Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe
Resource
win10v2004-20241007-en
General
-
Target
0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe
-
Size
107KB
-
MD5
88bc89ab98e89837bf13a0256671e6da
-
SHA1
d9a2e91647e217168d3b570f2d247e4e62fb0981
-
SHA256
0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175
-
SHA512
3c88c79ff351275ddfb2c274504eced993a21bfd60d9cee323f34d99f35ee8a5b6d192566fe1bd09f419f62ac662b6970f0fac34e7cdee70cde010bf8121b7b6
-
SSDEEP
1536:2zfXIsxrhzk2nfsW3ou3yWW2dvcW6eHcBwUi6vWE0Dl27b58XBdqaMGxzl4UQ:yfjxrhzk2nfsWhP7dvavi6vWEbh8X9O
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wew.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wgl.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wqgloj.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wwtrnxpgw.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wrhrhegia.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wlayhdmky.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wvpujwe.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wggoi.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wlueb.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wafb.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wjxwe.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wgyq.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation waehfol.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wyud.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation whgrv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wdfkv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation weytb.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wtkrruss.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wjlgfxsk.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wvmf.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wuamg.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wdyxkyk.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wmmuykrfa.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation woisi.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wftex.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wiidtka.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wdipkaime.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wbo.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wffmyul.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wyd.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wlgckm.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wphfetuo.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wduqsp.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wsgm.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wpfx.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wpgp.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation whol.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation winiy.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wxoymh.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wsx.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wwlyokxs.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wurc.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wstrwp.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wgeekhpsg.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wasysycf.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wkuvonk.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wyalmhe.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wabwxm.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wgs.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wbnsah.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wldfyn.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wnfwp.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wpmuga.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wpqjwfab.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wvspged.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wxh.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wclbxbv.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wimipli.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wgtbxca.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wdjlvpy.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wtlttnam.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wmnjxmoq.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation wxfyyvr.exe -
