Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
02-05-2024 03:33
Static task
static1
Behavioral task
behavioral1
Sample
c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe
Resource
win10v2004-20240419-en
General
-
Target
c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe
-
Size
92KB
-
MD5
73e83cc5ee6460a28d3fa52a58355c6e
-
SHA1
e6f0d849188dabcfadfbe8cbde989f788fbb7253
-
SHA256
c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b
-
SHA512
0209897cbc02056d88657d331c374e465487a35170cc5c3f4ee265fb1a29cc50e147601d10bb6f894d0c4e05a6f099138ed537ba0b7e865337e4ecac277c84e3
-
SSDEEP
1536:p7u6cOLK7hNIMLrCiS4xUfXM3xvuoSB5qEftLhSnWQD+hpX71qCi2:1eOLK7hNIMLrCiS4+PwRjY5xhEAXQCD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wyk.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wjkvwomf.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation watkrqf.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wsgqef.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wkw.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wjsjrvbti.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wfanjku.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wnejgt.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wwqsno.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wkbqi.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wysdu.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wigenv.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wadf.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wthwc.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wkyers.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wcyeatw.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation webq.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wbkpwnx.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wrsy.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wffavdmt.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wghvd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wkiqivkn.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wlqeracoc.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wbnsunx.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wkj.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wuymvq.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wpjbvk.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wjdww.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wmv.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wmoei.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wxoviv.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wacoeb.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wdamtj.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wmphfqd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wjefcil.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wdnmnh.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wyfdwgwd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wtijvnq.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wypldh.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wjolemd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wrwh.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wpwlpt.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wfhjvlqbd.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation weq.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wjjel.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wmrofs.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wnmikjyrj.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wsxmrc.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation whrb.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wfbgrir.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wdyhs.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wywokl.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wnjc.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wbam.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wvxxcip.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wertpl.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wpma.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wolxrpvs.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wtn.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wpognsg.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wjnov.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wuwude.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wrebki.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation wkkljb.exe -
