Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe
-
Size
261KB
-
MD5
9ef5bdc61586c73eb4f775ab3bb16c9c
-
SHA1
f9794ce350f231c5dc20c40a255128bc3147a76c
-
SHA256
1c4e3fe2b33c66d0ff8e3375958b9c3c6df2fb43f133fb1e72803a69dd626dfc
-
SHA512
90a92f1381ae5a408e84685e96269100e35884fbd39deb5028e97c1b5888e0f072a38104350c09790220aa6571603b7b69dc2997e6dfe873bbe495e714047145
-
SSDEEP
3072:ZYUb5QoJ4g+Ri+Zj6Iz1ZdW4SrO7FSVpuc:ZY7xh6SZI4z7FSVpuc
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wedtfy.exewxcchvg.exewswjok.exewtoj.exewmsd.exewchei.exewpofn.exewqfj.exewgacqmj.exewuk.exewanfkdfmv.exewlcy.exewigbsmgv.exewvysyytr.exewkqql.exewwwns.exewgtdilji.exewqno.exewaggbkjod.exewhdapkmx.exewdefdxtuv.exewtroikr.exewsca.exewgqlmmoa.exewbeoip.exewbdua.exewrlhqpw.exewprqlm.exewfsn.exewvmiiearp.exewchxpsty.exewchjrdet.exewdfttbxxe.exewelrxjdr.exewcmhicj.exewod.exewlrjlvfjt.exewxv.exewvkl.exewbacwi.exewxlgc.exewwik.exewovbk.exewhkyo.exewexjwxq.exewdgoan.exewvtcmwu.exewcgh.exewccdye.exe9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exewhvhk.exewtdmqbb.exewohlfiv.exewtciri.exewjeuyjmc.exewvgvbk.exewpci.exewkymlrr.exewsnl.exewpwyx.exewjrcpt.exewyggv.exewrotsd.exewvu.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wedtfy.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wxcchvg.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wswjok.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wtoj.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wmsd.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wchei.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wpofn.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wqfj.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wgacqmj.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wuk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wanfkdfmv.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wlcy.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wigbsmgv.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wvysyytr.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wkqql.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wwwns.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wgtdilji.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wqno.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation waggbkjod.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation whdapkmx.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wdefdxtuv.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wtroikr.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wsca.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wgqlmmoa.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wbeoip.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wbdua.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wrlhqpw.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wprqlm.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wfsn.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wvmiiearp.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wchxpsty.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wchjrdet.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wdfttbxxe.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation welrxjdr.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wcmhicj.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wod.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wlrjlvfjt.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wxv.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wvkl.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wbacwi.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wxlgc.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wwik.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wovbk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation whkyo.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wexjwxq.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wdgoan.