Executes dropped EXE 64 IoCs
pid Process 5096 woisi.exe 564 wrpegdq.exe 1416 wpmuga.exe 320 wcsfqumg.exe 2012 wjlgfxsk.exe 4872 wyg.exe 2040 wclbxbv.exe 3832 wxjtxcu.exe 3240 wbo.exe 2800 wqvxye.exe 228 wxoymh.exe 3236 wyud.exe 4584 wgkl.exe 2000 wnpyw.exe 948 wlueb.exe 3628 wsx.exe 4824 wpfx.exe 3256 wbgmsmlhv.exe 1084 wlgckm.exe 4788 wimipli.exe 3520 whgrv.exe 1300 wdfkv.exe 4224 wgyq.exe 3992 wafb.exe 3624 wgknae.exe 380 wiaadwbc.exe 3056 wpqjwfab.exe 1868 wurc.exe 5016 wxljuxnd.exe 880 wgs.exe 3652 wquqtcwuj.exe 5068 wwlyokxs.exe 2812 winiy.exe 3260 wqgloj.exe 3672 wkuvonk.exe 3288 wjpgtjiel.exe 4620 wvspged.exe 5108 wftex.exe 1576 wixiuu.exe 3600 wffmyul.exe 4156 wcjvtp.exe 4552 wxnxnu.exe 1900 wmnjxmoq.exe 3260 wpgp.exe 2012 wwkdob.exe 1412 whol.exe 568 wbnsah.exe 4160 wstrwp.exe 3448 wsdsvhpy.exe 1712 wwwyrusm.exe 1584 wwyubmy.exe 4464 wdoduu.exe 888 wjempd.exe 3704 wxfyyvr.exe 4428 wjxwe.exe 3488 wdipkaime.exe 4076 waouqy.exe 3508 wgeekhpsg.exe 1072 wnqtsjq.exe 4224 watcd.exe 3220 wyd.exe 3404 wwtrnxpgw.exe 2000 wnwxqjoc.exe 4600 wnfwp.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wswfj.exe wnfwp.exe File opened for modification C:\Windows\SysWOW64\wvmf.exe wshcqxxuw.exe File opened for modification C:\Windows\SysWOW64\wduqsp.exe wxtxre.exe File created C:\Windows\SysWOW64\wgl.exe wbrokho.exe File opened for modification C:\Windows\SysWOW64\wlgckm.exe wbgmsmlhv.exe File created C:\Windows\SysWOW64\wkuvonk.exe wqgloj.exe File created C:\Windows\SysWOW64\whol.exe wwkdob.exe File created C:\Windows\SysWOW64\wwtrnxpgw.exe wyd.exe File opened for modification C:\Windows\SysWOW64\wbrokho.exe wvpujwe.exe File created C:\Windows\SysWOW64\wswfj.exe wnfwp.exe File created C:\Windows\SysWOW64\wumslca.exe wswfj.exe File opened for modification C:\Windows\SysWOW64\wautv.exe wqpibmmji.exe File created C:\Windows\SysWOW64\wkqcfya.exe wkvsy.exe File opened for modification C:\Windows\SysWOW64\wxjtxcu.exe wclbxbv.exe File opened for modification C:\Windows\SysWOW64\wlueb.exe wnpyw.exe File opened for modification C:\Windows\SysWOW64\wpfx.exe wsx.exe File opened for modification C:\Windows\SysWOW64\whol.exe wwkdob.exe File opened for modification C:\Windows\SysWOW64\wwkdob.exe wpgp.exe File created C:\Windows\SysWOW64\wrif.exe wlrvo.exe File opened for modification C:\Windows\SysWOW64\wbo.exe wxjtxcu.exe File opened for modification C:\Windows\SysWOW64\wvrlatd.exe wkocpxira.exe File created C:\Windows\SysWOW64\whowku.exe wautv.exe File opened for modification C:\Windows\SysWOW64\wubr.exe wsgm.exe File created C:\Windows\SysWOW64\wvrlatd.exe wkocpxira.exe File created C:\Windows\SysWOW64\womkysfj.exe wgl.exe File opened for modification C:\Windows\SysWOW64\wojjbk.exe wkqcfya.exe File opened for modification C:\Windows\SysWOW64\wasysycf.exe wskgn.exe File opened for modification C:\Windows\SysWOW64\wcjvtp.exe wffmyul.exe File opened for modification C:\Windows\SysWOW64\wwwyrusm.exe wsdsvhpy.exe File created C:\Windows\SysWOW64\wkbjpvb.exe wiidtka.exe File opened for modification C:\Windows\SysWOW64\wqpibmmji.exe wlayhdmky.exe File created C:\Windows\SysWOW64\wlueb.exe wnpyw.exe File opened for modification C:\Windows\SysWOW64\wgeekhpsg.exe waouqy.exe File opened for modification C:\Windows\SysWOW64\wnwxqjoc.exe wwtrnxpgw.exe File created C:\Windows\SysWOW64\wispd.exe wsihmm.exe File opened for modification C:\Windows\SysWOW64\wskgn.exe wubr.exe File opened for modification C:\Windows\SysWOW64\wgl.exe wbrokho.exe File created C:\Windows\SysWOW64\wtkrruss.exe wubstbf.exe File opened for modification C:\Windows\SysWOW64\wiaadwbc.exe wgknae.exe File opened for modification C:\Windows\SysWOW64\wkuvonk.exe wqgloj.exe File created C:\Windows\SysWOW64\wffmyul.exe wixiuu.exe File created C:\Windows\SysWOW64\wxh.exe wabwxm.exe File created C:\Windows\SysWOW64\woisi.exe 