Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe
-
Size
316KB
-
MD5
06876b683169a8e631eafe49ad0ab020
-
SHA1
68b618e0bed354d693e20c0556f01dc651191b20
-
SHA256
c11d9779a1a2a843f258178d6f8b57b739382db3486ab655e90a1a86f07ba4e3
-
SHA512
d44f17b138e95faa7f7546e37f2b1d102e73681e21f4628f5e6f055b4a86511702a029cccafb002349f4fccdec4b00535f0b31f9aea2d2c4de448d0a266cefc9
-
SSDEEP
3072:mYUb5QoJ4g+LsP9iGqT8ZjKIz1ZdW4SrOLVSVpe1GhpSBfmz:mY699qT8hKSZI4zLVSVpe1GvOfM
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2560 cmd.exe -
Executes dropped EXE 64 IoCs
Processes:
wkgn.exewlbvr.exewkvsviim.exewtaqhl.exewgmofjagd.exewrct.exewfqxxbk.exewceu.exewdvlo.exewgam.exewpc.exewxrl.exewnrwi.exewfsgp.exewaqonxi.exewtbft.exewtlsqbe.exewswgnyp.exewjkfpm.exewikie.exewhfgihwx.exewasgi.exewtmlu.exewqahldj.exewhhfyr.exewgkqi.exewaofba.exewqve.exewgaxoglkx.exewoxtn.exewedloeqap.exewpvardyq.exewjds.exewjpnnkr.exewxjxhb.exewhhsfhm.exewwbbyvw.exewvoxqwlac.exewlvv.exewgnaq.exewvstrlyel.exewqkxds.exewfehw.exewwwpr.exewifrmx.exewghew.exewoqjc.exewlfftetex.exewdxnmtfi.exewtf.exeweywejnov.exewarcpp.exewsurhye.exewjtfgj.exewdm.exewpfwuq.exewjxcgx.exewycuhp.exewpksv.exewjninm.exeweg.exewax.exewoq.exewmlbymwbs.exepid process 2924 wkgn.exe 2652 wlbvr.exe 820 wkvsviim.exe 684 wtaqhl.exe 2224 wgmofjagd.exe 1120 wrct.exe 1156 wfqxxbk.exe 1056 wceu.exe 1752 wdvlo.exe 2012 wgam.exe 2648 wpc.exe 3052 wxrl.exe 2232 wnrwi.exe 324 wfsgp.exe 2820 waqonxi.exe 2952 wtbft.exe 1636 wtlsqbe.exe 1164 wswgnyp.exe 2376 wjkfpm.exe 1748 wikie.exe 2556 whfgihwx.exe 1648 wasgi.exe 1800 wtmlu.exe 1828 wqahldj.exe 2980 whhfyr.exe 608 wgkqi.exe 2288 waofba.exe 2972 wqve.exe 2712 wgaxoglkx.exe 2868 woxtn.exe 1688 wedloeqap.exe 880 wpvardyq.exe 684 wjds.exe 1376 wjpnnkr.exe 1996 wxjxhb.exe 912 whhsfhm.exe 2864 wwbbyvw.exe 2660 wvoxqwlac.exe 292 wlvv.exe 2316 wgnaq.exe 784 wvstrlyel.exe 1696 wqkxds.exe 748 wfehw.exe 1560 wwwpr.exe 3032 wifrmx.exe 1824 wghew.exe 2964 woqjc.exe 2308 wlfftetex.exe 2364 wdxnmtfi.exe 2016 wtf.exe 1832 weywejnov.exe 2272 warcpp.exe 2816 wsurhye.exe 2116 wjtfgj.exe 1752 wdm.exe 2956 wpfwuq.exe 596 wjxcgx.exe 2896 wycuhp.exe 1116 wpksv.exe 1012 wjninm.exe 2232 weg.exe 1576 wax.exe 1056 woq.exe 3024 wmlbymwbs.exe -
Loads dropped DLL 64 IoCs
Processes:
06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exewkgn.exewlbvr.exewkvsviim.exewtaqhl.exewgmofjagd.exewrct.exewfqxxbk.exewceu.exewdvlo.exewgam.exeWerFault.exewpc.exewxrl.exewnrwi.exewfsgp.exepid process 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe 2924 wkgn.exe 2924 wkgn.exe 2924 wkgn.exe 2924 wkgn.exe 2652 wlbvr.exe 2652 wlbvr.exe 2652 wlbvr.exe 2652 wlbvr.exe 820 wkvsviim.exe 820 wkvsviim.exe 820 wkvsviim.exe 820 wkvsviim.exe 684 wtaqhl.exe 684 wtaqhl.exe 684 wtaqhl.exe 684 wtaqhl.exe 2224 wgmofjagd.exe 2224 wgmofjagd.exe 2224 wgmofjagd.exe 2224 wgmofjagd.exe 1120 wrct.exe 1120 wrct.exe 1120 wrct.exe 1120 wrct.exe 1156 wfqxxbk.exe 1156 wfqxxbk.exe 1156 wfqxxbk.exe 1156 wfqxxbk.exe 1056 wceu.exe 1056 wceu.exe 1056 wceu.exe 1056 wceu.exe 1752 wdvlo.exe 1752 wdvlo.exe 1752 wdvlo.exe 1752 wdvlo.exe 2012 wgam.exe 2012 wgam.exe 2012 wgam.exe 2012 wgam.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2888 WerFault.exe 2648 wpc.exe 2648 wpc.exe 2648 wpc.exe 2648 wpc.exe 3052 wxrl.exe 3052 wxrl.exe 3052 wxrl.exe 3052 wxrl.exe 2232 wnrwi.exe 2232 wnrwi.exe 2232 wnrwi.exe 2232 wnrwi.exe 324 wfsgp.exe 324 wfsgp.exe 324 wfsgp.exe 324 wfsgp.exe -
