Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/05/2024, 12:40
Behavioral task
behavioral1
Sample
ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe
Resource
win7-20240221-en
General
-
Target
ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe
-
Size
447KB
-
MD5
ecb9b33a23f053225b6447f148d44870
-
SHA1
c52164612b896fe8906d6224833574b77328fc2e
-
SHA256
615336c214d0a92d455d9aeb62f813cbc036e8a9771c43c141dccbc7830729e2
-
SHA512
64bf569fe20376ae83e36c2a58b75010c6eded79a2b5e8a2d367b8a8b175e6a0e1013a30bec2760bc7af25ea5ff65f3948f41af4eea4500f373ee62d4672cdf7
-
SSDEEP
12288:QT6SZhP46SCTbSwgS1IaPRJbDh4i0vm4OsKN5sTuGZb:QThhP46SCTbSwgS1IaPRJbDh4i0vm4Om
Malware Config
Signatures
-
Malware Dropper & Backdoor - Berbew 19 IoCs
Berbew is a backdoor Trojan malware with capabilities to download and install a range of additional malicious software, such as other Trojans, ransomware, and cryptominers.
resource yara_rule behavioral1/files/0x000b000000014fe1-5.dat family_berbew behavioral1/files/0x0008000000015c23-37.dat family_berbew behavioral1/files/0x0008000000015c0d-46.dat family_berbew behavioral1/files/0x000c000000014fe1-65.dat family_berbew behavioral1/files/0x0009000000015c23-84.dat family_berbew behavioral1/memory/2172-97-0x0000000003850000-0x000000000386A000-memory.dmp family_berbew behavioral1/files/0x0007000000015c2f-107.dat family_berbew behavioral1/memory/2284-121-0x0000000003C70000-0x0000000003C8A000-memory.dmp family_berbew behavioral1/files/0x0007000000015c3c-129.dat family_berbew behavioral1/memory/2712-142-0x0000000003AE0000-0x0000000003AFA000-memory.dmp family_berbew behavioral1/files/0x000a000000015c23-151.dat family_berbew behavioral1/files/0x0008000000015c2f-173.dat family_berbew behavioral1/memory/1676-186-0x0000000003820000-0x000000000383A000-memory.dmp family_berbew behavioral1/memory/1676-185-0x0000000003810000-0x000000000382A000-memory.dmp family_berbew behavioral1/files/0x000b000000015c23-205.dat family_berbew behavioral1/memory/2220-219-0x0000000003C70000-0x0000000003C8A000-memory.dmp family_berbew behavioral1/files/0x0009000000015c2f-228.dat family_berbew behavioral1/memory/2776-249-0x0000000003B20000-0x0000000003B3A000-memory.dmp family_berbew behavioral1/memory/2776-253-0x0000000003B30000-0x0000000003B4A000-memory.dmp family_berbew -
Deletes itself 1 IoCs
pid Process 2540 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2844 wwnk.exe 2692 wanj.exe 1092 wylbm.exe 2172 wei.exe 2284 wvgppmq.exe 2712 wrwiiq.exe 1564 wtjqyj.exe 1676 wfrgde.exe 2236 wxx.exe 2456 whttbm.exe 2776 wlr.exe 1476 wifrmx.exe 944 wame.exe 2848 wmss.exe 920 wvvlli.exe 1508 wrivkj.exe 1976 wakpkovh.exe 2940 wjuni.exe 2660 wcjrxw.exe 2548 waddkueth.exe 1320 wgsl.exe 2004 wdatp.exe 2748 wqikrx.exe 1160 whtcqf.exe 1972 wtvog.exe 1768 wqjbg.exe 1608 wuhnum.exe 2572 wrm.exe 1556 wjm.exe 776 wefonf.exe 1616 wmntslt.exe 1928 wlwhqi.exe 2384 wphqex.exe 2748 wfhclm.exe 1700 wnpirri.exe 1972 wqxqeiy.exe 2472 wuwpmv.exe 2680 wcrhxdh.exe 2560 wfbpmsx.exe 1540 weascp.exe 860 wteldh.exe 808 wsdps.exe 2648 wbkuxk.exe 1160 wvvlepx.exe 2060 wvtotm.exe 1768 wxojpdy.exe 3028 woxhcs.exe 2312 woagto.exe 1556 wespn.exe 2388 wvhpnr.exe 1960 wdpvsy.exe 800 wcaiqwhim.exe 3020 wnsvsvox.exe 1572 wvumsa.exe 2128 wikrcvhss.exe 2604 wmtaplwpd.exe 892 wsopdsb.exe 1432 wxeddgy.exe 2280 wgnhimsh.exe 2276 wjlh.exe 1188 wivumx.exe 1816 wyvguld.exe 1964 wthwa.exe 2132 wpussw.exe -