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wvtcmwu.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wcgh.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wccdye.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation whvhk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wtdmqbb.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wohlfiv.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wtciri.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wjeuyjmc.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wvgvbk.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wpci.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wkymlrr.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wsnl.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wpwyx.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wjrcpt.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wyggv.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wrotsd.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation wvu.exe -
Executes dropped EXE 64 IoCs
Processes:
wjkhb.exewljetucm.exewkymlrr.exewtfpkt.exewigbsmgv.exewtciri.exewhdubcj.exewugndveih.exewfwtow.exewnbqbay.exewphrw.exewhvtwduxk.exewskxjdwmj.exewllgjnus.exewiiyik.exewwik.exewiypdb.exewovbk.exewhvhk.exewrsoip.exewiuuk.exewtdmqbb.exewhkyo.exewgm.exewvmiiearp.exewolqiowy.exewohlfiv.exewlqa.exewsdbeoe.exewchxpsty.exewmefo.exewchjrdet.exewjeuyjmc.exewhdapkmx.exewdcrphn.exewcmg.exewexjwxq.exewsnl.exewpwyx.exewvysyytr.exewqiix.exewkqql.exewncv.exewkba.exewkoiet.exewedtfy.exewnkl.exewdgoan.exewod.exewbacwi.exewkwjugc.exewpalprq.exewrakxks.exewvtcmwu.exewyggv.exewdefdxtuv.exewgqlmmoa.exewieoua.exewqilgdy.exewuvqq.exewfrwoq.exewpofn.exewbwvtl.exewcgh.exepid process 3408 wjkhb.exe 3604 wljetucm.exe 3400 wkymlrr.exe 1680 wtfpkt.exe 376 wigbsmgv.exe 2964 wtciri.exe 3204 whdubcj.exe 2036 wugndveih.exe 2660 wfwtow.exe 5100 wnbqbay.exe 1760 wphrw.exe 3604 whvtwduxk.exe 4552 wskxjdwmj.exe 4860 wllgjnus.exe 3976 wiiyik.exe 880 wwik.exe 4472 wiypdb.exe 1480 wovbk.exe 2276 whvhk.exe 1924 wrsoip.exe 2000 wiuuk.exe 1632 wtdmqbb.exe 184 whkyo.exe 376 wgm.exe 4840 wvmiiearp.exe 2944 wolqiowy.exe 880 wohlfiv.exe 3376 wlqa.exe 4424 wsdbeoe.exe 4496 wchxpsty.exe 3864 wmefo.exe 3620 wchjrdet.exe 3240 wjeuyjmc.exe 3804 whdapkmx.exe 2336 wdcrphn.exe 1288 wcmg.exe 1428 wexjwxq.exe 4184 wsnl.exe 4436 wpwyx.exe 1924 wvysyytr.exe 5044 wqiix.exe 1472 wkqql.exe 636 wncv.exe 2856 wkba.exe 1188 wkoiet.exe 876 wedtfy.exe 316 wnkl.exe 508 wdgoan.exe 2400 wod.exe 3372 wbacwi.exe 1484 wkwjugc.exe 4688 wpalprq.exe 512 wrakxks.exe 4860 wvtcmwu.exe 2964 wyggv.exe 3432 wdefdxtuv.exe 644 wgqlmmoa.exe 2644 wieoua.exe 3420 wqilgdy.exe 1780 wuvqq.exe 5028 wfrwoq.exe 1556 wpofn.exe 3520 wbwvtl.exe 528 wcgh.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
Processes:
wkwjugc.exewcgh.exewpci.exewhvtwduxk.exewovbk.exewvu.exewxh.exewgacqmj.exewvkrb.exewgm.exewvmiiearp.exewprqlm.exewohlfiv.exewfsn.exewuk.exewxbsf.exewelrxjdr.exewiypdb.exewolqiowy.exewvtcmwu.exewieoua.exewljetucm.exewiiyik.exewfpskff.exewncv.exewypvhhmhe.exewvieaqk.exewiahjhh.exewlnl.exewkymlrr.exewexjwxq.exewqiix.exewbacwi.exewncan.exewlhx.exewtvuko.exewyy.exewmsxws.exewtfpkt.exewhdubcj.exewanykjrt.exewnbqbay.exewnkl.exewbtnbjc.exewwik.exewrkv.exewqpnva.exewnvw.exewghvd.exewqpake.exewkoiet.exewuh.exewcmhicj.exewhdapkmx.exewpofn.exewrlhqpw.exewds.exewjeuyjmc.exedescription ioc process File created C:\Windows\SysWOW64\wpalprq.exe wkwjugc.exe File opened for modification C:\Windows\SysWOW64\wypvhhmhe.exe wcgh.exe File created C:\Windows\SysWOW64\wxwvvcgt.exe wpci.exe File opened for modification C:\Windows\SysWOW64\wskxjdwmj.exe whvtwduxk.exe File opened for modification C:\Windows\SysWOW64\whvhk.exe wovbk.exe File created C:\Windows\SysWOW64\wsca.exe wvu.exe File opened for modification C:\Windows\SysWOW64\wxbsf.exe wxh.exe File opened for modification C:\Windows\SysWOW64\wswjok.exe