Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe
Resource
win10v2004-20240226-en
General
-
Target
a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe
-
Size
95KB
-
MD5
cbddeef3d23079bd4e7939c5987eb1ba
-
SHA1
fd48a656aa8f73f0ae51bc23dac2ddc68b92418c
-
SHA256
a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad
-
SHA512
49a84777ee5d389ff04e2a81f5de427cb23bb343e2dfa154b5f1fc8dbb0882c2c52b5397c91738dad060eb3a2e0b6fb32f58136eed52c51540f7a63ee8d86795
-
SSDEEP
1536:2zfXIsxrhzk2nfsW3ou3yWW2dvcW6eHcBwUi6vWE0Dl27b58XBdqaMG:yfjxrhzk2nfsWhP7dvavi6vWEbh8XH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2596 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 3036 wqf.exe 2580 wjiv.exe 1464 wesmwg.exe 1932 wwimx.exe 2052 wms.exe 1500 wujp.exe 1392 wpthks.exe 2044 wxyevvf.exe 2120 wwirsuq.exe 2576 wqrlowb.exe 2864 wmrr.exe 2540 whbisi.exe 1656 wkuhd.exe 2816 wynsni.exe 1512 whdyg.exe 556 wcn.exe 2920 wpduvo.exe 2000 wifnd.exe 1592 wrgf.exe 1596 wupo.exe 1548 whfsbku.exe 2484 wcaljaa.exe 2180 wbuhny.exe 1304 wwuo.exe 2816 wqtvl.exe 1504 wqty.exe 2852 wct.exe 2920 wwstq.exe 2104 wwoqthdj.exe 2732 wyv.exe 1988 wuwl.exe 1548 wynv.exe 2336 wxdoyem.exe 2064 wwwmbcj.exe 840 wnxwjod.exe 2984 wims.exe 1016 wdvkhb.exe 2024 wlm.exe 2000 wcld.exe 2396 wofr.exe 2516 wdabkbuny.exe 876 whjkyrjjk.exe 2324 wsxqy.exe 2952 wrspbi.exe 2064 wbymnl.exe 840 wqxwva.exe 2984 wdcwvvtb.exe 2592 wschdknp.exe 2300 wfq.exe 2464 wabctlbrp.exe 2256 wndpijqre.exe 2748 wxivt.exe 1028 wancmqceu.exe 2752 wexmbgqaf.exe 2952 wmntslt.exe 1120 wqweha.exe 2780 wgvnone.exe 1620 wxwxvcw.exe 2616 wgmhohyqq.exe 1828 wrnufdop.exe 2948 wvdggpnwi.exe 2256 wqdmfv.exe 1872 wteldh.exe 3052 wxtbuq.exe -
Loads dropped DLL 64 IoCs
pid Process 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 3036 wqf.exe 3036 wqf.exe 3036 wqf.exe 3036 wqf.exe 2580 wjiv.exe 2580 wjiv.exe 2580 wjiv.exe 2580 wjiv.exe 1464 wesmwg.exe 1464 wesmwg.exe 1464 wesmwg.exe 1464 wesmwg.exe 1932 wwimx.exe 1932 wwimx.exe 1932 wwimx.exe 1932 wwimx.exe 2052 wms.exe 2052 wms.exe 2052 wms.exe 2052 wms.exe 1500 wujp.exe 1500 wujp.exe 1500 wujp.exe 1500 wujp.exe 1392 wpthks.exe 1392 wpthks.exe 1392 wpthks.exe 1392 wpthks.exe 2044 wxyevvf.exe 2044 wxyevvf.exe 2044 wxyevvf.exe 2044 wxyevvf.exe 2120 wwirsuq.exe 2120 wwirsuq.exe 2120 wwirsuq.exe 2120 wwirsuq.exe 2576 wqrlowb.exe 2576 wqrlowb.exe 2576 wqrlowb.exe 2576 wqrlowb.exe 2864 wmrr.exe 2864 wmrr.exe 2864 wmrr.exe 2864 wmrr.exe 2540 whbisi.exe 2540 whbisi.exe 2540 whbisi.exe 2540 whbisi.exe 1656 wkuhd.exe 1656 wkuhd.exe 1656 wkuhd.exe 1656 wkuhd.exe 2816 wynsni.exe 2816 wynsni.exe 2816 wynsni.exe 2816 wynsni.exe 1512 whdyg.exe 1512 whdyg.exe 1512 whdyg.exe 1512 whdyg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wfcm.exe wavldaiy.exe File opened for modification C:\Windows\SysWOW64\wuqyxgcb.exe wnxgwcvh.exe File created C:\Windows\SysWOW64\wemcwt.exe wnxdvh.exe File opened for modification C:\Windows\SysWOW64\wcaljaa.exe whfsbku.exe File created C:\Windows\SysWOW64\wwoqthdj.exe wwstq.exe File created C:\Windows\SysWOW64\wnxwjod.exe wwwmbcj.exe File opened for modification C:\Windows\SysWOW64\wbutqi.exe wlvhrwv.exe File opened for modification C:\Windows\SysWOW64\wfuqtoio.exe