Executes dropped EXE 64 IoCs
pid Process 1656 wifltk.exe 2836 wbnsk.exe 4948 wbnsunx.exe 1716 wbam.exe 3948 wgue.exe 4412 wxxtkhp.exe 3020 wvxxcip.exe 3140 wnbnw.exe 1868 wmphfqd.exe 1984 wncapm.exe 1712 wneiri.exe 1540 wryye.exe 3356 wtijvnq.exe 3016 wkbqi.exe 680 wxeklta.exe 4616 wysdu.exe 4844 weck.exe 3988 wxqhtftu.exe 4912 wjyjqhox.exe 4488 wgcwd.exe 3316 wsgqef.exe 3368 wkigy.exe 4572 wkw.exe 1080 wnkoi.exe 8 wsxe.exe 1388 wpognsg.exe 5104 wblxdprye.exe 5052 wcbpnm.exe 768 wkmceq.exe 1192 wfaywv.exe 440 wjnov.exe 3644 wobexwi.exe 1080 wnowg.exe 2836 wjsjrvbti.exe 4496 wxdqas.exe 3188 wwr.exe 2772 wxtrn.exe 3948 wgqo.exe 4088 wsofbntwx.exe 4572 wfanjku.exe 4120 wwimx.exe 4228 wigenv.exe 3988 wewfqa.exe 1764 wypldh.exe 3808 wpma.exe 4092 wdyhs.exe 556 whlvsfb.exe 4188 wkj.exe 4144 wpvkb.exe 4812 wlonflrm.exe 3512 wymfvi.exe 4940 wptdi.exe 4180 wfq.exe 3188 wsmkgjge.exe 2800 wlfpsus.exe 3872 wxci.exe 3968 wjyay.exe 4444 wkcial.exe 3912 wnpxbysj.exe 3608 waxbww.exe 2204 weloxkkel.exe 1716 wolqiowy.exe 4736 webq.exe 4568 wit.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbam = "\"C:\\Windows\\SysWOW64\\wbam.exe\"" wbam.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wahvayl = "\"C:\\Windows\\SysWOW64\\wahvayl.exe\"" wahvayl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbnsunx = "\"C:\\Windows\\SysWOW64\\wbnsunx.exe\"" wbnsunx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wwdrmr = "\"C:\\Windows\\SysWOW64\\wwdrmr.exe\"" wwdrmr.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wpognsg = "\"C:\\Windows\\SysWOW64\\wpognsg.exe\"" wpognsg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wlfsq = "\"C:\\Windows\\SysWOW64\\wlfsq.exe\"" wlfsq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wsxi = "\"C:\\Windows\\SysWOW64\\wsxi.exe\"" wsxi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wuqjdl = "\"C:\\Windows\\SysWOW64\\wuqjdl.exe\"" wuqjdl.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wysdu = "\"C:\\Windows\\SysWOW64\\wysdu.exe\"" wysdu.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wjyay = "\"C:\\Windows\\SysWOW64\\wjyay.exe\"" wjyay.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wnlgco = "\"C:\\Windows\\SysWOW64\\wnlgco.exe\"" wnlgco.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmphfqd = "\"C:\\Windows\\SysWOW64\\wmphfqd.exe\"" wmphfqd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wrebki = "\"C:\\Windows\\SysWOW64\\wrebki.exe\"" wrebki.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wknwypff = "\"C:\\Windows\\SysWOW64\\wknwypff.exe\"" wknwypff.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\whrb = "\"C:\\Windows\\SysWOW64\\whrb.exe\"" whrb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wcyeatw = "\"C:\\Windows\\SysWOW64\\wcyeatw.exe\"" wcyeatw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wckkp = "\"C:\\Windows\\SysWOW64\\wckkp.exe\"" wckkp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wgwgvb = "\"C:\\Windows\\SysWOW64\\wgwgvb.exe\"" wgwgvb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wkkljb = "\"C:\\Windows\\SysWOW64\\wkkljb.exe\"" wkkljb.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wryye = "\"C:\\Windows\\SysWOW64\\wryye.exe\"" wryye.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wrwh = "\"C:\\Windows\\SysWOW64\\wrwh.exe\"" wrwh.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wkyers = "\"C:\\Windows\\SysWOW64\\wkyers.exe\"" wkyers.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfaywv = "\"C:\\Windows\\SysWOW64\\wfaywv.exe\"" wfaywv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wnmikjyrj = "\"C:\\Windows\\SysWOW64\\wnmikjyrj.exe\"" wnmikjyrj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wtijvnq = "\"C:\\Windows\\SysWOW64\\wtijvnq.exe\"" wtijvnq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wsofbntwx = "\"C:\\Windows\\SysWOW64\\wsofbntwx.exe\"" wsofbntwx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfufhab = "\"C:\\Windows\\SysWOW64\\wfufhab.exe\"" wfufhab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\woygsgus = "\"C:\\Windows\\SysWOW64\\woygsgus.exe\"" woygsgus.