Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/05/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe
Resource
win10v2004-20240426-en
General
-
Target
a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe
-
Size
82KB
-
MD5
a789d85112422769a4e5bfd578aeb490
-
SHA1
64df321279801aca306c432a8a38ebc553a78378
-
SHA256
4e269c558ad900af1020823c7cb0b15d326898893b3f96d19dfe74ba205a028a
-
SHA512
f70bd351fb551897fb67a84e5fb686e69e4f3dbbe61c74d7b48dfd656b69334b2140fe3a9ac9ab30aa668fd92398315266e4d530abbdbfcf8dba30b9bdcb5ae7
-
SSDEEP
1536:azUQz74LIvK/+Czax4IHVdmRvW1BDVwrVXwP:qUQz74TmFnmRvW1gXwP
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2816 wbb.exe 2936 wjt.exe 2496 wmki.exe 1724 wiy.exe 1780 wbfuwi.exe 2700 wta.exe 1856 wfc.exe 3056 wjaxqbj.exe 2240 wcgklmmg.exe 2532 wbnpfeao.exe 2668 wjtnr.exe 1264 wblkrtgi.exe 2208 wkbqkygfi.exe 592 wrq.exe 2452 wndpijqre.exe 1920 wfyrw.exe 1168 wryhn.exe 1612 wao.exe 2588 wuxwit.exe 2772 wej.exe 1696 wqr.exe 768 whbixgpqm.exe 3068 wqgfk.exe 2288 wuwpmv.exe 1100 wpihrdmw.exe 860 woawcxgn.exe 1564 wsex.exe 2476 wjprkyxjy.exe 2900 wovuf.exe 2376 wegosa.exe 2668 wvgxbok.exe 1868 winpfh.exe 1824 wwxacxno.exe 1576 wbpkckmuk.exe 1160 wkf.exe 3012 wcaiqwhim.exe 2200 wtatwjbws.exe 3028 wtrjigvne.exe 2240 wijt.exe 2016 whlsjonq.exe 2544 wolbru.exe 2668 wsjogghc.exe 1596 wbkgfks.exe 1056 wwroqnyye.exe 1680 wwfvi.exe 1548 wtl.exe 2812 wkl.exe 2572 wgqluxx.exe 2540 whhaetr.exe 2772 wkxlgfrh.exe 1156 wxybvcg.exe 1028 wwfgyx.exe 1852 wskionhu.exe 2680 wriou.exe 2784 wradfcdx.exe 1808 whlysr.exe 3008 wxkibg.exe 2696 wxjmqceh.exe 940 wgfuwen.exe 1716 wmwtfn.exe 852 wdfiabp.exe 1588 wusiany.exe 1596 wmenfp.exe 2252 wagcw.exe -
Loads dropped DLL 64 IoCs
pid Process 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 2816 wbb.exe 2816 wbb.exe 2816 wbb.exe 2816 wbb.exe 2816 wbb.exe 2936 wjt.exe 2936 wjt.exe 2936 wjt.exe 2936 wjt.exe 2936 wjt.exe 2496 wmki.exe 2496 wmki.exe 2496 wmki.exe 2496 wmki.exe 2496 wmki.exe 1724 wiy.exe 1724 wiy.exe 1724 wiy.exe 1724 wiy.exe 1724 wiy.exe 1780 wbfuwi.exe 1780 wbfuwi.exe 1780 wbfuwi.exe 1780 wbfuwi.exe 1780 wbfuwi.exe 2700 wta.exe 2700 wta.exe 2700 wta.exe 2700 wta.exe 2700 wta.exe 1856 wfc.exe 1856 wfc.exe 1856 wfc.exe 1856 wfc.exe 1856 wfc.exe 3056 wjaxqbj.exe 3056 wjaxqbj.exe 3056 wjaxqbj.exe 3056 wjaxqbj.exe 3056 wjaxqbj.exe 2240 wcgklmmg.exe 2240 wcgklmmg.exe 2240 wcgklmmg.exe 2240 wcgklmmg.exe 2240 wcgklmmg.exe 2532 wbnpfeao.exe 2532 wbnpfeao.exe 2532 wbnpfeao.exe 2532 wbnpfeao.exe 2532 wbnpfeao.exe 2668 wjtnr.exe 2668 wjtnr.exe 2668 wjtnr.exe 2668 wjtnr.exe 2668 wjtnr.exe 1264 wblkrtgi.exe 1264 wblkrtgi.exe 1264 wblkrtgi.exe 1264 wblkrtgi.exe 1264 wblkrtgi.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wwfence.exe wwyxjit.exe File created C:\Windows\SysWOW64\wjaxqbj.exe wfc.exe File created C:\Windows\SysWOW64\wwaof.exe wedykx.exe File created C:\Windows\SysWOW64\wdxyq.exe wymc.exe File opened for modification C:\Windows\SysWOW64\wkhvjqky.exe wdrmqmh.exe File opened for modification C:\Windows\SysWOW64\wlebne.exe wdc.exe File opened for modification C:\Windows\SysWOW64\wytfw.exe wlebne.exe File opened for modification C:\Windows\SysWOW64\wccpyak.exe wtmhh.exe File opened for