wbbwyyh.exe File opened for modification C:\Windows\SysWOW64\wifnd.exe wpduvo.exe File opened for modification C:\Windows\SysWOW64\wdcwvvtb.exe wqxwva.exe File created C:\Windows\SysWOW64\wtduftqw.exe wxnympdh.exe File created C:\Windows\SysWOW64\wavldaiy.exe wdk.exe File opened for modification C:\Windows\SysWOW64\wbwvpi.exe whwpqddmo.exe File opened for modification C:\Windows\SysWOW64\wmqgrlj.exe wnrd.exe File opened for modification C:\Windows\SysWOW64\wwirsuq.exe wxyevvf.exe File opened for modification C:\Windows\SysWOW64\wwoqthdj.exe wwstq.exe File opened for modification C:\Windows\SysWOW64\wrspbi.exe wsxqy.exe File created C:\Windows\SysWOW64\wxtbuq.exe wteldh.exe File opened for modification C:\Windows\SysWOW64\wavldaiy.exe wdk.exe File created C:\Windows\SysWOW64\wuqyxgcb.exe wnxgwcvh.exe File opened for modification C:\Windows\SysWOW64\wtprpw.exe wtgdsy.exe File opened for modification C:\Windows\SysWOW64\wlm.exe wdvkhb.exe File created C:\Windows\SysWOW64\wkavwx.exe wuoxsl.exe File created C:\Windows\SysWOW64\wvfhnadw.exe wtprpw.exe File created C:\Windows\SysWOW64\wyv.exe wwoqthdj.exe File created C:\Windows\SysWOW64\wdabkbuny.exe wofr.exe File created C:\Windows\SysWOW64\wcutagnd.exe whwmbaq.exe File opened for modification C:\Windows\SysWOW64\wfprfyj.exe wkavwx.exe File created C:\Windows\SysWOW64\wtgdsy.exe wvixlf.exe File opened for modification C:\Windows\SysWOW64\wpthks.exe wujp.exe File opened for modification C:\Windows\SysWOW64\wmrr.exe wqrlowb.exe File opened for modification C:\Windows\SysWOW64\wvfhnadw.exe wtprpw.exe File opened for modification C:\Windows\SysWOW64\wnrd.exe wvfhnadw.exe File opened for modification C:\Windows\SysWOW64\wdm.exe wfcm.exe File created C:\Windows\SysWOW64\wuoxsl.exe wbutqi.exe File opened for modification C:\Windows\SysWOW64\whwpqddmo.exe wtmodibhf.exe File created C:\Windows\SysWOW64\wfuqtoio.exe wbbwyyh.exe File opened for modification C:\Windows\SysWOW64\wnxwjod.exe wwwmbcj.exe File opened for modification C:\Windows\SysWOW64\wxwxvcw.exe wgvnone.exe File opened for modification C:\Windows\SysWOW64\wyrfgp.exe wwxivcd.exe File opened for modification C:\Windows\SysWOW64\wqtvl.exe wwuo.exe File created C:\Windows\SysWOW64\wuwl.exe wyv.exe File created C:\Windows\SysWOW64\wcld.exe wlm.exe File created C:\Windows\SysWOW64\wabctlbrp.exe wfq.exe File opened for modification C:\Windows\SysWOW64\wivku.exe wwghmm.exe File opened for modification C:\Windows\SysWOW64\wxivt.exe wndpijqre.exe File opened for modification C:\Windows\SysWOW64\wwwmbcj.exe wxdoyem.exe File opened for modification C:\Windows\SysWOW64\wcld.exe wlm.exe File created C:\Windows\SysWOW64\wwghmm.exe wlmqrouhh.exe File opened for modification C:\Windows\SysWOW64\waodubi.exe wepuvu.exe File opened for modification C:\Windows\SysWOW64\wwuo.exe wbuhny.exe File created C:\Windows\SysWOW64\wlm.exe wdvkhb.exe File opened for modification C:\Windows\SysWOW64\wfq.exe wschdknp.exe File created C:\Windows\SysWOW64\whwpqddmo.exe wtmodibhf.exe File created C:\Windows\SysWOW64\wnkxn.exe wfuqtoio.exe File opened for modification C:\Windows\SysWOW64\wxyevvf.exe wpthks.exe File created C:\Windows\SysWOW64\wrgf.exe wifnd.exe File opened for modification C:\Windows\SysWOW64\wwghmm.exe wlmqrouhh.exe File created C:\Windows\SysWOW64\wlnsj.exe wvjxsay.exe File opened for modification C:\Windows\SysWOW64\wbbwyyh.exe wlnsj.exe File opened for modification C:\Windows\SysWOW64\wujp.exe wms.exe File opened for modification C:\Windows\SysWOW64\wbuhny.exe wcaljaa.exe File created C:\Windows\SysWOW64\wdm.exe wfcm.exe File created C:\Windows\SysWOW64\wrho.exe wbfry.