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weq = "\"C:\\Windows\\SysWOW64\\weq.exe\"" weq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmv = "\"C:\\Windows\\SysWOW64\\wmv.exe\"" wmv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wsgqef = "\"C:\\Windows\\SysWOW64\\wsgqef.exe\"" wsgqef.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wpgmps = "\"C:\\Windows\\SysWOW64\\wpgmps.exe\"" wpgmps.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wqlw = "\"C:\\Windows\\SysWOW64\\wqlw.exe\"" wqlw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wjjel = "\"C:\\Windows\\SysWOW64\\wjjel.exe\"" wjjel.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wobexwi = "\"C:\\Windows\\SysWOW64\\wobexwi.exe\"" wobexwi.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wlqeracoc = "\"C:\\Windows\\SysWOW64\\wlqeracoc.exe\"" wlqeracoc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfelagd = "\"C:\\Windows\\SysWOW64\\wfelagd.exe\"" wfelagd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wxtrn = "\"C:\\Windows\\SysWOW64\\wxtrn.exe\"" wxtrn.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbvfqq = "\"C:\\Windows\\SysWOW64\\wbvfqq.exe\"" wbvfqq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wthwc = "\"C:\\Windows\\SysWOW64\\wthwc.exe\"" wthwc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wblxdprye = "\"C:\\Windows\\SysWOW64\\wblxdprye.exe\"" wblxdprye.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wxdqas = "\"C:\\Windows\\SysWOW64\\wxdqas.exe\"" wxdqas.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wpn = "\"C:\\Windows\\SysWOW64\\wpn.exe\"" wpn.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wolxrpvs = "\"C:\\Windows\\SysWOW64\\wolxrpvs.exe\"" wolxrpvs.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdljf = "\"C:\\Windows\\SysWOW64\\wdljf.exe\"" wdljf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbkpwnx = "\"C:\\Windows\\SysWOW64\\wbkpwnx.exe\"" wbkpwnx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wiukipa = "\"C:\\Windows\\SysWOW64\\wiukipa.exe\"" wiukipa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wqkedqd = "\"C:\\Windows\\SysWOW64\\wqkedqd.exe\"" wqkedqd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wkiqivkn = "\"C:\\Windows\\SysWOW64\\wkiqivkn.exe\"" wkiqivkn.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wit = "\"C:\\Windows\\SysWOW64\\wit.exe\"" wit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wbtfgw = "\"C:\\Windows\\SysWOW64\\wbtfgw.exe\"" wbtfgw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wjgaw = "\"C:\\Windows\\SysWOW64\\wjgaw.exe\"" wjgaw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\watkrqf = "\"C:\\Windows\\SysWOW64\\watkrqf.exe\"" watkrqf.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wgxrux = "\"C:\\Windows\\SysWOW64\\wgxrux.exe\"" wgxrux.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wgqo = "\"C:\\Windows\\SysWOW64\\wgqo.exe\"" wgqo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wtbpa = "\"C:\\Windows\\SysWOW64\\wtbpa.exe\"" wtbpa.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wdbulw = "\"C:\\Windows\\SysWOW64\\wdbulw.exe\"" wdbulw.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wgcwd = "\"C:\\Windows\\SysWOW64\\wgcwd.exe\"" wgcwd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wffavdmt = "\"C:\\Windows\\SysWOW64\\wffavdmt.exe\"" wffavdmt.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfq = "\"C:\\Windows\\SysWOW64\\wfq.exe\"" wfq.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wox = "\"C:\\Windows\\SysWOW64\\wox.exe\"" wox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wjaovluy = "\"C:\\Windows\\SysWOW64\\wjaovluy.exe\"" wjaovluy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wkj = "\"C:\\Windows\\SysWOW64\\wkj.exe\"" wkj.exe Set value (str) \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wfsp = "\"C:\\Windows\\SysWOW64\\wfsp.exe\"" wfsp.