Analysis
-
max time kernel
185s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 07:43
Behavioral task
behavioral1
Sample
NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe
Resource
win7-20231023-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe
Resource
win10v2004-20231025-en
11 signatures
150 seconds
General
-
Target
NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe
-
Size
348KB
-
MD5
42b86f192d5f944b5f7458e81fe8a2d0
-
SHA1
d2816bb13258cff33ed8fd9c653f51883090dc86
-
SHA256
67b16ba806e1bef2b9ea4e0c3ee17997c6f026f2737656ea67848ffe3c407858
-
SHA512
7fb1378f7dc6f937dfb17886593786f5141295a1ebf1cef2b3e84182e2b1f142700947be4e027c62f1d486b4b11f4bf0870b0d42257bba01b14e14fc5c89d9e9
-
SSDEEP
6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0SH:ouLwoZQGpnedeP/deUe1ppGjTGHZRT0z
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 64 IoCs
resource yara_rule behavioral1/memory/2636-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2636-2-0x0000000000230000-0x000000000025F000-memory.dmp family_gh0strat behavioral1/files/0x002b0000000142c4-12.dat family_gh0strat behavioral1/files/0x002b0000000142ce-17.dat family_gh0strat behavioral1/files/0x002b0000000142ce-20.dat family_gh0strat behavioral1/files/0x002b0000000142ce-25.dat family_gh0strat behavioral1/memory/2636-29-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2668-30-0x00000000003D0000-0x00000000003FF000-memory.dmp family_gh0strat behavioral1/files/0x002b0000000142ce-24.dat family_gh0strat behavioral1/files/0x002b0000000142ce-23.dat family_gh0strat behavioral1/files/0x002b0000000142ce-22.dat family_gh0strat behavioral1/memory/2668-21-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0007000000014693-46.dat family_gh0strat behavioral1/files/0x0007000000014693-45.dat family_gh0strat behavioral1/files/0x0007000000014693-50.dat family_gh0strat behavioral1/files/0x0007000000014693-55.dat family_gh0strat behavioral1/files/0x0007000000014693-54.dat family_gh0strat behavioral1/files/0x0007000000014693-53.dat family_gh0strat behavioral1/files/0x0007000000014693-52.dat family_gh0strat behavioral1/memory/2668-51-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2564-57-0x00000000002C0000-0x00000000002EF000-memory.dmp family_gh0strat behavioral1/files/0x0006000000014f13-72.dat family_gh0strat behavioral1/memory/2564-83-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2848-82-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000014f13-80.dat family_gh0strat behavioral1/files/0x0006000000014f13-79.dat family_gh0strat behavioral1/files/0x0006000000014f13-78.dat family_gh0strat behavioral1/files/0x0006000000014f13-77.dat family_gh0strat behavioral1/files/0x0006000000014f13-75.dat family_gh0strat behavioral1/files/0x000600000001549c-99.dat family_gh0strat behavioral1/memory/2848-111-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x000600000001549c-108.dat family_gh0strat behavioral1/files/0x000600000001549c-107.dat family_gh0strat behavioral1/files/0x000600000001549c-106.dat family_gh0strat behavioral1/files/0x000600000001549c-105.dat family_gh0strat behavioral1/files/0x000600000001549c-104.dat family_gh0strat behavioral1/memory/2068-125-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000015c00-129.dat family_gh0strat behavioral1/memory/1520-140-0x00000000001C0000-0x00000000001EF000-memory.dmp family_gh0strat behavioral1/files/0x0006000000015c00-137.dat family_gh0strat behavioral1/files/0x0006000000015c00-136.dat family_gh0strat behavioral1/files/0x0006000000015c00-135.dat family_gh0strat behavioral1/files/0x0006000000015c00-134.dat family_gh0strat behavioral1/files/0x0006000000015c00-132.dat family_gh0strat behavioral1/files/0x0006000000015c4c-154.dat family_gh0strat behavioral1/files/0x0006000000015c4c-163.dat family_gh0strat behavioral1/files/0x0006000000015c4c-162.dat family_gh0strat behavioral1/files/0x0006000000015c4c-161.dat family_gh0strat behavioral1/files/0x0006000000015c4c-160.dat family_gh0strat behavioral1/files/0x0006000000015c4c-159.dat family_gh0strat behavioral1/memory/1520-158-0x0000000000910000-0x000000000093F000-memory.dmp family_gh0strat behavioral1/memory/1520-165-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1504-167-0x0000000000230000-0x000000000025F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000015c79-181.dat family_gh0strat behavioral1/files/0x0006000000015c79-184.dat family_gh0strat behavioral1/memory/576-192-0x0000000000230000-0x000000000025F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000015ca8-206.dat family_gh0strat behavioral1/memory/1504-191-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000015c79-189.dat family_gh0strat behavioral1/files/0x0006000000015c79-188.dat family_gh0strat behavioral1/files/0x0006000000015c79-187.dat family_gh0strat behavioral1/files/0x0006000000015c79-186.dat family_gh0strat behavioral1/files/0x0006000000015ca8-215.dat family_gh0strat behavioral1/files/0x0006000000015ca8-214.dat family_gh0strat -
