Analysis
-
max time kernel
137s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe
Resource
win10v2004-20240419-en
General
-
Target
c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe
-
Size
92KB
-
MD5
73e83cc5ee6460a28d3fa52a58355c6e
-
SHA1
e6f0d849188dabcfadfbe8cbde989f788fbb7253
-
SHA256
c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b
-
SHA512
0209897cbc02056d88657d331c374e465487a35170cc5c3f4ee265fb1a29cc50e147601d10bb6f894d0c4e05a6f099138ed537ba0b7e865337e4ecac277c84e3
-
SSDEEP
1536:p7u6cOLK7hNIMLrCiS4xUfXM3xvuoSB5qEftLhSnWQD+hpX71qCi2:1eOLK7hNIMLrCiS4+PwRjY5xhEAXQCD
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 305 848 wrmvc.exe 306 848 wrmvc.exe 311 1736 wgprskvp.exe 312 1736 wgprskvp.exe -
Deletes itself 1 IoCs
pid Process 2684 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2516 wqxmpkot.exe 2888 wqusu.exe 2172 wfhmks.exe 2212 wshbap.exe 768 wbelgrun.exe 2656 wgpbtxt.exe 2044 wmu.exe 2100 wyv.exe 1408 wdxnmtfi.exe 3044 wjwidvska.exe 3048 wscfoa.exe 1984 wvlocp.exe 808 wifcf.exe 1576 wsyoinp.exe 3008 wgsalm.exe 1076 wrbd.exe 1816 wplqfh.exe 2632 wutytv.exe 2636 wcdg.exe 2428 wsoanrud.exe 572 wrndcpw.exe 2484 wcgogn.exe 2212 wuhbnc.exe 848 wkubop.exe 1296 wsqqavl.exe 640 wnpwy.exe 2340 wapkpxae.exe 2504 wqmn.exe 2444 wqwb.exe 1324 wivl.exe 1336 wperm.exe 1656 wphqex.exe 2284 wbvtntal.exe 2196 wnwjeqrk.exe 2908 wugpivlv.exe 2700 wve.exe 2508 wmf.exe 2360 woawcxgn.exe 2072 wsigpmvk.exe 836 wjprkyxjy.exe 2412 wyibeokoo.exe 2904 wreer.exe 2056 whiwuq.exe 2316 wcpegte.exe 1304 wwrty.exe 2168 wfwrlg.exe 2696 wrdot.exe 2684 wnw.exe 1868 wmampfo.exe 2172 wini.exe 2028 wyot.exe 3064 wyfiy.exe 840 wgnof.exe 436 waxfjfr.exe 3024 wkondksv.exe 2620 wexeipb.exe 2424 wewgyndiu.exe 520 wlyyxspq.exe 1956 woijlhf.exe 2216 wjhpkndqb.exe 2220 wwbbnmk.exe 1288 wqqy.exe 2928 wctuqqq.exe 2968 wxucpvneq.exe -
Loads dropped DLL 64 IoCs
pid Process 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 2516 wqxmpkot.exe 2516 wqxmpkot.exe 2516 wqxmpkot.exe 2516 wqxmpkot.exe 2516 wqxmpkot.exe 2888 wqusu.exe 2888 wqusu.exe 2888 wqusu.exe 2888 wqusu.exe 2888 wqusu.exe 2172 wfhmks.exe 2172 wfhmks.exe 2172 wfhmks.exe 2172 wfhmks.exe 2172 wfhmks.exe 2212 wshbap.exe 2212 wshbap.exe 2212 wshbap.exe 2212 wshbap.exe 2212 wshbap.exe 768 wbelgrun.exe 768 wbelgrun.exe 768 wbelgrun.exe 768 wbelgrun.exe 768 wbelgrun.exe 2656 wgpbtxt.exe 2656 wgpbtxt.exe 2656 wgpbtxt.exe 2656 wgpbtxt.exe 2656 wgpbtxt.exe 2044 wmu.exe 2044 wmu.exe 2044 wmu.exe 2044 wmu.exe 2044 wmu.exe 2100 wyv.exe 2100 wyv.exe 2100 wyv.exe 2100 wyv.exe 2100 wyv.exe 1408 wdxnmtfi.exe 2936 wtywuiaxt.exe 2936 wtywuiaxt.exe 2936 wtywuiaxt.exe 2936 wtywuiaxt.exe 3044 wjwidvska.exe 3044 wjwidvska.exe 3044 wjwidvska.exe 3044 wjwidvska.exe 3044 wjwidvska.exe 3048 wscfoa.exe 3048 wscfoa.exe 3048 wscfoa.exe 3048 wscfoa.exe 3048 wscfoa.exe 1984 wvlocp.exe 1984 wvlocp.exe 1984 wvlocp.exe 1984 wvlocp.exe 1984 wvlocp.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wxucpvneq = "\"C:\\Windows\\SysWOW64\\wxucpvneq.exe\"" wxucpvneq.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqaipf = "\"C:\\Windows\\SysWOW64\\wqaipf.exe\"" wqaipf.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wuyqs = "\"C:\\Windows\\SysWOW64\\wuyqs.exe\"" wuyqs.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wyv = "\"C:\\Windows\\SysWOW64\\wyv.exe\"" wyv.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wnpwy = "\"C:\\Windows\\SysWOW64\\wnpwy.exe\"" wnpwy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wini = "\"C:\\Windows\\SysWOW64\\wini.exe\"" wini.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wdusosava = "\"C:\\Windows\\SysWOW64\\wdusosava.exe\"" wdusosava.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wsiccdk = "\"C:\\Windows\\SysWOW64\\wsiccdk.exe\"" wsiccdk.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wtwxnxas = "\"C:\\Windows\\SysWOW64\\wtwxnxas.exe\"" wtwxnxas.