Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
12-11-2023 18:34
Behavioral task
behavioral1
Sample
NEAS.c18c43ed8bb89755a39c623615548d9b.exe
Resource
win7-20231023-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.c18c43ed8bb89755a39c623615548d9b.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
NEAS.c18c43ed8bb89755a39c623615548d9b.exe
-
Size
348KB
-
MD5
c18c43ed8bb89755a39c623615548d9b
-
SHA1
26ccf1705a97c3581d852fe0ae25d30a8cb03a9f
-
SHA256
80ee6d90bbe17079b49291b1804764024cc74f8cac810817359c3319f3a90619
-
SHA512
857e32d6e4271f41700bb8d217f1f003f5392b6c4d7e0b538b4af31893a4e4d2d2a65a15c2a91a8e63ebec7be0bb6b096410c235089b4514be0c4fad8801c280
-
SSDEEP
6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0S/:ouLwoZQGpnedeP/deUe1ppGjTGHZRT0D
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 64 IoCs
resource yara_rule behavioral1/memory/2744-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2744-1-0x00000000002C0000-0x00000000002EF000-memory.dmp family_gh0strat behavioral1/files/0x0028000000014adb-17.dat family_gh0strat behavioral1/memory/2744-18-0x00000000003B0000-0x00000000003DF000-memory.dmp family_gh0strat behavioral1/files/0x0028000000014adb-20.dat family_gh0strat behavioral1/files/0x0028000000014adb-21.dat family_gh0strat behavioral1/memory/2376-28-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2744-30-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0028000000014adb-26.dat family_gh0strat behavioral1/files/0x0028000000014adb-25.dat family_gh0strat behavioral1/files/0x0028000000014adb-24.dat family_gh0strat behavioral1/files/0x0028000000014adb-23.dat family_gh0strat behavioral1/files/0x000a000000015601-36.dat family_gh0strat behavioral1/memory/2376-66-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2804-65-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0009000000015c28-52.dat family_gh0strat behavioral1/files/0x0009000000015c28-51.dat family_gh0strat behavioral1/files/0x0009000000015c28-50.dat family_gh0strat behavioral1/files/0x0009000000015c28-49.dat family_gh0strat behavioral1/files/0x0009000000015c28-47.dat family_gh0strat behavioral1/files/0x0009000000015c28-44.dat family_gh0strat behavioral1/files/0x0006000000015c6c-73.dat family_gh0strat behavioral1/files/0x0006000000015c6c-76.dat family_gh0strat behavioral1/files/0x0006000000015c6c-78.dat family_gh0strat behavioral1/memory/2804-84-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000015ca5-99.dat family_gh0strat behavioral1/files/0x0006000000015ca5-103.dat family_gh0strat behavioral1/files/0x0006000000015ca5-106.dat family_gh0strat behavioral1/memory/2300-110-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1428-113-0x0000000000230000-0x000000000025F000-memory.dmp family_gh0strat behavioral1/memory/1428-109-0x0000000000230000-0x000000000025F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000015ca5-107.dat family_gh0strat behavioral1/files/0x0006000000015ca5-105.dat family_gh0strat behavioral1/files/0x0006000000015ca5-104.dat family_gh0strat behavioral1/files/0x0006000000015c6c-81.dat family_gh0strat behavioral1/files/0x0006000000015c6c-80.dat family_gh0strat behavioral1/files/0x0006000000015c6c-79.dat family_gh0strat behavioral1/files/0x0006000000015db6-126.dat family_gh0strat behavioral1/files/0x0006000000015db6-129.dat family_gh0strat behavioral1/files/0x0006000000015db6-134.dat family_gh0strat behavioral1/memory/1428-139-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2256-138-0x0000000000230000-0x000000000025F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000015db6-133.dat family_gh0strat behavioral1/files/0x0006000000015db6-132.dat family_gh0strat behavioral1/files/0x0006000000015db6-131.dat family_gh0strat behavioral1/files/0x0006000000015e78-153.dat family_gh0strat behavioral1/files/0x0006000000015e78-157.dat family_gh0strat behavioral1/files/0x0006000000015e78-159.dat family_gh0strat behavioral1/files/0x0006000000015e78-160.dat family_gh0strat behavioral1/files/0x0006000000015e78-161.dat family_gh0strat behavioral1/memory/1324-163-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000015e78-162.dat family_gh0strat behavioral1/memory/2256-168-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x000600000001606a-180.dat family_gh0strat behavioral1/files/0x000600000001606a-185.dat family_gh0strat behavioral1/memory/1324-194-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x000600000001647f-208.dat family_gh0strat behavioral1/memory/2232-212-0x00000000003A0000-0x00000000003CF000-memory.dmp family_gh0strat behavioral1/files/0x000600000001647f-213.dat family_gh0strat behavioral1/files/0x000600000001647f-215.dat family_gh0strat behavioral1/files/0x000600000001647f-217.dat family_gh0strat behavioral1/memory/2232-228-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x000600000001647f-216.dat family_gh0strat behavioral1/files/0x000600000001647f-214.dat family_gh0strat -
Modifies Installed Components in the registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E11FDF20-7FAE-478b-BD1A-C09E98233EFD}\stubpath = "C:\\Windows\\system32\\inzvgovkd.exe" inutvwllh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54FA85A5-11C3-4931-A5D3-E836344C967B}\stubpath = "C:\\Windows\\system32\\inzhuwqpq.exe" inhrmfavc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F16DCFE4-BE51-4cf3-9677-2B3EB1F85261} inbbkvfva.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5B631EB4-DB67-4054-B195-5E85597EF307} inmeufqjy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{18F82D38-6430-4ce8-9FD6-82D9D4EF6DF3} ingvnhoze.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{95E02069-B143-4b7a-AD60-1196EA9D4D88} inefvmlzb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4AECE87A-F1B3-4124-A815-8DB9EF189F65}\stubpath = "C:\\Windows\\system32\\inapnrseu.exe" invjtmuem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{54FA85A5-11C3-4931-A5D3-E836344C967B} inhrmfavc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9E9B1E5F-97C4-42d0-8553-C9223682B432} inkzrlbas.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{068E330C-BDF4-4e38-8734-B1293033EC72} indwztgsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C9647A69-CCC8-4bcc-8AB5-A5222693D6A3} inmprqjiy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{05998EB7-0AC8-44d8-BF97-5FB220ECB0A6}\stubpath = "C:\\Windows\\system32\\inyjbrycn.exe" inbuxzyre.