Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe
-
Size
92KB
-
MD5
091213e24bafc8bfbe4558f92bc5dd20
-
SHA1
4ab3800913ec093e6ed59b02e2478c1069c36949
-
SHA256
f7995cfdef2e3233fcc33a4beb14ba8d8a3b03371ec374ca94159abaf7fa7fef
-
SHA512
d7d34368b1953d5db22dc95ee1bb54d5c6f2dd1d812cc21b9f5a0fe7419f2e9209c2f477d4fdf33c5c9866bfda0e00aef1fab8753071a20b41f80073c8113f64
-
SSDEEP
768:wrGLctww30POw9mKv2oMumjeEgzHI/fCREC3rHvDUXM+GpcS63uHzbQsWGhM1xH7:xch3vwSbax3rHV6+HwsWGhG5JiBzQmVY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2688 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2944 wgvnny.exe 2692 wuyuw.exe 2084 wmg.exe 1608 wxbtuc.exe 2972 wsrxgk.exe 1064 wndomqie.exe 2792 whvtx.exe 552 wmtt.exe 2904 wbmc.exe 2028 wmqyich.exe 2244 wgjd.exe 808 wwqciyw.exe 1676 wwunr.exe 2376 wtw.exe 1412 wwahcp.exe 1668 weckux.exe 112 wkdomh.exe 2984 wjga.exe 1872 wii.exe 2996 wgam.exe 2868 wfexsf.exe 2328 whffs.exe 2344 woijlg.exe 1112 wyfehinx.exe 1712 whhiy.exe 2100 wfjsjqd.exe 2072 waqonxi.exe 2900 wged.exe 2080 wng.exe 1756 wusueyll.exe 2508 weffta.exe 1716 wdifm.exe 1588 wikie.exe 2164 wtgebkk.exe 1156 wwwcub.exe 1660 wylsctywh.exe 380 wutnh.exe 692 wrhjwbrn.exe 1528 wujqyra.exe 2708 wpqmdyd.exe 2124 wrtteqk.exe 2240 wuuafi.exe 2116 wxjsma.exe 2064 wylbm.exe 1772 whmef.exe 2172 wnbsej.exe 1444 wms.exe 1160 wpt.exe 1536 wwwfai.exe 2220 wuyrj.exe 2660 wbleir.exe 2464 wjnibb.exe 2316 wlffu.exe 1776 wnsxcjka.exe 264 wrjuwag.exe 1876 wsldvq.exe 3036 wwokxh.exe 1988 wur.exe 1160 wfehw.exe 1376 wlquvt.exe 2664 wptcwjcgn.exe 340 wjaw.exe 1564 wvxryrrf.exe 2940 woqwjagy.exe -
Loads dropped DLL 64 IoCs
pid Process 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 2944 wgvnny.exe 2944 wgvnny.exe 2944 wgvnny.exe 2944 wgvnny.exe 2692 wuyuw.exe 2692 wuyuw.exe 2692 wuyuw.exe 2692 wuyuw.exe 2084 wmg.exe 2084 wmg.exe 2084 wmg.exe 2084 wmg.exe 1608 wxbtuc.exe 1608 wxbtuc.exe 1608 wxbtuc.exe 1608 wxbtuc.exe 2972 wsrxgk.exe 2972 wsrxgk.exe 2972 wsrxgk.exe 2972 wsrxgk.exe 1064 wndomqie.exe 1064 wndomqie.exe 1064 wndomqie.exe 1064 wndomqie.exe 2792 whvtx.exe 2792 whvtx.exe 2792 whvtx.exe 2792 whvtx.exe 552 wmtt.exe 552 wmtt.exe 552 wmtt.exe 552 wmtt.exe 2904 wbmc.exe 2904 wbmc.exe 2904 wbmc.exe 2904 wbmc.exe 2028 wmqyich.exe 2028 wmqyich.exe 2028 wmqyich.exe 2028 wmqyich.exe 2244 wgjd.exe 2244 wgjd.exe 2244 wgjd.exe 2244 wgjd.exe 808 wwqciyw.exe 808 wwqciyw.exe 808 wwqciyw.exe 808 wwqciyw.exe 1676 wwunr.exe 1676 wwunr.exe 1676 wwunr.exe 1676 wwunr.exe 2376 wtw.exe 2376 wtw.exe 2376 wtw.exe 2376 wtw.exe 1412 wwahcp.exe 1412 wwahcp.exe 1412 wwahcp.exe 1412 wwahcp.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wndomqie.exe wsrxgk.exe File created C:\Windows\SysWOW64\wdifm.exe weffta.exe File opened for modification C:\Windows\SysWOW64\wjqaps.exe whn.exe File opened for modification C:\Windows\SysWOW64\wotuvj.exe wkdxbs.exe File opened for modification C:\Windows\SysWOW64\waqonxi.exe wfjsjqd.exe File opened for modification C:\Windows\SysWOW64\wfexsf.exe wgam.exe File created C:\Windows\SysWOW64\wbkfkfa.exe wodbogcux.exe File created C:\Windows\SysWOW64\wnirvg.exe wcpgtiq.exe File created C:\Windows\SysWOW64\wqsbjv.exe wnirvg.exe File opened for