Drops file in System32 directory 64 IoCs
Processes:
wikie.exewnclgpcxr.exewaqonxi.exewasgi.exewqnhnqpge.exewceu.exewcwgnb.exewpkjym.exeweywejnov.exewcfpvp.exewkhxiyjw.exewrub.exewgupsx.exewobmjlrm.exewjpnnkr.exewte.exewwtoptku.exewgwclcqvf.exewedloeqap.exewhfgihwx.exewhhsfhm.exewbgxsy.exewwfvi.exewgmofjagd.exewowe.exewdxnmtfi.exewbdney.exewoeupnegf.exewqqotwf.exewcsdig.exewwvwdx.exewgnaq.exewiraxv.exewknlelk.exewskuk.exewjkfpm.exewtbft.exewolpsou.exewltucg.exeweegqss.exewrfxyb.exewiwodppf.exewioexh.exewaykhuar.exewvgltaj.exewyahyiep.exewpc.exewfsgp.exewhhfyr.exewpvardyq.exewhwxt.exewrkcs.exewnrdbmpi.exewgam.exewdqhcovc.exewmftkxa.exewwwpr.exewifrmx.exewqkxds.exewjxcgx.exedescription ioc process File created C:\Windows\SysWOW64\whfgihwx.exe wikie.exe File created C:\Windows\SysWOW64\wgupsx.exe wnclgpcxr.exe File opened for modification C:\Windows\SysWOW64\wtbft.exe waqonxi.exe File created C:\Windows\SysWOW64\wtmlu.exe wasgi.exe File opened for modification C:\Windows\SysWOW64\wlemxy.exe wqnhnqpge.exe File created C:\Windows\SysWOW64\wdvlo.exe wceu.exe File created C:\Windows\SysWOW64\wsefasifx.exe wcwgnb.exe File created C:\Windows\SysWOW64\wmfjsibl.exe wpkjym.exe File created C:\Windows\SysWOW64\warcpp.exe weywejnov.exe File created C:\Windows\SysWOW64\wjov.exe wcfpvp.exe File created C:\Windows\SysWOW64\wubkkxr.exe wkhxiyjw.exe File created C:\Windows\SysWOW64\wini.exe wrub.exe File opened for modification C:\Windows\SysWOW64\wtocuvah.exe wgupsx.exe File created C:\Windows\SysWOW64\wisqushgd.exe wobmjlrm.exe File created C:\Windows\SysWOW64\wxjxhb.exe wjpnnkr.exe File opened for modification C:\Windows\SysWOW64\wrspyc.exe wte.exe File opened for modification C:\Windows\SysWOW64\wmnwkjv.exe wwtoptku.exe File created C:\Windows\SysWOW64\wbogwk.exe wgwclcqvf.exe File opened for modification C:\Windows\SysWOW64\wpvardyq.exe wedloeqap.exe File opened for modification C:\Windows\SysWOW64\wasgi.exe whfgihwx.exe File opened for modification C:\Windows\SysWOW64\wwbbyvw.exe whhsfhm.exe File created C:\Windows\SysWOW64\wioexh.exe wbgxsy.exe File created C:\Windows\SysWOW64\wlemxy.exe wqnhnqpge.exe File created C:\Windows\SysWOW64\wowe.exe wwfvi.exe File opened for modification C:\Windows\SysWOW64\wrct.exe wgmofjagd.exe File opened for modification C:\Windows\SysWOW64\warqfv.exe wowe.exe File opened for modification C:\Windows\SysWOW64\wtf.exe wdxnmtfi.exe File opened for modification C:\Windows\SysWOW64\wrwuyp.exe wbdney.exe File created C:\Windows\SysWOW64\wbm.exe woeupnegf.exe File created C:\Windows\SysWOW64\wntaex.exe wqqotwf.exe File created C:\Windows\SysWOW64\wrkmcwtrj.exe wcsdig.exe File created C:\Windows\SysWOW64\woeupnegf.exe wwvwdx.exe File created