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 3036 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 28 PID 2276 wrote to memory of 3036 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 28 PID 2276 wrote to memory of 3036 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 28 PID 2276 wrote to memory of 3036 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 28 PID 2276 wrote to memory of 2596 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 29 PID 2276 wrote to memory of 2596 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 29 PID 2276 wrote to memory of 2596 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 29 PID 2276 wrote to memory of 2596 2276 a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe 29 PID 3036 wrote to memory of 2580 3036 wqf.exe 31 PID 3036 wrote to memory of 2580 3036 wqf.exe 31 PID 3036 wrote to memory of 2580 3036 wqf.exe 31 PID 3036 wrote to memory of 2580 3036 wqf.exe 31 PID 3036 wrote to memory of 2516 3036 wqf.exe 32 PID 3036 wrote to memory of 2516 3036 wqf.exe 32 PID 3036 wrote to memory of 2516 3036 wqf.exe 32 PID 3036 wrote to memory of 2516 3036 wqf.exe 32 PID 2580 wrote to memory of 1464 2580 wjiv.exe 34 PID 2580 wrote to memory of 1464 2580 wjiv.exe 34 PID 2580 wrote to memory of 1464 2580 wjiv.exe 34 PID 2580 wrote to memory of 1464 2580 wjiv.exe 34 PID 2580 wrote to memory of 2880 2580 wjiv.exe 35 PID 2580 wrote to memory of 2880 2580 wjiv.exe 35 PID 2580 wrote to memory of 2880 2580 wjiv.exe 35 PID 2580 wrote to memory of 2880 2580 wjiv.exe 35 PID 1464 wrote to memory of 1932 1464 wesmwg.exe 37 PID 1464 wrote to memory of 1932 1464 wesmwg.exe 37 PID 1464 wrote to memory of 1932 1464 wesmwg.exe 37 PID 1464 wrote to memory of 1932 1464 wesmwg.exe 37 PID 1464 wrote to memory of 1244 1464 wesmwg.exe 38 PID 1464 wrote to memory of 1244 1464 wesmwg.exe 38 PID 1464 wrote to memory of 1244 1464 wesmwg.exe 38 PID 1464 wrote to memory of 1244 1464 wesmwg.exe 38 PID 1932 wrote to memory of 2052 1932 wwimx.exe 40 PID 1932 wrote to memory of 2052 1932 wwimx.exe 40 PID 1932 wrote to memory of 2052 1932 wwimx.exe 40 PID 1932 wrote to memory of 2052 1932 wwimx.exe 40 PID 1932 wrote to memory of 2312 1932 wwimx.exe 41 PID 1932 wrote to memory of 2312 1932 wwimx.exe 41 PID 1932 wrote to memory of 2312 1932 wwimx.exe 41 PID 1932 wrote to memory of 2312 1932 wwimx.exe 41 PID 2052 wrote to memory of 1500 2052 wms.exe 43 PID 2052 wrote to memory of 1500 2052 wms.exe 43 PID 2052 wrote to memory of 1500 2052 wms.exe 43 PID 2052 wrote to memory of 1500 2052 wms.exe 43 PID 2052 wrote to memory of 1388 2052 wms.exe 44 PID 2052 wrote to memory of 1388 2052 wms.exe 44 PID 2052 wrote to memory of 1388 2052 wms.exe 44 PID 2052 wrote to memory of 1388 2052 wms.exe 44 PID 