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\whqeyb = "\"C:\\Windows\\SysWOW64\\whqeyb.exe\"" whqeyb.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wfhmks = "\"C:\\Windows\\SysWOW64\\wfhmks.exe\"" wfhmks.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjprkyxjy = "\"C:\\Windows\\SysWOW64\\wjprkyxjy.exe\"" wjprkyxjy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqqy = "\"C:\\Windows\\SysWOW64\\wqqy.exe\"" wqqy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wvdscq = "\"C:\\Windows\\SysWOW64\\wvdscq.exe\"" wvdscq.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wrkyrty = "\"C:\\Windows\\SysWOW64\\wrkyrty.exe\"" wrkyrty.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wlypbx = "\"C:\\Windows\\SysWOW64\\wlypbx.exe\"" wlypbx.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wgdbqv = "\"C:\\Windows\\SysWOW64\\wgdbqv.exe\"" wgdbqv.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wbclgx = "\"C:\\Windows\\SysWOW64\\wbclgx.exe\"" wbclgx.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wlcshqy = "\"C:\\Windows\\SysWOW64\\wlcshqy.exe\"" wlcshqy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wifcf = "\"C:\\Windows\\SysWOW64\\wifcf.exe\"" wifcf.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wugpivlv = "\"C:\\Windows\\SysWOW64\\wugpivlv.exe\"" wugpivlv.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmf = "\"C:\\Windows\\SysWOW64\\wmf.exe\"" wmf.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcijwekt = "\"C:\\Windows\\SysWOW64\\wcijwekt.exe\"" wcijwekt.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcdg = "\"C:\\Windows\\SysWOW64\\wcdg.exe\"" wcdg.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\waixrgx = "\"C:\\Windows\\SysWOW64\\waixrgx.exe\"" waixrgx.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wltbki = "\"C:\\Windows\\SysWOW64\\wltbki.exe\"" wltbki.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wvayeo = "\"C:\\Windows\\SysWOW64\\wvayeo.exe\"" wvayeo.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wcvrcyotm = "\"C:\\Windows\\SysWOW64\\wcvrcyotm.exe\"" wcvrcyotm.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wyfiy = "\"C:\\Windows\\SysWOW64\\wyfiy.exe\"" wyfiy.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wexeipb = "\"C:\\Windows\\SysWOW64\\wexeipb.exe\"" wexeipb.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wbcldkdac = "\"C:\\Windows\\SysWOW64\\wbcldkdac.exe\"" wbcldkdac.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wlbiiitgp = "\"C:\\Windows\\SysWOW64\\wlbiiitgp.exe\"" wlbiiitgp.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wloqrfej = "\"C:\\Windows\\SysWOW64\\wloqrfej.exe\"" wloqrfej.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wjuuwefd = "\"C:\\Windows\\SysWOW64\\wjuuwefd.exe\"" wjuuwefd.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wtamqxv = "\"C:\\Windows\\SysWOW64\\wtamqxv.exe\"" wtamqxv.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wivl = "\"C:\\Windows\\SysWOW64\\wivl.exe\"" wivl.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wsxpggxg = "\"C:\\Windows\\SysWOW64\\wsxpggxg.exe\"" wsxpggxg.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wretjda = "\"C:\\Windows\\SysWOW64\\wretjda.exe\"" wretjda.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wvyblejk = "\"C:\\Windows\\SysWOW64\\wvyblejk.exe\"" wvyblejk.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wgprskvp = "\"C:\\Windows\\SysWOW64\\wgprskvp.exe\"" wgprskvp.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wikltmn = "\"C:\\Windows\\SysWOW64\\wikltmn.exe\"" wikltmn.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wosaaq = "\"C:\\Windows\\SysWOW64\\wosaaq.exe\"" wosaaq.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wbniltil = "\"C:\\Windows\\SysWOW64\\wbniltil.exe\"" wbniltil.