Modifies Installed Components in the registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6EE0D540-5D59-4da4-AA6E-941FE9EBA657} inasgqvzt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1B4EE083-0124-45d8-A39A-F39245DC0DFE} inxtemyti.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10572F46-962A-4959-879C-6F5840E2C999} inyjbrycn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B35ADCCD-252A-4163-BF35-E5E0B68C98DB} inahuhbcs.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{37A61C66-6986-47a6-8524-1D47CE164324} ingvetxyk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA9854BE-12D3-411e-B1B8-07574D835B7B}\stubpath = "C:\\Windows\\system32\\inxhvtpha.exe" inlhzufqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C99224F-A45F-4bed-A53A-49F13E765290} incraptug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{83B33558-F1A7-4bb4-BE51-B501E98AD342} inpleqlxa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D252F6C0-DDBB-4cb7-A576-FF3C2418B9EE}\stubpath = "C:\\Windows\\system32\\inlsmacbt.exe" inmnccutj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A2610AC-60B1-4679-9B65-BF65D2584BE5}\stubpath = "C:\\Windows\\system32\\injmdckxk.exe" inesqmezb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AFD62591-98A4-4812-9D44-48265F6DCD1F} inzhpyfbx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{97E36966-7DBB-417e-8F91-7D48C810A23C}\stubpath = "C:\\Windows\\system32\\infsuonoj.exe" inapytoun.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D3933ED-B58A-4777-B51C-841E452802F5} inbmkzbqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CCD3A18E-DDE4-45fa-95FC-5AD0282ED988} infhthtec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{759BBC71-6784-4c3b-B174-2CFCBA284B6D}\stubpath = "C:\\Windows\\system32\\inpleqlxa.exe" indwztgsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{314031E2-87B1-408a-9362-F4651EF54CF6}\stubpath = "C:\\Windows\\system32\\inmmjnwce.exe" inbbkvfva.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D8293AE4-4503-4db6-B0A4-DB9F58D96722} inmmjnwce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{68DF04DE-6DE4-4cca-BB99-1E9DAA668873}\stubpath = "C:\\Windows\\system32\\inhjvjvge.exe" inscqyokc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{539F074F-02D4-4fba-A137-4ADAAB49B3C6} inocokdvj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{88B6E31E-23C5-4a71-907A-84D80706F18D}\stubpath = "C:\\Windows\\system32\\intpaiupe.exe" inbuxzyre.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A9130B6-EF68-4b36-9CAB-616EEDAF23CC}\stubpath = "C:\\Windows\\system32\\injyiwuqi.exe" infudswxj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{98F3E917-46DB-47f1-92E5-F3380B5615A5} inrlmbbts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{83B33558-F1A7-4bb4-BE51-B501E98AD342}\stubpath = "C:\\Windows\\system32\\inmnccutj.exe" inpleqlxa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E858DA9E-739E-41c8-9AFD-823768B59D2D}\stubpath = "C:\\Windows\\system32\\inknedlyl.exe" inhwoipfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E98F778-E944-4d46-ADF2-FA12EF3A299B} ineybxzdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CCD3A18E-DDE4-45fa-95FC-5AD0282ED988}\stubpath = "C:\\Windows\\system32\\inxrqyyst.exe" infhthtec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AAA05D9B-80B3-4b5d-B5A2-7BDC0B5A3B68}\stubpath = "C:\\Windows\\system32\\iniizepdz.exe" ingoxeawx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5639BC11-B946-4a64-97C9-2EB31BE8242E} incrjzdkv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A88B5FA4-B515-4be5-BA4F-A70DC82DA192}\stubpath = "C:\\Windows\\system32\\infgwnmcy.exe" inbfyviuk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{51F948B5-7AC2-408c-B712-4F4C598CBECE} inytozkkh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F94E8180-09DA-44ab-A89E-EAD1445B21B0}\stubpath = "C:\\Windows\\system32\\inxjymong.exe" inowmiavg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D9B6DD6F-C85F-4235-8855-8D84E48EE436}\stubpath = "C:\\Windows\\system32\\ingvnhoze.exe" inldtepix.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{82A4D372-1F8D-4849-B14F-56A1FAAB3E01} inutvwllh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{759BBC71-6784-4c3b-B174-2CFCBA284B6D} indwztgsi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{16F07137-D1C3-4770-A890-C227819A9FD8}\stubpath = "C:\\Windows\\system32\\indhxkwmb.exe" inrdysgih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6EE0D540-5D59-4da4-AA6E-941FE9EBA657}\stubpath = "C:\\Windows\\system32\\inazpsjiq.exe" inasgqvzt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE14D312-8CC6-4a59-9CE9-2A3CF0955400} intmsjkwc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DA9854BE-12D3-411e-B1B8-07574D835B7B} inlhzufqa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8AAE76D-FC73-4e23-94EA-EDE1848CCF5D}\stubpath = "C:\\Windows\\system32\\inruwvobn.exe" NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{39E8DE27-E0F5-48ca-AF06-BA9898225BB8} inzvgovkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BA40E37B-EAD6-4a75-B22C-6286A49EE11D}\stubpath = "C:\\Windows\\system32\\inbrulkss.exe" inknedlyl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8AC996FB-719C-4d31-81A2-69CE29FE5E79} inyorihpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{709AFD55-54E6-44b6-B274-CE9FB5FD8310}\stubpath = "C:\\Windows\\system32\\insrzztuj.exe" ingvnhoze.