Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a.exe
Resource
win10v2004-20240508-en
General
-
Target
93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a.exe
-
Size
93KB
-
MD5
565f6ac5f84bc7f85552f9235e6f6c6d
-
SHA1
e36f88ed23ba029715f73743667db83cc56d3cc2
-
SHA256
93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a
-
SHA512
ac12e1eabdd017fc337cda3e33b3adb6a38bc768ee6238811b763d49ee2d3e36d9479f1be412944542d95c7406e194f0d4bc511c3a9fbe565a085363f29f3ad5
-
SSDEEP
1536:xch3vwSbax3rHV6+HwsWGhG5JiBzQmVvHz:BHTrhWiBzQK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wjnpr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wvvbhsufu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wmmyyo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wgmrt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wwjyj.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wpmaenqp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wobtnk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wybhdlxk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wtoheayp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wohnua.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wxeypbjnf.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wtyvorma.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wcuoojeg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wygc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wdsyqv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wwpaht.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wvdelh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wmpudng.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wmkejgfsi.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wnkpe.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wnyinq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wvnopbg.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wbbme.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wcvvcm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wqoqvxxp.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wehdrjs.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wwpx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wdhwsnpn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wyxcmn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation whnbixc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wuiv.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wcajyxh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wrmlrnwc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wlgpcko.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wunmcn.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wwxjyo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation woqhplo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wuvm.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wountd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wryrhmr.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wjo.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wahvha.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation whwefu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wvja.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wxcll.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wfbxnitym.