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wsoanrud = "\"C:\\Windows\\SysWOW64\\wsoanrud.exe\"" wsoanrud.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wsqqavl = "\"C:\\Windows\\SysWOW64\\wsqqavl.exe\"" wsqqavl.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\whbdlvd = "\"C:\\Windows\\SysWOW64\\whbdlvd.exe\"" whbdlvd.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\woxwgau = "\"C:\\Windows\\SysWOW64\\woxwgau.exe\"" woxwgau.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wplujhv = "\"C:\\Windows\\SysWOW64\\wplujhv.exe\"" wplujhv.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmun = "\"C:\\Windows\\SysWOW64\\wmun.exe\"" wmun.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wqusu = "\"C:\\Windows\\SysWOW64\\wqusu.exe\"" wqusu.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wreer = "\"C:\\Windows\\SysWOW64\\wreer.exe\"" wreer.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wwbbnmk = "\"C:\\Windows\\SysWOW64\\wwbbnmk.exe\"" wwbbnmk.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wewgyndiu = "\"C:\\Windows\\SysWOW64\\wewgyndiu.exe\"" wewgyndiu.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wstxtp = "\"C:\\Windows\\SysWOW64\\wstxtp.exe\"" wstxtp.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wksijv = "\"C:\\Windows\\SysWOW64\\wksijv.exe\"" wksijv.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wtywuiaxt = "\"C:\\Windows\\SysWOW64\\wtywuiaxt.exe\"" wtywuiaxt.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmampfo = "\"C:\\Windows\\SysWOW64\\wmampfo.exe\"" wmampfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wkondksv = "\"C:\\Windows\\SysWOW64\\wkondksv.exe\"" wkondksv.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wrmvc = "\"C:\\Windows\\SysWOW64\\wrmvc.exe\"" wrmvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wakfntxc = "\"C:\\Windows\\SysWOW64\\wakfntxc.exe\"" wakfntxc.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmnwkjv = "\"C:\\Windows\\SysWOW64\\wmnwkjv.exe\"" wmnwkjv.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\weyrxnjsd = "\"C:\\Windows\\SysWOW64\\weyrxnjsd.exe\"" weyrxnjsd.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wicxwoat = "\"C:\\Windows\\SysWOW64\\wicxwoat.exe\"" wicxwoat.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\wgpbtxt = "\"C:\\Windows\\SysWOW64\\wgpbtxt.exe\"" wgpbtxt.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wrpngkrc.exe wnrnb.exe File opened for modification C:\Windows\SysWOW64\wimqbbso.exe wjrsycv.exe File created C:\Windows\SysWOW64\wrarthkv.exe whfeqj.exe File created C:\Windows\SysWOW64\wlnrhph.exe wumhad.exe File created C:\Windows\SysWOW64\wmu.exe wgpbtxt.exe File opened for modification C:\Windows\SysWOW64\wkubop.exe wuhbnc.exe File opened for modification C:\Windows\SysWOW64\wretjda.exe wkjexw.exe File opened for modification C:\Windows\SysWOW64\wtxdrwq.exe wigpoahr.exe File created C:\Windows\SysWOW64\wtwxnxas.exe wlnrhph.exe File created C:\Windows\SysWOW64\wjrsycv.exe wbclgx.exe File created C:\Windows\SysWOW64\wvayeo.exe wemfqyai.exe File created C:\Windows\SysWOW64\wasoqo.exe wosaaq.exe File created C:\Windows\SysWOW64\wsyoinp.exe wifcf.exe File opened for modification C:\Windows\SysWOW64\wsyoinp.exe wifcf.exe File created C:\Windows\SysWOW64\wnw.exe wrdot.exe File created C:\Windows\SysWOW64\wxucpvneq.exe wctuqqq.exe File created C:\Windows\SysWOW64\wyot.exe wini.exe File created C:\Windows\SysWOW64\wbcldkdac.exe wxucpvneq.exe File created C:\Windows\SysWOW64\wylypkrnr.exe wretjda.exe File opened for modification C:\Windows\SysWOW64\wptqysgnn.exe wikltmn.exe File opened for modification C:\Windows\SysWOW64\whklioog.exe wybfdiu.exe File created C:\Windows\SysWOW64\wvdscq.exe wbcldkdac.exe File created C:\Windows\SysWOW64\wayqyp.exe wtpk.exe File opened for modification C:\Windows\SysWOW64\wxwsu.exe wtwxnxas.exe File created C:\Windows\SysWOW64\wbelgrun.exe wshbap.exe File opened