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{51D90805-3201-4ec2-8051-0D8FD297DFA9}\stubpath = "C:\\Windows\\system32\\ingiuiufd.exe" injyiwuqi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{393D906F-788E-4dcb-899E-78E0E480DDF5}\stubpath = "C:\\Windows\\system32\\inrlmbbts.exe" ingiuiufd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{314031E2-87B1-408a-9362-F4651EF54CF6} inbbkvfva.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0727F27C-D39C-43bd-BDC3-808D95C045A2}\stubpath = "C:\\Windows\\system32\\inixpjqgj.exe" incgzwjvl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E77D5526-8CE3-4f58-98E1-4B20F2833CCF} insrzztuj.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CC0E59EE-9176-4f4d-BE4A-ED3A21155E00} inulkzdji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9656656E-BEE9-47d9-8954-040B6CA993AD}\stubpath = "C:\\Windows\\system32\\intojzuff.exe" inhxjlpig.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6574735B-9FDC-4faf-B776-5848C7597394} inigtklnv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{94A19536-C704-4c26-BCCE-60FD2B308CE3} inwgusogd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{97744B1E-8101-4dd4-8CD7-EC782BC7564F} inmprqjiy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D98311A7-D9EC-45df-A3E3-FFE685C1D150}\stubpath = "C:\\Windows\\system32\\inhfsfaqh.exe" inrngsnzc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{31C5D9DF-74CF-4d73-A755-90E316DDFBDA} inmtnbdcu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{775ACC8D-71B7-4a1c-82C2-B778D0895764} inbfffozj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BE80BE43-0A06-47b4-A9A8-8338412719DB}\stubpath = "C:\\Windows\\system32\\intmsjkwc.exe" inapnrseu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A65497AC-D8D2-4a25-A71D-C329261B36CA} inkbaivic.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D173A39C-17B5-4832-8268-AC9845CF9C12} inaikwkwh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6C461B47-B298-4249-84D1-25FCDB9CED96} inpsutmlb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F563FCD-A79E-45b9-A1F6-0E79FBA4CEAD} invuwaxma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C17B680C-AEF2-431e-A4B7-2102A038AFA9} indxawycz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D84919C7-51C2-4b13-89A5-545967974E4B} inwixlnmf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{805DB519-3B52-4b7d-8A92-23512D75BCDE} intojzuff.exe -
ACProtect 1.3x - 1.4x DLL software 11 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b000000012273-4.dat acprotect behavioral1/files/0x00070000000144bd-32.dat acprotect behavioral1/files/0x00070000000144bd-31.dat acprotect behavioral1/files/0x00080000000146e9-59.dat acprotect behavioral1/files/0x000600000001531a-86.dat acprotect behavioral1/files/0x0006000000015606-115.dat acprotect behavioral1/files/0x0006000000015c23-141.dat acprotect behavioral1/files/0x0006000000015c5c-168.dat acprotect behavioral1/files/0x0006000000015c90-193.dat acprotect behavioral1/files/0x0006000000015ce7-220.dat acprotect behavioral1/files/0x0006000000015ea9-245.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 2668 inruwvobn.exe 2564 inbuxzyre.exe 2848 intpaiupe.exe 2068 inatwyxqd.exe 1520 inmprqjiy.exe 1504 inzvgovkd.exe 576 incrjzdkv.exe 1456 inxiaqxbm.exe 3012 inpsutmlb.exe 1596 inaexuhtj.exe 620 inxtemyti.exe 2948 incgzwjvl.exe 2444 inixpjqgj.exe 1584 inetlfmxc.exe 2296 inldtepix.exe 2676 ingvnhoze.exe 2304 insrzztuj.exe 2940 insezthji.exe 1704 inyjbrycn.exe 1692 inoavpdfe.exe 1256 inyufnzuj.exe 1520 innuocedv.exe 600 inzloqpih.exe 2688 inqcxrfhg.exe 1804 inahuhbcs.exe 1528 inbaqtkjr.exe 1084 injyqkarh.exe 2980 inrngsnzc.exe 1916 inhfsfaqh.exe 1016 inmeufqjy.exe 108 infdqdofu.exe 2632 inkivmnpx.exe 2516 incraptug.exe 2996 inortslka.exe 1980 inadbobmd.exe 832 ingvetxyk.exe 2172 infudswxj.exe 1508 injyiwuqi.exe 1892 ingiuiufd.exe 2064 inrlmbbts.exe 2040 inmtnbdcu.exe 1252 intfuikjc.exe 436 injfqeotx.exe 1068 invrckwrg.exe 884 inbfffozj.exe 2464 invuwaxma.exe 2212 inutvwllh.exe 932 insvxwpco.exe 1648 inqjpgzht.exe 2456 inrxixhwa.exe 2528 inhwoipfi.exe 2952 inknedlyl.exe 2780 inbrulkss.exe 2336 indxawycz.exe 1440 inwhpwale.exe 952 ineybxzdp.exe 656 inzhpyfbx.exe 2736 inaphxbit.exe 1072 indwztgsi.exe 3068 inpleqlxa.exe 1188 inmnccutj.exe 1156 inlsmacbt.exe 1284 inyorihpp.exe 2924 inbqostfv.exe -
Loads dropped DLL 64 IoCs
pid Process 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe 2668 inruwvobn.exe 2668 inruwvobn.exe 2668 inruwvobn.exe 2668 inruwvobn.exe 2668 inruwvobn.exe 2564 inbuxzyre.exe 2564 inbuxzyre.exe 2564 inbuxzyre.exe 2564 inbuxzyre.exe 2564 inbuxzyre.exe 2848 intpaiupe.exe 2848 intpaiupe.exe 2848 intpaiupe.exe 2848 intpaiupe.exe 2848 intpaiupe.exe 2068 inatwyxqd.exe 2068 inatwyxqd.exe 2068 inatwyxqd.exe 2068 inatwyxqd.exe 2068 inatwyxqd.exe 1520 inmprqjiy.exe 1520 inmprqjiy.exe 1520 inmprqjiy.exe 1520 inmprqjiy.exe 1520 inmprqjiy.exe 1504 inzvgovkd.exe 1504 inzvgovkd.exe 1504 inzvgovkd.exe 1504 inzvgovkd.exe 1504 inzvgovkd.exe 576 incrjzdkv.exe 576 incrjzdkv.exe 576 incrjzdkv.exe 576 incrjzdkv.exe 576 incrjzdkv.exe 1456 inxiaqxbm.exe 1456 inxiaqxbm.exe 1456 inxiaqxbm.exe 1456 inxiaqxbm.exe 1456 inxiaqxbm.exe 3012 inpsutmlb.exe 3012 inpsutmlb.exe 3012 inpsutmlb.exe 3012 inpsutmlb.exe 3012 inpsutmlb.exe 1596 inaexuhtj.exe 1596 inaexuhtj.exe 1596 inaexuhtj.exe 1596 inaexuhtj.exe 1596 inaexuhtj.exe 620 inxtemyti.exe 620 inxtemyti.exe 620 inxtemyti.exe 620 inxtemyti.exe 620 inxtemyti.exe 2948 incgzwjvl.exe 2948 incgzwjvl.exe 2948 incgzwjvl.exe 2948 incgzwjvl.exe 2948 incgzwjvl.exe 2444 inixpjqgj.exe 2444 inixpjqgj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\syslog.dat infvypoww.exe File opened for modification C:\Windows\SysWOW64\insrzztuj.exe_lang.ini ingvnhoze.