Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe
Resource
win10v2004-20241007-en
General
-
Target
0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe
-
Size
107KB
-
MD5
88bc89ab98e89837bf13a0256671e6da
-
SHA1
d9a2e91647e217168d3b570f2d247e4e62fb0981
-
SHA256
0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175
-
SHA512
3c88c79ff351275ddfb2c274504eced993a21bfd60d9cee323f34d99f35ee8a5b6d192566fe1bd09f419f62ac662b6970f0fac34e7cdee70cde010bf8121b7b6
-
SSDEEP
1536:2zfXIsxrhzk2nfsW3ou3yWW2dvcW6eHcBwUi6vWE0Dl27b58XBdqaMGxzl4UQ:yfjxrhzk2nfsWhP7dvavi6vWEbh8X9O
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2732 wncnaduw.exe 2648 wonxgro.exe 2268 wptqp.exe 1464 wyjmq.exe 2944 wckxhxm.exe 1788 wkbg.exe 1532 wpq.exe 2432 wwuram.exe 2168 wuodnj.exe 3060 wgfyml.exe 1772 wsmpqf.exe 2864 wvcbrtd.exe 1608 wox.exe 2108 wryymrdym.exe 1880 wgdxudddk.exe 1308 wxilpne.exe 2332 wyes.exe 2716 wujbe.exe 3012 wybofu.exe 572 wip.exe 2252 wqqbebyev.exe 2892 waj.exe 2864 wtqdsjk.exe 1680 whfujbqe.exe 1808 wybwx.exe 1192 whqfpq.exe 2932 wmvu.exe 2616 wrb.exe 2772 wfia.exe 1572 wwvnel.exe 308 wglkemadu.exe 1992 wegxqlwju.exe 2944 wamg.exe 300 wyeumkx.exe 2024 wvx.exe 1600 wfop.exe 2460 watxeq.exe 2760 wlhwane.exe 1856 wcrhxdh.exe 1604 wtgtgmrna.exe 1832 wyjjivim.exe 1484 wvq.exe 1736 wmwe.exe 2008 wexeduk.exe 1088 wntmjxvbe.exe 2940 wvkvbb.exe 3012 wtf.exe 1156 wbgamggmv.exe 2564 wglooou.exe 2004 wlr.exe 2888 wkrpywo.exe 1528 whc.exe 2248 wsroewd.exe 876 wuiygjbl.exe 2796 wctqupx.exe 1748 whnv.exe 2196 whpvgthm.exe 2260 wqthytab.exe 2864 warqfv.exe 940 wigndw.exe 448 wtkwwv.exe 3056 wydd.exe 3032 wlefp.exe 1672 wyalmqpln.exe -
Loads dropped DLL 64 IoCs
pid Process 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 2732 wncnaduw.exe 2732 wncnaduw.exe 2732 wncnaduw.exe 2732 wncnaduw.exe 2648 wonxgro.exe 2648 wonxgro.exe 2648 wonxgro.exe 2648 wonxgro.exe 2268 wptqp.exe 2268 wptqp.exe 2268 wptqp.exe 2268 wptqp.exe 1464 wyjmq.exe 1464 wyjmq.exe 1464 wyjmq.exe 1464 wyjmq.exe 2944 wckxhxm.exe 2944 wckxhxm.exe 2944 wckxhxm.exe 2944 wckxhxm.exe 1788 wkbg.exe 1788 wkbg.exe 1788 wkbg.exe 1788 wkbg.exe 1532 wpq.exe 1532 wpq.exe 1532 wpq.exe 1532 wpq.exe 2432 wwuram.exe 2432 wwuram.exe 2432 wwuram.exe 2432 wwuram.exe 2168 wuodnj.exe 2168 wuodnj.exe 2168 wuodnj.exe 2168 wuodnj.exe 3060 wgfyml.exe 3060 wgfyml.exe 3060 wgfyml.exe 3060 wgfyml.exe 1772 wsmpqf.exe 1772 wsmpqf.exe 1772 wsmpqf.exe 1772 wsmpqf.exe 2864 wvcbrtd.exe 2864 wvcbrtd.exe 2864 wvcbrtd.exe 2864 wvcbrtd.exe 1608 wox.exe 1608 wox.exe 1608 wox.exe 1608 wox.exe 2108 wryymrdym.exe 2108 wryymrdym.exe 2108 wryymrdym.exe 2108 wryymrdym.exe 1880 wgdxudddk.exe 1880 wgdxudddk.exe 1880 wgdxudddk.exe 1880 wgdxudddk.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wnqybq.exe wrjqoncx.exe File created C:\Windows\SysWOW64\wybitfwlv.exe wsvsrwi.exe File opened for modification C:\Windows\SysWOW64\wuodnj.exe wwuram.exe File created C:\Windows\SysWOW64\wybwx.exe whfujbqe.exe File opened for modification C:\Windows\SysWOW64\wsroewd.exe whc.exe File opened for modification C:\Windows\SysWOW64\whpvgthm.exe whnv.exe File created C:\Windows\SysWOW64\wjlcj.exe wfflifd.exe File opened for modification C:\Windows\SysWOW64\wmwe.exe wvq.exe File opened for modification C:\Windows\SysWOW64\wyalmqpln.exe wlefp.exe File created C:\Windows\SysWOW64\weeolx.exe wpovt.exe File created C:\Windows\SysWOW64\wnqdqmsm.exe wynufvxj.exe File created C:\Windows\SysWOW64\wqthytab.exe whpvgthm.exe File created C:\Windows\SysWOW64\wfia.exe wrb.exe File opened for