Analysis
-
max time kernel
179s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2023, 13:52
Behavioral task
behavioral1
Sample
NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe
Resource
win7-20231023-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe
Resource
win10v2004-20231023-en
11 signatures
150 seconds
General
-
Target
NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe
-
Size
348KB
-
MD5
56ad93aaf90eebacf89c97ec8e8f1acf
-
SHA1
06f0145f240221ce8ac20af54826dd02be67ca85
-
SHA256
96efe30402ec6daddbbd2b395f991a60077b8776b4c0fd11f301f4f5937a1738
-
SHA512
608279fb4c80aac30fb3f667d9b70f745977ed60a019edc155c4b3c51a07e0f8af2845032825de16bcdbf29f71606e2231c3a52dce22c02a8278a5cde2c29389
-
SSDEEP
6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0SN:ouLwoZQGpnedeP/deUe1ppGjTGHZRT0B
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 58 IoCs
resource yara_rule behavioral2/memory/1892-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1892-5-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0008000000022ca8-16.dat family_gh0strat behavioral2/files/0x0007000000022ca9-21.dat family_gh0strat behavioral2/files/0x0007000000022ca9-22.dat family_gh0strat behavioral2/files/0x0006000000022caf-41.dat family_gh0strat behavioral2/files/0x0006000000022caf-42.dat family_gh0strat behavioral2/files/0x0006000000022caf-43.dat family_gh0strat behavioral2/memory/1892-60-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1128-61-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cb3-67.dat family_gh0strat behavioral2/memory/2600-70-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cb3-69.dat family_gh0strat behavioral2/files/0x0006000000022cba-90.dat family_gh0strat behavioral2/files/0x0006000000022cba-91.dat family_gh0strat behavioral2/memory/1032-94-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cbf-113.dat family_gh0strat behavioral2/files/0x0006000000022cbf-115.dat family_gh0strat behavioral2/memory/2360-117-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cc3-136.dat family_gh0strat behavioral2/files/0x0006000000022cc3-138.dat family_gh0strat behavioral2/memory/2396-140-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0007000000022cc9-161.dat family_gh0strat behavioral2/memory/3340-163-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0007000000022cc9-159.dat family_gh0strat behavioral2/files/0x0006000000022cd0-184.dat family_gh0strat behavioral2/files/0x0006000000022cd0-182.dat family_gh0strat behavioral2/memory/4564-186-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cd4-205.dat family_gh0strat behavioral2/files/0x0006000000022cd4-207.dat family_gh0strat behavioral2/memory/1516-209-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cde-228.dat family_gh0strat behavioral2/files/0x0006000000022cde-231.dat family_gh0strat behavioral2/memory/4780-230-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022ce6-251.dat family_gh0strat behavioral2/files/0x0006000000022ce6-253.dat family_gh0strat behavioral2/memory/2924-255-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cee-274.dat family_gh0strat behavioral2/files/0x0006000000022cee-276.dat family_gh0strat behavioral2/memory/3752-278-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cf2-299.dat family_gh0strat behavioral2/memory/5064-301-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cf2-297.dat family_gh0strat behavioral2/files/0x0006000000022cf7-320.dat family_gh0strat behavioral2/files/0x0006000000022cf7-322.dat family_gh0strat behavioral2/memory/1892-324-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cfb-345.dat family_gh0strat behavioral2/memory/2056-346-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1240-348-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cfb-343.dat family_gh0strat behavioral2/files/0x0006000000022306-366.dat family_gh0strat behavioral2/files/0x0006000000022306-368.dat family_gh0strat behavioral2/memory/2056-369-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4220-389-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/640-408-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4656-427-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/5076-446-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3244-465-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat -
Modifies Installed Components in the registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D94477A-B580-4df9-BB5B-F93BED1985A3} inbsfowhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C697D715-1E44-447a-BCAC-06A2F3341DB3}\stubpath = "C:\\Windows\\system32\\injyixbhg.exe" inlhzufqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4AD9827E-8443-4990-B4FD-366ADEFC82F5} inqnbrgit.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{32E33649-230F-4e2a-869C-7CD827CC9CA7} inigtklnv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{08BEAB4E-25EB-4724-8F5B-972B58FF65CF}\stubpath = "C:\\Windows\\system32\\inaexuhtj.exe" indqsmlmh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D16F9159-783C-41b8-82D7-91546FAAE2F3}\stubpath = "C:\\Windows\\system32\\ineybxzdp.exe" inqgdzfrf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{97813342-6B68-4f7d-93A1-0CF060A41E97} inogwahsa.