Analysis
-
max time kernel
134s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-10-2023 21:15
Behavioral task
behavioral1
Sample
NEAS.29d44e10f90fa2e903709acc488ba3b0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.29d44e10f90fa2e903709acc488ba3b0.exe
Resource
win10v2004-20231020-en
General
-
Target
NEAS.29d44e10f90fa2e903709acc488ba3b0.exe
-
Size
350KB
-
MD5
29d44e10f90fa2e903709acc488ba3b0
-
SHA1
52a2dc32866cbfce81dddb7a5a6c608077301691
-
SHA256
10375658ff23e02d9272983ff323a52cc89a82c23b36c93a271b5dbcf32a941f
-
SHA512
2d6d9f05b126540e0877687bdab0cd3694f29b0eee521c33b61877303f4444c6f990284cae347098699c2372d966eecb608268fd97de53d49ffadb0a22cbe2c6
-
SSDEEP
3072:+YUb5QoJ4g+CLi8HSpmWAVW9UNpZj6Iz1ZdW4SrO7FSVpEv4wD66ib7:+YwLTNV97h6SZI4z7FSVp84+23
Malware Config
Signatures
-
Malware Backdoor - Berbew 64 IoCs
Berbew is a malware infection classified as a 'backdoor' Trojan. This malicious program's primary function is to cause chain infections - it can download/install additional malware such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/memory/1732-0-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x000d00000001200b-5.dat family_berbew behavioral1/files/0x000d00000001200b-7.dat family_berbew behavioral1/files/0x000d00000001200b-8.dat family_berbew behavioral1/files/0x000d00000001200b-13.dat family_berbew behavioral1/files/0x000d00000001200b-16.dat family_berbew behavioral1/files/0x000d00000001200b-19.dat family_berbew behavioral1/files/0x000d00000001200b-20.dat family_berbew behavioral1/memory/1732-21-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0014000000015604-26.dat family_berbew behavioral1/files/0x0014000000015604-28.dat family_berbew behavioral1/files/0x0014000000015604-37.dat family_berbew behavioral1/files/0x0014000000015604-34.dat family_berbew behavioral1/files/0x0014000000015604-40.dat family_berbew behavioral1/memory/2104-43-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0014000000015604-44.dat family_berbew behavioral1/memory/2756-42-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x000900000001561b-48.dat family_berbew behavioral1/memory/2756-62-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/memory/972-64-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x000900000001561b-63.dat family_berbew behavioral1/files/0x000900000001561b-61.dat family_berbew behavioral1/files/0x000900000001561b-58.dat family_berbew behavioral1/files/0x000900000001561b-55.dat family_berbew behavioral1/files/0x000900000001561b-50.dat family_berbew behavioral1/files/0x000e00000001200b-78.dat family_berbew behavioral1/files/0x000e00000001200b-75.dat family_berbew behavioral1/files/0x000e00000001200b-70.dat family_berbew behavioral1/files/0x000e00000001200b-68.dat family_berbew behavioral1/files/0x000e00000001200b-81.dat family_berbew behavioral1/memory/972-84-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x000e00000001200b-83.dat family_berbew behavioral1/memory/2876-82-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0015000000015604-88.dat family_berbew behavioral1/files/0x0015000000015604-99.dat family_berbew behavioral1/files/0x0015000000015604-96.dat family_berbew behavioral1/files/0x0015000000015604-91.dat family_berbew behavioral1/files/0x0015000000015604-101.dat family_berbew behavioral1/memory/1108-104-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/memory/2876-103-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x0015000000015604-105.dat