wgacqmj.exe File opened for modification C:\Windows\SysWOW64\wywv.exe wvkrb.exe File created C:\Windows\SysWOW64\wskxjdwmj.exe whvtwduxk.exe File created C:\Windows\SysWOW64\wvmiiearp.exe wgm.exe File opened for modification C:\Windows\SysWOW64\wolqiowy.exe wvmiiearp.exe File opened for modification C:\Windows\SysWOW64\wanykjrt.exe wprqlm.exe File opened for modification C:\Windows\SysWOW64\wlqa.exe wohlfiv.exe File created C:\Windows\SysWOW64\wyy.exe wfsn.exe File opened for modification C:\Windows\SysWOW64\wqfcp.exe wuk.exe File created C:\Windows\SysWOW64\wqfj.exe wxbsf.exe File opened for modification C:\Windows\SysWOW64\wqpake.exe welrxjdr.exe File opened for modification C:\Windows\SysWOW64\wovbk.exe wiypdb.exe File opened for modification C:\Windows\SysWOW64\wohlfiv.exe wolqiowy.exe File opened for modification C:\Windows\SysWOW64\wyggv.exe wvtcmwu.exe File opened for modification C:\Windows\SysWOW64\wqilgdy.exe wieoua.exe File created C:\Windows\SysWOW64\wkymlrr.exe wljetucm.exe File opened for modification C:\Windows\SysWOW64\wwik.exe wiiyik.exe File opened for modification C:\Windows\SysWOW64\wgae.exe wfpskff.exe File created C:\Windows\SysWOW64\wkba.exe wncv.exe File created C:\Windows\SysWOW64\wxsssc.exe wypvhhmhe.exe File opened for modification C:\Windows\SysWOW64\wuk.exe wvieaqk.exe File created C:\Windows\SysWOW64\wmsxws.exe wiahjhh.exe File opened for modification C:\Windows\SysWOW64\wrkv.exe wlnl.exe File created C:\Windows\SysWOW64\wtfpkt.exe wkymlrr.exe File opened for modification C:\Windows\SysWOW64\wsnl.exe wexjwxq.exe File opened for modification C:\Windows\SysWOW64\wkqql.exe wqiix.exe File opened for modification C:\Windows\SysWOW64\wkwjugc.exe wbacwi.exe File opened for modification C:\Windows\SysWOW64\wwwns.exe wncan.exe File opened for modification C:\Windows\SysWOW64\wlrjlvfjt.exe wlhx.exe File opened for modification C:\Windows\SysWOW64\wgtdilji.exe wtvuko.exe File created C:\Windows\SysWOW64\wxlgc.exe wyy.exe File opened for modification C:\Windows\SysWOW64\wjrcpt.exe wmsxws.exe File opened for modification C:\Windows\SysWOW64\wxwvvcgt.exe wpci.exe File opened for modification C:\Windows\SysWOW64\wigbsmgv.exe wtfpkt.exe File opened for modification C:\Windows\SysWOW64\wugndveih.exe whdubcj.exe File created C:\Windows\SysWOW64\wkqql.exe wqiix.exe File opened for modification C:\Windows\SysWOW64\wapvv.exe wanykjrt.exe File created C:\Windows\SysWOW64\wphrw.exe wnbqbay.exe File opened for modification C:\Windows\SysWOW64\wvmiiearp.exe wgm.exe File created C:\Windows\SysWOW64\wdgoan.exe wnkl.exe File opened for modification C:\Windows\SysWOW64\wyy.exe wfsn.exe File created C:\Windows\SysWOW64\wbphxc.exe wbtnbjc.exe File created C:\Windows\SysWOW64\wiypdb.exe wwik.exe File created C:\Windows\SysWOW64\wds.exe wrkv.exe File created C:\Windows\SysWOW64\wlcy.exe wqpnva.exe File created C:\Windows\SysWOW64\wohlfiv.exe wolqiowy.exe File opened for modification C:\Windows\SysWOW64\wprqlm.exe wnvw.exe File opened for modification C:\Windows\SysWOW64\wtoj.exe wghvd.exe File opened for modification C:\Windows\SysWOW64\wcmhicj.exe wqpake.exe File opened for modification C:\Windows\SysWOW64\wedtfy.exe wkoiet.exe File opened for modification C:\Windows\SysWOW64\welrxjdr.exe wuh.exe File created C:\Windows\SysWOW64\wiahjhh.exe wcmhicj.exe File opened for modification C:\Windows\SysWOW64\wdcrphn.exe whdapkmx.exe File opened for modification C:\Windows\SysWOW64\wbwvtl.exe wpofn.exe File created C:\Windows\SysWOW64\wnvw.exe wrlhqpw.exe File opened for modification C:\Windows\SysWOW64\wednyxec.exe wds.exe File opened for modification C:\Windows\SysWOW64\whdapkmx.exe wjeuyjmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 19 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3000 3204 WerFault.exe whdubcj.exe 3064 3204 WerFault.exe whdubcj.exe 1920 3604 WerFault.exe whvtwduxk.exe 1852 4424 WerFault.exe wsdbeoe.exe 2824 3620 WerFault.exe wchjrdet.exe 4816 3240 WerFault.exe wjeuyjmc.exe 4160 3240 WerFault.exe wjeuyjmc.exe 976 1036 WerFault.exe wypvhhmhe.exe 532 1036 WerFault.exe wypvhhmhe.exe 1404 2384 WerFault.exe wncan.exe 3844 4140 WerFault.exe wkxnhk.exe 4364 4948 WerFault.exe wanfkdfmv.exe 1148 1852 WerFault.exe wmgogw.exe 404 3368 WerFault.exe wmsxws.exe 876 4616 WerFault.exe wlcy.exe 2336 2880 WerFault.exe wywv.exe 3448 4400 WerFault.exe wxwvvcgt.exe 4936 4400 WerFault.exe wxwvvcgt.exe 2780 3064 WerFault.exe wpioitt.