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DED72818-D98F-4f2c-862E-14EB7775843F} inbuzcxoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C16360C5-AA71-4a85-BC42-1C68B4506A0C}\stubpath = "C:\\Windows\\system32\\inykmqjhq.exe" inwikohfo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EF4017B5-531D-4a5a-A98C-BD367ED3F8A1} inbpxnjbw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DF18E30F-3AC4-4210-9265-AF71B2D8AE86}\stubpath = "C:\\Windows\\system32\\inwgusogd.exe" inbqostfv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7467C996-387E-4d7b-B2A2-7FF75D740193} inortslka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0ED87003-1586-4209-9904-60AF677CC55D}\stubpath = "C:\\Windows\\system32\\inupkqjvx.exe" ineuxonvv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BE5D8309-01A0-497f-AE11-BB107E8D5B93} injyixbhg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7467C996-387E-4d7b-B2A2-7FF75D740193}\stubpath = "C:\\Windows\\system32\\inyjbrycn.exe" inortslka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52B2474F-6B0C-4026-8A2E-8A37EE232B77}\stubpath = "C:\\Windows\\system32\\indlyubtu.exe" inmktaxgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{53CCFDF7-F65D-47e9-BD83-46B1F9DE0404}\stubpath = "C:\\Windows\\system32\\inykznpoh.exe" ingvnhoze.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{96B99915-6535-481d-B4E5-BE3369377E7B}\stubpath = "C:\\Windows\\system32\\inpleqlxa.exe" inykznpoh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F655F16-C5ED-420a-9E93-9770714D2BB2} inrdysgih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E238CD6-3110-4d4e-9D4A-98B31BAF2993}\stubpath = "C:\\Windows\\system32\\inpsutmlb.exe" injhulmow.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6CAE6B7A-D3C1-4825-99B7-652FBAFB17B4} inmprqjiy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{279B8190-14ED-412a-8999-D20A44D2C995}\stubpath = "C:\\Windows\\system32\\invuwaxma.exe" incgzwjvl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E7022F85-346F-4abf-B6FF-7E550ACC7CE2} inbjwysrs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F5B7A281-4F67-4b1e-8832-ECF62A7AEECA}\stubpath = "C:\\Windows\\system32\\injlxlxig.exe" innlypqcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E9E7C7A7-9E77-45bb-8AEB-E559C184091E}\stubpath = "C:\\Windows\\system32\\inmeufqjy.exe" NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{403051C7-9420-45c9-B459-9A2402E755D7} inqtvunam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{403051C7-9420-45c9-B459-9A2402E755D7}\stubpath = "C:\\Windows\\system32\\inxjymong.exe" inqtvunam.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4184D9BE-CEC3-48fb-92AC-656C77C1B46C} inbqiycju.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5594BD0-7C7D-4ddc-A3BE-697BF43EE067} innfvgrkz.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE64F8A5-F0F3-41ed-8F79-37FA57837263} initcmsrt.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{88780F9D-3E34-4cbd-9237-2D0E7C6E708F} inulkzdji.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{41FD3FEB-040C-4582-8740-6452EB6BAF2D} indwezqep.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D94477A-B580-4df9-BB5B-F93BED1985A3}\stubpath = "C:\\Windows\\system32\\inlhzufqa.exe" inbsfowhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5558F855-DC4F-4c59-A8A9-55B3B23740AC}\stubpath = "C:\\Windows\\system32\\inpkvggzd.exe" inqxvmprs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{457F48BF-F21A-46d8-8DE8-508E37DA7AB8}\stubpath = "C:\\Windows\\system32\\ingrakqpr.exe" inudpxert.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{690EDCD2-1481-436e-B092-51DBB85680E8}\stubpath = "C:\\Windows\\system32\\inruwvobn.exe" inzloqpih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5ACD81D1-899C-4488-A704-DDE5DD721319}\stubpath = "C:\\Windows\\system32\\infslrijv.exe" inbrulkss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8A6814B4-0DD9-475a-81D9-CE0870D4271E}\stubpath = "C:\\Windows\\system32\\inxnqhgoo.exe" inoavpdfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D17B66B-1846-45d1-B7B4-9A92BAB7B2BC} ingtgabri.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8EE6234A-2C76-4932-BFF4-7ADF7D459C57}\stubpath = "C:\\Windows\\system32\\inktbmkag.exe" insaljfpw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{690EDCD2-1481-436e-B092-51DBB85680E8} inzloqpih.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4A8B32D3-D54E-4568-AAF3-23A3CB4F9F5A} inhegsgsd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{53CCFDF7-F65D-47e9-BD83-46B1F9DE0404} ingvnhoze.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{60AA90E3-8A2F-40c0-AD1B-F50E008F5255} inkivmnpx.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{33256B50-6F0A-4977-A86B-C706E08DC17F} insrzztuj.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52B2474F-6B0C-4026-8A2E-8A37EE232B77} inmktaxgs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1035D876-5912-448c-B44A-5CFA8662E93D}\stubpath = "C:\\Windows\\system32\\inqxvmprs.exe" incvyzsfr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1F655F16-C5ED-420a-9E93-9770714D2BB2}\stubpath = "C:\\Windows\\system32\\inigtklnv.exe" inrdysgih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6234683D-4945-40e3-B712-243A56B68164}\stubpath = "C:\\Windows\\system32\\injmdckxk.exe" inpbwqegf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8A6814B4-0DD9-475a-81D9-CE0870D4271E} inoavpdfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ADBB2B09-0A5D-478a-9406-DB4362E17144} innoddvuk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{35DF697A-DAA6-43e2-A2FA-A7353466AA4F} inaivxrqr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0DA2372D-DDDD-4fb4-AA10-2E15809A90D1}\stubpath = "C:\\Windows\\system32\\innoddvuk.exe" inrshhzyd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4292DF07-812A-4b89-90FA-F756394C08AD}\stubpath = "C:\\Windows\\system32\\invpovkyk.exe" incrjzdkv.