modification C:\Windows\SysWOW64\wnbrm.exe wtjyup.exe File created C:\Windows\SysWOW64\wedykx.exe wuhvbjve.exe File opened for modification C:\Windows\SysWOW64\wqseievr.exe weqprggq.exe File opened for modification C:\Windows\SysWOW64\wdxyq.exe wymc.exe File opened for modification C:\Windows\SysWOW64\wdfiabp.exe wmwtfn.exe File created C:\Windows\SysWOW64\wwjsuk.exe wstgt.exe File opened for modification C:\Windows\SysWOW64\wpussyyd.exe wjjbe.exe File opened for modification C:\Windows\SysWOW64\wtrjigvne.exe wtatwjbws.exe File created C:\Windows\SysWOW64\wolbru.exe whlsjonq.exe File opened for modification C:\Windows\SysWOW64\wgqluxx.exe wkl.exe File created C:\Windows\SysWOW64\whhaetr.exe wgqluxx.exe File opened for modification C:\Windows\SysWOW64\wnwrdqxv.exe wfhklm.exe File created C:\Windows\SysWOW64\wvxldu.exe wnwrdqxv.exe File opened for modification C:\Windows\SysWOW64\wkl.exe wtl.exe File created C:\Windows\SysWOW64\wwhiamyx.exe wkhvjqky.exe File created C:\Windows\SysWOW64\wqseievr.exe weqprggq.exe File opened for modification C:\Windows\SysWOW64\wwyxjit.exe wwhiamyx.exe File opened for modification C:\Windows\SysWOW64\wjtnr.exe wbnpfeao.exe File opened for modification C:\Windows\SysWOW64\wryhn.exe wfyrw.exe File created C:\Windows\SysWOW64\whlsjonq.exe wijt.exe File opened for modification C:\Windows\SysWOW64\wsjogghc.exe wolbru.exe File opened for modification C:\Windows\SysWOW64\wwfgyx.exe wxybvcg.exe File created C:\Windows\SysWOW64\wwjbsvyn.exe wossarv.exe File created C:\Windows\SysWOW64\wkf.exe wbpkckmuk.exe File opened for modification C:\Windows\SysWOW64\whhaetr.exe wgqluxx.exe File created C:\Windows\SysWOW64\wxybvcg.exe wkxlgfrh.exe File created C:\Windows\SysWOW64\wta.exe wbfuwi.exe File opened for modification C:\Windows\SysWOW64\wtatwjbws.exe wcaiqwhim.exe File opened for modification C:\Windows\SysWOW64\witamkh.exe werfewxjg.exe File created C:\Windows\SysWOW64\wnwrdqxv.exe wfhklm.exe File created C:\Windows\SysWOW64\wndpijqre.exe wrq.exe File created C:\Windows\SysWOW64\wbpkckmuk.exe wwxacxno.exe File opened for modification C:\Windows\SysWOW64\wlkcpey.exe wdtuxy.exe File created C:\Windows\SysWOW64\wujfxul.exe wiudn.exe File created C:\Windows\SysWOW64\wijt.exe wtrjigvne.exe File opened for modification C:\Windows\SysWOW64\wdmxb.exe whfpoek.exe File opened for modification C:\Windows\SysWOW64\wxxebbu.exe wdywcu.exe File created C:\Windows\SysWOW64\wrq.exe wkbqkygfi.exe File opened for modification C:\Windows\SysWOW64\wfbkeg.exe wgxkojnu.exe File created C:\Windows\SysWOW64\wmlexue.exe wuocjlm.exe File created C:\Windows\SysWOW64\wdywcu.exe wqyjlyg.exe File created C:\Windows\SysWOW64\wkhvjqky.exe wdrmqmh.exe File created C:\Windows\SysWOW64\wxvvnuacj.exe wfhvm.exe File opened for modification C:\Windows\SysWOW64\wcaiqwhim.exe wkf.exe File created C:\Windows\SysWOW64\whfpoek.exe weerfpbjk.exe File created C:\Windows\SysWOW64\wnbrm.exe wtjyup.exe File created C:\Windows\SysWOW64\wofhqk.exe wfbkeg.exe File created C:\Windows\SysWOW64\wjprkyxjy.exe wsex.exe File created C:\Windows\SysWOW64\wtsfne.exe wcwcy.exe File opened for modification C:\Windows\SysWOW64\wqyjlyg.exe wqseievr.exe File opened for modification C:\Windows\SysWOW64\wqr.exe