modification C:\Windows\SysWOW64\wfu.exe wkooqtv.exe File created C:\Windows\SysWOW64\wjvqap.exe wodln.exe File opened for modification C:\Windows\SysWOW64\wrrml.exe woodk.exe File created C:\Windows\SysWOW64\weckux.exe wwahcp.exe File opened for modification C:\Windows\SysWOW64\wyfehinx.exe woijlg.exe File created C:\Windows\SysWOW64\wnbsej.exe whmef.exe File created C:\Windows\SysWOW64\wms.exe wnbsej.exe File created C:\Windows\SysWOW64\wjyxxk.exe whhaetr.exe File opened for modification C:\Windows\SysWOW64\wfrko.exe weerfpbjk.exe File opened for modification C:\Windows\SysWOW64\wwmdekv.exe wwjsuk.exe File opened for modification C:\Windows\SysWOW64\wosdesi.exe wlbej.exe File created C:\Windows\SysWOW64\wvgqdcdl.exe wosdesi.exe File created C:\Windows\SysWOW64\wpcorpvr.exe wpjmor.exe File created C:\Windows\SysWOW64\wuuafi.exe wrtteqk.exe File created C:\Windows\SysWOW64\wxjsma.exe wuuafi.exe File created C:\Windows\SysWOW64\wolqa.exe wltsfn.exe File created C:\Windows\SysWOW64\wnbcdj.exe woxrtjb.exe File created C:\Windows\SysWOW64\wohkibob.exe wngch.exe File opened for modification C:\Windows\SysWOW64\wkdomh.exe weckux.exe File opened for modification C:\Windows\SysWOW64\wjga.exe wkdomh.exe File created C:\Windows\SysWOW64\wlffu.exe wjnibb.exe File created C:\Windows\SysWOW64\wnsxcjka.exe wlffu.exe File created C:\Windows\SysWOW64\wjaw.exe wptcwjcgn.exe File opened for modification C:\Windows\SysWOW64\wolqa.exe wltsfn.exe File opened for modification C:\Windows\SysWOW64\woodk.exe wmbmdi.exe File opened for modification C:\Windows\SysWOW64\wchvulpo.exe wvgqdcdl.exe File opened for modification C:\Windows\SysWOW64\wnmgoki.exe wbkgfks.exe File created C:\Windows\SysWOW64\wjbrbbj.exe wcodcsn.exe File created C:\Windows\SysWOW64\wfokla.exe wdlcjjk.exe File created C:\Windows\SysWOW64\wutnh.exe wylsctywh.exe File opened for modification C:\Windows\SysWOW64\wvxryrrf.exe wjaw.exe File opened for modification C:\Windows\SysWOW64\wlbej.exe wbfknb.exe File opened for modification C:\Windows\SysWOW64\wlxlrrdxj.exe wbjnfk.exe File created C:\Windows\SysWOW64\wnxdvh.exe wkvvup.exe File created C:\Windows\SysWOW64\wmbmdi.exe woyasjg.exe File opened for modification C:\Windows\SysWOW64\whneojkv.exe wwmdekv.exe File opened for modification C:\Windows\SysWOW64\wbqsgs.exe whneojkv.exe File opened for modification C:\Windows\SysWOW64\whmef.exe wylbm.exe File created C:\Windows\SysWOW64\wwwfai.exe wpt.exe File opened for modification C:\Windows\SysWOW64\woypn.exe wpvfdtsg.exe File created C:\Windows\SysWOW64\wqdmfv.exe wbkfkfa.exe File created C:\Windows\SysWOW64\wnjvga.exe wqrud.exe File opened for modification C:\Windows\SysWOW64\wusueyll.exe wng.exe File created C:\Windows\SysWOW64\wylbm.exe wxjsma.exe File created C:\Windows\SysWOW64\wguxql.exe wattxc.exe File created C:\Windows\SysWOW64\whneojkv.exe wwmdekv.exe File opened for modification C:\Windows\SysWOW64\wqoap.exe wnxdvh.exe File opened for modification C:\Windows\SysWOW64\wdlcjjk.exe wajtjrd.exe File created C:\Windows\SysWOW64\wsrxgk.exe wxbtuc.exe File created C:\Windows\SysWOW64\wrhjwbrn.exe wutnh.exe File opened for modification C:\Windows\SysWOW64\wlquvt.exe wfehw.exe File opened