family_berbew behavioral1/files/0x000a00000001561b-111.dat family_berbew behavioral1/files/0x000a00000001561b-109.dat family_berbew behavioral1/files/0x000a00000001561b-120.dat family_berbew behavioral1/files/0x000a00000001561b-117.dat family_berbew behavioral1/files/0x000a00000001561b-122.dat family_berbew behavioral1/memory/1108-123-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x000a00000001561b-124.dat family_berbew behavioral1/files/0x000f00000001200b-130.dat family_berbew behavioral1/files/0x000f00000001200b-128.dat family_berbew behavioral1/memory/524-140-0x00000000032A0000-0x00000000032C4000-memory.dmp family_berbew behavioral1/files/0x000f00000001200b-138.dat family_berbew behavioral1/files/0x000f00000001200b-135.dat family_berbew behavioral1/files/0x000f00000001200b-143.dat family_berbew behavioral1/memory/2380-145-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/memory/524-144-0x0000000000400000-0x0000000000424000-memory.dmp family_berbew behavioral1/files/0x000f00000001200b-146.dat family_berbew behavioral1/files/0x0016000000015604-162.dat family_berbew behavioral1/files/0x0016000000015604-159.dat family_berbew behavioral1/files/0x0016000000015604-153.dat family_berbew behavioral1/files/0x0016000000015604-164.dat family_berbew behavioral1/files/0x0016000000015604-150.dat family_berbew behavioral1/memory/2380-167-0x0000000003C80000-0x0000000003CA4000-memory.dmp family_berbew behavioral1/files/0x0016000000015604-166.dat family_berbew -
Blocklisted process makes network request 18 IoCs
flow pid Process 312 1048 cmd.exe 313 1048 cmd.exe 314 1048 cmd.exe 316 956 cmd.exe 317 956 cmd.exe 318 956 cmd.exe 320 1484 cmd.exe 321 1484 cmd.exe 322 1484 cmd.exe 380 1588 cmd.exe 381 1588 cmd.exe 382 1588 cmd.exe 384 1304 cmd.exe 385 1304 cmd.exe 386 1304 cmd.exe 400 2140 cmd.exe 401 2140 cmd.exe 402 2140 cmd.exe -
Deletes itself 1 IoCs
pid Process 2772 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2104 wnxykdc.exe 2756 wgmbaj.exe 972 wxid.exe 2876 wgiumy.exe 1108 wgnaq.exe 524 wtdsh.exe 2380 wtuipi.exe 912 wuhohb.exe 2208 wkskvp.exe 2768 wlm.exe 2944 wpde.exe 2628 wldly.exe 2888 wxdxo.exe 1216 wscfoa.exe 1044 winbcoo.exe 568 wimdsm.exe 2648 wxwyhbu.exe 2484 wlncqwbcl.exe 2268 wtotpcmm.exe 2636 wcleve.exe 2552 wdxllw.exe 932 wqonv.exe 844 wdantqvcx.exe 1200 wgfom.exe 2972 wpvvfgl.exe 1760 wffrtups.exe 2164 wjwdvinx.exe 1352 wjci.exe 320 wbdr.exe 2816 wrnnufvsc.exe 2820 winxbt.exe 2836 wdnebyn.exe 2868 wytnmdtwv.exe 2792 wckynp.exe 2912 wbulkndlr.exe 2412 wgkxla.exe 940 wmf.exe 848 wpcpu.exe 2252 wllhbxv.exe 1520 wxmvrv.exe 2664 wvwiot.exe 2068 wnxsvg.exe 1280 wjvyumo.exe 2904 wjvelk.exe 1980 wqk.exe 2124 whl.exe 2352 wjv.exe 2440 wolqa.exe 1616 wnuewcl.exe 1364 wavsmxc.exe 2772 wlwgcus.exe 2740 wtflhcl.exe 2408 wcosnigt.exe 2892 wvajso.exe 2500 wvivp.exe 2912 wysfd.exe 1808 wewgyndiu.exe 2140 wqnl.exe 1372 wdmy.exe 2736 wcxmud.exe 2560 wwfvi.exe 2596 wctuqqq.exe 2636 wdaask.exe 1280 wxlryriu.exe -
Loads dropped DLL 64 IoCs