C:\Windows\SysWOW64\wvstrlyel.exe wgnaq.exe File created C:\Windows\SysWOW64\whgvovhvq.exe wiraxv.exe File created C:\Windows\SysWOW64\wskuk.exe wknlelk.exe File opened for modification C:\Windows\SysWOW64\wjrsycv.exe wskuk.exe File created C:\Windows\SysWOW64\wikie.exe wjkfpm.exe File opened for modification C:\Windows\SysWOW64\wtlsqbe.exe wtbft.exe File created C:\Windows\SysWOW64\wiftfwk.exe wolpsou.exe File created C:\Windows\SysWOW64\wkvfl.exe wltucg.exe File created C:\Windows\SysWOW64\wqnhnqpge.exe weegqss.exe File opened for modification C:\Windows\SysWOW64\wcylc.exe wrfxyb.exe File opened for modification C:\Windows\SysWOW64\wcosqwean.exe wiwodppf.exe File opened for modification C:\Windows\SysWOW64\whroh.exe wioexh.exe File opened for modification C:\Windows\SysWOW64\wmrxkuh.exe waykhuar.exe File created C:\Windows\SysWOW64\wionp.exe wvgltaj.exe File created C:\Windows\SysWOW64\wltucg.exe wyahyiep.exe File opened for modification C:\Windows\SysWOW64\wxrl.exe wpc.exe File opened for modification C:\Windows\SysWOW64\waqonxi.exe wfsgp.exe File opened for modification C:\Windows\SysWOW64\wgkqi.exe whhfyr.exe File opened for modification C:\Windows\SysWOW64\wjds.exe wpvardyq.exe File opened for modification C:\Windows\SysWOW64\wwfvi.exe whwxt.exe File opened for modification C:\Windows\SysWOW64\wiott.exe wrkcs.exe File created C:\Windows\SysWOW64\wfkmvccn.exe wnrdbmpi.exe File opened for modification C:\Windows\SysWOW64\wpc.exe wgam.exe File created C:\Windows\SysWOW64\wsjqwehf.exe wdqhcovc.exe File created C:\Windows\SysWOW64\wdxcf.exe wmftkxa.exe File opened for modification C:\Windows\SysWOW64\wifrmx.exe wwwpr.exe File opened for modification C:\Windows\SysWOW64\wghew.exe wifrmx.exe File created C:\Windows\SysWOW64\wfehw.exe wqkxds.exe File opened for modification C:\Windows\SysWOW64\wycuhp.exe wjxcgx.exe File created C:\Windows\SysWOW64\wcosqwean.exe wiwodppf.exe File created C:\Windows\SysWOW64\wxrl.exe wpc.exe File created C:\Windows\SysWOW64\wtlsqbe.exe wtbft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2888 2012 WerFault.exe wgam.exe 2880 324 WerFault.exe wfsgp.exe 2128 1832 WerFault.exe weywejnov.exe 2088 1700 WerFault.exe wkhxiyjw.exe 348 2728 WerFault.exe wjrksjiw.exe 628 412 WerFault.exe wkvfl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exewkgn.exewlbvr.exewkvsviim.exewtaqhl.exewgmofjagd.exewrct.exewfqxxbk.exedescription pid process target process PID 2064 wrote to memory of 2924 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe wkgn.exe PID 2064 wrote to memory of 2924 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe wkgn.exe PID 2064 wrote to memory of 2924 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe wkgn.exe PID 2064 wrote to memory of 2924 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe wkgn.exe PID 2064 wrote to memory of 2560 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe cmd.exe PID 2064 wrote to memory of 2560 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe cmd.exe PID 2064 wrote to memory of 2560 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe cmd.exe PID 2064 wrote to memory of 2560 2064 06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe cmd.exe PID 2924 wrote to memory of 2652 2924 wkgn.exe wlbvr.exe PID 2924 wrote to memory of 2652 2924 wkgn.exe wlbvr.exe PID 2924 wrote to memory of 2652 2924 wkgn.exe wlbvr.exe PID 2924 wrote to memory of 2652 2924 wkgn.exe wlbvr.exe PID 2924 wrote to memory of 2624 2924 wkgn.exe cmd.exe PID 2924 wrote to memory of 2624 2924 wkgn.exe cmd.exe PID 2924 wrote to memory of 2624 2924 wkgn.exe cmd.exe PID 2924 wrote to memory of 2624 2924 wkgn.exe cmd.exe PID 2652 wrote to memory of 820 2652 wlbvr.exe wkvsviim.exe PID 2652 wrote to memory of 820 2652 wlbvr.exe wkvsviim.exe PID 2652 wrote to memory of 820 2652 wlbvr.exe wkvsviim.exe PID 2652 wrote to memory of 820 2652 wlbvr.exe wkvsviim.exe PID 2652 wrote to memory of 2608 2652 wlbvr.exe cmd.exe PID 2652 wrote to memory of 2608 2652 wlbvr.exe cmd.exe PID 2652 wrote to memory of 2608 2652 wlbvr.exe cmd.exe PID 2652 wrote to memory of 2608 2652 wlbvr.exe cmd.exe PID 820 wrote to memory of 684 820 wkvsviim.exe wtaqhl.exe PID 820 wrote to memory of 684 820 wkvsviim.exe wtaqhl.exe PID 820 wrote to memory of 684 820 wkvsviim.exe wtaqhl.exe PID 820 wrote to memory of 684 820 wkvsviim.exe wtaqhl.exe PID 820 wrote to memory of 1260 820 wkvsviim.exe cmd.exe PID 820 wrote to memory of 1260 820 wkvsviim.exe cmd.exe PID 820 wrote to memory of 1260 820 wkvsviim.exe cmd.exe PID 820 wrote to memory of 1260 820 wkvsviim.exe cmd.exe PID 684 wrote to memory of 2224 684 wtaqhl.exe wgmofjagd.exe PID 684 wrote to memory of 2224 684 wtaqhl.exe wgmofjagd.exe PID 684 wrote to memory of 2224 684 wtaqhl.exe wgmofjagd.exe PID 684 wrote to memory of 2224 684 wtaqhl.exe wgmofjagd.exe PID 684 wrote to memory of 2856 684 wtaqhl.exe cmd.exe PID 684 wrote to memory of 2856 684 wtaqhl.exe cmd.exe PID 684 wrote to memory of 2856 684 wtaqhl.exe cmd.exe PID 684 wrote to memory of 2856 684 wtaqhl.exe cmd.exe PID 2224 wrote to memory of 1120 2224 wgmofjagd.exe wrct.exe PID 2224 wrote to memory of 1120 2224 wgmofjagd.exe wrct.exe PID 2224 wrote to memory of 1120 2224 wgmofjagd.exe wrct.exe PID 2224 wrote to memory of 1120 2224 wgmofjagd.exe wrct.exe PID 2224 wrote to memory of 2276 2224 wgmofjagd.exe cmd.exe PID 2224 wrote to memory of 2276 2224 wgmofjagd.exe cmd.exe PID 2224 wrote to memory of 2276 2224 wgmofjagd.exe cmd.exe PID 2224 wrote to memory of 2276 2224 wgmofjagd.exe cmd.exe PID 1120 wrote to memory of 1156 1120 wrct.exe wfqxxbk.exe PID 1120 wrote to memory of 1156 1120 wrct.exe wfqxxbk.exe PID 1120 wrote to memory of 1156 1120 wrct.exe wfqxxbk.exe PID 1120 wrote to memory of 1156 1120 wrct.exe wfqxxbk.exe PID 1120 wrote to memory of 1576 1120 wrct.exe cmd.exe PID 1120 wrote to memory of 1576 1120 wrct.exe cmd.exe PID 1120 wrote to memory of 1576 1120 wrct.exe cmd.exe PID 1120 wrote to memory of 1576 1120 wrct.exe cmd.exe PID 1156 wrote to memory of 1056 1156 wfqxxbk.exe wceu.exe PID 1156 wrote to memory of 1056 1156 wfqxxbk.exe wceu.exe PID 1156 wrote to memory of 1056 1156 wfqxxbk.exe wceu.exe PID 1156 wrote to memory of 1056 1156 wfqxxbk.exe wceu.exe PID 1156 wrote to memory of 1932 1156 wfqxxbk.exe cmd.exe PID 1156 wrote to memory of 1932 1156 wfqxxbk.exe cmd.exe PID 1156 wrote to memory of 1932 1156 wfqxxbk.exe cmd.exe PID 1156 wrote to memory of 1932 1156 wfqxxbk.