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{36DE8395-B676-4262-903D-B2FF7B8A0A2E}\stubpath = "C:\\Windows\\system32\\ingvzmksi.exe" inrjcgagg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C56D1DB-A8EE-4822-9F31-ACB6960A255C}\stubpath = "C:\\Windows\\system32\\insvxwpco.exe" inewrcnnk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{57AFBF0C-3B87-45b1-BF11-0F2DA01C1708}\stubpath = "C:\\Windows\\system32\\ingoxeawx.exe" insvxwpco.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CAA433D2-5E91-49db-9EC1-837D246CC9BD}\stubpath = "C:\\Windows\\system32\\inknedlyl.exe" inofbieyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0726213C-FF24-489d-989B-FDDB9012B054} inoavpdfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8A79498D-6704-4640-826A-AE618EA3ACCB} ingmxwqmq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7B4C94C-0913-44ae-B7A2-99235A039DA9}\stubpath = "C:\\Windows\\system32\\infumgnyd.exe" intpaiupe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{203A60B7-27B2-43df-B94C-435A42F80153} innxkgbub.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BCAE71C7-C898-4fe8-9BC1-D1F6D3981BD5} inlhpjpqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38F49DDD-0E0D-428c-A4D8-B96C1E080EE9}\stubpath = "C:\\Windows\\system32\\inwmpgfnn.exe" inxjymong.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D1011BD8-FE42-4c6b-A671-4FF41315426D}\stubpath = "C:\\Windows\\system32\\indwztgsi.exe" inlsmacbt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{47DDEC61-13D2-4d85-AB8B-42B7F309138D} inuydrpyf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DD6A0F3C-0B25-4015-A2B0-E8AA32D3539A} ineuxonvv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C06FA08C-DAD4-4885-9D5F-8C7AD4ADEDC8} inqdhyock.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{36572ABC-0752-4295-A2C8-5513E0B6544C} inbwxiybi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{55079616-AA1F-4df9-B9E5-AD50D742B52A}\stubpath = "C:\\Windows\\system32\\injlxlxig.exe" incxuerhz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{07FA1F91-93F3-490c-BBFE-D691E62F5284} inwhpwale.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1ADD0EFD-3F3B-41b5-9440-6F33ECC371D7}\stubpath = "C:\\Windows\\system32\\innqsrkjz.exe" inzvgovkd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AA3037A1-4C7B-4954-8B65-91E23943C72D} inlvjosms.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9020006-581C-465e-8CD7-84EF0FF4BEAD} intsuvkkg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9020006-581C-465e-8CD7-84EF0FF4BEAD}\stubpath = "C:\\Windows\\system32\\inpsutmlb.exe" intsuvkkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AD2A8B25-0D04-4e22-A42D-01C0FE9FAA5E} inxiaqxbm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{EF57B405-534A-4469-9145-1349D9955155} inesqmezb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2CEBC80A-3679-4110-8255-93BDCA77FA1A} inwtwqazn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3FDD4371-60DC-47c2-A836-E2EBAB15C391} invhwkmle.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5019F1D3-1078-43fd-9B49-98A3D494B877} insezthji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{44748140-9B2D-448c-871C-8D6CAF619239}\stubpath = "C:\\Windows\\system32\\inbuxzyre.exe" inpxexdto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B673774-1AA0-4c4b-86A8-2C21A00A6E46}\stubpath = "C:\\Windows\\system32\\inaphxbit.exe" inetlfmxc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{925E91CC-4E0C-4904-B8EF-4FCE6ECEBE09}\stubpath = "C:\\Windows\\system32\\intpaiupe.exe" inatybwnb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5B631EB4-DB67-4054-B195-5E85597EF307}\stubpath = "C:\\Windows\\system32\\inatwyxqd.exe" inmeufqjy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{068E330C-BDF4-4e38-8734-B1293033EC72}\stubpath = "C:\\Windows\\system32\\inpbwqegf.exe" indwztgsi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2B673774-1AA0-4c4b-86A8-2C21A00A6E46} inetlfmxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38F49DDD-0E0D-428c-A4D8-B96C1E080EE9} inxjymong.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1960F290-ACC1-499b-A3E9-B6AE5158B494}\stubpath = "C:\\Windows\\system32\\inxnqhgoo.exe" inqzaupvo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DC956CE5-F0A8-41c7-9236-60C97314F921} inrmygnhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DC956CE5-F0A8-41c7-9236-60C97314F921}\stubpath = "C:\\Windows\\system32\\intsuvkkg.exe" inrmygnhd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0E4E6F32-9E1E-47e0-9266-FB2F537F6CC0}\stubpath = "C:\\Windows\\system32\\inuqbjvqf.exe" inhoksmcs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6BA058C7-547F-4ddf-8234-3C0E33E1066C}\stubpath = "C:\\Windows\\system32\\inldtepix.exe" NEAS.c18c43ed8bb89755a39c623615548d9b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{65426ACF-C62D-4077-B8F9-A3EB7C09CB96} indskelwb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3448381F-5460-42f7-8B14-FA2D50C986DF}\stubpath = "C:\\Windows\\system32\\inmkxopbr.exe" invqmdynu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F5639C2B-12F8-4c46-80F6-F6D29C256647}\stubpath = "C:\\Windows\\system32\\inetlfmxc.exe" inldtepix.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6974AFA8-5225-4e3b-8A0D-32215407354A} innfvgrkz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F16DCFE4-BE51-4cf3-9677-2B3EB1F85261}\stubpath = "C:\\Windows\\system32\\inefvmlzb.exe" inbbkvfva.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{36DE8395-B676-4262-903D-B2FF7B8A0A2E} inrjcgagg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A7B4C94C-0913-44ae-B7A2-99235A039DA9} intpaiupe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{44E668B7-D631-4dd3-8B02-4F3C37F4DE8B}\stubpath = "C:\\Windows\\system32\\inkzrlbas.exe" infdqdofu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{18F82D38-6430-4ce8-9FD6-82D9D4EF6DF3}\stubpath = "C:\\Windows\\system32\\injmdckxk.exe" ingvnhoze.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F588179B-C801-4e45-9F81-E1462406154A} innvsazkr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{47DDEC61-13D2-4d85-AB8B-42B7F309138D}\stubpath = "C:\\Windows\\system32\\inewrcnnk.exe" inuydrpyf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8281638-5225-4f81-9E24-4B2F9AE5F848} indkgfezw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14A1D4FC-E755-47da-BB45-C18534CA70DE}\stubpath = "C:\\Windows\\system32\\incvdypdo.exe" inpleqlxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D7BFACD-648F-4feb-AFF8-D321BCA7197D} inaspaeae.exe -