for modification C:\Windows\SysWOW64\wsldvq.exe wrjuwag.exe File opened for modification C:\Windows\SysWOW64\wpt.exe wms.exe File opened for modification C:\Windows\SysWOW64\wefbans.exe wssrkmsm.exe File created C:\Windows\SysWOW64\wyfehinx.exe woijlg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 2736 1756 WerFault.exe 115 2252 2064 WerFault.exe 158 2320 2108 WerFault.exe 234 2956 1032 WerFault.exe 272 1556 2676 WerFault.exe 288 1856 2172 WerFault.exe 431 2392 2892 WerFault.exe 462 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1868 wrote to memory of 2944 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 28 PID 1868 wrote to memory of 2944 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 28 PID 1868 wrote to memory of 2944 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 28 PID 1868 wrote to memory of 2944 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 28 PID 1868 wrote to memory of 2688 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 29 PID 1868 wrote to memory of 2688 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 29 PID 1868 wrote to memory of 2688 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 29 PID 1868 wrote to memory of 2688 1868 091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe 29 PID 2944 wrote to memory of 2692 2944 wgvnny.exe 31 PID 2944 wrote to memory of 2692 2944 wgvnny.exe 31 PID 2944 wrote to memory of 2692 2944 wgvnny.exe 31 PID 2944 wrote to memory of 2692 2944 wgvnny.exe 31 PID 2944 wrote to memory of 2852 2944 wgvnny.exe 32 PID 2944 wrote to memory of 2852 2944 wgvnny.exe 32 PID 2944 wrote to memory of 2852 2944 wgvnny.exe 32 PID 2944 wrote to memory of 2852 2944 wgvnny.exe 32 PID 2692 wrote to memory of 2084 2692 wuyuw.exe 34 PID 2692 wrote to memory of 2084 2692 wuyuw.exe 34 PID 2692 wrote to memory of 2084 2692 wuyuw.exe 34 PID 2692 wrote to memory of 2084 2692 wuyuw.exe 34 PID 2692 wrote to memory of 1788 2692 wuyuw.exe 35 PID 2692 wrote to memory of 1788 2692 wuyuw.exe 35 PID 2692 wrote to memory of 1788 2692 wuyuw.exe 35 PID 2692 wrote to memory of 1788 2692 wuyuw.exe 35 PID 2084 wrote to memory of 1608 2084 wmg.exe 37 PID 2084 wrote to memory of 1608 2084 wmg.exe 37 PID 2084 wrote to memory of 1608 2084 wmg.exe 37 PID 2084 wrote to memory of 1608 2084 wmg.exe 37 PID 2084 wrote to memory of 1552 2084 wmg.exe 38 PID 2084 wrote to memory of 1552 2084 wmg.exe 38 PID 2084 wrote to memory of 1552 2084 wmg.exe 38 PID 2084 wrote to memory of 1552 2084 wmg.exe 38 PID 1608 wrote to memory of 2972 1608 wxbtuc.exe 40 PID 1608 wrote to memory of 2972 1608 wxbtuc.exe 40 PID 1608 wrote to memory of 2972 1608 wxbtuc.exe 40 PID 1608 wrote to memory of 2972 1608 wxbtuc.exe 40 PID 1608 wrote to memory of 1932 1608 wxbtuc.exe 41 PID 1608 wrote to memory of 1932 1608 wxbtuc.exe 41 PID 1608 wrote to memory of 1932 1608 wxbtuc.exe 41 PID 1608 wrote to memory of 1932 1608 wxbtuc.exe 41 PID 2972 wrote to memory of 1064 2972 wsrxgk.exe 43 PID 2972 wrote to memory of 1064 2972 wsrxgk.exe 43 PID 2972 wrote to memory of 1064 2972 wsrxgk.exe 43 PID 2972 wrote to memory of 1064 2972 wsrxgk.exe 43 PID 2972 wrote to memory of 1092 2972 wsrxgk.exe 44 PID 2972 wrote