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wlqxu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wwrpt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wisqocgpt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wignq.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wwk.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation whyqc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wakddxd.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wqqt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation whe.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wnluh.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wwfpgt.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wlbkeluc.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation woocpb.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wifsex.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wcvfu.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wvw.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wbglx.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation wagfk.exe -
Executes dropped EXE 64 IoCs
pid Process 3324 wbnfkg.exe 4792 wqoqvxxp.exe 4100 wpckfun.exe 2192 wvdn.exe 2188 wurhh.exe 3960 wutpky.exe 1956 wagfk.exe 1820 wildv.exe 4944 wvfm.exe 4740 wbyeguq.exe 1920 wsrjthfds.exe 372 wsfccdt.exe 2100 wnbnai.exe 4912 wwxjyo.exe 4484 walxa.exe 3892 wnipoy.exe 1516 wavxxv.exe 3036 wjo.exe 3096 wjnpr.exe 3848 whavkse.exe 4156 wdsyqv.exe 3324 wahvha.exe 2796 wbjdjums.exe 2056 wehdrjs.exe 4424 woqhplo.exe 4852 wide.exe 5108 wigm.exe 2932 wakddxd.exe 1124 wvnopbg.exe 2256 wwpx.exe 3144 wwpaht.exe 4296 whwefu.exe 3516 wkucnk.exe 4396 wtveyobnb.exe 1224 wwue.exe 816 wpokrosrc.exe 2100 wlrve.exe 4628 wtosdx.exe 4360 wybhdlxk.exe 3128 wlgafh.exe 1352 wdyhs.exe 3232 wmlsjxeml.exe 1060 wqwhlky.exe 3956 wtvhryc.exe 3320 wuyquuj.exe 4520 wiqyq.exe 4312 wqovpuckc.exe 2616 wdmmer.exe 2008 wxo.exe 2800 whdlh.exe 848 wuadxxy.exe 1708 wvwgvnf.exe 2576 wvja.exe 764 wrmlrnwc.exe 1528 wifsex.exe 2072 wuouawhb.exe 2204 wdafscgk.exe 228 wvtmgn.exe 2600 warlmcypf.exe 4020 wvtyxg.exe 3748 wmq.exe 5036 wtoheayp.exe 2100 wqqt.exe 2944 wqemxy.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wigm.exe wide.exe File opened for modification C:\Windows\SysWOW64\wkucnk.exe whwefu.exe File created C:\Windows\SysWOW64\wtoheayp.exe wmq.exe File created C:\Windows\SysWOW64\wucgur.exe wmpudng.exe File created C:\Windows\SysWOW64\wgmufoxrm.exe wountd.exe File created C:\Windows\SysWOW64\wqqt.exe wtoheayp.exe File created C:\Windows\SysWOW64\whnbixc.exe wpkkolde.exe File created C:\Windows\SysWOW64\wmfmqg.exe wwjyj.exe File opened for modification C:\Windows\SysWOW64\whyqc.exe wqdctu.exe File opened for modification C:\Windows\SysWOW64\welvcsw.exe wwykkma.exe File created C:\Windows\SysWOW64\whey.exe whrfwk.exe File created C:\Windows\SysWOW64\wikq.exe wdvcthyt.exe File created C:\Windows\SysWOW64\wnrq.exe wipljr.exe File created C:\Windows\SysWOW64\wjhy.exe wtaaeaplg.exe File opened for modification C:\Windows\SysWOW64\wnbnai.exe wsfccdt.exe File created C:\Windows\SysWOW64\wdyhs.exe wlgafh.exe File opened for modification C:\Windows\SysWOW64\wtvhryc.exe wqwhlky.exe File created C:\Windows\SysWOW64\wqemxy.exe wqqt.exe File opened for modification C:\Windows\SysWOW64\wruo.exe wuhrrmb.exe File created C:\Windows\SysWOW64\wtyvorma.exe