Analysis
-
max time kernel
140s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 19:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
acad2392f55ee3b75ee914661f7f1613.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
acad2392f55ee3b75ee914661f7f1613.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
acad2392f55ee3b75ee914661f7f1613.exe
-
Size
263KB
-
MD5
acad2392f55ee3b75ee914661f7f1613
-
SHA1
aabc5065a60f23dda114fbe4240f1e4b8b533842
-
SHA256
c664712f1f4ba717816eed9c15d4d05f48a91bc5280d8ed1080f083c52a01a90
-
SHA512
1407546cc77c508a1b15c622306b69c44828f02b4bf25615751328df0c3badb3a09dae9aa69453673f3e44ceb74a8ae9e4ca3408884b6973ab116802a532e909
-
SSDEEP
3072:ZYUb5QoJ4g+Ri+Zj6Iz1ZdW4SrO7FSVpuh:ZY7xh6SZI4z7FSVpuh
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2412 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2564 wgjbtn.exe 2424 wdafnj.exe 1020 wafev.exe 1948 wima.exe 1860 wxph.exe 2140 wga.exe 1332 wjwot.exe 2172 wgd.exe 2240 wxuthelra.exe 3016 wtcctir.exe 1204 wkjpotue.exe 556 wnclagv.exe 1936 wwavfigoe.exe 1088 wblymsc.exe 2764 wadovo.exe 708 wgt.exe 1996 walspg.exe 2996 wuopslf.exe 2240 wcahwq.exe 2700 wcjibkb.exe 324 wummc.exe 1820 wxcxc.exe 1936 wxemc.exe 2100 wvvcma.exe 436 wnvltn.exe 1656 whf.exe 2548 wlu.exe 1224 wpepmp.exe 1804 wytxftt.exe 2508 wdrktfaly.exe 1104 wlhsli.exe 1792 wuwoli.exe 2044 wxnalve.exe 1436 whehebfkv.exe 1800 wddoeg.exe 2528 wllhp.exe 2816 whaein.exe 1080 wiex.exe 1204 wtflhcl.exe 1040 wdcvndwnx.exe 768 wowirceb.exe 2936 wxlqjg.exe 2716 wwvdgerfk.exe 1332 wodpbq.exe 2652 wfspcf.exe 2976 wvekqti.exe 572 wucng.exe 2444 wds.exe 1956 whb.exe 2784 wgs.exe 828 wcsb.exe 2904 wbtbmgyr.exe 948 wjyxxk.exe 300 wocufx.exe 2176 wqa.exe 1128 wubovamw.exe 2020 whirrxjxp.exe 812 wkydsk.exe 1016 wgyk.exe 1936 wntaex.exe 2100 wkshddg.exe 640 woqtqnnb.exe 536 wrhfrakhq.exe 856 wnfaxdktd.exe -
Loads dropped DLL 64 IoCs
pid Process 3012 acad2392f55ee3b75ee914661f7f1613.exe 3012 acad2392f55ee3b75ee914661f7f1613.exe 3012 acad2392f55ee3b75ee914661f7f1613.exe 3012 acad2392f55ee3b75ee914661f7f1613.exe 2564 wgjbtn.exe 2564 wgjbtn.exe 2564 wgjbtn.exe 2564 wgjbtn.exe 2424 wdafnj.exe 2424 wdafnj.exe 2424 wdafnj.exe 2424 wdafnj.exe 1020 wafev.exe 1020 wafev.exe 1020 wafev.exe 1020 wafev.exe 1948 wima.exe 1948 wima.exe 1948 wima.exe 1948 wima.exe 1860 wxph.exe 1860 wxph.exe 1860 wxph.exe 1860 wxph.exe 2140 wga.exe 2140 wga.exe 2140 wga.exe 2140 wga.exe 1332 wjwot.exe 1332 wjwot.exe 1332 wjwot.exe 1332 wjwot.exe 2172 wgd.exe 2172 wgd.exe 2172 wgd.exe 2172 wgd.exe 2240 wxuthelra.exe 2240 wxuthelra.exe 2240 wxuthelra.exe 2240 wxuthelra.exe 3016 wtcctir.exe 3016 wtcctir.exe 3016 wtcctir.exe 3016 wtcctir.exe 1204 wkjpotue.exe 1204 wkjpotue.exe 1204 wkjpotue.exe 1204 wkjpotue.exe 556 wnclagv.exe 556 wnclagv.exe 556 wnclagv.exe 556 wnclagv.exe 1936 wwavfigoe.exe 1936 wwavfigoe.exe 1936 wwavfigoe.exe 1936 wwavfigoe.exe 1088 wblymsc.exe 1088 wblymsc.exe 1088 wblymsc.exe 1088 wblymsc.exe 2764 wadovo.exe 2764 wadovo.exe 2764 wadovo.exe 2764 wadovo.