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe"C:\Users\Admin\AppData\Local\Temp\06876b683169a8e631eafe49ad0ab020_NeikiAnalytics.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\wkgn.exe"C:\Windows\system32\wkgn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\wlbvr.exe"C:\Windows\system32\wlbvr.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\wkvsviim.exe"C:\Windows\system32\wkvsviim.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\wtaqhl.exe"C:\Windows\system32\wtaqhl.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\wgmofjagd.exe"C:\Windows\system32\wgmofjagd.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\wrct.exe"C:\Windows\system32\wrct.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\wfqxxbk.exe"C:\Windows\system32\wfqxxbk.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\wceu.exe"C:\Windows\system32\wceu.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1056 -
C:\Windows\SysWOW64\wdvlo.exe"C:\Windows\system32\wdvlo.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1752 -
C:\Windows\SysWOW64\wgam.exe"C:\Windows\system32\wgam.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\wpc.exe"C:\Windows\system32\wpc.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2648 -
C:\Windows\SysWOW64\wxrl.exe"C:\Windows\system32\wxrl.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3052 -
C:\Windows\SysWOW64\wnrwi.exe"C:\Windows\system32\wnrwi.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2232 -
C:\Windows\SysWOW64\wfsgp.exe"C:\Windows\system32\wfsgp.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:324 -
C:\Windows\SysWOW64\waqonxi.exe"C:\Windows\system32\waqonxi.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2820 -
C:\Windows\SysWOW64\wtbft.exe"C:\Windows\system32\wtbft.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\wtlsqbe.exe"C:\Windows\system32\wtlsqbe.exe"18⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\wswgnyp.exe"C:\Windows\system32\wswgnyp.exe"19⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\SysWOW64\wjkfpm.exe"C:\Windows\system32\wjkfpm.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2376 -
C:\Windows\SysWOW64\wikie.exe"C:\Windows\system32\wikie.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\whfgihwx.exe"C:\Windows\system32\whfgihwx.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2556 -
C:\Windows\SysWOW64\wasgi.exe"C:\Windows\system32\wasgi.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1648 -
C:\Windows\SysWOW64\wtmlu.exe"C:\Windows\system32\wtmlu.exe"24⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\wqahldj.exe"C:\Windows\system32\wqahldj.exe"25⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\SysWOW64\whhfyr.exe"C:\Windows\system32\whhfyr.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2980 -