wcvfu.exe File opened for modification C:\Windows\SysWOW64\wryrhmr.exe wwk.exe File opened for modification C:\Windows\SysWOW64\wutpky.exe wurhh.exe File opened for modification C:\Windows\SysWOW64\walxa.exe wwxjyo.exe File opened for modification C:\Windows\SysWOW64\wjgi.exe wnqmiir.exe File opened for modification C:\Windows\SysWOW64\wvdelh.exe wqqpksa.exe File opened for modification C:\Windows\SysWOW64\wnkpe.exe wgmufoxrm.exe File opened for modification C:\Windows\SysWOW64\wpdcrg.exe wobtnk.exe File opened for modification C:\Windows\SysWOW64\wwrpt.exe wfxjfl.exe File opened for modification C:\Windows\SysWOW64\wagfk.exe wutpky.exe File opened for modification C:\Windows\SysWOW64\wsfccdt.exe wsrjthfds.exe File created C:\Windows\SysWOW64\walxa.exe wwxjyo.exe File opened for modification C:\Windows\SysWOW64\wwpaht.exe wwpx.exe File opened for modification C:\Windows\SysWOW64\wvfnnba.exe wvdelh.exe File opened for modification C:\Windows\SysWOW64\wwltfv.exe wnyinq.exe File created C:\Windows\SysWOW64\wsrjthfds.exe wbyeguq.exe File opened for modification C:\Windows\SysWOW64\wtveyobnb.exe wkucnk.exe File created C:\Windows\SysWOW64\wdmmer.exe wqovpuckc.exe File opened for modification C:\Windows\SysWOW64\wtumlg.exe wyqybdqdv.exe File created C:\Windows\SysWOW64\wisqocgpt.exe whey.exe File created C:\Windows\SysWOW64\wmoquo.exe wibbtbkf.exe File opened for modification C:\Windows\SysWOW64\whwefu.exe wwpaht.exe File created C:\Windows\SysWOW64\wpokrosrc.exe wwue.exe File opened for modification C:\Windows\SysWOW64\wnluh.exe woxbajpx.exe File created C:\Windows\SysWOW64\wqjjq.exe wyqdev.exe File opened for modification C:\Windows\SysWOW64\wipljr.exe wmmyyo.exe File created C:\Windows\SysWOW64\wvfnnba.exe wvdelh.exe File created C:\Windows\SysWOW64\wvfm.exe wildv.exe File opened for modification C:\Windows\SysWOW64\woqhplo.exe wehdrjs.exe File created C:\Windows\SysWOW64\wwue.exe wtveyobnb.exe File created C:\Windows\SysWOW64\wqovpuckc.exe wiqyq.exe File opened for modification C:\Windows\SysWOW64\wpkkolde.exe wgmnpfuh.exe File created C:\Windows\SysWOW64\wiof.exe whlvenc.exe File opened for modification C:\Windows\SysWOW64\wckqbay.exe wghepww.exe File opened for modification C:\Windows\SysWOW64\wslpfw.exe wcdqrhd.exe File opened for modification C:\Windows\SysWOW64\wbyeguq.exe wvfm.exe File created C:\Windows\SysWOW64\wvnopbg.exe wakddxd.exe File created C:\Windows\SysWOW64\wwpx.exe wvnopbg.exe File opened for modification C:\Windows\SysWOW64\wondka.exe wnluh.exe File created C:\Windows\SysWOW64\wxcll.exe wfssem.exe File opened for modification C:\Windows\SysWOW64\wqqpksa.exe wnrq.exe File opened for modification C:\Windows\SysWOW64\wygc.exe wtumlg.exe File opened for modification C:\Windows\SysWOW64\wakddxd.exe wigm.exe File opened for modification C:\Windows\SysWOW64\wrmlrnwc.exe wvja.exe File opened for modification C:\Windows\SysWOW64\wqqt.exe wtoheayp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 23 IoCs
