Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
60s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 19:57
Behavioral task
behavioral1
Sample
NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe
Resource
win7-20231020-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe
Resource
win10v2004-20231020-en
11 signatures
150 seconds
General
-
Target
NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe
-
Size
912KB
-
MD5
fdbd31b345a394085efcb1f59e5cc428
-
SHA1
45c9491472f45fa3785e03f8cf52ea5e4128828c
-
SHA256
fbcdb6224fdaa7dd752c215022fe1dd4b30481656f839d902cf2cb500341c372
-
SHA512
da1a9f695e5d3087587a0f92236849c99cddd95fa3553bb1c6e0d07dff206c497ffe472e6aeca3d6f3c4988f1b932441d4b06f014a755bb5cfde8a98eeb3f8f8
-
SSDEEP
24576:ouLwoR5RNPjKoOAeh0PpS6NxNnwYeOHXAhWTJ:RPjOa1NxyYtH1J
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 62 IoCs
resource yara_rule behavioral2/memory/2312-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022c6d-14.dat family_gh0strat behavioral2/files/0x0006000000022c72-19.dat family_gh0strat behavioral2/files/0x0006000000022c72-20.dat family_gh0strat behavioral2/memory/2312-23-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/5008-45-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3808-61-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x000a000000022c76-67.dat family_gh0strat behavioral2/memory/5008-70-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x000a000000022c76-66.dat family_gh0strat behavioral2/files/0x0008000000022c66-43.dat family_gh0strat behavioral2/files/0x0008000000022c66-42.dat family_gh0strat behavioral2/files/0x0008000000022c66-40.dat family_gh0strat behavioral2/files/0x0006000000022c7b-90.dat family_gh0strat behavioral2/files/0x0006000000022c7b-89.dat family_gh0strat behavioral2/memory/2052-98-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022c7f-111.dat family_gh0strat behavioral2/files/0x0006000000022c7f-112.dat family_gh0strat behavioral2/memory/216-115-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022c83-133.dat family_gh0strat behavioral2/memory/1624-136-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/2224-138-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022c83-134.dat family_gh0strat behavioral2/files/0x0006000000022c87-158.dat family_gh0strat behavioral2/files/0x0006000000022c87-157.dat family_gh0strat behavioral2/memory/1624-166-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022c8b-181.dat family_gh0strat behavioral2/files/0x0006000000022c8b-180.dat family_gh0strat behavioral2/memory/2028-184-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022c8f-203.dat family_gh0strat behavioral2/memory/4812-205-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022c8f-206.dat family_gh0strat behavioral2/files/0x0006000000022c93-226.dat family_gh0strat behavioral2/memory/2380-229-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022c93-228.dat family_gh0strat behavioral2/files/0x0006000000022c97-248.dat family_gh0strat behavioral2/files/0x0006000000022c97-250.dat family_gh0strat behavioral2/memory/1524-252-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022c9b-270.dat family_gh0strat behavioral2/files/0x0006000000022c9b-272.dat family_gh0strat behavioral2/memory/1556-273-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022c9f-292.dat family_gh0strat behavioral2/files/0x0006000000022c9f-294.dat family_gh0strat behavioral2/memory/2664-295-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022ca3-316.dat family_gh0strat behavioral2/files/0x0006000000022ca3-315.dat family_gh0strat behavioral2/memory/2512-319-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022ca7-339.dat family_gh0strat behavioral2/memory/3484-341-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022ca7-338.dat family_gh0strat behavioral2/files/0x0006000000022cab-360.dat family_gh0strat behavioral2/files/0x0006000000022cab-361.dat family_gh0strat behavioral2/memory/2108-363-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4876-366-0x0000000002070000-0x00000000020E3000-memory.dmp family_gh0strat behavioral2/memory/4876-382-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/872-385-0x0000000001F70000-0x0000000001FE3000-memory.dmp family_gh0strat behavioral2/memory/872-401-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3688-423-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/2024-438-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1684-458-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1884-477-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/2772-496-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat -