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wnclagv.exe wkjpotue.exe File opened for modification C:\Windows\SysWOW64\walspg.exe wgt.exe File opened for modification C:\Windows\SysWOW64\wurqur.exe wogoni.exe File created C:\Windows\SysWOW64\wxph.exe wima.exe File created C:\Windows\SysWOW64\wnclagv.exe wkjpotue.exe File opened for modification C:\Windows\SysWOW64\wxuthelra.exe wgd.exe File opened for modification C:\Windows\SysWOW64\wubovamw.exe wqa.exe File opened for modification C:\Windows\SysWOW64\wpffpw.exe witatu.exe File created C:\Windows\SysWOW64\wqrchp.exe wvsvi.exe File opened for modification C:\Windows\SysWOW64\wqrchp.exe wvsvi.exe File created C:\Windows\SysWOW64\wficyqmx.exe waoweji.exe File opened for modification C:\Windows\SysWOW64\wiex.exe whaein.exe File opened for modification C:\Windows\SysWOW64\wgyk.exe wkydsk.exe File created C:\Windows\SysWOW64\wummc.exe wcjibkb.exe File created C:\Windows\SysWOW64\wdcvndwnx.exe wtflhcl.exe File opened for modification C:\Windows\SysWOW64\wima.exe wafev.exe File opened for modification C:\Windows\SysWOW64\wblymsc.exe wwavfigoe.exe File created C:\Windows\SysWOW64\wbtbmgyr.exe wcsb.exe File opened for modification C:\Windows\SysWOW64\winkecke.exe wlrlaao.exe File opened for modification C:\Windows\SysWOW64\wiiayo.exe wvruotg.exe File created C:\Windows\SysWOW64\wgd.exe wjwot.exe File created C:\Windows\SysWOW64\wvvcma.exe wxemc.exe File created C:\Windows\SysWOW64\winkecke.exe wlrlaao.exe File created C:\Windows\SysWOW64\wecafyw.exe wfdy.exe File opened for modification C:\Windows\SysWOW64\wwvdgerfk.exe wxlqjg.exe File opened for modification C:\Windows\SysWOW64\wbtbmgyr.exe wcsb.exe File opened for modification C:\Windows\SysWOW64\wuhamrhbb.exe wpcxt.exe File opened for modification C:\Windows\SysWOW64\wxcxc.exe wummc.exe File opened for modification C:\Windows\SysWOW64\wtflhcl.exe wiex.exe File opened for modification C:\Windows\SysWOW64\wgs.exe whb.exe File created C:\Windows\SysWOW64\wxyry.exe wpxayno.exe File created C:\Windows\SysWOW64\wcijwekt.exe wqhuhittt.exe File created C:\Windows\SysWOW64\wob.exe wkdxhmy.exe File created C:\Windows\SysWOW64\wuhamrhbb.exe wpcxt.exe File created C:\Windows\SysWOW64\wdafnj.exe wgjbtn.exe File opened for modification C:\Windows\SysWOW64\wdafnj.exe wgjbtn.exe File opened for modification C:\Windows\SysWOW64\wqa.exe wocufx.exe File opened for modification C:\Windows\SysWOW64\wpxayno.exe wpywjpmw.exe File opened for modification C:\Windows\SysWOW64\wpcxt.exe wuerubvg.exe File created C:\Windows\SysWOW64\wxuthelra.exe wgd.exe File created C:\Windows\SysWOW64\wvekqti.exe wfspcf.exe File created C:\Windows\SysWOW64\whdvbps.exe wvwfwut.exe File created C:\Windows\SysWOW64\wohnesf.exe wbbwyyh.exe File created C:\Windows\SysWOW64\wuwoli.exe wlhsli.exe File created C:\Windows\SysWOW64\wqhuhittt.exe wuamvf.exe File opened for modification C:\Windows\SysWOW64\wlhsli.exe wdrktfaly.exe File opened for modification C:\Windows\SysWOW64\wucng.exe wvekqti.exe File opened for modification C:\Windows\SysWOW64\whirrxjxp.exe wubovamw.exe File created C:\Windows\SysWOW64\woqtqnnb.exe wkshddg.exe File opened for modification C:\Windows\SysWOW64\wfomxje.exe wjjfm.exe File created C:\Windows\SysWOW64\wovinvmq.exe wtlshpe.exe File opened for modification C:\Windows\SysWOW64\wlu.exe whf.exe File created C:\Windows\SysWOW64\wytxftt.exe wpepmp.exe File created C:\Windows\SysWOW64\wdluakqd.exe wlsmfvfy.exe File opened for modification C:\Windows\SysWOW64\wkguupx.exe