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inahuhbcs.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inbrulkss.exe File opened for modification C:\Windows\SysWOW64\inyorihpp.exe_lang.ini inlsmacbt.exe File created C:\Windows\SysWOW64\inhsblrqs.exe indpalewk.exe File created C:\Windows\SysWOW64\inapytoun.exe inqmfrmyb.exe File opened for modification C:\Windows\SysWOW64\inutvwllh.exe_lang.ini invuwaxma.exe File created C:\Windows\SysWOW64\inlsmacbt.exe inmnccutj.exe File opened for modification C:\Windows\SysWOW64\inigtklnv.exe_lang.ini indlyubtu.exe File created C:\Windows\SysWOW64\inpbwqegf.exe inaikwkwh.exe File opened for modification C:\Windows\SysWOW64\inmeufqjy.exe_lang.ini inhfsfaqh.exe File created C:\Windows\SysWOW64\invrckwrg.exe injfqeotx.exe File opened for modification C:\Windows\SysWOW64\syslog.dat insvxwpco.exe File opened for modification C:\Windows\SysWOW64\syslog.dat intmsjkwc.exe File opened for modification C:\Windows\SysWOW64\inmmjnwce.exe_lang.ini inbbkvfva.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inocokdvj.exe File created C:\Windows\SysWOW64\innfvgrkz.exe inwgusogd.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inqjpgzht.exe File opened for modification C:\Windows\SysWOW64\indpalewk.exe_lang.ini infgwnmcy.exe File opened for modification C:\Windows\SysWOW64\syslog.dat indpalewk.exe File opened for modification C:\Windows\SysWOW64\inapytoun.exe_lang.ini inqmfrmyb.exe File opened for modification C:\Windows\SysWOW64\ingoxeawx.exe_lang.ini inulkzdji.exe File opened for modification C:\Windows\SysWOW64\inqklaasr.exe_lang.ini inumafjdj.exe File created C:\Windows\SysWOW64\injfqeotx.exe intfuikjc.exe File created C:\Windows\SysWOW64\inbmkzbqa.exe intmsjkwc.exe File created C:\Windows\SysWOW64\inixpjqgj.exe incgzwjvl.exe File opened for modification C:\Windows\SysWOW64\syslog.dat incgzwjvl.exe File created C:\Windows\SysWOW64\inoavpdfe.exe inyjbrycn.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inortslka.exe File created C:\Windows\SysWOW64\injyiwuqi.exe infudswxj.exe File created C:\Windows\SysWOW64\inrlmbbts.exe ingiuiufd.exe File opened for modification C:\Windows\SysWOW64\syslog.dat incrjzdkv.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inyjbrycn.exe File created C:\Windows\SysWOW64\inortslka.exe incraptug.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inxhvtpha.exe File created C:\Windows\SysWOW64\ingoxeawx.exe inulkzdji.exe File opened for modification C:\Windows\SysWOW64\syslog.dat innfvgrkz.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inruwvobn.exe File created C:\Windows\SysWOW64\inmeufqjy.exe inhfsfaqh.exe File opened for modification C:\Windows\SysWOW64\ingiuiufd.exe_lang.ini injyiwuqi.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inwhpwale.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inwixlnmf.exe File opened for modification C:\Windows\SysWOW64\inwgusogd.exe_lang.ini inqklaasr.exe File created C:\Windows\SysWOW64\inxiaqxbm.exe incrjzdkv.exe File opened for modification C:\Windows\SysWOW64\syslog.dat insrzztuj.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inapytoun.exe File created C:\Windows\SysWOW64\inkbaivic.exe inzkzjyci.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inykznpoh.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inwgusogd.exe File created C:\Windows\SysWOW64\inogwahsa.exe inhjvjvge.exe File opened for modification C:\Windows\SysWOW64\inogwahsa.exe_lang.ini inhjvjvge.exe File created C:\Windows\SysWOW64\inetlfmxc.exe inixpjqgj.exe File opened for modification C:\Windows\SysWOW64\innuocedv.exe_lang.ini inyufnzuj.exe File created C:\Windows\SysWOW64\inahuhbcs.exe inqcxrfhg.exe File opened for modification C:\Windows\SysWOW64\syslog.dat injyqkarh.exe File created C:\Windows\SysWOW64\inhfsfaqh.exe inrngsnzc.exe File opened for modification C:\Windows\SysWOW64\injkrqgyq.exe_lang.ini inhsblrqs.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inxiaqxbm.