pid Process 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 2104 wnxykdc.exe 2104 wnxykdc.exe 2104 wnxykdc.exe 2104 wnxykdc.exe 2756 wgmbaj.exe 2756 wgmbaj.exe 2756 wgmbaj.exe 2756 wgmbaj.exe 972 wxid.exe 972 wxid.exe 972 wxid.exe 972 wxid.exe 2876 wgiumy.exe 2876 wgiumy.exe 2876 wgiumy.exe 2876 wgiumy.exe 1108 wgnaq.exe 1108 wgnaq.exe 1108 wgnaq.exe 1108 wgnaq.exe 524 wtdsh.exe 524 wtdsh.exe 524 wtdsh.exe 524 wtdsh.exe 2380 wtuipi.exe 2380 wtuipi.exe 2380 wtuipi.exe 2380 wtuipi.exe 912 wuhohb.exe 912 wuhohb.exe 912 wuhohb.exe 912 wuhohb.exe 2208 wkskvp.exe 2208 wkskvp.exe 2208 wkskvp.exe 2208 wkskvp.exe 2768 wlm.exe 2768 wlm.exe 2768 wlm.exe 2768 wlm.exe 2944 wpde.exe 2944 wpde.exe 2944 wpde.exe 2944 wpde.exe 2628 wldly.exe 2628 wldly.exe 2628 wldly.exe 2628 wldly.exe 2888 wxdxo.exe 2888 wxdxo.exe 2888 wxdxo.exe 2888 wxdxo.exe 1216 wscfoa.exe 1216 wscfoa.exe 1216 wscfoa.exe 1216 wscfoa.exe 1044 winbcoo.exe 1044 winbcoo.exe 1044 winbcoo.exe 1044 winbcoo.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wffrtups.exe wpvvfgl.exe File created C:\Windows\SysWOW64\wdmy.exe wqnl.exe File created C:\Windows\SysWOW64\whpxoxnq.exe cmd.exe File created C:\Windows\SysWOW64\wiqlbqe.exe wwqxlsos.exe File created C:\Windows\SysWOW64\wvntro.exe wbont.exe File opened for modification C:\Windows\SysWOW64\wxid.exe wgmbaj.exe File opened for modification C:\Windows\SysWOW64\wqonv.exe wdxllw.exe File created C:\Windows\SysWOW64\wdgbjxxj.exe wehysav.exe File created C:\Windows\SysWOW64\wtotpcmm.exe wlncqwbcl.exe File opened for modification C:\Windows\SysWOW64\winxbt.exe wrnnufvsc.exe File created C:\Windows\SysWOW64\wwrkovkf.exe wpjejoqu.exe File opened for modification C:\Windows\SysWOW64\wpiia.exe wyiyt.exe File opened for modification C:\Windows\SysWOW64\wdantqvcx.exe wqonv.exe File opened for modification C:\Windows\SysWOW64\wxlryriu.exe wdaask.exe File created C:\Windows\SysWOW64\wpquxgtj.exe wcjeulva.exe File created C:\Windows\SysWOW64\wudhxfph.exe wksia.exe File opened for modification C:\Windows\SysWOW64\wxfdg.exe wudhxfph.exe File created C:\Windows\SysWOW64\weqtaubup.exe wiqlbqe.exe File created C:\Windows\SysWOW64\wqbkof.exe wemgejb.exe File created C:\Windows\SysWOW64\wdxllw.exe wcleve.exe File created C:\Windows\SysWOW64\wpvvfgl.exe wgfom.exe File created C:\Windows\SysWOW64\wbulkndlr.exe wckynp.exe File opened for modification C:\Windows\SysWOW64\waxdhd.exe wvntro.exe File created C:\Windows\SysWOW64\wlylac.exe wqxebwllk.exe File opened for modification C:\Windows\SysWOW64\wsfjpps.exe wcqjodjj.exe File opened for modification C:\Windows\SysWOW64\wlylac.exe wqxebwllk.exe File created C:\Windows\SysWOW64\wbdr.exe wjci.exe File opened for modification C:\Windows\SysWOW64\wbdr.exe wjci.exe File created C:\Windows\SysWOW64\wjv.exe whl.exe File created C:\Windows\SysWOW64\wjaaedvv.exe wjpojfkpn.exe File opened for modification C:\Windows\SysWOW64\wdgbjxxj.exe wehysav.exe File opened for modification C:\Windows\SysWOW64\wqnl.exe wewgyndiu.exe File created C:\Windows\SysWOW64\wokbf.exe wxlryriu.exe File opened for modification C:\Windows\SysWOW64\wbulkndlr.exe wckynp.exe File opened for modification C:\Windows\SysWOW64\wwqxlsos.exe wjtrn.exe File created C:\Windows\SysWOW64\wldly.exe wpde.exe File created C:\Windows\SysWOW64\wpcpu.exe wmf.exe File opened for modification C:\Windows\SysWOW64\wpnsvx.exe wxwsu.exe File created C:\Windows\SysWOW64\wimdsm.exe winbcoo.exe File opened for modification C:\Windows\SysWOW64\wcosnigt.exe wtflhcl.exe File opened for modification C:\Windows\SysWOW64\wbjcm.exe wunmbyl.exe File created C:\Windows\SysWOW64\wfhiuoui.exe wtqus.exe File created C:\Windows\SysWOW64\wemgejb.exe wihjlku.exe File created C:\Windows\SysWOW64\wqk.exe wjvelk.exe