wxyry.exe File created C:\Windows\SysWOW64\wkdxhmy.exe whmlgb.exe File opened for modification C:\Windows\SysWOW64\wceyvm.exe whwqlhvf.exe File created C:\Windows\SysWOW64\wasoqo.exe wrchyih.exe File created C:\Windows\SysWOW64\wjwot.exe wga.exe File created C:\Windows\SysWOW64\wxemc.exe wxcxc.exe File created C:\Windows\SysWOW64\wurqur.exe wogoni.exe File created C:\Windows\SysWOW64\wvruotg.exe wasoqo.exe File opened for modification C:\Windows\SysWOW64\wecafyw.exe wfdy.exe File opened for modification C:\Windows\SysWOW64\wdluakqd.exe wlsmfvfy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1636 2700 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2564 3012 acad2392f55ee3b75ee914661f7f1613.exe 28 PID 3012 wrote to memory of 2564 3012 acad2392f55ee3b75ee914661f7f1613.exe 28 PID 3012 wrote to memory of 2564 3012 acad2392f55ee3b75ee914661f7f1613.exe 28 PID 3012 wrote to memory of 2564 3012 acad2392f55ee3b75ee914661f7f1613.exe 28 PID 3012 wrote to memory of 2412 3012 acad2392f55ee3b75ee914661f7f1613.exe 29 PID 3012 wrote to memory of 2412 3012 acad2392f55ee3b75ee914661f7f1613.exe 29 PID 3012 wrote to memory of 2412 3012 acad2392f55ee3b75ee914661f7f1613.exe 29 PID 3012 wrote to memory of 2412 3012 acad2392f55ee3b75ee914661f7f1613.exe 29 PID 2564 wrote to memory of 2424 2564 wgjbtn.exe 31 PID 2564 wrote to memory of 2424 2564 wgjbtn.exe 31 PID 2564 wrote to memory of 2424 2564 wgjbtn.exe 31 PID 2564 wrote to memory of 2424 2564 wgjbtn.exe 31 PID 2564 wrote to memory of 2108 2564 wgjbtn.exe 32 PID 2564 wrote to memory of 2108 2564 wgjbtn.exe 32 PID 2564 wrote to memory of 2108 2564 wgjbtn.exe 32 PID 2564 wrote to memory of 2108 2564 wgjbtn.exe 32 PID 2424 wrote to memory of 1020 2424 wdafnj.exe 34 PID 2424 wrote to memory of 1020 2424 wdafnj.exe 34 PID 2424 wrote to memory of 1020 2424 wdafnj.exe 34 PID 2424 wrote to memory of 1020 2424 wdafnj.exe 34 PID 2424 wrote to memory of 2864 2424 wdafnj.exe 36 PID 2424 wrote to memory of 2864 2424 wdafnj.exe 36 PID 2424 wrote to memory of 2864 2424 wdafnj.exe 36 PID 2424 wrote to memory of 2864 2424 wdafnj.exe 36 PID 1020 wrote to memory of 1948 1020 wafev.exe 37 PID 1020 wrote to memory of 1948 1020 wafev.exe 37 PID 1020 wrote to memory of 1948 1020 wafev.exe 37 PID 1020 wrote to memory of 1948 1020 wafev.exe 37 PID 1020 wrote to memory of 1832 1020 wafev.exe 38 PID 1020 wrote to memory of 1832 1020 wafev.exe 38 PID 1020 wrote to memory of 1832 1020 wafev.exe 38 PID 1020 wrote to memory of 1832 1020 wafev.exe 38 PID 1948 wrote to memory of 1860 1948 wima.exe 40 PID 1948 wrote to memory of 1860 1948 wima.exe 40 PID 1948 wrote to memory of 1860 1948 wima.exe 40 PID 1948 wrote to memory of 1860 1948 wima.exe 40 PID 1948 wrote to memory of 768 1948 wima.exe 41 PID 1948 wrote to memory of 768 1948 wima.exe 41 PID 1948 wrote to memory of 768 1948 wima.exe 41 PID 1948 wrote to memory of 768 1948 wima.exe 41 PID 1860 wrote to memory of 2140 1860 wxph.exe 43 PID 1860 wrote to memory of 2140 1860 wxph.exe 43 PID 1860 wrote to memory of 2140 1860 wxph.exe 43 PID 1860 wrote to memory of 2140 1860 wxph.exe 43 PID 1860 wrote to memory of 1812 1860 wxph.exe 45 PID 1860 wrote to memory of 1812 1860 wxph.exe 45 PID 1860 wrote to memory of 1812 1860 wxph.exe 45 PID 1860 wrote