Loads dropped DLL 64 IoCs
pid Process 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 2844 wwnk.exe 2844 wwnk.exe 2844 wwnk.exe 2844 wwnk.exe 2692 wanj.exe 2692 wanj.exe 2692 wanj.exe 2692 wanj.exe 1092 wylbm.exe 1092 wylbm.exe 1092 wylbm.exe 1092 wylbm.exe 2172 wei.exe 2172 wei.exe 2172 wei.exe 2172 wei.exe 2284 wvgppmq.exe 2284 wvgppmq.exe 2284 wvgppmq.exe 2284 wvgppmq.exe 2712 wrwiiq.exe 2712 wrwiiq.exe 2712 wrwiiq.exe 2712 wrwiiq.exe 1564 wtjqyj.exe 1564 wtjqyj.exe 1564 wtjqyj.exe 1564 wtjqyj.exe 1676 wfrgde.exe 1676 wfrgde.exe 1676 wfrgde.exe 1676 wfrgde.exe 2220 wpftax.exe 2220 wpftax.exe 2220 wpftax.exe 2220 wpftax.exe 2456 whttbm.exe 2456 whttbm.exe 2456 whttbm.exe 2456 whttbm.exe 2776 wlr.exe 2776 wlr.exe 2776 wlr.exe 2776 wlr.exe 1476 wifrmx.exe 1476 wifrmx.exe 1476 wifrmx.exe 1476 wifrmx.exe 944 wame.exe 944 wame.exe 944 wame.exe 944 wame.exe 2848 wmss.exe 2848 wmss.exe 2848 wmss.exe 2848 wmss.exe 920 wvvlli.exe 920 wvvlli.exe 920 wvvlli.exe 920 wvvlli.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wfgfdw.exe wohuvjvyq.exe File opened for modification C:\Windows\SysWOW64\wpopluwe.exe wumimp.exe File created C:\Windows\SysWOW64\wakpkovh.exe wrivkj.exe File created C:\Windows\SysWOW64\wxojpdy.exe wvtotm.exe File created C:\Windows\SysWOW64\wtxptpb.exe wcwgnb.exe File opened for modification C:\Windows\SysWOW64\weaskkw.exe wjverb.exe File created C:\Windows\SysWOW64\wlr.exe whttbm.exe File created C:\Windows\SysWOW64\wbkuxk.exe wsdps.exe File opened for modification C:\Windows\SysWOW64\wrsgngntv.exe wfkeqip.exe File opened for modification C:\Windows\SysWOW64\wrlvxp.exe wmvkw.exe File opened for modification C:\Windows\SysWOW64\wyvguld.exe wivumx.exe File created C:\Windows\SysWOW64\wmplid.exe wfgfdw.exe File created C:\Windows\SysWOW64\wfqxdey.exe wnqnuqg.exe File opened for modification C:\Windows\SysWOW64\wei.exe wylbm.exe File opened for modification C:\Windows\SysWOW64\wmss.exe wame.exe File opened for modification C:\Windows\SysWOW64\wuwpmv.exe wqxqeiy.exe File created C:\Windows\SysWOW64\wfbpmsx.exe wcrhxdh.exe File opened for modification C:\Windows\SysWOW64\wtoxbuqwy.exe webxa.exe File opened for modification C:\Windows\SysWOW64\wkcxcjqnd.exe wlslfn.exe File created C:\Windows\SysWOW64\wpiviw.exe wdokfwlm.exe File opened for modification C:\Windows\SysWOW64\wwnk.exe ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe File created C:\Windows\SysWOW64\wqxfqf.exe wwwaqypt.exe File created C:\Windows\SysWOW64\woysoou.exe wlpjaa.exe File opened for modification C:\Windows\SysWOW64\wirvxb.exe wrrjsn.exe File opened for modification C:\Windows\SysWOW64\wumimp.exe wigfq.exe File created C:\Windows\SysWOW64\wvgppmq.exe