C:\Windows\SysWOW64\wgkqi.exe"C:\Windows\system32\wgkqi.exe"27⤵
- Executes dropped EXE
PID:608 -
C:\Windows\SysWOW64\waofba.exe"C:\Windows\system32\waofba.exe"28⤵
- Executes dropped EXE
PID:2288 -
C:\Windows\SysWOW64\wqve.exe"C:\Windows\system32\wqve.exe"29⤵
- Executes dropped EXE
PID:2972 -
C:\Windows\SysWOW64\wgaxoglkx.exe"C:\Windows\system32\wgaxoglkx.exe"30⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\SysWOW64\woxtn.exe"C:\Windows\system32\woxtn.exe"31⤵
- Executes dropped EXE
PID:2868 -
C:\Windows\SysWOW64\wedloeqap.exe"C:\Windows\system32\wedloeqap.exe"32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\wpvardyq.exe"C:\Windows\system32\wpvardyq.exe"33⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:880 -
C:\Windows\SysWOW64\wjds.exe"C:\Windows\system32\wjds.exe"34⤵
- Executes dropped EXE
PID:684 -
C:\Windows\SysWOW64\wjpnnkr.exe"C:\Windows\system32\wjpnnkr.exe"35⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1376 -
C:\Windows\SysWOW64\wxjxhb.exe"C:\Windows\system32\wxjxhb.exe"36⤵
- Executes dropped EXE
PID:1996 -
C:\Windows\SysWOW64\whhsfhm.exe"C:\Windows\system32\whhsfhm.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:912 -
C:\Windows\SysWOW64\wwbbyvw.exe"C:\Windows\system32\wwbbyvw.exe"38⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\SysWOW64\wvoxqwlac.exe"C:\Windows\system32\wvoxqwlac.exe"39⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\wlvv.exe"C:\Windows\system32\wlvv.exe"40⤵
- Executes dropped EXE
PID:292 -
C:\Windows\SysWOW64\wgnaq.exe"C:\Windows\system32\wgnaq.exe"41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2316 -
C:\Windows\SysWOW64\wvstrlyel.exe"C:\Windows\system32\wvstrlyel.exe"42⤵
- Executes dropped EXE
PID:784 -
C:\Windows\SysWOW64\wqkxds.exe"C:\Windows\system32\wqkxds.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1696 -
C:\Windows\SysWOW64\wfehw.exe"C:\Windows\system32\wfehw.exe"44⤵
- Executes dropped EXE
PID:748 -
C:\Windows\SysWOW64\wwwpr.exe"C:\Windows\system32\wwwpr.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1560 -
C:\Windows\SysWOW64\wifrmx.exe"C:\Windows\system32\wifrmx.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3032 -
C:\Windows\SysWOW64\wghew.exe"C:\Windows\system32\wghew.exe"47⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\SysWOW64\woqjc.exe"C:\Windows\system32\woqjc.exe"48⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\SysWOW64\wlfftetex.exe"C:\Windows\system32\wlfftetex.exe"49⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\SysWOW64\wdxnmtfi.exe"C:\Windows\system32\wdxnmtfi.exe"50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2364 -
C:\Windows\SysWOW64\wtf.exe"C:\Windows\system32\wtf.exe"51⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\SysWOW64\weywejnov.exe"C:\Windows\system32\weywejnov.exe"52⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1832 -
C:\Windows\SysWOW64\warcpp.exe"C:\Windows\system32\warcpp.exe"53⤵
- Executes dropped EXE
PID:2272 -
C:\Windows\SysWOW64\wsurhye.exe"C:\Windows\system32\wsurhye.exe"54⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\SysWOW64\wjtfgj.exe"C:\Windows\system32\wjtfgj.exe"55⤵