modification C:\Windows\SysWOW64\wwvnel.exe wfia.exe File created C:\Windows\SysWOW64\wcrhxdh.exe wlhwane.exe File opened for modification C:\Windows\SysWOW64\wvq.exe wyjjivim.exe File created C:\Windows\SysWOW64\wfgdqneqw.exe wvptxkc.exe File created C:\Windows\SysWOW64\wujbe.exe wyes.exe File opened for modification C:\Windows\SysWOW64\wexeduk.exe wmwe.exe File opened for modification C:\Windows\SysWOW64\weeolx.exe wpovt.exe File opened for modification C:\Windows\SysWOW64\wafefrgm.exe wumykid.exe File opened for modification C:\Windows\SysWOW64\wmvu.exe whqfpq.exe File created C:\Windows\SysWOW64\wfyhk.exe wjioswj.exe File created C:\Windows\SysWOW64\wjkrsw.exe wfgdqneqw.exe File opened for modification C:\Windows\SysWOW64\wwpxskua.exe wsbakcumc.exe File created C:\Windows\SysWOW64\wigndw.exe warqfv.exe File created C:\Windows\SysWOW64\wpmtnon.exe wxnuyera.exe File opened for modification C:\Windows\SysWOW64\wchphcd.exe woryqk.exe File created C:\Windows\SysWOW64\wbjdnu.exe wfrkuqx.exe File created C:\Windows\SysWOW64\wkrpywo.exe wlr.exe File opened for modification C:\Windows\SysWOW64\wydd.exe wtkwwv.exe File created C:\Windows\SysWOW64\whirgimu.exe wlcjuf.exe File created C:\Windows\SysWOW64\wsmpqf.exe wgfyml.exe File opened for modification C:\Windows\SysWOW64\wybofu.exe wujbe.exe File created C:\Windows\SysWOW64\wip.exe wybofu.exe File opened for modification C:\Windows\SysWOW64\wtf.exe wvkvbb.exe File created C:\Windows\SysWOW64\wiwbvbnq.exe wtijfjhx.exe File opened for modification C:\Windows\SysWOW64\wihjlku.exe wyqnmjr.exe File opened for modification C:\Windows\SysWOW64\wfflifd.exe wdmdeo.exe File created C:\Windows\SysWOW64\wyes.exe wxilpne.exe File created C:\Windows\SysWOW64\wsroewd.exe whc.exe File created C:\Windows\SysWOW64\woryqk.exe wpmtnon.exe File opened for modification C:\Windows\SysWOW64\wjioswj.exe wrelqn.exe File created C:\Windows\SysWOW64\wafefrgm.exe wumykid.exe File created C:\Windows\SysWOW64\wgfyml.exe wuodnj.exe File opened for modification C:\Windows\SysWOW64\wyes.exe wxilpne.exe File created C:\Windows\SysWOW64\wlr.exe wglooou.exe File created C:\Windows\SysWOW64\whpvgthm.exe whnv.exe File created C:\Windows\SysWOW64\wpq.exe wkbg.exe File created C:\Windows\SysWOW64\wtijfjhx.exe wsoabrh.exe File opened for modification C:\Windows\SysWOW64\wgfyml.exe wuodnj.exe File created C:\Windows\SysWOW64\wqqbebyev.exe wip.exe File created C:\Windows\SysWOW64\wvk.exe wmyqy.exe File created C:\Windows\SysWOW64\wsundyxj.exe wnqybq.exe File created C:\Windows\SysWOW64\wmkukj.exe wdhjqjt.exe File created C:\Windows\SysWOW64\wjioswj.exe wrelqn.exe File created C:\Windows\SysWOW64\wmkjfkkh.exe whvjwbkr.exe File created C:\Windows\SysWOW64\wkbg.exe wckxhxm.exe File opened for modification C:\Windows\SysWOW64\wegxqlwju.exe wglkemadu.exe File opened for modification C:\Windows\SysWOW64\whnv.exe wctqupx.exe File created C:\Windows\SysWOW64\wtkwwv.exe wigndw.exe File opened for modification C:\Windows\SysWOW64\wtpntff.exe wqycsr.exe File opened for modification C:\Windows\SysWOW64\wnvmvbr.exe wrcoqy.exe File created C:\Windows\SysWOW64\wvmtms.exe wiwbvbnq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 9 IoCs
