 wjgjggt.exe 109 PID 2268 wrote to memory of 3268 2268 wjgjggt.exe 109 PID 2268 wrote to memory of 3268 2268 wjgjggt.exe 109 PID 2268 wrote to memory of 3784 2268 wjgjggt.exe 111 PID 2268 wrote to memory of 3784 2268 wjgjggt.exe 111 PID 2268 wrote to memory of 3784 2268 wjgjggt.exe 111 PID 3268 wrote to memory of 1224 3268 wsawlja.exe 112 PID 3268 wrote to memory of 1224 3268 wsawlja.exe 112 PID 3268 wrote to memory of 1224 3268 wsawlja.exe 112 PID 3268 wrote to memory of 1380 3268 wsawlja.exe 113 PID 3268 wrote to memory of 1380 3268 wsawlja.exe 113 PID 3268 wrote to memory of 1380 3268 wsawlja.exe 113 PID 1224 wrote to memory of 4060 1224 wvfx.exe 115 PID 1224 wrote to memory of 4060 1224 wvfx.exe 115 PID 1224 wrote to memory of 4060 1224 wvfx.exe 115 PID 1224 wrote to memory of 4912 1224 wvfx.exe 116 PID 1224 wrote to memory of 4912 1224 wvfx.exe 116 PID 1224 wrote to memory of 4912 1224 wvfx.exe 116 PID 4060 wrote to memory of 3120 4060 wgue.exe 120 PID 4060 wrote to memory of 3120 4060 wgue.exe 120 PID 4060 wrote to memory of 3120 4060 wgue.exe 120 PID 4060 wrote to memory of 5104 4060 wgue.exe 118 PID 4060 wrote to memory of 5104 4060 wgue.exe 118 PID 4060 wrote to memory of 5104 4060 wgue.exe 118 PID 3120 wrote to memory of 4372 3120 wuonmpaea.exe 121 PID 3120 wrote to memory of 4372 3120 wuonmpaea.exe 121 PID 3120 wrote to memory of 4372 3120 wuonmpaea.exe 121 PID 3120 wrote to memory of 3432 3120 wuonmpaea.exe 123 PID 3120 wrote to memory of 3432 3120 wuonmpaea.exe 123 PID 3120 wrote to memory of 3432 3120 wuonmpaea.exe 123 PID 4372 wrote to memory of 372 4372 wixj.exe 124 PID 4372 wrote to memory of 372 4372 wixj.exe 124 PID 4372 wrote to memory of 372 4372 wixj.exe 124 PID 4372 wrote to memory of 2292 4372 wixj.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\acad2392f55ee3b75ee914661f7f1613.exe"C:\Users\Admin\AppData\Local\Temp\acad2392f55ee3b75ee914661f7f1613.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\wkbcrv.exe"C:\Windows\system32\wkbcrv.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\wdyyy.exe"C:\Windows\system32\wdyyy.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\SysWOW64\wwowrk.exe"C:\Windows\system32\wwowrk.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\wlhfogt.exe"C:\Windows\system32\wlhfogt.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Windows\SysWOW64\wjgjggt.exe"C:\Windows\system32\wjgjggt.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\wsawlja.exe"C:\Windows\system32\wsawlja.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\wvfx.exe"C:\Windows\system32\wvfx.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\wgue.exe"C:\Windows\system32\wgue.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wgue.exe"10⤵PID:5104
-
-
C:\Windows\SysWOW64\wuonmpaea.exe"C:\Windows\system32\wuonmpaea.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\wixj.exe"C:\Windows\system32\wixj.exe"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\wfxm.exe"C:\Windows\system32\wfxm.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:372 -
C:\Windows\SysWOW64\wwbdovc.exe"C:\Windows\system32\wwbdovc.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4576 -
C:\Windows\SysWOW64\wtmqmwld.exe"C:\Windows\system32\wtmqmwld.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4952 -
C:\Windows\SysWOW64\wibsoo.exe"C:\Windows\system32\wibsoo.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1428 -
C:\Windows\SysWOW64\wfvqur.exe"C:\Windows\system32\wfvqur.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
PID:1384 -
C:\Windows\SysWOW64\wxuyua.exe"C:\Windows\system32\wxuyua.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4616 -