ACProtect 1.3x - 1.4x DLL software 11 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00070000000120ca-4.dat acprotect behavioral1/files/0x00070000000153bf-32.dat acprotect behavioral1/files/0x00070000000153bf-31.dat acprotect behavioral1/files/0x0006000000015c4f-54.dat acprotect behavioral1/files/0x0006000000015c85-85.dat acprotect behavioral1/files/0x0006000000015ce1-111.dat acprotect behavioral1/files/0x0006000000015e1b-140.dat acprotect behavioral1/files/0x0006000000015ed7-165.dat acprotect behavioral1/files/0x000600000001628e-195.dat acprotect behavioral1/files/0x000600000001666b-219.dat acprotect behavioral1/files/0x0006000000016c34-248.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 2376 inldtepix.exe 2804 inetlfmxc.exe 2300 inaphxbit.exe 1428 infdqdofu.exe 2256 inkzrlbas.exe 1324 inyufnzuj.exe 2232 inxiaqxbm.exe 2600 invhwkmle.exe 2948 inoavpdfe.exe 1756 inwhpwale.exe 1792 inmeufqjy.exe 584 inatwyxqd.exe 556 inlsmacbt.exe 884 indwztgsi.exe 2740 inpbwqegf.exe 2572 inesqmezb.exe 2748 innfvgrkz.exe 2400 insezthji.exe 1068 inmprqjiy.exe 1268 ingvnhoze.exe 796 injmdckxk.exe 1920 indskelwb.exe 1140 inortslka.exe 612 inbbkvfva.exe 1564 inefvmlzb.exe 588 incraptug.exe 2160 inutvwllh.exe 2020 inzvgovkd.exe 1396 inpsutmlb.exe 2128 indbxwxmz.exe 828 invxurwtq.exe 3060 inwsdlxsh.exe 2872 inxjymong.exe 2484 inpxexdto.exe 2292 inbuxzyre.exe 1908 ingmxwqmq.exe 876 inrjcgagg.exe 2312 ingvzmksi.exe 2544 inixpjqgj.exe 944 innvcvbrm.exe 2336 inpprolqn.exe 1488 inatybwnb.exe 2604 intpaiupe.exe 2692 innvsazkr.exe 2100 invjtmuem.exe 952 inuydrpyf.exe 2012 inewrcnnk.exe 2964 insvxwpco.exe 1732 inqzaupvo.exe 2200 inxuxrboe.exe 608 ineuxonvv.exe 1500 inmfnxnjy.exe 1516 inofbieyd.exe 2424 inodazcuq.exe 3024 inqdhyock.exe 2296 invqmdynu.exe 2284 indxighng.exe 2716 innxkgbub.exe 928 inuvxhdct.exe 2504 inbwxiybi.exe 1600 indkgfezw.exe 1956 inhrmfavc.exe 2500 inzesnhey.exe 668 inlvjosms.exe -
Loads dropped DLL 64 IoCs
pid Process 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 2376 inldtepix.exe 2376 inldtepix.exe 2376 inldtepix.exe 2376 inldtepix.exe 2376 inldtepix.exe 2804 inetlfmxc.exe 2804 inetlfmxc.exe 2804 inetlfmxc.exe 2804 inetlfmxc.exe 2804 inetlfmxc.exe 2300 inaphxbit.exe 2300 inaphxbit.exe 2300 inaphxbit.exe 2300 inaphxbit.exe 2300 inaphxbit.exe 1428 infdqdofu.exe 1428 infdqdofu.exe 1428 infdqdofu.exe 1428 infdqdofu.exe 1428 infdqdofu.exe 2256 inkzrlbas.exe 2256 inkzrlbas.exe 2256 inkzrlbas.exe 2256 inkzrlbas.exe 2256 inkzrlbas.exe 1324 inyufnzuj.exe 1324 inyufnzuj.exe 1324 inyufnzuj.exe 1324 inyufnzuj.exe 1324 inyufnzuj.exe 2232 inxiaqxbm.exe 2232 inxiaqxbm.exe 2232 inxiaqxbm.exe 2232 inxiaqxbm.exe 2232 inxiaqxbm.exe 2600 invhwkmle.exe 2600 invhwkmle.exe 2600 invhwkmle.exe 2600 invhwkmle.exe 2600 invhwkmle.exe 2948 inoavpdfe.exe 2948 inoavpdfe.exe 2948 inoavpdfe.exe 2948 inoavpdfe.exe 2948 inoavpdfe.exe 1756 inwhpwale.exe 1756 inwhpwale.exe 1756 inwhpwale.exe 1756 inwhpwale.exe 1756 inwhpwale.exe 1792 inmeufqjy.exe 1792 inmeufqjy.exe 1792 inmeufqjy.exe 1792 inmeufqjy.exe 1792 inmeufqjy.exe 584 inatwyxqd.exe 584 inatwyxqd.exe 584 inatwyxqd.exe 584 inatwyxqd.exe 584 inatwyxqd.exe 556 inlsmacbt.exe 556 inlsmacbt.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\inkzrlbas.exe_lang.ini infdqdofu.exe File created C:\Windows\SysWOW64\intpaiupe.exe inatybwnb.exe File opened for modification C:\Windows\SysWOW64\innfvgrkz.exe_lang.ini inesqmezb.exe File opened for modification C:\Windows\SysWOW64\injmdckxk.exe_lang.ini ingvnhoze.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inwsdlxsh.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inxjymong.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpbwqegf.exe File created C:\Windows\SysWOW64\inortslka.exe indskelwb.exe File opened for modification C:\Windows\SysWOW64\inefvmlzb.exe_lang.ini inbbkvfva.exe File opened for modification C:\Windows\SysWOW64\inasgqvzt.exe_lang.ini inzrqlnxa.exe File opened for modification C:\Windows\SysWOW64\infdqdofu.exe_lang.ini inaphxbit.exe File opened for modification C:\Windows\SysWOW64\inpbwqegf.exe_lang.ini indwztgsi.exe File opened for modification C:\Windows\SysWOW64\inapnrseu.exe_lang.ini invjtmuem.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inlvjosms.exe File opened for modification C:\Windows\SysWOW64\intsuvkkg.exe_lang.ini inrmygnhd.exe File opened for modification C:\Windows\SysWOW64\insrzztuj.exe_lang.ini inxbftvlo.exe File created C:\Windows\SysWOW64\injlxlxig.exe incxuerhz.exe File opened for modification C:\Windows\SysWOW64\syslog.dat injmdckxk.exe File created C:\Windows\SysWOW64\inasgqvzt.exe inzrqlnxa.exe File created C:\Windows\SysWOW64\inuqbjvqf.exe inhoksmcs.exe File opened for modification C:\Windows\SysWOW64\ineqbmfxl.exe_lang.ini innvcvbrm.exe File opened for modification C:\Windows\SysWOW64\ingoxeawx.exe_lang.ini insvxwpco.exe File created C:\Windows\SysWOW64\inatwyxqd.exe inmeufqjy.exe File opened for modification C:\Windows\SysWOW64\intpaiupe.exe_lang.ini inatybwnb.exe File created C:\Windows\SysWOW64\inpqffxwb.exe inlhpjpqs.exe File created C:\Windows\SysWOW64\inopeewva.exe inbmkzbqa.exe File opened for modification C:\Windows\SysWOW64\inaphxbit.exe_lang.ini inetlfmxc.exe File created C:\Windows\SysWOW64\inlsmacbt.exe inatwyxqd.exe File created C:\Windows\SysWOW64\indwztgsi.exe inlsmacbt.exe File opened for modification C:\Windows\SysWOW64\indskelwb.exe_lang.ini injmdckxk.exe File opened for modification C:\Windows\SysWOW64\incraptug.exe_lang.ini inefvmlzb.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inbbkvfva.exe File opened for modification C:\Windows\SysWOW64\inwixlnmf.exe_lang.ini inwsdlxsh.exe File created C:\Windows\SysWOW64\inapnrseu.exe invjtmuem.exe File created C:\Windows\SysWOW64\syslog.dat NEAS.c18c43ed8bb89755a39c623615548d9b.exe File created C:\Windows\SysWOW64\inkzrlbas.exe infdqdofu.exe File opened for modification C:\Windows\SysWOW64\inwhpwale.exe_lang.ini inoavpdfe.exe File opened for modification C:\Windows\SysWOW64\ingvzmksi.exe_lang.ini inrjcgagg.exe File opened for modification C:\Windows\SysWOW64\syslog.dat invqmdynu.exe File opened for modification C:\Windows\SysWOW64\ingerepgv.exe_lang.ini indxighng.exe File opened for modification C:\Windows\SysWOW64\syslog.dat innfvgrkz.exe File opened for modification C:\Windows\SysWOW64\inmprqjiy.exe_lang.ini insezthji.exe File created C:\Windows\SysWOW64\infudswxj.exe inpprolqn.exe File opened for modification C:\Windows\SysWOW64\indhxkwmb.exe_lang.ini inqdhyock.exe File opened for modification C:\Windows\SysWOW64\inmkxopbr.exe_lang.ini invqmdynu.exe File opened for modification C:\Windows\SysWOW64\inwemzvcu.exe_lang.ini inwtwqazn.exe File created C:\Windows\SysWOW64\inewrcnnk.exe inuydrpyf.