Analysis
-
max time kernel
175s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 13:51
Behavioral task
behavioral1
Sample
NEAS.828776bf0c541dbbd47dc1280b0a5992.exe
Resource
win7-20231023-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.828776bf0c541dbbd47dc1280b0a5992.exe
Resource
win10v2004-20231023-en
11 signatures
150 seconds
General
-
Target
NEAS.828776bf0c541dbbd47dc1280b0a5992.exe
-
Size
848KB
-
MD5
828776bf0c541dbbd47dc1280b0a5992
-
SHA1
3c858bcf55d0078a8c64a6feb05e050c4b7c974f
-
SHA256
c2b909a6e27fbb42ba5e06fa8d7ab2be9bd6990116e977590baf0d1cb53c2e48
-
SHA512
c82372d3e57906f4d72de63b9daa3f6ccf5438598314b8877e85e5617bc9a8ac7c2bf1b991fb47aba86d4b8db6638abefef515349e9987c1ef39b4e2a6f2ffb6
-
SSDEEP
24576:ouLwoR5RNPjKoOAeh0PpS672TFU+CWYPMeXf1w:RPjOa172TarkCf1w
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 60 IoCs
resource yara_rule behavioral2/memory/640-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/640-11-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0002000000022307-20.dat family_gh0strat behavioral2/files/0x0002000000022307-22.dat family_gh0strat behavioral2/files/0x0008000000022ce2-30.dat family_gh0strat behavioral2/files/0x0007000000022ce3-38.dat family_gh0strat behavioral2/files/0x0007000000022ce3-43.dat family_gh0strat behavioral2/files/0x0007000000022ce3-42.dat family_gh0strat behavioral2/memory/640-48-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3048-47-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022ce8-68.dat family_gh0strat behavioral2/files/0x0006000000022ce8-67.dat family_gh0strat behavioral2/memory/4780-71-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cec-91.dat family_gh0strat behavioral2/memory/3548-94-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cec-90.dat family_gh0strat behavioral2/files/0x0006000000022cf0-115.dat family_gh0strat behavioral2/memory/5084-116-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cf0-113.dat family_gh0strat behavioral2/memory/1548-122-0x0000000000590000-0x0000000000603000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cf4-136.dat family_gh0strat behavioral2/files/0x0006000000022cf4-138.dat family_gh0strat behavioral2/memory/1548-140-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cf8-160.dat family_gh0strat behavioral2/files/0x0006000000022cf8-159.dat family_gh0strat behavioral2/memory/4952-163-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cfc-182.dat family_gh0strat behavioral2/files/0x0006000000022cfc-183.dat family_gh0strat behavioral2/memory/1632-186-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3516-191-0x0000000002060000-0x00000000020D3000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d00-205.dat family_gh0strat behavioral2/files/0x0006000000022d00-207.dat family_gh0strat behavioral2/memory/3516-209-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d04-228.dat family_gh0strat behavioral2/files/0x0006000000022d04-230.dat family_gh0strat behavioral2/memory/1848-232-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d08-251.dat family_gh0strat behavioral2/files/0x0006000000022d08-253.dat family_gh0strat behavioral2/memory/4748-255-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d0c-275.dat family_gh0strat behavioral2/files/0x0006000000022d0c-274.dat family_gh0strat behavioral2/memory/3216-278-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d10-297.dat family_gh0strat behavioral2/files/0x0006000000022d10-299.dat family_gh0strat behavioral2/memory/2608-301-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d14-320.dat family_gh0strat behavioral2/memory/1368-323-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d14-322.dat family_gh0strat behavioral2/files/0x0006000000022d18-343.dat family_gh0strat behavioral2/files/0x0006000000022d18-345.dat family_gh0strat behavioral2/memory/1708-347-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3432-352-0x00000000020D0000-0x0000000002143000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d1c-366.dat family_gh0strat behavioral2/files/0x0006000000022d1c-367.dat family_gh0strat behavioral2/memory/3432-370-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1356-389-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3944-392-0x00000000020A0000-0x0000000002113000-memory.dmp family_gh0strat behavioral2/memory/3944-408-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/5084-427-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4292-446-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat -
Modifies Installed Components in the registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2D2A4A99-5596-4b2e-BAB6-30200D463566} ineqbmfxl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E2949A33-CBD5-4a6a-954C-47F25E0AF9EE}\stubpath = "C:\\Windows\\system32\\inqcxrfhg.exe" inaexuhtj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9F44A63D-73B1-4383-BB1B-26578DBF6634}\stubpath = "C:\\Windows\\system32\\inlsmacbt.exe" inqcxrfhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1B71201D-D157-4b17-A316-D13425B7C243}\stubpath = "C:\\Windows\\system32\\inkbaivic.exe" injhulmow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B429B423-1D3E-47fe-936B-22801D1C931D}\stubpath = "C:\\Windows\\system32\\inilcbjwj.exe" innuocedv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0664817C-CF75-42d7-B91F-BE5EBD6AE48A} ingvzmksi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F6251FD6-5386-4982-8C86-4652062937B3}\stubpath = "C:\\Windows\\system32\\inpsutmlb.exe" ingwzqpxx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1FA5C296-0EB4-49d5-B1E6-10A4444822CD}\stubpath = "C:\\Windows\\system32\\indhxkwmb.exe" invuwaxma.