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6BCD3F7A-2F39-478c-B941-C4FA9D3FCDDB} inmeufqjy.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B1FB2F60-4D88-4022-8CDD-81336D7B5B6F} inbfyviuk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BD1F6CE2-0714-482b-A931-8EC78529C842}\stubpath = "C:\\Windows\\system32\\inbuxzyre.exe" intfuikjc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6DA94728-9052-4786-A7DE-BB0DE4DE0331} inqrggyxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{25F98786-9694-4367-85FD-04EA09752FCF} inxsdoolp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{25F98786-9694-4367-85FD-04EA09752FCF}\stubpath = "C:\\Windows\\system32\\inxrqyyst.exe" inxsdoolp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C53A95D9-B4AF-42db-BA95-B0DF1B92AADA}\stubpath = "C:\\Windows\\system32\\intcrvwiy.exe" incsvmltt.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{76ED3074-8292-4c3d-80B2-757152CC70E2} insbquvhx.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{730B1082-2D9A-44e1-A57A-8EDD79ECF2CF} inesqmezb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BE5D8309-01A0-497f-AE11-BB107E8D5B93}\stubpath = "C:\\Windows\\system32\\ingiuiufd.exe" injyixbhg.exe -
ACProtect 1.3x - 1.4x DLL software 33 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0007000000022ca7-4.dat acprotect behavioral2/files/0x0007000000022ca7-2.dat acprotect behavioral2/files/0x0007000000022ca7-14.dat acprotect behavioral2/files/0x0009000000022cad-24.dat acprotect behavioral2/files/0x0009000000022cad-26.dat acprotect behavioral2/files/0x0006000000022cb1-45.dat acprotect behavioral2/files/0x0006000000022cb1-47.dat acprotect behavioral2/files/0x0006000000022cb7-72.dat acprotect behavioral2/files/0x0006000000022cb7-74.dat acprotect behavioral2/files/0x0006000000022cbc-95.dat acprotect behavioral2/files/0x0006000000022cbc-97.dat acprotect behavioral2/files/0x0006000000022cc1-120.dat acprotect behavioral2/files/0x0006000000022cc1-118.dat acprotect behavioral2/files/0x0006000000022cca-141.dat acprotect behavioral2/files/0x0006000000022cca-143.dat acprotect behavioral2/files/0x0007000000022ccc-164.dat acprotect behavioral2/files/0x0007000000022ccc-166.dat acprotect behavioral2/files/0x0006000000022cd2-187.dat acprotect behavioral2/files/0x0006000000022cd2-189.dat acprotect behavioral2/files/0x0006000000022cd6-212.dat acprotect behavioral2/files/0x0006000000022cd6-210.dat acprotect behavioral2/files/0x0006000000022ce3-233.dat acprotect behavioral2/files/0x0006000000022ce3-235.dat acprotect behavioral2/files/0x0006000000022cea-256.dat acprotect behavioral2/files/0x0006000000022cea-258.dat acprotect behavioral2/files/0x0006000000022cf0-279.dat acprotect behavioral2/files/0x0006000000022cf0-281.dat acprotect behavioral2/files/0x0007000000022cf3-304.dat acprotect behavioral2/files/0x0007000000022cf3-302.dat acprotect behavioral2/files/0x0006000000022cf9-325.dat acprotect behavioral2/files/0x0006000000022cf9-327.dat acprotect behavioral2/files/0x0006000000022cfd-351.dat acprotect behavioral2/files/0x0006000000022cfd-349.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 1128 inmeufqjy.exe 2600 inrngsnzc.exe 1032 inwhpwale.exe 2360 insvxwpco.exe 2396 inmtnbdcu.exe 3340 inzvgovkd.exe 4564 injyqkarh.exe 1516 inqmfrmyb.exe 4780 inbfyviuk.exe 2924 inqtvunam.exe 3752 inxjymong.exe 5064 ingvnhoze.exe 1892 inykznpoh.exe 1240 inpleqlxa.exe 2056 inaphxbit.exe 4220 inbqiycju.exe 640 incanalcr.exe 4656 indwztgsi.exe 5076 inzloqpih.exe 3244 inruwvobn.exe 864 innqsrkjz.exe 4548 inrdysgih.exe 4756 inigtklnv.exe 3220 intfuikjc.exe 1040 inbuxzyre.exe 2600 inetlfmxc.exe 2560 inugvjlkd.exe 3528 innfvgrkz.exe 3476 indqsmlmh.exe 3852 inaexuhtj.exe 3340 inuqbjvqf.exe 4228 indhxkwmb.exe 384 inqgdzfrf.exe 3428 ineybxzdp.exe 2520 invrckwrg.exe 1340 inknedlyl.exe 2868 inlsmacbt.exe 1040 injhulmow.exe 5056 inpsutmlb.exe 2140 infvypoww.exe 3528 inbpxnjbw.exe 2128 inomzqrdt.exe 2512 inhfsfaqh.exe 1260 inpbwqegf.exe 4416 injmdckxk.exe 3876 incgzwjvl.exe 4496 invuwaxma.exe 1228 inaikwkwh.exe 3056 inbrulkss.exe 2616 infslrijv.exe 4624 indpalewk.exe 3708 incsvmltt.exe 2568 intcrvwiy.exe 3720 inhscspdt.exe 3800 inogwahsa.exe 4948 inertnmni.exe 3684 inwixlnmf.exe 5044 inkivmnpx.exe 4228 inbjwysrs.exe 4616 inxtemyti.exe 3448 infdqdofu.exe 4788 inoavpdfe.exe 2636 inxnqhgoo.exe 1556 inwmpgfnn.exe -
Loads dropped DLL 64 IoCs