File created C:\Windows\SysWOW64\wolqa.exe wjv.exe File opened for modification C:\Windows\SysWOW64\wwfvi.exe wcxmud.exe File opened for modification C:\Windows\SysWOW64\wnrc.exe wjmbyiwi.exe File created C:\Windows\SysWOW64\wxwsu.exe wmmuxnhym.exe File opened for modification C:\Windows\SysWOW64\wtdsh.exe wgnaq.exe File opened for modification C:\Windows\SysWOW64\wxmvrv.exe wllhbxv.exe File opened for modification C:\Windows\SysWOW64\wqk.exe wjvelk.exe File opened for modification C:\Windows\SysWOW64\wvajso.exe wcosnigt.exe File opened for modification C:\Windows\SysWOW64\wunmbyl.exe wmtunr.exe File created C:\Windows\SysWOW64\wjtrn.exe wgkib.exe File created C:\Windows\SysWOW64\wxfdg.exe wudhxfph.exe File created C:\Windows\SysWOW64\wrnnufvsc.exe wbdr.exe File created C:\Windows\SysWOW64\wnxsvg.exe wvwiot.exe File opened for modification C:\Windows\SysWOW64\wtflhcl.exe wlwgcus.exe File created C:\Windows\SysWOW64\wvivp.exe wvajso.exe File created C:\Windows\SysWOW64\wcjeulva.exe wxec.exe File created C:\Windows\SysWOW64\wdnebyn.exe winxbt.exe File created C:\Windows\SysWOW64\wqnl.exe wewgyndiu.exe File created C:\Windows\SysWOW64\wnrc.exe wjmbyiwi.exe File created C:\Windows\SysWOW64\wossarv.exe wmljmdg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2312 1616 WerFault.exe 174 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2104 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 28 PID 1732 wrote to memory of 2104 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 28 PID 1732 wrote to memory of 2104 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 28 PID 1732 wrote to memory of 2104 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 28 PID 1732 wrote to memory of 2772 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 29 PID 1732 wrote to memory of 2772 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 29 PID 1732 wrote to memory of 2772 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 29 PID 1732 wrote to memory of 2772 1732 NEAS.29d44e10f90fa2e903709acc488ba3b0.exe 29 PID 2104 wrote to memory of 2756 2104 wnxykdc.exe 31 PID 2104 wrote to memory of 2756 2104 wnxykdc.exe 31 PID 2104 wrote to memory of 2756 2104 wnxykdc.exe 31 PID 2104 wrote to memory of 2756 2104 wnxykdc.exe 31 PID 2104 wrote to memory of 2600 2104 wnxykdc.exe 32 PID 2104 wrote to memory of 2600 2104 wnxykdc.exe 32 PID 2104 wrote to memory of 2600 2104 wnxykdc.exe 32 PID 2104 wrote to memory of 2600 2104 wnxykdc.exe 32 PID 2756 wrote to memory of 972 2756 wgmbaj.exe 34 PID 2756 wrote to memory of 972 2756 wgmbaj.exe 34 PID 2756 wrote to memory of 972 2756 wgmbaj.exe 34 PID 2756 wrote to memory of 972 2756 wgmbaj.exe 34 PID 2756 wrote to memory of 1020 2756 wgmbaj.exe 36 PID 2756 wrote to memory of 1020 2756 wgmbaj.exe 36 PID 2756 wrote to memory of 1020 2756 wgmbaj.exe 36 PID 2756 wrote to memory of 1020 2756 wgmbaj.exe 36 PID 972 wrote to memory of 2876 972 wxid.exe 37 PID 972 wrote to memory of 2876 972 wxid.exe 37 PID 972 wrote to memory of 2876 972 wxid.exe 37 PID 972 wrote to memory of 2876 972 wxid.exe 37 PID 972 wrote to memory of 1984 972 wxid.exe 38 PID 972 wrote to memory of 1984 972 wxid.exe 38 PID 972 wrote to memory of 1984 972 wxid.exe 38 PID 972 wrote to memory of 1984 972 wxid.exe 38 PID 2876 wrote to memory of 1108 2876 wgiumy.exe 40 PID 2876 wrote to memory of 1108 2876 wgiumy.exe 40 PID 2876 wrote to memory of 