pid pid_target Process procid_target 328 1680 WerFault.exe 99 3032 2564 WerFault.exe 176 2344 2196 WerFault.exe 202 1088 868 WerFault.exe 248 3024 376 WerFault.exe 255 1716 2528 WerFault.exe 274 1948 2304 WerFault.exe 290 2444 2756 WerFault.exe 324 3024 2840 WerFault.exe 370 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wamg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqycsr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbphr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwvnel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmyqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wdhjqjt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wglkemadu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language warqfv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whirgimu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyqnmjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wntmjxvbe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wfyhk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wohhtp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiwbvbnq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wchphcd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpxayno.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language waj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wegxqlwju.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqirrk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wenjrsod.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrimt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcrsuq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language waravnkcy.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2564 wglooou.exe 2756 wfyhk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1812 wrote to memory of 2732 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 30 PID 1812 wrote to memory of 2732 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 30 PID 1812 wrote to memory of 2732 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 30 PID 1812 wrote to memory of 2732 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 30 PID 1812 wrote to memory of 2752 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 31 PID 1812 wrote to memory of 2752 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 31 PID 1812 wrote to memory of 2752 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 31 PID 1812 wrote to memory of 2752 1812 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 31 PID 2732 wrote to memory of 2648 2732 wncnaduw.exe 33 PID 2732 wrote to memory of 2648 2732 wncnaduw.exe 33 PID 2732 wrote to memory of 2648 2732 wncnaduw.exe 33 PID 2732 wrote to memory of 2648 2732 wncnaduw.exe 33 PID 2732 wrote to memory of 1652 2732 wncnaduw.exe 34 PID 2732 wrote to memory of 1652 2732 wncnaduw.exe 34 PID 2732 wrote to memory of 1652 2732 wncnaduw.exe 34 PID 2732 wrote to memory of 1652 2732 wncnaduw.exe 34 PID 2648 wrote to memory of 2268 2648 wonxgro.exe 36 PID 2648 wrote to memory of 2268 2648 wonxgro.exe 36 PID 2648 wrote to memory of 2268 2648 wonxgro.exe 36 PID 2648 wrote to memory of 2268 2648 wonxgro.exe 36 PID 2648 wrote to memory of 1440 2648 wonxgro.exe 37 PID 2648 wrote to memory of 1440 2648 wonxgro.exe 37 PID 2648 wrote to memory of 1440 2648 wonxgro.exe 37 PID 2648 wrote to memory of 1440 2648 wonxgro.exe 37 PID 2268 wrote to memory of 1464 2268 wptqp.exe 39 PID 2268 wrote to memory of 1464 2268 wptqp.exe 39 PID 2268 wrote to memory of 1464 2268 wptqp.exe 39 PID 2268 wrote to memory of 1464 2268 wptqp.exe 39 PID 2268 wrote to memory of 3032 2268 wptqp.exe 40 PID 2268 wrote to memory of 3032 2268 wptqp.exe 40 PID 2268 wrote to memory of 3032 2268 wptqp.exe 40 PID 2268 wrote to memory of 3032 2268 wptqp.exe 40 PID 1464 wrote to memory of 2944 1464 wyjmq.exe 42 PID 1464 wrote to memory of 2944 1464 wyjmq.exe 