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wgcwd.exe wjyjqhox.exe File opened for modification C:\Windows\SysWOW64\wtkpyee.exe whyhqh.exe File opened for modification C:\Windows\SysWOW64\wnruc.exe wjefcil.exe File created C:\Windows\SysWOW64\weq.exe wrebki.exe File created C:\Windows\SysWOW64\wnkoi.exe wkw.exe File opened for modification C:\Windows\SysWOW64\wymfvi.exe wlonflrm.exe File created C:\Windows\SysWOW64\wrwh.exe wjkvwomf.exe File created C:\Windows\SysWOW64\whrb.exe wdpwof.exe File created C:\Windows\SysWOW64\wgwgvb.exe wbkpwnx.exe File opened for modification C:\Windows\SysWOW64\wkw.exe wkigy.exe File created C:\Windows\SysWOW64\wjsjrvbti.exe wnowg.exe File created C:\Windows\SysWOW64\wjgaw.exe wsjlpf.exe File created C:\Windows\SysWOW64\wsuo.exe wjjel.exe File opened for modification C:\Windows\SysWOW64\wnowg.exe wobexwi.exe File opened for modification C:\Windows\SysWOW64\wlqeracoc.exe wdeta.exe File created C:\Windows\SysWOW64\wwgdukcn.exe wkj.exe File opened for modification C:\Windows\SysWOW64\wkigy.exe wsgqef.exe File created C:\Windows\SysWOW64\wpfab.exe wexy.exe File opened for modification C:\Windows\SysWOW64\wbkpwnx.exe wtn.exe File opened for modification C:\Windows\SysWOW64\waxbww.exe wnpxbysj.exe File opened for modification C:\Windows\SysWOW64\wpct.exe wtksx.exe File opened for modification C:\Windows\SysWOW64\wnbag.exe wjolemd.exe File created C:\Windows\SysWOW64\wmme.exe wrsy.exe File opened for modification C:\Windows\SysWOW64\wdamtj.exe wmrofs.exe File created C:\Windows\SysWOW64\wbnsunx.exe wbnsk.exe File created C:\Windows\SysWOW64\wxqhtftu.exe weck.exe File created C:\Windows\SysWOW64\wuymvq.exe wqlw.exe File opened for modification C:\Windows\SysWOW64\wpjbvk.exe wdljf.exe File created C:\Windows\SysWOW64\wfhjvlqbd.exe wfsp.exe File opened for modification C:\Windows\SysWOW64\wsgqef.exe wgcwd.exe File opened for modification C:\Windows\SysWOW64\wpgmps.exe wbtfgw.exe File opened for modification C:\Windows\SysWOW64\wuwude.exe wqkedqd.exe File created C:\Windows\SysWOW64\wexy.exe wlfsq.exe File opened for modification C:\Windows\SysWOW64\wysdu.exe wxeklta.exe File created C:\Windows\SysWOW64\wclsyesl.exe wsxi.exe File opened for modification C:\Windows\SysWOW64\wdiifxg.exe wmbk.exe File created C:\Windows\SysWOW64\wfjfe.exe wghvd.exe File created C:\Windows\SysWOW64\wbam.exe wbnsunx.exe File created C:\Windows\SysWOW64\wryye.exe wneiri.exe File opened for modification C:\Windows\SysWOW64\wjdww.exe wjaovluy.exe File created C:\Windows\SysWOW64\wertpl.exe wjdww.exe File opened for modification C:\Windows\SysWOW64\wkmceq.exe wcbpnm.exe File created C:\Windows\SysWOW64\wkj.exe whlvsfb.exe File created C:\Windows\SysWOW64\wymfvi.exe wlonflrm.exe File opened for modification C:\Windows\SysWOW64\wfjfe.exe wghvd.exe File opened for modification C:\Windows\SysWOW64\wnbnw.exe wvxxcip.exe File created C:\Windows\SysWOW64\wneiri.exe wncapm.exe File created C:\Windows\SysWOW64\wkigy.exe wsgqef.exe File created C:\Windows\SysWOW64\wountd.exe wgxrux.exe File opened for modification C:\Windows\SysWOW64\wfbgrir.exe wiiemfaq.exe File opened for modification C:\Windows\SysWOW64\wthwc.exe wnjc.exe File created C:\Windows\SysWOW64\wtvqvxctx.exe wpjbvk.exe File opened for modification C:\Windows\SysWOW64\wacoeb.exe wigb.exe File opened for modification C:\Windows\SysWOW64\wmme.exe wrsy.exe File created C:\Windows\SysWOW64\wbnsk.exe wifltk.exe File opened for modification C:\Windows\SysWOW64\wnmikjyrj.exe wapo.exe File created C:\Windows\SysWOW64\wnjc.exe wevql.exe File created C:\Windows\SysWOW64\wnbag.exe wjolemd.exe File created C:\Windows\SysWOW64\wjaovluy.exe wancegwp.exe File opened for modification C:\Windows\SysWOW64\wkbqi.exe wtijvnq.exe File opened for modification C:\Windows\SysWOW64\wahcliu.exe wpfab.exe File created C:\Windows\SysWOW64\wkyers.exe wxoviv.exe File created C:\Windows\SysWOW64\wcjcskhe.exe wox.exe File opened for modification C:\Windows\SysWOW64\wjyjqhox.exe wxqhtftu.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 10 IoCs