Modifies Installed Components in the registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8A79F6B0-4308-4100-832E-C2D91A46CE7B}\stubpath = "C:\\Windows\\system32\\inomzqrdt.exe" insulctjf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B6D8A3B8-CBA4-47c8-B204-651C0E1E749E} insgwlney.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{850F12B6-B0EE-4301-839D-A290C81FA64B} inaphxbit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BE7AA7D3-3F9A-495d-A8A0-FCD6DCF2A6C4} inknedlyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0F777371-BC82-4eba-B058-A6ADFE3DE392} inocymrvp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16D52129-D4E3-405b-AED4-9C68092F74AD} inxtemyti.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5B228288-619B-4bed-A97A-9E354079DE54}\stubpath = "C:\\Windows\\system32\\inaexuhtj.exe" inhscspdt.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B91AAF50-EF66-40b4-8664-5D4A9CF33CB0} inbfffozj.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CAC18D12-A0A7-4574-94C7-D2ACAA69D4F7} ingiuiufd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ADB5DE77-37A7-46b0-A022-04B481BCB64E} inatybwnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{57591609-1F22-4cbf-AD67-E00BE15DE693} inbrulkss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B6D8A3B8-CBA4-47c8-B204-651C0E1E749E}\stubpath = "C:\\Windows\\system32\\inkivmnpx.exe" insgwlney.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6B02E1DE-B663-47e4-B67D-19A0C2BD4906} injyqkarh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A7A34CAC-C829-4bac-AD0D-685A4E0D400D}\stubpath = "C:\\Windows\\system32\\indhxkwmb.exe" inqtvunam.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6F7B6CC7-FE08-45a6-AEB4-C36D131C8019} inlcfvhzy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{675EFF1D-80BF-40ae-8784-D465D9940949}\stubpath = "C:\\Windows\\system32\\inrxixhwa.exe" infumgnyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{759879B2-8DD4-4db5-BC85-B010A5F93704} inxjymong.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DEF7CE23-68F5-4222-90DD-924FCA67B88C} infvypoww.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{575F4360-E09E-4ae7-B122-ADF697D24CAF} inmnccutj.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BA53589B-3FC0-4903-A87A-36DD4DAA9A7F} invrckwrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0AEB8258-90B0-4acb-A041-453CE2F860D1} inlofemzm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{48FCC506-FF37-4151-9202-33843F9DF4AD}\stubpath = "C:\\Windows\\system32\\insnyjjgx.exe" inocokdvj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{20740041-2052-4cad-9FCA-BC82C1DE77D7}\stubpath = "C:\\Windows\\system32\\inesqmezb.exe" inewrcnnk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{23750388-F6CA-419f-9094-EC48D10250EE} inrshhzyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{75826948-9872-4f14-91A4-0AB4C8E7E9D9} insaljfpw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C1AA02E7-DB3A-4140-9822-BEF6B371F0AD}\stubpath = "C:\\Windows\\system32\\inuhqyjhd.exe" indtosnaj.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8F75F9B4-1516-4a17-946B-EC18B1CD027D} inrngsnzc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{234ED2DB-938C-4a84-BEB3-5DF6DB0601D0}\stubpath = "C:\\Windows\\system32\\inxiaqxbm.exe" inochlfll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D734E5C3-EE18-4959-A613-28ADB86E4A71}\stubpath = "C:\\Windows\\system32\\intsuvkkg.exe" inetlfmxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{392FB6E0-8509-468d-BCE5-29EB4569CADE}\stubpath = "C:\\Windows\\system32\\ingvnhoze.exe" intsuvkkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AFD286EC-920B-44be-91B0-E2CCBA022775} inbfyviuk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{29478E08-C520-4c2a-9F73-82A722722ED0} inoxdfqoe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4092C1CC-028F-4598-AAE6-3D1D0F62DDA2} inbmkzbqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3A5D2C04-3C39-428a-875B-BFA5D93C15BA}\stubpath = "C:\\Windows\\system32\\inxnqhgoo.exe" ingoxeawx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ADB5DE77-37A7-46b0-A022-04B481BCB64E}\stubpath = "C:\\Windows\\system32\\inugvjlkd.exe" inatybwnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3DE1FEDF-96C6-4de1-8836-13ED842EA88A}\stubpath = "C:\\Windows\\system32\\insrzztuj.exe" inwixlnmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{612BB2BF-5761-4633-80FC-5AB60CB5815A}\stubpath = "C:\\Windows\\system32\\inxjymong.exe" inlsmacbt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{756DD724-E3B6-4e5a-8276-EFDC3DF11178}\stubpath = "C:\\Windows\\system32\\inmprqjiy.exe" intfuikjc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7209B07E-55A6-4497-B08A-D29447304EE9}\stubpath = "C:\\Windows\\system32\\inwgusogd.exe" inmkoozmm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{20A4D96E-0284-49b2-9797-8A49479CB1A9}\stubpath = "C:\\Windows\\system32\\indwztgsi.exe" insrzztuj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF9F0918-9682-48eb-A64F-4148537A58C6}\stubpath = "C:\\Windows\\system32\\indcsegkx.exe" inomzqrdt.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FA155628-5127-415b-8835-BCA9F6333E7E} inqnbrgit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4AFB3D7B-585E-4f51-A843-88257E0DEE57}\stubpath = "C:\\Windows\\system32\\inxsdoolp.exe" inbuxzyre.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3F517281-403F-496d-A6ED-A30A8A827C89}\stubpath = "C:\\Windows\\system32\\incvyzsfr.exe" inkuaczqt.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7DF51F40-A332-420e-B2EA-2214B49F79B5} inmeufqjy.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6B693179-CA93-42ca-BEE7-4A5542FE9163} inpbwqegf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4507CF93-04B7-4e6d-B23F-4C2CB408530B} injyiwuqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{50C9A990-B1BE-4993-A7DB-E6BD29A46FC8}\stubpath = "C:\\Windows\\system32\\inxrycagn.exe" inmxiifwj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A47CB9ED-DF41-4007-809B-DD24D778CD32}\stubpath = "C:\\Windows\\system32\\inxitdtqe.exe" inuhqyjhd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8E92E465-0A10-4471-8B5C-EB34C546403B} inirmhzng.