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1C3B5895-20EB-4d8a-A4C7-3A22453A4CDA} inxhvtpha.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{237A3FED-6F34-4aeb-8C9C-A2372CF8759E} inefvmlzb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7981C1A0-3A4B-4ba6-8BEF-788FA4089A24} inyjbrycn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{657568B7-2F06-4280-B264-DC0C943BAE4B}\stubpath = "C:\\Windows\\system32\\inrngsnzc.exe" incrjzdkv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{926FB0D2-C76C-48b9-8EDB-6B77F5B6B107} inogwahsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2943AAF6-CD3E-4922-B546-511E3FE70B45} inzkcszdo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D85351DC-77FC-4be4-B1E0-74701560F58D}\stubpath = "C:\\Windows\\system32\\inpleqlxa.exe" inuqbjvqf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{687593D1-2B39-4348-A86A-DE7890496245}\stubpath = "C:\\Windows\\system32\\inyjbrycn.exe" inwhpwale.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A35BAEC1-6639-48cc-AC9B-1E092D4D75A4}\stubpath = "C:\\Windows\\system32\\insbquvhx.exe" inrfpuysy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E31C7A86-9081-445d-BF07-864567D11F16}\stubpath = "C:\\Windows\\system32\\inqklaasr.exe" inasgqvzt.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{92F9825D-64BA-4a5d-B072-5BDCA06F0875} inqklaasr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F6251FD6-5386-4982-8C86-4652062937B3} ingwzqpxx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3346D27B-5E97-4cc1-B5B1-BFB656762893}\stubpath = "C:\\Windows\\system32\\inirmhzng.exe" intfuikjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED788CDF-C216-47d8-A509-CD075A0AEBA1} inbqiycju.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7981C1A0-3A4B-4ba6-8BEF-788FA4089A24}\stubpath = "C:\\Windows\\system32\\inbfyviuk.exe" inyjbrycn.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4DB0AF60-0084-4407-BBEA-05EE390A1DA9} inoavpdfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{093C7ACC-DED2-4f76-AAA3-38C650F64EE1} inatwyxqd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01E69121-0905-4ee0-B3C0-E83280E4D6C0} inbmkzbqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D50432C-94E4-4c6e-B5D0-C8319339B4FD}\stubpath = "C:\\Windows\\system32\\inazpsjiq.exe" intsuvkkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A925E73F-FC62-4aa4-8A5D-A7CF3EECCD26}\stubpath = "C:\\Windows\\system32\\inujlcwuk.exe" invrckwrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F233EF6-1D14-458e-83E4-78857D865837}\stubpath = "C:\\Windows\\system32\\ingvnhoze.exe" inhiypoew.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DBF06985-2902-48fa-A44A-8620E6185789} indwztgsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AD5B678D-EE9B-4fa9-8925-8D64049BB9E6} infhthtec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{168F3BC9-AC15-40c5-8927-040C694A632A} inmeufqjy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{168F3BC9-AC15-40c5-8927-040C694A632A}\stubpath = "C:\\Windows\\system32\\inadbobmd.exe" inmeufqjy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EF132E3D-C279-4e95-ACDB-E33E3346BF2E}\stubpath = "C:\\Windows\\system32\\inecpcnet.exe" inazpsjiq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6A1CE757-45B8-45ee-9DE2-88394C5742B9}\stubpath = "C:\\Windows\\system32\\inapnrseu.exe" inmibthrw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2B46CA7E-09A5-451a-81E0-C53ABC44DAD0} inutvwllh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E6FC00CD-23B7-44b3-B6C3-BEB74B8FA7BB}\stubpath = "C:\\Windows\\system32\\inuqbjvqf.exe" injmdckxk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{093C7ACC-DED2-4f76-AAA3-38C650F64EE1}\stubpath = "C:\\Windows\\system32\\inykznpoh.exe" inatwyxqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{01E69121-0905-4ee0-B3C0-E83280E4D6C0}\stubpath = "C:\\Windows\\system32\\ingtgabri.exe" inbmkzbqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FEF1C321-842D-4156-A05E-34A082DD7E05} ingtgabri.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6CD0B676-1AFA-41e7-9A36-E23E7AFB337E}\stubpath = "C:\\Windows\\system32\\incgzwjvl.exe" incbrdfjw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CE7A534F-4C4F-4dc5-B650-FE1B15C3097A}\stubpath = "C:\\Windows\\system32\\inhiypoew.exe" inbrulkss.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC429E59-B064-421c-A59E-5C3E1B86929F} inatybwnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EBE7BC65-5FE9-4967-9C29-3910A3E2B612} inmnccutj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2C5C15E3-286C-427f-8794-B59CD673F261}\stubpath = "C:\\Windows\\system32\\inbqiycju.exe" incvyzsfr.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EFAE59F1-75D4-4e94-957E-517DB07B8EB4} inujlcwuk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3A754CD0-425A-450d-A6B6-F9DD6E59E992}\stubpath = "C:\\Windows\\system32\\inmprqjiy.exe" inxiaqxbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{53E04542-53AD-491f-BCDD-BC5EF0875887} ingiuiufd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F77634AD-6C0C-47e8-A4A8-07023199FEA2}\stubpath = "C:\\Windows\\system32\\innqsrkjz.exe" inrdysgih.