wej.exe File opened for modification C:\Windows\SysWOW64\wlwq.exe wiuvjqsk.exe File opened for modification C:\Windows\SysWOW64\wlsous.exe wtsfne.exe File opened for modification C:\Windows\SysWOW64\wghgwes.exe wcrsuq.exe File created C:\Windows\SysWOW64\woawcxgn.exe wpihrdmw.exe File created C:\Windows\SysWOW64\wtl.exe wwfvi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2816 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 28 PID 2236 wrote to memory of 2816 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 28 PID 2236 wrote to memory of 2816 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 28 PID 2236 wrote to memory of 2816 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 28 PID 2236 wrote to memory of 2912 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 29 PID 2236 wrote to memory of 2912 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 29 PID 2236 wrote to memory of 2912 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 29 PID 2236 wrote to memory of 2912 2236 a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe 29 PID 2816 wrote to memory of 2936 2816 wbb.exe 31 PID 2816 wrote to memory of 2936 2816 wbb.exe 31 PID 2816 wrote to memory of 2936 2816 wbb.exe 31 PID 2816 wrote to memory of 2936 2816 wbb.exe 31 PID 2816 wrote to memory of 2772 2816 wbb.exe 32 PID 2816 wrote to memory of 2772 2816 wbb.exe 32 PID 2816 wrote to memory of 2772 2816 wbb.exe 32 PID 2816 wrote to memory of 2772 2816 wbb.exe 32 PID 2936 wrote to memory of 2496 2936 wjt.exe 34 PID 2936 wrote to memory of 2496 2936 wjt.exe 34 PID 2936 wrote to memory of 2496 2936 wjt.exe 34 PID 2936 wrote to memory of 2496 2936 wjt.exe 34 PID 2936 wrote to memory of 2844 2936 wjt.exe 35 PID 2936 wrote to memory of 2844 2936 wjt.exe 35 PID 2936 wrote to memory of 2844 2936 wjt.exe 35 PID 2936 wrote to memory of 2844 2936 wjt.exe 35 PID 2496 wrote to memory of 1724 2496 wmki.exe 37 PID 2496 wrote to memory of 1724 2496 wmki.exe 37 PID 2496 wrote to memory of 1724 2496 wmki.exe 37 PID 2496 wrote to memory of 1724 2496 wmki.exe 37 PID 2496 wrote to memory of 2144 2496 wmki.exe 38 PID 2496 wrote to memory of 2144 2496 wmki.exe 38 PID 2496 wrote to memory of 2144 2496 wmki.exe 38 PID 2496 wrote to memory of 2144 2496 wmki.exe 38 PID 1724 wrote to memory of 1780 1724 wiy.exe 40 PID 1724 wrote to memory of 1780 1724 wiy.exe 40 PID 1724 wrote to memory of 1780 1724 wiy.exe 40 PID 1724 wrote to memory of 1780 1724 wiy.exe 40 PID 1724 wrote to memory of 1328 1724 wiy.exe 41 PID 1724 wrote to memory of 1328 1724 wiy.exe 41 PID 1724 wrote to memory of 1328 1724 wiy.exe 41 PID 1724 wrote to memory of 1328 1724 wiy.exe 41 PID 1780 wrote to memory of 2700 1780 wbfuwi.exe 43 PID 1780 wrote to memory of 2700 1780 wbfuwi.exe 43 PID 1780 wrote to memory of 2700 1780 wbfuwi.exe 43 PID 1780 wrote to memory of 2700 1780 wbfuwi.exe 43 PID 1780 wrote to memory of 568 1780 wbfuwi.exe 44 PID 1780 wrote to memory of 568 1780 wbfuwi.exe 44 PID 1780 wrote to memory of 568 1780 wbfuwi.exe 44 PID 1780 wrote to memory of 568 1780 wbfuwi.exe 44 PID 2700 wrote to memory of 1856 2700 wta.exe 46 PID 2700 wrote to memory of 1856 2700 wta.exe 46 PID 2700 wrote to memory of 1856 2700 wta.exe 