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EEAE9D9A-F1A2-43b6-9BA7-5B7E110B5101} indtkzjxv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7209B07E-55A6-4497-B08A-D29447304EE9} inmkoozmm.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C7C1A962-E177-4aa2-B144-449072BDE3E4} inykznpoh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7402A30B-2905-4237-9C8C-621D21897D35} ingvnhoze.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{29478E08-C520-4c2a-9F73-82A722722ED0}\stubpath = "C:\\Windows\\system32\\indrzpldy.exe" inoxdfqoe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D2298B75-2521-428d-80B0-5731CE81F435} injfqeotx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BFE1EA68-657E-4f32-A2A1-20A69051450B}\stubpath = "C:\\Windows\\system32\\infumgnyd.exe" inyegrpfl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FA0F51B7-E8C4-4232-9AC2-2E6DB7611EE7} injyixbhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3764FBD4-6A5E-430a-B1DD-42AAF45D8E53} innqsrkjz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{48BB1E24-C4B4-4e7b-9AED-5504C981BDAC}\stubpath = "C:\\Windows\\system32\\inpsutmlb.exe" indskelwb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0573184D-B25F-4a0e-8FD7-FA86034866FE}\stubpath = "C:\\Windows\\system32\\infvqbbup.exe" indcsegkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3111FF4C-DFC4-446e-9B51-87C7ACE4A46B} inowmiavg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0672E8A3-4CAF-422f-BC9F-B72D0A509946}\stubpath = "C:\\Windows\\system32\\inruwvobn.exe" inyorihpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2419F223-4188-4145-A97D-CE8C8CA9EEB9}\stubpath = "C:\\Windows\\system32\\inqrggyxc.exe" injkrqgyq.exe -
ACProtect 1.3x - 1.4x DLL software 33 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0006000000022c69-4.dat acprotect behavioral2/files/0x0006000000022c69-2.dat acprotect behavioral2/files/0x0006000000022c69-12.dat acprotect behavioral2/files/0x0007000000022c65-26.dat acprotect behavioral2/files/0x0007000000022c65-24.dat acprotect behavioral2/files/0x0008000000022c70-47.dat acprotect behavioral2/files/0x0008000000022c70-49.dat acprotect behavioral2/files/0x0006000000022c79-73.dat acprotect behavioral2/files/0x0006000000022c79-71.dat acprotect behavioral2/files/0x0006000000022c7d-95.dat acprotect behavioral2/files/0x0006000000022c7d-93.dat acprotect behavioral2/files/0x0006000000022c81-118.dat acprotect behavioral2/files/0x0006000000022c81-116.dat acprotect behavioral2/files/0x0006000000022c85-141.dat acprotect behavioral2/files/0x0006000000022c85-139.dat acprotect behavioral2/files/0x0006000000022c89-163.dat acprotect behavioral2/files/0x0006000000022c89-161.dat acprotect behavioral2/files/0x0006000000022c8d-187.dat acprotect behavioral2/files/0x0006000000022c8d-185.dat acprotect behavioral2/files/0x0006000000022c91-208.dat acprotect behavioral2/files/0x0006000000022c91-211.dat acprotect behavioral2/files/0x0006000000022c95-231.dat acprotect behavioral2/files/0x0006000000022c95-233.dat acprotect behavioral2/files/0x0006000000022c99-253.dat acprotect behavioral2/files/0x0006000000022c99-255.dat acprotect behavioral2/files/0x0006000000022c9d-277.dat acprotect behavioral2/files/0x0006000000022c9d-275.dat acprotect behavioral2/files/0x0006000000022ca1-297.dat acprotect behavioral2/files/0x0006000000022ca1-299.dat acprotect behavioral2/files/0x0006000000022ca5-322.dat acprotect behavioral2/files/0x0006000000022ca5-320.dat acprotect behavioral2/files/0x0006000000022ca9-342.dat acprotect behavioral2/files/0x0006000000022ca9-344.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 3808 inqcxrfhg.exe 5008 inxtemyti.exe 2052 inmtnbdcu.exe 216 inlsmacbt.exe 2224 inxjymong.exe 1624 innqsrkjz.exe 2028 intpaiupe.exe 4812 innuocedv.exe 2380 inmeufqjy.exe 1524 injyqkarh.exe 1556 infvypoww.exe 2664 inzloqpih.exe 2512 indskelwb.exe 3484 inpsutmlb.exe 2108 incrjzdkv.exe 4876 inuqbjvqf.exe 872 insohtodl.exe 3688 inykznpoh.exe 2024 incgzwjvl.exe 1684 inpbwqegf.exe 1884 inrdysgih.exe 4160 inyorihpp.exe 2772 inruwvobn.exe 3772 inazpsjiq.exe 5028 inqklaasr.exe 2996 inldtepix.exe 4596 invhwkmle.exe 3356 inqrggyxc.exe 2664 inzvgovkd.exe 3796 inqmfrmyb.exe 3060 inzkcszdo.exe 2532 inadbobmd.exe 2596 inhwnltjf.exe 1828 inxrqyyst.exe 2408 inbqiycju.exe 4328 indxawycz.exe 1328 inyjbrycn.exe 1512 inetlfmxc.exe 372 intsuvkkg.exe 2908 ingvnhoze.exe 4512 invuwaxma.exe 2448 inwhpwale.exe 5072 innlypqcs.exe 3492 inpleqlxa.exe 4800 inwsdlxsh.exe 748 inbqostfv.exe 3104 iniizepdz.exe 3328 incanalcr.exe 3208 injmdckxk.exe 4688 inixpjqgj.exe 3892 inbuxzyre.exe 4164 inxsdoolp.exe 3700 indlyubtu.exe 2696 ingvzmksi.exe 1608 infdqdofu.exe 1792 injhulmow.exe 536 intcrvwiy.exe 2896 insezthji.exe 3716 inigtklnv.exe 952 inpkvggzd.exe 4316 indqsmlmh.exe 704 inhfsfaqh.exe 2264 inecpcnet.exe 1576 injwnoaqy.exe -
Loads dropped DLL 64 IoCs