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe File opened for modification C:\Windows\SysWOW64\woisi.exe 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe File opened for modification C:\Windows\SysWOW64\wkocpxira.exe wuamg.exe File opened for modification C:\Windows\SysWOW64\wgtbxca.exe wrif.exe File created C:\Windows\SysWOW64\wruhq.exe wtkrruss.exe File created C:\Windows\SysWOW64\wclbxbv.exe wyg.exe File opened for modification C:\Windows\SysWOW64\whgrv.exe wimipli.exe File created C:\Windows\SysWOW64\wkj.exe wldfyn.exe File created C:\Windows\SysWOW64\wkvsy.exe whowku.exe File created C:\Windows\SysWOW64\wyud.exe wxoymh.exe File opened for modification C:\Windows\SysWOW64\wbnsah.exe whol.exe File created C:\Windows\SysWOW64\wgeekhpsg.exe waouqy.exe File opened for modification C:\Windows\SysWOW64\wfesxjjfu.exe wtlttnam.exe File created C:\Windows\SysWOW64\whgrv.exe wimipli.exe File opened for modification C:\Windows\SysWOW64\wumslca.exe wswfj.exe File created C:\Windows\SysWOW64\wautv.exe wqpibmmji.exe File created C:\Windows\SysWOW64\wasysycf.exe wskgn.exe File created C:\Windows\SysWOW64\wbo.exe wxjtxcu.exe File opened for modification C:\Windows\SysWOW64\winiy.exe wwlyokxs.exe File created C:\Windows\SysWOW64\wxnxnu.exe wcjvtp.exe File created C:\Windows\SysWOW64\wphfetuo.exe wwhwek.exe File opened for modification C:\Windows\SysWOW64\wabwxm.exe wduqsp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 17 IoCs
pid pid_target Process procid_target 1776 564 WerFault.exe 91 3520 1416 WerFault.exe 96 3624 3628 WerFault.exe 145 60 5016 WerFault.exe 188 380 4156 WerFault.exe 226 1648 4156 WerFault.exe 226 5064 1584 WerFault.exe 260 4744 3704 WerFault.exe 271 1896 4076 WerFault.exe 282 2176 1072 WerFault.exe 290 2768 3220 WerFault.exe 298 208 4600 WerFault.exe 309 3464 1136 WerFault.exe 320 4824 4036 WerFault.exe 424 4892 4284 WerFault.exe 435 3208 1732 WerFault.exe 449 2616 2664 WerFault.exe 484 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wkuvonk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwkdob.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wkocpxira.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjempd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsxdiwb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wsihmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqpibmmji.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winiy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnqtsjq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpqjwfab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wispd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language womkysfj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwtrnxpgw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wkqcfya.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wffmyul.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wpfx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wgknae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxjtxcu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlueb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwlyokxs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language waouqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqvxye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnfwp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wqgloj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wduqsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wasysycf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3920 wrote to memory of 5096 3920 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 87 PID 3920 wrote to memory of 5096 3920 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 87 PID 3920 wrote to memory of 5096 3920 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 87 PID 3920 wrote to memory of 1332 3920 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 89 PID 3920 wrote to memory of 1332 3920 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 89 PID 3920 wrote to memory of 1332 3920 0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe 89 PID 5096 wrote to memory of 564 5096 woisi.exe 91 PID 5096 wrote to memory of 564 5096 woisi.exe 91 PID 5096 wrote to memory of 564 5096 woisi.exe 91 PID 5096 wrote to memory of 2656 5096 woisi.exe 92 PID 5096 wrote to memory of 2656 5096 woisi.exe 92 PID 5096 wrote to memory of 2656 5096 woisi.exe 92 PID 564 wrote to memory of 1416 564 wrpegdq.exe 96 PID 564 wrote to memory of 1416 564 wrpegdq.exe 96 PID 564 wrote to memory of 1416 564 wrpegdq.exe 96 PID 564 wrote to memory of 4240 564 wrpegdq.exe 97 PID 564 wrote to memory of 4240 564 wrpegdq.exe 97 PID 564 wrote to memory of 4240 564 wrpegdq.exe 97 PID 1416 wrote to memory of 320 1416 wpmuga.exe 104 PID 1416 wrote to memory of 320 1416 wpmuga.exe 104 PID 1416 wrote to memory of 320 1416 wpmuga.exe 104 PID 1416 wrote to memory of 2156 1416 wpmuga.exe 105 PID 1416 wrote to memory of 2156 1416 wpmuga.exe 105 PID 1416 wrote to memory of 2156 1416 wpmuga.exe 105 PID 320 wrote to memory of 2012 320 wcsfqumg.exe 109 PID 320 wrote to memory of 2012 320 wcsfqumg.exe 109 PID 320 wrote to memory of 2012 320 wcsfqumg.exe 109 PID 320 wrote to memory of 1140 320 wcsfqumg.exe 110 PID 320 wrote to memory of 1140 320 wcsfqumg.exe 110 PID 320 wrote to memory of 1140 320 wcsfqumg.exe 110 PID 2012 wrote to memory of 4872 2012 wjlgfxsk.exe 113 PID 2012 wrote to memory of 4872 2012 wjlgfxsk.exe 113 PID 2012 wrote to memory of 4872 2012 wjlgfxsk.exe 113 PID 2012 wrote to memory of 2000 2012 wjlgfxsk.exe 114 PID 2012 wrote to memory of 2000 2012 wjlgfxsk.exe 114 PID 2012 wrote to memory of 2000 2012 wjlgfxsk.exe 114 PID 4872 wrote to memory of 2040 4872 wyg.exe 116 PID 4872 wrote to memory of 2040 4872 wyg.exe 116 PID 4872 wrote to memory of 2040 4872 wyg.exe 116 PID 4872 wrote to memory of 212 4872 wyg.exe 117 PID 4872 wrote to memory of 212 4872 wyg.exe 117 PID 4872 wrote to memory of 212 4872 wyg.exe 117 PID 2040 wrote to memory of 3832 2040 wclbxbv.exe 119 PID 2040 wrote to memory of 3832 2040 wclbxbv.exe 119 PID 2040 wrote to memory of 3832 2040 wclbxbv.exe 119 PID 2040 wrote to memory of 216 2040 wclbxbv.exe 121 PID 2040 wrote to memory of 216 2040 wclbxbv.exe 121 PID 2040 wrote to memory of 216 2040 wclbxbv.exe 121 PID 3832 wrote to memory of 3240 3832 wxjtxcu.exe 124 PID 3832 wrote to memory of 3240 3832 wxjtxcu.exe 124 PID 3832 wrote to memory of 3240 3832 wxjtxcu.exe 124 PID 3832 wrote to memory of 4824 3832 wxjtxcu.exe 125 PID 3832 wrote to memory of 4824 3832 wxjtxcu.exe 125 PID 3832 wrote to memory of 4824 3832 wxjtxcu.exe 125 PID 3240 wrote to memory of 2800 3240 wbo.exe 127 PID 3240 wrote to memory of 2800 3240 wbo.exe 127 PID 3240 wrote to memory of 2800 3240 wbo.exe 127 PID 3240 wrote to memory of 1696 3240 wbo.exe 128 PID 3240 wrote to memory of 1696 3240 wbo.exe 128 PID 3240 wrote to memory of 1696 3240 wbo.exe 128 PID 2800 wrote to memory of 228 2800 wqvxye.exe 130 PID 2800 wrote to memory of 228 2800 wqvxye.exe 130 PID 2800 wrote to memory of 228 2800 wqvxye.exe 130 PID 2800 wrote to memory of 3056 2800 wqvxye.exe 131
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe"C:\Users\Admin\AppData\Local\Temp\0e818c90559237778a3ca9856b4cb67b973af59caf027bb801658bab79879175.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\SysWOW64\woisi.exe"C:\Windows\system32\woisi.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\wrpegdq.exe"C:\Windows\system32\wrpegdq.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\wpmuga.exe"C:\Windows\system32\wpmuga.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\SysWOW64\wcsfqumg.exe"C:\Windows\system32\wcsfqumg.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\wjlgfxsk.exe"C:\Windows\system32\wjlgfxsk.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\wyg.exe"C:\Windows\system32\wyg.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\wclbxbv.exe"C:\Windows\system32\wclbxbv.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\wxjtxcu.exe"C:\Windows\system32\wxjtxcu.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\wbo.exe"C:\Windows\system32\wbo.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\wqvxye.exe"C:\Windows\system32\wqvxye.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\wxoymh.exe"C:\Windows\system32\wxoymh.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:228 -