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inewrcnnk.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inbmkzbqa.exe File opened for modification C:\Windows\SysWOW64\inmeufqjy.exe_lang.ini inwhpwale.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inefvmlzb.exe File opened for modification C:\Windows\SysWOW64\syslog.dat invxurwtq.exe File created C:\Windows\SysWOW64\intcrvwiy.exe inwtwqazn.exe File created C:\Windows\SysWOW64\inbuxzyre.exe inpxexdto.exe File opened for modification C:\Windows\SysWOW64\inpsutmlb.exe_lang.ini intsuvkkg.exe File opened for modification C:\Windows\SysWOW64\inoavpdfe.exe_lang.ini invhwkmle.exe File created C:\Windows\SysWOW64\inmeufqjy.exe inwhpwale.exe File opened for modification C:\Windows\SysWOW64\inahuhbcs.exe_lang.ini inmfnxnjy.exe File created C:\Windows\SysWOW64\inaphxbit.exe inetlfmxc.exe File created C:\Windows\SysWOW64\ingvnhoze.exe inmprqjiy.exe File created C:\Windows\SysWOW64\inzvgovkd.exe inutvwllh.exe File created C:\Windows\SysWOW64\ingvzmksi.exe inrjcgagg.exe File opened for modification C:\Windows\SysWOW64\inewrcnnk.exe_lang.ini inuydrpyf.exe File created C:\Windows\SysWOW64\ingoxeawx.exe insvxwpco.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 2376 inldtepix.exe 2804 inetlfmxc.exe 2300 inaphxbit.exe 1428 infdqdofu.exe 2256 inkzrlbas.exe 1324 inyufnzuj.exe 2232 inxiaqxbm.exe 2600 invhwkmle.exe 2948 inoavpdfe.exe 1756 inwhpwale.exe 1792 inmeufqjy.exe 584 inatwyxqd.exe 556 inlsmacbt.exe 884 indwztgsi.exe 2740 inpbwqegf.exe 2572 inesqmezb.exe 2748 innfvgrkz.exe 2400 insezthji.exe 1068 inmprqjiy.exe 1268 ingvnhoze.exe 796 injmdckxk.exe 1920 indskelwb.exe 1140 inortslka.exe 612 inbbkvfva.exe 1564 inefvmlzb.exe 588 incraptug.exe 2160 inutvwllh.exe 2020 inzvgovkd.exe 1396 inwtwqazn.exe 2128 inzrqlnxa.exe 828 invxurwtq.exe 3060 inwsdlxsh.exe 2872 inxjymong.exe 2484 inpxexdto.exe 2292 inbuxzyre.exe 1908 ingmxwqmq.exe 876 inrjcgagg.exe 2312 ingvzmksi.exe 2544 inixpjqgj.exe 944 innvcvbrm.exe 2336 inpprolqn.exe 1488 inatybwnb.exe 2604 intpaiupe.exe 2692 innvsazkr.exe 2100 invjtmuem.exe 952 inuydrpyf.exe 2012 inewrcnnk.exe 2964 insvxwpco.exe 1732 inqzaupvo.exe 2200 inxuxrboe.exe 608 ineuxonvv.exe 1500 inmfnxnjy.exe 1516 inofbieyd.exe 2424 inodazcuq.exe 3024 inqdhyock.exe 2296 invqmdynu.exe 2284 indxighng.exe 2716 innxkgbub.exe 928 inuvxhdct.exe 2504 inbwxiybi.exe 1600 indkgfezw.exe 1956 inhrmfavc.exe 2500 inzesnhey.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe Token: SeDebugPrivilege 2376 inldtepix.exe Token: SeDebugPrivilege 2804 inetlfmxc.exe Token: SeDebugPrivilege 2300 inaphxbit.exe Token: SeDebugPrivilege 1428 infdqdofu.exe Token: SeDebugPrivilege 2256 inkzrlbas.exe Token: SeDebugPrivilege 1324 inyufnzuj.exe Token: SeDebugPrivilege 2232 inxiaqxbm.exe Token: SeDebugPrivilege 2600 invhwkmle.exe Token: SeDebugPrivilege 2948 inoavpdfe.exe Token: SeDebugPrivilege 1756 inwhpwale.exe Token: SeDebugPrivilege 1792 inmeufqjy.exe Token: SeDebugPrivilege 584 inatwyxqd.exe Token: SeDebugPrivilege 556 inlsmacbt.exe Token: SeDebugPrivilege 884 indwztgsi.exe Token: SeDebugPrivilege 2740 inpbwqegf.exe Token: SeDebugPrivilege 2572 inesqmezb.exe Token: SeDebugPrivilege 2748 innfvgrkz.exe Token: SeDebugPrivilege 2400 insezthji.exe Token: SeDebugPrivilege 1068 inmprqjiy.exe Token: SeDebugPrivilege 1268 ingvnhoze.exe Token: SeDebugPrivilege 796 injmdckxk.exe Token: SeDebugPrivilege 1920 indskelwb.exe Token: SeDebugPrivilege 1140 inortslka.exe Token: SeDebugPrivilege 612 inbbkvfva.exe Token: SeDebugPrivilege 1564 inefvmlzb.exe Token: SeDebugPrivilege 588 incraptug.exe Token: SeDebugPrivilege 2160 inutvwllh.exe Token: SeDebugPrivilege 2020 inzvgovkd.exe Token: SeDebugPrivilege 1396 inwtwqazn.exe Token: SeDebugPrivilege 2128 inzrqlnxa.exe Token: SeDebugPrivilege 828 invxurwtq.exe Token: SeDebugPrivilege 3060 inwsdlxsh.exe Token: SeDebugPrivilege 2872 inxjymong.exe Token: SeDebugPrivilege 2484 inpxexdto.exe Token: SeDebugPrivilege 2292 inbuxzyre.exe Token: SeDebugPrivilege 1908 ingmxwqmq.exe Token: SeDebugPrivilege 876 inrjcgagg.exe Token: SeDebugPrivilege 2312 ingvzmksi.exe Token: SeDebugPrivilege 2544 inixpjqgj.exe Token: SeDebugPrivilege 944 innvcvbrm.exe Token: SeDebugPrivilege 2336 inpprolqn.exe Token: SeDebugPrivilege 1488 inatybwnb.exe Token: SeDebugPrivilege 2604 intpaiupe.exe Token: SeDebugPrivilege 2692 innvsazkr.exe Token: SeDebugPrivilege 2100 invjtmuem.exe Token: SeDebugPrivilege 952 inuydrpyf.exe Token: SeDebugPrivilege 2012 inewrcnnk.exe Token: SeDebugPrivilege 2964 insvxwpco.exe Token: SeDebugPrivilege 1732 inqzaupvo.exe Token: SeDebugPrivilege 2200 inxuxrboe.exe Token: SeDebugPrivilege 608 ineuxonvv.exe Token: SeDebugPrivilege 1500 inmfnxnjy.exe Token: SeDebugPrivilege 1516 inofbieyd.exe Token: SeDebugPrivilege 2424 inodazcuq.exe Token: SeDebugPrivilege 3024 inqdhyock.exe Token: SeDebugPrivilege 2296 invqmdynu.exe Token: SeDebugPrivilege 2284 indxighng.exe Token: SeDebugPrivilege 2716 innxkgbub.exe Token: SeDebugPrivilege 928 inuvxhdct.exe Token: SeDebugPrivilege 2504 inbwxiybi.exe Token: SeDebugPrivilege 1600 indkgfezw.exe Token: SeDebugPrivilege 1956 inhrmfavc.exe Token: SeDebugPrivilege 2500 inzesnhey.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 2376 inldtepix.exe 2804 inetlfmxc.exe 2300 inaphxbit.exe 1428 infdqdofu.exe 2256 inkzrlbas.exe 1324 inyufnzuj.exe 2232 inxiaqxbm.exe 2600 invhwkmle.exe 2948 inoavpdfe.exe 1756 inwhpwale.exe 1792 inmeufqjy.exe 584 inatwyxqd.exe 556 inlsmacbt.exe 884 indwztgsi.exe 2740 inpbwqegf.exe 2572 inesqmezb.exe 2748 innfvgrkz.exe 2400 insezthji.exe 1068 inmprqjiy.exe 1268 ingvnhoze.exe 796 injmdckxk.exe 1920 indskelwb.exe 1140 inortslka.exe 612 inbbkvfva.exe 1564 inefvmlzb.exe 588 incraptug.exe 2160 inutvwllh.exe 2020 inzvgovkd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2376 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 28 PID 2744 wrote to memory of 2376 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 28 PID 2744 wrote to memory of 2376 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 28 PID 2744 wrote to memory of 2376 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 28 PID 2744 wrote to memory of 2376 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 28 PID 2744 wrote to memory of 2376 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 28 PID 2744 wrote to memory of 2376 2744 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 