pid Process 2312 NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe 2312 NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe 3808 inqcxrfhg.exe 3808 inqcxrfhg.exe 5008 inxtemyti.exe 5008 inxtemyti.exe 2052 inmtnbdcu.exe 2052 inmtnbdcu.exe 216 inlsmacbt.exe 216 inlsmacbt.exe 2224 inxjymong.exe 2224 inxjymong.exe 1624 innqsrkjz.exe 1624 innqsrkjz.exe 2028 intpaiupe.exe 2028 intpaiupe.exe 4812 innuocedv.exe 4812 innuocedv.exe 2380 inmeufqjy.exe 2380 inmeufqjy.exe 1524 injyqkarh.exe 1524 injyqkarh.exe 1556 infvypoww.exe 1556 infvypoww.exe 2664 inzloqpih.exe 2664 inzloqpih.exe 2512 indskelwb.exe 2512 indskelwb.exe 3484 inpsutmlb.exe 3484 inpsutmlb.exe 2108 incrjzdkv.exe 2108 incrjzdkv.exe 4876 inuqbjvqf.exe 4876 inuqbjvqf.exe 872 insohtodl.exe 872 insohtodl.exe 3688 inykznpoh.exe 3688 inykznpoh.exe 2024 incgzwjvl.exe 2024 incgzwjvl.exe 1684 inpbwqegf.exe 1684 inpbwqegf.exe 1884 inrdysgih.exe 1884 inrdysgih.exe 4160 inyorihpp.exe 4160 inyorihpp.exe 2772 inruwvobn.exe 2772 inruwvobn.exe 3772 inazpsjiq.exe 3772 inazpsjiq.exe 5028 inqklaasr.exe 5028 inqklaasr.exe 2996 inldtepix.exe 2996 inldtepix.exe 4288 injkrqgyq.exe 4288 injkrqgyq.exe 3356 inqrggyxc.exe 3356 inqrggyxc.exe 2664 inzvgovkd.exe 2664 inzvgovkd.exe 3796 inqmfrmyb.exe 3796 inqmfrmyb.exe 3060 inzkcszdo.exe 3060 inzkcszdo.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\syslog.dat inpleqlxa.exe File opened for modification C:\Windows\SysWOW64\iniizepdz.exe_lang.ini inbqostfv.exe File created C:\Windows\SysWOW64\inaphxbit.exe ingwzqpxx.exe File opened for modification C:\Windows\SysWOW64\insohtodl.exe_lang.ini inuqbjvqf.exe File created C:\Windows\SysWOW64\intfuikjc.exe insbquvhx.exe File created C:\Windows\SysWOW64\inbpxnjbw.exe injlxlxig.exe File created C:\Windows\SysWOW64\inrshhzyd.exe innfvgrkz.exe File created C:\Windows\SysWOW64\inmflkmos.exe inlcfvhzy.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inwgusogd.exe File created C:\Windows\SysWOW64\inadbobmd.exe inzkcszdo.exe File created C:\Windows\SysWOW64\inbfyviuk.exe inljyapnv.exe File opened for modification C:\Windows\SysWOW64\injlxlxig.exe_lang.ini inbrulkss.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inkzrlbas.exe File opened for modification C:\Windows\SysWOW64\inopeewva.exe_lang.ini inmibthrw.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inowmiavg.exe File opened for modification C:\Windows\SysWOW64\inetlfmxc.exe_lang.ini inyjbrycn.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inscqyokc.exe File opened for modification C:\Windows\SysWOW64\inbaqtkjr.exe_lang.ini inertnmni.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpbwqegf.exe File opened for modification C:\Windows\SysWOW64\syslog.dat innlypqcs.exe File opened for modification C:\Windows\SysWOW64\syslog.dat invrckwrg.exe File opened for modification C:\Windows\SysWOW64\indwztgsi.exe_lang.ini insrzztuj.exe File opened for modification C:\Windows\SysWOW64\syslog.dat incsnrmiw.exe File created C:\Windows\SysWOW64\inuwegjgs.exe inxtleici.exe File created C:\Windows\SysWOW64\inrfpuysy.exe incvyzsfr.exe File created C:\Windows\SysWOW64\inrxixhwa.exe infumgnyd.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inmeufqjy.exe File created C:\Windows\SysWOW64\inwsdlxsh.exe inpleqlxa.exe File opened for modification C:\Windows\SysWOW64\syslog.dat innfvgrkz.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inaaajueu.exe File created C:\Windows\SysWOW64\inzloqpih.exe infvypoww.exe File created C:\Windows\SysWOW64\inldtepix.exe inqklaasr.exe File opened for modification C:\Windows\SysWOW64\injmdckxk.exe_lang.ini incanalcr.exe File created C:\Windows\SysWOW64\indhxkwmb.exe inqtvunam.exe File created C:\Windows\SysWOW64\insbquvhx.exe inxnqhgoo.exe File created C:\Windows\SysWOW64\inljyapnv.exe inufueytz.exe File opened for modification C:\Windows\SysWOW64\ingtvpopk.exe_lang.ini inqxvmprs.exe File opened for modification C:\Windows\SysWOW64\insgwlney.exe_lang.ini infvqbbup.exe File opened for modification C:\Windows\SysWOW64\innlypqcs.exe_lang.ini inwhpwale.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inwsdlxsh.exe File opened for modification C:\Windows\SysWOW64\syslog.dat indwztgsi.exe File opened for modification C:\Windows\SysWOW64\inxrycagn.exe_lang.ini inmxiifwj.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inuqbjvqf.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inixpjqgj.exe File created C:\Windows\SysWOW64\indlyubtu.exe inxsdoolp.exe File opened for modification C:\Windows\SysWOW64\inewrcnnk.exe_lang.ini inijzqpfx.exe File created C:\Windows\SysWOW64\inufueytz.exe invrckwrg.exe File opened for modification C:\Windows\SysWOW64\inmnccutj.exe_lang.ini inrhnxdft.exe File created C:\Windows\SysWOW64\inxtemyti.exe inqcxrfhg.exe File created C:\Windows\SysWOW64\inixpjqgj.exe injmdckxk.exe File created C:\Windows\SysWOW64\innfvgrkz.exe inaexuhtj.exe File created C:\Windows\SysWOW64\inhgwhjlo.exe indtkzjxv.exe File created C:\Windows\SysWOW64\invhwkmle.exe inldtepix.exe File opened for modification C:\Windows\SysWOW64\inlcfvhzy.exe_lang.ini incraptug.exe File opened for modification C:\Windows\SysWOW64\injfqeotx.exe_lang.ini inlofemzm.exe File opened for modification C:\Windows\SysWOW64\inowmiavg.exe_lang.ini inopeewva.exe File opened for modification C:\Windows\SysWOW64\inxjymong.exe_lang.ini inlsmacbt.exe File created C:\Windows\SysWOW64\injyqkarh.exe inmeufqjy.exe File opened for modification C:\Windows\SysWOW64\inuqbjvqf.exe_lang.ini incrjzdkv.exe File opened for modification C:\Windows\SysWOW64\injwnoaqy.exe_lang.ini inecpcnet.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inhzrfkoi.