pid Process 1892 NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe 1892 NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe 1128 inmeufqjy.exe 1128 inmeufqjy.exe 2600 inrngsnzc.exe 2600 inrngsnzc.exe 1032 inwhpwale.exe 1032 inwhpwale.exe 2360 insvxwpco.exe 2360 insvxwpco.exe 2396 inmtnbdcu.exe 2396 inmtnbdcu.exe 3340 inzvgovkd.exe 3340 inzvgovkd.exe 4564 injyqkarh.exe 4564 injyqkarh.exe 1516 inqmfrmyb.exe 1516 inqmfrmyb.exe 4780 inbfyviuk.exe 4780 inbfyviuk.exe 2924 inqtvunam.exe 2924 inqtvunam.exe 3752 inxjymong.exe 3752 inxjymong.exe 5064 ingvnhoze.exe 5064 ingvnhoze.exe 1892 inykznpoh.exe 1892 inykznpoh.exe 1240 inpleqlxa.exe 1240 inpleqlxa.exe 2056 inaphxbit.exe 2056 inaphxbit.exe 4220 inbqiycju.exe 4220 inbqiycju.exe 640 incanalcr.exe 640 incanalcr.exe 4656 indwztgsi.exe 4656 indwztgsi.exe 5076 inzloqpih.exe 5076 inzloqpih.exe 3244 inruwvobn.exe 3244 inruwvobn.exe 864 innqsrkjz.exe 864 innqsrkjz.exe 4548 inrdysgih.exe 4548 inrdysgih.exe 4756 inigtklnv.exe 4756 inigtklnv.exe 3220 intfuikjc.exe 3220 intfuikjc.exe 1040 inbuxzyre.exe 1040 inbuxzyre.exe 2600 inetlfmxc.exe 2600 inetlfmxc.exe 2560 inugvjlkd.exe 2560 inugvjlkd.exe 3528 innfvgrkz.exe 3528 innfvgrkz.exe 3476 indqsmlmh.exe 3476 indqsmlmh.exe 3852 inaexuhtj.exe 3852 inaexuhtj.exe 3340 inuqbjvqf.exe 3340 inuqbjvqf.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\inugvjlkd.exe_lang.ini inetlfmxc.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inknedlyl.exe File opened for modification C:\Windows\SysWOW64\syslog.dat insezthji.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inocymrvp.exe File opened for modification C:\Windows\SysWOW64\syslog.dat injyixbhg.exe File created C:\Windows\SysWOW64\inczeboin.exe inocymrvp.exe File opened for modification C:\Windows\SysWOW64\inwhpwale.exe_lang.ini inrngsnzc.exe File opened for modification C:\Windows\SysWOW64\insezthji.exe_lang.ini inmibthrw.exe File opened for modification C:\Windows\SysWOW64\intpaiupe.exe_lang.ini inljyapnv.exe File opened for modification C:\Windows\SysWOW64\syslog.dat incanalcr.exe File opened for modification C:\Windows\SysWOW64\syslog.dat incgzwjvl.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inefvmlzb.exe File opened for modification C:\Windows\SysWOW64\inlhzufqa.exe_lang.ini inbsfowhf.exe File opened for modification C:\Windows\SysWOW64\inpfzcyeq.exe_lang.ini inhjvjvge.exe File opened for modification C:\Windows\SysWOW64\syslog.dat incvyzsfr.exe File created C:\Windows\SysWOW64\injyqkarh.exe inzvgovkd.exe File opened for modification C:\Windows\SysWOW64\inaexuhtj.exe_lang.ini indqsmlmh.exe File opened for modification C:\Windows\SysWOW64\indpalewk.exe_lang.ini infslrijv.exe File created C:\Windows\SysWOW64\inbjwysrs.exe inkivmnpx.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inbsfowhf.exe File opened for modification C:\Windows\SysWOW64\ineuxonvv.exe_lang.ini incqysiyz.exe File opened for modification C:\Windows\SysWOW64\inbuxzyre.exe_lang.ini intfuikjc.exe File created C:\Windows\SysWOW64\infhthtec.exe inuwftrhn.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inesqmezb.exe File opened for modification C:\Windows\SysWOW64\infslrijv.exe_lang.ini inbrulkss.exe File created C:\Windows\SysWOW64\insohtodl.exe inefvmlzb.exe File created C:\Windows\SysWOW64\invpovkyk.exe incrjzdkv.exe File opened for modification C:\Windows\SysWOW64\injyixbhg.exe_lang.ini inlhzufqa.exe File created C:\Windows\SysWOW64\invqmdynu.exe ingiuiufd.exe File opened for modification C:\Windows\SysWOW64\syslog.dat ineuxonvv.exe File opened for modification C:\Windows\SysWOW64\innoddvuk.exe_lang.ini inrshhzyd.exe File opened for modification C:\Windows\SysWOW64\inulkzdji.exe_lang.ini intpaiupe.exe File opened for modification C:\Windows\SysWOW64\inrfpuysy.exe_lang.ini inmhxsddw.exe File created C:\Windows\SysWOW64\ingiuiufd.exe injyixbhg.exe File opened for modification C:\Windows\SysWOW64\inhiypoew.exe_lang.ini innoddvuk.exe File opened for modification C:\Windows\SysWOW64\inddmxhxc.exe_lang.ini inadbobmd.exe File created C:\Windows\SysWOW64\inmktaxgs.exe inpfzcyeq.exe File opened for modification C:\Windows\SysWOW64\inczeboin.exe_lang.ini inocymrvp.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inczeboin.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inqrggyxc.exe File created C:\Windows\SysWOW64\innqsrkjz.exe inruwvobn.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inulkzdji.exe File created C:\Windows\SysWOW64\infgwnmcy.exe inpkvggzd.exe File created C:\Windows\SysWOW64\inmibthrw.exe inikbvtjp.exe File created C:\Windows\SysWOW64\inuwftrhn.exe inngmlnpt.exe File opened for modification C:\Windows\SysWOW64\inadbobmd.exe_lang.ini inxtleici.exe File created C:\Windows\SysWOW64\intpaiupe.exe inljyapnv.exe File created C:\Windows\SysWOW64\incvyzsfr.exe inijzqpfx.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inkietvme.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpleqlxa.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inbrulkss.exe File created C:\Windows\SysWOW64\ingwzqpxx.exe injlxlxig.exe File opened for modification C:\Windows\SysWOW64\syslog.dat ingtgabri.exe File created C:\Windows\SysWOW64\inrkqhiua.exe indlyubtu.exe File created C:\Windows\SysWOW64\innoddvuk.exe inrshhzyd.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inmeufqjy.exe File created C:\Windows\SysWOW64\inyjbrycn.exe inortslka.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inortslka.exe File created C:\Windows\SysWOW64\inykznpoh.exe ingvnhoze.exe File opened for modification C:\Windows\SysWOW64\inlsmacbt.exe_lang.ini inknedlyl.exe File created C:\Windows\SysWOW64\inaikwkwh.exe invuwaxma.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inertnmni.