pid pid_target Process procid_target 1076 3324 WerFault.exe 86 4640 1820 WerFault.exe 118 816 848 WerFault.exe 254 1580 2072 WerFault.exe 271 448 1516 WerFault.exe 306 2852 3068 WerFault.exe 323 4228 3496 WerFault.exe 337 4040 116 WerFault.exe 361 4228 3692 WerFault.exe 364 1856 2724 WerFault.exe 395 1120 4020 WerFault.exe 398 4100 4020 WerFault.exe 398 2852 4128 WerFault.exe 410 716 1528 WerFault.exe 413 380 3840 WerFault.exe 429 2804 3840 WerFault.exe 429 880 3392 WerFault.exe 439 3840 2008 WerFault.exe 462 3440 972 WerFault.exe 500 5064 3392 WerFault.exe 537 516 2868 WerFault.exe 645 440 1120 WerFault.exe 654 3084 1540 WerFault.exe 677 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5108 wrote to memory of 3324 5108 93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a.exe 86 PID 5108 wrote to memory of 3324 5108 93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a.exe 86 PID 5108 wrote to memory of 3324 5108 93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a.exe 86 PID 5108 wrote to memory of 5024 5108 93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a.exe 88 PID 5108 wrote to memory of 5024 5108 93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a.exe 88 PID 5108 wrote to memory of 5024 5108 93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a.exe 88 PID 3324 wrote to memory of 4792 3324 wbnfkg.exe 90 PID 3324 wrote to memory of 4792 3324 wbnfkg.exe 90 PID 3324 wrote to memory of 4792 3324 wbnfkg.exe 90 PID 3324 wrote to memory of 1592 3324 wbnfkg.exe 91 PID 3324 wrote to memory of 1592 3324 wbnfkg.exe 91 PID 3324 wrote to memory of 1592 3324 wbnfkg.exe 91 PID 4792 wrote to memory of 4100 4792 wqoqvxxp.exe 98 PID 4792 wrote to memory of 4100 4792 wqoqvxxp.exe 98 PID 4792 wrote to memory of 4100 4792 wqoqvxxp.exe 98 PID 4792 wrote to memory of 1464 4792 wqoqvxxp.exe 99 PID 4792 wrote to memory of 1464 4792 wqoqvxxp.exe 99 PID 4792 wrote to memory of 1464 4792 wqoqvxxp.exe 99 PID 4100 wrote to memory of 2192 4100 wpckfun.exe 101 PID 4100 wrote to memory of 2192 4100 wpckfun.exe 101 PID 4100 wrote to memory of 2192 4100 wpckfun.exe 101 PID 4100 wrote to memory of 4308 4100 wpckfun.exe 102 PID 4100 wrote to memory of 4308 4100 wpckfun.exe 102 PID 4100 wrote to memory of 4308 4100 wpckfun.exe 102 PID 2192 wrote to memory of 2188 2192 wvdn.exe 108 PID 2192 wrote to memory of 2188 2192 wvdn.exe 108 PID 2192 wrote to memory of 2188 2192 wvdn.exe 108 PID 2192 wrote to memory of 2132 2192 wvdn.exe 109 PID 2192 wrote to memory of 2132 2192 wvdn.exe 109 PID 2192 wrote to memory of 2132 2192 wvdn.exe 109 PID 2188 wrote to memory of 3960 2188 wurhh.exe 112 PID 2188 wrote to memory of 3960 2188 wurhh.exe 112 PID 2188 wrote to memory of 3960 2188 wurhh.exe 112 PID 2188 wrote to memory of 3376 2188 wurhh.exe 113 PID 2188 wrote to memory of 3376 2188 wurhh.exe 113 PID 2188 wrote to memory of 3376 2188 wurhh.exe 113 PID 3960 wrote to memory of 1956 3960 wutpky.exe 115 PID 3960 wrote to memory of 1956 3960 wutpky.exe 115 PID 3960 wrote to memory of 1956 3960 wutpky.exe 115 PID 3960 wrote to memory of 1636 3960 wutpky.exe 116 PID 3960 wrote to memory of 1636 3960 wutpky.exe 116 PID 3960 wrote to memory of 1636 3960 wutpky.exe 116 PID 1956 wrote to memory of 1820 1956 wagfk.exe 118 PID 1956 wrote to memory of 1820 1956 wagfk.exe 118 PID 1956 wrote to memory of 1820 1956 wagfk.exe 118 PID 1956 wrote to memory of 2804 1956 wagfk.exe 119 PID 1956 wrote to memory of 2804 1956 wagfk.exe 119 PID 1956 wrote to memory of 2804 1956 wagfk.exe 119 PID 1820 wrote to memory of 4944 1820 wildv.exe 122 PID 1820 wrote to memory of 4944 1820 wildv.exe 122 PID 1820 wrote to memory of 4944 1820 wildv.exe 122 PID 1820 wrote to memory of 2056 1820 