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5AA1FEC4-5488-44db-BBAF-8CDDB7861C50} intcrvwiy.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{894CCFE8-D895-41c1-A771-19D9C6ADEA71} infdqdofu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2B46CA7E-09A5-451a-81E0-C53ABC44DAD0}\stubpath = "C:\\Windows\\system32\\inbuxzyre.exe" inutvwllh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{81CE3FA1-9DC5-4f7f-9A5B-C075E7F309C8} ineuxonvv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1B71201D-D157-4b17-A316-D13425B7C243} injhulmow.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0FCE05CF-9010-4b59-B3B1-E0EF97EAC76D}\stubpath = "C:\\Windows\\system32\\inknedlyl.exe" inscqyokc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FEF1C321-842D-4156-A05E-34A082DD7E05}\stubpath = "C:\\Windows\\system32\\innuocedv.exe" ingtgabri.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{27CAAF6B-AB6B-4898-BCA9-7BBF34D539C5}\stubpath = "C:\\Windows\\system32\\inhwfuyzl.exe" inapnrseu.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{320380AF-CEF3-47fc-A1D5-3C45E2D554D0} inkzrlbas.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{65A31E03-CBC7-468d-80FE-A13CC420BB87} intetdxsy.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6BA2D604-4577-4114-88AE-AF65219CD600} inkivmnpx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EC429E59-B064-421c-A59E-5C3E1B86929F}\stubpath = "C:\\Windows\\system32\\inoxdfqoe.exe" inatybwnb.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4D92805F-F1C2-4baa-AB79-2097192A7944} inmtnbdcu.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F1A01C79-F750-4780-800B-9F234572CC69} inqtvunam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8449830D-2F73-412d-B22A-87DA13D8C1A4}\stubpath = "C:\\Windows\\system32\\inkzrlbas.exe" indskelwb.exe -
ACProtect 1.3x - 1.4x DLL software 33 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000a000000022bf9-2.dat acprotect behavioral2/files/0x000a000000022bf9-4.dat acprotect behavioral2/files/0x000a000000022bf9-14.dat acprotect behavioral2/files/0x000a000000022ce1-24.dat acprotect behavioral2/files/0x000a000000022ce1-26.dat acprotect behavioral2/files/0x0008000000022ce5-49.dat acprotect behavioral2/files/0x0008000000022ce5-51.dat acprotect behavioral2/files/0x0006000000022cea-72.dat acprotect behavioral2/files/0x0006000000022cea-74.dat acprotect behavioral2/files/0x0006000000022cee-95.dat acprotect behavioral2/files/0x0006000000022cee-97.dat acprotect behavioral2/files/0x0006000000022cf2-120.dat acprotect behavioral2/files/0x0006000000022cf2-118.dat acprotect behavioral2/files/0x0006000000022cf6-141.dat acprotect behavioral2/files/0x0006000000022cf6-143.dat acprotect behavioral2/files/0x0006000000022cfa-166.dat acprotect behavioral2/files/0x0006000000022cfa-164.dat acprotect behavioral2/files/0x0006000000022cfe-187.dat acprotect behavioral2/files/0x0006000000022cfe-189.dat acprotect behavioral2/files/0x0006000000022d02-210.dat acprotect behavioral2/files/0x0006000000022d02-212.dat acprotect behavioral2/files/0x0006000000022d06-235.dat acprotect behavioral2/files/0x0006000000022d06-233.dat acprotect behavioral2/files/0x0006000000022d0a-258.dat acprotect behavioral2/files/0x0006000000022d0a-256.dat acprotect behavioral2/files/0x0006000000022d0e-279.dat acprotect behavioral2/files/0x0006000000022d0e-281.dat acprotect behavioral2/files/0x0006000000022d12-304.dat acprotect behavioral2/files/0x0006000000022d12-302.dat acprotect behavioral2/files/0x0006000000022d16-325.dat acprotect behavioral2/files/0x0006000000022d16-327.dat acprotect behavioral2/files/0x0006000000022d1a-348.dat acprotect behavioral2/files/0x0006000000022d1a-350.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 3048 inaexuhtj.exe 4780 inqcxrfhg.exe 3548 inlsmacbt.exe 5084 inruwvobn.exe 1548 inmtnbdcu.exe 4952 inqmfrmyb.exe 1632 injmdckxk.exe 3516 inuqbjvqf.exe 1848 inpleqlxa.exe 4748 inixpjqgj.exe 3216 indwztgsi.exe 2608 inxiaqxbm.exe 1368 inmprqjiy.exe 1708 inldtepix.exe 3432 indxawycz.exe 1356 inefvmlzb.exe 3944 inetlfmxc.exe 5084 inaphxbit.exe 4292 inwixlnmf.exe 4188 inhwoipfi.exe 3472 inqtvunam.exe 1932 inocokdvj.exe 1292 ingiuiufd.exe 4764 ineuxonvv.exe 3256 infhthtec.exe 884 inwsdlxsh.exe 2992 inwhpwale.exe 2876 inyjbrycn.exe 2092 inbfyviuk.exe 1356 inoavpdfe.exe 3184 incrjzdkv.exe 3476 inrngsnzc.exe 4620 indskelwb.exe 3044 inkzrlbas.exe 2388 inwmpgfnn.exe 4364 inmeufqjy.exe 1500 inadbobmd.exe 4260 inogwahsa.exe 2520 injyqkarh.exe 3300 inigtklnv.exe 3812 injhulmow.exe 4424 inkbaivic.exe 2216 indqsmlmh.exe 1764 inatwyxqd.exe 1816 inykznpoh.exe 840 infumgnyd.exe 4004 inyorihpp.exe 380 injkrqgyq.exe 940 inrdysgih.exe 2940 innqsrkjz.exe 1844 intcrvwiy.exe 3928 inpqffxwb.exe 4276 infdqdofu.exe 2388 inscqyokc.exe 3104 inknedlyl.exe 852 inzkcszdo.exe 3040 inpbwqegf.exe 5052 inbmkzbqa.exe 1348 ingtgabri.exe 3884 innuocedv.exe 1376 inilcbjwj.exe 1936 inmawkptn.exe 2312 intetdxsy.exe 888 inxtleici.exe -
Loads dropped DLL 64 IoCs