to memory of 1812 1860 wxph.exe 45 PID 2140 wrote to memory of 1332 2140 wga.exe 46 PID 2140 wrote to memory of 1332 2140 wga.exe 46 PID 2140 wrote to memory of 1332 2140 wga.exe 46 PID 2140 wrote to memory of 1332 2140 wga.exe 46 PID 2140 wrote to memory of 1184 2140 wga.exe 47 PID 2140 wrote to memory of 1184 2140 wga.exe 47 PID 2140 wrote to memory of 1184 2140 wga.exe 47 PID 2140 wrote to memory of 1184 2140 wga.exe 47 PID 1332 wrote to memory of 2172 1332 wjwot.exe 49 PID 1332 wrote to memory of 2172 1332 wjwot.exe 49 PID 1332 wrote to memory of 2172 1332 wjwot.exe 49 PID 1332 wrote to memory of 2172 1332 wjwot.exe 49 PID 1332 wrote to memory of 2800 1332 wjwot.exe 50 PID 1332 wrote to memory of 2800 1332 wjwot.exe 50 PID 1332 wrote to memory of 2800 1332 wjwot.exe 50 PID 1332 wrote to memory of 2800 1332 wjwot.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\acad2392f55ee3b75ee914661f7f1613.exe"C:\Users\Admin\AppData\Local\Temp\acad2392f55ee3b75ee914661f7f1613.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\wgjbtn.exe"C:\Windows\system32\wgjbtn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\wdafnj.exe"C:\Windows\system32\wdafnj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\wafev.exe"C:\Windows\system32\wafev.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\wima.exe"C:\Windows\system32\wima.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\wxph.exe"C:\Windows\system32\wxph.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\wga.exe"C:\Windows\system32\wga.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\wjwot.exe"C:\Windows\system32\wjwot.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\wgd.exe"C:\Windows\system32\wgd.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\wxuthelra.exe"C:\Windows\system32\wxuthelra.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240 -
C:\Windows\SysWOW64\wtcctir.exe"C:\Windows\system32\wtcctir.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3016 -
C:\Windows\SysWOW64\wkjpotue.exe"C:\Windows\system32\wkjpotue.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1204 -
C:\Windows\SysWOW64\wnclagv.exe"C:\Windows\system32\wnclagv.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:556 -
C:\Windows\SysWOW64\wwavfigoe.exe"C:\Windows\system32\wwavfigoe.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\wblymsc.exe"C:\Windows\system32\wblymsc.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088 -
C:\Windows\SysWOW64\wadovo.exe"C:\Windows\system32\wadovo.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2764 -
C:\Windows\SysWOW64\wgt.exe"C:\Windows\system32\wgt.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:708 -
C:\Windows\SysWOW64\walspg.exe"C:\Windows\system32\walspg.exe"18⤵
- Executes dropped EXE
PID:1996 -
C:\Windows\SysWOW64\wuopslf.exe"C:\Windows\system32\wuopslf.exe"19⤵
- Executes dropped EXE
PID:2996 -
C:\Windows\SysWOW64\wcahwq.exe"C:\Windows\system32\wcahwq.exe"20⤵
- Executes dropped EXE
PID:2240 -
C:\Windows\SysWOW64\wcjibkb.exe"C:\Windows\system32\wcjibkb.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2700 -
C:\Windows\SysWOW64\wummc.exe"C:\Windows\system32\wummc.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:324 -
C:\Windows\SysWOW64\wxcxc.exe"C:\Windows\system32\wxcxc.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1820 -