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inzloqpih.exe File opened for modification C:\Windows\SysWOW64\syslog.dat infudswxj.exe File created C:\Windows\SysWOW64\inmtnbdcu.exe inrlmbbts.exe File opened for modification C:\Windows\SysWOW64\inqmfrmyb.exe_lang.ini inwixlnmf.exe File created C:\Windows\SysWOW64\inwgusogd.exe inqklaasr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe 2668 inruwvobn.exe 2564 inbuxzyre.exe 2848 intpaiupe.exe 2068 inatwyxqd.exe 1520 inmprqjiy.exe 1504 inzvgovkd.exe 576 incrjzdkv.exe 1456 inxiaqxbm.exe 3012 inpsutmlb.exe 1596 inaexuhtj.exe 620 inxtemyti.exe 2948 incgzwjvl.exe 2444 inixpjqgj.exe 1584 inetlfmxc.exe 2296 inldtepix.exe 2676 ingvnhoze.exe 2304 insrzztuj.exe 2940 insezthji.exe 1704 inyjbrycn.exe 1692 inoavpdfe.exe 1256 inyufnzuj.exe 1520 innuocedv.exe 600 inzloqpih.exe 2688 inqcxrfhg.exe 1804 inahuhbcs.exe 1528 inbaqtkjr.exe 1084 injyqkarh.exe 2980 inrngsnzc.exe 1916 inhfsfaqh.exe 1016 inmeufqjy.exe 108 infdqdofu.exe 2632 inkivmnpx.exe 2516 incraptug.exe 2996 inortslka.exe 1980 inadbobmd.exe 832 ingvetxyk.exe 2172 infudswxj.exe 1508 injyiwuqi.exe 1892 ingiuiufd.exe 2064 inrlmbbts.exe 2040 inmtnbdcu.exe 1252 intfuikjc.exe 436 injfqeotx.exe 1068 invrckwrg.exe 884 inbfffozj.exe 2464 invuwaxma.exe 2212 inutvwllh.exe 932 insvxwpco.exe 1648 inqjpgzht.exe 2456 inrxixhwa.exe 2528 inhwoipfi.exe 2952 inknedlyl.exe 2780 inbrulkss.exe 2336 indxawycz.exe 1440 inwhpwale.exe 952 ineybxzdp.exe 656 inzhpyfbx.exe 2736 inaphxbit.exe 1072 indwztgsi.exe 3068 inpleqlxa.exe 1188 inmnccutj.exe 1156 inlsmacbt.exe 1284 inyorihpp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe Token: SeDebugPrivilege 2668 inruwvobn.exe Token: SeDebugPrivilege 2564 inbuxzyre.exe Token: SeDebugPrivilege 2848 intpaiupe.exe Token: SeDebugPrivilege 2068 inatwyxqd.exe Token: SeDebugPrivilege 1520 inmprqjiy.exe Token: SeDebugPrivilege 1504 inzvgovkd.exe Token: SeDebugPrivilege 576 incrjzdkv.exe Token: SeDebugPrivilege 1456 inxiaqxbm.exe Token: SeDebugPrivilege 3012 inpsutmlb.exe Token: SeDebugPrivilege 1596 inaexuhtj.exe Token: SeDebugPrivilege 620 inxtemyti.exe Token: SeDebugPrivilege 2948 incgzwjvl.exe Token: SeDebugPrivilege 2444 inixpjqgj.exe Token: SeDebugPrivilege 1584 inetlfmxc.exe Token: SeDebugPrivilege 2296 inldtepix.exe Token: SeDebugPrivilege 2676 ingvnhoze.exe Token: SeDebugPrivilege 2304 insrzztuj.exe Token: SeDebugPrivilege 2940 insezthji.exe Token: SeDebugPrivilege 1704 inyjbrycn.exe Token: SeDebugPrivilege 1692 inoavpdfe.exe Token: SeDebugPrivilege 1256 inyufnzuj.exe Token: SeDebugPrivilege 1520 innuocedv.exe Token: SeDebugPrivilege 600 inzloqpih.exe Token: SeDebugPrivilege 2688 inqcxrfhg.exe Token: SeDebugPrivilege 1804 inahuhbcs.exe Token: SeDebugPrivilege 1528 inbaqtkjr.exe Token: SeDebugPrivilege 1084 injyqkarh.exe Token: SeDebugPrivilege 2980 inrngsnzc.exe Token: SeDebugPrivilege 1916 inhfsfaqh.exe Token: SeDebugPrivilege 1016 inmeufqjy.exe Token: SeDebugPrivilege 108 infdqdofu.exe Token: SeDebugPrivilege 2632 inkivmnpx.exe Token: SeDebugPrivilege 2516 incraptug.exe Token: SeDebugPrivilege 2996 inortslka.exe Token: SeDebugPrivilege 1980 inadbobmd.exe Token: SeDebugPrivilege 832 ingvetxyk.exe Token: SeDebugPrivilege 2172 infudswxj.exe Token: SeDebugPrivilege 1508 injyiwuqi.exe Token: SeDebugPrivilege 1892 ingiuiufd.exe Token: SeDebugPrivilege 2064 inrlmbbts.exe Token: SeDebugPrivilege 2040 inmtnbdcu.exe Token: SeDebugPrivilege 1252 intfuikjc.exe Token: SeDebugPrivilege 436 injfqeotx.exe Token: SeDebugPrivilege 1068 invrckwrg.exe Token: SeDebugPrivilege 884 inbfffozj.exe Token: SeDebugPrivilege 2464 invuwaxma.exe Token: SeDebugPrivilege 2212 inutvwllh.exe Token: SeDebugPrivilege 932 insvxwpco.exe Token: SeDebugPrivilege 1648 inqjpgzht.exe Token: SeDebugPrivilege 2456 inrxixhwa.exe Token: SeDebugPrivilege 2528 inhwoipfi.exe Token: SeDebugPrivilege 2952 inknedlyl.exe Token: SeDebugPrivilege 2780 inbrulkss.exe Token: SeDebugPrivilege 2336 indxawycz.exe Token: SeDebugPrivilege 1440 inwhpwale.exe Token: SeDebugPrivilege 952 ineybxzdp.exe Token: SeDebugPrivilege 656 inzhpyfbx.exe Token: SeDebugPrivilege 2736 inaphxbit.exe Token: SeDebugPrivilege 1072 indwztgsi.exe Token: SeDebugPrivilege 3068 inpleqlxa.exe Token: SeDebugPrivilege 1188 inmnccutj.exe Token: SeDebugPrivilege 1156 inlsmacbt.exe Token: SeDebugPrivilege 1284 inyorihpp.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe 2668 inruwvobn.exe 2564 inbuxzyre.exe 2848 intpaiupe.exe 2068 inatwyxqd.exe 1520 inmprqjiy.exe 1504 inzvgovkd.exe 576 incrjzdkv.exe 1456 inxiaqxbm.exe 3012 inpsutmlb.exe 1596 inaexuhtj.exe 620 inxtemyti.exe 2948 incgzwjvl.exe 2444 inixpjqgj.exe 1584 inetlfmxc.exe 2296 inldtepix.exe 2676 ingvnhoze.exe 2304 insrzztuj.exe 2940 insezthji.exe 1704 inyjbrycn.exe 1692 inoavpdfe.exe 1256 inyufnzuj.exe 1520 innuocedv.exe 600 inzloqpih.exe 2688 inqcxrfhg.exe 1804 inahuhbcs.exe 1528 inbaqtkjr.exe 1084 injyqkarh.exe 2980 inrngsnzc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2668 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe 29 PID 2636 wrote to memory of 2668 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe 29 PID 2636 wrote to memory of 2668 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe 29 PID 2636 wrote to memory of 2668 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe 29 PID 2636 wrote to memory of 2668 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe 29 PID 2636 wrote to memory of 2668 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe 29 PID 2636 wrote to memory of 2668 2636 NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe 29 PID 2668 wrote to memory of 2564 2668 inruwvobn.exe 30 PID 2668 wrote to memory of 2564 2668 inruwvobn.exe 30 PID 2668 wrote to memory of 2564 2668 inruwvobn.exe 30 PID 2668 wrote to memory of 2564 2668 inruwvobn.exe 30 PID 2668 wrote to memory of 2564 2668 inruwvobn.exe 30 PID 2668 wrote to memory