46 PID 2700 wrote to memory of 1856 2700 wta.exe 46 PID 2700 wrote to memory of 2192 2700 wta.exe 47 PID 2700 wrote to memory of 2192 2700 wta.exe 47 PID 2700 wrote to memory of 2192 2700 wta.exe 47 PID 2700 wrote to memory of 2192 2700 wta.exe 47 PID 1856 wrote to memory of 3056 1856 wfc.exe 49 PID 1856 wrote to memory of 3056 1856 wfc.exe 49 PID 1856 wrote to memory of 3056 1856 wfc.exe 49 PID 1856 wrote to memory of 3056 1856 wfc.exe 49 PID 1856 wrote to memory of 2172 1856 wfc.exe 50 PID 1856 wrote to memory of 2172 1856 wfc.exe 50 PID 1856 wrote to memory of 2172 1856 wfc.exe 50 PID 1856 wrote to memory of 2172 1856 wfc.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\a789d85112422769a4e5bfd578aeb490_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\wbb.exe"C:\Windows\system32\wbb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\wjt.exe"C:\Windows\system32\wjt.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\wmki.exe"C:\Windows\system32\wmki.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\wiy.exe"C:\Windows\system32\wiy.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\wbfuwi.exe"C:\Windows\system32\wbfuwi.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\wta.exe"C:\Windows\system32\wta.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\wfc.exe"C:\Windows\system32\wfc.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\wjaxqbj.exe"C:\Windows\system32\wjaxqbj.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056 -
C:\Windows\SysWOW64\wcgklmmg.exe"C:\Windows\system32\wcgklmmg.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240 -
C:\Windows\SysWOW64\wbnpfeao.exe"C:\Windows\system32\wbnpfeao.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2532 -
C:\Windows\SysWOW64\wjtnr.exe"C:\Windows\system32\wjtnr.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2668 -
C:\Windows\SysWOW64\wblkrtgi.exe"C:\Windows\system32\wblkrtgi.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1264 -
C:\Windows\SysWOW64\wkbqkygfi.exe"C:\Windows\system32\wkbqkygfi.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2208 -
C:\Windows\SysWOW64\wrq.exe"C:\Windows\system32\wrq.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:592 -
C:\Windows\SysWOW64\wndpijqre.exe"C:\Windows\system32\wndpijqre.exe"16⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\wfyrw.exe"C:\Windows\system32\wfyrw.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1920 -
C:\Windows\SysWOW64\wryhn.exe"C:\Windows\system32\wryhn.exe"18⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\SysWOW64\wao.exe"C:\Windows\system32\wao.exe"19⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\SysWOW64\wuxwit.exe"C:\Windows\system32\wuxwit.exe"20⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\wej.exe"C:\Windows\system32\wej.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\wqr.exe"C:\Windows\system32\wqr.exe"22⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\SysWOW64\whbixgpqm.exe"C:\Windows\system32\whbixgpqm.exe"23⤵
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\wqgfk.exe"C:\Windows\system32\wqgfk.exe"24⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\SysWOW64\wuwpmv.exe"C:\Windows\system32\wuwpmv.exe"25⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\wpihrdmw.exe"C:\Windows\system32\wpihrdmw.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1100 -