C:\Windows\SysWOW64\wyud.exe"C:\Windows\system32\wyud.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
PID:3236 -
C:\Windows\SysWOW64\wgkl.exe"C:\Windows\system32\wgkl.exe"14⤵
- Executes dropped EXE
PID:4584 -
C:\Windows\SysWOW64\wnpyw.exe"C:\Windows\system32\wnpyw.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2000 -
C:\Windows\SysWOW64\wlueb.exe"C:\Windows\system32\wlueb.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:948 -
C:\Windows\SysWOW64\wsx.exe"C:\Windows\system32\wsx.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3628 -
C:\Windows\SysWOW64\wpfx.exe"C:\Windows\system32\wpfx.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Windows\SysWOW64\wbgmsmlhv.exe"C:\Windows\system32\wbgmsmlhv.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3256 -
C:\Windows\SysWOW64\wlgckm.exe"C:\Windows\system32\wlgckm.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
PID:1084 -
C:\Windows\SysWOW64\wimipli.exe"C:\Windows\system32\wimipli.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4788 -
C:\Windows\SysWOW64\whgrv.exe"C:\Windows\system32\whgrv.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
PID:3520 -
C:\Windows\SysWOW64\wdfkv.exe"C:\Windows\system32\wdfkv.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\wgyq.exe"C:\Windows\system32\wgyq.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
PID:4224 -
C:\Windows\SysWOW64\wafb.exe"C:\Windows\system32\wafb.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
PID:3992 -
C:\Windows\SysWOW64\wgknae.exe"C:\Windows\system32\wgknae.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\wiaadwbc.exe"C:\Windows\system32\wiaadwbc.exe"27⤵
- Executes dropped EXE
PID:380 -
C:\Windows\SysWOW64\wpqjwfab.exe"C:\Windows\system32\wpqjwfab.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\SysWOW64\wurc.exe"C:\Windows\system32\wurc.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\wxljuxnd.exe"C:\Windows\system32\wxljuxnd.exe"30⤵
- Executes dropped EXE
PID:5016 -
C:\Windows\SysWOW64\wgs.exe"C:\Windows\system32\wgs.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:880 -
C:\Windows\SysWOW64\wquqtcwuj.exe"C:\Windows\system32\wquqtcwuj.exe"32⤵
- Executes dropped EXE
PID:3652 -
C:\Windows\SysWOW64\wwlyokxs.exe"C:\Windows\system32\wwlyokxs.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5068 -
C:\Windows\SysWOW64\winiy.exe"C:\Windows\system32\winiy.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\wqgloj.exe"C:\Windows\system32\wqgloj.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3260 -
C:\Windows\SysWOW64\wkuvonk.exe"C:\Windows\system32\wkuvonk.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3672 -
C:\Windows\SysWOW64\wjpgtjiel.exe"C:\Windows\system32\wjpgtjiel.exe"37⤵
- Executes dropped EXE
PID:3288 -
C:\Windows\SysWOW64\wvspged.exe"C:\Windows\system32\wvspged.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
PID:4620 -
C:\Windows\SysWOW64\wftex.exe"C:\Windows\system32\wftex.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:5108 -
C:\Windows\SysWOW64\wixiuu.exe"C:\Windows\system32\wixiuu.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\wffmyul.exe"C:\Windows\system32\wffmyul.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3600 -
C:\Windows\SysWOW64\wcjvtp.exe"C:\Windows\system32\wcjvtp.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4156 -
C:\Windows\SysWOW64\wxnxnu.exe"C:\Windows\system32\wxnxnu.exe"43⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\wmnjxmoq.exe"C:\Windows\system32\wmnjxmoq.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
PID:1900 -
C:\Windows\SysWOW64\wpgp.exe"C:\Windows\system32\wpgp.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3260 -
C:\Windows\SysWOW64\wwkdob.exe"C:\Windows\system32\wwkdob.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\whol.exe"C:\Windows\system32\whol.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1412 -
C:\Windows\SysWOW64\wbnsah.exe"C:\Windows\system32\wbnsah.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:568 -