wei.exe File created C:\Windows\SysWOW64\wsdps.exe wteldh.exe File opened for modification C:\Windows\SysWOW64\wsfpfw.exe wfldbxnt.exe File created C:\Windows\SysWOW64\wrrjsn.exe wvhslfi.exe File created C:\Windows\SysWOW64\wou.exe wkklnp.exe File created C:\Windows\SysWOW64\weerfpbjk.exe wmeixcgue.exe File created C:\Windows\SysWOW64\wkwtmwsq.exe wmnipahko.exe File opened for modification C:\Windows\SysWOW64\wivumx.exe wjlh.exe File created C:\Windows\SysWOW64\wsqykuo.exe wqxfqf.exe File opened for modification C:\Windows\SysWOW64\wfldbxnt.exe wkbmuq.exe File created C:\Windows\SysWOW64\wwhqv.exe wtxhi.exe File created C:\Windows\SysWOW64\wumimp.exe wigfq.exe File opened for modification C:\Windows\SysWOW64\wohy.exe wwweug.exe File opened for modification C:\Windows\SysWOW64\wbkuxk.exe wsdps.exe File created C:\Windows\SysWOW64\wdusosava.exe wsfpfw.exe File created C:\Windows\SysWOW64\wmioqhs.exe wrjhq.exe File opened for modification C:\Windows\SysWOW64\wllqud.exe wtxptpb.exe File opened for modification C:\Windows\SysWOW64\wyenr.exe wmwlupsn.exe File opened for modification C:\Windows\SysWOW64\wqxqeiy.exe wnpirri.exe File created C:\Windows\SysWOW64\wirbgp.exe wiimjre.exe File created C:\Windows\SysWOW64\wvhslfi.exe wwhqv.exe File opened for modification C:\Windows\SysWOW64\wknhwwp.exe wohy.exe File opened for modification C:\Windows\SysWOW64\wqxfqf.exe wwwaqypt.exe File opened for modification C:\Windows\SysWOW64\wiq.exe wahbhd.exe File created C:\Windows\SysWOW64\wrjhq.exe wloqgtr.exe File created C:\Windows\SysWOW64\wacasf.exe wmioqhs.exe File created C:\Windows\SysWOW64\wei.exe wylbm.exe File created C:\Windows\SysWOW64\wnpirri.exe wfhclm.exe File opened for modification C:\Windows\SysWOW64\wcrhxdh.exe wuwpmv.exe File created C:\Windows\SysWOW64\weascp.exe wfbpmsx.exe File created C:\Windows\SysWOW64\webxa.exe wepkcj.exe File created C:\Windows\SysWOW64\wyno.exe wrlvxp.exe File opened for modification C:\Windows\SysWOW64\wiyus.exe wknhwwp.exe File created C:\Windows\SysWOW64\wmntslt.exe wefonf.exe File opened for modification C:\Windows\SysWOW64\wwhxsuod.exe woysoou.exe File created C:\Windows\SysWOW64\wckttqa.exe wprhrrrt.exe File opened for modification C:\Windows\SysWOW64\wckfagluh.exe wglxbbnp.exe File opened for modification C:\Windows\SysWOW64\wdusosava.exe wsfpfw.exe File created C:\Windows\SysWOW64\wndqvnn.exe weaskkw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2168 2572 WerFault.exe 237 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2844 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 28 PID 1056 wrote to memory of 2844 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 28 PID 1056 wrote to memory of 2844 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 28 PID 1056 wrote to memory of 2844 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 28 PID 1056 wrote to memory of 2540 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 29 PID 1056 wrote to memory of 2540 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 29 PID 1056 