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.execmd.exewednyxec.execmd.exewbdua.execmd.exewvkl.exewvgvbk.execmd.exewxv.execmd.exewiuuk.execmd.exewgqlmmoa.execmd.execmd.execmd.execmd.exewvysyytr.execmd.execmd.exewds.exewbeoip.execmd.execmd.execmd.exewgacqmj.exewhkyo.execmd.execmd.exewphrw.execmd.execmd.execmd.execmd.exewccdye.execmd.exewswjok.execmd.execmd.execmd.exewcmg.execmd.execmd.execmd.exewakrraw.execmd.execmd.execmd.execmd.execmd.exewbwvtl.exewwik.exewuh.execmd.exewjkhb.execmd.execmd.exewrkv.exewnvw.exewvkrb.execmd.execmd.exewkba.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wednyxec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbdua.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvkl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvgvbk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wxv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiuuk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wgqlmmoa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvysyytr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbeoip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wgacqmj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whkyo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wphrw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wccdye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wswjok.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wakrraw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wbwvtl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wwik.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjkhb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnvw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wvkrb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wkba.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exewjkhb.exewljetucm.exewkymlrr.exewtfpkt.exewigbsmgv.exewtciri.exewhdubcj.exewugndveih.exewfwtow.exewnbqbay.exedescription pid process target process PID 4556 wrote to memory of 3408 4556 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe wjkhb.exe PID 4556 wrote to memory of 3408 4556 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe wjkhb.exe PID 4556 wrote to memory of 3408 4556 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe wjkhb.exe PID 4556 wrote to memory of 4680 4556 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe cmd.exe PID 4556 wrote to memory of 4680 4556 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe cmd.exe PID 4556 wrote to memory of 4680 4556 9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe cmd.exe PID 3408 wrote to memory of 3604 3408 wjkhb.exe wljetucm.exe PID 3408 wrote to memory of 3604 3408 wjkhb.exe wljetucm.exe PID 3408 wrote to memory of 3604 3408 wjkhb.exe wljetucm.exe PID 3408 wrote to memory of 3636 3408 wjkhb.exe cmd.exe PID 3408 wrote to memory of 3636 3408 wjkhb.exe cmd.exe PID 3408 wrote to memory of 3636 3408 wjkhb.exe cmd.exe PID 3604 wrote to memory of 3400 3604 wljetucm.exe wkymlrr.exe PID 3604 wrote to memory of 3400 3604 wljetucm.exe wkymlrr.exe PID 3604 wrote to memory of 3400 3604 wljetucm.exe wkymlrr.exe PID 3604 wrote to memory of 1912 3604 wljetucm.exe cmd.exe PID 3604 wrote to memory of 1912 3604 wljetucm.exe cmd.exe PID 3604 wrote to memory of 1912 3604 wljetucm.exe cmd.exe PID 3400 wrote to memory of 1680 3400 wkymlrr.exe wtfpkt.exe PID 3400 wrote to memory of 1680 3400 wkymlrr.exe wtfpkt.exe PID 3400 wrote to memory of 