1500 wrote to memory of 1392 1500 wujp.exe 46 PID 1500 wrote to memory of 1392 1500 wujp.exe 46 PID 1500 wrote to memory of 1392 1500 wujp.exe 46 PID 1500 wrote to memory of 1392 1500 wujp.exe 46 PID 1500 wrote to memory of 2852 1500 wujp.exe 47 PID 1500 wrote to memory of 2852 1500 wujp.exe 47 PID 1500 wrote to memory of 2852 1500 wujp.exe 47 PID 1500 wrote to memory of 2852 1500 wujp.exe 47 PID 1392 wrote to memory of 2044 1392 wpthks.exe 49 PID 1392 wrote to memory of 2044 1392 wpthks.exe 49 PID 1392 wrote to memory of 2044 1392 wpthks.exe 49 PID 1392 wrote to memory of 2044 1392 wpthks.exe 49 PID 1392 wrote to memory of 2000 1392 wpthks.exe 50 PID 1392 wrote to memory of 2000 1392 wpthks.exe 50 PID 1392 wrote to memory of 2000 1392 wpthks.exe 50 PID 1392 wrote to memory of 2000 1392 wpthks.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe"C:\Users\Admin\AppData\Local\Temp\a38c943daa633de9360c24fc7c5e578e12a2886d15e3a36d2bfa7d9604b7d9ad.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\wqf.exe"C:\Windows\system32\wqf.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\wjiv.exe"C:\Windows\system32\wjiv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\wesmwg.exe"C:\Windows\system32\wesmwg.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\wwimx.exe"C:\Windows\system32\wwimx.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\wms.exe"C:\Windows\system32\wms.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\wujp.exe"C:\Windows\system32\wujp.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\wpthks.exe"C:\Windows\system32\wpthks.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\wxyevvf.exe"C:\Windows\system32\wxyevvf.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\wwirsuq.exe"C:\Windows\system32\wwirsuq.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120 -
C:\Windows\SysWOW64\wqrlowb.exe"C:\Windows\system32\wqrlowb.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2576 -
C:\Windows\SysWOW64\wmrr.exe"C:\Windows\system32\wmrr.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2864 -
C:\Windows\SysWOW64\whbisi.exe"C:\Windows\system32\whbisi.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2540 -
C:\Windows\SysWOW64\wkuhd.exe"C:\Windows\system32\wkuhd.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Windows\SysWOW64\wynsni.exe"C:\Windows\system32\wynsni.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2816 -
C:\Windows\SysWOW64\whdyg.exe"C:\Windows\system32\whdyg.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1512 -
C:\Windows\SysWOW64\wcn.exe"C:\Windows\system32\wcn.exe"17⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\wpduvo.exe"C:\Windows\system32\wpduvo.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\wifnd.exe"C:\Windows\system32\wifnd.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2000 -
C:\Windows\SysWOW64\wrgf.exe"C:\Windows\system32\wrgf.exe"20⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\SysWOW64\wupo.exe"C:\Windows\system32\wupo.exe"21⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\whfsbku.exe"C:\Windows\system32\whfsbku.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1548 -