to memory of 1092 2972 wsrxgk.exe 44 PID 2972 wrote to memory of 1092 2972 wsrxgk.exe 44 PID 2972 wrote to memory of 1092 2972 wsrxgk.exe 44 PID 1064 wrote to memory of 2792 1064 wndomqie.exe 46 PID 1064 wrote to memory of 2792 1064 wndomqie.exe 46 PID 1064 wrote to memory of 2792 1064 wndomqie.exe 46 PID 1064 wrote to memory of 2792 1064 wndomqie.exe 46 PID 1064 wrote to memory of 1328 1064 wndomqie.exe 47 PID 1064 wrote to memory of 1328 1064 wndomqie.exe 47 PID 1064 wrote to memory of 1328 1064 wndomqie.exe 47 PID 1064 wrote to memory of 1328 1064 wndomqie.exe 47 PID 2792 wrote to memory of 552 2792 whvtx.exe 49 PID 2792 wrote to memory of 552 2792 whvtx.exe 49 PID 2792 wrote to memory of 552 2792 whvtx.exe 49 PID 2792 wrote to memory of 552 2792 whvtx.exe 49 PID 2792 wrote to memory of 1052 2792 whvtx.exe 50 PID 2792 wrote to memory of 1052 2792 whvtx.exe 50 PID 2792 wrote to memory of 1052 2792 whvtx.exe 50 PID 2792 wrote to memory of 1052 2792 whvtx.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\091213e24bafc8bfbe4558f92bc5dd20_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SysWOW64\wgvnny.exe"C:\Windows\system32\wgvnny.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\wuyuw.exe"C:\Windows\system32\wuyuw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\wmg.exe"C:\Windows\system32\wmg.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\wxbtuc.exe"C:\Windows\system32\wxbtuc.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\wsrxgk.exe"C:\Windows\system32\wsrxgk.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\wndomqie.exe"C:\Windows\system32\wndomqie.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\whvtx.exe"C:\Windows\system32\whvtx.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\wmtt.exe"C:\Windows\system32\wmtt.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:552 -
C:\Windows\SysWOW64\wbmc.exe"C:\Windows\system32\wbmc.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904 -
C:\Windows\SysWOW64\wmqyich.exe"C:\Windows\system32\wmqyich.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028 -
C:\Windows\SysWOW64\wgjd.exe"C:\Windows\system32\wgjd.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2244 -
C:\Windows\SysWOW64\wwqciyw.exe"C:\Windows\system32\wwqciyw.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:808 -
C:\Windows\SysWOW64\wwunr.exe"C:\Windows\system32\wwunr.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Windows\SysWOW64\wtw.exe"C:\Windows\system32\wtw.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2376 -
C:\Windows\SysWOW64\wwahcp.exe"C:\Windows\system32\wwahcp.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1412 -
C:\Windows\SysWOW64\weckux.exe"C:\Windows\system32\weckux.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\wkdomh.exe"C:\Windows\system32\wkdomh.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:112 -
C:\Windows\SysWOW64\wjga.exe"C:\Windows\system32\wjga.exe"19⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\SysWOW64\wii.exe"C:\Windows\system32\wii.exe"20⤵
- Executes dropped EXE
PID:1872 -
C:\Windows\SysWOW64\wgam.exe"C:\Windows\system32\wgam.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2996 -