C:\Windows\SysWOW64\wxemc.exe"C:\Windows\system32\wxemc.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1936 -
C:\Windows\SysWOW64\wvvcma.exe"C:\Windows\system32\wvvcma.exe"25⤵
- Executes dropped EXE
PID:2100 -
C:\Windows\SysWOW64\wnvltn.exe"C:\Windows\system32\wnvltn.exe"26⤵
- Executes dropped EXE
PID:436 -
C:\Windows\SysWOW64\whf.exe"C:\Windows\system32\whf.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\wlu.exe"C:\Windows\system32\wlu.exe"28⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\wpepmp.exe"C:\Windows\system32\wpepmp.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1224 -
C:\Windows\SysWOW64\wytxftt.exe"C:\Windows\system32\wytxftt.exe"30⤵
- Executes dropped EXE
PID:1804 -
C:\Windows\SysWOW64\wdrktfaly.exe"C:\Windows\system32\wdrktfaly.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2508 -
C:\Windows\SysWOW64\wlhsli.exe"C:\Windows\system32\wlhsli.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1104 -
C:\Windows\SysWOW64\wuwoli.exe"C:\Windows\system32\wuwoli.exe"33⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\wxnalve.exe"C:\Windows\system32\wxnalve.exe"34⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\whehebfkv.exe"C:\Windows\system32\whehebfkv.exe"35⤵
- Executes dropped EXE
PID:1436 -
C:\Windows\SysWOW64\wddoeg.exe"C:\Windows\system32\wddoeg.exe"36⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\wllhp.exe"C:\Windows\system32\wllhp.exe"37⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\SysWOW64\whaein.exe"C:\Windows\system32\whaein.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2816 -
C:\Windows\SysWOW64\wiex.exe"C:\Windows\system32\wiex.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1080 -
C:\Windows\SysWOW64\wtflhcl.exe"C:\Windows\system32\wtflhcl.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1204 -
C:\Windows\SysWOW64\wdcvndwnx.exe"C:\Windows\system32\wdcvndwnx.exe"41⤵
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\wowirceb.exe"C:\Windows\system32\wowirceb.exe"42⤵
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\wxlqjg.exe"C:\Windows\system32\wxlqjg.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2936 -
C:\Windows\SysWOW64\wwvdgerfk.exe"C:\Windows\system32\wwvdgerfk.exe"44⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\wodpbq.exe"C:\Windows\system32\wodpbq.exe"45⤵
- Executes dropped EXE
PID:1332 -
C:\Windows\SysWOW64\wfspcf.exe"C:\Windows\system32\wfspcf.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2652 -
C:\Windows\SysWOW64\wvekqti.exe"C:\Windows\system32\wvekqti.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2976 -
C:\Windows\SysWOW64\wucng.exe"C:\Windows\system32\wucng.exe"48⤵
- Executes dropped EXE
PID:572 -
C:\Windows\SysWOW64\wds.exe"C:\Windows\system32\wds.exe"49⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\whb.exe"C:\Windows\system32\whb.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1956 -
C:\Windows\SysWOW64\wgs.exe"C:\Windows\system32\wgs.exe"51⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\wcsb.exe"C:\Windows\system32\wcsb.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:828 -
C:\Windows\SysWOW64\wbtbmgyr.exe"C:\Windows\system32\wbtbmgyr.exe"53⤵
- Executes dropped EXE
PID:2904 -