1108 2876 wgiumy.exe 40 PID 2876 wrote to memory of 1108 2876 wgiumy.exe 40 PID 2876 wrote to memory of 1044 2876 wgiumy.exe 41 PID 2876 wrote to memory of 1044 2876 wgiumy.exe 41 PID 2876 wrote to memory of 1044 2876 wgiumy.exe 41 PID 2876 wrote to memory of 1044 2876 wgiumy.exe 41 PID 1108 wrote to memory of 524 1108 wgnaq.exe 43 PID 1108 wrote to memory of 524 1108 wgnaq.exe 43 PID 1108 wrote to memory of 524 1108 wgnaq.exe 43 PID 1108 wrote to memory of 524 1108 wgnaq.exe 43 PID 1108 wrote to memory of 2732 1108 wgnaq.exe 44 PID 1108 wrote to memory of 2732 1108 wgnaq.exe 44 PID 1108 wrote to memory of 2732 1108 wgnaq.exe 44 PID 1108 wrote to memory of 2732 1108 wgnaq.exe 44 PID 524 wrote to memory of 2380 524 wtdsh.exe 46 PID 524 wrote to memory of 2380 524 wtdsh.exe 46 PID 524 wrote to memory of 2380 524 wtdsh.exe 46 PID 524 wrote to memory of 2380 524 wtdsh.exe 46 PID 524 wrote to memory of 976 524 wtdsh.exe 48 PID 524 wrote to memory of 976 524 wtdsh.exe 48 PID 524 wrote to memory of 976 524 wtdsh.exe 48 PID 524 wrote to memory of 976 524 wtdsh.exe 48 PID 2380 wrote to memory of 912 2380 wtuipi.exe 49 PID 2380 wrote to memory of 912 2380 wtuipi.exe 49 PID 2380 wrote to memory of 912 2380 wtuipi.exe 49 PID 2380 wrote to memory of 912 2380 wtuipi.exe 49 PID 2380 wrote to memory of 2976 2380 wtuipi.exe 50 PID 2380 wrote to memory of 2976 2380 wtuipi.exe 50 PID 2380 wrote to memory of 2976 2380 wtuipi.exe 50 PID 2380 wrote to memory of 2976 2380 wtuipi.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.29d44e10f90fa2e903709acc488ba3b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.29d44e10f90fa2e903709acc488ba3b0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\wnxykdc.exe"C:\Windows\system32\wnxykdc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\wgmbaj.exe"C:\Windows\system32\wgmbaj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\wxid.exe"C:\Windows\system32\wxid.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\wgiumy.exe"C:\Windows\system32\wgiumy.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\wgnaq.exe"C:\Windows\system32\wgnaq.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\wtdsh.exe"C:\Windows\system32\wtdsh.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\wtuipi.exe"C:\Windows\system32\wtuipi.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\wuhohb.exe"C:\Windows\system32\wuhohb.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:912 -
C:\Windows\SysWOW64\wkskvp.exe"C:\Windows\system32\wkskvp.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2208 -
C:\Windows\SysWOW64\wlm.exe"C:\Windows\system32\wlm.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2768 -
C:\Windows\SysWOW64\wpde.exe"C:\Windows\system32\wpde.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2944 -
C:\Windows\SysWOW64\wldly.exe"C:\Windows\system32\wldly.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2628 -
C:\Windows\SysWOW64\wxdxo.exe"C:\Windows\system32\wxdxo.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Windows\SysWOW64\wscfoa.exe"C:\Windows\system32\wscfoa.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1216 -
C:\Windows\SysWOW64\winbcoo.exe"C:\Windows\system32\winbcoo.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1044 -
C:\Windows\SysWOW64\wimdsm.exe"C:\Windows\system32\wimdsm.exe"17⤵
- Executes dropped EXE
PID:568 -