C:\Windows\SysWOW64\wfexsf.exe"C:\Windows\system32\wfexsf.exe"22⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\whffs.exe"C:\Windows\system32\whffs.exe"23⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\woijlg.exe"C:\Windows\system32\woijlg.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2344 -
C:\Windows\SysWOW64\wyfehinx.exe"C:\Windows\system32\wyfehinx.exe"25⤵
- Executes dropped EXE
PID:1112 -
C:\Windows\SysWOW64\whhiy.exe"C:\Windows\system32\whhiy.exe"26⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\wfjsjqd.exe"C:\Windows\system32\wfjsjqd.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\waqonxi.exe"C:\Windows\system32\waqonxi.exe"28⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\SysWOW64\wged.exe"C:\Windows\system32\wged.exe"29⤵
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\wng.exe"C:\Windows\system32\wng.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2080 -
C:\Windows\SysWOW64\wusueyll.exe"C:\Windows\system32\wusueyll.exe"31⤵
- Executes dropped EXE
PID:1756 -
C:\Windows\SysWOW64\weffta.exe"C:\Windows\system32\weffta.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2508 -
C:\Windows\SysWOW64\wdifm.exe"C:\Windows\system32\wdifm.exe"33⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\SysWOW64\wikie.exe"C:\Windows\system32\wikie.exe"34⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\wtgebkk.exe"C:\Windows\system32\wtgebkk.exe"35⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\wwwcub.exe"C:\Windows\system32\wwwcub.exe"36⤵
- Executes dropped EXE
PID:1156 -
C:\Windows\SysWOW64\wylsctywh.exe"C:\Windows\system32\wylsctywh.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1660 -
C:\Windows\SysWOW64\wutnh.exe"C:\Windows\system32\wutnh.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:380 -
C:\Windows\SysWOW64\wrhjwbrn.exe"C:\Windows\system32\wrhjwbrn.exe"39⤵
- Executes dropped EXE
PID:692 -
C:\Windows\SysWOW64\wujqyra.exe"C:\Windows\system32\wujqyra.exe"40⤵
- Executes dropped EXE
PID:1528 -
C:\Windows\SysWOW64\wpqmdyd.exe"C:\Windows\system32\wpqmdyd.exe"41⤵
- Executes dropped EXE
PID:2708 -
C:\Windows\SysWOW64\wrtteqk.exe"C:\Windows\system32\wrtteqk.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\wuuafi.exe"C:\Windows\system32\wuuafi.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2240 -
C:\Windows\SysWOW64\wxjsma.exe"C:\Windows\system32\wxjsma.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\wylbm.exe"C:\Windows\system32\wylbm.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2064 -
C:\Windows\SysWOW64\whmef.exe"C:\Windows\system32\whmef.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1772 -
C:\Windows\SysWOW64\wnbsej.exe"C:\Windows\system32\wnbsej.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\wms.exe"C:\Windows\system32\wms.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1444 -
C:\Windows\SysWOW64\wpt.exe"C:\Windows\system32\wpt.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\wwwfai.exe"C:\Windows\system32\wwwfai.exe"50⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\wuyrj.exe"C:\Windows\system32\wuyrj.exe"51⤵
- Executes dropped EXE
PID:2220 -