C:\Windows\SysWOW64\wcaljaa.exe"C:\Windows\system32\wcaljaa.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2484 -
C:\Windows\SysWOW64\wbuhny.exe"C:\Windows\system32\wbuhny.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2180 -
C:\Windows\SysWOW64\wwuo.exe"C:\Windows\system32\wwuo.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1304 -
C:\Windows\SysWOW64\wqtvl.exe"C:\Windows\system32\wqtvl.exe"26⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\wqty.exe"C:\Windows\system32\wqty.exe"27⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\wct.exe"C:\Windows\system32\wct.exe"28⤵
- Executes dropped EXE
PID:2852 -
C:\Windows\SysWOW64\wwstq.exe"C:\Windows\system32\wwstq.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\wwoqthdj.exe"C:\Windows\system32\wwoqthdj.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\wyv.exe"C:\Windows\system32\wyv.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2732 -
C:\Windows\SysWOW64\wuwl.exe"C:\Windows\system32\wuwl.exe"32⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\wynv.exe"C:\Windows\system32\wynv.exe"33⤵
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\wxdoyem.exe"C:\Windows\system32\wxdoyem.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\wwwmbcj.exe"C:\Windows\system32\wwwmbcj.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2064 -
C:\Windows\SysWOW64\wnxwjod.exe"C:\Windows\system32\wnxwjod.exe"36⤵
- Executes dropped EXE
PID:840 -
C:\Windows\SysWOW64\wims.exe"C:\Windows\system32\wims.exe"37⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\wdvkhb.exe"C:\Windows\system32\wdvkhb.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1016 -
C:\Windows\SysWOW64\wlm.exe"C:\Windows\system32\wlm.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2024 -
C:\Windows\SysWOW64\wcld.exe"C:\Windows\system32\wcld.exe"40⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\wofr.exe"C:\Windows\system32\wofr.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2396 -
C:\Windows\SysWOW64\wdabkbuny.exe"C:\Windows\system32\wdabkbuny.exe"42⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\SysWOW64\whjkyrjjk.exe"C:\Windows\system32\whjkyrjjk.exe"43⤵
- Executes dropped EXE
PID:876 -
C:\Windows\SysWOW64\wsxqy.exe"C:\Windows\system32\wsxqy.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2324 -
C:\Windows\SysWOW64\wrspbi.exe"C:\Windows\system32\wrspbi.exe"45⤵
- Executes dropped EXE
PID:2952 -
C:\Windows\SysWOW64\wbymnl.exe"C:\Windows\system32\wbymnl.exe"46⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\SysWOW64\wqxwva.exe"C:\Windows\system32\wqxwva.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:840 -
C:\Windows\SysWOW64\wdcwvvtb.exe"C:\Windows\system32\wdcwvvtb.exe"48⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\wschdknp.exe"C:\Windows\system32\wschdknp.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2592 -
C:\Windows\SysWOW64\wfq.exe"C:\Windows\system32\wfq.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2300 -
C:\Windows\SysWOW64\wabctlbrp.exe"C:\Windows\system32\wabctlbrp.exe"51⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\wndpijqre.exe"C:\Windows\system32\wndpijqre.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2256 -