1680 3400 wkymlrr.exe wtfpkt.exe PID 3400 wrote to memory of 3364 3400 wkymlrr.exe cmd.exe PID 3400 wrote to memory of 3364 3400 wkymlrr.exe cmd.exe PID 3400 wrote to memory of 3364 3400 wkymlrr.exe cmd.exe PID 1680 wrote to memory of 376 1680 wtfpkt.exe wigbsmgv.exe PID 1680 wrote to memory of 376 1680 wtfpkt.exe wigbsmgv.exe PID 1680 wrote to memory of 376 1680 wtfpkt.exe wigbsmgv.exe PID 1680 wrote to memory of 4844 1680 wtfpkt.exe cmd.exe PID 1680 wrote to memory of 4844 1680 wtfpkt.exe cmd.exe PID 1680 wrote to memory of 4844 1680 wtfpkt.exe cmd.exe PID 376 wrote to memory of 2964 376 wigbsmgv.exe wtciri.exe PID 376 wrote to memory of 2964 376 wigbsmgv.exe wtciri.exe PID 376 wrote to memory of 2964 376 wigbsmgv.exe wtciri.exe PID 376 wrote to memory of 2512 376 wigbsmgv.exe cmd.exe PID 376 wrote to memory of 2512 376 wigbsmgv.exe cmd.exe PID 376 wrote to memory of 2512 376 wigbsmgv.exe cmd.exe PID 2964 wrote to memory of 3204 2964 wtciri.exe whdubcj.exe PID 2964 wrote to memory of 3204 2964 wtciri.exe whdubcj.exe PID 2964 wrote to memory of 3204 2964 wtciri.exe whdubcj.exe PID 2964 wrote to memory of 4416 2964 wtciri.exe cmd.exe PID 2964 wrote to memory of 4416 2964 wtciri.exe cmd.exe PID 2964 wrote to memory of 4416 2964 wtciri.exe cmd.exe PID 3204 wrote to memory of 2036 3204 whdubcj.exe wugndveih.exe PID 3204 wrote to memory of 2036 3204 whdubcj.exe wugndveih.exe PID 3204 wrote to memory of 2036 3204 whdubcj.exe wugndveih.exe PID 3204 wrote to memory of 3780 3204 whdubcj.exe cmd.exe PID 3204 wrote to memory of 3780 3204 whdubcj.exe cmd.exe PID 3204 wrote to memory of 3780 3204 whdubcj.exe cmd.exe PID 2036 wrote to memory of 2660 2036 wugndveih.exe wfwtow.exe PID 2036 wrote to memory of 2660 2036 wugndveih.exe wfwtow.exe PID 2036 wrote to memory of 2660 2036 wugndveih.exe wfwtow.exe PID 2036 wrote to memory of 1384 2036 wugndveih.exe cmd.exe PID 2036 wrote to memory of 1384 2036 wugndveih.exe cmd.exe PID 2036 wrote to memory of 1384 2036 wugndveih.exe cmd.exe PID 2660 wrote to memory of 5100 2660 wfwtow.exe wnbqbay.exe PID 2660 wrote to memory of 5100 2660 wfwtow.exe wnbqbay.exe PID 2660 wrote to memory of 5100 2660 wfwtow.exe wnbqbay.exe PID 2660 wrote to memory of 2636 2660 wfwtow.exe cmd.exe PID 2660 wrote to memory of 2636 2660 wfwtow.exe cmd.exe PID 2660 wrote to memory of 2636 2660 wfwtow.exe cmd.exe PID 5100 wrote to memory of 1760 5100 wnbqbay.exe wphrw.exe PID 5100 wrote to memory of 1760 5100 wnbqbay.exe wphrw.exe PID 5100 wrote to memory of 1760 5100 wnbqbay.exe wphrw.exe PID 5100 wrote to memory of 3632 5100 wnbqbay.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9ef5bdc61586c73eb4f775ab3bb16c9c_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\wjkhb.exe"C:\Windows\system32\wjkhb.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\wljetucm.exe"C:\Windows\system32\wljetucm.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\wkymlrr.exe"C:\Windows\system32\wkymlrr.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\wtfpkt.exe"C:\Windows\system32\wtfpkt.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\wigbsmgv.exe"C:\Windows\system32\wigbsmgv.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\wtciri.exe"C:\Windows\system32\wtciri.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\whdubcj.exe"C:\Windows\system32\whdubcj.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\wugndveih.exe"C:\Windows\system32\wugndveih.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\wfwtow.exe"C:\Windows\system32\wfwtow.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\wnbqbay.exe"C:\Windows\system32\wnbqbay.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\wphrw.exe"C:\Windows\system32\wphrw.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\whvtwduxk.exe"C:\Windows\system32\whvtwduxk.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3604 -
C:\Windows\SysWOW64\wskxjdwmj.exe"C:\Windows\system32\wskxjdwmj.exe"14⤵
- Executes dropped EXE