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inmkxopbr.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inmflkmos.exe File opened for modification C:\Windows\SysWOW64\inapnrseu.exe_lang.ini inqnbrgit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2312 NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe 2312 NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe 3808 inqcxrfhg.exe 3808 inqcxrfhg.exe 5008 inxtemyti.exe 5008 inxtemyti.exe 2052 inmtnbdcu.exe 2052 inmtnbdcu.exe 216 inlsmacbt.exe 216 inlsmacbt.exe 2224 inxjymong.exe 2224 inxjymong.exe 1624 innqsrkjz.exe 1624 innqsrkjz.exe 2028 intpaiupe.exe 2028 intpaiupe.exe 4812 innuocedv.exe 4812 innuocedv.exe 2380 inmeufqjy.exe 2380 inmeufqjy.exe 1524 injyqkarh.exe 1524 injyqkarh.exe 1556 infvypoww.exe 1556 infvypoww.exe 2664 inzloqpih.exe 2664 inzloqpih.exe 2512 indskelwb.exe 2512 indskelwb.exe 3484 inpsutmlb.exe 3484 inpsutmlb.exe 2108 incrjzdkv.exe 2108 incrjzdkv.exe 4876 inuqbjvqf.exe 4876 inuqbjvqf.exe 872 insohtodl.exe 872 insohtodl.exe 3688 inykznpoh.exe 3688 inykznpoh.exe 2024 incgzwjvl.exe 2024 incgzwjvl.exe 1684 inpbwqegf.exe 1684 inpbwqegf.exe 1884 inrdysgih.exe 1884 inrdysgih.exe 4160 inyorihpp.exe 4160 inyorihpp.exe 2772 inruwvobn.exe 2772 inruwvobn.exe 3772 inazpsjiq.exe 3772 inazpsjiq.exe 5028 inqklaasr.exe 5028 inqklaasr.exe 2996 inldtepix.exe 2996 inldtepix.exe 4288 injkrqgyq.exe 4288 injkrqgyq.exe 3356 inqrggyxc.exe 3356 inqrggyxc.exe 2664 inzvgovkd.exe 2664 inzvgovkd.exe 3796 inqmfrmyb.exe 3796 inqmfrmyb.exe 3060 inzkcszdo.exe 3060 inzkcszdo.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2312 NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe Token: SeDebugPrivilege 3808 inqcxrfhg.exe Token: SeDebugPrivilege 5008 inxtemyti.exe Token: SeDebugPrivilege 2052 inmtnbdcu.exe Token: SeDebugPrivilege 216 inlsmacbt.exe Token: SeDebugPrivilege 2224 inxjymong.exe Token: SeDebugPrivilege 1624 innqsrkjz.exe Token: SeDebugPrivilege 2028 intpaiupe.exe Token: SeDebugPrivilege 4812 innuocedv.exe Token: SeDebugPrivilege 2380 inmeufqjy.exe Token: SeDebugPrivilege 1524 injyqkarh.exe Token: SeDebugPrivilege 1556 infvypoww.exe Token: SeDebugPrivilege 2664 inzloqpih.exe Token: SeDebugPrivilege 2512 indskelwb.exe Token: SeDebugPrivilege 3484 inpsutmlb.exe Token: SeDebugPrivilege 2108 incrjzdkv.exe Token: SeDebugPrivilege 4876 inuqbjvqf.exe Token: SeDebugPrivilege 872 insohtodl.exe Token: SeDebugPrivilege 3688 inykznpoh.exe Token: SeDebugPrivilege 2024 incgzwjvl.exe Token: SeDebugPrivilege 1684 inpbwqegf.exe Token: SeDebugPrivilege 1884 inrdysgih.exe Token: SeDebugPrivilege 4160 inyorihpp.exe Token: SeDebugPrivilege 2772 inruwvobn.exe Token: SeDebugPrivilege 3772 inazpsjiq.exe Token: SeDebugPrivilege 5028 inqklaasr.exe Token: SeDebugPrivilege 2996 inldtepix.exe Token: SeDebugPrivilege 4288 injkrqgyq.exe Token: SeDebugPrivilege 3356 inqrggyxc.exe Token: SeDebugPrivilege 2664 inzvgovkd.exe Token: SeDebugPrivilege 3796 inqmfrmyb.exe Token: SeDebugPrivilege 3060 inzkcszdo.exe Token: SeDebugPrivilege 2532 inadbobmd.exe Token: SeDebugPrivilege 2596 inhwnltjf.exe Token: SeDebugPrivilege 1828 inxrqyyst.exe Token: SeDebugPrivilege 2408 inbqiycju.exe Token: SeDebugPrivilege 4328 indxawycz.exe Token: SeDebugPrivilege 1328 inyjbrycn.exe Token: SeDebugPrivilege 1512 inetlfmxc.exe Token: SeDebugPrivilege 372 intsuvkkg.exe Token: SeDebugPrivilege 2908 ingvnhoze.exe Token: SeDebugPrivilege 4512 invuwaxma.exe Token: SeDebugPrivilege 2448 inwhpwale.exe Token: SeDebugPrivilege 5072 innlypqcs.exe Token: SeDebugPrivilege 3492 inpleqlxa.exe Token: SeDebugPrivilege 4800 inwsdlxsh.exe Token: SeDebugPrivilege 748 inbqostfv.exe Token: SeDebugPrivilege 3104 iniizepdz.exe Token: SeDebugPrivilege 3328 incanalcr.exe Token: SeDebugPrivilege 3208 injmdckxk.exe Token: SeDebugPrivilege 4688 inixpjqgj.exe Token: SeDebugPrivilege 3892 inbuxzyre.exe Token: SeDebugPrivilege 4164 inxsdoolp.exe Token: SeDebugPrivilege 3700 indlyubtu.exe Token: SeDebugPrivilege 2696 ingvzmksi.exe Token: SeDebugPrivilege 1608 infdqdofu.exe Token: SeDebugPrivilege 1792 injhulmow.exe Token: SeDebugPrivilege 536 intcrvwiy.exe Token: SeDebugPrivilege 2896 insezthji.exe Token: SeDebugPrivilege 3716 inigtklnv.exe Token: SeDebugPrivilege 952 inpkvggzd.exe Token: SeDebugPrivilege 4316 indqsmlmh.exe Token: SeDebugPrivilege 704 inhfsfaqh.exe Token: SeDebugPrivilege 2264 inecpcnet.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 2312 NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe 3808 inqcxrfhg.exe 5008 inxtemyti.exe 2052 inmtnbdcu.exe 216 inlsmacbt.exe 2224 inxjymong.exe 1624 innqsrkjz.exe 2028 intpaiupe.exe 4812 innuocedv.exe 2380 inmeufqjy.exe 1524 injyqkarh.exe 1556 infvypoww.exe 2664 inzloqpih.exe 2512 indskelwb.exe 3484 inpsutmlb.exe 2108 incrjzdkv.exe 4876 inuqbjvqf.exe 872 insohtodl.exe 3688 inykznpoh.exe 2024 incgzwjvl.exe 1684 inpbwqegf.exe 1884 inrdysgih.exe 4160 inyorihpp.exe 2772 inruwvobn.exe 3772 inazpsjiq.exe 5028 inqklaasr.exe 2996 inldtepix.