C:\Windows\SysWOW64\wqvhu.exe"C:\Windows\system32\wqvhu.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4264 -
C:\Windows\SysWOW64\wuoxjviw.exe"C:\Windows\system32\wuoxjviw.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1296 -
C:\Windows\SysWOW64\wxqvc.exe"C:\Windows\system32\wxqvc.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
PID:608 -
C:\Windows\SysWOW64\wrkxxi.exe"C:\Windows\system32\wrkxxi.exe"21⤵
- Executes dropped EXE
PID:4892 -
C:\Windows\SysWOW64\woso.exe"C:\Windows\system32\woso.exe"22⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\wehdrjs.exe"C:\Windows\system32\wehdrjs.exe"23⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\wpele.exe"C:\Windows\system32\wpele.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:1384 -
C:\Windows\SysWOW64\whodlpvi.exe"C:\Windows\system32\whodlpvi.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:812 -
C:\Windows\SysWOW64\wuopvi.exe"C:\Windows\system32\wuopvi.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2872 -
C:\Windows\SysWOW64\wgoemid.exe"C:\Windows\system32\wgoemid.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\wdoiekd.exe"C:\Windows\system32\wdoiekd.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3276 -
C:\Windows\SysWOW64\waxw.exe"C:\Windows\system32\waxw.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:372 -
C:\Windows\SysWOW64\wwjlcnwtx.exe"C:\Windows\system32\wwjlcnwtx.exe"30⤵
- Executes dropped EXE
PID:960 -
C:\Windows\SysWOW64\wkjwkgp.exe"C:\Windows\system32\wkjwkgp.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3820 -
C:\Windows\SysWOW64\wmrib.exe"C:\Windows\system32\wmrib.exe"32⤵
- Executes dropped EXE
PID:4804 -
C:\Windows\SysWOW64\waqtkqv.exe"C:\Windows\system32\waqtkqv.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\wxci.exe"C:\Windows\system32\wxci.exe"34⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\wclpoc.exe"C:\Windows\system32\wclpoc.exe"35⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\wlwewfweq.exe"C:\Windows\system32\wlwewfweq.exe"36⤵
- Executes dropped EXE
PID:3192 -
C:\Windows\SysWOW64\wpfjeoos.exe"C:\Windows\system32\wpfjeoos.exe"37⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\SysWOW64\wnpycpye.exe"C:\Windows\system32\wnpycpye.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\wwqou.exe"C:\Windows\system32\wwqou.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4440 -
C:\Windows\SysWOW64\wtqrm.exe"C:\Windows\system32\wtqrm.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\wykkyepfn.exe"C:\Windows\system32\wykkyepfn.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2396 -
C:\Windows\SysWOW64\whdxe.exe"C:\Windows\system32\whdxe.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\wrwkjj.exe"C:\Windows\system32\wrwkjj.exe"43⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\SysWOW64\wnavunfrb.exe"C:\Windows\system32\wnavunfrb.exe"44⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\wveufr.exe"C:\Windows\system32\wveufr.exe"45⤵
- Executes dropped EXE
PID:3552 -
C:\Windows\SysWOW64\wshhru.exe"C:\Windows\system32\wshhru.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\wklwm.exe"C:\Windows\system32\wklwm.exe"47⤵
- Executes dropped EXE
PID:4892 -
C:\Windows\SysWOW64\wcecyrj.exe"C:\Windows\system32\wcecyrj.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3944 -
C:\Windows\SysWOW64\wxryq.exe"C:\Windows\system32\wxryq.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:4420 -
C:\Windows\SysWOW64\wpkfej.exe"C:\Windows\system32\wpkfej.exe"50⤵
- Executes dropped EXE
PID:1004 -
C:\Windows\SysWOW64\wddpadtd.exe"C:\Windows\system32\wddpadtd.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\wdrijy.exe"C:\Windows\system32\wdrijy.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