pid Process 640 NEAS.828776bf0c541dbbd47dc1280b0a5992.exe 640 NEAS.828776bf0c541dbbd47dc1280b0a5992.exe 3048 inaexuhtj.exe 3048 inaexuhtj.exe 4780 inqcxrfhg.exe 4780 inqcxrfhg.exe 3548 inlsmacbt.exe 3548 inlsmacbt.exe 5084 inruwvobn.exe 5084 inruwvobn.exe 1548 inmtnbdcu.exe 1548 inmtnbdcu.exe 4952 inqmfrmyb.exe 4952 inqmfrmyb.exe 1632 injmdckxk.exe 1632 injmdckxk.exe 3516 inuqbjvqf.exe 3516 inuqbjvqf.exe 1848 inpleqlxa.exe 1848 inpleqlxa.exe 4748 inixpjqgj.exe 4748 inixpjqgj.exe 3216 indwztgsi.exe 3216 indwztgsi.exe 2608 inxiaqxbm.exe 2608 inxiaqxbm.exe 1368 inmprqjiy.exe 1368 inmprqjiy.exe 1708 inldtepix.exe 1708 inldtepix.exe 3432 indxawycz.exe 3432 indxawycz.exe 1356 inefvmlzb.exe 1356 inefvmlzb.exe 3944 inetlfmxc.exe 3944 inetlfmxc.exe 5084 inaphxbit.exe 5084 inaphxbit.exe 4292 inwixlnmf.exe 4292 inwixlnmf.exe 4188 inhwoipfi.exe 4188 inhwoipfi.exe 3472 inqtvunam.exe 3472 inqtvunam.exe 1932 inocokdvj.exe 1932 inocokdvj.exe 1292 ingiuiufd.exe 1292 ingiuiufd.exe 4764 ineuxonvv.exe 4764 ineuxonvv.exe 3256 infhthtec.exe 3256 infhthtec.exe 884 inwsdlxsh.exe 884 inwsdlxsh.exe 2992 inwhpwale.exe 2992 inwhpwale.exe 2876 inyjbrycn.exe 2876 inyjbrycn.exe 2092 inbfyviuk.exe 2092 inbfyviuk.exe 1356 inoavpdfe.exe 1356 inoavpdfe.exe 3184 incrjzdkv.exe 3184 incrjzdkv.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\inowmiavg.exe_lang.ini insulctjf.exe File created C:\Windows\SysWOW64\intetdxsy.exe inmawkptn.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inortslka.exe File created C:\Windows\SysWOW64\inxjymong.exe inbuxzyre.exe File created C:\Windows\SysWOW64\intfuikjc.exe inxjymong.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inzkcszdo.exe File opened for modification C:\Windows\SysWOW64\inwixlnmf.exe_lang.ini inaphxbit.exe File created C:\Windows\SysWOW64\inwsdlxsh.exe infhthtec.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inigtklnv.exe File created C:\Windows\SysWOW64\inscqyokc.exe infdqdofu.exe File created C:\Windows\SysWOW64\inaphxbit.exe inetlfmxc.exe File created C:\Windows\SysWOW64\incrjzdkv.exe inoavpdfe.exe File created C:\Windows\SysWOW64\inutvwllh.exe insbquvhx.exe File created C:\Windows\SysWOW64\inhzrfkoi.exe inrcangym.exe File opened for modification C:\Windows\SysWOW64\inhwfuyzl.exe_lang.ini inapnrseu.exe File opened for modification C:\Windows\SysWOW64\inortslka.exe_lang.ini injrhdzvq.exe File opened for modification C:\Windows\SysWOW64\inrfpuysy.exe_lang.ini inortslka.exe File created C:\Windows\SysWOW64\inruwvobn.exe inlsmacbt.exe File created C:\Windows\SysWOW64\inldtepix.exe inmprqjiy.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inadbobmd.exe File created C:\Windows\SysWOW64\inxitdtqe.exe inzvgovkd.exe File created C:\Windows\SysWOW64\inocokdvj.exe inqtvunam.exe File created C:\Windows\SysWOW64\inknedlyl.exe inscqyokc.exe File opened for modification C:\Windows\SysWOW64\syslog.dat indhxkwmb.exe File created C:\Windows\SysWOW64\inapnrseu.exe inmibthrw.exe File created C:\Windows\SysWOW64\syslog.dat NEAS.828776bf0c541dbbd47dc1280b0a5992.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inixpjqgj.exe File opened for modification C:\Windows\SysWOW64\inmprqjiy.exe_lang.ini inxiaqxbm.exe File opened for modification C:\Windows\SysWOW64\inaphxbit.exe_lang.ini inetlfmxc.exe File created C:\Windows\SysWOW64\indrzpldy.exe inqklaasr.exe File created C:\Windows\SysWOW64\infumgnyd.exe inykznpoh.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inmibthrw.exe File opened for modification C:\Windows\SysWOW64\inirmhzng.exe_lang.ini intfuikjc.exe File created C:\Windows\SysWOW64\insrzztuj.exe inbqiycju.exe File opened for modification C:\Windows\SysWOW64\inqmfrmyb.exe_lang.ini inmtnbdcu.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inocokdvj.exe File opened for modification C:\Windows\SysWOW64\inwhpwale.exe_lang.ini inwsdlxsh.exe File created C:\Windows\SysWOW64\inbfyviuk.exe inyjbrycn.exe File opened for modification C:\Windows\SysWOW64\inxnqhgoo.exe_lang.ini inejnhnnw.exe File created C:\Windows\SysWOW64\inazpsjiq.exe intsuvkkg.exe File opened for modification C:\Windows\SysWOW64\syslog.dat invuwaxma.exe File opened for modification C:\Windows\SysWOW64\inbuxzyre.exe_lang.ini inutvwllh.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inasgqvzt.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inetlfmxc.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inwsdlxsh.exe File created C:\Windows\SysWOW64\inkbaivic.exe injhulmow.exe File opened for modification C:\Windows\SysWOW64\inrdysgih.exe_lang.ini injkrqgyq.exe File created C:\Windows\SysWOW64\inbrulkss.exe inewrcnnk.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inrcangym.exe File created C:\Windows\SysWOW64\injmdckxk.exe inqmfrmyb.exe File created C:\Windows\SysWOW64\innqsrkjz.exe inrdysgih.exe File opened for modification C:\Windows\SysWOW64\syslog.dat ingtgabri.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inhwfuyzl.exe File opened for modification C:\Windows\SysWOW64\incgzwjvl.exe_lang.ini incbrdfjw.exe File opened for modification C:\Windows\SysWOW64\indwztgsi.exe_lang.ini inixpjqgj.exe File created C:\Windows\SysWOW64\inpqffxwb.exe intcrvwiy.