for modification C:\Windows\SysWOW64\wmu.exe wgpbtxt.exe File opened for modification C:\Windows\SysWOW64\wreer.exe wyibeokoo.exe File opened for modification C:\Windows\SysWOW64\wctuqqq.exe wqqy.exe File created C:\Windows\SysWOW64\wqxmpkot.exe c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe File created C:\Windows\SysWOW64\wctuqqq.exe wqqy.exe File opened for modification C:\Windows\SysWOW64\wylypkrnr.exe wretjda.exe File opened for modification C:\Windows\SysWOW64\wrarthkv.exe whfeqj.exe File created C:\Windows\SysWOW64\wumhad.exe wjuuwefd.exe File opened for modification C:\Windows\SysWOW64\wvlocp.exe wscfoa.exe File opened for modification C:\Windows\SysWOW64\wsqqavl.exe wkubop.exe File opened for modification C:\Windows\SysWOW64\wgnof.exe wyfiy.exe File opened for modification C:\Windows\SysWOW64\wjrsycv.exe wbclgx.exe File opened for modification C:\Windows\SysWOW64\wobmkb.exe wghwxtms.exe File created C:\Windows\SysWOW64\wjwidvska.exe wtywuiaxt.exe File opened for modification C:\Windows\SysWOW64\wkondksv.exe waxfjfr.exe File created C:\Windows\SysWOW64\wmpaod.exe waixrgx.exe File opened for modification C:\Windows\SysWOW64\wlypbx.exe wgbqtkd.exe File created C:\Windows\SysWOW64\wnnuimguo.exe wayqyp.exe File created C:\Windows\SysWOW64\wugpivlv.exe wnwjeqrk.exe File created C:\Windows\SysWOW64\wini.exe wmampfo.exe File opened for modification C:\Windows\SysWOW64\wewhowfe.exe wvdscq.exe File opened for modification C:\Windows\SysWOW64\wsiccdk.exe wsxpggxg.exe File created C:\Windows\SysWOW64\wbclgx.exe wgcegswrt.exe File created C:\Windows\SysWOW64\wxwsu.exe wtwxnxas.exe File created C:\Windows\SysWOW64\wmfwfp.exe wmgtpsq.exe File opened for modification C:\Windows\SysWOW64\wqwb.exe wqmn.exe File created C:\Windows\SysWOW64\wivl.exe wqwb.exe File opened for modification C:\Windows\SysWOW64\wvdscq.exe wbcldkdac.exe File opened for modification C:\Windows\SysWOW64\wmpaod.exe waixrgx.exe File opened for modification C:\Windows\SysWOW64\wjuuwefd.exe whklioog.exe File opened for modification C:\Windows\SysWOW64\whiwuq.exe wreer.exe File opened for modification C:\Windows\SysWOW64\wyot.exe wini.exe File opened for modification C:\Windows\SysWOW64\wuyqs.exe wiacb.exe File opened for modification C:\Windows\SysWOW64\wpxyhusf.exe wloqrfej.exe File opened for modification C:\Windows\SysWOW64\wmgtpsq.exe wbniltil.exe File created C:\Windows\SysWOW64\wperm.exe wivl.exe File created C:\Windows\SysWOW64\wqaipf.exe wffv.exe File opened for modification C:\Windows\SysWOW64\wayqyp.exe wtpk.exe File created C:\Windows\SysWOW64\wgjuv.exe wpxyhusf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2516 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 28 PID 1612 wrote to memory of 2516 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 28 PID 1612 wrote to memory of 2516 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 28 PID 1612 wrote to memory of 2516 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 28 PID 1612 wrote to memory of 2684 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 29 PID 1612 wrote to memory of 2684 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 29 PID 1612 wrote to memory of 2684 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 29 PID 1612 wrote to memory of 2684 1612 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 29 PID 2516 wrote to memory of 2888 2516 wqxmpkot.exe 31 PID 2516 wrote to memory of 2888 2516 wqxmpkot.exe 31 PID 2516 wrote to memory of 2888 2516 wqxmpkot.exe 31 PID 2516 wrote to memory of 2888 2516 wqxmpkot.exe 31 PID 2516 wrote to memory of 2488 2516 wqxmpkot.exe 32 PID 2516 wrote to memory of 2488 2516 wqxmpkot.exe 32 PID 2516 wrote to memory of 2488 2516 wqxmpkot.exe 32 PID 2516 wrote to memory of 2488 2516 wqxmpkot.exe 32 PID 2888 wrote to memory of 2172 2888 wqusu.exe 66 PID 2888 wrote to memory of 2172 2888 