PID:4552 -
C:\Windows\SysWOW64\wllgjnus.exe"C:\Windows\system32\wllgjnus.exe"15⤵
- Executes dropped EXE
PID:4860 -
C:\Windows\SysWOW64\wiiyik.exe"C:\Windows\system32\wiiyik.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3976 -
C:\Windows\SysWOW64\wwik.exe"C:\Windows\system32\wwik.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\wiypdb.exe"C:\Windows\system32\wiypdb.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4472 -
C:\Windows\SysWOW64\wovbk.exe"C:\Windows\system32\wovbk.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1480 -
C:\Windows\SysWOW64\whvhk.exe"C:\Windows\system32\whvhk.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\wrsoip.exe"C:\Windows\system32\wrsoip.exe"21⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\SysWOW64\wiuuk.exe"C:\Windows\system32\wiuuk.exe"22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\wtdmqbb.exe"C:\Windows\system32\wtdmqbb.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\whkyo.exe"C:\Windows\system32\whkyo.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:184 -
C:\Windows\SysWOW64\wgm.exe"C:\Windows\system32\wgm.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:376 -
C:\Windows\SysWOW64\wvmiiearp.exe"C:\Windows\system32\wvmiiearp.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4840 -
C:\Windows\SysWOW64\wolqiowy.exe"C:\Windows\system32\wolqiowy.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2944 -
C:\Windows\SysWOW64\wohlfiv.exe"C:\Windows\system32\wohlfiv.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:880 -
C:\Windows\SysWOW64\wlqa.exe"C:\Windows\system32\wlqa.exe"29⤵
- Executes dropped EXE
PID:3376 -
C:\Windows\SysWOW64\wsdbeoe.exe"C:\Windows\system32\wsdbeoe.exe"30⤵
- Executes dropped EXE
PID:4424 -
C:\Windows\SysWOW64\wchxpsty.exe"C:\Windows\system32\wchxpsty.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:4496 -
C:\Windows\SysWOW64\wmefo.exe"C:\Windows\system32\wmefo.exe"32⤵
- Executes dropped EXE
PID:3864 -
C:\Windows\SysWOW64\wchjrdet.exe"C:\Windows\system32\wchjrdet.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
PID:3620 -
C:\Windows\SysWOW64\wjeuyjmc.exe"C:\Windows\system32\wjeuyjmc.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3240 -
C:\Windows\SysWOW64\whdapkmx.exe"C:\Windows\system32\whdapkmx.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3804 -
C:\Windows\SysWOW64\wdcrphn.exe"C:\Windows\system32\wdcrphn.exe"36⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\SysWOW64\wcmg.exe"C:\Windows\system32\wcmg.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Windows\SysWOW64\wexjwxq.exe"C:\Windows\system32\wexjwxq.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1428 -
C:\Windows\SysWOW64\wsnl.exe"C:\Windows\system32\wsnl.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
PID:4184 -
C:\Windows\SysWOW64\wpwyx.exe"C:\Windows\system32\wpwyx.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
PID:4436 -
C:\Windows\SysWOW64\wvysyytr.exe"C:\Windows\system32\wvysyytr.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Windows\SysWOW64\wqiix.exe"C:\Windows\system32\wqiix.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5044 -
C:\Windows\SysWOW64\wkqql.exe"C:\Windows\system32\wkqql.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\wncv.exe"C:\Windows\system32\wncv.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:636 -
C:\Windows\SysWOW64\wkba.exe"C:\Windows\system32\wkba.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\wkoiet.exe"C:\Windows\system32\wkoiet.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1188 -
C:\Windows\SysWOW64\wedtfy.exe"C:\Windows\system32\wedtfy.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\wnkl.exe"C:\Windows\system32\wnkl.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:316 -
C:\Windows\SysWOW64\wdgoan.exe"C:\Windows\system32\wdgoan.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
PID:508 -