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpbwqegf.exe File created C:\Windows\SysWOW64\innuocedv.exe ingtgabri.exe File opened for modification C:\Windows\SysWOW64\syslog.dat incwvxbyn.exe File opened for modification C:\Windows\SysWOW64\inqjpgzht.exe_lang.ini inowmiavg.exe File opened for modification C:\Windows\SysWOW64\incvyzsfr.exe_lang.ini inqjpgzht.exe File opened for modification C:\Windows\SysWOW64\ineqbmfxl.exe_lang.ini inaikwkwh.exe File opened for modification C:\Windows\SysWOW64\inlsmacbt.exe_lang.ini inqcxrfhg.exe File opened for modification C:\Windows\SysWOW64\inruwvobn.exe_lang.ini inlsmacbt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 640 NEAS.828776bf0c541dbbd47dc1280b0a5992.exe 640 NEAS.828776bf0c541dbbd47dc1280b0a5992.exe 3048 inaexuhtj.exe 3048 inaexuhtj.exe 4780 inqcxrfhg.exe 4780 inqcxrfhg.exe 3548 inlsmacbt.exe 3548 inlsmacbt.exe 5084 inruwvobn.exe 5084 inruwvobn.exe 1548 inmtnbdcu.exe 1548 inmtnbdcu.exe 4952 inqmfrmyb.exe 4952 inqmfrmyb.exe 1632 injmdckxk.exe 1632 injmdckxk.exe 3516 inuqbjvqf.exe 3516 inuqbjvqf.exe 1848 inpleqlxa.exe 1848 inpleqlxa.exe 4748 inixpjqgj.exe 4748 inixpjqgj.exe 3216 indwztgsi.exe 3216 indwztgsi.exe 2608 inxiaqxbm.exe 2608 inxiaqxbm.exe 1368 inmprqjiy.exe 1368 inmprqjiy.exe 1708 inldtepix.exe 1708 inldtepix.exe 3432 indxawycz.exe 3432 indxawycz.exe 1356 inefvmlzb.exe 1356 inefvmlzb.exe 3944 inetlfmxc.exe 3944 inetlfmxc.exe 5084 inaphxbit.exe 5084 inaphxbit.exe 4292 inwixlnmf.exe 4292 inwixlnmf.exe 4188 inhwoipfi.exe 4188 inhwoipfi.exe 3472 inqtvunam.exe 3472 inqtvunam.exe 1932 inocokdvj.exe 1932 inocokdvj.exe 1292 ingiuiufd.exe 1292 ingiuiufd.exe 4764 ineuxonvv.exe 4764 ineuxonvv.exe 3256 infhthtec.exe 3256 infhthtec.exe 884 inwsdlxsh.exe 884 inwsdlxsh.exe 2992 inwhpwale.exe 2992 inwhpwale.exe 2876 inyjbrycn.exe 2876 inyjbrycn.exe 2092 inbfyviuk.exe 2092 inbfyviuk.exe 1356 inoavpdfe.exe 1356 inoavpdfe.exe 3184 incrjzdkv.exe 3184 incrjzdkv.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 640 NEAS.828776bf0c541dbbd47dc1280b0a5992.exe Token: SeDebugPrivilege 3048 inaexuhtj.exe Token: SeDebugPrivilege 4780 inqcxrfhg.exe Token: SeDebugPrivilege 3548 inlsmacbt.exe Token: SeDebugPrivilege 5084 inruwvobn.exe Token: SeDebugPrivilege 1548 inmtnbdcu.exe Token: SeDebugPrivilege 4952 inqmfrmyb.exe Token: SeDebugPrivilege 1632 injmdckxk.exe Token: SeDebugPrivilege 3516 inuqbjvqf.exe Token: SeDebugPrivilege 1848 inpleqlxa.exe Token: SeDebugPrivilege 4748 inixpjqgj.exe Token: SeDebugPrivilege 3216 indwztgsi.exe Token: SeDebugPrivilege 2608 inxiaqxbm.exe Token: SeDebugPrivilege 1368 inmprqjiy.exe Token: SeDebugPrivilege 1708 inldtepix.exe Token: SeDebugPrivilege 3432 indxawycz.exe Token: SeDebugPrivilege 1356 inefvmlzb.exe Token: SeDebugPrivilege 3944 inetlfmxc.exe Token: SeDebugPrivilege 5084 inaphxbit.exe Token: SeDebugPrivilege 4292 inwixlnmf.exe Token: SeDebugPrivilege 4188 inhwoipfi.exe Token: SeDebugPrivilege 3472 inqtvunam.exe Token: SeDebugPrivilege 1932 inocokdvj.exe Token: SeDebugPrivilege 1292 ingiuiufd.exe Token: SeDebugPrivilege 4764 ineuxonvv.exe Token: SeDebugPrivilege 3256 infhthtec.exe Token: SeDebugPrivilege 884 inwsdlxsh.exe Token: SeDebugPrivilege 2992 inwhpwale.exe Token: SeDebugPrivilege 2876 inyjbrycn.exe Token: SeDebugPrivilege 2092 inbfyviuk.exe Token: SeDebugPrivilege 1356 inoavpdfe.exe Token: SeDebugPrivilege 3184 incrjzdkv.exe Token: SeDebugPrivilege 3476 inrngsnzc.exe Token: SeDebugPrivilege 4620 indskelwb.exe Token: SeDebugPrivilege 3044 inkzrlbas.exe Token: SeDebugPrivilege 2388 inwmpgfnn.exe Token: SeDebugPrivilege 4364 inmeufqjy.exe Token: SeDebugPrivilege 1500 inadbobmd.exe Token: SeDebugPrivilege 4260 inogwahsa.exe Token: SeDebugPrivilege 2520 injyqkarh.exe Token: SeDebugPrivilege 3300 inigtklnv.exe Token: SeDebugPrivilege 3812 injhulmow.exe Token: SeDebugPrivilege 4424 inkbaivic.exe Token: SeDebugPrivilege 2216 indqsmlmh.exe Token: SeDebugPrivilege 1764 inatwyxqd.exe Token: SeDebugPrivilege 1816 inykznpoh.exe Token: SeDebugPrivilege 840 infumgnyd.exe Token: SeDebugPrivilege 4004 inyorihpp.exe Token: SeDebugPrivilege 380 injkrqgyq.exe Token: SeDebugPrivilege 940 inrdysgih.exe Token: SeDebugPrivilege 2940 innqsrkjz.exe Token: SeDebugPrivilege 1844 intcrvwiy.exe Token: SeDebugPrivilege 3928 inpqffxwb.exe Token: SeDebugPrivilege 4276 infdqdofu.exe Token: SeDebugPrivilege 2388 inscqyokc.exe Token: SeDebugPrivilege 3104 inknedlyl.exe Token: SeDebugPrivilege 852 inzkcszdo.exe Token: SeDebugPrivilege 3040 inpbwqegf.exe Token: SeDebugPrivilege 5052 inbmkzbqa.exe Token: SeDebugPrivilege 1348 ingtgabri.exe Token: SeDebugPrivilege 3884 innuocedv.exe Token: SeDebugPrivilege 1376 inilcbjwj.exe Token: SeDebugPrivilege 1936 inmawkptn.exe Token: SeDebugPrivilege 2312 intetdxsy.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 640 NEAS.828776bf0c541dbbd47dc1280b0a5992.exe 3048 inaexuhtj.exe 4780 inqcxrfhg.exe 3548 inlsmacbt.exe 5084 inruwvobn.exe 1548 inmtnbdcu.exe 4952 inqmfrmyb.exe 1632 injmdckxk.exe 3516 inuqbjvqf.exe 1848 inpleqlxa.exe 4748 inixpjqgj.exe 3216 indwztgsi.exe 2608 inxiaqxbm.exe 1368 inmprqjiy.exe 1708 inldtepix.exe 3432 indxawycz.exe 1356 inefvmlzb.exe 3944 inetlfmxc.exe 5084 inaphxbit.exe 4292 inwixlnmf.exe 4188 inhwoipfi.exe 3472 inqtvunam.exe 1932 inocokdvj.exe 1292 ingiuiufd.exe 4764 ineuxonvv.exe 3256 infhthtec.exe 884 inwsdlxsh.exe 2992 inwhpwale.