PID:4912 -
C:\Windows\SysWOW64\wpvclved.exe"C:\Windows\system32\wpvclved.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:4968 -
C:\Windows\SysWOW64\wmynwyg.exe"C:\Windows\system32\wmynwyg.exe"54⤵
- Executes dropped EXE
PID:1052 -
C:\Windows\SysWOW64\wriuej.exe"C:\Windows\system32\wriuej.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2332 -
C:\Windows\SysWOW64\wnwrwok.exe"C:\Windows\system32\wnwrwok.exe"56⤵
- Executes dropped EXE
PID:4424 -
C:\Windows\SysWOW64\wjntcq.exe"C:\Windows\system32\wjntcq.exe"57⤵
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\wkcn.exe"C:\Windows\system32\wkcn.exe"58⤵
- Executes dropped EXE
PID:4432 -
C:\Windows\SysWOW64\wsub.exe"C:\Windows\system32\wsub.exe"59⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\wgollkiao.exe"C:\Windows\system32\wgollkiao.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
PID:1388 -
C:\Windows\SysWOW64\wgmn.exe"C:\Windows\system32\wgmn.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4620 -
C:\Windows\SysWOW64\wpgbgjpk.exe"C:\Windows\system32\wpgbgjpk.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3584 -
C:\Windows\SysWOW64\wypefllp.exe"C:\Windows\system32\wypefllp.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:436 -
C:\Windows\SysWOW64\wacxoh.exe"C:\Windows\system32\wacxoh.exe"64⤵
- Executes dropped EXE
PID:4104 -
C:\Windows\SysWOW64\wvgjylduv.exe"C:\Windows\system32\wvgjylduv.exe"65⤵
- Executes dropped EXE
PID:4928 -
C:\Windows\SysWOW64\wixsufo.exe"C:\Windows\system32\wixsufo.exe"66⤵PID:1052
-
C:\Windows\SysWOW64\wbntvt.exe"C:\Windows\system32\wbntvt.exe"67⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\wfwad.exe"C:\Windows\system32\wfwad.exe"68⤵
- Drops file in System32 directory
PID:3200 -
C:\Windows\SysWOW64\wwaqwqnd.exe"C:\Windows\system32\wwaqwqnd.exe"69⤵
- Checks computer location settings
PID:2124 -
C:\Windows\SysWOW64\wlsat.exe"C:\Windows\system32\wlsat.exe"70⤵
- Checks computer location settings
PID:4844 -
C:\Windows\SysWOW64\wxlkofh.exe"C:\Windows\system32\wxlkofh.exe"71⤵
- Drops file in System32 directory
PID:3624 -
C:\Windows\SysWOW64\wto.exe"C:\Windows\system32\wto.exe"72⤵
- Checks computer location settings
PID:1376 -
C:\Windows\SysWOW64\wsnyq.exe"C:\Windows\system32\wsnyq.exe"73⤵
- Checks computer location settings
PID:3708 -
C:\Windows\SysWOW64\wih.exe"C:\Windows\system32\wih.exe"74⤵
- Checks computer location settings
PID:2304 -
C:\Windows\SysWOW64\wromkb.exe"C:\Windows\system32\wromkb.exe"75⤵PID:4028
-
C:\Windows\SysWOW64\wunmr.exe"C:\Windows\system32\wunmr.exe"76⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3492 -
C:\Windows\SysWOW64\wgwpp.exe"C:\Windows\system32\wgwpp.exe"77⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3768 -
C:\Windows\SysWOW64\walmh.exe"C:\Windows\system32\walmh.exe"78⤵
- Checks computer location settings
PID:4868 -
C:\Windows\SysWOW64\wsncc.exe"C:\Windows\system32\wsncc.exe"79⤵
- Drops file in System32 directory
PID:1836 -
C:\Windows\SysWOW64\woqoo.exe"C:\Windows\system32\woqoo.exe"80⤵
- Drops file in System32 directory
PID:5032 -
C:\Windows\SysWOW64\wotxpiidl.exe"C:\Windows\system32\wotxpiidl.exe"81⤵PID:4156
-
C:\Windows\SysWOW64\wbxrsdd.exe"C:\Windows\system32\wbxrsdd.exe"82⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3624 -
C:\Windows\SysWOW64\woqb.exe"C:\Windows\system32\woqb.exe"83⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3652 -
C:\Windows\SysWOW64\wck.exe"C:\Windows\system32\wck.exe"84⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\wgplee.exe"C:\Windows\system32\wgplee.exe"85⤵PID:1296
-
C:\Windows\SysWOW64\wehoki.exe"C:\Windows\system32\wehoki.exe"86⤵