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2312 wrote to memory of 3808 2312 NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe 89 PID 2312 wrote to memory of 3808 2312 NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe 89 PID 2312 wrote to memory of 3808 2312 NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe 89 PID 3808 wrote to memory of 5008 3808 inqcxrfhg.exe 90 PID 3808 wrote to memory of 5008 3808 inqcxrfhg.exe 90 PID 3808 wrote to memory of 5008 3808 inqcxrfhg.exe 90 PID 5008 wrote to memory of 2052 5008 inxtemyti.exe 91 PID 5008 wrote to memory of 2052 5008 inxtemyti.exe 91 PID 5008 wrote to memory of 2052 5008 inxtemyti.exe 91 PID 2052 wrote to memory of 216 2052 inmtnbdcu.exe 92 PID 2052 wrote to memory of 216 2052 inmtnbdcu.exe 92 PID 2052 wrote to memory of 216 2052 inmtnbdcu.exe 92 PID 216 wrote to memory of 2224 216 inlsmacbt.exe 93 PID 216 wrote to memory of 2224 216 inlsmacbt.exe 93 PID 216 wrote to memory of 2224 216 inlsmacbt.exe 93 PID 2224 wrote to memory of 1624 2224 inxjymong.exe 94 PID 2224 wrote to memory of 1624 2224 inxjymong.exe 94 PID 2224 wrote to memory of 1624 2224 inxjymong.exe 94 PID 1624 wrote to memory of 2028 1624 innqsrkjz.exe 95 PID 1624 wrote to memory of 2028 1624 innqsrkjz.exe 95 PID 1624 wrote to memory of 2028 1624 innqsrkjz.exe 95 PID 2028 wrote to memory of 4812 2028 intpaiupe.exe 96 PID 2028 wrote to memory of 4812 2028 intpaiupe.exe 96 PID 2028 wrote to memory of 4812 2028 intpaiupe.exe 96 PID 4812 wrote to memory of 2380 4812 innuocedv.exe 97 PID 4812 wrote to memory of 2380 4812 innuocedv.exe 97 PID 4812 wrote to memory of 2380 4812 innuocedv.exe 97 PID 2380 wrote to memory of 1524 2380 inmeufqjy.exe 98 PID 2380 wrote to memory of 1524 2380 inmeufqjy.exe 98 PID 2380 wrote to memory of 1524 2380 inmeufqjy.exe 98 PID 1524 wrote to memory of 1556 1524 injyqkarh.exe 99 PID 1524 wrote to memory of 1556 1524 injyqkarh.exe 99 PID 1524 wrote to memory of 1556 1524 injyqkarh.exe 99 PID 1556 wrote to memory of 2664 1556 infvypoww.exe 100 PID 1556 wrote to memory of 2664 1556 infvypoww.exe 100 PID 1556 wrote to memory of 2664 1556 infvypoww.exe 100 PID 2664 wrote to memory of 2512 2664 inzloqpih.exe 101 PID 2664 wrote to memory of 2512 2664 inzloqpih.exe 101 PID 2664 wrote to memory of 2512 2664 inzloqpih.exe 101 PID 2512 wrote to memory of 3484 2512 indskelwb.exe 102 PID 2512 wrote to memory of 3484 2512 indskelwb.exe 102 PID 2512 wrote to memory of 3484 2512 indskelwb.exe 102 PID 3484 wrote to memory of 2108 3484 inpsutmlb.exe 103 PID 3484 wrote to memory of 2108 3484 inpsutmlb.exe 103 PID 3484 wrote to memory of 2108 3484 inpsutmlb.exe 103 PID 2108 wrote to memory of 4876 2108 incrjzdkv.exe 104 PID 2108 wrote to memory of 4876 2108 incrjzdkv.exe 104 PID 2108 wrote to memory of 4876 2108 incrjzdkv.exe 104 PID 4876 wrote to memory of 872 4876 inuqbjvqf.exe 105 PID 4876 wrote to memory of 872 4876 inuqbjvqf.exe 105 PID 4876 wrote to memory of 872 4876 inuqbjvqf.exe 105 PID 872 wrote to memory of 3688 872 insohtodl.exe 106 PID 872 wrote to memory of 3688 872 insohtodl.exe 106 PID 872 wrote to memory of 3688 872 insohtodl.exe 106 PID 3688 wrote to memory of 2024 3688 inykznpoh.exe 107 PID 3688 wrote to memory of 2024 3688 inykznpoh.exe 107 PID 3688 wrote to memory of 2024 3688 inykznpoh.exe 107 PID 2024 wrote to memory of 1684 2024 incgzwjvl.exe 108 PID 2024 wrote to memory of 1684 2024 incgzwjvl.exe 108 PID 2024 wrote to memory of 1684 2024 incgzwjvl.exe 108 PID 1684 wrote to memory of 1884 1684 inpbwqegf.exe 109 PID 1684 wrote to memory of 1884 1684 inpbwqegf.exe 109 PID 1684 wrote to memory of 1884 1684 inpbwqegf.exe 109 PID 1884 wrote to memory of 4160 1884 inrdysgih.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.fdbd31b345a394085efcb1f59e5cc428_JC.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\inxtemyti.exeC:\Windows\system32\inxtemyti.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\inmtnbdcu.exeC:\Windows\system32\inmtnbdcu.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\inxjymong.exeC:\Windows\system32\inxjymong.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\innqsrkjz.exeC:\Windows\system32\innqsrkjz.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\intpaiupe.exeC:\Windows\system32\intpaiupe.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\innuocedv.exeC:\Windows\system32\innuocedv.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\injyqkarh.exeC:\Windows\system32\injyqkarh.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\infvypoww.exeC:\Windows\system32\infvypoww.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\inzloqpih.exeC:\Windows\system32\inzloqpih.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\indskelwb.exeC:\Windows\system32\indskelwb.exe14⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\inuqbjvqf.exeC:\Windows\system32\inuqbjvqf.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\insohtodl.exeC:\Windows\system32\insohtodl.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\inykznpoh.exeC:\Windows\system32\inykznpoh.exe19⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\incgzwjvl.exeC:\Windows\system32\incgzwjvl.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\inpbwqegf.exeC:\Windows\system32\inpbwqegf.exe21⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\inrdysgih.exeC:\Windows\system32\inrdysgih.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe23⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4160 -
C:\Windows\SysWOW64\inruwvobn.exeC:\Windows\system32\inruwvobn.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Windows\SysWOW64\inazpsjiq.exeC:\Windows\system32\inazpsjiq.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3772 -