pid pid_target Process procid_target 2320 1656 WerFault.exe 86 1716 5052 WerFault.exe 181 2528 2204 WerFault.exe 284 1984 2844 WerFault.exe 408 4228 2292 WerFault.exe 419 2072 1468 WerFault.exe 448 2292 668 WerFault.exe 480 2312 2872 WerFault.exe 597 4648 4060 WerFault.exe 659 2528 4944 WerFault.exe 708 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 1656 2864 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 86 PID 2864 wrote to memory of 1656 2864 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 86 PID 2864 wrote to memory of 1656 2864 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 86 PID 2864 wrote to memory of 1928 2864 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 88 PID 2864 wrote to memory of 1928 2864 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 88 PID 2864 wrote to memory of 1928 2864 c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe 88 PID 1656 wrote to memory of 2836 1656 wifltk.exe 95 PID 1656 wrote to memory of 2836 1656 wifltk.exe 95 PID 1656 wrote to memory of 2836 1656 wifltk.exe 95 PID 1656 wrote to memory of 4084 1656 wifltk.exe 96 PID 1656 wrote to memory of 4084 1656 wifltk.exe 96 PID 1656 wrote to memory of 4084 1656 wifltk.exe 96 PID 2836 wrote to memory of 4948 2836 wbnsk.exe 103 PID 2836 wrote to memory of 4948 2836 wbnsk.exe 103 PID 2836 wrote to memory of 4948 2836 wbnsk.exe 103 PID 2836 wrote to memory of 4476 2836 wbnsk.exe 104 PID 2836 wrote to memory of 4476 2836 wbnsk.exe 104 PID 2836 wrote to memory of 4476 2836 wbnsk.exe 104 PID 4948 wrote to memory of 1716 4948 wbnsunx.exe 106 PID 4948 wrote to memory of 1716 4948 wbnsunx.exe 106 PID 4948 wrote to memory of 1716 4948 wbnsunx.exe 106 PID 4948 wrote to memory of 4436 4948 wbnsunx.exe 107 PID 4948 wrote to memory of 4436 4948 wbnsunx.exe 107 PID 4948 wrote to memory of 4436 4948 wbnsunx.exe 107 PID 1716 wrote to memory of 3948 1716 wbam.exe 109 PID 1716 wrote to memory of 3948 1716 wbam.exe 109 PID 1716 wrote to memory of 3948 1716 wbam.exe 109 PID 1716 wrote to memory of 212 1716 wbam.exe 110 PID 1716 wrote to memory of 212 1716 wbam.exe 110 PID 1716 wrote to memory of 212 1716 wbam.exe 110 PID 3948 wrote to memory of 4412 3948 wgue.exe 112 PID 3948 wrote to memory of 4412 3948 wgue.exe 112 PID 3948 wrote to memory of 4412 3948 wgue.exe 112 PID 3948 wrote to memory of 768 3948 wgue.exe 113 PID 3948 wrote to memory of 768 3948 wgue.exe 113 PID 3948 wrote to memory of 768 3948 wgue.exe 113 PID 4412 wrote to memory of 3020 4412 wxxtkhp.exe 116 PID 4412 wrote to memory of 3020 4412 wxxtkhp.exe 116 PID 4412 wrote to memory of 3020 4412 wxxtkhp.exe 116 PID 4412 wrote to memory of 4524 4412 wxxtkhp.exe 117 PID 4412 wrote to memory of 4524 4412 wxxtkhp.exe 117 PID 4412 wrote to memory of 4524 4412 wxxtkhp.exe 117 PID 3020 wrote to memory of 3140 3020 wvxxcip.exe 119 PID 3020 wrote to memory of 3140 3020 wvxxcip.exe 119 PID 3020 wrote to memory of 3140 3020 wvxxcip.exe 119 PID 3020 wrote to memory of 556 3020 wvxxcip.exe 120 PID 3020 wrote to memory of 556 3020 wvxxcip.exe 120 PID 3020 wrote to memory of 556 3020 wvxxcip.exe 120 PID 3140 wrote to memory of 1868 3140 wnbnw.exe 122 PID 3140 wrote to memory of 1868 3140 wnbnw.exe 122 PID 3140 wrote to memory of 1868 3140 wnbnw.exe 122 PID 3140 wrote to memory of 2584 3140 wnbnw.exe 123 PID 3140 wrote to memory of 2584 3140 wnbnw.exe 123 PID 3140 wrote to memory of 2584 3140 wnbnw.exe 123 PID 1868 wrote to memory of 1984 1868 wmphfqd.exe 126 PID 1868 wrote to memory of 1984 1868 wmphfqd.exe 126 PID 1868 wrote to memory of 1984 1868 wmphfqd.exe 126 PID 1868 wrote to memory of 1656 1868 wmphfqd.exe 127 PID 1868 wrote to memory of 1656 1868 wmphfqd.exe 127 PID 1868 wrote to memory of 1656 1868 wmphfqd.exe 127 PID 1984 wrote to memory of 1712 1984 wncapm.exe 129 PID 1984 wrote to memory of 1712 1984 wncapm.exe 129 PID 1984 wrote to memory of 1712 1984 wncapm.exe 129 PID 1984 wrote to memory of 4564 1984 wncapm.exe 130
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe"C:\Users\Admin\AppData\Local\Temp\c7fe6ecb86c0679d3e6bc54f26358a692e0c16de6e737a4082f3d4fec426392b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\wifltk.exe"C:\Windows\system32\wifltk.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\wbnsk.exe"C:\Windows\system32\wbnsk.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\wbnsunx.exe"C:\Windows\system32\wbnsunx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\wbam.exe"C:\Windows\system32\wbam.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\wgue.exe"C:\Windows\system32\wgue.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\wxxtkhp.exe"C:\Windows\system32\wxxtkhp.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\wvxxcip.exe"C:\Windows\system32\wvxxcip.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\wnbnw.exe"C:\Windows\system32\wnbnw.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\wmphfqd.exe"C:\Windows\system32\wmphfqd.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\wncapm.exe"C:\Windows\system32\wncapm.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\wneiri.exe"C:\Windows\system32\wneiri.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1712 -