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 640 wrote to memory of 3048 640 NEAS.828776bf0c541dbbd47dc1280b0a5992.exe 91 PID 640 wrote to memory of 3048 640 NEAS.828776bf0c541dbbd47dc1280b0a5992.exe 91 PID 640 wrote to memory of 3048 640 NEAS.828776bf0c541dbbd47dc1280b0a5992.exe 91 PID 3048 wrote to memory of 4780 3048 inaexuhtj.exe 92 PID 3048 wrote to memory of 4780 3048 inaexuhtj.exe 92 PID 3048 wrote to memory of 4780 3048 inaexuhtj.exe 92 PID 4780 wrote to memory of 3548 4780 inqcxrfhg.exe 93 PID 4780 wrote to memory of 3548 4780 inqcxrfhg.exe 93 PID 4780 wrote to memory of 3548 4780 inqcxrfhg.exe 93 PID 3548 wrote to memory of 5084 3548 inlsmacbt.exe 94 PID 3548 wrote to memory of 5084 3548 inlsmacbt.exe 94 PID 3548 wrote to memory of 5084 3548 inlsmacbt.exe 94 PID 5084 wrote to memory of 1548 5084 inruwvobn.exe 95 PID 5084 wrote to memory of 1548 5084 inruwvobn.exe 95 PID 5084 wrote to memory of 1548 5084 inruwvobn.exe 95 PID 1548 wrote to memory of 4952 1548 inmtnbdcu.exe 96 PID 1548 wrote to memory of 4952 1548 inmtnbdcu.exe 96 PID 1548 wrote to memory of 4952 1548 inmtnbdcu.exe 96 PID 4952 wrote to memory of 1632 4952 inqmfrmyb.exe 97 PID 4952 wrote to memory of 1632 4952 inqmfrmyb.exe 97 PID 4952 wrote to memory of 1632 4952 inqmfrmyb.exe 97 PID 1632 wrote to memory of 3516 1632 injmdckxk.exe 98 PID 1632 wrote to memory of 3516 1632 injmdckxk.exe 98 PID 1632 wrote to memory of 3516 1632 injmdckxk.exe 98 PID 3516 wrote to memory of 1848 3516 inuqbjvqf.exe 99 PID 3516 wrote to memory of 1848 3516 inuqbjvqf.exe 99 PID 3516 wrote to memory of 1848 3516 inuqbjvqf.exe 99 PID 1848 wrote to memory of 4748 1848 inpleqlxa.exe 100 PID 1848 wrote to memory of 4748 1848 inpleqlxa.exe 100 PID 1848 wrote to memory of 4748 1848 inpleqlxa.exe 100 PID 4748 wrote to memory of 3216 4748 inixpjqgj.exe 101 PID 4748 wrote to memory of 3216 4748 inixpjqgj.exe 101 PID 4748 wrote to memory of 3216 4748 inixpjqgj.exe 101 PID 3216 wrote to memory of 2608 3216 indwztgsi.exe 102 PID 3216 wrote to memory of 2608 3216 indwztgsi.exe 102 PID 3216 wrote to memory of 2608 3216 indwztgsi.exe 102 PID 2608 wrote to memory of 1368 2608 inxiaqxbm.exe 103 PID 2608 wrote to memory of 1368 2608 inxiaqxbm.exe 103 PID 2608 wrote to memory of 1368 2608 inxiaqxbm.exe 103 PID 1368 wrote to memory of 1708 1368 inmprqjiy.exe 104 PID 1368 wrote to memory of 1708 1368 inmprqjiy.exe 104 PID 1368 wrote to memory of 1708 1368 inmprqjiy.exe 104 PID 1708 wrote to memory of 3432 1708 inldtepix.exe 105 PID 1708 wrote to memory of 3432 1708 inldtepix.exe 105 PID 1708 wrote to memory of 3432 1708 inldtepix.exe 105 PID 3432 wrote to memory of 1356 3432 indxawycz.exe 106 PID 3432 wrote to memory of 1356 3432 indxawycz.exe 106 PID 3432 wrote to memory of 1356 3432 indxawycz.exe 106 PID 1356 wrote to memory of 3944 1356 inefvmlzb.exe 108 PID 1356 wrote to memory of 3944 1356 inefvmlzb.exe 108 PID 1356 wrote to memory of 3944 1356 inefvmlzb.exe 108 PID 3944 wrote to memory of 5084 3944 inetlfmxc.exe 110 PID 3944 wrote to memory of 5084 3944 inetlfmxc.exe 110 PID 3944 wrote to memory of 5084 3944 inetlfmxc.exe 110 PID 5084 wrote to memory of 4292 5084 inaphxbit.exe 111 PID 5084 wrote to memory of 4292 5084 inaphxbit.exe 111 PID 5084 wrote to memory of 4292 5084 inaphxbit.exe 111 PID 4292 wrote to memory of 4188 4292 inwixlnmf.exe 112 PID 4292 wrote to memory of 4188 4292 inwixlnmf.exe 112 PID 4292 wrote to memory of 4188 4292 inwixlnmf.exe 112 PID 4188 wrote to memory of 3472 4188 inhwoipfi.exe 113 PID 4188 wrote to memory of 3472 4188 inhwoipfi.exe 113 PID 4188 wrote to memory of 3472 4188 inhwoipfi.exe 113 PID 3472 wrote to memory of 1932 3472 inqtvunam.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.828776bf0c541dbbd47dc1280b0a5992.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.828776bf0c541dbbd47dc1280b0a5992.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\inaexuhtj.exeC:\Windows\system32\inaexuhtj.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\inruwvobn.exeC:\Windows\system32\inruwvobn.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\inmtnbdcu.exeC:\Windows\system32\inmtnbdcu.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\inqmfrmyb.exeC:\Windows\system32\inqmfrmyb.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\injmdckxk.exeC:\Windows\system32\injmdckxk.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\inuqbjvqf.exeC:\Windows\system32\inuqbjvqf.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\inixpjqgj.exeC:\Windows\system32\inixpjqgj.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\indwztgsi.exeC:\Windows\system32\indwztgsi.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\inxiaqxbm.exeC:\Windows\system32\inxiaqxbm.exe13⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\inldtepix.exeC:\Windows\system32\inldtepix.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\indxawycz.exeC:\Windows\system32\indxawycz.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\inefvmlzb.exeC:\Windows\system32\inefvmlzb.exe17⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\inaphxbit.exeC:\Windows\system32\inaphxbit.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\inhwoipfi.exeC:\Windows\system32\inhwoipfi.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\inqtvunam.exeC:\Windows\system32\inqtvunam.exe22⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\inocokdvj.exeC:\Windows\system32\inocokdvj.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Windows\SysWOW64\ingiuiufd.exeC:\Windows\system32\ingiuiufd.exe24⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Windows\SysWOW64\ineuxonvv.exeC:\Windows\system32\ineuxonvv.exe25⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4764 -