of 2564 2668 inruwvobn.exe 30 PID 2668 wrote to memory of 2564 2668 inruwvobn.exe 30 PID 2564 wrote to memory of 2848 2564 inbuxzyre.exe 31 PID 2564 wrote to memory of 2848 2564 inbuxzyre.exe 31 PID 2564 wrote to memory of 2848 2564 inbuxzyre.exe 31 PID 2564 wrote to memory of 2848 2564 inbuxzyre.exe 31 PID 2564 wrote to memory of 2848 2564 inbuxzyre.exe 31 PID 2564 wrote to memory of 2848 2564 inbuxzyre.exe 31 PID 2564 wrote to memory of 2848 2564 inbuxzyre.exe 31 PID 2848 wrote to memory of 2068 2848 intpaiupe.exe 32 PID 2848 wrote to memory of 2068 2848 intpaiupe.exe 32 PID 2848 wrote to memory of 2068 2848 intpaiupe.exe 32 PID 2848 wrote to memory of 2068 2848 intpaiupe.exe 32 PID 2848 wrote to memory of 2068 2848 intpaiupe.exe 32 PID 2848 wrote to memory of 2068 2848 intpaiupe.exe 32 PID 2848 wrote to memory of 2068 2848 intpaiupe.exe 32 PID 2068 wrote to memory of 1520 2068 inatwyxqd.exe 33 PID 2068 wrote to memory of 1520 2068 inatwyxqd.exe 33 PID 2068 wrote to memory of 1520 2068 inatwyxqd.exe 33 PID 2068 wrote to memory of 1520 2068 inatwyxqd.exe 33 PID 2068 wrote to memory of 1520 2068 inatwyxqd.exe 33 PID 2068 wrote to memory of 1520 2068 inatwyxqd.exe 33 PID 2068 wrote to memory of 1520 2068 inatwyxqd.exe 33 PID 1520 wrote to memory of 1504 1520 inmprqjiy.exe 34 PID 1520 wrote to memory of 1504 1520 inmprqjiy.exe 34 PID 1520 wrote to memory of 1504 1520 inmprqjiy.exe 34 PID 1520 wrote to memory of 1504 1520 inmprqjiy.exe 34 PID 1520 wrote to memory of 1504 1520 inmprqjiy.exe 34 PID 1520 wrote to memory of 1504 1520 inmprqjiy.exe 34 PID 1520 wrote to memory of 1504 1520 inmprqjiy.exe 34 PID 1504 wrote to memory of 576 1504 inzvgovkd.exe 35 PID 1504 wrote to memory of 576 1504 inzvgovkd.exe 35 PID 1504 wrote to memory of 576 1504 inzvgovkd.exe 35 PID 1504 wrote to memory of 576 1504 inzvgovkd.exe 35 PID 1504 wrote to memory of 576 1504 inzvgovkd.exe 35 PID 1504 wrote to memory of 576 1504 inzvgovkd.exe 35 PID 1504 wrote to memory of 576 1504 inzvgovkd.exe 35 PID 576 wrote to memory of 1456 576 incrjzdkv.exe 36 PID 576 wrote to memory of 1456 576 incrjzdkv.exe 36 PID 576 wrote to memory of 1456 576 incrjzdkv.exe 36 PID 576 wrote to memory of 1456 576 incrjzdkv.exe 36 PID 576 wrote to memory of 1456 576 incrjzdkv.exe 36 PID 576 wrote to memory of 1456 576 incrjzdkv.exe 36 PID 576 wrote to memory of 1456 576 incrjzdkv.exe 36 PID 1456 wrote to memory of 3012 1456 inxiaqxbm.exe 37 PID 1456 wrote to memory of 3012 1456 inxiaqxbm.exe 37 PID 1456 wrote to memory of 3012 1456 inxiaqxbm.exe 37 PID 1456 wrote to memory of 3012 1456 inxiaqxbm.exe 37 PID 1456 wrote to memory of 3012 1456 inxiaqxbm.exe 37 PID 1456 wrote to memory of 3012 1456 inxiaqxbm.exe 37 PID 1456 wrote to memory of 3012 1456 inxiaqxbm.exe 37 PID 3012 wrote to memory of 1596 3012 inpsutmlb.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.42b86f192d5f944b5f7458e81fe8a2d0.exe"1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\inruwvobn.exeC:\Windows\system32\inruwvobn.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\intpaiupe.exeC:\Windows\system32\intpaiupe.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\inatwyxqd.exeC:\Windows\system32\inatwyxqd.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\inxiaqxbm.exeC:\Windows\system32\inxiaqxbm.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\inaexuhtj.exeC:\Windows\system32\inaexuhtj.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Windows\SysWOW64\inxtemyti.exeC:\Windows\system32\inxtemyti.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:620 -
C:\Windows\SysWOW64\incgzwjvl.exeC:\Windows\system32\incgzwjvl.exe13⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2948 -
C:\Windows\SysWOW64\inixpjqgj.exeC:\Windows\system32\inixpjqgj.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Windows\SysWOW64\inldtepix.exeC:\Windows\system32\inldtepix.exe16⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2296 -
C:\Windows\SysWOW64\ingvnhoze.exeC:\Windows\system32\ingvnhoze.exe17⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Windows\SysWOW64\insrzztuj.exeC:\Windows\system32\insrzztuj.exe18⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Windows\SysWOW64\insezthji.exeC:\Windows\system32\insezthji.exe19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Windows\SysWOW64\inyjbrycn.exeC:\Windows\system32\inyjbrycn.exe20⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Windows\SysWOW64\inyufnzuj.exeC:\Windows\system32\inyufnzuj.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1256 -
C:\Windows\SysWOW64\innuocedv.exeC:\Windows\system32\innuocedv.exe23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1520 -
C:\Windows\SysWOW64\inzloqpih.exeC:\Windows\system32\inzloqpih.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:600 -
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Windows\SysWOW64\inahuhbcs.exeC:\Windows\system32\inahuhbcs.exe26⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Windows\SysWOW64\inbaqtkjr.exeC:\Windows\system32\inbaqtkjr.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Windows\SysWOW64\injyqkarh.exeC:\Windows\system32\injyqkarh.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1084 -