C:\Windows\SysWOW64\wxivt.exe"C:\Windows\system32\wxivt.exe"53⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\wancmqceu.exe"C:\Windows\system32\wancmqceu.exe"54⤵
- Executes dropped EXE
PID:1028 -
C:\Windows\SysWOW64\wexmbgqaf.exe"C:\Windows\system32\wexmbgqaf.exe"55⤵
- Executes dropped EXE
PID:2752 -
C:\Windows\SysWOW64\wmntslt.exe"C:\Windows\system32\wmntslt.exe"56⤵
- Executes dropped EXE
PID:2952 -
C:\Windows\SysWOW64\wqweha.exe"C:\Windows\system32\wqweha.exe"57⤵
- Executes dropped EXE
PID:1120 -
C:\Windows\SysWOW64\wgvnone.exe"C:\Windows\system32\wgvnone.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\wxwxvcw.exe"C:\Windows\system32\wxwxvcw.exe"59⤵
- Executes dropped EXE
PID:1620 -
C:\Windows\SysWOW64\wgmhohyqq.exe"C:\Windows\system32\wgmhohyqq.exe"60⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\wrnufdop.exe"C:\Windows\system32\wrnufdop.exe"61⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\wvdggpnwi.exe"C:\Windows\system32\wvdggpnwi.exe"62⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\wqdmfv.exe"C:\Windows\system32\wqdmfv.exe"63⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\SysWOW64\wteldh.exe"C:\Windows\system32\wteldh.exe"64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1872 -
C:\Windows\SysWOW64\wxtbuq.exe"C:\Windows\system32\wxtbuq.exe"65⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\SysWOW64\wdk.exe"C:\Windows\system32\wdk.exe"66⤵
- Drops file in System32 directory
PID:2460 -
C:\Windows\SysWOW64\wavldaiy.exe"C:\Windows\system32\wavldaiy.exe"67⤵
- Drops file in System32 directory
PID:840 -
C:\Windows\SysWOW64\wfcm.exe"C:\Windows\system32\wfcm.exe"68⤵
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\wdm.exe"C:\Windows\system32\wdm.exe"69⤵PID:1004
-
C:\Windows\SysWOW64\wlmqrouhh.exe"C:\Windows\system32\wlmqrouhh.exe"70⤵
- Drops file in System32 directory
PID:2248 -
C:\Windows\SysWOW64\wwghmm.exe"C:\Windows\system32\wwghmm.exe"71⤵
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\wivku.exe"C:\Windows\system32\wivku.exe"72⤵PID:2200
-
C:\Windows\SysWOW64\whqiyggw.exe"C:\Windows\system32\whqiyggw.exe"73⤵PID:1040
-
C:\Windows\SysWOW64\whwmbaq.exe"C:\Windows\system32\whwmbaq.exe"74⤵
- Drops file in System32 directory
PID:1320 -
C:\Windows\SysWOW64\wcutagnd.exe"C:\Windows\system32\wcutagnd.exe"75⤵PID:2964
-
C:\Windows\SysWOW64\wthpou.exe"C:\Windows\system32\wthpou.exe"76⤵PID:2776
-
C:\Windows\SysWOW64\wjvpqhcgu.exe"C:\Windows\system32\wjvpqhcgu.exe"77⤵PID:1748
-
C:\Windows\SysWOW64\wuyopewd.exe"C:\Windows\system32\wuyopewd.exe"78⤵PID:324
-
C:\Windows\SysWOW64\whotaa.exe"C:\Windows\system32\whotaa.exe"79⤵PID:2368
-
C:\Windows\SysWOW64\wudwj.exe"C:\Windows\system32\wudwj.exe"80⤵PID:1740
-
C:\Windows\SysWOW64\wtaunteu.exe"C:\Windows\system32\wtaunteu.exe"81⤵PID:852
-
C:\Windows\SysWOW64\wbfry.exe"C:\Windows\system32\wbfry.exe"82⤵
- Drops file in System32 directory
PID:2304 -
C:\Windows\SysWOW64\wrho.exe"C:\Windows\system32\wrho.exe"83⤵PID:1672
-
C:\Windows\SysWOW64\wisif.exe"C:\Windows\system32\wisif.exe"84⤵PID:1052
-
C:\Windows\SysWOW64\wayuym.exe"C:\Windows\system32\wayuym.exe"85⤵PID:2628
-
C:\Windows\SysWOW64\whodrrbk.exe"C:\Windows\system32\whodrrbk.exe"86⤵PID:1456
-
C:\Windows\SysWOW64\wqlpn.exe"C:\Windows\system32\wqlpn.exe"87⤵PID:2944