28 PID 2376 wrote to memory of 2804 2376 inldtepix.exe 29 PID 2376 wrote to memory of 2804 2376 inldtepix.exe 29 PID 2376 wrote to memory of 2804 2376 inldtepix.exe 29 PID 2376 wrote to memory of 2804 2376 inldtepix.exe 29 PID 2376 wrote to memory of 2804 2376 inldtepix.exe 29 PID 2376 wrote to memory of 2804 2376 inldtepix.exe 29 PID 2376 wrote to memory of 2804 2376 inldtepix.exe 29 PID 2804 wrote to memory of 2300 2804 inetlfmxc.exe 30 PID 2804 wrote to memory of 2300 2804 inetlfmxc.exe 30 PID 2804 wrote to memory of 2300 2804 inetlfmxc.exe 30 PID 2804 wrote to memory of 2300 2804 inetlfmxc.exe 30 PID 2804 wrote to memory of 2300 2804 inetlfmxc.exe 30 PID 2804 wrote to memory of 2300 2804 inetlfmxc.exe 30 PID 2804 wrote to memory of 2300 2804 inetlfmxc.exe 30 PID 2300 wrote to memory of 1428 2300 inaphxbit.exe 31 PID 2300 wrote to memory of 1428 2300 inaphxbit.exe 31 PID 2300 wrote to memory of 1428 2300 inaphxbit.exe 31 PID 2300 wrote to memory of 1428 2300 inaphxbit.exe 31 PID 2300 wrote to memory of 1428 2300 inaphxbit.exe 31 PID 2300 wrote to memory of 1428 2300 inaphxbit.exe 31 PID 2300 wrote to memory of 1428 2300 inaphxbit.exe 31 PID 1428 wrote to memory of 2256 1428 infdqdofu.exe 32 PID 1428 wrote to memory of 2256 1428 infdqdofu.exe 32 PID 1428 wrote to memory of 2256 1428 infdqdofu.exe 32 PID 1428 wrote to memory of 2256 1428 infdqdofu.exe 32 PID 1428 wrote to memory of 2256 1428 infdqdofu.exe 32 PID 1428 wrote to memory of 2256 1428 infdqdofu.exe 32 PID 1428 wrote to memory of 2256 1428 infdqdofu.exe 32 PID 2256 wrote to memory of 1324 2256 inkzrlbas.exe 33 PID 2256 wrote to memory of 1324 2256 inkzrlbas.exe 33 PID 2256 wrote to memory of 1324 2256 inkzrlbas.exe 33 PID 2256 wrote to memory of 1324 2256 inkzrlbas.exe 33 PID 2256 wrote to memory of 1324 2256 inkzrlbas.exe 33 PID 2256 wrote to memory of 1324 2256 inkzrlbas.exe 33 PID 2256 wrote to memory of 1324 2256 inkzrlbas.exe 33 PID 1324 wrote to memory of 2232 1324 inyufnzuj.exe 34 PID 1324 wrote to memory of 2232 1324 inyufnzuj.exe 34 PID 1324 wrote to memory of 2232 1324 inyufnzuj.exe 34 PID 1324 wrote to memory of 2232 1324 inyufnzuj.exe 34 PID 1324 wrote to memory of 2232 1324 inyufnzuj.exe 34 PID 1324 wrote to memory of 2232 1324 inyufnzuj.exe 34 PID 1324 wrote to memory of 2232 1324 inyufnzuj.exe 34 PID 2232 wrote to memory of 2600 2232 inxiaqxbm.exe 35 PID 2232 wrote to memory of 2600 2232 inxiaqxbm.exe 35 PID 2232 wrote to memory of 2600 2232 inxiaqxbm.exe 35 PID 2232 wrote to memory of 2600 2232 inxiaqxbm.exe 35 PID 2232 wrote to memory of 2600 2232 inxiaqxbm.exe 35 PID 2232 wrote to memory of 2600 2232 inxiaqxbm.exe 35 PID 2232 wrote to memory of 2600 2232 inxiaqxbm.exe 35 PID 2600 wrote to memory of 2948 2600 invhwkmle.exe 36 PID 2600 wrote to memory of 2948 2600 invhwkmle.exe 36 PID 2600 wrote to memory of 2948 2600 invhwkmle.exe 36 PID 2600 wrote to memory of 2948 2600 invhwkmle.exe 36 PID 2600 wrote to memory of 2948 2600 invhwkmle.exe 36 PID 2600 wrote to memory of 2948 2600 invhwkmle.exe 36 PID 2600 wrote to memory of 2948 2600 invhwkmle.exe 36 PID 2948 wrote to memory of 1756 2948 inoavpdfe.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c18c43ed8bb89755a39c623615548d9b.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c18c43ed8bb89755a39c623615548d9b.exe"1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\inldtepix.exeC:\Windows\system32\inldtepix.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\inaphxbit.exeC:\Windows\system32\inaphxbit.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\infdqdofu.exeC:\Windows\system32\infdqdofu.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\inkzrlbas.exeC:\Windows\system32\inkzrlbas.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\inyufnzuj.exeC:\Windows\system32\inyufnzuj.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\inxiaqxbm.exeC:\Windows\system32\inxiaqxbm.exe8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\invhwkmle.exeC:\Windows\system32\invhwkmle.exe9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Windows\SysWOW64\inatwyxqd.exeC:\Windows\system32\inatwyxqd.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:584 -
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe14⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:556 -
C:\Windows\SysWOW64\indwztgsi.exeC:\Windows\system32\indwztgsi.exe15⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Windows\SysWOW64\inpbwqegf.exeC:\Windows\system32\inpbwqegf.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Windows\SysWOW64\inesqmezb.exeC:\Windows\system32\inesqmezb.exe17⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Windows\SysWOW64\innfvgrkz.exeC:\Windows\system32\innfvgrkz.exe18⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Windows\SysWOW64\insezthji.exeC:\Windows\system32\insezthji.exe19⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2400 -
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe20⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Windows\SysWOW64\ingvnhoze.exeC:\Windows\system32\ingvnhoze.exe21⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1268 -
C:\Windows\SysWOW64\injmdckxk.exeC:\Windows\system32\injmdckxk.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:796 -
C:\Windows\SysWOW64\indskelwb.exeC:\Windows\system32\indskelwb.exe23⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Windows\SysWOW64\inortslka.exeC:\Windows\system32\inortslka.exe24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1140 -
C:\Windows\SysWOW64\inbbkvfva.exeC:\Windows\system32\inbbkvfva.exe25⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:612 -
C:\Windows\SysWOW64\inefvmlzb.exeC:\Windows\system32\inefvmlzb.exe26⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Windows\SysWOW64\incraptug.exeC:\Windows\system32\incraptug.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:588 -
C:\Windows\SysWOW64\inutvwllh.exeC:\Windows\system32\inutvwllh.exe28⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe29⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Windows\SysWOW64\innqsrkjz.exeC:\Windows\system32\innqsrkjz.exe30⤵PID:1396
-
C:\Windows\SysWOW64\intcrvwiy.exeC:\Windows\system32\intcrvwiy.exe31⤵PID:2128
-
C:\Windows\SysWOW64\inasgqvzt.exeC:\Windows\system32\inasgqvzt.exe32⤵PID:828
-
C:\Windows\SysWOW64\inwsdlxsh.exeC:\Windows\system32\inwsdlxsh.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060 -
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe34⤵PID:2872
-