C:\Windows\SysWOW64\wryye.exe"C:\Windows\system32\wryye.exe"13⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1540 -
C:\Windows\SysWOW64\wtijvnq.exe"C:\Windows\system32\wtijvnq.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3356 -
C:\Windows\SysWOW64\wkbqi.exe"C:\Windows\system32\wkbqi.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
PID:3016 -
C:\Windows\SysWOW64\wxeklta.exe"C:\Windows\system32\wxeklta.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:680 -
C:\Windows\SysWOW64\wysdu.exe"C:\Windows\system32\wysdu.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:4616 -
C:\Windows\SysWOW64\weck.exe"C:\Windows\system32\weck.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4844 -
C:\Windows\SysWOW64\wxqhtftu.exe"C:\Windows\system32\wxqhtftu.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3988 -
C:\Windows\SysWOW64\wjyjqhox.exe"C:\Windows\system32\wjyjqhox.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4912 -
C:\Windows\SysWOW64\wgcwd.exe"C:\Windows\system32\wgcwd.exe"21⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4488 -
C:\Windows\SysWOW64\wsgqef.exe"C:\Windows\system32\wsgqef.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3316 -
C:\Windows\SysWOW64\wkigy.exe"C:\Windows\system32\wkigy.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3368 -
C:\Windows\SysWOW64\wkw.exe"C:\Windows\system32\wkw.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4572 -
C:\Windows\SysWOW64\wnkoi.exe"C:\Windows\system32\wnkoi.exe"25⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\wsxe.exe"C:\Windows\system32\wsxe.exe"26⤵
- Executes dropped EXE
PID:8 -
C:\Windows\SysWOW64\wpognsg.exe"C:\Windows\system32\wpognsg.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1388 -
C:\Windows\SysWOW64\wblxdprye.exe"C:\Windows\system32\wblxdprye.exe"28⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5104 -
C:\Windows\SysWOW64\wcbpnm.exe"C:\Windows\system32\wcbpnm.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5052 -
C:\Windows\SysWOW64\wkmceq.exe"C:\Windows\system32\wkmceq.exe"30⤵
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\wfaywv.exe"C:\Windows\system32\wfaywv.exe"31⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1192 -
C:\Windows\SysWOW64\wjnov.exe"C:\Windows\system32\wjnov.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:440 -
C:\Windows\SysWOW64\wobexwi.exe"C:\Windows\system32\wobexwi.exe"33⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3644 -
C:\Windows\SysWOW64\wnowg.exe"C:\Windows\system32\wnowg.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1080 -
C:\Windows\SysWOW64\wjsjrvbti.exe"C:\Windows\system32\wjsjrvbti.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\wxdqas.exe"C:\Windows\system32\wxdqas.exe"36⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4496 -
C:\Windows\SysWOW64\wwr.exe"C:\Windows\system32\wwr.exe"37⤵
- Executes dropped EXE
PID:3188 -
C:\Windows\SysWOW64\wxtrn.exe"C:\Windows\system32\wxtrn.exe"38⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2772 -
C:\Windows\SysWOW64\wgqo.exe"C:\Windows\system32\wgqo.exe"39⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3948 -
C:\Windows\SysWOW64\wsofbntwx.exe"C:\Windows\system32\wsofbntwx.exe"40⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4088 -
C:\Windows\SysWOW64\wfanjku.exe"C:\Windows\system32\wfanjku.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\wwimx.exe"C:\Windows\system32\wwimx.exe"42⤵
- Executes dropped EXE
PID:4120 -
C:\Windows\SysWOW64\wigenv.exe"C:\Windows\system32\wigenv.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:4228 -
C:\Windows\SysWOW64\wewfqa.exe"C:\Windows\system32\wewfqa.exe"44⤵
- Executes dropped EXE
PID:3988 -