C:\Windows\SysWOW64\wod.exe"C:\Windows\system32\wod.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\wbacwi.exe"C:\Windows\system32\wbacwi.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3372 -
C:\Windows\SysWOW64\wkwjugc.exe"C:\Windows\system32\wkwjugc.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1484 -
C:\Windows\SysWOW64\wpalprq.exe"C:\Windows\system32\wpalprq.exe"53⤵
- Executes dropped EXE
PID:4688 -
C:\Windows\SysWOW64\wrakxks.exe"C:\Windows\system32\wrakxks.exe"54⤵
- Executes dropped EXE
PID:512 -
C:\Windows\SysWOW64\wvtcmwu.exe"C:\Windows\system32\wvtcmwu.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:4860 -
C:\Windows\SysWOW64\wyggv.exe"C:\Windows\system32\wyggv.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\wdefdxtuv.exe"C:\Windows\system32\wdefdxtuv.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:3432 -
C:\Windows\SysWOW64\wgqlmmoa.exe"C:\Windows\system32\wgqlmmoa.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:644 -
C:\Windows\SysWOW64\wieoua.exe"C:\Windows\system32\wieoua.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2644 -
C:\Windows\SysWOW64\wqilgdy.exe"C:\Windows\system32\wqilgdy.exe"60⤵
- Executes dropped EXE
PID:3420 -
C:\Windows\SysWOW64\wuvqq.exe"C:\Windows\system32\wuvqq.exe"61⤵
- Executes dropped EXE
PID:1780 -
C:\Windows\SysWOW64\wfrwoq.exe"C:\Windows\system32\wfrwoq.exe"62⤵
- Executes dropped EXE
PID:5028 -
C:\Windows\SysWOW64\wpofn.exe"C:\Windows\system32\wpofn.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1556 -
C:\Windows\SysWOW64\wbwvtl.exe"C:\Windows\system32\wbwvtl.exe"64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Windows\SysWOW64\wcgh.exe"C:\Windows\system32\wcgh.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:528 -
C:\Windows\SysWOW64\wypvhhmhe.exe"C:\Windows\system32\wypvhhmhe.exe"66⤵
- Drops file in System32 directory
PID:1036 -
C:\Windows\SysWOW64\wxsssc.exe"C:\Windows\system32\wxsssc.exe"67⤵PID:1948
-
C:\Windows\SysWOW64\wxcchvg.exe"C:\Windows\system32\wxcchvg.exe"68⤵
- Checks computer location settings
PID:3432 -
C:\Windows\SysWOW64\wjwkgsrh.exe"C:\Windows\system32\wjwkgsrh.exe"69⤵PID:2132
-
C:\Windows\SysWOW64\wdfttbxxe.exe"C:\Windows\system32\wdfttbxxe.exe"70⤵
- Checks computer location settings
PID:3636 -
C:\Windows\SysWOW64\wrlhqpw.exe"C:\Windows\system32\wrlhqpw.exe"71⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4744 -
C:\Windows\SysWOW64\wnvw.exe"C:\Windows\system32\wnvw.exe"72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3852 -
C:\Windows\SysWOW64\wprqlm.exe"C:\Windows\system32\wprqlm.exe"73⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4388 -
C:\Windows\SysWOW64\wanykjrt.exe"C:\Windows\system32\wanykjrt.exe"74⤵
- Drops file in System32 directory
PID:5096 -
C:\Windows\SysWOW64\wapvv.exe"C:\Windows\system32\wapvv.exe"75⤵PID:4488
-
C:\Windows\SysWOW64\wakrraw.exe"C:\Windows\system32\wakrraw.exe"76⤵
- System Location Discovery: System Language Discovery
PID:3220 -
C:\Windows\SysWOW64\wncan.exe"C:\Windows\system32\wncan.exe"77⤵
- Drops file in System32 directory
PID:2384 -
C:\Windows\SysWOW64\wwwns.exe"C:\Windows\system32\wwwns.exe"78⤵
- Checks computer location settings
PID:668 -
C:\Windows\SysWOW64\wxh.exe"C:\Windows\system32\wxh.exe"79⤵
- Drops file in System32 directory
PID:3292 -
C:\Windows\SysWOW64\wxbsf.exe"C:\Windows\system32\wxbsf.exe"80⤵
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\wqfj.exe"C:\Windows\system32\wqfj.exe"81⤵
- Checks computer location settings
PID:1384 -
C:\Windows\SysWOW64\wtroikr.exe"C:\Windows\system32\wtroikr.exe"82⤵
- Checks computer location settings
PID:2132 -
C:\Windows\SysWOW64\wbeoip.exe"C:\Windows\system32\wbeoip.exe"83⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Windows\SysWOW64\wccdye.exe"C:\Windows\system32\wccdye.exe"84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Windows\SysWOW64\wkxnhk.exe"C:\Windows\system32\wkxnhk.exe"85⤵PID:4140
-
C:\Windows\SysWOW64\wlhx.exe"C:\Windows\system32\wlhx.exe"86⤵
- Drops file in System32 directory