42 PID 1464 wrote to memory of 2944 1464 wyjmq.exe 42 PID 1464 wrote to memory of 2944 1464 wyjmq.exe 42 PID 1464 wrote to memory of 1092 1464 wyjmq.exe 43 PID 1464 wrote to memory of 1092 1464 wyjmq.exe 43 PID 1464 wrote to memory of 1092 1464 wyjmq.exe 43 PID 1464 wrote to memory of 1092 1464 wyjmq.exe 43 PID 2944 wrote to memory of 1788 2944 wckxhxm.exe 45 PID 2944 wrote to memory of 1788 2944 wckxhxm.exe 45 PID 2944 wrote to memory of 1788 2944 wckxhxm.exe 45 PID 2944 wrote to memory of 1788 2944 wckxhxm.exe 45 PID 2944 wrote to memory of 1528 2944 wckxhxm.exe 46 PID 2944 wrote to memory of 1528 2944 wckxhxm.exe 46 PID 2944 wrote to memory of 1528 2944 wckxhxm.exe 46 PID 2944 wrote to memory of 1528 2944 wckxhxm.exe 46 PID 1788 wrote to memory of 1532 1788 wkbg.exe 48 PID 1788 wrote to memory of 1532 1788 wkbg.exe 48 PID 1788 wrote to memory of 1532 1788 wkbg.exe 48 PID 1788 wrote to memory of 1532 1788 wkbg.exe 48 PID 1788 wrote to memory of 1324 1788 wkbg.exe 49 PID 1788 wrote to memory of 1324 1788 wkbg.exe 49 PID 1788 wrote to memory of 1324 1788 wkbg.exe 49 PID 1788 wrote to memory of 1324 1788 wkbg.exe 49 PID 1532 wrote to memory of 2432 1532 wpq.exe 51 PID 1532 wrote to memory of 2432 1532 wpq.exe 51 PID 1532 wrote to memory of 2432 1532 wpq.exe 51 PID 1532 wrote to memory of 2432 1532 wpq.exe 51 PID 1532 wrote to memory of 876 1532 wpq.exe 52 PID 1532 wrote to memory of 876 1532 wpq.exe 52 PID 1532 wrote to memory of 876 1532 wpq.exe 52 PID 1532 wrote to memory of 876 1532 wpq.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe"C:\Users\Admin\AppData\Local\Temp\0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\wncnaduw.exe"C:\Windows\system32\wncnaduw.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\wonxgro.exe"C:\Windows\system32\wonxgro.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\wptqp.exe"C:\Windows\system32\wptqp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\wyjmq.exe"C:\Windows\system32\wyjmq.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\wckxhxm.exe"C:\Windows\system32\wckxhxm.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\wkbg.exe"C:\Windows\system32\wkbg.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\wpq.exe"C:\Windows\system32\wpq.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\wwuram.exe"C:\Windows\system32\wwuram.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2432 -
C:\Windows\SysWOW64\wuodnj.exe"C:\Windows\system32\wuodnj.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\wgfyml.exe"C:\Windows\system32\wgfyml.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3060 -
C:\Windows\SysWOW64\wsmpqf.exe"C:\Windows\system32\wsmpqf.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772 -
C:\Windows\SysWOW64\wvcbrtd.exe"C:\Windows\system32\wvcbrtd.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2864 -
C:\Windows\SysWOW64\wox.exe"C:\Windows\system32\wox.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\wryymrdym.exe"C:\Windows\system32\wryymrdym.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2108 -
C:\Windows\SysWOW64\wgdxudddk.exe"C:\Windows\system32\wgdxudddk.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1880 -
C:\Windows\SysWOW64\wxilpne.exe"C:\Windows\system32\wxilpne.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1308 -
C:\Windows\SysWOW64\wyes.exe"C:\Windows\system32\wyes.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2332 -
C:\Windows\SysWOW64\wujbe.exe"C:\Windows\system32\wujbe.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2716 -