C:\Windows\SysWOW64\wjyxxk.exe"C:\Windows\system32\wjyxxk.exe"54⤵
- Executes dropped EXE
PID:948 -
C:\Windows\SysWOW64\wocufx.exe"C:\Windows\system32\wocufx.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:300 -
C:\Windows\SysWOW64\wqa.exe"C:\Windows\system32\wqa.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\wubovamw.exe"C:\Windows\system32\wubovamw.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1128 -
C:\Windows\SysWOW64\whirrxjxp.exe"C:\Windows\system32\whirrxjxp.exe"58⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\SysWOW64\wkydsk.exe"C:\Windows\system32\wkydsk.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:812 -
C:\Windows\SysWOW64\wgyk.exe"C:\Windows\system32\wgyk.exe"60⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\SysWOW64\wntaex.exe"C:\Windows\system32\wntaex.exe"61⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\SysWOW64\wkshddg.exe"C:\Windows\system32\wkshddg.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\woqtqnnb.exe"C:\Windows\system32\woqtqnnb.exe"63⤵
- Executes dropped EXE
PID:640 -
C:\Windows\SysWOW64\wrhfrakhq.exe"C:\Windows\system32\wrhfrakhq.exe"64⤵
- Executes dropped EXE
PID:536 -
C:\Windows\SysWOW64\wnfaxdktd.exe"C:\Windows\system32\wnfaxdktd.exe"65⤵
- Executes dropped EXE
PID:856 -
C:\Windows\SysWOW64\wkfhwhi.exe"C:\Windows\system32\wkfhwhi.exe"66⤵PID:2888
-
C:\Windows\SysWOW64\wpywjpmw.exe"C:\Windows\system32\wpywjpmw.exe"67⤵
- Drops file in System32 directory
PID:2652 -
C:\Windows\SysWOW64\wpxayno.exe"C:\Windows\system32\wpxayno.exe"68⤵
- Drops file in System32 directory
PID:2752 -
C:\Windows\SysWOW64\wxyry.exe"C:\Windows\system32\wxyry.exe"69⤵
- Drops file in System32 directory
PID:1924 -
C:\Windows\SysWOW64\wkguupx.exe"C:\Windows\system32\wkguupx.exe"70⤵PID:1664
-
C:\Windows\SysWOW64\wjxkel.exe"C:\Windows\system32\wjxkel.exe"71⤵PID:1876
-
C:\Windows\SysWOW64\wvsvi.exe"C:\Windows\system32\wvsvi.exe"72⤵
- Drops file in System32 directory
PID:1532 -
C:\Windows\SysWOW64\wqrchp.exe"C:\Windows\system32\wqrchp.exe"73⤵PID:900
-
C:\Windows\SysWOW64\wuamvf.exe"C:\Windows\system32\wuamvf.exe"74⤵
- Drops file in System32 directory
PID:1616 -
C:\Windows\SysWOW64\wqhuhittt.exe"C:\Windows\system32\wqhuhittt.exe"75⤵
- Drops file in System32 directory
PID:1700 -
C:\Windows\SysWOW64\wcijwekt.exe"C:\Windows\system32\wcijwekt.exe"76⤵PID:2496
-
C:\Windows\SysWOW64\wcoobyt.exe"C:\Windows\system32\wcoobyt.exe"77⤵PID:380
-
C:\Windows\SysWOW64\wjjfm.exe"C:\Windows\system32\wjjfm.exe"78⤵
- Drops file in System32 directory
PID:584 -
C:\Windows\SysWOW64\wfomxje.exe"C:\Windows\system32\wfomxje.exe"79⤵PID:2856
-
C:\Windows\SysWOW64\wrfqhgjuv.exe"C:\Windows\system32\wrfqhgjuv.exe"80⤵PID:1680
-
C:\Windows\SysWOW64\waejhkv.exe"C:\Windows\system32\waejhkv.exe"81⤵PID:940
-
C:\Windows\SysWOW64\waoweji.exe"C:\Windows\system32\waoweji.exe"82⤵
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\wficyqmx.exe"C:\Windows\system32\wficyqmx.exe"83⤵PID:1864
-
C:\Windows\SysWOW64\waiixu.exe"C:\Windows\system32\waiixu.exe"84⤵PID:2148
-
C:\Windows\SysWOW64\warvutvjm.exe"C:\Windows\system32\warvutvjm.exe"85⤵PID:1524
-
C:\Windows\SysWOW64\whmlgb.exe"C:\Windows\system32\whmlgb.exe"86⤵
- Drops file in System32 directory
PID:1452 -
C:\Windows\SysWOW64\wkdxhmy.exe"C:\Windows\system32\wkdxhmy.exe"87⤵