wrote to memory of 2540 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 29 PID 1056 wrote to memory of 2540 1056 ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe 29 PID 2844 wrote to memory of 2692 2844 wwnk.exe 31 PID 2844 wrote to memory of 2692 2844 wwnk.exe 31 PID 2844 wrote to memory of 2692 2844 wwnk.exe 31 PID 2844 wrote to memory of 2692 2844 wwnk.exe 31 PID 2844 wrote to memory of 2444 2844 wwnk.exe 32 PID 2844 wrote to memory of 2444 2844 wwnk.exe 32 PID 2844 wrote to memory of 2444 2844 wwnk.exe 32 PID 2844 wrote to memory of 2444 2844 wwnk.exe 32 PID 2692 wrote to memory of 1092 2692 wanj.exe 34 PID 2692 wrote to memory of 1092 2692 wanj.exe 34 PID 2692 wrote to memory of 1092 2692 wanj.exe 34 PID 2692 wrote to memory of 1092 2692 wanj.exe 34 PID 2692 wrote to memory of 1432 2692 wanj.exe 35 PID 2692 wrote to memory of 1432 2692 wanj.exe 35 PID 2692 wrote to memory of 1432 2692 wanj.exe 35 PID 2692 wrote to memory of 1432 2692 wanj.exe 35 PID 1092 wrote to memory of 2172 1092 wylbm.exe 37 PID 1092 wrote to memory of 2172 1092 wylbm.exe 37 PID 1092 wrote to memory of 2172 1092 wylbm.exe 37 PID 1092 wrote to memory of 2172 1092 wylbm.exe 37 PID 1092 wrote to memory of 1832 1092 wylbm.exe 38 PID 1092 wrote to memory of 1832 1092 wylbm.exe 38 PID 1092 wrote to memory of 1832 1092 wylbm.exe 38 PID 1092 wrote to memory of 1832 1092 wylbm.exe 38 PID 2172 wrote to memory of 2284 2172 wei.exe 40 PID 2172 wrote to memory of 2284 2172 wei.exe 40 PID 2172 wrote to memory of 2284 2172 wei.exe 40 PID 2172 wrote to memory of 2284 2172 wei.exe 40 PID 2172 wrote to memory of 1596 2172 wei.exe 41 PID 2172 wrote to memory of 1596 2172 wei.exe 41 PID 2172 wrote to memory of 1596 2172 wei.exe 41 PID 2172 wrote to memory of 1596 2172 wei.exe 41 PID 2284 wrote to memory of 2712 2284 wvgppmq.exe 43 PID 2284 wrote to memory of 2712 2284 wvgppmq.exe 43 PID 2284 wrote to memory of 2712 2284 wvgppmq.exe 43 PID 2284 wrote to memory of 2712 2284 wvgppmq.exe 43 PID 2284 wrote to memory of 632 2284 wvgppmq.exe 44 PID 2284 wrote to memory of 632 2284 wvgppmq.exe 44 PID 2284 wrote to memory of 632 2284 wvgppmq.exe 44 PID 2284 wrote to memory of 632 2284 wvgppmq.exe 44 PID 2712 wrote to memory of 1564 2712 wrwiiq.exe 46 PID 2712 wrote to memory of 1564 2712 wrwiiq.exe 46 PID 2712 wrote to memory of 1564 2712 wrwiiq.exe 46 PID 2712 wrote to memory of 1564 2712 wrwiiq.exe 46 PID 2712 wrote to memory of 2832 2712 wrwiiq.exe 47 PID 2712 wrote to memory of 2832 2712 wrwiiq.exe 47 PID 2712 wrote to memory of 2832 2712 wrwiiq.exe 47 PID 2712 wrote to memory of 2832 2712 wrwiiq.exe 47 PID 1564 wrote to memory of 1676 1564 wtjqyj.exe 49 PID 1564 wrote to memory of 1676 1564 wtjqyj.exe 49 PID 1564 wrote to memory of 1676 1564 wtjqyj.exe 49 PID 1564 wrote to memory of 1676 1564 wtjqyj.exe 49 PID 1564 wrote to memory of 3028 1564 wtjqyj.exe 50 PID 1564 wrote to memory of 3028 1564 wtjqyj.exe 50 PID 1564 wrote to memory of 3028 1564 wtjqyj.exe 50 PID 1564 wrote to memory of 3028 1564 wtjqyj.