C:\Windows\SysWOW64\wbleir.exe"C:\Windows\system32\wbleir.exe"52⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\wjnibb.exe"C:\Windows\system32\wjnibb.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\wlffu.exe"C:\Windows\system32\wlffu.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2316 -
C:\Windows\SysWOW64\wnsxcjka.exe"C:\Windows\system32\wnsxcjka.exe"55⤵
- Executes dropped EXE
PID:1776 -
C:\Windows\SysWOW64\wrjuwag.exe"C:\Windows\system32\wrjuwag.exe"56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:264 -
C:\Windows\SysWOW64\wsldvq.exe"C:\Windows\system32\wsldvq.exe"57⤵
- Executes dropped EXE
PID:1876 -
C:\Windows\SysWOW64\wwokxh.exe"C:\Windows\system32\wwokxh.exe"58⤵
- Executes dropped EXE
PID:3036 -
C:\Windows\SysWOW64\wur.exe"C:\Windows\system32\wur.exe"59⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\SysWOW64\wfehw.exe"C:\Windows\system32\wfehw.exe"60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\wlquvt.exe"C:\Windows\system32\wlquvt.exe"61⤵
- Executes dropped EXE
PID:1376 -
C:\Windows\SysWOW64\wptcwjcgn.exe"C:\Windows\system32\wptcwjcgn.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\wjaw.exe"C:\Windows\system32\wjaw.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:340 -
C:\Windows\SysWOW64\wvxryrrf.exe"C:\Windows\system32\wvxryrrf.exe"64⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\SysWOW64\woqwjagy.exe"C:\Windows\system32\woqwjagy.exe"65⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\SysWOW64\wewocc.exe"C:\Windows\system32\wewocc.exe"66⤵PID:1104
-
C:\Windows\SysWOW64\wmueet.exe"C:\Windows\system32\wmueet.exe"67⤵PID:1876
-
C:\Windows\SysWOW64\wshrcdf.exe"C:\Windows\system32\wshrcdf.exe"68⤵PID:2680
-
C:\Windows\SysWOW64\wfouybcd.exe"C:\Windows\system32\wfouybcd.exe"69⤵PID:2108
-
C:\Windows\SysWOW64\wedhnj.exe"C:\Windows\system32\wedhnj.exe"70⤵PID:2548
-
C:\Windows\SysWOW64\wxhvetc.exe"C:\Windows\system32\wxhvetc.exe"71⤵PID:2616
-
C:\Windows\SysWOW64\wcpgtiq.exe"C:\Windows\system32\wcpgtiq.exe"72⤵
- Drops file in System32 directory
PID:1672 -
C:\Windows\SysWOW64\wnirvg.exe"C:\Windows\system32\wnirvg.exe"73⤵
- Drops file in System32 directory
PID:1112 -
C:\Windows\SysWOW64\wqsbjv.exe"C:\Windows\system32\wqsbjv.exe"74⤵PID:264
-
C:\Windows\SysWOW64\wglkemadu.exe"C:\Windows\system32\wglkemadu.exe"75⤵PID:2588
-
C:\Windows\SysWOW64\wxtj.exe"C:\Windows\system32\wxtj.exe"76⤵PID:692
-
C:\Windows\SysWOW64\woosrve.exe"C:\Windows\system32\woosrve.exe"77⤵PID:2284
-
C:\Windows\SysWOW64\wbvtntal.exe"C:\Windows\system32\wbvtntal.exe"78⤵PID:848
-
C:\Windows\SysWOW64\wroe.exe"C:\Windows\system32\wroe.exe"79⤵PID:1932
-
C:\Windows\SysWOW64\wexgei.exe"C:\Windows\system32\wexgei.exe"80⤵PID:872
-
C:\Windows\SysWOW64\wodbogcux.exe"C:\Windows\system32\wodbogcux.exe"81⤵
- Drops file in System32 directory
PID:1032 -
C:\Windows\SysWOW64\wbkfkfa.exe"C:\Windows\system32\wbkfkfa.exe"82⤵
- Drops file in System32 directory
PID:1504 -
C:\Windows\SysWOW64\wqdmfv.exe"C:\Windows\system32\wqdmfv.exe"83⤵PID:792
-
C:\Windows\SysWOW64\wxpcegh.exe"C:\Windows\system32\wxpcegh.exe"84⤵PID:2636
-
C:\Windows\SysWOW64\wesfvort.exe"C:\Windows\system32\wesfvort.exe"85⤵PID:2944
-
C:\Windows\SysWOW64\wmtinxdu.exe"C:\Windows\system32\wmtinxdu.exe"86⤵PID:2676
-