wildv.exe 123 PID 1820 wrote to memory of 2056 1820 wildv.exe 123 PID 1820 wrote to memory of 2056 1820 wildv.exe 123 PID 4944 wrote to memory of 4740 4944 wvfm.exe 127 PID 4944 wrote to memory of 4740 4944 wvfm.exe 127 PID 4944 wrote to memory of 4740 4944 wvfm.exe 127 PID 4944 wrote to memory of 4100 4944 wvfm.exe 128 PID 4944 wrote to memory of 4100 4944 wvfm.exe 128 PID 4944 wrote to memory of 4100 4944 wvfm.exe 128 PID 4740 wrote to memory of 1920 4740 wbyeguq.exe 130 PID 4740 wrote to memory of 1920 4740 wbyeguq.exe 130 PID 4740 wrote to memory of 1920 4740 wbyeguq.exe 130 PID 4740 wrote to memory of 1520 4740 wbyeguq.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a.exe"C:\Users\Admin\AppData\Local\Temp\93ea3caa5e2b6ed8f1da347829664d1e4ec7ad2def94791b2ffdac2c526df48a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\wbnfkg.exe"C:\Windows\system32\wbnfkg.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\wqoqvxxp.exe"C:\Windows\system32\wqoqvxxp.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\wpckfun.exe"C:\Windows\system32\wpckfun.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\wvdn.exe"C:\Windows\system32\wvdn.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\wurhh.exe"C:\Windows\system32\wurhh.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\wutpky.exe"C:\Windows\system32\wutpky.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\wagfk.exe"C:\Windows\system32\wagfk.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\wildv.exe"C:\Windows\system32\wildv.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\wvfm.exe"C:\Windows\system32\wvfm.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\wbyeguq.exe"C:\Windows\system32\wbyeguq.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\wsrjthfds.exe"C:\Windows\system32\wsrjthfds.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1920 -
C:\Windows\SysWOW64\wsfccdt.exe"C:\Windows\system32\wsfccdt.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:372 -
C:\Windows\SysWOW64\wnbnai.exe"C:\Windows\system32\wnbnai.exe"14⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\wwxjyo.exe"C:\Windows\system32\wwxjyo.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4912 -
C:\Windows\SysWOW64\walxa.exe"C:\Windows\system32\walxa.exe"16⤵
- Executes dropped EXE
PID:4484 -
C:\Windows\SysWOW64\wnipoy.exe"C:\Windows\system32\wnipoy.exe"17⤵
- Executes dropped EXE
PID:3892 -
C:\Windows\SysWOW64\wavxxv.exe"C:\Windows\system32\wavxxv.exe"18⤵
- Executes dropped EXE
PID:1516 -
C:\Windows\SysWOW64\wjo.exe"C:\Windows\system32\wjo.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\wjnpr.exe"C:\Windows\system32\wjnpr.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
PID:3096 -
C:\Windows\SysWOW64\whavkse.exe"C:\Windows\system32\whavkse.exe"21⤵
- Executes dropped EXE
PID:3848 -
C:\Windows\SysWOW64\wdsyqv.exe"C:\Windows\system32\wdsyqv.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
PID:4156 -
C:\Windows\SysWOW64\wahvha.exe"C:\Windows\system32\wahvha.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:3324 -
C:\Windows\SysWOW64\wbjdjums.exe"C:\Windows\system32\wbjdjums.exe"24⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\SysWOW64\wehdrjs.exe"C:\Windows\system32\wehdrjs.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2056 -