C:\Windows\SysWOW64\inwmpgfnn.exeC:\Windows\system32\inwmpgfnn.exe35⤵PID:2484
-
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe36⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Windows\SysWOW64\inyjbrycn.exeC:\Windows\system32\inyjbrycn.exe37⤵PID:1908
-
C:\Windows\SysWOW64\inpfzcyeq.exeC:\Windows\system32\inpfzcyeq.exe38⤵PID:876
-
C:\Windows\SysWOW64\ingvzmksi.exeC:\Windows\system32\ingvzmksi.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312 -
C:\Windows\SysWOW64\inixpjqgj.exeC:\Windows\system32\inixpjqgj.exe40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\SysWOW64\inhwnltjf.exeC:\Windows\system32\inhwnltjf.exe41⤵PID:944
-
C:\Windows\SysWOW64\ineqbmfxl.exeC:\Windows\system32\ineqbmfxl.exe42⤵PID:2336
-
C:\Windows\SysWOW64\infudswxj.exeC:\Windows\system32\infudswxj.exe43⤵PID:1488
-
C:\Windows\SysWOW64\intpaiupe.exeC:\Windows\system32\intpaiupe.exe44⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\SysWOW64\infumgnyd.exeC:\Windows\system32\infumgnyd.exe45⤵PID:2692
-
C:\Windows\SysWOW64\inmtnbdcu.exeC:\Windows\system32\inmtnbdcu.exe46⤵PID:2100
-
C:\Windows\SysWOW64\inapnrseu.exeC:\Windows\system32\inapnrseu.exe47⤵PID:952
-
C:\Windows\SysWOW64\inewrcnnk.exeC:\Windows\system32\inewrcnnk.exe48⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\SysWOW64\insvxwpco.exeC:\Windows\system32\insvxwpco.exe49⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\inpqffxwb.exeC:\Windows\system32\inpqffxwb.exe28⤵PID:1272
-
C:\Windows\SysWOW64\intsuvkkg.exeC:\Windows\system32\intsuvkkg.exe29⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:1940 -
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe30⤵
- Executes dropped EXE
PID:1396 -
C:\Windows\SysWOW64\inwemzvcu.exeC:\Windows\system32\inwemzvcu.exe31⤵PID:1444
-
C:\Windows\SysWOW64\insrzztuj.exeC:\Windows\system32\insrzztuj.exe32⤵PID:2352
-
C:\Windows\SysWOW64\inuqbjvqf.exeC:\Windows\system32\inuqbjvqf.exe33⤵PID:2472
-
C:\Windows\SysWOW64\injlxlxig.exeC:\Windows\system32\injlxlxig.exe34⤵PID:2540
-
C:\Windows\SysWOW64\inbmkzbqa.exeC:\Windows\system32\inbmkzbqa.exe35⤵
- Drops file in System32 directory
PID:2568 -
C:\Windows\SysWOW64\inopeewva.exeC:\Windows\system32\inopeewva.exe36⤵PID:2532
-
C:\Windows\SysWOW64\inqtvunam.exeC:\Windows\system32\inqtvunam.exe37⤵PID:2252
-
C:\Windows\SysWOW64\intojzuff.exeC:\Windows\system32\intojzuff.exe38⤵PID:2328
-
C:\Windows\SysWOW64\ingwzqpxx.exeC:\Windows\system32\ingwzqpxx.exe39⤵PID:1872
-
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe40⤵PID:1260
-
C:\Windows\SysWOW64\injyiwuqi.exeC:\Windows\system32\injyiwuqi.exe41⤵PID:2864
-
-
-
-
-
-
C:\Windows\SysWOW64\injkrqgyq.exeC:\Windows\system32\injkrqgyq.exe37⤵PID:1352
-
C:\Windows\SysWOW64\inaexuhtj.exeC:\Windows\system32\inaexuhtj.exe38⤵PID:1428
-
C:\Windows\SysWOW64\inogwahsa.exeC:\Windows\system32\inogwahsa.exe39⤵PID:1688
-
C:\Windows\SysWOW64\insgwlney.exeC:\Windows\system32\insgwlney.exe40⤵PID:1776
-
C:\Windows\SysWOW64\intmsjkwc.exeC:\Windows\system32\intmsjkwc.exe41⤵PID:2112
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\inochlfll.exeC:\Windows\system32\inochlfll.exe27⤵PID:432
-
C:\Windows\SysWOW64\inswrxvke.exeC:\Windows\system32\inswrxvke.exe28⤵PID:2600
-
C:\Windows\SysWOW64\infrfqjpo.exeC:\Windows\system32\infrfqjpo.exe29⤵PID:2852
-
C:\Windows\SysWOW64\inxgusiod.exeC:\Windows\system32\inxgusiod.exe30⤵PID:852
-
-
-
C:\Windows\SysWOW64\intetdxsy.exeC:\Windows\system32\intetdxsy.exe29⤵PID:288
-
C:\Windows\SysWOW64\inyteppma.exeC:\Windows\system32\inyteppma.exe30⤵PID:3052
-
C:\Windows\SysWOW64\inqzaupvo.exeC:\Windows\system32\inqzaupvo.exe31⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
C:\Windows\SysWOW64\inbfffozj.exeC:\Windows\system32\inbfffozj.exe32⤵PID:2776
-
C:\Windows\SysWOW64\insohtodl.exeC:\Windows\system32\insohtodl.exe33⤵PID:828
-
C:\Windows\SysWOW64\inpkvggzd.exeC:\Windows\system32\inpkvggzd.exe34⤵PID:2800
-
C:\Windows\SysWOW64\ingvfeugi.exeC:\Windows\system32\ingvfeugi.exe35⤵PID:1864
-
C:\Windows\SysWOW64\inqdmufdj.exeC:\Windows\system32\inqdmufdj.exe36⤵PID:3008
-
C:\Windows\SysWOW64\inacgtgkr.exeC:\Windows\system32\inacgtgkr.exe37⤵PID:1400
-
C:\Windows\SysWOW64\ineugyxhj.exeC:\Windows\system32\ineugyxhj.exe38⤵PID:2296
-
C:\Windows\SysWOW64\inlubyhti.exeC:\Windows\system32\inlubyhti.exe39⤵PID:576
-
C:\Windows\SysWOW64\inkbaivic.exeC:\Windows\system32\inkbaivic.exe40⤵PID:1620
-
C:\Windows\SysWOW64\inomzqrdt.exeC:\Windows\system32\inomzqrdt.exe41⤵PID:1488
-
C:\Windows\SysWOW64\infslrijv.exeC:\Windows\system32\infslrijv.exe42⤵PID:2812
-
C:\Windows\SysWOW64\inqnbrgit.exeC:\Windows\system32\inqnbrgit.exe43⤵PID:2652
-
-
-
-
-
-
-
C:\Windows\SysWOW64\insvsctst.exeC:\Windows\system32\insvsctst.exe38⤵PID:2296
-
C:\Windows\SysWOW64\incvxxhec.exeC:\Windows\system32\incvxxhec.exe39⤵PID:2492
-
C:\Windows\SysWOW64\inhjvjvge.exeC:\Windows\system32\inhjvjvge.exe40⤵PID:1324
-
C:\Windows\SysWOW64\insbznvcp.exeC:\Windows\system32\insbznvcp.exe41⤵PID:2156
-
C:\Windows\SysWOW64\inbuzcxoc.exeC:\Windows\system32\inbuzcxoc.exe42⤵PID:1472
-
C:\Windows\SysWOW64\inqxvmprs.exeC:\Windows\system32\inqxvmprs.exe43⤵PID:1712
-
C:\Windows\SysWOW64\inrhnxdft.exeC:\Windows\system32\inrhnxdft.exe44⤵PID:1740
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\ingoxeawx.exeC:\Windows\system32\ingoxeawx.exe1⤵PID:1732
-
C:\Windows\SysWOW64\inxnqhgoo.exeC:\Windows\system32\inxnqhgoo.exe2⤵PID:2200
-
-
C:\Windows\SysWOW64\inqmfrmyb.exeC:\Windows\system32\inqmfrmyb.exe1⤵PID:1500
-
C:\Windows\SysWOW64\inahuhbcs.exeC:\Windows\system32\inahuhbcs.exe2⤵PID:1516
-
C:\Windows\SysWOW64\inknedlyl.exeC:\Windows\system32\inknedlyl.exe3⤵PID:2424
-
C:\Windows\SysWOW64\incvyzsfr.exeC:\Windows\system32\incvyzsfr.exe4⤵PID:3024
-
C:\Windows\SysWOW64\indhxkwmb.exeC:\Windows\system32\indhxkwmb.exe5⤵PID:2296
-
-
-
-
-
C:\Windows\SysWOW64\ineuxonvv.exeC:\Windows\system32\ineuxonvv.exe1⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:608
-
C:\Windows\SysWOW64\inmkxopbr.exeC:\Windows\system32\inmkxopbr.exe1⤵PID:2284
-
C:\Windows\SysWOW64\ingerepgv.exeC:\Windows\system32\ingerepgv.exe2⤵PID:2716
-
-
C:\Windows\SysWOW64\inckxztas.exeC:\Windows\system32\inckxztas.exe1⤵PID:1600
-
C:\Windows\SysWOW64\inykznpoh.exeC:\Windows\system32\inykznpoh.exe2⤵PID:1956
-
-
C:\Windows\SysWOW64\inzhuwqpq.exeC:\Windows\system32\inzhuwqpq.exe1⤵PID:2500
-
C:\Windows\SysWOW64\indtwnmuu.exeC:\Windows\system32\indtwnmuu.exe2⤵PID:668
-
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe3⤵
- Modifies Installed Components in the registry
PID:1916 -