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inkzrlbas.exe File opened for modification C:\Windows\SysWOW64\inrngsnzc.exe_lang.ini inmeufqjy.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1892 NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe 1892 NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe 1128 inmeufqjy.exe 1128 inmeufqjy.exe 2600 inrngsnzc.exe 2600 inrngsnzc.exe 1032 inwhpwale.exe 1032 inwhpwale.exe 2360 insvxwpco.exe 2360 insvxwpco.exe 2396 inmtnbdcu.exe 2396 inmtnbdcu.exe 3340 inzvgovkd.exe 3340 inzvgovkd.exe 4564 injyqkarh.exe 4564 injyqkarh.exe 1516 inqmfrmyb.exe 1516 inqmfrmyb.exe 4780 inbfyviuk.exe 4780 inbfyviuk.exe 2924 inqtvunam.exe 2924 inqtvunam.exe 3752 inxjymong.exe 3752 inxjymong.exe 5064 ingvnhoze.exe 5064 ingvnhoze.exe 1892 inykznpoh.exe 1892 inykznpoh.exe 1240 inpleqlxa.exe 1240 inpleqlxa.exe 2056 inaphxbit.exe 2056 inaphxbit.exe 4220 inbqiycju.exe 4220 inbqiycju.exe 640 incanalcr.exe 640 incanalcr.exe 4656 indwztgsi.exe 4656 indwztgsi.exe 5076 inzloqpih.exe 5076 inzloqpih.exe 3244 inruwvobn.exe 3244 inruwvobn.exe 864 innqsrkjz.exe 864 innqsrkjz.exe 4548 inrdysgih.exe 4548 inrdysgih.exe 4756 inigtklnv.exe 4756 inigtklnv.exe 3220 intfuikjc.exe 3220 intfuikjc.exe 1040 inbuxzyre.exe 1040 inbuxzyre.exe 2600 inetlfmxc.exe 2600 inetlfmxc.exe 2560 inugvjlkd.exe 2560 inugvjlkd.exe 3528 innfvgrkz.exe 3528 innfvgrkz.exe 3476 indqsmlmh.exe 3476 indqsmlmh.exe 3852 inaexuhtj.exe 3852 inaexuhtj.exe 3340 inuqbjvqf.exe 3340 inuqbjvqf.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1892 NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe Token: SeDebugPrivilege 1128 inmeufqjy.exe Token: SeDebugPrivilege 2600 inrngsnzc.exe Token: SeDebugPrivilege 1032 inwhpwale.exe Token: SeDebugPrivilege 2360 insvxwpco.exe Token: SeDebugPrivilege 2396 inmtnbdcu.exe Token: SeDebugPrivilege 3340 inzvgovkd.exe Token: SeDebugPrivilege 4564 injyqkarh.exe Token: SeDebugPrivilege 1516 inqmfrmyb.exe Token: SeDebugPrivilege 4780 inbfyviuk.exe Token: SeDebugPrivilege 2924 inqtvunam.exe Token: SeDebugPrivilege 3752 inxjymong.exe Token: SeDebugPrivilege 5064 ingvnhoze.exe Token: SeDebugPrivilege 1892 inykznpoh.exe Token: SeDebugPrivilege 1240 inpleqlxa.exe Token: SeDebugPrivilege 2056 inaphxbit.exe Token: SeDebugPrivilege 4220 inbqiycju.exe Token: SeDebugPrivilege 640 incanalcr.exe Token: SeDebugPrivilege 4656 indwztgsi.exe Token: SeDebugPrivilege 5076 inzloqpih.exe Token: SeDebugPrivilege 3244 inruwvobn.exe Token: SeDebugPrivilege 864 innqsrkjz.exe Token: SeDebugPrivilege 4548 inrdysgih.exe Token: SeDebugPrivilege 4756 inigtklnv.exe Token: SeDebugPrivilege 3220 intfuikjc.exe Token: SeDebugPrivilege 1040 inbuxzyre.exe Token: SeDebugPrivilege 2600 inetlfmxc.exe Token: SeDebugPrivilege 2560 inugvjlkd.exe Token: SeDebugPrivilege 3528 innfvgrkz.exe Token: SeDebugPrivilege 3476 indqsmlmh.exe Token: SeDebugPrivilege 3852 inaexuhtj.exe Token: SeDebugPrivilege 3340 inuqbjvqf.exe Token: SeDebugPrivilege 4228 indhxkwmb.exe Token: SeDebugPrivilege 384 inqgdzfrf.exe Token: SeDebugPrivilege 3428 ineybxzdp.exe Token: SeDebugPrivilege 2520 invrckwrg.exe Token: SeDebugPrivilege 1340 inknedlyl.exe Token: SeDebugPrivilege 2868 inlsmacbt.exe Token: SeDebugPrivilege 1040 injhulmow.exe Token: SeDebugPrivilege 5056 inpsutmlb.exe Token: SeDebugPrivilege 2140 infvypoww.exe Token: SeDebugPrivilege 3528 inbpxnjbw.exe Token: SeDebugPrivilege 2128 inomzqrdt.exe Token: SeDebugPrivilege 2512 inhfsfaqh.exe Token: SeDebugPrivilege 1260 inpbwqegf.exe Token: SeDebugPrivilege 4416 injmdckxk.exe Token: SeDebugPrivilege 3876 incgzwjvl.exe Token: SeDebugPrivilege 4496 invuwaxma.exe Token: SeDebugPrivilege 1228 inaikwkwh.exe Token: SeDebugPrivilege 3056 inbrulkss.exe Token: SeDebugPrivilege 2616 infslrijv.exe Token: SeDebugPrivilege 4624 indpalewk.exe Token: SeDebugPrivilege 3708 incsvmltt.exe Token: SeDebugPrivilege 2568 intcrvwiy.exe Token: SeDebugPrivilege 3720 inhscspdt.exe Token: SeDebugPrivilege 3800 inogwahsa.exe Token: SeDebugPrivilege 4948 inertnmni.exe Token: SeDebugPrivilege 3684 inwixlnmf.exe Token: SeDebugPrivilege 5044 inkivmnpx.exe Token: SeDebugPrivilege 4228 inbjwysrs.exe Token: SeDebugPrivilege 4616 inxtemyti.exe Token: SeDebugPrivilege 3448 infdqdofu.exe Token: SeDebugPrivilege 4788 inoavpdfe.exe Token: SeDebugPrivilege 2636 inxnqhgoo.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 1892 NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe 1128 inmeufqjy.exe 2600 inrngsnzc.exe 1032 inwhpwale.exe 2360 insvxwpco.exe 2396 inmtnbdcu.exe 3340 inzvgovkd.exe 4564 injyqkarh.exe 1516 inqmfrmyb.exe 4780 inbfyviuk.exe 2924 inqtvunam.exe 3752 inxjymong.exe 5064 ingvnhoze.exe 1892 inykznpoh.exe 1240 inpleqlxa.exe 2056 inaphxbit.exe 4220 inbqiycju.exe 640 incanalcr.exe 4656 indwztgsi.exe 5076 inzloqpih.exe 3244 inruwvobn.exe 864 innqsrkjz.exe 4548 inrdysgih.exe 4756 inigtklnv.exe 3220 intfuikjc.exe 1040 inbuxzyre.exe 2600 inetlfmxc.exe 2560 inugvjlkd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1892 wrote to memory of 1128 1892 NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe 90 PID 1892 wrote to memory of 1128 1892 NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe 90 PID 1892 wrote to memory of 1128 1892 NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe 90 