-
C:\Windows\SysWOW64\wlvhrwv.exe"C:\Windows\system32\wlvhrwv.exe"88⤵
- Drops file in System32 directory
PID:2160 -
C:\Windows\SysWOW64\wbutqi.exe"C:\Windows\system32\wbutqi.exe"89⤵
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\wuoxsl.exe"C:\Windows\system32\wuoxsl.exe"90⤵
- Drops file in System32 directory
PID:3008 -
C:\Windows\SysWOW64\wkavwx.exe"C:\Windows\system32\wkavwx.exe"91⤵
- Drops file in System32 directory
PID:1072 -
C:\Windows\SysWOW64\wfprfyj.exe"C:\Windows\system32\wfprfyj.exe"92⤵PID:1700
-
C:\Windows\SysWOW64\wepuvu.exe"C:\Windows\system32\wepuvu.exe"93⤵
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\waodubi.exe"C:\Windows\system32\waodubi.exe"94⤵PID:2560
-
C:\Windows\SysWOW64\whirgimu.exe"C:\Windows\system32\whirgimu.exe"95⤵PID:2420
-
C:\Windows\SysWOW64\wxido.exe"C:\Windows\system32\wxido.exe"96⤵PID:2352
-
C:\Windows\SysWOW64\wpnraeja.exe"C:\Windows\system32\wpnraeja.exe"97⤵PID:1512
-
C:\Windows\SysWOW64\wnxgwcvh.exe"C:\Windows\system32\wnxgwcvh.exe"98⤵
- Drops file in System32 directory
PID:2076 -
C:\Windows\SysWOW64\wuqyxgcb.exe"C:\Windows\system32\wuqyxgcb.exe"99⤵PID:1096
-
C:\Windows\SysWOW64\wvxdbc.exe"C:\Windows\system32\wvxdbc.exe"100⤵PID:3036
-
C:\Windows\SysWOW64\wmiyoqp.exe"C:\Windows\system32\wmiyoqp.exe"101⤵PID:2176
-
C:\Windows\SysWOW64\wwhqv.exe"C:\Windows\system32\wwhqv.exe"102⤵PID:1388
-
C:\Windows\SysWOW64\wvqeshse.exe"C:\Windows\system32\wvqeshse.exe"103⤵PID:1304
-
C:\Windows\SysWOW64\wwxivcd.exe"C:\Windows\system32\wwxivcd.exe"104⤵
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\wyrfgp.exe"C:\Windows\system32\wyrfgp.exe"105⤵PID:3048
-
C:\Windows\SysWOW64\wpifxx.exe"C:\Windows\system32\wpifxx.exe"106⤵PID:2080
-
C:\Windows\SysWOW64\wgwfyl.exe"C:\Windows\system32\wgwfyl.exe"107⤵PID:2356
-
C:\Windows\SysWOW64\wcgweskk.exe"C:\Windows\system32\wcgweskk.exe"108⤵PID:2556
-
C:\Windows\SysWOW64\wkxfww.exe"C:\Windows\system32\wkxfww.exe"109⤵PID:2724
-
C:\Windows\SysWOW64\weivdcuw.exe"C:\Windows\system32\weivdcuw.exe"110⤵PID:2984
-
C:\Windows\SysWOW64\wnxdvh.exe"C:\Windows\system32\wnxdvh.exe"111⤵
- Drops file in System32 directory
PID:900 -
C:\Windows\SysWOW64\wemcwt.exe"C:\Windows\system32\wemcwt.exe"112⤵PID:2328
-
C:\Windows\SysWOW64\wtmodibhf.exe"C:\Windows\system32\wtmodibhf.exe"113⤵
- Drops file in System32 directory
PID:2580 -
C:\Windows\SysWOW64\whwpqddmo.exe"C:\Windows\system32\whwpqddmo.exe"114⤵
- Drops file in System32 directory
PID:2332 -
C:\Windows\SysWOW64\wbwvpi.exe"C:\Windows\system32\wbwvpi.exe"115⤵PID:1156
-
C:\Windows\SysWOW64\wvimvoii.exe"C:\Windows\system32\wvimvoii.exe"116⤵PID:384
-
C:\Windows\SysWOW64\wxakgbl.exe"C:\Windows\system32\wxakgbl.exe"117⤵PID:836
-
C:\Windows\SysWOW64\wsytuei.exe"C:\Windows\system32\wsytuei.exe"118⤵PID:304
-
C:\Windows\SysWOW64\wilpison.exe"C:\Windows\system32\wilpison.exe"119⤵PID:2828
-
C:\Windows\SysWOW64\wnggmbv.exe"C:\Windows\system32\wnggmbv.exe"120⤵PID:2348
-
C:\Windows\SysWOW64\wvixlf.exe"C:\Windows\system32\wvixlf.exe"121⤵
- Drops file in System32 directory
PID:324 -
C:\Windows\SysWOW64\wtgdsy.exe"C:\Windows\system32\wtgdsy.exe"122⤵
- Drops file in System32 directory
PID:2984
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-