C:\Windows\SysWOW64\wybofu.exe"C:\Windows\system32\wybofu.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3012 -
C:\Windows\SysWOW64\wip.exe"C:\Windows\system32\wip.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:572 -
C:\Windows\SysWOW64\wqqbebyev.exe"C:\Windows\system32\wqqbebyev.exe"22⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\waj.exe"C:\Windows\system32\waj.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\SysWOW64\wtqdsjk.exe"C:\Windows\system32\wtqdsjk.exe"24⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\SysWOW64\whfujbqe.exe"C:\Windows\system32\whfujbqe.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\wybwx.exe"C:\Windows\system32\wybwx.exe"26⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\whqfpq.exe"C:\Windows\system32\whqfpq.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1192 -
C:\Windows\SysWOW64\wmvu.exe"C:\Windows\system32\wmvu.exe"28⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\wrb.exe"C:\Windows\system32\wrb.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2616 -
C:\Windows\SysWOW64\wfia.exe"C:\Windows\system32\wfia.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\wwvnel.exe"C:\Windows\system32\wwvnel.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\wglkemadu.exe"C:\Windows\system32\wglkemadu.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:308 -
C:\Windows\SysWOW64\wegxqlwju.exe"C:\Windows\system32\wegxqlwju.exe"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\SysWOW64\wamg.exe"C:\Windows\system32\wamg.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\wyeumkx.exe"C:\Windows\system32\wyeumkx.exe"35⤵
- Executes dropped EXE
PID:300 -
C:\Windows\SysWOW64\wvx.exe"C:\Windows\system32\wvx.exe"36⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\wfop.exe"C:\Windows\system32\wfop.exe"37⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\SysWOW64\watxeq.exe"C:\Windows\system32\watxeq.exe"38⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\wlhwane.exe"C:\Windows\system32\wlhwane.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2760 -
C:\Windows\SysWOW64\wcrhxdh.exe"C:\Windows\system32\wcrhxdh.exe"40⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\SysWOW64\wtgtgmrna.exe"C:\Windows\system32\wtgtgmrna.exe"41⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\SysWOW64\wyjjivim.exe"C:\Windows\system32\wyjjivim.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1832 -
C:\Windows\SysWOW64\wvq.exe"C:\Windows\system32\wvq.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1484 -
C:\Windows\SysWOW64\wmwe.exe"C:\Windows\system32\wmwe.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1736 -
C:\Windows\SysWOW64\wexeduk.exe"C:\Windows\system32\wexeduk.exe"45⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\wntmjxvbe.exe"C:\Windows\system32\wntmjxvbe.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Windows\SysWOW64\wvkvbb.exe"C:\Windows\system32\wvkvbb.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2940 -
C:\Windows\SysWOW64\wtf.exe"C:\Windows\system32\wtf.exe"48⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\wbgamggmv.exe"C:\Windows\system32\wbgamggmv.exe"49⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\SysWOW64\wglooou.exe"C:\Windows\system32\wglooou.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of UnmapMainImage
PID:2564 -
C:\Windows\SysWOW64\wlr.exe"C:\Windows\system32\wlr.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2004 -
C:\Windows\SysWOW64\wkrpywo.exe"C:\Windows\system32\wkrpywo.exe"52⤵
- Executes dropped EXE