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\ecb9b33a23f053225b6447f148d44870_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\wwnk.exe"C:\Windows\system32\wwnk.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\wanj.exe"C:\Windows\system32\wanj.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\wylbm.exe"C:\Windows\system32\wylbm.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\wei.exe"C:\Windows\system32\wei.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\wvgppmq.exe"C:\Windows\system32\wvgppmq.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\wrwiiq.exe"C:\Windows\system32\wrwiiq.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\wtjqyj.exe"C:\Windows\system32\wtjqyj.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\wfrgde.exe"C:\Windows\system32\wfrgde.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Windows\SysWOW64\wxx.exe"C:\Windows\system32\wxx.exe"10⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\SysWOW64\wpftax.exe"C:\Windows\system32\wpftax.exe"11⤵
- Loads dropped DLL
PID:2220 -
C:\Windows\SysWOW64\whttbm.exe"C:\Windows\system32\whttbm.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2456 -
C:\Windows\SysWOW64\wlr.exe"C:\Windows\system32\wlr.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2776 -
C:\Windows\SysWOW64\wifrmx.exe"C:\Windows\system32\wifrmx.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1476 -
C:\Windows\SysWOW64\wame.exe"C:\Windows\system32\wame.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:944 -
C:\Windows\SysWOW64\wmss.exe"C:\Windows\system32\wmss.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2848 -
C:\Windows\SysWOW64\wvvlli.exe"C:\Windows\system32\wvvlli.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:920 -
C:\Windows\SysWOW64\wrivkj.exe"C:\Windows\system32\wrivkj.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\wakpkovh.exe"C:\Windows\system32\wakpkovh.exe"19⤵
- Executes dropped EXE
PID:1976 -
C:\Windows\SysWOW64\wjuni.exe"C:\Windows\system32\wjuni.exe"20⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\SysWOW64\wcjrxw.exe"C:\Windows\system32\wcjrxw.exe"21⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\waddkueth.exe"C:\Windows\system32\waddkueth.exe"22⤵
- Executes dropped EXE
PID:2548 -
C:\Windows\SysWOW64\wgsl.exe"C:\Windows\system32\wgsl.exe"23⤵
- Executes dropped EXE
PID:1320 -
C:\Windows\SysWOW64\wdatp.exe"C:\Windows\system32\wdatp.exe"24⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\SysWOW64\wqikrx.exe"C:\Windows\system32\wqikrx.exe"25⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\whtcqf.exe"C:\Windows\system32\whtcqf.exe"26⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\wtvog.exe"C:\Windows\system32\wtvog.exe"27⤵
- Executes dropped EXE
PID:1972 -
C:\Windows\SysWOW64\wqjbg.exe"C:\Windows\system32\wqjbg.exe"28⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\wuhnum.exe"C:\Windows\system32\wuhnum.exe"29⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\wrm.exe"C:\Windows\system32\wrm.exe"30⤵
- Executes dropped EXE
PID:2572 -