C:\Windows\SysWOW64\woawcxgn.exe"C:\Windows\system32\woawcxgn.exe"27⤵
- Executes dropped EXE
PID:860 -
C:\Windows\SysWOW64\wsex.exe"C:\Windows\system32\wsex.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1564 -
C:\Windows\SysWOW64\wjprkyxjy.exe"C:\Windows\system32\wjprkyxjy.exe"29⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\SysWOW64\wovuf.exe"C:\Windows\system32\wovuf.exe"30⤵
- Executes dropped EXE
PID:2900 -
C:\Windows\SysWOW64\wegosa.exe"C:\Windows\system32\wegosa.exe"31⤵
- Executes dropped EXE
PID:2376 -
C:\Windows\SysWOW64\wvgxbok.exe"C:\Windows\system32\wvgxbok.exe"32⤵
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\winpfh.exe"C:\Windows\system32\winpfh.exe"33⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\wwxacxno.exe"C:\Windows\system32\wwxacxno.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\wbpkckmuk.exe"C:\Windows\system32\wbpkckmuk.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\wkf.exe"C:\Windows\system32\wkf.exe"36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1160 -
C:\Windows\SysWOW64\wcaiqwhim.exe"C:\Windows\system32\wcaiqwhim.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3012 -
C:\Windows\SysWOW64\wtatwjbws.exe"C:\Windows\system32\wtatwjbws.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\wtrjigvne.exe"C:\Windows\system32\wtrjigvne.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3028 -
C:\Windows\SysWOW64\wijt.exe"C:\Windows\system32\wijt.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2240 -
C:\Windows\SysWOW64\whlsjonq.exe"C:\Windows\system32\whlsjonq.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2016 -
C:\Windows\SysWOW64\wolbru.exe"C:\Windows\system32\wolbru.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2544 -
C:\Windows\SysWOW64\wsjogghc.exe"C:\Windows\system32\wsjogghc.exe"43⤵
- Executes dropped EXE
PID:2668 -
C:\Windows\SysWOW64\wbkgfks.exe"C:\Windows\system32\wbkgfks.exe"44⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\wwroqnyye.exe"C:\Windows\system32\wwroqnyye.exe"45⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\wwfvi.exe"C:\Windows\system32\wwfvi.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1680 -
C:\Windows\SysWOW64\wtl.exe"C:\Windows\system32\wtl.exe"47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1548 -
C:\Windows\SysWOW64\wkl.exe"C:\Windows\system32\wkl.exe"48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2812 -
C:\Windows\SysWOW64\wgqluxx.exe"C:\Windows\system32\wgqluxx.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2572 -
C:\Windows\SysWOW64\whhaetr.exe"C:\Windows\system32\whhaetr.exe"50⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\wkxlgfrh.exe"C:\Windows\system32\wkxlgfrh.exe"51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\wxybvcg.exe"C:\Windows\system32\wxybvcg.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1156 -
C:\Windows\SysWOW64\wwfgyx.exe"C:\Windows\system32\wwfgyx.exe"53⤵
- Executes dropped EXE
PID:1028 -