PID 1128 wrote to memory of 2600 1128 inmeufqjy.exe 91 PID 1128 wrote to memory of 2600 1128 inmeufqjy.exe 91 PID 1128 wrote to memory of 2600 1128 inmeufqjy.exe 91 PID 2600 wrote to memory of 1032 2600 inrngsnzc.exe 93 PID 2600 wrote to memory of 1032 2600 inrngsnzc.exe 93 PID 2600 wrote to memory of 1032 2600 inrngsnzc.exe 93 PID 1032 wrote to memory of 2360 1032 inwhpwale.exe 95 PID 1032 wrote to memory of 2360 1032 inwhpwale.exe 95 PID 1032 wrote to memory of 2360 1032 inwhpwale.exe 95 PID 2360 wrote to memory of 2396 2360 insvxwpco.exe 96 PID 2360 wrote to memory of 2396 2360 insvxwpco.exe 96 PID 2360 wrote to memory of 2396 2360 insvxwpco.exe 96 PID 2396 wrote to memory of 3340 2396 inmtnbdcu.exe 97 PID 2396 wrote to memory of 3340 2396 inmtnbdcu.exe 97 PID 2396 wrote to memory of 3340 2396 inmtnbdcu.exe 97 PID 3340 wrote to memory of 4564 3340 inzvgovkd.exe 98 PID 3340 wrote to memory of 4564 3340 inzvgovkd.exe 98 PID 3340 wrote to memory of 4564 3340 inzvgovkd.exe 98 PID 4564 wrote to memory of 1516 4564 injyqkarh.exe 99 PID 4564 wrote to memory of 1516 4564 injyqkarh.exe 99 PID 4564 wrote to memory of 1516 4564 injyqkarh.exe 99 PID 1516 wrote to memory of 4780 1516 inqmfrmyb.exe 101 PID 1516 wrote to memory of 4780 1516 inqmfrmyb.exe 101 PID 1516 wrote to memory of 4780 1516 inqmfrmyb.exe 101 PID 4780 wrote to memory of 2924 4780 inbfyviuk.exe 102 PID 4780 wrote to memory of 2924 4780 inbfyviuk.exe 102 PID 4780 wrote to memory of 2924 4780 inbfyviuk.exe 102 PID 2924 wrote to memory of 3752 2924 inqtvunam.exe 103 PID 2924 wrote to memory of 3752 2924 inqtvunam.exe 103 PID 2924 wrote to memory of 3752 2924 inqtvunam.exe 103 PID 3752 wrote to memory of 5064 3752 inxjymong.exe 104 PID 3752 wrote to memory of 5064 3752 inxjymong.exe 104 PID 3752 wrote to memory of 5064 3752 inxjymong.exe 104 PID 5064 wrote to memory of 1892 5064 ingvnhoze.exe 105 PID 5064 wrote to memory of 1892 5064 ingvnhoze.exe 105 PID 5064 wrote to memory of 1892 5064 ingvnhoze.exe 105 PID 1892 wrote to memory of 1240 1892 inykznpoh.exe 106 PID 1892 wrote to memory of 1240 1892 inykznpoh.exe 106 PID 1892 wrote to memory of 1240 1892 inykznpoh.exe 106 PID 1240 wrote to memory of 2056 1240 inpleqlxa.exe 107 PID 1240 wrote to memory of 2056 1240 inpleqlxa.exe 107 PID 1240 wrote to memory of 2056 1240 inpleqlxa.exe 107 PID 2056 wrote to memory of 4220 2056 inaphxbit.exe 108 PID 2056 wrote to memory of 4220 2056 inaphxbit.exe 108 PID 2056 wrote to memory of 4220 2056 inaphxbit.exe 108 PID 4220 wrote to memory of 640 4220 inbqiycju.exe 109 PID 4220 wrote to memory of 640 4220 inbqiycju.exe 109 PID 4220 wrote to memory of 640 4220 inbqiycju.exe 109 PID 640 wrote to memory of 4656 640 incanalcr.exe 111 PID 640 wrote to memory of 4656 640 incanalcr.exe 111 PID 640 wrote to memory of 4656 640 incanalcr.exe 111 PID 4656 wrote to memory of 5076 4656 indwztgsi.exe 112 PID 4656 wrote to memory of 5076 4656 indwztgsi.exe 112 PID 4656 wrote to memory of 5076 4656 indwztgsi.exe 112 PID 5076 wrote to memory of 3244 5076 inzloqpih.exe 113 PID 5076 wrote to memory of 3244 5076 inzloqpih.exe 113 PID 5076 wrote to memory of 3244 5076 inzloqpih.exe 113 PID 3244 wrote to memory of 864 3244 inruwvobn.exe 114 PID 3244 wrote to memory of 864 3244 inruwvobn.exe 114 PID 3244 wrote to memory of 864 3244 inruwvobn.exe 114 PID 864 wrote to memory of 4548 864 innqsrkjz.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.56ad93aaf90eebacf89c97ec8e8f1acf.exe"1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\inrngsnzc.exeC:\Windows\system32\inrngsnzc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\insvxwpco.exeC:\Windows\system32\insvxwpco.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\inmtnbdcu.exeC:\Windows\system32\inmtnbdcu.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\injyqkarh.exeC:\Windows\system32\injyqkarh.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\inqmfrmyb.exeC:\Windows\system32\inqmfrmyb.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\inbfyviuk.exeC:\Windows\system32\inbfyviuk.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\inqtvunam.exeC:\Windows\system32\inqtvunam.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\inxjymong.exeC:\Windows\system32\inxjymong.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\ingvnhoze.exeC:\Windows\system32\ingvnhoze.exe13⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\inykznpoh.exeC:\Windows\system32\inykznpoh.exe14⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\inaphxbit.exeC:\Windows\system32\inaphxbit.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\inbqiycju.exeC:\Windows\system32\inbqiycju.exe17⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\incanalcr.exeC:\Windows\system32\incanalcr.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\indwztgsi.exeC:\Windows\system32\indwztgsi.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\inzloqpih.exeC:\Windows\system32\inzloqpih.exe20⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\inruwvobn.exeC:\Windows\system32\inruwvobn.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\innqsrkjz.exeC:\Windows\system32\innqsrkjz.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\inrdysgih.exeC:\Windows\system32\inrdysgih.exe23⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4548 -