C:\Windows\SysWOW64\wjm.exe"C:\Windows\system32\wjm.exe"31⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\wefonf.exe"C:\Windows\system32\wefonf.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:776 -
C:\Windows\SysWOW64\wmntslt.exe"C:\Windows\system32\wmntslt.exe"33⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\SysWOW64\wlwhqi.exe"C:\Windows\system32\wlwhqi.exe"34⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\wphqex.exe"C:\Windows\system32\wphqex.exe"35⤵
- Executes dropped EXE
PID:2384 -
C:\Windows\SysWOW64\wfhclm.exe"C:\Windows\system32\wfhclm.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\wnpirri.exe"C:\Windows\system32\wnpirri.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1700 -
C:\Windows\SysWOW64\wqxqeiy.exe"C:\Windows\system32\wqxqeiy.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1972 -
C:\Windows\SysWOW64\wuwpmv.exe"C:\Windows\system32\wuwpmv.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2472 -
C:\Windows\SysWOW64\wcrhxdh.exe"C:\Windows\system32\wcrhxdh.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2680 -
C:\Windows\SysWOW64\wfbpmsx.exe"C:\Windows\system32\wfbpmsx.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2560 -
C:\Windows\SysWOW64\weascp.exe"C:\Windows\system32\weascp.exe"42⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\wteldh.exe"C:\Windows\system32\wteldh.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:860 -
C:\Windows\SysWOW64\wsdps.exe"C:\Windows\system32\wsdps.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:808 -
C:\Windows\SysWOW64\wbkuxk.exe"C:\Windows\system32\wbkuxk.exe"45⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\wvvlepx.exe"C:\Windows\system32\wvvlepx.exe"46⤵
- Executes dropped EXE
PID:1160 -
C:\Windows\SysWOW64\wvtotm.exe"C:\Windows\system32\wvtotm.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2060 -
C:\Windows\SysWOW64\wxojpdy.exe"C:\Windows\system32\wxojpdy.exe"48⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\woxhcs.exe"C:\Windows\system32\woxhcs.exe"49⤵
- Executes dropped EXE
PID:3028 -
C:\Windows\SysWOW64\woagto.exe"C:\Windows\system32\woagto.exe"50⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\SysWOW64\wespn.exe"C:\Windows\system32\wespn.exe"51⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\wvhpnr.exe"C:\Windows\system32\wvhpnr.exe"52⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\wdpvsy.exe"C:\Windows\system32\wdpvsy.exe"53⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\SysWOW64\wcaiqwhim.exe"C:\Windows\system32\wcaiqwhim.exe"54⤵
- Executes dropped EXE
PID:800 -
C:\Windows\SysWOW64\wnsvsvox.exe"C:\Windows\system32\wnsvsvox.exe"55⤵
- Executes dropped EXE
PID:3020 -
C:\Windows\SysWOW64\wvumsa.exe"C:\Windows\system32\wvumsa.exe"56⤵
- Executes dropped EXE
PID:1572 -
C:\Windows\SysWOW64\wikrcvhss.exe"C:\Windows\system32\wikrcvhss.exe"57⤵
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\wmtaplwpd.exe"C:\Windows\system32\wmtaplwpd.exe"58⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\wsopdsb.exe"C:\Windows\system32\wsopdsb.exe"59⤵