C:\Windows\SysWOW64\infhthtec.exeC:\Windows\system32\infhthtec.exe26⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3256 -
C:\Windows\SysWOW64\inwsdlxsh.exeC:\Windows\system32\inwsdlxsh.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe28⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Windows\SysWOW64\inyjbrycn.exeC:\Windows\system32\inyjbrycn.exe29⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\SysWOW64\inbfyviuk.exeC:\Windows\system32\inbfyviuk.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe31⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1356 -
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe32⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184 -
C:\Windows\SysWOW64\inrngsnzc.exeC:\Windows\system32\inrngsnzc.exe33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3476 -
C:\Windows\SysWOW64\indskelwb.exeC:\Windows\system32\indskelwb.exe34⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4620 -
C:\Windows\SysWOW64\inkzrlbas.exeC:\Windows\system32\inkzrlbas.exe35⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Windows\SysWOW64\inwmpgfnn.exeC:\Windows\system32\inwmpgfnn.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe37⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4364 -
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Windows\SysWOW64\inogwahsa.exeC:\Windows\system32\inogwahsa.exe39⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4260 -
C:\Windows\SysWOW64\injyqkarh.exeC:\Windows\system32\injyqkarh.exe40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Windows\SysWOW64\inigtklnv.exeC:\Windows\system32\inigtklnv.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3300 -
C:\Windows\SysWOW64\injhulmow.exeC:\Windows\system32\injhulmow.exe42⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3812 -
C:\Windows\SysWOW64\inkbaivic.exeC:\Windows\system32\inkbaivic.exe43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4424 -
C:\Windows\SysWOW64\indqsmlmh.exeC:\Windows\system32\indqsmlmh.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\SysWOW64\inatwyxqd.exeC:\Windows\system32\inatwyxqd.exe45⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Windows\SysWOW64\inykznpoh.exeC:\Windows\system32\inykznpoh.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\Windows\SysWOW64\infumgnyd.exeC:\Windows\system32\infumgnyd.exe47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4004 -
C:\Windows\SysWOW64\injkrqgyq.exeC:\Windows\system32\injkrqgyq.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\SysWOW64\inrdysgih.exeC:\Windows\system32\inrdysgih.exe50⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Windows\SysWOW64\innqsrkjz.exeC:\Windows\system32\innqsrkjz.exe51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2940 -
C:\Windows\SysWOW64\intcrvwiy.exeC:\Windows\system32\intcrvwiy.exe52⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Windows\SysWOW64\inpqffxwb.exeC:\Windows\system32\inpqffxwb.exe53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3928 -
C:\Windows\SysWOW64\infdqdofu.exeC:\Windows\system32\infdqdofu.exe54⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4276 -
C:\Windows\SysWOW64\inscqyokc.exeC:\Windows\system32\inscqyokc.exe55⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Windows\SysWOW64\inknedlyl.exeC:\Windows\system32\inknedlyl.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3104 -
C:\Windows\SysWOW64\inzkcszdo.exeC:\Windows\system32\inzkcszdo.exe57⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:852 -
C:\Windows\SysWOW64\inpbwqegf.exeC:\Windows\system32\inpbwqegf.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Windows\SysWOW64\inbmkzbqa.exeC:\Windows\system32\inbmkzbqa.exe59⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5052 -
C:\Windows\SysWOW64\ingtgabri.exeC:\Windows\system32\ingtgabri.exe60⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1348 -
C:\Windows\SysWOW64\innuocedv.exeC:\Windows\system32\innuocedv.exe61⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3884 -
C:\Windows\SysWOW64\inilcbjwj.exeC:\Windows\system32\inilcbjwj.exe62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1376 -
C:\Windows\SysWOW64\inmawkptn.exeC:\Windows\system32\inmawkptn.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\intetdxsy.exeC:\Windows\system32\intetdxsy.exe64⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2312 -
C:\Windows\SysWOW64\inxtleici.exeC:\Windows\system32\inxtleici.exe65⤵
- Executes dropped EXE
PID:888 -
C:\Windows\SysWOW64\inahuhbcs.exeC:\Windows\system32\inahuhbcs.exe66⤵PID:1280
-
C:\Windows\SysWOW64\incbrdfjw.exeC:\Windows\system32\incbrdfjw.exe67⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:4964 -
C:\Windows\SysWOW64\incgzwjvl.exeC:\Windows\system32\incgzwjvl.exe68⤵PID:1752
-
C:\Windows\SysWOW64\intsuvkkg.exeC:\Windows\system32\intsuvkkg.exe69⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:4192 -
C:\Windows\SysWOW64\inazpsjiq.exeC:\Windows\system32\inazpsjiq.exe70⤵
- Modifies Installed Components in the registry
PID:5012 -
C:\Windows\SysWOW64\inecpcnet.exeC:\Windows\system32\inecpcnet.exe71⤵PID:4196
-
C:\Windows\SysWOW64\ingwzqpxx.exeC:\Windows\system32\ingwzqpxx.exe72⤵
- Modifies Installed Components in the registry
PID:3104 -
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe73⤵PID:3540
-
C:\Windows\SysWOW64\ingvzmksi.exeC:\Windows\system32\ingvzmksi.exe74⤵
- Modifies Installed Components in the registry