C:\Windows\SysWOW64\inrngsnzc.exeC:\Windows\system32\inrngsnzc.exe29⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Windows\SysWOW64\inhfsfaqh.exeC:\Windows\system32\inhfsfaqh.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016 -
C:\Windows\SysWOW64\infdqdofu.exeC:\Windows\system32\infdqdofu.exe32⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:108 -
C:\Windows\SysWOW64\inkivmnpx.exeC:\Windows\system32\inkivmnpx.exe33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632 -
C:\Windows\SysWOW64\incraptug.exeC:\Windows\system32\incraptug.exe34⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2516 -
C:\Windows\SysWOW64\inortslka.exeC:\Windows\system32\inortslka.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996 -
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\SysWOW64\ingvetxyk.exeC:\Windows\system32\ingvetxyk.exe37⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:832 -
C:\Windows\SysWOW64\infudswxj.exeC:\Windows\system32\infudswxj.exe38⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172 -
C:\Windows\SysWOW64\injyiwuqi.exeC:\Windows\system32\injyiwuqi.exe39⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508 -
C:\Windows\SysWOW64\ingiuiufd.exeC:\Windows\system32\ingiuiufd.exe40⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Windows\SysWOW64\inrlmbbts.exeC:\Windows\system32\inrlmbbts.exe41⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\SysWOW64\inmtnbdcu.exeC:\Windows\system32\inmtnbdcu.exe42⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\intfuikjc.exeC:\Windows\system32\intfuikjc.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252 -
C:\Windows\SysWOW64\injfqeotx.exeC:\Windows\system32\injfqeotx.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:436 -
C:\Windows\SysWOW64\invrckwrg.exeC:\Windows\system32\invrckwrg.exe45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Windows\SysWOW64\inbfffozj.exeC:\Windows\system32\inbfffozj.exe46⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\SysWOW64\invuwaxma.exeC:\Windows\system32\invuwaxma.exe47⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464 -
C:\Windows\SysWOW64\inutvwllh.exeC:\Windows\system32\inutvwllh.exe48⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Windows\SysWOW64\insvxwpco.exeC:\Windows\system32\insvxwpco.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:932 -
C:\Windows\SysWOW64\inqjpgzht.exeC:\Windows\system32\inqjpgzht.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\SysWOW64\inrxixhwa.exeC:\Windows\system32\inrxixhwa.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\Windows\SysWOW64\inhwoipfi.exeC:\Windows\system32\inhwoipfi.exe52⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528 -
C:\Windows\SysWOW64\inknedlyl.exeC:\Windows\system32\inknedlyl.exe53⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Windows\SysWOW64\inbrulkss.exeC:\Windows\system32\inbrulkss.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780 -
C:\Windows\SysWOW64\indxawycz.exeC:\Windows\system32\indxawycz.exe55⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336 -
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440 -
C:\Windows\SysWOW64\ineybxzdp.exeC:\Windows\system32\ineybxzdp.exe57⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952 -
C:\Windows\SysWOW64\inzhpyfbx.exeC:\Windows\system32\inzhpyfbx.exe58⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656 -
C:\Windows\SysWOW64\inaphxbit.exeC:\Windows\system32\inaphxbit.exe59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Windows\SysWOW64\indwztgsi.exeC:\Windows\system32\indwztgsi.exe60⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1072 -
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe61⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Windows\SysWOW64\inmnccutj.exeC:\Windows\system32\inmnccutj.exe62⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188 -
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156 -
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe64⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Windows\SysWOW64\inbqostfv.exeC:\Windows\system32\inbqostfv.exe65⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\SysWOW64\inesqmezb.exeC:\Windows\system32\inesqmezb.exe66⤵
- Modifies Installed Components in the registry
PID:980 -
C:\Windows\SysWOW64\injmdckxk.exeC:\Windows\system32\injmdckxk.exe67⤵PID:2396
-
C:\Windows\SysWOW64\inwsdlxsh.exeC:\Windows\system32\inwsdlxsh.exe68⤵PID:2692
-
C:\Windows\SysWOW64\inisglpjp.exeC:\Windows\system32\inisglpjp.exe69⤵PID:2764
-
C:\Windows\SysWOW64\inbfyviuk.exeC:\Windows\system32\inbfyviuk.exe70⤵
- Modifies Installed Components in the registry
PID:2888 -
C:\Windows\SysWOW64\infgwnmcy.exeC:\Windows\system32\infgwnmcy.exe71⤵
- Drops file in System32 directory
PID:2968 -
C:\Windows\SysWOW64\indpalewk.exeC:\Windows\system32\indpalewk.exe72⤵
- Drops file in System32 directory
PID:2792 -
C:\Windows\SysWOW64\inhsblrqs.exeC:\Windows\system32\inhsblrqs.exe73⤵
- Drops file in System32 directory
PID:1684 -
C:\Windows\SysWOW64\injkrqgyq.exeC:\Windows\system32\injkrqgyq.exe74⤵PID:2020
-
C:\Windows\SysWOW64\intcrvwiy.exeC:\Windows\system32\intcrvwiy.exe75⤵PID:1632
-