- Executes dropped EXE
PID:2116 -
C:\Windows\SysWOW64\wdm.exe"C:\Windows\system32\wdm.exe"56⤵
- Executes dropped EXE
PID:1752 -
C:\Windows\SysWOW64\wpfwuq.exe"C:\Windows\system32\wpfwuq.exe"57⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\SysWOW64\wjxcgx.exe"C:\Windows\system32\wjxcgx.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:596 -
C:\Windows\SysWOW64\wycuhp.exe"C:\Windows\system32\wycuhp.exe"59⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\wpksv.exe"C:\Windows\system32\wpksv.exe"60⤵
- Executes dropped EXE
PID:1116 -
C:\Windows\SysWOW64\wjninm.exe"C:\Windows\system32\wjninm.exe"61⤵
- Executes dropped EXE
PID:1012 -
C:\Windows\SysWOW64\weg.exe"C:\Windows\system32\weg.exe"62⤵
- Executes dropped EXE
PID:2232 -
C:\Windows\SysWOW64\wax.exe"C:\Windows\system32\wax.exe"63⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\SysWOW64\woq.exe"C:\Windows\system32\woq.exe"64⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\wmlbymwbs.exe"C:\Windows\system32\wmlbymwbs.exe"65⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\SysWOW64\wlnnimax.exe"C:\Windows\system32\wlnnimax.exe"66⤵PID:2624
-
C:\Windows\SysWOW64\wswsmtuk.exe"C:\Windows\system32\wswsmtuk.exe"67⤵PID:2288
-
C:\Windows\SysWOW64\wbgxsy.exe"C:\Windows\system32\wbgxsy.exe"68⤵
- Drops file in System32 directory
PID:864 -
C:\Windows\SysWOW64\wioexh.exe"C:\Windows\system32\wioexh.exe"69⤵
- Drops file in System32 directory
PID:1224 -
C:\Windows\SysWOW64\whroh.exe"C:\Windows\system32\whroh.exe"70⤵PID:356
-
C:\Windows\SysWOW64\wobun.exe"C:\Windows\system32\wobun.exe"71⤵PID:1376
-
C:\Windows\SysWOW64\wiraxv.exe"C:\Windows\system32\wiraxv.exe"72⤵
- Drops file in System32 directory
PID:2120 -
C:\Windows\SysWOW64\whgvovhvq.exe"C:\Windows\system32\whgvovhvq.exe"73⤵PID:2776
-
C:\Windows\SysWOW64\wxot.exe"C:\Windows\system32\wxot.exe"74⤵PID:2360
-
C:\Windows\SysWOW64\wnsmdcfh.exe"C:\Windows\system32\wnsmdcfh.exe"75⤵PID:2260
-
C:\Windows\SysWOW64\wha.exe"C:\Windows\system32\wha.exe"76⤵PID:800
-
C:\Windows\SysWOW64\wys.exe"C:\Windows\system32\wys.exe"77⤵PID:2300
-
C:\Windows\SysWOW64\wvgltaj.exe"C:\Windows\system32\wvgltaj.exe"78⤵
- Drops file in System32 directory
PID:676 -
C:\Windows\SysWOW64\wionp.exe"C:\Windows\system32\wionp.exe"79⤵PID:1044
-
C:\Windows\SysWOW64\wcsdig.exe"C:\Windows\system32\wcsdig.exe"80⤵
- Drops file in System32 directory
PID:2376 -
C:\Windows\SysWOW64\wrkmcwtrj.exe"C:\Windows\system32\wrkmcwtrj.exe"81⤵PID:2476
-
C:\Windows\SysWOW64\wneqne.exe"C:\Windows\system32\wneqne.exe"82⤵PID:1816
-
C:\Windows\SysWOW64\wpme.exe"C:\Windows\system32\wpme.exe"83⤵PID:788
-
C:\Windows\SysWOW64\wcfpvp.exe"C:\Windows\system32\wcfpvp.exe"84⤵
- Drops file in System32 directory
PID:2608 -
C:\Windows\SysWOW64\wjov.exe"C:\Windows\system32\wjov.exe"85⤵PID:2152
-
C:\Windows\SysWOW64\whqhjveaq.exe"C:\Windows\system32\whqhjveaq.exe"86⤵PID:3004
-
C:\Windows\SysWOW64\wpa.exe"C:\Windows\system32\wpa.exe"87⤵PID:280
-
C:\Windows\SysWOW64\weegqss.exe"C:\Windows\system32\weegqss.exe"88⤵