wqusu.exe 66 PID 2888 wrote to memory of 2172 2888 wqusu.exe 66 PID 2888 wrote to memory of 2172 2888 wqusu.exe 66 PID 2888 wrote to memory of 568 2888 wqusu.exe 35 PID 2888 wrote to memory of 568 2888 wqusu.exe 35 PID 2888 wrote to memory of 568 2888 wqusu.exe 35 PID 2888 wrote to memory of 568 2888 wqusu.exe 35 PID 2172 wrote to memory of 2212 2172 wfhmks.exe 37 PID 2172 wrote to memory of 2212 2172 wfhmks.exe 37 PID 2172 wrote to memory of 2212 2172 wfhmks.exe 37 PID 2172 wrote to memory of 2212 2172 wfhmks.exe 37 PID 2172 wrote to memory of 2180 2172 wfhmks.exe 38 PID 2172 wrote to memory of 2180 2172 wfhmks.exe 38 PID 2172 wrote to memory of 2180 2172 wfhmks.exe 38 PID 2172 wrote to memory of 2180 2172 wfhmks.exe 38 PID 2212 wrote to memory of 768 2212 wshbap.exe 40 PID 2212 wrote to memory of 768 2212 wshbap.exe 40 PID 2212 wrote to memory of 768 2212 wshbap.exe 40 PID 2212 wrote to memory of 768 2212 wshbap.exe 40 PID 2212 wrote to memory of 1756 2212 wshbap.exe 41 PID 2212 wrote to memory of 1756 2212 wshbap.exe 41 PID 2212 wrote to memory of 1756 2212 wshbap.exe 41 PID 2212 wrote to memory of 1756 2212 wshbap.exe 41 PID 768 wrote to memory of 2656 768 wbelgrun.exe 43 PID 768 wrote to memory of 2656 768 wbelgrun.exe 43 PID 768 wrote to memory of 2656 768 wbelgrun.exe 43 PID 768 wrote to memory of 2656 768 wbelgrun.exe 43 PID 768 wrote to memory of 2188 768 wbelgrun.exe 44 PID 768 wrote to memory of 2188 768 wbelgrun.exe 44 PID 768 wrote to memory of 2188 768 wbelgrun.exe 44 PID 768 wrote to memory of 2188 768 wbelgrun.exe 44 PID 2656 wrote to memory of 2044 2656 wgpbtxt.exe 46 PID 2656 wrote to memory of 2044 2656 wgpbtxt.exe 46 PID 2656 wrote to memory of 2044 2656 wgpbtxt.exe 46 PID 2656 wrote to memory of 2044 2656 wgpbtxt.exe 46 PID 2656 wrote to memory of 1604 2656 wgpbtxt.exe 47 PID 2656 wrote to memory of 1604 2656 wgpbtxt.exe 47 PID 2656 wrote to memory of 1604 2656 wgpbtxt.exe 47 PID 2656 wrote to memory of 1604 2656 wgpbtxt.exe 47 PID 2044 wrote to memory of 2100 2044 wmu.exe 49 PID 2044 wrote to memory of 2100 2044 wmu.exe 49 PID 2044 wrote to memory of 2100 2044 wmu.exe 49 PID 2044 wrote to memory of 2100 2044 wmu.exe 49 PID 2044 wrote to memory of 2968 2044 wmu.exe 50 PID 2044 wrote to memory of 2968 2044 wmu.exe 50 PID 2044 wrote to memory of 2968 2044 wmu.exe 50 PID 2044 wrote to memory of 2968 2044 wmu.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe"C:\Users\Admin\AppData\Local\Temp\c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\wqxmpkot.exe"C:\Windows\system32\wqxmpkot.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\wqusu.exe"C:\Windows\system32\wqusu.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\wfhmks.exe"C:\Windows\system32\wfhmks.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\wshbap.exe"C:\Windows\system32\wshbap.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\wbelgrun.exe"C:\Windows\system32\wbelgrun.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\wgpbtxt.exe"C:\Windows\system32\wgpbtxt.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\wmu.exe"C:\Windows\system32\wmu.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\wyv.exe"C:\Windows\system32\wyv.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2100 -
C:\Windows\SysWOW64\wdxnmtfi.exe"C:\Windows\system32\wdxnmtfi.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1408 -
C:\Windows\SysWOW64\wtywuiaxt.exe"C:\Windows\system32\wtywuiaxt.exe"11⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:2936 -
C:\Windows\SysWOW64\wjwidvska.exe"C:\Windows\system32\wjwidvska.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3044 -
C:\Windows\SysWOW64\wscfoa.exe"C:\Windows\system32\wscfoa.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3048 -
C:\Windows\SysWOW64\wvlocp.exe"C:\Windows\system32\wvlocp.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984 -