PID:2888 -
C:\Windows\SysWOW64\whc.exe"C:\Windows\system32\whc.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Windows\SysWOW64\wsroewd.exe"C:\Windows\system32\wsroewd.exe"54⤵
- Executes dropped EXE
PID:2248 -
C:\Windows\SysWOW64\wuiygjbl.exe"C:\Windows\system32\wuiygjbl.exe"55⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\wctqupx.exe"C:\Windows\system32\wctqupx.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2796 -
C:\Windows\SysWOW64\whnv.exe"C:\Windows\system32\whnv.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\whpvgthm.exe"C:\Windows\system32\whpvgthm.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2196 -
C:\Windows\SysWOW64\wqthytab.exe"C:\Windows\system32\wqthytab.exe"59⤵
- Executes dropped EXE
PID:2260 -
C:\Windows\SysWOW64\warqfv.exe"C:\Windows\system32\warqfv.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Windows\SysWOW64\wigndw.exe"C:\Windows\system32\wigndw.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:940 -
C:\Windows\SysWOW64\wtkwwv.exe"C:\Windows\system32\wtkwwv.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:448 -
C:\Windows\SysWOW64\wydd.exe"C:\Windows\system32\wydd.exe"63⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\wlefp.exe"C:\Windows\system32\wlefp.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3032 -
C:\Windows\SysWOW64\wyalmqpln.exe"C:\Windows\system32\wyalmqpln.exe"65⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\waravnkcy.exe"C:\Windows\system32\waravnkcy.exe"66⤵
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\wmyqy.exe"C:\Windows\system32\wmyqy.exe"67⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\wvk.exe"C:\Windows\system32\wvk.exe"68⤵
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\wohhtp.exe"C:\Windows\system32\wohhtp.exe"69⤵
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\SysWOW64\wdhjqjt.exe"C:\Windows\system32\wdhjqjt.exe"70⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Windows\SysWOW64\wmkukj.exe"C:\Windows\system32\wmkukj.exe"71⤵PID:2524
-
C:\Windows\SysWOW64\wlcjuf.exe"C:\Windows\system32\wlcjuf.exe"72⤵
- Drops file in System32 directory
PID:2988 -
C:\Windows\SysWOW64\whirgimu.exe"C:\Windows\system32\whirgimu.exe"73⤵
- System Location Discovery: System Language Discovery
PID:868 -
C:\Windows\SysWOW64\wpxayno.exe"C:\Windows\system32\wpxayno.exe"74⤵
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Windows\SysWOW64\wdtuddes.exe"C:\Windows\system32\wdtuddes.exe"75⤵PID:376
-
C:\Windows\SysWOW64\wrimt.exe"C:\Windows\system32\wrimt.exe"76⤵
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\wodagthr.exe"C:\Windows\system32\wodagthr.exe"77⤵PID:2676
-
C:\Windows\SysWOW64\wqirrk.exe"C:\Windows\system32\wqirrk.exe"78⤵
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\wpovt.exe"C:\Windows\system32\wpovt.exe"79⤵
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\weeolx.exe"C:\Windows\system32\weeolx.exe"80⤵PID:2280
-
C:\Windows\SysWOW64\wxnuyera.exe"C:\Windows\system32\wxnuyera.exe"81⤵
- Drops file in System32 directory
PID:2528 -
C:\Windows\SysWOW64\wpmtnon.exe"C:\Windows\system32\wpmtnon.exe"82⤵
- Drops file in System32 directory
PID:2320 -
C:\Windows\SysWOW64\woryqk.exe"C:\Windows\system32\woryqk.exe"83⤵
- Drops file in System32 directory
PID:2520 -
C:\Windows\SysWOW64\wchphcd.exe"C:\Windows\system32\wchphcd.exe"84⤵
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\wenjrsod.exe"C:\Windows\system32\wenjrsod.exe"85⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\wrjqoncx.exe"C:\Windows\system32\wrjqoncx.exe"86⤵