C:\Windows\SysWOW64\incvdypdo.exeC:\Windows\system32\incvdypdo.exe4⤵PID:588
-
-
-
-
C:\Windows\SysWOW64\inijzqpfx.exeC:\Windows\system32\inijzqpfx.exe1⤵PID:2504
-
C:\Windows\SysWOW64\ingvetxyk.exeC:\Windows\system32\ingvetxyk.exe1⤵PID:928
-
C:\Windows\SysWOW64\inzkzjyci.exeC:\Windows\system32\inzkzjyci.exe1⤵PID:1900
-
C:\Windows\SysWOW64\inxtemyti.exeC:\Windows\system32\inxtemyti.exe2⤵PID:2308
-
C:\Windows\SysWOW64\inzloqpih.exeC:\Windows\system32\inzloqpih.exe3⤵PID:668
-
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe4⤵PID:2656
-
C:\Windows\SysWOW64\intfuikjc.exeC:\Windows\system32\intfuikjc.exe5⤵PID:900
-
C:\Windows\SysWOW64\innuocedv.exeC:\Windows\system32\innuocedv.exe6⤵PID:1300
-
C:\Windows\SysWOW64\inhegsgsd.exeC:\Windows\system32\inhegsgsd.exe7⤵PID:2844
-
C:\Windows\SysWOW64\inrfpuysy.exeC:\Windows\system32\inrfpuysy.exe8⤵PID:1208
-
C:\Windows\SysWOW64\inftrnfcc.exeC:\Windows\system32\inftrnfcc.exe9⤵PID:1552
-
C:\Windows\SysWOW64\inhxjlpig.exeC:\Windows\system32\inhxjlpig.exe10⤵PID:3056
-
C:\Windows\SysWOW64\inugvjlkd.exeC:\Windows\system32\inugvjlkd.exe11⤵PID:2744
-
C:\Windows\SysWOW64\inrngsnzc.exeC:\Windows\system32\inrngsnzc.exe12⤵PID:2420
-
C:\Windows\SysWOW64\invqlwhhe.exeC:\Windows\system32\invqlwhhe.exe13⤵PID:2268
-
C:\Windows\SysWOW64\inzkcszdo.exeC:\Windows\system32\inzkcszdo.exe14⤵PID:2708
-
C:\Windows\SysWOW64\innlypqcs.exeC:\Windows\system32\innlypqcs.exe15⤵PID:2072
-
C:\Windows\SysWOW64\injyqkarh.exeC:\Windows\system32\injyqkarh.exe16⤵PID:1904
-
C:\Windows\SysWOW64\ineybxzdp.exeC:\Windows\system32\ineybxzdp.exe17⤵PID:536
-
C:\Windows\SysWOW64\injfqeotx.exeC:\Windows\system32\injfqeotx.exe18⤵PID:1600
-
C:\Windows\SysWOW64\incsvmltt.exeC:\Windows\system32\incsvmltt.exe19⤵PID:2192
-
C:\Windows\SysWOW64\inxtleici.exeC:\Windows\system32\inxtleici.exe20⤵PID:1472
-
C:\Windows\SysWOW64\inbrulkss.exeC:\Windows\system32\inbrulkss.exe21⤵PID:1900
-
C:\Windows\SysWOW64\invuwaxma.exeC:\Windows\system32\invuwaxma.exe22⤵PID:2088
-
C:\Windows\SysWOW64\inlvjosms.exeC:\Windows\system32\inlvjosms.exe23⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
PID:668 -
C:\Windows\SysWOW64\inigtklnv.exeC:\Windows\system32\inigtklnv.exe24⤵PID:1292
-
C:\Windows\SysWOW64\inbqostfv.exeC:\Windows\system32\inbqostfv.exe25⤵PID:1792
-
C:\Windows\SysWOW64\inxrqyyst.exeC:\Windows\system32\inxrqyyst.exe26⤵PID:1524
-
C:\Windows\SysWOW64\inlgwrccv.exeC:\Windows\system32\inlgwrccv.exe27⤵PID:1512
-
C:\Windows\SysWOW64\indscwrxb.exeC:\Windows\system32\indscwrxb.exe28⤵PID:2372
-
C:\Windows\SysWOW64\inilcbjwj.exeC:\Windows\system32\inilcbjwj.exe29⤵PID:2572
-
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe30⤵PID:2440
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\inhgwhjlo.exeC:\Windows\system32\inhgwhjlo.exe3⤵PID:1796
-
C:\Windows\SysWOW64\inaqceivb.exeC:\Windows\system32\inaqceivb.exe4⤵PID:1988
-
C:\Windows\SysWOW64\indvjzcoq.exeC:\Windows\system32\indvjzcoq.exe5⤵PID:2956
-
C:\Windows\SysWOW64\inbkyszdb.exeC:\Windows\system32\inbkyszdb.exe6⤵PID:1516
-
C:\Windows\SysWOW64\inbsfowhf.exeC:\Windows\system32\inbsfowhf.exe7⤵PID:2416
-
C:\Windows\SysWOW64\inzewkdpr.exeC:\Windows\system32\inzewkdpr.exe8⤵PID:1716
-
C:\Windows\SysWOW64\inktojpiu.exeC:\Windows\system32\inktojpiu.exe9⤵PID:2340
-
C:\Windows\SysWOW64\innusjmop.exeC:\Windows\system32\innusjmop.exe10⤵PID:2800
-
C:\Windows\SysWOW64\injqftzfq.exeC:\Windows\system32\injqftzfq.exe11⤵PID:2712
-
C:\Windows\SysWOW64\infxiosfk.exeC:\Windows\system32\infxiosfk.exe12⤵PID:1548
-
C:\Windows\SysWOW64\inbmmjnwc.exeC:\Windows\system32\inbmmjnwc.exe13⤵PID:2072
-
C:\Windows\SysWOW64\inocokdvj.exeC:\Windows\system32\inocokdvj.exe14⤵PID:276
-
C:\Windows\SysWOW64\inrkqhiua.exeC:\Windows\system32\inrkqhiua.exe15⤵PID:2868
-
C:\Windows\SysWOW64\inqzfhsqg.exeC:\Windows\system32\inqzfhsqg.exe16⤵PID:1576
-
C:\Windows\SysWOW64\inrcangym.exeC:\Windows\system32\inrcangym.exe17⤵PID:1572
-
C:\Windows\SysWOW64\iniqgcwmo.exeC:\Windows\system32\iniqgcwmo.exe18⤵PID:2664
-
C:\Windows\SysWOW64\inqklaasr.exeC:\Windows\system32\inqklaasr.exe19⤵PID:2164
-
C:\Windows\SysWOW64\inyluacnl.exeC:\Windows\system32\inyluacnl.exe20⤵PID:1656
-
C:\Windows\SysWOW64\inaiqezai.exeC:\Windows\system32\inaiqezai.exe21⤵PID:1484
-
C:\Windows\SysWOW64\inbkobdgw.exeC:\Windows\system32\inbkobdgw.exe22⤵PID:1048
-
C:\Windows\SysWOW64\ingfvhjng.exeC:\Windows\system32\ingfvhjng.exe23⤵PID:1588
-
C:\Windows\SysWOW64\indkntxkp.exeC:\Windows\system32\indkntxkp.exe24⤵PID:1208
-
C:\Windows\SysWOW64\inivxkbyw.exeC:\Windows\system32\inivxkbyw.exe25⤵PID:2836
-
C:\Windows\SysWOW64\inbdhuahl.exeC:\Windows\system32\inbdhuahl.exe26⤵PID:2392
-
C:\Windows\SysWOW64\inhomdgwi.exeC:\Windows\system32\inhomdgwi.exe27⤵PID:2772
-
C:\Windows\SysWOW64\inxndtjlz.exeC:\Windows\system32\inxndtjlz.exe28⤵PID:1636
-
C:\Windows\SysWOW64\inwanaevl.exeC:\Windows\system32\inwanaevl.exe29⤵PID:3020
-
C:\Windows\SysWOW64\inmxiifwj.exeC:\Windows\system32\inmxiifwj.exe30⤵PID:632
-
C:\Windows\SysWOW64\inzjlpkqo.exeC:\Windows\system32\inzjlpkqo.exe31⤵PID:2632
-
C:\Windows\SysWOW64\indwezqep.exeC:\Windows\system32\indwezqep.exe32⤵PID:2876
-
C:\Windows\SysWOW64\inyxynpgc.exeC:\Windows\system32\inyxynpgc.exe33⤵PID:2504
-
C:\Windows\SysWOW64\iniqzgcyz.exeC:\Windows\system32\iniqzgcyz.exe34⤵PID:1400
-
C:\Windows\SysWOW64\incwvxbyn.exeC:\Windows\system32\incwvxbyn.exe35⤵PID:1560
-
C:\Windows\SysWOW64\infbnvcjf.exeC:\Windows\system32\infbnvcjf.exe36⤵PID:2256
-
C:\Windows\SysWOW64\inowmiavg.exeC:\Windows\system32\inowmiavg.exe37⤵PID:2196
-
C:\Windows\SysWOW64\injfzedyv.exeC:\Windows\system32\injfzedyv.exe38⤵PID:2812
-
C:\Windows\SysWOW64\inbobfwma.exeC:\Windows\system32\inbobfwma.exe39⤵PID:1324
-
C:\Windows\SysWOW64\inuydrpyf.exeC:\Windows\system32\inuydrpyf.exe40⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952 -
C:\Windows\SysWOW64\ingtvpopk.exeC:\Windows\system32\ingtvpopk.exe41⤵PID:1624
-
C:\Windows\SysWOW64\insgoyikn.exeC:\Windows\system32\insgoyikn.exe42⤵PID:1752
-
C:\Windows\SysWOW64\indvdvgmq.exeC:\Windows\system32\indvdvgmq.exe43⤵PID:1484
-
C:\Windows\SysWOW64\inlaxcmgz.exeC:\Windows\system32\inlaxcmgz.exe44⤵PID:2808
-
C:\Windows\SysWOW64\ineyyaxuz.exeC:\Windows\system32\ineyyaxuz.exe45⤵PID:3012
-
C:\Windows\SysWOW64\insaljfpw.exeC:\Windows\system32\insaljfpw.exe46⤵PID:2636
-
C:\Windows\SysWOW64\inmwcesvx.exeC:\Windows\system32\inmwcesvx.exe47⤵PID:2424
-
C:\Windows\SysWOW64\inhfsfaqh.exeC:\Windows\system32\inhfsfaqh.exe48⤵PID:1412
-
C:\Windows\SysWOW64\inrbrocsh.exeC:\Windows\system32\inrbrocsh.exe49⤵PID:1772
-