C:\Windows\SysWOW64\wxwyhbu.exe"C:\Windows\system32\wxwyhbu.exe"18⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\wlncqwbcl.exe"C:\Windows\system32\wlncqwbcl.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2484 -
C:\Windows\SysWOW64\wtotpcmm.exe"C:\Windows\system32\wtotpcmm.exe"20⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\wcleve.exe"C:\Windows\system32\wcleve.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\wdxllw.exe"C:\Windows\system32\wdxllw.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2552 -
C:\Windows\SysWOW64\wqonv.exe"C:\Windows\system32\wqonv.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:932 -
C:\Windows\SysWOW64\wdantqvcx.exe"C:\Windows\system32\wdantqvcx.exe"24⤵
- Executes dropped EXE
PID:844 -
C:\Windows\SysWOW64\wgfom.exe"C:\Windows\system32\wgfom.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1200 -
C:\Windows\SysWOW64\wpvvfgl.exe"C:\Windows\system32\wpvvfgl.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\wffrtups.exe"C:\Windows\system32\wffrtups.exe"27⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\SysWOW64\wjwdvinx.exe"C:\Windows\system32\wjwdvinx.exe"28⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\wjci.exe"C:\Windows\system32\wjci.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1352 -
C:\Windows\SysWOW64\wbdr.exe"C:\Windows\system32\wbdr.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:320 -
C:\Windows\SysWOW64\wrnnufvsc.exe"C:\Windows\system32\wrnnufvsc.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2816 -
C:\Windows\SysWOW64\winxbt.exe"C:\Windows\system32\winxbt.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2820 -
C:\Windows\SysWOW64\wdnebyn.exe"C:\Windows\system32\wdnebyn.exe"33⤵
- Executes dropped EXE
PID:2836 -
C:\Windows\SysWOW64\wytnmdtwv.exe"C:\Windows\system32\wytnmdtwv.exe"34⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\wckynp.exe"C:\Windows\system32\wckynp.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2792 -
C:\Windows\SysWOW64\wbulkndlr.exe"C:\Windows\system32\wbulkndlr.exe"36⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\wgkxla.exe"C:\Windows\system32\wgkxla.exe"37⤵
- Executes dropped EXE
PID:2412 -
C:\Windows\SysWOW64\wmf.exe"C:\Windows\system32\wmf.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:940 -
C:\Windows\SysWOW64\wpcpu.exe"C:\Windows\system32\wpcpu.exe"39⤵
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\wllhbxv.exe"C:\Windows\system32\wllhbxv.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2252 -
C:\Windows\SysWOW64\wxmvrv.exe"C:\Windows\system32\wxmvrv.exe"41⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\wvwiot.exe"C:\Windows\system32\wvwiot.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\wnxsvg.exe"C:\Windows\system32\wnxsvg.exe"43⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\SysWOW64\wjvyumo.exe"C:\Windows\system32\wjvyumo.exe"44⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\SysWOW64\wjvelk.exe"C:\Windows\system32\wjvelk.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2904 -
C:\Windows\SysWOW64\wqk.exe"C:\Windows\system32\wqk.exe"46⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\whl.exe"C:\Windows\system32\whl.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\wjv.exe"C:\Windows\system32\wjv.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2352 -