- Drops file in System32 directory
PID:2304 -
C:\Windows\SysWOW64\wnqybq.exe"C:\Windows\system32\wnqybq.exe"87⤵
- Drops file in System32 directory
PID:1440 -
C:\Windows\SysWOW64\wsundyxj.exe"C:\Windows\system32\wsundyxj.exe"88⤵PID:2128
-
C:\Windows\SysWOW64\wcjjcyao.exe"C:\Windows\system32\wcjjcyao.exe"89⤵PID:2412
-
C:\Windows\SysWOW64\wqycsr.exe"C:\Windows\system32\wqycsr.exe"90⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Windows\SysWOW64\wtpntff.exe"C:\Windows\system32\wtpntff.exe"91⤵PID:2900
-
C:\Windows\SysWOW64\wvjvyug.exe"C:\Windows\system32\wvjvyug.exe"92⤵PID:2572
-
C:\Windows\SysWOW64\wrcoqy.exe"C:\Windows\system32\wrcoqy.exe"93⤵
- Drops file in System32 directory
PID:2500 -
C:\Windows\SysWOW64\wnvmvbr.exe"C:\Windows\system32\wnvmvbr.exe"94⤵PID:844
-
C:\Windows\SysWOW64\wrelqn.exe"C:\Windows\system32\wrelqn.exe"95⤵
- Drops file in System32 directory
PID:2056 -
C:\Windows\SysWOW64\wjioswj.exe"C:\Windows\system32\wjioswj.exe"96⤵
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\wfyhk.exe"C:\Windows\system32\wfyhk.exe"97⤵
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2756 -
C:\Windows\SysWOW64\wsoabrh.exe"C:\Windows\system32\wsoabrh.exe"98⤵
- Drops file in System32 directory
PID:540 -
C:\Windows\SysWOW64\wtijfjhx.exe"C:\Windows\system32\wtijfjhx.exe"99⤵
- Drops file in System32 directory
PID:1112 -
C:\Windows\SysWOW64\wiwbvbnq.exe"C:\Windows\system32\wiwbvbnq.exe"100⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\SysWOW64\wvmtms.exe"C:\Windows\system32\wvmtms.exe"101⤵PID:2696
-
C:\Windows\SysWOW64\wsgga.exe"C:\Windows\system32\wsgga.exe"102⤵PID:2932
-
C:\Windows\SysWOW64\wumykid.exe"C:\Windows\system32\wumykid.exe"103⤵
- Drops file in System32 directory
PID:2792 -
C:\Windows\SysWOW64\wafefrgm.exe"C:\Windows\system32\wafefrgm.exe"104⤵PID:2008
-
C:\Windows\SysWOW64\wotuvj.exe"C:\Windows\system32\wotuvj.exe"105⤵PID:2724
-
C:\Windows\SysWOW64\wpapfa.exe"C:\Windows\system32\wpapfa.exe"106⤵PID:2192
-
C:\Windows\SysWOW64\worepvt.exe"C:\Windows\system32\worepvt.exe"107⤵PID:1644
-
C:\Windows\SysWOW64\wjhnrb.exe"C:\Windows\system32\wjhnrb.exe"108⤵PID:1628
-
C:\Windows\SysWOW64\wwipotc.exe"C:\Windows\system32\wwipotc.exe"109⤵PID:2880
-
C:\Windows\SysWOW64\wyqnmjr.exe"C:\Windows\system32\wyqnmjr.exe"110⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\wihjlku.exe"C:\Windows\system32\wihjlku.exe"111⤵PID:1868
-
C:\Windows\SysWOW64\wynufvxj.exe"C:\Windows\system32\wynufvxj.exe"112⤵
- Drops file in System32 directory
PID:2840 -
C:\Windows\SysWOW64\wnqdqmsm.exe"C:\Windows\system32\wnqdqmsm.exe"113⤵PID:3004
-
C:\Windows\SysWOW64\wsvsrwi.exe"C:\Windows\system32\wsvsrwi.exe"114⤵
- Drops file in System32 directory
PID:1336 -
C:\Windows\SysWOW64\wybitfwlv.exe"C:\Windows\system32\wybitfwlv.exe"115⤵PID:2808
-
C:\Windows\SysWOW64\wcrsuq.exe"C:\Windows\system32\wcrsuq.exe"116⤵
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\whvjwbkr.exe"C:\Windows\system32\whvjwbkr.exe"117⤵
- Drops file in System32 directory
PID:2652 -
C:\Windows\SysWOW64\wmkjfkkh.exe"C:\Windows\system32\wmkjfkkh.exe"118⤵PID:2364
-
C:\Windows\SysWOW64\wvptxkc.exe"C:\Windows\system32\wvptxkc.exe"119⤵
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\wfgdqneqw.exe"C:\Windows\system32\wfgdqneqw.exe"120⤵
- Drops file in System32 directory
PID:1872 -
C:\Windows\SysWOW64\wjkrsw.exe"C:\Windows\system32\wjkrsw.exe"121⤵PID:2100
-
C:\Windows\SysWOW64\wsbakcumc.exe"C:\Windows\system32\wsbakcumc.exe"122⤵
- Drops file in System32 directory
PID:332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-