C:\Windows\SysWOW64\wstrwp.exe"C:\Windows\system32\wstrwp.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\wsdsvhpy.exe"C:\Windows\system32\wsdsvhpy.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3448 -
C:\Windows\SysWOW64\wwwyrusm.exe"C:\Windows\system32\wwwyrusm.exe"51⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\wwyubmy.exe"C:\Windows\system32\wwyubmy.exe"52⤵
- Executes dropped EXE
PID:1584 -
C:\Windows\SysWOW64\wdoduu.exe"C:\Windows\system32\wdoduu.exe"53⤵
- Executes dropped EXE
PID:4464 -
C:\Windows\SysWOW64\wjempd.exe"C:\Windows\system32\wjempd.exe"54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:888 -
C:\Windows\SysWOW64\wxfyyvr.exe"C:\Windows\system32\wxfyyvr.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
PID:3704 -
C:\Windows\SysWOW64\wjxwe.exe"C:\Windows\system32\wjxwe.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4428 -
C:\Windows\SysWOW64\wdipkaime.exe"C:\Windows\system32\wdipkaime.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:3488 -
C:\Windows\SysWOW64\waouqy.exe"C:\Windows\system32\waouqy.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4076 -
C:\Windows\SysWOW64\wgeekhpsg.exe"C:\Windows\system32\wgeekhpsg.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:3508 -
C:\Windows\SysWOW64\wnqtsjq.exe"C:\Windows\system32\wnqtsjq.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1072 -
C:\Windows\SysWOW64\watcd.exe"C:\Windows\system32\watcd.exe"61⤵
- Executes dropped EXE
PID:4224 -
C:\Windows\SysWOW64\wyd.exe"C:\Windows\system32\wyd.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3220 -
C:\Windows\SysWOW64\wwtrnxpgw.exe"C:\Windows\system32\wwtrnxpgw.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3404 -
C:\Windows\SysWOW64\wnwxqjoc.exe"C:\Windows\system32\wnwxqjoc.exe"64⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\wnfwp.exe"C:\Windows\system32\wnfwp.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Windows\SysWOW64\wswfj.exe"C:\Windows\system32\wswfj.exe"66⤵
- Drops file in System32 directory
PID:4280 -
C:\Windows\SysWOW64\wumslca.exe"C:\Windows\system32\wumslca.exe"67⤵PID:4036
-
C:\Windows\SysWOW64\wshcqxxuw.exe"C:\Windows\system32\wshcqxxuw.exe"68⤵
- Drops file in System32 directory
PID:1136 -
C:\Windows\SysWOW64\wvmf.exe"C:\Windows\system32\wvmf.exe"69⤵
- Checks computer location settings
PID:4316 -
C:\Windows\SysWOW64\wuamg.exe"C:\Windows\system32\wuamg.exe"70⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4068 -
C:\Windows\SysWOW64\wkocpxira.exe"C:\Windows\system32\wkocpxira.exe"71⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4976 -
C:\Windows\SysWOW64\wvrlatd.exe"C:\Windows\system32\wvrlatd.exe"72⤵PID:2936
-
C:\Windows\SysWOW64\wwhwek.exe"C:\Windows\system32\wwhwek.exe"73⤵
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\wphfetuo.exe"C:\Windows\system32\wphfetuo.exe"74⤵
- Checks computer location settings
PID:1868 -
C:\Windows\SysWOW64\wsbmbhxe.exe"C:\Windows\system32\wsbmbhxe.exe"75⤵PID:2624
-
C:\Windows\SysWOW64\wrhrhegia.exe"C:\Windows\system32\wrhrhegia.exe"76⤵
- Checks computer location settings
PID:3920 -
C:\Windows\SysWOW64\wsxdiwb.exe"C:\Windows\system32\wsxdiwb.exe"77⤵
- System Location Discovery: System Language Discovery
PID:4040 -
C:\Windows\SysWOW64\weytb.exe"C:\Windows\system32\weytb.exe"78⤵
- Checks computer location settings
PID:2368 -
C:\Windows\SysWOW64\wlrvo.exe"C:\Windows\system32\wlrvo.exe"79⤵
- Drops file in System32 directory
PID:3332 -
C:\Windows\SysWOW64\wrif.exe"C:\Windows\system32\wrif.exe"80⤵
- Drops file in System32 directory
PID:3280 -
C:\Windows\SysWOW64\wgtbxca.exe"C:\Windows\system32\wgtbxca.exe"81⤵
- Checks computer location settings
PID:4316 -
C:\Windows\SysWOW64\wyalmhe.exe"C:\Windows\system32\wyalmhe.exe"82⤵
- Checks computer location settings
PID:4764 -
C:\Windows\SysWOW64\wiidtka.exe"C:\Windows\system32\wiidtka.exe"83⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3976 -
C:\Windows\SysWOW64\wkbjpvb.exe"C:\Windows\system32\wkbjpvb.exe"84⤵PID:3252
-
C:\Windows\SysWOW64\wldfyn.exe"C:\Windows\system32\wldfyn.exe"85⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3236 -