C:\Windows\SysWOW64\wypldh.exe"C:\Windows\system32\wypldh.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
PID:1764 -
C:\Windows\SysWOW64\wpma.exe"C:\Windows\system32\wpma.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
PID:3808 -
C:\Windows\SysWOW64\wdyhs.exe"C:\Windows\system32\wdyhs.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:4092 -
C:\Windows\SysWOW64\whlvsfb.exe"C:\Windows\system32\whlvsfb.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\wkj.exe"C:\Windows\system32\wkj.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:4188 -
C:\Windows\SysWOW64\wpvkb.exe"C:\Windows\system32\wpvkb.exe"50⤵
- Executes dropped EXE
PID:4144 -
C:\Windows\SysWOW64\wlonflrm.exe"C:\Windows\system32\wlonflrm.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4812 -
C:\Windows\SysWOW64\wymfvi.exe"C:\Windows\system32\wymfvi.exe"52⤵
- Executes dropped EXE
PID:3512 -
C:\Windows\SysWOW64\wptdi.exe"C:\Windows\system32\wptdi.exe"53⤵
- Executes dropped EXE
PID:4940 -
C:\Windows\SysWOW64\wfq.exe"C:\Windows\system32\wfq.exe"54⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4180 -
C:\Windows\SysWOW64\wsmkgjge.exe"C:\Windows\system32\wsmkgjge.exe"55⤵
- Executes dropped EXE
PID:3188 -
C:\Windows\SysWOW64\wlfpsus.exe"C:\Windows\system32\wlfpsus.exe"56⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\wxci.exe"C:\Windows\system32\wxci.exe"57⤵
- Executes dropped EXE
PID:3872 -
C:\Windows\SysWOW64\wjyay.exe"C:\Windows\system32\wjyay.exe"58⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3968 -
C:\Windows\SysWOW64\wkcial.exe"C:\Windows\system32\wkcial.exe"59⤵
- Executes dropped EXE
PID:4444 -
C:\Windows\SysWOW64\wnpxbysj.exe"C:\Windows\system32\wnpxbysj.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3912 -
C:\Windows\SysWOW64\waxbww.exe"C:\Windows\system32\waxbww.exe"61⤵
- Executes dropped EXE
PID:3608 -
C:\Windows\SysWOW64\weloxkkel.exe"C:\Windows\system32\weloxkkel.exe"62⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\wolqiowy.exe"C:\Windows\system32\wolqiowy.exe"63⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\webq.exe"C:\Windows\system32\webq.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:4736 -
C:\Windows\SysWOW64\wit.exe"C:\Windows\system32\wit.exe"65⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4568 -
C:\Windows\SysWOW64\wbtfgw.exe"C:\Windows\system32\wbtfgw.exe"66⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:748 -
C:\Windows\SysWOW64\wpgmps.exe"C:\Windows\system32\wpgmps.exe"67⤵
- Adds Run key to start application
PID:1928 -
C:\Windows\SysWOW64\wadf.exe"C:\Windows\system32\wadf.exe"68⤵
- Checks computer location settings
PID:1704 -
C:\Windows\SysWOW64\wnlgco.exe"C:\Windows\system32\wnlgco.exe"69⤵
- Adds Run key to start application
PID:2112 -
C:\Windows\SysWOW64\wywokl.exe"C:\Windows\system32\wywokl.exe"70⤵
- Checks computer location settings
PID:804 -
C:\Windows\SysWOW64\wiukipa.exe"C:\Windows\system32\wiukipa.exe"71⤵
- Adds Run key to start application
PID:4344 -
C:\Windows\SysWOW64\wuhrrmb.exe"C:\Windows\system32\wuhrrmb.exe"72⤵PID:2528
-
C:\Windows\SysWOW64\wqkedqd.exe"C:\Windows\system32\wqkedqd.exe"73⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1320 -
C:\Windows\SysWOW64\wuwude.exe"C:\Windows\system32\wuwude.exe"74⤵
- Checks computer location settings
PID:2236 -
C:\Windows\SysWOW64\wlfsq.exe"C:\Windows\system32\wlfsq.exe"75⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:4900 -
C:\Windows\SysWOW64\wexy.exe"C:\Windows\system32\wexy.exe"76⤵
- Drops file in System32 directory
PID:4196 -
C:\Windows\SysWOW64\wpfab.exe"C:\Windows\system32\wpfab.exe"77⤵
- Drops file in System32 directory
PID:4268 -
C:\Windows\SysWOW64\wahcliu.exe"C:\Windows\system32\wahcliu.exe"78⤵PID:4720
-
C:\Windows\SysWOW64\wmoei.exe"C:\Windows\system32\wmoei.exe"79⤵
- Checks computer location settings
PID:1952 -
C:\Windows\SysWOW64\wtbpa.exe"C:\Windows\system32\wtbpa.exe"80⤵
- Adds Run key to start application
PID:1660 -
C:\Windows\SysWOW64\whyhqh.exe"C:\Windows\system32\whyhqh.exe"81⤵
- Drops file in System32 directory
PID:4940 -
C:\Windows\SysWOW64\wtkpyee.exe"C:\Windows\system32\wtkpyee.exe"82⤵PID:3740
-
C:\Windows\SysWOW64\wsxi.exe"C:\Windows\system32\wsxi.exe"83⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:4384 -