C:\Windows\SysWOW64\inqklaasr.exeC:\Windows\system32\inqklaasr.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5028 -
C:\Windows\SysWOW64\inldtepix.exeC:\Windows\system32\inldtepix.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Windows\SysWOW64\invhwkmle.exeC:\Windows\system32\invhwkmle.exe28⤵
- Executes dropped EXE
PID:4596 -
C:\Windows\SysWOW64\injkrqgyq.exeC:\Windows\system32\injkrqgyq.exe29⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4288 -
C:\Windows\SysWOW64\inqrggyxc.exeC:\Windows\system32\inqrggyxc.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3356 -
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664 -
C:\Windows\SysWOW64\inqmfrmyb.exeC:\Windows\system32\inqmfrmyb.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3796 -
C:\Windows\SysWOW64\inzkcszdo.exeC:\Windows\system32\inzkcszdo.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060 -
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2532 -
C:\Windows\SysWOW64\inhwnltjf.exeC:\Windows\system32\inhwnltjf.exe35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2596 -
C:\Windows\SysWOW64\inxrqyyst.exeC:\Windows\system32\inxrqyyst.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1828 -
C:\Windows\SysWOW64\inbqiycju.exeC:\Windows\system32\inbqiycju.exe37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2408 -
C:\Windows\SysWOW64\indxawycz.exeC:\Windows\system32\indxawycz.exe38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4328 -
C:\Windows\SysWOW64\inyjbrycn.exeC:\Windows\system32\inyjbrycn.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1328 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe40⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1512 -
C:\Windows\SysWOW64\intsuvkkg.exeC:\Windows\system32\intsuvkkg.exe41⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:372 -
C:\Windows\SysWOW64\ingvnhoze.exeC:\Windows\system32\ingvnhoze.exe42⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\SysWOW64\invuwaxma.exeC:\Windows\system32\invuwaxma.exe43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4512 -
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2448 -
C:\Windows\SysWOW64\innlypqcs.exeC:\Windows\system32\innlypqcs.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3492 -
C:\Windows\SysWOW64\inwsdlxsh.exeC:\Windows\system32\inwsdlxsh.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4800 -
C:\Windows\SysWOW64\inbqostfv.exeC:\Windows\system32\inbqostfv.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:748 -
C:\Windows\SysWOW64\iniizepdz.exeC:\Windows\system32\iniizepdz.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3104 -
C:\Windows\SysWOW64\incanalcr.exeC:\Windows\system32\incanalcr.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3328 -
C:\Windows\SysWOW64\injmdckxk.exeC:\Windows\system32\injmdckxk.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3208 -
C:\Windows\SysWOW64\inixpjqgj.exeC:\Windows\system32\inixpjqgj.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4688 -
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe53⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3892 -
C:\Windows\SysWOW64\inxsdoolp.exeC:\Windows\system32\inxsdoolp.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4164 -
C:\Windows\SysWOW64\indlyubtu.exeC:\Windows\system32\indlyubtu.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3700 -
C:\Windows\SysWOW64\ingvzmksi.exeC:\Windows\system32\ingvzmksi.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2696 -
C:\Windows\SysWOW64\infdqdofu.exeC:\Windows\system32\infdqdofu.exe57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1608 -
C:\Windows\SysWOW64\injhulmow.exeC:\Windows\system32\injhulmow.exe58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\SysWOW64\intcrvwiy.exeC:\Windows\system32\intcrvwiy.exe59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\SysWOW64\insezthji.exeC:\Windows\system32\insezthji.exe60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Windows\SysWOW64\inigtklnv.exeC:\Windows\system32\inigtklnv.exe61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3716 -
C:\Windows\SysWOW64\inpkvggzd.exeC:\Windows\system32\inpkvggzd.exe62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:952 -
C:\Windows\SysWOW64\indqsmlmh.exeC:\Windows\system32\indqsmlmh.exe63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4316 -
C:\Windows\SysWOW64\inhfsfaqh.exeC:\Windows\system32\inhfsfaqh.exe64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:704 -
C:\Windows\SysWOW64\inecpcnet.exeC:\Windows\system32\inecpcnet.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Windows\SysWOW64\injwnoaqy.exeC:\Windows\system32\injwnoaqy.exe66⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\SysWOW64\inkbaivic.exeC:\Windows\system32\inkbaivic.exe67⤵PID:2532
-
C:\Windows\SysWOW64\inhzrfkoi.exeC:\Windows\system32\inhzrfkoi.exe68⤵
- Drops file in System32 directory
PID:1376 -
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe69⤵PID:2272
-
C:\Windows\SysWOW64\inahuhbcs.exeC:\Windows\system32\inahuhbcs.exe70⤵PID:3668
-
C:\Windows\SysWOW64\inejnhnnw.exeC:\Windows\system32\inejnhnnw.exe71⤵PID:1624
-
C:\Windows\SysWOW64\innbxlquo.exeC:\Windows\system32\innbxlquo.exe72⤵PID:1060
-
C:\Windows\SysWOW64\inscqyokc.exeC:\Windows\system32\inscqyokc.exe73⤵
- Drops file in System32 directory