- Drops file in System32 directory
PID:1040 -
C:\Windows\SysWOW64\wqnhnqpge.exe"C:\Windows\system32\wqnhnqpge.exe"89⤵
- Drops file in System32 directory
PID:2960 -
C:\Windows\SysWOW64\wlemxy.exe"C:\Windows\system32\wlemxy.exe"90⤵PID:1056
-
C:\Windows\SysWOW64\wkhxiyjw.exe"C:\Windows\system32\wkhxiyjw.exe"91⤵
- Drops file in System32 directory
PID:1700 -
C:\Windows\SysWOW64\wubkkxr.exe"C:\Windows\system32\wubkkxr.exe"92⤵PID:1980
-
C:\Windows\SysWOW64\whjmiuoo.exe"C:\Windows\system32\whjmiuoo.exe"93⤵PID:560
-
C:\Windows\SysWOW64\wcbrs.exe"C:\Windows\system32\wcbrs.exe"94⤵PID:1552
-
C:\Windows\SysWOW64\wrub.exe"C:\Windows\system32\wrub.exe"95⤵
- Drops file in System32 directory
PID:1804 -
C:\Windows\SysWOW64\wini.exe"C:\Windows\system32\wini.exe"96⤵PID:1164
-
C:\Windows\SysWOW64\wxrcjbxj.exe"C:\Windows\system32\wxrcjbxj.exe"97⤵PID:1628
-
C:\Windows\SysWOW64\wskhuhndm.exe"C:\Windows\system32\wskhuhndm.exe"98⤵PID:2116
-
C:\Windows\SysWOW64\wnclgpcxr.exe"C:\Windows\system32\wnclgpcxr.exe"99⤵
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\wgupsx.exe"C:\Windows\system32\wgupsx.exe"100⤵
- Drops file in System32 directory
PID:1056 -
C:\Windows\SysWOW64\wtocuvah.exe"C:\Windows\system32\wtocuvah.exe"101⤵PID:696
-
C:\Windows\SysWOW64\wjtuw.exe"C:\Windows\system32\wjtuw.exe"102⤵PID:952
-
C:\Windows\SysWOW64\wfgfvokx.exe"C:\Windows\system32\wfgfvokx.exe"103⤵PID:2328
-
C:\Windows\SysWOW64\waykhuar.exe"C:\Windows\system32\waykhuar.exe"104⤵
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\wmrxkuh.exe"C:\Windows\system32\wmrxkuh.exe"105⤵PID:2484
-
C:\Windows\SysWOW64\wbkgfks.exe"C:\Windows\system32\wbkgfks.exe"106⤵PID:2772
-
C:\Windows\SysWOW64\wvekqti.exe"C:\Windows\system32\wvekqti.exe"107⤵PID:2320
-
C:\Windows\SysWOW64\whwxt.exe"C:\Windows\system32\whwxt.exe"108⤵
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\wwfvi.exe"C:\Windows\system32\wwfvi.exe"109⤵
- Drops file in System32 directory
PID:2828 -
C:\Windows\SysWOW64\wowe.exe"C:\Windows\system32\wowe.exe"110⤵
- Drops file in System32 directory
PID:2176 -
C:\Windows\SysWOW64\warqfv.exe"C:\Windows\system32\warqfv.exe"111⤵PID:628
-
C:\Windows\SysWOW64\wtiu.exe"C:\Windows\system32\wtiu.exe"112⤵PID:1168
-
C:\Windows\SysWOW64\wkooqtv.exe"C:\Windows\system32\wkooqtv.exe"113⤵PID:2424
-
C:\Windows\SysWOW64\wyhwmki.exe"C:\Windows\system32\wyhwmki.exe"114⤵PID:1636
-
C:\Windows\SysWOW64\wpnuaa.exe"C:\Windows\system32\wpnuaa.exe"115⤵PID:2900
-
C:\Windows\SysWOW64\wjrksjiw.exe"C:\Windows\system32\wjrksjiw.exe"116⤵PID:2728
-
C:\Windows\SysWOW64\wekpdqxq.exe"C:\Windows\system32\wekpdqxq.exe"117⤵PID:1632
-
C:\Windows\SysWOW64\wqsrbn.exe"C:\Windows\system32\wqsrbn.exe"118⤵PID:2304
-
C:\Windows\SysWOW64\whvlbf.exe"C:\Windows\system32\whvlbf.exe"119⤵PID:1744
-
C:\Windows\SysWOW64\wbopmn.exe"C:\Windows\system32\wbopmn.exe"120⤵PID:1552
-
C:\Windows\SysWOW64\wvgtxtw.exe"C:\Windows\system32\wvgtxtw.exe"121⤵PID:2512
-
C:\Windows\SysWOW64\wqqotwf.exe"C:\Windows\system32\wqqotwf.exe"122⤵
- Drops file in System32 directory
PID:1288
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-