C:\Windows\SysWOW64\woqhplo.exe"C:\Windows\system32\woqhplo.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
PID:4424 -
C:\Windows\SysWOW64\wide.exe"C:\Windows\system32\wide.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4852 -
C:\Windows\SysWOW64\wigm.exe"C:\Windows\system32\wigm.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5108 -
C:\Windows\SysWOW64\wakddxd.exe"C:\Windows\system32\wakddxd.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2932 -
C:\Windows\SysWOW64\wvnopbg.exe"C:\Windows\system32\wvnopbg.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1124 -
C:\Windows\SysWOW64\wwpx.exe"C:\Windows\system32\wwpx.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2256 -
C:\Windows\SysWOW64\wwpaht.exe"C:\Windows\system32\wwpaht.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3144 -
C:\Windows\SysWOW64\whwefu.exe"C:\Windows\system32\whwefu.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4296 -
C:\Windows\SysWOW64\wkucnk.exe"C:\Windows\system32\wkucnk.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3516 -
C:\Windows\SysWOW64\wtveyobnb.exe"C:\Windows\system32\wtveyobnb.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4396 -
C:\Windows\SysWOW64\wwue.exe"C:\Windows\system32\wwue.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1224 -
C:\Windows\SysWOW64\wpokrosrc.exe"C:\Windows\system32\wpokrosrc.exe"37⤵
- Executes dropped EXE
PID:816 -
C:\Windows\SysWOW64\wlrve.exe"C:\Windows\system32\wlrve.exe"38⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\wtosdx.exe"C:\Windows\system32\wtosdx.exe"39⤵
- Executes dropped EXE
PID:4628 -
C:\Windows\SysWOW64\wybhdlxk.exe"C:\Windows\system32\wybhdlxk.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:4360 -
C:\Windows\SysWOW64\wlgafh.exe"C:\Windows\system32\wlgafh.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3128 -
C:\Windows\SysWOW64\wdyhs.exe"C:\Windows\system32\wdyhs.exe"42⤵
- Executes dropped EXE
PID:1352 -
C:\Windows\SysWOW64\wmlsjxeml.exe"C:\Windows\system32\wmlsjxeml.exe"43⤵
- Executes dropped EXE
PID:3232 -
C:\Windows\SysWOW64\wqwhlky.exe"C:\Windows\system32\wqwhlky.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1060 -
C:\Windows\SysWOW64\wtvhryc.exe"C:\Windows\system32\wtvhryc.exe"45⤵
- Executes dropped EXE
PID:3956 -
C:\Windows\SysWOW64\wuyquuj.exe"C:\Windows\system32\wuyquuj.exe"46⤵
- Executes dropped EXE
PID:3320 -
C:\Windows\SysWOW64\wiqyq.exe"C:\Windows\system32\wiqyq.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4520 -
C:\Windows\SysWOW64\wqovpuckc.exe"C:\Windows\system32\wqovpuckc.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4312 -
C:\Windows\SysWOW64\wdmmer.exe"C:\Windows\system32\wdmmer.exe"49⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\wxo.exe"C:\Windows\system32\wxo.exe"50⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\whdlh.exe"C:\Windows\system32\whdlh.exe"51⤵
- Executes dropped EXE
PID:2800 -
C:\Windows\SysWOW64\wuadxxy.exe"C:\Windows\system32\wuadxxy.exe"52⤵
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\wvwgvnf.exe"C:\Windows\system32\wvwgvnf.exe"53⤵
- Executes dropped EXE
PID:1708 -
C:\Windows\SysWOW64\wvja.exe"C:\Windows\system32\wvja.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2576 -
C:\Windows\SysWOW64\wrmlrnwc.exe"C:\Windows\system32\wrmlrnwc.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:764 -