PID:2084 -
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe75⤵
- Drops file in System32 directory
PID:812 -
C:\Windows\SysWOW64\inxitdtqe.exeC:\Windows\system32\inxitdtqe.exe76⤵PID:4156
-
C:\Windows\SysWOW64\invuwaxma.exeC:\Windows\system32\invuwaxma.exe77⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:1776 -
C:\Windows\SysWOW64\indhxkwmb.exeC:\Windows\system32\indhxkwmb.exe78⤵
- Drops file in System32 directory
PID:2412 -
C:\Windows\SysWOW64\inmibthrw.exeC:\Windows\system32\inmibthrw.exe79⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:572 -
C:\Windows\SysWOW64\inapnrseu.exeC:\Windows\system32\inapnrseu.exe80⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:1844 -
C:\Windows\SysWOW64\inhwfuyzl.exeC:\Windows\system32\inhwfuyzl.exe81⤵
- Drops file in System32 directory
PID:1956 -
C:\Windows\SysWOW64\inpfzcyeq.exeC:\Windows\system32\inpfzcyeq.exe82⤵PID:3484
-
C:\Windows\SysWOW64\injrhdzvq.exeC:\Windows\system32\injrhdzvq.exe83⤵
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\inortslka.exeC:\Windows\system32\inortslka.exe84⤵
- Drops file in System32 directory
PID:312 -
C:\Windows\SysWOW64\inrfpuysy.exeC:\Windows\system32\inrfpuysy.exe85⤵
- Modifies Installed Components in the registry
PID:1656 -
C:\Windows\SysWOW64\insbquvhx.exeC:\Windows\system32\insbquvhx.exe86⤵
- Drops file in System32 directory
PID:3540 -
C:\Windows\SysWOW64\inutvwllh.exeC:\Windows\system32\inutvwllh.exe87⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:3916 -
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe88⤵
- Drops file in System32 directory
PID:4232 -
C:\Windows\SysWOW64\inxjymong.exeC:\Windows\system32\inxjymong.exe89⤵
- Drops file in System32 directory
PID:2864 -
C:\Windows\SysWOW64\intfuikjc.exeC:\Windows\system32\intfuikjc.exe90⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:2908 -
C:\Windows\SysWOW64\inirmhzng.exeC:\Windows\system32\inirmhzng.exe91⤵PID:2064
-
C:\Windows\SysWOW64\inxtemyti.exeC:\Windows\system32\inxtemyti.exe92⤵PID:3776
-
C:\Windows\SysWOW64\inrshhzyd.exeC:\Windows\system32\inrshhzyd.exe93⤵PID:3340
-
C:\Windows\SysWOW64\inewrcnnk.exeC:\Windows\system32\inewrcnnk.exe94⤵
- Drops file in System32 directory
PID:4060 -
C:\Windows\SysWOW64\inbrulkss.exeC:\Windows\system32\inbrulkss.exe95⤵
- Modifies Installed Components in the registry
PID:2672 -
C:\Windows\SysWOW64\inhiypoew.exeC:\Windows\system32\inhiypoew.exe96⤵
- Modifies Installed Components in the registry
PID:4168 -
C:\Windows\SysWOW64\ingvnhoze.exeC:\Windows\system32\ingvnhoze.exe97⤵PID:312
-
C:\Windows\SysWOW64\ingvetxyk.exeC:\Windows\system32\ingvetxyk.exe98⤵PID:1656
-
C:\Windows\SysWOW64\incwvxbyn.exeC:\Windows\system32\incwvxbyn.exe99⤵
- Drops file in System32 directory
PID:3960 -
C:\Windows\SysWOW64\insulctjf.exeC:\Windows\system32\insulctjf.exe100⤵
- Drops file in System32 directory
PID:2608 -
C:\Windows\SysWOW64\inowmiavg.exeC:\Windows\system32\inowmiavg.exe101⤵
- Drops file in System32 directory
PID:3448 -
C:\Windows\SysWOW64\inqjpgzht.exeC:\Windows\system32\inqjpgzht.exe102⤵
- Drops file in System32 directory
PID:2564 -
C:\Windows\SysWOW64\incvyzsfr.exeC:\Windows\system32\incvyzsfr.exe103⤵
- Modifies Installed Components in the registry
PID:4984 -
C:\Windows\SysWOW64\inbqiycju.exeC:\Windows\system32\inbqiycju.exe104⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:4500 -
C:\Windows\SysWOW64\insrzztuj.exeC:\Windows\system32\insrzztuj.exe105⤵PID:2260
-
C:\Windows\SysWOW64\inejnhnnw.exeC:\Windows\system32\inejnhnnw.exe106⤵
- Drops file in System32 directory
PID:4936 -
C:\Windows\SysWOW64\inxnqhgoo.exeC:\Windows\system32\inxnqhgoo.exe107⤵PID:332
-
C:\Windows\SysWOW64\inkivmnpx.exeC:\Windows\system32\inkivmnpx.exe108⤵
- Modifies Installed Components in the registry
PID:2948 -
C:\Windows\SysWOW64\inqgdzfrf.exeC:\Windows\system32\inqgdzfrf.exe109⤵PID:2420
-
C:\Windows\SysWOW64\inatybwnb.exeC:\Windows\system32\inatybwnb.exe110⤵
- Modifies Installed Components in the registry
PID:2096 -
C:\Windows\SysWOW64\inoxdfqoe.exeC:\Windows\system32\inoxdfqoe.exe111⤵PID:4664
-
C:\Windows\SysWOW64\inmnccutj.exeC:\Windows\system32\inmnccutj.exe112⤵
- Modifies Installed Components in the registry
PID:3000 -
C:\Windows\SysWOW64\inbnjcuis.exeC:\Windows\system32\inbnjcuis.exe113⤵PID:4252
-
C:\Windows\SysWOW64\injfqeotx.exeC:\Windows\system32\injfqeotx.exe114⤵PID:4036
-
C:\Windows\SysWOW64\inasgqvzt.exeC:\Windows\system32\inasgqvzt.exe115⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:1048 -
C:\Windows\SysWOW64\inqklaasr.exeC:\Windows\system32\inqklaasr.exe116⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:2348 -
C:\Windows\SysWOW64\indrzpldy.exeC:\Windows\system32\indrzpldy.exe117⤵PID:1956
-
C:\Windows\SysWOW64\inmflkmos.exeC:\Windows\system32\inmflkmos.exe118⤵PID:2024
-
C:\Windows\SysWOW64\inaikwkwh.exeC:\Windows\system32\inaikwkwh.exe119⤵
- Drops file in System32 directory
PID:1764 -
C:\Windows\SysWOW64\ineqbmfxl.exeC:\Windows\system32\ineqbmfxl.exe120⤵
- Modifies Installed Components in the registry
PID:4472 -
C:\Windows\SysWOW64\invrckwrg.exeC:\Windows\system32\invrckwrg.exe121⤵
- Modifies Installed Components in the registry
PID:4808 -
C:\Windows\SysWOW64\inujlcwuk.exeC:\Windows\system32\inujlcwuk.exe122⤵
- Modifies Installed Components in the registry
PID:3984
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-