C:\Windows\SysWOW64\wifcf.exe"C:\Windows\system32\wifcf.exe"15⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:808 -
C:\Windows\SysWOW64\wsyoinp.exe"C:\Windows\system32\wsyoinp.exe"16⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\SysWOW64\wgsalm.exe"C:\Windows\system32\wgsalm.exe"17⤵
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\wrbd.exe"C:\Windows\system32\wrbd.exe"18⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\wplqfh.exe"C:\Windows\system32\wplqfh.exe"19⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\wutytv.exe"C:\Windows\system32\wutytv.exe"20⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\SysWOW64\wcdg.exe"C:\Windows\system32\wcdg.exe"21⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2636 -
C:\Windows\SysWOW64\wsoanrud.exe"C:\Windows\system32\wsoanrud.exe"22⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2428 -
C:\Windows\SysWOW64\wrndcpw.exe"C:\Windows\system32\wrndcpw.exe"23⤵
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\wcgogn.exe"C:\Windows\system32\wcgogn.exe"24⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\wuhbnc.exe"C:\Windows\system32\wuhbnc.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2212 -
C:\Windows\SysWOW64\wkubop.exe"C:\Windows\system32\wkubop.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:848 -
C:\Windows\SysWOW64\wsqqavl.exe"C:\Windows\system32\wsqqavl.exe"27⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1296 -
C:\Windows\SysWOW64\wnpwy.exe"C:\Windows\system32\wnpwy.exe"28⤵
- Executes dropped EXE
- Adds Run key to start application
PID:640 -
C:\Windows\SysWOW64\wapkpxae.exe"C:\Windows\system32\wapkpxae.exe"29⤵
- Executes dropped EXE
PID:2340 -
C:\Windows\SysWOW64\wqmn.exe"C:\Windows\system32\wqmn.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\wqwb.exe"C:\Windows\system32\wqwb.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\wivl.exe"C:\Windows\system32\wivl.exe"32⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1324 -
C:\Windows\SysWOW64\wperm.exe"C:\Windows\system32\wperm.exe"33⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\SysWOW64\wphqex.exe"C:\Windows\system32\wphqex.exe"34⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\wbvtntal.exe"C:\Windows\system32\wbvtntal.exe"35⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\SysWOW64\wnwjeqrk.exe"C:\Windows\system32\wnwjeqrk.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2196 -
C:\Windows\SysWOW64\wugpivlv.exe"C:\Windows\system32\wugpivlv.exe"37⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2908 -
C:\Windows\SysWOW64\wve.exe"C:\Windows\system32\wve.exe"38⤵
- Executes dropped EXE
PID:2700 -
C:\Windows\SysWOW64\wmf.exe"C:\Windows\system32\wmf.exe"39⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2508 -
C:\Windows\SysWOW64\woawcxgn.exe"C:\Windows\system32\woawcxgn.exe"40⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\wsigpmvk.exe"C:\Windows\system32\wsigpmvk.exe"41⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\wjprkyxjy.exe"C:\Windows\system32\wjprkyxjy.exe"42⤵
- Executes dropped EXE
- Adds Run key to start application
PID:836 -
C:\Windows\SysWOW64\wyibeokoo.exe"C:\Windows\system32\wyibeokoo.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2412 -
C:\Windows\SysWOW64\wreer.exe"C:\Windows\system32\wreer.exe"44⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2904 -
C:\Windows\SysWOW64\whiwuq.exe"C:\Windows\system32\whiwuq.exe"45⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\SysWOW64\wcpegte.exe"C:\Windows\system32\wcpegte.exe"46⤵
- Executes dropped EXE
PID:2316 -
C:\Windows\SysWOW64\wwrty.exe"C:\Windows\system32\wwrty.exe"47⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\wfwrlg.exe"C:\Windows\system32\wfwrlg.exe"48⤵
- Executes dropped EXE
PID:2168 -
C:\Windows\SysWOW64\wrdot.exe"C:\Windows\system32\wrdot.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2696 -