C:\Windows\SysWOW64\wifsex.exe"C:\Windows\system32\wifsex.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:1528 -
C:\Windows\SysWOW64\wuouawhb.exe"C:\Windows\system32\wuouawhb.exe"57⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\wdafscgk.exe"C:\Windows\system32\wdafscgk.exe"58⤵
- Executes dropped EXE
PID:2204 -
C:\Windows\SysWOW64\wvtmgn.exe"C:\Windows\system32\wvtmgn.exe"59⤵
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\warlmcypf.exe"C:\Windows\system32\warlmcypf.exe"60⤵
- Executes dropped EXE
PID:2600 -
C:\Windows\SysWOW64\wvtyxg.exe"C:\Windows\system32\wvtyxg.exe"61⤵
- Executes dropped EXE
PID:4020 -
C:\Windows\SysWOW64\wmq.exe"C:\Windows\system32\wmq.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3748 -
C:\Windows\SysWOW64\wtoheayp.exe"C:\Windows\system32\wtoheayp.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:5036 -
C:\Windows\SysWOW64\wqqt.exe"C:\Windows\system32\wqqt.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\wqemxy.exe"C:\Windows\system32\wqemxy.exe"65⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\SysWOW64\wuhrrmb.exe"C:\Windows\system32\wuhrrmb.exe"66⤵
- Drops file in System32 directory
PID:3456 -
C:\Windows\SysWOW64\wruo.exe"C:\Windows\system32\wruo.exe"67⤵PID:2776
-
C:\Windows\SysWOW64\wdhwsnpn.exe"C:\Windows\system32\wdhwsnpn.exe"68⤵
- Checks computer location settings
PID:1516 -
C:\Windows\SysWOW64\whe.exe"C:\Windows\system32\whe.exe"69⤵
- Checks computer location settings
PID:4852 -
C:\Windows\SysWOW64\wyxcmn.exe"C:\Windows\system32\wyxcmn.exe"70⤵
- Checks computer location settings
PID:3064 -
C:\Windows\SysWOW64\wnqmiir.exe"C:\Windows\system32\wnqmiir.exe"71⤵
- Drops file in System32 directory
PID:5024 -
C:\Windows\SysWOW64\wjgi.exe"C:\Windows\system32\wjgi.exe"72⤵PID:2744
-
C:\Windows\SysWOW64\wohnua.exe"C:\Windows\system32\wohnua.exe"73⤵
- Checks computer location settings
PID:3068 -
C:\Windows\SysWOW64\wmtgdvda.exe"C:\Windows\system32\wmtgdvda.exe"74⤵PID:3996
-
C:\Windows\SysWOW64\wriuej.exe"C:\Windows\system32\wriuej.exe"75⤵PID:2420
-
C:\Windows\SysWOW64\wruonenx.exe"C:\Windows\system32\wruonenx.exe"76⤵PID:4968
-
C:\Windows\SysWOW64\woxbajpx.exe"C:\Windows\system32\woxbajpx.exe"77⤵
- Drops file in System32 directory
PID:3496 -
C:\Windows\SysWOW64\wnluh.exe"C:\Windows\system32\wnluh.exe"78⤵
- Checks computer location settings
- Drops file in System32 directory
PID:948 -
C:\Windows\SysWOW64\wondka.exe"C:\Windows\system32\wondka.exe"79⤵PID:2028
-
C:\Windows\SysWOW64\wfssem.exe"C:\Windows\system32\wfssem.exe"80⤵
- Drops file in System32 directory
PID:1980 -
C:\Windows\SysWOW64\wxcll.exe"C:\Windows\system32\wxcll.exe"81⤵
- Checks computer location settings
PID:1252 -
C:\Windows\SysWOW64\wuvm.exe"C:\Windows\system32\wuvm.exe"82⤵
- Checks computer location settings
PID:2808 -
C:\Windows\SysWOW64\wcsjo.exe"C:\Windows\system32\wcsjo.exe"83⤵PID:3768
-
C:\Windows\SysWOW64\wsbhcur.exe"C:\Windows\system32\wsbhcur.exe"84⤵PID:116
-
C:\Windows\SysWOW64\whnomstx.exe"C:\Windows\system32\whnomstx.exe"85⤵PID:3692
-
C:\Windows\SysWOW64\wbbme.exe"C:\Windows\system32\wbbme.exe"86⤵
- Checks computer location settings
PID:2416 -
C:\Windows\SysWOW64\wxeypbjnf.exe"C:\Windows\system32\wxeypbjnf.exe"87⤵
- Checks computer location settings
PID:1076 -
C:\Windows\SysWOW64\wtubsdab.exe"C:\Windows\system32\wtubsdab.exe"88⤵PID:1256
-
C:\Windows\SysWOW64\wqjwl.exe"C:\Windows\system32\wqjwl.exe"89⤵PID:3056