C:\Windows\SysWOW64\wskionhu.exe"C:\Windows\system32\wskionhu.exe"54⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\SysWOW64\wriou.exe"C:\Windows\system32\wriou.exe"55⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\wradfcdx.exe"C:\Windows\system32\wradfcdx.exe"56⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\SysWOW64\whlysr.exe"C:\Windows\system32\whlysr.exe"57⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\wxkibg.exe"C:\Windows\system32\wxkibg.exe"58⤵
- Executes dropped EXE
PID:3008 -
C:\Windows\SysWOW64\wxjmqceh.exe"C:\Windows\system32\wxjmqceh.exe"59⤵
- Executes dropped EXE
PID:2696 -
C:\Windows\SysWOW64\wgfuwen.exe"C:\Windows\system32\wgfuwen.exe"60⤵
- Executes dropped EXE
PID:940 -
C:\Windows\SysWOW64\wmwtfn.exe"C:\Windows\system32\wmwtfn.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1716 -
C:\Windows\SysWOW64\wdfiabp.exe"C:\Windows\system32\wdfiabp.exe"62⤵
- Executes dropped EXE
PID:852 -
C:\Windows\SysWOW64\wusiany.exe"C:\Windows\system32\wusiany.exe"63⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\SysWOW64\wmenfp.exe"C:\Windows\system32\wmenfp.exe"64⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\SysWOW64\wagcw.exe"C:\Windows\system32\wagcw.exe"65⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\werfewxjg.exe"C:\Windows\system32\werfewxjg.exe"66⤵
- Drops file in System32 directory
PID:2748 -
C:\Windows\SysWOW64\witamkh.exe"C:\Windows\system32\witamkh.exe"67⤵PID:1920
-
C:\Windows\SysWOW64\wfhklm.exe"C:\Windows\system32\wfhklm.exe"68⤵
- Drops file in System32 directory
PID:1808 -
C:\Windows\SysWOW64\wnwrdqxv.exe"C:\Windows\system32\wnwrdqxv.exe"69⤵
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\wvxldu.exe"C:\Windows\system32\wvxldu.exe"70⤵PID:2572
-
C:\Windows\SysWOW64\wdc.exe"C:\Windows\system32\wdc.exe"71⤵
- Drops file in System32 directory
PID:1760 -
C:\Windows\SysWOW64\wlebne.exe"C:\Windows\system32\wlebne.exe"72⤵
- Drops file in System32 directory
PID:1892 -
C:\Windows\SysWOW64\wytfw.exe"C:\Windows\system32\wytfw.exe"73⤵PID:2664
-
C:\Windows\SysWOW64\wdnxr.exe"C:\Windows\system32\wdnxr.exe"74⤵PID:2828
-
C:\Windows\SysWOW64\wwxsn.exe"C:\Windows\system32\wwxsn.exe"75⤵PID:1608
-
C:\Windows\SysWOW64\weoagyf.exe"C:\Windows\system32\weoagyf.exe"76⤵PID:1412
-
C:\Windows\SysWOW64\wroowt.exe"C:\Windows\system32\wroowt.exe"77⤵PID:1900
-
C:\Windows\SysWOW64\weerfpbjk.exe"C:\Windows\system32\weerfpbjk.exe"78⤵
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\whfpoek.exe"C:\Windows\system32\whfpoek.exe"79⤵
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\wdmxb.exe"C:\Windows\system32\wdmxb.exe"80⤵PID:1248
-
C:\Windows\SysWOW64\wtmhh.exe"C:\Windows\system32\wtmhh.exe"81⤵
- Drops file in System32 directory
PID:568 -
C:\Windows\SysWOW64\wccpyak.exe"C:\Windows\system32\wccpyak.exe"82⤵PID:2640
-
C:\Windows\SysWOW64\wgrbcmjj.exe"C:\Windows\system32\wgrbcmjj.exe"83⤵PID:1076
-
C:\Windows\SysWOW64\wossarv.exe"C:\Windows\system32\wossarv.exe"84⤵
- Drops file in System32 directory
PID:1516 -
C:\Windows\SysWOW64\wwjbsvyn.exe"C:\Windows\system32\wwjbsvyn.exe"85⤵PID:320
-
C:\Windows\SysWOW64\wfyhk.exe"C:\Windows\system32\wfyhk.exe"86⤵PID:2100
-
C:\Windows\SysWOW64\wdtuxy.exe"C:\Windows\system32\wdtuxy.exe"87⤵
- Drops file in System32 directory
PID:2500 -
C:\Windows\SysWOW64\wlkcpey.exe"C:\Windows\system32\wlkcpey.exe"88⤵PID:2932