C:\Windows\SysWOW64\wsgwmgale.exe"C:\Windows\system32\wsgwmgale.exe"87⤵PID:2532
-
C:\Windows\SysWOW64\wvjfowh.exe"C:\Windows\system32\wvjfowh.exe"88⤵PID:972
-
C:\Windows\SysWOW64\wubgqvyit.exe"C:\Windows\system32\wubgqvyit.exe"89⤵PID:2020
-
C:\Windows\SysWOW64\wcnupg.exe"C:\Windows\system32\wcnupg.exe"90⤵PID:3012
-
C:\Windows\SysWOW64\wipxio.exe"C:\Windows\system32\wipxio.exe"91⤵PID:1692
-
C:\Windows\SysWOW64\wkrghh.exe"C:\Windows\system32\wkrghh.exe"92⤵PID:1536
-
C:\Windows\SysWOW64\wntmjxvbe.exe"C:\Windows\system32\wntmjxvbe.exe"93⤵PID:1320
-
C:\Windows\SysWOW64\wlm.exe"C:\Windows\system32\wlm.exe"94⤵PID:1780
-
C:\Windows\SysWOW64\wpovmo.exe"C:\Windows\system32\wpovmo.exe"95⤵PID:892
-
C:\Windows\SysWOW64\wirlfvv.exe"C:\Windows\system32\wirlfvv.exe"96⤵PID:2376
-
C:\Windows\SysWOW64\wltsfn.exe"C:\Windows\system32\wltsfn.exe"97⤵
- Drops file in System32 directory
PID:772 -
C:\Windows\SysWOW64\wolqa.exe"C:\Windows\system32\wolqa.exe"98⤵PID:2824
-
C:\Windows\SysWOW64\wqyigvrrl.exe"C:\Windows\system32\wqyigvrrl.exe"99⤵PID:1876
-
C:\Windows\SysWOW64\wqpjju.exe"C:\Windows\system32\wqpjju.exe"100⤵PID:2004
-
C:\Windows\SysWOW64\wssrkmsm.exe"C:\Windows\system32\wssrkmsm.exe"101⤵
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\wefbans.exe"C:\Windows\system32\wefbans.exe"102⤵PID:2716
-
C:\Windows\SysWOW64\whwmbaq.exe"C:\Windows\system32\whwmbaq.exe"103⤵PID:2516
-
C:\Windows\SysWOW64\woxrtjb.exe"C:\Windows\system32\woxrtjb.exe"104⤵
- Drops file in System32 directory
PID:1788 -
C:\Windows\SysWOW64\wnbcdj.exe"C:\Windows\system32\wnbcdj.exe"105⤵PID:264
-
C:\Windows\SysWOW64\wudgvs.exe"C:\Windows\system32\wudgvs.exe"106⤵PID:1652
-
C:\Windows\SysWOW64\wbfknb.exe"C:\Windows\system32\wbfknb.exe"107⤵
- Drops file in System32 directory
PID:2592 -
C:\Windows\SysWOW64\wlbej.exe"C:\Windows\system32\wlbej.exe"108⤵
- Drops file in System32 directory
PID:2552 -
C:\Windows\SysWOW64\wosdesi.exe"C:\Windows\system32\wosdesi.exe"109⤵
- Drops file in System32 directory
PID:2728 -
C:\Windows\SysWOW64\wvgqdcdl.exe"C:\Windows\system32\wvgqdcdl.exe"110⤵
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\wchvulpo.exe"C:\Windows\system32\wchvulpo.exe"111⤵PID:1856
-
C:\Windows\SysWOW64\wbkgfks.exe"C:\Windows\system32\wbkgfks.exe"112⤵
- Drops file in System32 directory
PID:2840 -
C:\Windows\SysWOW64\wnmgoki.exe"C:\Windows\system32\wnmgoki.exe"113⤵PID:1788
-
C:\Windows\SysWOW64\wlorxk.exe"C:\Windows\system32\wlorxk.exe"114⤵PID:2644
-
C:\Windows\SysWOW64\wrqvos.exe"C:\Windows\system32\wrqvos.exe"115⤵PID:1728
-
C:\Windows\SysWOW64\wqthytab.exe"C:\Windows\system32\wqthytab.exe"116⤵PID:692
-
C:\Windows\SysWOW64\wxvkqcld.exe"C:\Windows\system32\wxvkqcld.exe"117⤵PID:408
-
C:\Windows\SysWOW64\wewpjlwf.exe"C:\Windows\system32\wewpjlwf.exe"118⤵PID:1280
-
C:\Windows\SysWOW64\whkgrdoh.exe"C:\Windows\system32\whkgrdoh.exe"119⤵PID:760
-
C:\Windows\SysWOW64\wkooqtv.exe"C:\Windows\system32\wkooqtv.exe"120⤵
- Drops file in System32 directory
PID:664 -
C:\Windows\SysWOW64\wfu.exe"C:\Windows\system32\wfu.exe"121⤵PID:2000
-
C:\Windows\SysWOW64\whhaetr.exe"C:\Windows\system32\whhaetr.exe"122⤵
- Drops file in System32 directory
PID:1404
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-