C:\Windows\SysWOW64\wnw.exe"C:\Windows\system32\wnw.exe"50⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\wmampfo.exe"C:\Windows\system32\wmampfo.exe"51⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1868 -
C:\Windows\SysWOW64\wini.exe"C:\Windows\system32\wini.exe"52⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\wyot.exe"C:\Windows\system32\wyot.exe"53⤵
- Executes dropped EXE
PID:2028 -
C:\Windows\SysWOW64\wyfiy.exe"C:\Windows\system32\wyfiy.exe"54⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3064 -
C:\Windows\SysWOW64\wgnof.exe"C:\Windows\system32\wgnof.exe"55⤵
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\waxfjfr.exe"C:\Windows\system32\waxfjfr.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:436 -
C:\Windows\SysWOW64\wkondksv.exe"C:\Windows\system32\wkondksv.exe"57⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3024 -
C:\Windows\SysWOW64\wexeipb.exe"C:\Windows\system32\wexeipb.exe"58⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2620 -
C:\Windows\SysWOW64\wewgyndiu.exe"C:\Windows\system32\wewgyndiu.exe"59⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2424 -
C:\Windows\SysWOW64\wlyyxspq.exe"C:\Windows\system32\wlyyxspq.exe"60⤵
- Executes dropped EXE
PID:520 -
C:\Windows\SysWOW64\woijlhf.exe"C:\Windows\system32\woijlhf.exe"61⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\wjhpkndqb.exe"C:\Windows\system32\wjhpkndqb.exe"62⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\SysWOW64\wwbbnmk.exe"C:\Windows\system32\wwbbnmk.exe"63⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2220 -
C:\Windows\SysWOW64\wqqy.exe"C:\Windows\system32\wqqy.exe"64⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1288 -
C:\Windows\SysWOW64\wctuqqq.exe"C:\Windows\system32\wctuqqq.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2928 -
C:\Windows\SysWOW64\wxucpvneq.exe"C:\Windows\system32\wxucpvneq.exe"66⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2968 -
C:\Windows\SysWOW64\wbcldkdac.exe"C:\Windows\system32\wbcldkdac.exe"67⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2552 -
C:\Windows\SysWOW64\wvdscq.exe"C:\Windows\system32\wvdscq.exe"68⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\wewhowfe.exe"C:\Windows\system32\wewhowfe.exe"69⤵PID:580
-
C:\Windows\SysWOW64\whbdlvd.exe"C:\Windows\system32\whbdlvd.exe"70⤵
- Adds Run key to start application
PID:1628 -
C:\Windows\SysWOW64\wbwsgd.exe"C:\Windows\system32\wbwsgd.exe"71⤵PID:1232
-
C:\Windows\SysWOW64\wdusosava.exe"C:\Windows\system32\wdusosava.exe"72⤵
- Adds Run key to start application
PID:1348 -
C:\Windows\SysWOW64\wmd.exe"C:\Windows\system32\wmd.exe"73⤵PID:2780
-
C:\Windows\SysWOW64\wsxpggxg.exe"C:\Windows\system32\wsxpggxg.exe"74⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1544 -
C:\Windows\SysWOW64\wsiccdk.exe"C:\Windows\system32\wsiccdk.exe"75⤵
- Adds Run key to start application
PID:1640 -
C:\Windows\SysWOW64\wfxglapyl.exe"C:\Windows\system32\wfxglapyl.exe"76⤵PID:2236
-
C:\Windows\SysWOW64\waixrgx.exe"C:\Windows\system32\waixrgx.exe"77⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3024 -
C:\Windows\SysWOW64\wmpaod.exe"C:\Windows\system32\wmpaod.exe"78⤵PID:2516
-
C:\Windows\SysWOW64\wgbqtkd.exe"C:\Windows\system32\wgbqtkd.exe"79⤵
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\wlypbx.exe"C:\Windows\system32\wlypbx.exe"80⤵
- Adds Run key to start application
PID:3044 -
C:\Windows\SysWOW64\wkjexw.exe"C:\Windows\system32\wkjexw.exe"81⤵
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\wretjda.exe"C:\Windows\system32\wretjda.exe"82⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1524 -
C:\Windows\SysWOW64\wylypkrnr.exe"C:\Windows\system32\wylypkrnr.exe"83⤵PID:2300
-
C:\Windows\SysWOW64\wltbki.exe"C:\Windows\system32\wltbki.exe"84⤵
- Adds Run key to start application
PID:2304 -