-
C:\Windows\SysWOW64\wxkrgao.exe"C:\Windows\system32\wxkrgao.exe"89⤵PID:764
-
C:\Windows\SysWOW64\wauatod.exe"C:\Windows\system32\wauatod.exe"90⤵PID:2368
-
C:\Windows\SysWOW64\wvuhsvck.exe"C:\Windows\system32\wvuhsvck.exe"91⤵PID:2660
-
C:\Windows\SysWOW64\wiuvjqsk.exe"C:\Windows\system32\wiuvjqsk.exe"92⤵
- Drops file in System32 directory
PID:548 -
C:\Windows\SysWOW64\wlwq.exe"C:\Windows\system32\wlwq.exe"93⤵PID:2248
-
C:\Windows\SysWOW64\wcwcy.exe"C:\Windows\system32\wcwcy.exe"94⤵
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\wtsfne.exe"C:\Windows\system32\wtsfne.exe"95⤵
- Drops file in System32 directory
PID:1596 -
C:\Windows\SysWOW64\wlsous.exe"C:\Windows\system32\wlsous.exe"96⤵PID:896
-
C:\Windows\SysWOW64\wstgt.exe"C:\Windows\system32\wstgt.exe"97⤵
- Drops file in System32 directory
PID:1996 -
C:\Windows\SysWOW64\wwjsuk.exe"C:\Windows\system32\wwjsuk.exe"98⤵PID:2116
-
C:\Windows\SysWOW64\wtjyup.exe"C:\Windows\system32\wtjyup.exe"99⤵
- Drops file in System32 directory
PID:2344 -
C:\Windows\SysWOW64\wnbrm.exe"C:\Windows\system32\wnbrm.exe"100⤵PID:2444
-
C:\Windows\SysWOW64\wchxmwpn.exe"C:\Windows\system32\wchxmwpn.exe"101⤵PID:2360
-
C:\Windows\SysWOW64\wgxkojnu.exe"C:\Windows\system32\wgxkojnu.exe"102⤵
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\wfbkeg.exe"C:\Windows\system32\wfbkeg.exe"103⤵
- Drops file in System32 directory
PID:2740 -
C:\Windows\SysWOW64\wofhqk.exe"C:\Windows\system32\wofhqk.exe"104⤵PID:1156
-
C:\Windows\SysWOW64\werdfyp.exe"C:\Windows\system32\werdfyp.exe"105⤵PID:2340
-
C:\Windows\SysWOW64\wrqpuu.exe"C:\Windows\system32\wrqpuu.exe"106⤵PID:3000
-
C:\Windows\SysWOW64\wcrsuq.exe"C:\Windows\system32\wcrsuq.exe"107⤵
- Drops file in System32 directory
PID:1628 -
C:\Windows\SysWOW64\wghgwes.exe"C:\Windows\system32\wghgwes.exe"108⤵PID:2488
-
C:\Windows\SysWOW64\wjjbe.exe"C:\Windows\system32\wjjbe.exe"109⤵
- Drops file in System32 directory
PID:1280 -
C:\Windows\SysWOW64\wpussyyd.exe"C:\Windows\system32\wpussyyd.exe"110⤵PID:1556
-
C:\Windows\SysWOW64\wuhvbjve.exe"C:\Windows\system32\wuhvbjve.exe"111⤵
- Drops file in System32 directory
PID:1592 -
C:\Windows\SysWOW64\wedykx.exe"C:\Windows\system32\wedykx.exe"112⤵
- Drops file in System32 directory
PID:268 -
C:\Windows\SysWOW64\wwaof.exe"C:\Windows\system32\wwaof.exe"113⤵PID:2192
-
C:\Windows\SysWOW64\wrfxqjo.exe"C:\Windows\system32\wrfxqjo.exe"114⤵PID:2460
-
C:\Windows\SysWOW64\wmxqkm.exe"C:\Windows\system32\wmxqkm.exe"115⤵PID:2104
-
C:\Windows\SysWOW64\wewcra.exe"C:\Windows\system32\wewcra.exe"116⤵PID:2828
-
C:\Windows\SysWOW64\wnnijfba.exe"C:\Windows\system32\wnnijfba.exe"117⤵PID:2096
-
C:\Windows\SysWOW64\wuocjlm.exe"C:\Windows\system32\wuocjlm.exe"118⤵
- Drops file in System32 directory
PID:1388 -
C:\Windows\SysWOW64\wmlexue.exe"C:\Windows\system32\wmlexue.exe"119⤵PID:1604
-
C:\Windows\SysWOW64\weqprggq.exe"C:\Windows\system32\weqprggq.exe"120⤵
- Drops file in System32 directory
PID:2692 -
C:\Windows\SysWOW64\wqseievr.exe"C:\Windows\system32\wqseievr.exe"121⤵
- Drops file in System32 directory
PID:1352 -
C:\Windows\SysWOW64\wqyjlyg.exe"C:\Windows\system32\wqyjlyg.exe"122⤵
- Drops file in System32 directory
PID:2036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-