C:\Windows\SysWOW64\inkzrlbas.exeC:\Windows\system32\inkzrlbas.exe76⤵PID:2684
-
C:\Windows\SysWOW64\inrdysgih.exeC:\Windows\system32\inrdysgih.exe77⤵
- Modifies Installed Components in the registry
PID:728 -
C:\Windows\SysWOW64\indhxkwmb.exeC:\Windows\system32\indhxkwmb.exe78⤵PID:2056
-
C:\Windows\SysWOW64\inmibthrw.exeC:\Windows\system32\inmibthrw.exe79⤵PID:816
-
C:\Windows\SysWOW64\inugvjlkd.exeC:\Windows\system32\inugvjlkd.exe80⤵PID:2688
-
C:\Windows\SysWOW64\inasgqvzt.exeC:\Windows\system32\inasgqvzt.exe81⤵
- Modifies Installed Components in the registry
PID:1880 -
C:\Windows\SysWOW64\inazpsjiq.exeC:\Windows\system32\inazpsjiq.exe82⤵PID:2572
-
C:\Windows\SysWOW64\injlxlxig.exeC:\Windows\system32\injlxlxig.exe83⤵PID:1084
-
C:\Windows\SysWOW64\inscqyokc.exeC:\Windows\system32\inscqyokc.exe84⤵
- Modifies Installed Components in the registry
PID:1696 -
C:\Windows\SysWOW64\inhjvjvge.exeC:\Windows\system32\inhjvjvge.exe85⤵
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\inogwahsa.exeC:\Windows\system32\inogwahsa.exe86⤵PID:2760
-
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe87⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:2644 -
C:\Windows\SysWOW64\inqmfrmyb.exeC:\Windows\system32\inqmfrmyb.exe88⤵
- Drops file in System32 directory
PID:2636 -
C:\Windows\SysWOW64\inapytoun.exeC:\Windows\system32\inapytoun.exe89⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:1920 -
C:\Windows\SysWOW64\infsuonoj.exeC:\Windows\system32\infsuonoj.exe90⤵PID:2312
-
C:\Windows\SysWOW64\inapnrseu.exeC:\Windows\system32\inapnrseu.exe91⤵
- Modifies Installed Components in the registry
PID:2836 -
C:\Windows\SysWOW64\intmsjkwc.exeC:\Windows\system32\intmsjkwc.exe92⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:908 -
C:\Windows\SysWOW64\inbmkzbqa.exeC:\Windows\system32\inbmkzbqa.exe93⤵
- Modifies Installed Components in the registry
PID:1444 -
C:\Windows\SysWOW64\infhthtec.exeC:\Windows\system32\infhthtec.exe94⤵
- Modifies Installed Components in the registry
PID:2320 -
C:\Windows\SysWOW64\inxrqyyst.exeC:\Windows\system32\inxrqyyst.exe95⤵PID:2288
-
C:\Windows\SysWOW64\inljyapnv.exeC:\Windows\system32\inljyapnv.exe96⤵PID:2908
-
C:\Windows\SysWOW64\inbbkvfva.exeC:\Windows\system32\inbbkvfva.exe97⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:2392 -
C:\Windows\SysWOW64\inmmjnwce.exeC:\Windows\system32\inmmjnwce.exe98⤵
- Modifies Installed Components in the registry
PID:1332 -
C:\Windows\SysWOW64\ingtgabri.exeC:\Windows\system32\ingtgabri.exe99⤵PID:1048
-
C:\Windows\SysWOW64\inlhzufqa.exeC:\Windows\system32\inlhzufqa.exe100⤵
- Modifies Installed Components in the registry
PID:2648 -
C:\Windows\SysWOW64\inxhvtpha.exeC:\Windows\system32\inxhvtpha.exe101⤵
- Drops file in System32 directory
PID:2572 -
C:\Windows\SysWOW64\inzkzjyci.exeC:\Windows\system32\inzkzjyci.exe102⤵
- Drops file in System32 directory
PID:1548 -
C:\Windows\SysWOW64\inkbaivic.exeC:\Windows\system32\inkbaivic.exe103⤵
- Modifies Installed Components in the registry
PID:2176 -
C:\Windows\SysWOW64\inulkzdji.exeC:\Windows\system32\inulkzdji.exe104⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:1580 -
C:\Windows\SysWOW64\ingoxeawx.exeC:\Windows\system32\ingoxeawx.exe105⤵
- Modifies Installed Components in the registry
PID:2508 -
C:\Windows\SysWOW64\iniizepdz.exeC:\Windows\system32\iniizepdz.exe106⤵PID:2644
-
C:\Windows\SysWOW64\inykznpoh.exeC:\Windows\system32\inykznpoh.exe107⤵
- Drops file in System32 directory
PID:2348 -
C:\Windows\SysWOW64\inocokdvj.exeC:\Windows\system32\inocokdvj.exe108⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:2412 -
C:\Windows\SysWOW64\indlyubtu.exeC:\Windows\system32\indlyubtu.exe109⤵
- Drops file in System32 directory
PID:1968 -
C:\Windows\SysWOW64\inigtklnv.exeC:\Windows\system32\inigtklnv.exe110⤵
- Modifies Installed Components in the registry
PID:2836 -
C:\Windows\SysWOW64\inckxztas.exeC:\Windows\system32\inckxztas.exe111⤵PID:952
-
C:\Windows\SysWOW64\inytozkkh.exeC:\Windows\system32\inytozkkh.exe112⤵
- Modifies Installed Components in the registry
PID:2096 -
C:\Windows\SysWOW64\inowmiavg.exeC:\Windows\system32\inowmiavg.exe113⤵
- Modifies Installed Components in the registry
PID:2052 -
C:\Windows\SysWOW64\inxjymong.exeC:\Windows\system32\inxjymong.exe114⤵PID:2016
-
C:\Windows\SysWOW64\inhxjlpig.exeC:\Windows\system32\inhxjlpig.exe115⤵
- Modifies Installed Components in the registry
PID:788 -
C:\Windows\SysWOW64\intojzuff.exeC:\Windows\system32\intojzuff.exe116⤵
- Modifies Installed Components in the registry
PID:1748 -
C:\Windows\SysWOW64\infvypoww.exeC:\Windows\system32\infvypoww.exe117⤵
- Drops file in System32 directory
PID:1872 -
C:\Windows\SysWOW64\inumafjdj.exeC:\Windows\system32\inumafjdj.exe118⤵
- Drops file in System32 directory
PID:1528 -
C:\Windows\SysWOW64\inqklaasr.exeC:\Windows\system32\inqklaasr.exe119⤵
- Drops file in System32 directory
PID:2924 -
C:\Windows\SysWOW64\inwgusogd.exeC:\Windows\system32\inwgusogd.exe120⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\innfvgrkz.exeC:\Windows\system32\innfvgrkz.exe121⤵
- Drops file in System32 directory
PID:1548 -
C:\Windows\SysWOW64\inzbfsfjq.exeC:\Windows\system32\inzbfsfjq.exe122⤵PID:1584
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-