- Executes dropped EXE
PID:892 -
C:\Windows\SysWOW64\wxeddgy.exe"C:\Windows\system32\wxeddgy.exe"60⤵
- Executes dropped EXE
PID:1432 -
C:\Windows\SysWOW64\wgnhimsh.exe"C:\Windows\system32\wgnhimsh.exe"61⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\wjlh.exe"C:\Windows\system32\wjlh.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2276 -
C:\Windows\SysWOW64\wivumx.exe"C:\Windows\system32\wivumx.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1188 -
C:\Windows\SysWOW64\wyvguld.exe"C:\Windows\system32\wyvguld.exe"64⤵
- Executes dropped EXE
PID:1816 -
C:\Windows\SysWOW64\wthwa.exe"C:\Windows\system32\wthwa.exe"65⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\SysWOW64\wpussw.exe"C:\Windows\system32\wpussw.exe"66⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\SysWOW64\wbnfu.exe"C:\Windows\system32\wbnfu.exe"67⤵PID:584
-
C:\Windows\SysWOW64\wivlb.exe"C:\Windows\system32\wivlb.exe"68⤵PID:2928
-
C:\Windows\SysWOW64\wwwaqypt.exe"C:\Windows\system32\wwwaqypt.exe"69⤵
- Drops file in System32 directory
PID:840 -
C:\Windows\SysWOW64\wqxfqf.exe"C:\Windows\system32\wqxfqf.exe"70⤵
- Drops file in System32 directory
PID:2520 -
C:\Windows\SysWOW64\wsqykuo.exe"C:\Windows\system32\wsqykuo.exe"71⤵PID:2572
-
C:\Windows\SysWOW64\wvbjxke.exe"C:\Windows\system32\wvbjxke.exe"72⤵PID:952
-
C:\Windows\SysWOW64\wekpdqxq.exe"C:\Windows\system32\wekpdqxq.exe"73⤵PID:2276
-
C:\Windows\SysWOW64\witxsgnn.exe"C:\Windows\system32\witxsgnn.exe"74⤵PID:2120
-
C:\Windows\SysWOW64\wisbhc.exe"C:\Windows\system32\wisbhc.exe"75⤵PID:2596
-
C:\Windows\SysWOW64\wkbmuq.exe"C:\Windows\system32\wkbmuq.exe"76⤵
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\wfldbxnt.exe"C:\Windows\system32\wfldbxnt.exe"77⤵
- Drops file in System32 directory
PID:1624 -
C:\Windows\SysWOW64\wsfpfw.exe"C:\Windows\system32\wsfpfw.exe"78⤵
- Drops file in System32 directory
PID:1768 -
C:\Windows\SysWOW64\wdusosava.exe"C:\Windows\system32\wdusosava.exe"79⤵PID:2524
-
C:\Windows\SysWOW64\wlpjaa.exe"C:\Windows\system32\wlpjaa.exe"80⤵
- Drops file in System32 directory
PID:1932 -
C:\Windows\SysWOW64\woysoou.exe"C:\Windows\system32\woysoou.exe"81⤵
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\wwhxsuod.exe"C:\Windows\system32\wwhxsuod.exe"82⤵PID:2032
-
C:\Windows\SysWOW64\wiimjre.exe"C:\Windows\system32\wiimjre.exe"83⤵
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\wirbgp.exe"C:\Windows\system32\wirbgp.exe"84⤵PID:2428
-
C:\Windows\SysWOW64\wahbhd.exe"C:\Windows\system32\wahbhd.exe"85⤵
- Drops file in System32 directory
PID:436 -
C:\Windows\SysWOW64\wiq.exe"C:\Windows\system32\wiq.exe"86⤵PID:240
-
C:\Windows\SysWOW64\wfkeqip.exe"C:\Windows\system32\wfkeqip.exe"87⤵
- Drops file in System32 directory
PID:1496 -
C:\Windows\SysWOW64\wrsgngntv.exe"C:\Windows\system32\wrsgngntv.exe"88⤵PID:2076
-
C:\Windows\SysWOW64\wudpavdpi.exe"C:\Windows\system32\wudpavdpi.exe"89⤵PID:1008
-
C:\Windows\SysWOW64\wcwgnb.exe"C:\Windows\system32\wcwgnb.exe"90⤵
- Drops file in System32 directory
PID:1168 -