C:\Windows\SysWOW64\inigtklnv.exeC:\Windows\system32\inigtklnv.exe24⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4756 -
C:\Windows\SysWOW64\intfuikjc.exeC:\Windows\system32\intfuikjc.exe25⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3220 -
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1040 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Windows\SysWOW64\inugvjlkd.exeC:\Windows\system32\inugvjlkd.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Windows\SysWOW64\innfvgrkz.exeC:\Windows\system32\innfvgrkz.exe29⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528 -
C:\Windows\SysWOW64\indqsmlmh.exeC:\Windows\system32\indqsmlmh.exe30⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3476 -
C:\Windows\SysWOW64\inaexuhtj.exeC:\Windows\system32\inaexuhtj.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3852 -
C:\Windows\SysWOW64\inuqbjvqf.exeC:\Windows\system32\inuqbjvqf.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340 -
C:\Windows\SysWOW64\indhxkwmb.exeC:\Windows\system32\indhxkwmb.exe33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4228 -
C:\Windows\SysWOW64\inqgdzfrf.exeC:\Windows\system32\inqgdzfrf.exe34⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:384 -
C:\Windows\SysWOW64\ineybxzdp.exeC:\Windows\system32\ineybxzdp.exe35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3428 -
C:\Windows\SysWOW64\invrckwrg.exeC:\Windows\system32\invrckwrg.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Windows\SysWOW64\inknedlyl.exeC:\Windows\system32\inknedlyl.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1340 -
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Windows\SysWOW64\injhulmow.exeC:\Windows\system32\injhulmow.exe39⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1040 -
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\Windows\SysWOW64\infvypoww.exeC:\Windows\system32\infvypoww.exe41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2140 -
C:\Windows\SysWOW64\inbpxnjbw.exeC:\Windows\system32\inbpxnjbw.exe42⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3528 -
C:\Windows\SysWOW64\inomzqrdt.exeC:\Windows\system32\inomzqrdt.exe43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2128 -
C:\Windows\SysWOW64\inhfsfaqh.exeC:\Windows\system32\inhfsfaqh.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2512 -
C:\Windows\SysWOW64\inpbwqegf.exeC:\Windows\system32\inpbwqegf.exe45⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1260 -
C:\Windows\SysWOW64\injmdckxk.exeC:\Windows\system32\injmdckxk.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4416 -
C:\Windows\SysWOW64\incgzwjvl.exeC:\Windows\system32\incgzwjvl.exe47⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3876 -
C:\Windows\SysWOW64\invuwaxma.exeC:\Windows\system32\invuwaxma.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4496 -
C:\Windows\SysWOW64\inaikwkwh.exeC:\Windows\system32\inaikwkwh.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1228 -
C:\Windows\SysWOW64\inbrulkss.exeC:\Windows\system32\inbrulkss.exe50⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3056 -
C:\Windows\SysWOW64\infslrijv.exeC:\Windows\system32\infslrijv.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\SysWOW64\indpalewk.exeC:\Windows\system32\indpalewk.exe52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4624 -
C:\Windows\SysWOW64\incsvmltt.exeC:\Windows\system32\incsvmltt.exe53⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3708 -
C:\Windows\SysWOW64\intcrvwiy.exeC:\Windows\system32\intcrvwiy.exe54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2568 -
C:\Windows\SysWOW64\inhscspdt.exeC:\Windows\system32\inhscspdt.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3720 -
C:\Windows\SysWOW64\inogwahsa.exeC:\Windows\system32\inogwahsa.exe56⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3800 -
C:\Windows\SysWOW64\inertnmni.exeC:\Windows\system32\inertnmni.exe57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3684 -
C:\Windows\SysWOW64\inkivmnpx.exeC:\Windows\system32\inkivmnpx.exe59⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5044 -
C:\Windows\SysWOW64\inbjwysrs.exeC:\Windows\system32\inbjwysrs.exe60⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4228 -
C:\Windows\SysWOW64\inxtemyti.exeC:\Windows\system32\inxtemyti.exe61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4616 -
C:\Windows\SysWOW64\infdqdofu.exeC:\Windows\system32\infdqdofu.exe62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3448 -
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe63⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4788 -
C:\Windows\SysWOW64\inxnqhgoo.exeC:\Windows\system32\inxnqhgoo.exe64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2636 -
C:\Windows\SysWOW64\inwmpgfnn.exeC:\Windows\system32\inwmpgfnn.exe65⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\intsuvkkg.exeC:\Windows\system32\intsuvkkg.exe66⤵PID:4724
-
C:\Windows\SysWOW64\inikbvtjp.exeC:\Windows\system32\inikbvtjp.exe67⤵
- Drops file in System32 directory
PID:3708 -
C:\Windows\SysWOW64\inmibthrw.exeC:\Windows\system32\inmibthrw.exe68⤵
- Drops file in System32 directory
PID:2056 -
C:\Windows\SysWOW64\insezthji.exeC:\Windows\system32\insezthji.exe69⤵
- Drops file in System32 directory
PID:4476 -