PID:1896 -
C:\Windows\SysWOW64\wlrjlvfjt.exe"C:\Windows\system32\wlrjlvfjt.exe"87⤵
- Checks computer location settings
PID:3068 -
C:\Windows\SysWOW64\wrotsd.exe"C:\Windows\system32\wrotsd.exe"88⤵
- Checks computer location settings
PID:856 -
C:\Windows\SysWOW64\wfsn.exe"C:\Windows\system32\wfsn.exe"89⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3196 -
C:\Windows\SysWOW64\wyy.exe"C:\Windows\system32\wyy.exe"90⤵
- Drops file in System32 directory
PID:3476 -
C:\Windows\SysWOW64\wxlgc.exe"C:\Windows\system32\wxlgc.exe"91⤵
- Checks computer location settings
PID:2308 -
C:\Windows\SysWOW64\wxv.exe"C:\Windows\system32\wxv.exe"92⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3292 -
C:\Windows\SysWOW64\wvu.exe"C:\Windows\system32\wvu.exe"93⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\wsca.exe"C:\Windows\system32\wsca.exe"94⤵
- Checks computer location settings
PID:1384 -
C:\Windows\SysWOW64\wtvuko.exe"C:\Windows\system32\wtvuko.exe"95⤵
- Drops file in System32 directory
PID:4656 -
C:\Windows\SysWOW64\wgtdilji.exe"C:\Windows\system32\wgtdilji.exe"96⤵
- Checks computer location settings
PID:2024 -
C:\Windows\SysWOW64\wxvsdyi.exe"C:\Windows\system32\wxvsdyi.exe"97⤵PID:1924
-
C:\Windows\SysWOW64\wds.exe"C:\Windows\system32\wds.exe"98⤵
- Drops file in System32 directory
PID:4260 -
C:\Windows\SysWOW64\wednyxec.exe"C:\Windows\system32\wednyxec.exe"99⤵
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\wgacqmj.exe"C:\Windows\system32\wgacqmj.exe"100⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4636 -
C:\Windows\SysWOW64\wswjok.exe"C:\Windows\system32\wswjok.exe"101⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3308 -
C:\Windows\SysWOW64\wfpskff.exe"C:\Windows\system32\wfpskff.exe"102⤵
- Drops file in System32 directory
PID:2512 -
C:\Windows\SysWOW64\wgae.exe"C:\Windows\system32\wgae.exe"103⤵PID:3904
-
C:\Windows\SysWOW64\wdoascgqt.exe"C:\Windows\system32\wdoascgqt.exe"104⤵PID:1396
-
C:\Windows\SysWOW64\wanfkdfmv.exe"C:\Windows\system32\wanfkdfmv.exe"105⤵
- Checks computer location settings
PID:4948 -
C:\Windows\SysWOW64\wmgogw.exe"C:\Windows\system32\wmgogw.exe"106⤵PID:1852
-
C:\Windows\SysWOW64\wvkl.exe"C:\Windows\system32\wvkl.exe"107⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3356 -
C:\Windows\SysWOW64\wqno.exe"C:\Windows\system32\wqno.exe"108⤵
- Checks computer location settings
PID:4640 -
C:\Windows\SysWOW64\wvieaqk.exe"C:\Windows\system32\wvieaqk.exe"109⤵
- Drops file in System32 directory
PID:368 -
C:\Windows\SysWOW64\wuk.exe"C:\Windows\system32\wuk.exe"110⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4152 -
C:\Windows\SysWOW64\wqfcp.exe"C:\Windows\system32\wqfcp.exe"111⤵PID:3224
-
C:\Windows\SysWOW64\woefi.exe"C:\Windows\system32\woefi.exe"112⤵PID:3256
-
C:\Windows\SysWOW64\wghvd.exe"C:\Windows\system32\wghvd.exe"113⤵
- Drops file in System32 directory
PID:1036 -
C:\Windows\SysWOW64\wtoj.exe"C:\Windows\system32\wtoj.exe"114⤵
- Checks computer location settings
PID:4232 -
C:\Windows\SysWOW64\wvgvbk.exe"C:\Windows\system32\wvgvbk.exe"115⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\SysWOW64\wuh.exe"C:\Windows\system32\wuh.exe"116⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\welrxjdr.exe"C:\Windows\system32\welrxjdr.exe"117⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1288 -
C:\Windows\SysWOW64\wqpake.exe"C:\Windows\system32\wqpake.exe"118⤵
- Drops file in System32 directory
PID:396 -
C:\Windows\SysWOW64\wcmhicj.exe"C:\Windows\system32\wcmhicj.exe"119⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1392 -
C:\Windows\SysWOW64\wiahjhh.exe"C:\Windows\system32\wiahjhh.exe"120⤵
- Drops file in System32 directory
PID:1772 -
C:\Windows\SysWOW64\wmsxws.exe"C:\Windows\system32\wmsxws.exe"121⤵
- Drops file in System32 directory
PID:3368 -
C:\Windows\SysWOW64\wjrcpt.exe"C:\Windows\system32\wjrcpt.exe"122⤵
- Checks computer location settings
PID:448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-