C:\Windows\SysWOW64\wtxptpb.exe"C:\Windows\system32\wtxptpb.exe"91⤵
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\wllqud.exe"C:\Windows\system32\wllqud.exe"92⤵PID:2008
-
C:\Windows\SysWOW64\wjverb.exe"C:\Windows\system32\wjverb.exe"93⤵
- Drops file in System32 directory
PID:2884 -
C:\Windows\SysWOW64\weaskkw.exe"C:\Windows\system32\weaskkw.exe"94⤵
- Drops file in System32 directory
PID:1436 -
C:\Windows\SysWOW64\wndqvnn.exe"C:\Windows\system32\wndqvnn.exe"95⤵PID:2512
-
C:\Windows\SysWOW64\wtxhi.exe"C:\Windows\system32\wtxhi.exe"96⤵
- Drops file in System32 directory
PID:1644 -
C:\Windows\SysWOW64\wwhqv.exe"C:\Windows\system32\wwhqv.exe"97⤵
- Drops file in System32 directory
PID:1716 -
C:\Windows\SysWOW64\wvhslfi.exe"C:\Windows\system32\wvhslfi.exe"98⤵
- Drops file in System32 directory
PID:2536 -
C:\Windows\SysWOW64\wrrjsn.exe"C:\Windows\system32\wrrjsn.exe"99⤵
- Drops file in System32 directory
PID:2340 -
C:\Windows\SysWOW64\wirvxb.exe"C:\Windows\system32\wirvxb.exe"100⤵PID:1912
-
C:\Windows\SysWOW64\wugyivqip.exe"C:\Windows\system32\wugyivqip.exe"101⤵PID:624
-
C:\Windows\SysWOW64\wcantd.exe"C:\Windows\system32\wcantd.exe"102⤵PID:2240
-
C:\Windows\SysWOW64\wgjyisl.exe"C:\Windows\system32\wgjyisl.exe"103⤵PID:2032
-
C:\Windows\SysWOW64\wmsgnbe.exe"C:\Windows\system32\wmsgnbe.exe"104⤵PID:2792
-
C:\Windows\SysWOW64\wmshew.exe"C:\Windows\system32\wmshew.exe"105⤵PID:1108
-
C:\Windows\SysWOW64\wukwpdk.exe"C:\Windows\system32\wukwpdk.exe"106⤵PID:2060
-
C:\Windows\SysWOW64\wtjbgc.exe"C:\Windows\system32\wtjbgc.exe"107⤵PID:2256
-
C:\Windows\SysWOW64\wkklnp.exe"C:\Windows\system32\wkklnp.exe"108⤵
- Drops file in System32 directory
PID:2480 -
C:\Windows\SysWOW64\wou.exe"C:\Windows\system32\wou.exe"109⤵PID:2408
-
C:\Windows\SysWOW64\wmeixcgue.exe"C:\Windows\system32\wmeixcgue.exe"110⤵
- Drops file in System32 directory
PID:2364 -
C:\Windows\SysWOW64\weerfpbjk.exe"C:\Windows\system32\weerfpbjk.exe"111⤵PID:2348
-
C:\Windows\SysWOW64\wpxejoja.exe"C:\Windows\system32\wpxejoja.exe"112⤵PID:2320
-
C:\Windows\SysWOW64\whwpqddmo.exe"C:\Windows\system32\whwpqddmo.exe"113⤵PID:940
-
C:\Windows\SysWOW64\wohuvjvyq.exe"C:\Windows\system32\wohuvjvyq.exe"114⤵
- Drops file in System32 directory
PID:1336 -
C:\Windows\SysWOW64\wfgfdw.exe"C:\Windows\system32\wfgfdw.exe"115⤵
- Drops file in System32 directory
PID:972 -
C:\Windows\SysWOW64\wmplid.exe"C:\Windows\system32\wmplid.exe"116⤵PID:3020
-
C:\Windows\SysWOW64\wprhrrrt.exe"C:\Windows\system32\wprhrrrt.exe"117⤵
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\wckttqa.exe"C:\Windows\system32\wckttqa.exe"118⤵PID:1312
-
C:\Windows\SysWOW64\wloqgtr.exe"C:\Windows\system32\wloqgtr.exe"119⤵
- Drops file in System32 directory
PID:112 -
C:\Windows\SysWOW64\wrjhq.exe"C:\Windows\system32\wrjhq.exe"120⤵
- Drops file in System32 directory
PID:768 -
C:\Windows\SysWOW64\wmioqhs.exe"C:\Windows\system32\wmioqhs.exe"121⤵
- Drops file in System32 directory
PID:1596 -
C:\Windows\SysWOW64\wacasf.exe"C:\Windows\system32\wacasf.exe"122⤵PID:2720
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-