C:\Windows\SysWOW64\wolqa.exe"C:\Windows\system32\wolqa.exe"49⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\SysWOW64\wnuewcl.exe"C:\Windows\system32\wnuewcl.exe"50⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\wavsmxc.exe"C:\Windows\system32\wavsmxc.exe"51⤵
- Executes dropped EXE
PID:1364 -
C:\Windows\SysWOW64\wlwgcus.exe"C:\Windows\system32\wlwgcus.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\wtflhcl.exe"C:\Windows\system32\wtflhcl.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2740 -
C:\Windows\SysWOW64\wcosnigt.exe"C:\Windows\system32\wcosnigt.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2408 -
C:\Windows\SysWOW64\wvajso.exe"C:\Windows\system32\wvajso.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\wvivp.exe"C:\Windows\system32\wvivp.exe"56⤵
- Executes dropped EXE
PID:2500 -
C:\Windows\SysWOW64\wysfd.exe"C:\Windows\system32\wysfd.exe"57⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\wewgyndiu.exe"C:\Windows\system32\wewgyndiu.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1808 -
C:\Windows\SysWOW64\wqnl.exe"C:\Windows\system32\wqnl.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2140 -
C:\Windows\SysWOW64\wdmy.exe"C:\Windows\system32\wdmy.exe"60⤵
- Executes dropped EXE
PID:1372 -
C:\Windows\SysWOW64\wcxmud.exe"C:\Windows\system32\wcxmud.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2736 -
C:\Windows\SysWOW64\wwfvi.exe"C:\Windows\system32\wwfvi.exe"62⤵
- Executes dropped EXE
PID:2560 -
C:\Windows\SysWOW64\wctuqqq.exe"C:\Windows\system32\wctuqqq.exe"63⤵
- Executes dropped EXE
PID:2596 -
C:\Windows\SysWOW64\wdaask.exe"C:\Windows\system32\wdaask.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\wxlryriu.exe"C:\Windows\system32\wxlryriu.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1280 -
C:\Windows\SysWOW64\wokbf.exe"C:\Windows\system32\wokbf.exe"66⤵PID:2892
-
C:\Windows\SysWOW64\wsbnhs.exe"C:\Windows\system32\wsbnhs.exe"67⤵PID:1928
-
C:\Windows\SysWOW64\wjpojfkpn.exe"C:\Windows\system32\wjpojfkpn.exe"68⤵
- Drops file in System32 directory
PID:1216 -
C:\Windows\SysWOW64\wjaaedvv.exe"C:\Windows\system32\wjaaedvv.exe"69⤵PID:3004
-
C:\Windows\SysWOW64\wekrlj.exe"C:\Windows\system32\wekrlj.exe"70⤵PID:2936
-
C:\Windows\SysWOW64\whirrxjxp.exe"C:\Windows\system32\whirrxjxp.exe"71⤵PID:2928
-
C:\Windows\SysWOW64\wodheenw.exe"C:\Windows\system32\wodheenw.exe"72⤵PID:2584
-
C:\Windows\SysWOW64\wgr.exe"C:\Windows\system32\wgr.exe"73⤵PID:2560
-
C:\Windows\SysWOW64\wjmbyiwi.exe"C:\Windows\system32\wjmbyiwi.exe"74⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\wnrc.exe"C:\Windows\system32\wnrc.exe"75⤵PID:2384
-
C:\Windows\SysWOW64\wedwhjoev.exe"C:\Windows\system32\wedwhjoev.exe"76⤵PID:1780
-
C:\Windows\SysWOW64\wedaxfr.exe"C:\Windows\system32\wedaxfr.exe"77⤵PID:1048
-
C:\Windows\SysWOW64\wxbhw.exe"C:\Windows\system32\wxbhw.exe"78⤵PID:956
-
C:\Windows\SysWOW64\wkgdhlge.exe"C:\Windows\system32\wkgdhlge.exe"79⤵PID:1484
-
C:\Windows\SysWOW64\wqpkm.exe"C:\Windows\system32\wqpkm.exe"80⤵PID:3004
-
C:\Windows\SysWOW64\wuysagpn.exe"C:\Windows\system32\wuysagpn.exe"81⤵PID:1940
-
C:\Windows\SysWOW64\wmtunr.exe"C:\Windows\system32\wmtunr.exe"82⤵
- Drops file in System32 directory
PID:2776 -
C:\Windows\SysWOW64\wunmbyl.exe"C:\Windows\system32\wunmbyl.exe"83⤵
- Drops file in System32 directory
PID:2620 -
C:\Windows\SysWOW64\wbjcm.exe"C:\Windows\system32\wbjcm.exe"84⤵PID:2580
-
C:\Windows\SysWOW64\wkqir.exe"C:\Windows\system32\wkqir.exe"85⤵PID:1764