C:\Windows\SysWOW64\wopvgxp.exe"C:\Windows\system32\wopvgxp.exe"85⤵PID:944
-
C:\Windows\SysWOW64\wvyblejk.exe"C:\Windows\system32\wvyblejk.exe"86⤵
- Adds Run key to start application
PID:1360 -
C:\Windows\SysWOW64\wigpoahr.exe"C:\Windows\system32\wigpoahr.exe"87⤵
- Drops file in System32 directory
PID:2912 -
C:\Windows\SysWOW64\wtxdrwq.exe"C:\Windows\system32\wtxdrwq.exe"88⤵PID:2548
-
C:\Windows\SysWOW64\wcijwekt.exe"C:\Windows\system32\wcijwekt.exe"89⤵
- Adds Run key to start application
PID:2628 -
C:\Windows\SysWOW64\wfgidrp.exe"C:\Windows\system32\wfgidrp.exe"90⤵PID:1836
-
C:\Windows\SysWOW64\wkwtgfmi.exe"C:\Windows\system32\wkwtgfmi.exe"91⤵PID:1604
-
C:\Windows\SysWOW64\wnrnb.exe"C:\Windows\system32\wnrnb.exe"92⤵
- Drops file in System32 directory
PID:324 -
C:\Windows\SysWOW64\wrpngkrc.exe"C:\Windows\system32\wrpngkrc.exe"93⤵PID:2620
-
C:\Windows\SysWOW64\wlsca.exe"C:\Windows\system32\wlsca.exe"94⤵PID:1584
-
C:\Windows\SysWOW64\wksgppt.exe"C:\Windows\system32\wksgppt.exe"95⤵PID:544
-
C:\Windows\SysWOW64\wrmvc.exe"C:\Windows\system32\wrmvc.exe"96⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:848 -
C:\Windows\SysWOW64\wrkyrty.exe"C:\Windows\system32\wrkyrty.exe"97⤵
- Adds Run key to start application
PID:2964 -
C:\Windows\SysWOW64\wgprskvp.exe"C:\Windows\system32\wgprskvp.exe"98⤵
- Blocklisted process makes network request
- Adds Run key to start application
PID:1736 -
C:\Windows\SysWOW64\wvibnag.exe"C:\Windows\system32\wvibnag.exe"99⤵PID:280
-
C:\Windows\SysWOW64\wffv.exe"C:\Windows\system32\wffv.exe"100⤵
- Drops file in System32 directory
PID:2576 -
C:\Windows\SysWOW64\wqaipf.exe"C:\Windows\system32\wqaipf.exe"101⤵
- Adds Run key to start application
PID:2588 -
C:\Windows\SysWOW64\wgdbqv.exe"C:\Windows\system32\wgdbqv.exe"102⤵
- Adds Run key to start application
PID:2052 -
C:\Windows\SysWOW64\wgcegswrt.exe"C:\Windows\system32\wgcegswrt.exe"103⤵
- Drops file in System32 directory
PID:1840 -
C:\Windows\SysWOW64\wbclgx.exe"C:\Windows\system32\wbclgx.exe"104⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:572 -
C:\Windows\SysWOW64\wjrsycv.exe"C:\Windows\system32\wjrsycv.exe"105⤵
- Drops file in System32 directory
PID:1076 -
C:\Windows\SysWOW64\wimqbbso.exe"C:\Windows\system32\wimqbbso.exe"106⤵PID:2864
-
C:\Windows\SysWOW64\wtctlxx.exe"C:\Windows\system32\wtctlxx.exe"107⤵PID:2316
-
C:\Windows\SysWOW64\wdvjweca.exe"C:\Windows\system32\wdvjweca.exe"108⤵PID:3012
-
C:\Windows\SysWOW64\wlbiiitgp.exe"C:\Windows\system32\wlbiiitgp.exe"109⤵
- Adds Run key to start application
PID:2564 -
C:\Windows\SysWOW64\wstxtp.exe"C:\Windows\system32\wstxtp.exe"110⤵
- Adds Run key to start application
PID:468 -
C:\Windows\SysWOW64\wakfntxc.exe"C:\Windows\system32\wakfntxc.exe"111⤵
- Adds Run key to start application
PID:2932 -
C:\Windows\SysWOW64\weupbjox.exe"C:\Windows\system32\weupbjox.exe"112⤵PID:1692
-
C:\Windows\SysWOW64\wikbcvmfc.exe"C:\Windows\system32\wikbcvmfc.exe"113⤵PID:3068
-
C:\Windows\SysWOW64\wmnwkjv.exe"C:\Windows\system32\wmnwkjv.exe"114⤵
- Adds Run key to start application
PID:2376 -
C:\Windows\SysWOW64\wntbn.exe"C:\Windows\system32\wntbn.exe"115⤵PID:1612
-
C:\Windows\SysWOW64\wpjmor.exe"C:\Windows\system32\wpjmor.exe"116⤵PID:808
-
C:\Windows\SysWOW64\weyrxnjsd.exe"C:\Windows\system32\weyrxnjsd.exe"117⤵
- Adds Run key to start application
PID:2544 -
C:\Windows\SysWOW64\wksijv.exe"C:\Windows\system32\wksijv.exe"118⤵
- Adds Run key to start application
PID:1408 -
C:\Windows\SysWOW64\wgroialxh.exe"C:\Windows\system32\wgroialxh.exe"119⤵PID:2656
-
C:\Windows\SysWOW64\wicxwoat.exe"C:\Windows\system32\wicxwoat.exe"120⤵
- Adds Run key to start application
PID:3048 -
C:\Windows\SysWOW64\wikltmn.exe"C:\Windows\system32\wikltmn.exe"121⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1796 -
C:\Windows\SysWOW64\wptqysgnn.exe"C:\Windows\system32\wptqysgnn.exe"122⤵PID:1968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-