C:\Windows\SysWOW64\wclsyesl.exe"C:\Windows\system32\wclsyesl.exe"84⤵PID:1192
-
C:\Windows\SysWOW64\wcxlib.exe"C:\Windows\system32\wcxlib.exe"85⤵PID:3520
-
C:\Windows\SysWOW64\wdbulw.exe"C:\Windows\system32\wdbulw.exe"86⤵
- Adds Run key to start application
PID:3492 -
C:\Windows\SysWOW64\wkyrkcw.exe"C:\Windows\system32\wkyrkcw.exe"87⤵PID:1704
-
C:\Windows\SysWOW64\wbvfqq.exe"C:\Windows\system32\wbvfqq.exe"88⤵
- Adds Run key to start application
PID:348 -
C:\Windows\SysWOW64\wkiqivkn.exe"C:\Windows\system32\wkiqivkn.exe"89⤵
- Checks computer location settings
- Adds Run key to start application
PID:3244 -
C:\Windows\SysWOW64\wapo.exe"C:\Windows\system32\wapo.exe"90⤵
- Drops file in System32 directory
PID:1320 -
C:\Windows\SysWOW64\wnmikjyrj.exe"C:\Windows\system32\wnmikjyrj.exe"91⤵
- Checks computer location settings
- Adds Run key to start application
PID:2848 -
C:\Windows\SysWOW64\wakybg.exe"C:\Windows\system32\wakybg.exe"92⤵PID:748
-
C:\Windows\SysWOW64\wvn.exe"C:\Windows\system32\wvn.exe"93⤵PID:3292
-
C:\Windows\SysWOW64\wjkdchyr.exe"C:\Windows\system32\wjkdchyr.exe"94⤵PID:4376
-
C:\Windows\SysWOW64\wuhur.exe"C:\Windows\system32\wuhur.exe"95⤵PID:2344
-
C:\Windows\SysWOW64\watkrqf.exe"C:\Windows\system32\watkrqf.exe"96⤵
- Checks computer location settings
- Adds Run key to start application
PID:740 -
C:\Windows\SysWOW64\wevql.exe"C:\Windows\system32\wevql.exe"97⤵
- Drops file in System32 directory
PID:3600 -
C:\Windows\SysWOW64\wnjc.exe"C:\Windows\system32\wnjc.exe"98⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3356 -
C:\Windows\SysWOW64\wthwc.exe"C:\Windows\system32\wthwc.exe"99⤵
- Checks computer location settings
- Adds Run key to start application
PID:3584 -
C:\Windows\SysWOW64\wdeta.exe"C:\Windows\system32\wdeta.exe"100⤵
- Drops file in System32 directory
PID:4724 -
C:\Windows\SysWOW64\wlqeracoc.exe"C:\Windows\system32\wlqeracoc.exe"101⤵
- Checks computer location settings
- Adds Run key to start application
PID:2844 -
C:\Windows\SysWOW64\wxoviv.exe"C:\Windows\system32\wxoviv.exe"102⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4216 -
C:\Windows\SysWOW64\wkyers.exe"C:\Windows\system32\wkyers.exe"103⤵
- Checks computer location settings
- Adds Run key to start application
PID:5060 -
C:\Windows\SysWOW64\wknwypff.exe"C:\Windows\system32\wknwypff.exe"104⤵
- Adds Run key to start application
PID:2292 -
C:\Windows\SysWOW64\wtksx.exe"C:\Windows\system32\wtksx.exe"105⤵
- Drops file in System32 directory
PID:2240 -
C:\Windows\SysWOW64\wpct.exe"C:\Windows\system32\wpct.exe"106⤵PID:4280
-
C:\Windows\SysWOW64\wuqjdl.exe"C:\Windows\system32\wuqjdl.exe"107⤵
- Adds Run key to start application
PID:4304 -
C:\Windows\SysWOW64\wco.exe"C:\Windows\system32\wco.exe"108⤵PID:2560
-
C:\Windows\SysWOW64\wolxrpvs.exe"C:\Windows\system32\wolxrpvs.exe"109⤵
- Checks computer location settings
- Adds Run key to start application
PID:2180 -
C:\Windows\SysWOW64\wsxmrc.exe"C:\Windows\system32\wsxmrc.exe"110⤵
- Checks computer location settings
PID:2152 -
C:\Windows\SysWOW64\wfufhab.exe"C:\Windows\system32\wfufhab.exe"111⤵
- Adds Run key to start application
PID:3596 -
C:\Windows\SysWOW64\wwqsno.exe"C:\Windows\system32\wwqsno.exe"112⤵
- Checks computer location settings
PID:680 -
C:\Windows\SysWOW64\wjolemd.exe"C:\Windows\system32\wjolemd.exe"113⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1468 -
C:\Windows\SysWOW64\wnbag.exe"C:\Windows\system32\wnbag.exe"114⤵PID:4636
-
C:\Windows\SysWOW64\wnejgt.exe"C:\Windows\system32\wnejgt.exe"115⤵
- Checks computer location settings
PID:5104 -
C:\Windows\SysWOW64\wubgfam.exe"C:\Windows\system32\wubgfam.exe"116⤵PID:1008
-
C:\Windows\SysWOW64\wepqwe.exe"C:\Windows\system32\wepqwe.exe"117⤵PID:1660
-
C:\Windows\SysWOW64\wqlw.exe"C:\Windows\system32\wqlw.exe"118⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1556 -
C:\Windows\SysWOW64\wuymvq.exe"C:\Windows\system32\wuymvq.exe"119⤵
- Checks computer location settings
PID:5116 -
C:\Windows\SysWOW64\wwvmdf.exe"C:\Windows\system32\wwvmdf.exe"120⤵PID:372
-
C:\Windows\SysWOW64\wcjbdsow.exe"C:\Windows\system32\wcjbdsow.exe"121⤵PID:3516
-
C:\Windows\SysWOW64\wdljf.exe"C:\Windows\system32\wdljf.exe"122⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:4572
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-