- Drops file in System32 directory
PID:4856 -
C:\Windows\SysWOW64\wvleesaf.exe"C:\Windows\system32\wvleesaf.exe"87⤵
- Checks computer location settings
PID:3276 -
C:\Windows\SysWOW64\wrybv.exe"C:\Windows\system32\wrybv.exe"88⤵PID:2696
-
C:\Windows\SysWOW64\wnrd.exe"C:\Windows\system32\wnrd.exe"89⤵
- Checks computer location settings
PID:4556 -
C:\Windows\SysWOW64\wmfwkx.exe"C:\Windows\system32\wmfwkx.exe"90⤵PID:2664
-
C:\Windows\SysWOW64\wnsp.exe"C:\Windows\system32\wnsp.exe"91⤵PID:3284
-
C:\Windows\SysWOW64\wblyo.exe"C:\Windows\system32\wblyo.exe"92⤵PID:1768
-
C:\Windows\SysWOW64\wxolaswyw.exe"C:\Windows\system32\wxolaswyw.exe"93⤵
- Checks computer location settings
PID:4264 -
C:\Windows\SysWOW64\wanl.exe"C:\Windows\system32\wanl.exe"94⤵PID:3712
-
C:\Windows\SysWOW64\wwf.exe"C:\Windows\system32\wwf.exe"95⤵PID:2436
-
C:\Windows\SysWOW64\whxbrmyl.exe"C:\Windows\system32\whxbrmyl.exe"96⤵
- Checks computer location settings
PID:2420 -
C:\Windows\SysWOW64\wybqlyx.exe"C:\Windows\system32\wybqlyx.exe"97⤵
- Checks computer location settings
PID:4172 -
C:\Windows\SysWOW64\wmgkm.exe"C:\Windows\system32\wmgkm.exe"98⤵PID:4608
-
C:\Windows\SysWOW64\wqpq.exe"C:\Windows\system32\wqpq.exe"99⤵PID:4424
-
C:\Windows\SysWOW64\wdtmwy.exe"C:\Windows\system32\wdtmwy.exe"100⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3136 -
C:\Windows\SysWOW64\wvmq.exe"C:\Windows\system32\wvmq.exe"101⤵
- Checks computer location settings
PID:4816 -
C:\Windows\SysWOW64\wfef.exe"C:\Windows\system32\wfef.exe"102⤵
- Drops file in System32 directory
PID:3472 -
C:\Windows\SysWOW64\wwjukawh.exe"C:\Windows\system32\wwjukawh.exe"103⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2880 -
C:\Windows\SysWOW64\wkmol.exe"C:\Windows\system32\wkmol.exe"104⤵
- Checks computer location settings
PID:4756 -
C:\Windows\SysWOW64\wkciuri.exe"C:\Windows\system32\wkciuri.exe"105⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4980 -
C:\Windows\SysWOW64\wwtqsmro.exe"C:\Windows\system32\wwtqsmro.exe"106⤵
- Checks computer location settings
PID:1608 -
C:\Windows\SysWOW64\wedyxvj.exe"C:\Windows\system32\wedyxvj.exe"107⤵
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\wyrupbvs.exe"C:\Windows\system32\wyrupbvs.exe"108⤵PID:3420
-
C:\Windows\SysWOW64\whkivecl.exe"C:\Windows\system32\whkivecl.exe"109⤵
- Checks computer location settings
PID:3532 -
C:\Windows\SysWOW64\wktslw.exe"C:\Windows\system32\wktslw.exe"110⤵PID:1036
-
C:\Windows\SysWOW64\wgwgvb.exe"C:\Windows\system32\wgwgvb.exe"111⤵
- Drops file in System32 directory
PID:876 -
C:\Windows\SysWOW64\wwbuqoqxh.exe"C:\Windows\system32\wwbuqoqxh.exe"112⤵PID:1224
-
C:\Windows\SysWOW64\wgtju.exe"C:\Windows\system32\wgtju.exe"113⤵
- Checks computer location settings
PID:3904 -
C:\Windows\SysWOW64\wxnpjcl.exe"C:\Windows\system32\wxnpjcl.exe"114⤵
- Checks computer location settings
PID:1124 -
C:\Windows\SysWOW64\wpcqjos.exe"C:\Windows\system32\wpcqjos.exe"115⤵PID:1508
-
C:\Windows\SysWOW64\wmbscqs.exe"C:\Windows\system32\wmbscqs.exe"116⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1648 -
C:\Windows\SysWOW64\wbfof.exe"C:\Windows\system32\wbfof.exe"117⤵PID:5056
-
C:\Windows\SysWOW64\wvhbpoqhn.exe"C:\Windows\system32\wvhbpoqhn.exe"118⤵PID:1824
-
C:\Windows\SysWOW64\wrkmb.exe"C:\Windows\system32\wrkmb.exe"119⤵
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\wwutidkw.exe"C:\Windows\system32\wwutidkw.exe"120⤵
- Checks computer location settings
PID:2420 -
C:\Windows\SysWOW64\wgyqsgbe.exe"C:\Windows\system32\wgyqsgbe.exe"121⤵PID:844
-
C:\Windows\SysWOW64\whicja.exe"C:\Windows\system32\whicja.exe"122⤵PID:2380
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-