C:\Windows\SysWOW64\inbqostfv.exeC:\Windows\system32\inbqostfv.exe70⤵
- Modifies Installed Components in the registry
PID:3800 -
C:\Windows\SysWOW64\inwgusogd.exeC:\Windows\system32\inwgusogd.exe71⤵PID:4968
-
C:\Windows\SysWOW64\innlypqcs.exeC:\Windows\system32\innlypqcs.exe72⤵
- Modifies Installed Components in the registry
PID:1984 -
C:\Windows\SysWOW64\injlxlxig.exeC:\Windows\system32\injlxlxig.exe73⤵
- Drops file in System32 directory
PID:2284 -
C:\Windows\SysWOW64\ingwzqpxx.exeC:\Windows\system32\ingwzqpxx.exe74⤵PID:4336
-
C:\Windows\SysWOW64\insbquvhx.exeC:\Windows\system32\insbquvhx.exe75⤵
- Modifies Installed Components in the registry
PID:1496 -
C:\Windows\SysWOW64\inbjudnts.exeC:\Windows\system32\inbjudnts.exe76⤵PID:1856
-
C:\Windows\SysWOW64\inbuzcxoc.exeC:\Windows\system32\inbuzcxoc.exe77⤵
- Modifies Installed Components in the registry
PID:2164 -
C:\Windows\SysWOW64\inhwnltjf.exeC:\Windows\system32\inhwnltjf.exe78⤵PID:908
-
C:\Windows\SysWOW64\inzfhvydh.exeC:\Windows\system32\inzfhvydh.exe79⤵PID:4144
-
C:\Windows\SysWOW64\inaivxrqr.exeC:\Windows\system32\inaivxrqr.exe80⤵
- Modifies Installed Components in the registry
PID:2844 -
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe81⤵
- Modifies Installed Components in the registry
PID:4252 -
C:\Windows\SysWOW64\ingoxeawx.exeC:\Windows\system32\ingoxeawx.exe82⤵PID:1912
-
C:\Windows\SysWOW64\incwvxbyn.exeC:\Windows\system32\incwvxbyn.exe83⤵PID:1632
-
C:\Windows\SysWOW64\inngmlnpt.exeC:\Windows\system32\inngmlnpt.exe84⤵
- Drops file in System32 directory
PID:1500 -
C:\Windows\SysWOW64\inuwftrhn.exeC:\Windows\system32\inuwftrhn.exe85⤵
- Drops file in System32 directory
PID:4028 -
C:\Windows\SysWOW64\infhthtec.exeC:\Windows\system32\infhthtec.exe86⤵PID:880
-
C:\Windows\SysWOW64\inrshhzyd.exeC:\Windows\system32\inrshhzyd.exe87⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:3024 -
C:\Windows\SysWOW64\innoddvuk.exeC:\Windows\system32\innoddvuk.exe88⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:4296 -
C:\Windows\SysWOW64\inhiypoew.exeC:\Windows\system32\inhiypoew.exe89⤵PID:1856
-
C:\Windows\SysWOW64\inkbaivic.exeC:\Windows\system32\inkbaivic.exe90⤵PID:4176
-
C:\Windows\SysWOW64\inniyteex.exeC:\Windows\system32\inniyteex.exe91⤵PID:2096
-
C:\Windows\SysWOW64\inqrggyxc.exeC:\Windows\system32\inqrggyxc.exe92⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:4612 -
C:\Windows\SysWOW64\inxsdoolp.exeC:\Windows\system32\inxsdoolp.exe93⤵
- Modifies Installed Components in the registry
PID:2844 -
C:\Windows\SysWOW64\inxrqyyst.exeC:\Windows\system32\inxrqyyst.exe94⤵PID:3788
-
C:\Windows\SysWOW64\insnyjjgx.exeC:\Windows\system32\insnyjjgx.exe95⤵PID:1480
-
C:\Windows\SysWOW64\inesqmezb.exeC:\Windows\system32\inesqmezb.exe96⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:1004 -
C:\Windows\SysWOW64\inrcangym.exeC:\Windows\system32\inrcangym.exe97⤵PID:1128
-
C:\Windows\SysWOW64\infnwdvwr.exeC:\Windows\system32\infnwdvwr.exe98⤵PID:3220
-
C:\Windows\SysWOW64\inhwoipfi.exeC:\Windows\system32\inhwoipfi.exe99⤵PID:1120
-
C:\Windows\SysWOW64\inefvmlzb.exeC:\Windows\system32\inefvmlzb.exe100⤵
- Drops file in System32 directory
PID:1312 -
C:\Windows\SysWOW64\insohtodl.exeC:\Windows\system32\insohtodl.exe101⤵PID:1720
-
C:\Windows\SysWOW64\inatwyxqd.exeC:\Windows\system32\inatwyxqd.exe102⤵PID:4372
-
C:\Windows\SysWOW64\inochlfll.exeC:\Windows\system32\inochlfll.exe103⤵PID:4276
-
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe104⤵PID:4420
-
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe105⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:1144 -
C:\Windows\SysWOW64\invpovkyk.exeC:\Windows\system32\invpovkyk.exe106⤵PID:1844
-
C:\Windows\SysWOW64\inxtleici.exeC:\Windows\system32\inxtleici.exe107⤵
- Drops file in System32 directory
PID:4548 -
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe108⤵
- Drops file in System32 directory
PID:2248 -
C:\Windows\SysWOW64\inddmxhxc.exeC:\Windows\system32\inddmxhxc.exe109⤵PID:3848
-
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe110⤵PID:2568
-
C:\Windows\SysWOW64\inkzrlbas.exeC:\Windows\system32\inkzrlbas.exe111⤵
- Drops file in System32 directory
PID:3956 -
C:\Windows\SysWOW64\inljyapnv.exeC:\Windows\system32\inljyapnv.exe112⤵
- Drops file in System32 directory
PID:220 -
C:\Windows\SysWOW64\intpaiupe.exeC:\Windows\system32\intpaiupe.exe113⤵
- Drops file in System32 directory
PID:2840 -
C:\Windows\SysWOW64\inulkzdji.exeC:\Windows\system32\inulkzdji.exe114⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:1392 -
C:\Windows\SysWOW64\indwezqep.exeC:\Windows\system32\indwezqep.exe115⤵
- Modifies Installed Components in the registry
PID:4152 -
C:\Windows\SysWOW64\indtosnaj.exeC:\Windows\system32\indtosnaj.exe116⤵PID:1624
-
C:\Windows\SysWOW64\inscqyokc.exeC:\Windows\system32\inscqyokc.exe117⤵PID:3484
-
C:\Windows\SysWOW64\inmxiifwj.exeC:\Windows\system32\inmxiifwj.exe118⤵PID:2240
-
C:\Windows\SysWOW64\inpiofygs.exeC:\Windows\system32\inpiofygs.exe119⤵PID:1632
-
C:\Windows\SysWOW64\inmhxsddw.exeC:\Windows\system32\inmhxsddw.exe120⤵
- Drops file in System32 directory
PID:2660 -
C:\Windows\SysWOW64\inrfpuysy.exeC:\Windows\system32\inrfpuysy.exe121⤵PID:1484
-
C:\Windows\SysWOW64\inxrycagn.exeC:\Windows\system32\inxrycagn.exe122⤵PID:1128
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-