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Windows\system32\wkqir.exe"86⤵PID:1108
-
-
C:\Windows\SysWOW64\wuktumsx.exe"C:\Windows\system32\wuktumsx.exe"86⤵PID:584
-
C:\Windows\SysWOW64\wmatvybw.exe"C:\Windows\system32\wmatvybw.exe"87⤵PID:676
-
C:\Windows\SysWOW64\wpjejoqu.exe"C:\Windows\system32\wpjejoqu.exe"88⤵
- Drops file in System32 directory
PID:1396 -
C:\Windows\SysWOW64\wwrkovkf.exe"C:\Windows\system32\wwrkovkf.exe"89⤵PID:900
-
C:\Windows\SysWOW64\wilvrtr.exe"C:\Windows\system32\wilvrtr.exe"90⤵PID:1256
-
C:\Windows\SysWOW64\wqfmd.exe"C:\Windows\system32\wqfmd.exe"91⤵PID:952
-
C:\Windows\SysWOW64\wtqus.exe"C:\Windows\system32\wtqus.exe"92⤵
- Drops file in System32 directory
PID:2660 -
C:\Windows\SysWOW64\wfhiuoui.exe"C:\Windows\system32\wfhiuoui.exe"93⤵PID:896
-
C:\Windows\SysWOW64\wnmghrlo.exe"C:\Windows\system32\wnmghrlo.exe"94⤵PID:1588
-
C:\Windows\SysWOW64\wesyh.exe"C:\Windows\system32\wesyh.exe"95⤵PID:1304
-
C:\Windows\SysWOW64\whpxoxnq.exe"C:\Windows\system32\whpxoxnq.exe"96⤵PID:1316
-
C:\Windows\SysWOW64\wcoend.exe"C:\Windows\system32\wcoend.exe"97⤵PID:292
-
C:\Windows\SysWOW64\wopseayug.exe"C:\Windows\system32\wopseayug.exe"98⤵PID:1508
-
C:\Windows\SysWOW64\wjbjkgi.exe"C:\Windows\system32\wjbjkgi.exe"99⤵PID:2140
-
C:\Windows\SysWOW64\wbbtrud.exe"C:\Windows\system32\wbbtrud.exe"100⤵PID:892
-
C:\Windows\SysWOW64\wijawbwlq.exe"C:\Windows\system32\wijawbwlq.exe"101⤵PID:2696
-
C:\Windows\SysWOW64\whsntyi.exe"C:\Windows\system32\whsntyi.exe"102⤵PID:2756
-
C:\Windows\SysWOW64\wehysav.exe"C:\Windows\system32\wehysav.exe"103⤵
- Drops file in System32 directory
PID:1516 -
C:\Windows\SysWOW64\wdgbjxxj.exe"C:\Windows\system32\wdgbjxxj.exe"104⤵PID:2944
-
C:\Windows\SysWOW64\wpyomuf.exe"C:\Windows\system32\wpyomuf.exe"105⤵PID:2420
-
C:\Windows\SysWOW64\wgkib.exe"C:\Windows\system32\wgkib.exe"106⤵
- Drops file in System32 directory
PID:472 -
C:\Windows\SysWOW64\wjtrn.exe"C:\Windows\system32\wjtrn.exe"107⤵
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\wwqxlsos.exe"C:\Windows\system32\wwqxlsos.exe"108⤵
- Drops file in System32 directory
PID:1564 -
C:\Windows\SysWOW64\wiqlbqe.exe"C:\Windows\system32\wiqlbqe.exe"109⤵
- Drops file in System32 directory
PID:1544 -
C:\Windows\SysWOW64\weqtaubup.exe"C:\Windows\system32\weqtaubup.exe"110⤵PID:2948
-
C:\Windows\SysWOW64\wmljmdg.exe"C:\Windows\system32\wmljmdg.exe"111⤵
- Drops file in System32 directory
PID:3032 -
C:\Windows\SysWOW64\wossarv.exe"C:\Windows\system32\wossarv.exe"112⤵PID:2324
-
C:\Windows\SysWOW64\wfbfucxp.exe"C:\Windows\system32\wfbfucxp.exe"113⤵PID:2660
-
C:\Windows\SysWOW64\wabms.exe"C:\Windows\system32\wabms.exe"114⤵PID:908
-
C:\Windows\SysWOW64\wpetdbsyx.exe"C:\Windows\system32\wpetdbsyx.exe"115⤵PID:1060
-
C:\Windows\SysWOW64\wovinvmq.exe"C:\Windows\system32\wovinvmq.exe"116⤵PID:1280
-
C:\Windows\SysWOW64\wxec.exe"C:\Windows\system32\wxec.exe"117⤵
- Drops file in System32 directory
PID:832 -
C:\Windows\SysWOW64\wcjeulva.exe"C:\Windows\system32\wcjeulva.exe"118⤵
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\wpquxgtj.exe"C:\Windows\system32\wpquxgtj.exe"119⤵PID:1576
-
C:\Windows\SysWOW64\wcqjodjj.exe"C:\Windows\system32\wcqjodjj.exe"120⤵
- Drops file in System32 directory
PID:1700 -
C:\Windows\SysWOW64\wsfjpps.exe"C:\Windows\system32\wsfjpps.exe"121⤵PID:2576
-
C:\Windows\SysWOW64\wekfaoln.exe"C:\Windows\system32\wekfaoln.exe"122⤵PID:2764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-