PID:3728 -
C:\Windows\SysWOW64\inqtvunam.exeC:\Windows\system32\inqtvunam.exe74⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:1992 -
C:\Windows\SysWOW64\indhxkwmb.exeC:\Windows\system32\indhxkwmb.exe75⤵PID:4060
-
C:\Windows\SysWOW64\inrmslxzd.exeC:\Windows\system32\inrmslxzd.exe76⤵PID:2940
-
C:\Windows\SysWOW64\ingwzqpxx.exeC:\Windows\system32\ingwzqpxx.exe77⤵
- Drops file in System32 directory
PID:4508 -
C:\Windows\SysWOW64\inaphxbit.exeC:\Windows\system32\inaphxbit.exe78⤵
- Modifies Installed Components in the registry
PID:3356 -
C:\Windows\SysWOW64\ingoxeawx.exeC:\Windows\system32\ingoxeawx.exe79⤵
- Modifies Installed Components in the registry
PID:3604 -
C:\Windows\SysWOW64\inxnqhgoo.exeC:\Windows\system32\inxnqhgoo.exe80⤵
- Drops file in System32 directory
PID:4828 -
C:\Windows\SysWOW64\insbquvhx.exeC:\Windows\system32\insbquvhx.exe81⤵
- Drops file in System32 directory
PID:4004 -
C:\Windows\SysWOW64\intfuikjc.exeC:\Windows\system32\intfuikjc.exe82⤵
- Modifies Installed Components in the registry
PID:2108 -
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe83⤵PID:2052
-
C:\Windows\SysWOW64\inocokdvj.exeC:\Windows\system32\inocokdvj.exe84⤵
- Modifies Installed Components in the registry
PID:4872 -
C:\Windows\SysWOW64\insnyjjgx.exeC:\Windows\system32\insnyjjgx.exe85⤵PID:1788
-
C:\Windows\SysWOW64\inijzqpfx.exeC:\Windows\system32\inijzqpfx.exe86⤵
- Drops file in System32 directory
PID:3828 -
C:\Windows\SysWOW64\inewrcnnk.exeC:\Windows\system32\inewrcnnk.exe87⤵
- Modifies Installed Components in the registry
PID:4324 -
C:\Windows\SysWOW64\inesqmezb.exeC:\Windows\system32\inesqmezb.exe88⤵PID:4452
-
C:\Windows\SysWOW64\inoxdfqoe.exeC:\Windows\system32\inoxdfqoe.exe89⤵
- Modifies Installed Components in the registry
PID:1608 -
C:\Windows\SysWOW64\indrzpldy.exeC:\Windows\system32\indrzpldy.exe90⤵PID:4680
-
C:\Windows\SysWOW64\inertnmni.exeC:\Windows\system32\inertnmni.exe91⤵
- Drops file in System32 directory
PID:4580 -
C:\Windows\SysWOW64\inbaqtkjr.exeC:\Windows\system32\inbaqtkjr.exe92⤵PID:5032
-
C:\Windows\SysWOW64\inatybwnb.exeC:\Windows\system32\inatybwnb.exe93⤵
- Modifies Installed Components in the registry
PID:460 -
C:\Windows\SysWOW64\inugvjlkd.exeC:\Windows\system32\inugvjlkd.exe94⤵PID:4576
-
C:\Windows\SysWOW64\inogwahsa.exeC:\Windows\system32\inogwahsa.exe95⤵PID:64
-
C:\Windows\SysWOW64\infnwdvwr.exeC:\Windows\system32\infnwdvwr.exe96⤵PID:4540
-
C:\Windows\SysWOW64\inmkxopbr.exeC:\Windows\system32\inmkxopbr.exe97⤵
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\inyufnzuj.exeC:\Windows\system32\inyufnzuj.exe98⤵PID:2744
-
C:\Windows\SysWOW64\inefvmlzb.exeC:\Windows\system32\inefvmlzb.exe99⤵PID:3152
-
C:\Windows\SysWOW64\invrckwrg.exeC:\Windows\system32\invrckwrg.exe100⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:3892 -
C:\Windows\SysWOW64\inufueytz.exeC:\Windows\system32\inufueytz.exe101⤵
- Drops file in System32 directory
PID:1828 -
C:\Windows\SysWOW64\inljyapnv.exeC:\Windows\system32\inljyapnv.exe102⤵
- Drops file in System32 directory
PID:3048 -
C:\Windows\SysWOW64\inbfyviuk.exeC:\Windows\system32\inbfyviuk.exe103⤵
- Modifies Installed Components in the registry
PID:4556 -
C:\Windows\SysWOW64\inwmpgfnn.exeC:\Windows\system32\inwmpgfnn.exe104⤵PID:3572
-
C:\Windows\SysWOW64\inbrulkss.exeC:\Windows\system32\inbrulkss.exe105⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:1360 -
C:\Windows\SysWOW64\injlxlxig.exeC:\Windows\system32\injlxlxig.exe106⤵
- Drops file in System32 directory
PID:536 -
C:\Windows\SysWOW64\inbpxnjbw.exeC:\Windows\system32\inbpxnjbw.exe107⤵PID:956
-
C:\Windows\SysWOW64\injyiwuqi.exeC:\Windows\system32\injyiwuqi.exe108⤵
- Modifies Installed Components in the registry
PID:4344 -
C:\Windows\SysWOW64\indtosnaj.exeC:\Windows\system32\indtosnaj.exe109⤵
- Modifies Installed Components in the registry
PID:3568 -
C:\Windows\SysWOW64\inuhqyjhd.exeC:\Windows\system32\inuhqyjhd.exe110⤵
- Modifies Installed Components in the registry
PID:3160 -
C:\Windows\SysWOW64\inxitdtqe.exeC:\Windows\system32\inxitdtqe.exe111⤵PID:4200
-
C:\Windows\SysWOW64\innswqwhw.exeC:\Windows\system32\innswqwhw.exe112⤵PID:64
-
C:\Windows\SysWOW64\inhscspdt.exeC:\Windows\system32\inhscspdt.exe113⤵
- Modifies Installed Components in the registry
PID:2164 -
C:\Windows\SysWOW64\inaexuhtj.exeC:\Windows\system32\inaexuhtj.exe114⤵
- Drops file in System32 directory
PID:1108 -
C:\Windows\SysWOW64\innfvgrkz.exeC:\Windows\system32\innfvgrkz.exe115⤵
- Drops file in System32 directory
PID:1708 -
C:\Windows\SysWOW64\inrshhzyd.exeC:\Windows\system32\inrshhzyd.exe116⤵
- Modifies Installed Components in the registry
PID:3152 -
C:\Windows\SysWOW64\inqdhyock.exeC:\Windows\system32\inqdhyock.exe117⤵PID:4148
-
C:\Windows\SysWOW64\inktbmkag.exeC:\Windows\system32\inktbmkag.exe118⤵PID:4176
-
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe119⤵
- Modifies Installed Components in the registry
PID:820 -
C:\Windows\SysWOW64\insrzztuj.exeC:\Windows\system32\insrzztuj.exe120⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:5036 -
C:\Windows\SysWOW64\indwztgsi.exeC:\Windows\system32\indwztgsi.exe121⤵
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\inrngsnzc.exeC:\Windows\system32\inrngsnzc.exe122⤵
- Modifies Installed Components in the registry
PID:4256
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-