C:\Windows\SysWOW64\wkj.exe"C:\Windows\system32\wkj.exe"86⤵PID:1596
-
C:\Windows\SysWOW64\wlayhdmky.exe"C:\Windows\system32\wlayhdmky.exe"87⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4812 -
C:\Windows\SysWOW64\wqpibmmji.exe"C:\Windows\system32\wqpibmmji.exe"88⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4028 -
C:\Windows\SysWOW64\wautv.exe"C:\Windows\system32\wautv.exe"89⤵
- Drops file in System32 directory
PID:1172 -
C:\Windows\SysWOW64\whowku.exe"C:\Windows\system32\whowku.exe"90⤵
- Drops file in System32 directory
PID:1728 -
C:\Windows\SysWOW64\wkvsy.exe"C:\Windows\system32\wkvsy.exe"91⤵
- Drops file in System32 directory
PID:1988 -
C:\Windows\SysWOW64\wkqcfya.exe"C:\Windows\system32\wkqcfya.exe"92⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\wojjbk.exe"C:\Windows\system32\wojjbk.exe"93⤵PID:2316
-
C:\Windows\SysWOW64\wdyxkyk.exe"C:\Windows\system32\wdyxkyk.exe"94⤵
- Checks computer location settings
PID:2312 -
C:\Windows\SysWOW64\wxtxre.exe"C:\Windows\system32\wxtxre.exe"95⤵
- Drops file in System32 directory
PID:4060 -
C:\Windows\SysWOW64\wduqsp.exe"C:\Windows\system32\wduqsp.exe"96⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\SysWOW64\wabwxm.exe"C:\Windows\system32\wabwxm.exe"97⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2128 -
C:\Windows\SysWOW64\wxh.exe"C:\Windows\system32\wxh.exe"98⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1052 -
C:\Windows\SysWOW64\wew.exe"C:\Windows\system32\wew.exe"99⤵
- Checks computer location settings
PID:3536 -
C:\Windows\SysWOW64\wsihmm.exe"C:\Windows\system32\wsihmm.exe"100⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\wispd.exe"C:\Windows\system32\wispd.exe"101⤵
- System Location Discovery: System Language Discovery
PID:3868 -
C:\Windows\SysWOW64\wmmuykrfa.exe"C:\Windows\system32\wmmuykrfa.exe"102⤵
- Checks computer location settings
PID:4036 -
C:\Windows\SysWOW64\wyeuee.exe"C:\Windows\system32\wyeuee.exe"103⤵PID:3752
-
C:\Windows\SysWOW64\wppbuph.exe"C:\Windows\system32\wppbuph.exe"104⤵PID:2504
-
C:\Windows\SysWOW64\waehfol.exe"C:\Windows\system32\waehfol.exe"105⤵
- Checks computer location settings
PID:4284 -
C:\Windows\SysWOW64\wck.exe"C:\Windows\system32\wck.exe"106⤵PID:1116
-
C:\Windows\SysWOW64\whrsyn.exe"C:\Windows\system32\whrsyn.exe"107⤵PID:2152
-
C:\Windows\SysWOW64\wsgm.exe"C:\Windows\system32\wsgm.exe"108⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2980 -
C:\Windows\SysWOW64\wubr.exe"C:\Windows\system32\wubr.exe"109⤵
- Drops file in System32 directory
PID:1732 -
C:\Windows\SysWOW64\wskgn.exe"C:\Windows\system32\wskgn.exe"110⤵
- Drops file in System32 directory
PID:2000 -
C:\Windows\SysWOW64\wasysycf.exe"C:\Windows\system32\wasysycf.exe"111⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4016 -
C:\Windows\SysWOW64\wdjlvpy.exe"C:\Windows\system32\wdjlvpy.exe"112⤵
- Checks computer location settings
PID:1472 -
C:\Windows\SysWOW64\wvpujwe.exe"C:\Windows\system32\wvpujwe.exe"113⤵
- Checks computer location settings
- Drops file in System32 directory
PID:5044 -
C:\Windows\SysWOW64\wbrokho.exe"C:\Windows\system32\wbrokho.exe"114⤵
- Drops file in System32 directory
PID:4036 -
C:\Windows\SysWOW64\wgl.exe"C:\Windows\system32\wgl.exe"115⤵
- Checks computer location settings
- Drops file in System32 directory
PID:320 -
C:\Windows\SysWOW64\womkysfj.exe"C:\Windows\system32\womkysfj.exe"116⤵
- System Location Discovery: System Language Discovery
PID:4060 -
C:\Windows\SysWOW64\wubstbf.exe"C:\Windows\system32\wubstbf.exe"117⤵
- Drops file in System32 directory
PID:4120 -
C:\Windows\SysWOW64\wtkrruss.exe"C:\Windows\system32\wtkrruss.exe"118⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4288 -
C:\Windows\SysWOW64\wruhq.exe"C:\Windows\system32\wruhq.exe"119⤵PID:3740
-
C:\Windows\SysWOW64\wtlttnam.exe"C:\Windows\system32\wtlttnam.exe"120⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\wfesxjjfu.exe"C:\Windows\system32\wfesxjjfu.exe"121⤵PID:956
-
C:\Windows\SysWOW64\wggoi.exe"C:\Windows\system32\wggoi.exe"122⤵
- Checks computer location settings
PID:2392
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-