- Drops file in System32 directory
PID:2004 -
C:\Windows\SysWOW64\wob.exe"C:\Windows\system32\wob.exe"88⤵PID:1820
-
C:\Windows\SysWOW64\wvcnnhoiy.exe"C:\Windows\system32\wvcnnhoiy.exe"89⤵PID:1108
-
C:\Windows\SysWOW64\wqcunm.exe"C:\Windows\system32\wqcunm.exe"90⤵PID:3008
-
C:\Windows\SysWOW64\wuerubvg.exe"C:\Windows\system32\wuerubvg.exe"91⤵
- Drops file in System32 directory
PID:2900 -
C:\Windows\SysWOW64\wpcxt.exe"C:\Windows\system32\wpcxt.exe"92⤵
- Drops file in System32 directory
PID:896 -
C:\Windows\SysWOW64\wuhamrhbb.exe"C:\Windows\system32\wuhamrhbb.exe"93⤵PID:1072
-
C:\Windows\SysWOW64\wltucg.exe"C:\Windows\system32\wltucg.exe"94⤵PID:1532
-
C:\Windows\SysWOW64\wlrlaao.exe"C:\Windows\system32\wlrlaao.exe"95⤵
- Drops file in System32 directory
PID:1644 -
C:\Windows\SysWOW64\winkecke.exe"C:\Windows\system32\winkecke.exe"96⤵PID:2872
-
C:\Windows\SysWOW64\whpjv.exe"C:\Windows\system32\whpjv.exe"97⤵PID:2076
-
C:\Windows\SysWOW64\wcnque.exe"C:\Windows\system32\wcnque.exe"98⤵PID:1084
-
C:\Windows\SysWOW64\wtlshpe.exe"C:\Windows\system32\wtlshpe.exe"99⤵
- Drops file in System32 directory
PID:1316 -
C:\Windows\SysWOW64\wovinvmq.exe"C:\Windows\system32\wovinvmq.exe"100⤵PID:2272
-
C:\Windows\SysWOW64\wslvo.exe"C:\Windows\system32\wslvo.exe"101⤵PID:1152
-
C:\Windows\SysWOW64\wolbnoi.exe"C:\Windows\system32\wolbnoi.exe"102⤵PID:2044
-
C:\Windows\SysWOW64\wfdy.exe"C:\Windows\system32\wfdy.exe"103⤵
- Drops file in System32 directory
PID:1256 -
C:\Windows\SysWOW64\wecafyw.exe"C:\Windows\system32\wecafyw.exe"104⤵PID:2908
-
C:\Windows\SysWOW64\webevt.exe"C:\Windows\system32\webevt.exe"105⤵PID:2820
-
C:\Windows\SysWOW64\wguxql.exe"C:\Windows\system32\wguxql.exe"106⤵PID:1700
-
C:\Windows\SysWOW64\wlsmfvfy.exe"C:\Windows\system32\wlsmfvfy.exe"107⤵
- Drops file in System32 directory
PID:2576 -
C:\Windows\SysWOW64\wdluakqd.exe"C:\Windows\system32\wdluakqd.exe"108⤵PID:2844
-
C:\Windows\SysWOW64\whwqlhvf.exe"C:\Windows\system32\whwqlhvf.exe"109⤵
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\wceyvm.exe"C:\Windows\system32\wceyvm.exe"110⤵PID:1164
-
C:\Windows\SysWOW64\wogoni.exe"C:\Windows\system32\wogoni.exe"111⤵
- Drops file in System32 directory
PID:108 -
C:\Windows\SysWOW64\wurqur.exe"C:\Windows\system32\wurqur.exe"112⤵PID:2684
-
C:\Windows\SysWOW64\wbbwyyh.exe"C:\Windows\system32\wbbwyyh.exe"113⤵
- Drops file in System32 directory
PID:3064 -
C:\Windows\SysWOW64\wohnesf.exe"C:\Windows\system32\wohnesf.exe"114⤵PID:2408
-
C:\Windows\SysWOW64\wrchyih.exe"C:\Windows\system32\wrchyih.exe"115⤵
- Drops file in System32 directory
PID:2632 -
C:\Windows\SysWOW64\wasoqo.exe"C:\Windows\system32\wasoqo.exe"116⤵
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\wvruotg.exe"C:\Windows\system32\wvruotg.exe"117⤵
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\wiiayo.exe"C:\Windows\system32\wiiayo.exe"118⤵PID:392
-
C:\Windows\SysWOW64\wnwyh.exe"C:\Windows\system32\wnwyh.exe"119⤵PID:768
-
C:\Windows\SysWOW64\wyxo.exe"C:\Windows\system32\wyxo.exe"120⤵PID:1756
-
C:\Windows\SysWOW64\wpyxf.exe"C:\Windows\system32\wpyxf.exe"121⤵PID:400
-
C:\Windows\SysWOW64\witatu.exe"C:\Windows\system32\witatu.exe"122⤵
- Drops file in System32 directory
PID:1628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-