-
C:\Windows\SysWOW64\wcvfu.exe"C:\Windows\system32\wcvfu.exe"90⤵
- Checks computer location settings
- Drops file in System32 directory
PID:5048 -
C:\Windows\SysWOW64\wtyvorma.exe"C:\Windows\system32\wtyvorma.exe"91⤵
- Checks computer location settings
PID:4424 -
C:\Windows\SysWOW64\wyxuufr.exe"C:\Windows\system32\wyxuufr.exe"92⤵PID:3688
-
C:\Windows\SysWOW64\wubhhjt.exe"C:\Windows\system32\wubhhjt.exe"93⤵PID:2372
-
C:\Windows\SysWOW64\wgmnpfuh.exe"C:\Windows\system32\wgmnpfuh.exe"94⤵
- Drops file in System32 directory
PID:2724 -
C:\Windows\SysWOW64\wpkkolde.exe"C:\Windows\system32\wpkkolde.exe"95⤵
- Drops file in System32 directory
PID:4020 -
C:\Windows\SysWOW64\whnbixc.exe"C:\Windows\system32\whnbixc.exe"96⤵
- Checks computer location settings
PID:4612 -
C:\Windows\SysWOW64\wrrxdt.exe"C:\Windows\system32\wrrxdt.exe"97⤵PID:4128
-
C:\Windows\SysWOW64\wrermpn.exe"C:\Windows\system32\wrermpn.exe"98⤵PID:1528
-
C:\Windows\SysWOW64\wyqdev.exe"C:\Windows\system32\wyqdev.exe"99⤵
- Drops file in System32 directory
PID:4312 -
C:\Windows\SysWOW64\wqjjq.exe"C:\Windows\system32\wqjjq.exe"100⤵PID:4504
-
C:\Windows\SysWOW64\wvhi.exe"C:\Windows\system32\wvhi.exe"101⤵PID:2008
-
C:\Windows\SysWOW64\wvvbhsufu.exe"C:\Windows\system32\wvvbhsufu.exe"102⤵
- Checks computer location settings
PID:3840 -
C:\Windows\SysWOW64\wwykkma.exe"C:\Windows\system32\wwykkma.exe"103⤵
- Drops file in System32 directory
PID:2800 -
C:\Windows\SysWOW64\welvcsw.exe"C:\Windows\system32\welvcsw.exe"104⤵PID:3392
-
C:\Windows\SysWOW64\wexo.exe"C:\Windows\system32\wexo.exe"105⤵PID:2760
-
C:\Windows\SysWOW64\wfbxnitym.exe"C:\Windows\system32\wfbxnitym.exe"106⤵
- Checks computer location settings
PID:2720 -
C:\Windows\SysWOW64\wuiv.exe"C:\Windows\system32\wuiv.exe"107⤵
- Checks computer location settings
PID:1448 -
C:\Windows\SysWOW64\wignq.exe"C:\Windows\system32\wignq.exe"108⤵
- Checks computer location settings
PID:5008 -
C:\Windows\SysWOW64\whivt.exe"C:\Windows\system32\whivt.exe"109⤵PID:4312
-
C:\Windows\SysWOW64\wqtil.exe"C:\Windows\system32\wqtil.exe"110⤵PID:4504
-
C:\Windows\SysWOW64\wnwuwylcd.exe"C:\Windows\system32\wnwuwylcd.exe"111⤵PID:2008
-
C:\Windows\SysWOW64\wifob.exe"C:\Windows\system32\wifob.exe"112⤵PID:4828
-
C:\Windows\SysWOW64\wvw.exe"C:\Windows\system32\wvw.exe"113⤵
- Checks computer location settings
PID:852 -
C:\Windows\SysWOW64\wmmyyo.exe"C:\Windows\system32\wmmyyo.exe"114⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4536 -
C:\Windows\SysWOW64\wipljr.exe"C:\Windows\system32\wipljr.exe"115⤵
- Drops file in System32 directory
PID:2280 -
C:\Windows\SysWOW64\wnrq.exe"C:\Windows\system32\wnrq.exe"116⤵
- Drops file in System32 directory
PID:1844 -
C:\Windows\SysWOW64\wqqpksa.exe"C:\Windows\system32\wqqpksa.exe"117⤵
- Drops file in System32 directory
PID:1336 -
C:\Windows\SysWOW64\wvdelh.exe"C:\Windows\system32\wvdelh.exe"118⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1488 -
C:\Windows\SysWOW64\wvfnnba.exe"C:\Windows\system32\wvfnnba.exe"119⤵PID:1388
-
C:\Windows\SysWOW64\wed.exe"C:\Windows\system32\wed.exe"120⤵PID:1300
-
C:\Windows\SysWOW64\wmpudng.exe"C:\Windows\system32\wmpudng.exe"121⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3496 -
C:\Windows\SysWOW64\wucgur.exe"C:\Windows\system32\wucgur.exe"122⤵PID:60
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-