C:\Windows\SysWOW64\inuloqrtx.exeC:\Windows\system32\inuloqrtx.exe50⤵PID:1592
-
C:\Windows\SysWOW64\inbnjcuis.exeC:\Windows\system32\inbnjcuis.exe51⤵PID:2328
-
C:\Windows\SysWOW64\inlsuytzx.exeC:\Windows\system32\inlsuytzx.exe52⤵PID:936
-
C:\Windows\SysWOW64\infvqbbup.exeC:\Windows\system32\infvqbbup.exe53⤵PID:1288
-
C:\Windows\SysWOW64\inhzpfbvl.exeC:\Windows\system32\inhzpfbvl.exe54⤵PID:1476
-
C:\Windows\SysWOW64\inxavmale.exeC:\Windows\system32\inxavmale.exe55⤵PID:2500
-
C:\Windows\SysWOW64\infmbpvbz.exeC:\Windows\system32\infmbpvbz.exe56⤵PID:2060
-
C:\Windows\SysWOW64\inclzteci.exeC:\Windows\system32\inclzteci.exe57⤵PID:3004
-
C:\Windows\SysWOW64\incbrdfjw.exeC:\Windows\system32\incbrdfjw.exe58⤵PID:2016
-
C:\Windows\SysWOW64\inisucehe.exeC:\Windows\system32\inisucehe.exe59⤵PID:1556
-
C:\Windows\SysWOW64\insywlfel.exeC:\Windows\system32\insywlfel.exe60⤵PID:2852
-
C:\Windows\SysWOW64\inyazesml.exeC:\Windows\system32\inyazesml.exe61⤵PID:1708
-
C:\Windows\SysWOW64\inionprva.exeC:\Windows\system32\inionprva.exe62⤵PID:900
-
C:\Windows\SysWOW64\inenraymu.exeC:\Windows\system32\inenraymu.exe63⤵PID:3032
-
C:\Windows\SysWOW64\inlmosntr.exeC:\Windows\system32\inlmosntr.exe64⤵PID:2956
-
C:\Windows\SysWOW64\inupalliz.exeC:\Windows\system32\inupalliz.exe65⤵PID:2808
-
C:\Windows\SysWOW64\inmkoozmm.exeC:\Windows\system32\inmkoozmm.exe66⤵PID:2428
-
C:\Windows\SysWOW64\inepndjtb.exeC:\Windows\system32\inepndjtb.exe67⤵PID:2772
-
C:\Windows\SysWOW64\inxitdtqe.exeC:\Windows\system32\inxitdtqe.exe68⤵PID:1636
-
C:\Windows\SysWOW64\indtkzjxv.exeC:\Windows\system32\indtkzjxv.exe69⤵PID:2464
-
C:\Windows\SysWOW64\inngmlnpt.exeC:\Windows\system32\inngmlnpt.exe70⤵PID:632
-
C:\Windows\SysWOW64\inypsuvxw.exeC:\Windows\system32\inypsuvxw.exe71⤵PID:2252
-
C:\Windows\SysWOW64\inujlcwuk.exeC:\Windows\system32\inujlcwuk.exe72⤵PID:2740
-
C:\Windows\SysWOW64\inqpqfsux.exeC:\Windows\system32\inqpqfsux.exe73⤵PID:1956
-
C:\Windows\SysWOW64\inhscspdt.exeC:\Windows\system32\inhscspdt.exe74⤵PID:1984
-
C:\Windows\SysWOW64\invecggre.exeC:\Windows\system32\invecggre.exe75⤵PID:2868
-
C:\Windows\SysWOW64\incpcgxnb.exeC:\Windows\system32\incpcgxnb.exe76⤵PID:1572
-
C:\Windows\SysWOW64\inkwlklan.exeC:\Windows\system32\inkwlklan.exe77⤵PID:2112
-
C:\Windows\SysWOW64\inqfeufhj.exeC:\Windows\system32\inqfeufhj.exe78⤵PID:2944
-
C:\Windows\SysWOW64\inomvcziu.exeC:\Windows\system32\inomvcziu.exe79⤵PID:2756
-
C:\Windows\SysWOW64\inuwftrhn.exeC:\Windows\system32\inuwftrhn.exe80⤵PID:624
-
C:\Windows\SysWOW64\infsilnih.exeC:\Windows\system32\infsilnih.exe81⤵PID:648
-
C:\Windows\SysWOW64\inhvtxxbv.exeC:\Windows\system32\inhvtxxbv.exe82⤵PID:1796
-
C:\Windows\SysWOW64\inmkimmxk.exeC:\Windows\system32\inmkimmxk.exe83⤵PID:1460
-
C:\Windows\SysWOW64\injdwyyif.exeC:\Windows\system32\injdwyyif.exe84⤵PID:1480
-
C:\Windows\SysWOW64\inwtwqazn.exeC:\Windows\system32\inwtwqazn.exe85⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1396 -
C:\Windows\SysWOW64\infhthtec.exeC:\Windows\system32\infhthtec.exe86⤵PID:2416
-
C:\Windows\SysWOW64\invxurwtq.exeC:\Windows\system32\invxurwtq.exe87⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:828 -
C:\Windows\SysWOW64\inciujlvs.exeC:\Windows\system32\inciujlvs.exe88⤵PID:2408
-
C:\Windows\SysWOW64\inshvhsxn.exeC:\Windows\system32\inshvhsxn.exe89⤵PID:2324
-
C:\Windows\SysWOW64\indzyzoqh.exeC:\Windows\system32\indzyzoqh.exe90⤵PID:1404
-
C:\Windows\SysWOW64\inergdafx.exeC:\Windows\system32\inergdafx.exe91⤵PID:2532
-
C:\Windows\SysWOW64\inbaqtkjr.exeC:\Windows\system32\inbaqtkjr.exe92⤵PID:1884
-
C:\Windows\SysWOW64\initcmsrt.exeC:\Windows\system32\initcmsrt.exe93⤵PID:696
-
C:\Windows\SysWOW64\inhwzdpqb.exeC:\Windows\system32\inhwzdpqb.exe94⤵PID:2368
-
C:\Windows\SysWOW64\indkgfezw.exeC:\Windows\system32\indkgfezw.exe95⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Windows\SysWOW64\invbdruwx.exeC:\Windows\system32\invbdruwx.exe96⤵PID:1892
-
C:\Windows\SysWOW64\innajnacf.exeC:\Windows\system32\innajnacf.exe97⤵PID:2124
-
C:\Windows\SysWOW64\intnwkasd.exeC:\Windows\system32\intnwkasd.exe98⤵PID:2144
-
C:\Windows\SysWOW64\inmktaxgs.exeC:\Windows\system32\inmktaxgs.exe99⤵PID:2016
-
C:\Windows\SysWOW64\inbpjipes.exeC:\Windows\system32\inbpjipes.exe100⤵PID:1704
-
C:\Windows\SysWOW64\inpscqoss.exeC:\Windows\system32\inpscqoss.exe101⤵PID:1424
-
C:\Windows\SysWOW64\indigocxg.exeC:\Windows\system32\indigocxg.exe102⤵PID:2924
-
C:\Windows\SysWOW64\inyctgpxi.exeC:\Windows\system32\inyctgpxi.exe103⤵PID:1988
-
C:\Windows\SysWOW64\inzydrlkr.exeC:\Windows\system32\inzydrlkr.exe104⤵PID:1332
-
C:\Windows\SysWOW64\inrvqwujd.exeC:\Windows\system32\inrvqwujd.exe105⤵PID:2352
-
C:\Windows\SysWOW64\infcpjolj.exeC:\Windows\system32\infcpjolj.exe106⤵PID:2744
-
C:\Windows\SysWOW64\inecpcnet.exeC:\Windows\system32\inecpcnet.exe107⤵PID:2536
-
C:\Windows\SysWOW64\inhqlgymf.exeC:\Windows\system32\inhqlgymf.exe108⤵PID:2032
-
C:\Windows\SysWOW64\inrlmbbts.exeC:\Windows\system32\inrlmbbts.exe109⤵PID:1724
-
C:\Windows\SysWOW64\inrjcgagg.exeC:\Windows\system32\inrjcgagg.exe110⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:876 -
C:\Windows\SysWOW64\inikbvtjp.exeC:\Windows\system32\inikbvtjp.exe111⤵PID:1124
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\insbquvhx.exeC:\Windows\system32\insbquvhx.exe1⤵PID:2400
-
C:\Windows\SysWOW64\inirmhzng.exeC:\Windows\system32\inirmhzng.exe2⤵PID:2532
-
-
C:\Windows\SysWOW64\inhiypoew.exeC:\Windows\system32\inhiypoew.exe1⤵PID:2204
-
C:\Windows\SysWOW64\ingiuiufd.exeC:\Windows\system32\ingiuiufd.exe2⤵PID:284
-
C:\Windows\SysWOW64\indqsmlmh.exeC:\Windows\system32\indqsmlmh.exe3⤵PID:1996
-
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe4⤵PID:1460
-
C:\Windows\SysWOW64\inkveoutv.exeC:\Windows\system32\inkveoutv.exe5⤵PID:1412
-
C:\Windows\SysWOW64\inbqiycju.exeC:\Windows\system32\inbqiycju.exe6⤵PID:2848
-
C:\Windows\SysWOW64\inqjpgzht.exeC:\Windows\system32\inqjpgzht.exe7⤵PID:2360
-
C:\Windows\SysWOW64\inlofemzm.exeC:\Windows\system32\inlofemzm.exe8⤵PID:2276
-
C:\Windows\SysWOW64\inrdysgih.exeC:\Windows\system32\inrdysgih.exe9⤵PID:3024
-
C:\Windows\SysWOW64\inmawkptn.exeC:\Windows\system32\inmawkptn.exe10⤵PID:2120
-
C:\Windows\SysWOW64\injyixbhg.exeC:\Windows\system32\injyixbhg.exe11⤵PID:2268
-
C:\Windows\SysWOW64\inejnhnnw.exeC:\Windows\system32\inejnhnnw.exe12⤵PID:1036
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\inxjymong.exeC:\Windows\system32\inxjymong.exe6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872 -
C:\Windows\SysWOW64\inghxondz.exeC:\Windows\system32\inghxondz.exe7⤵PID:2732
-
C:\Windows\SysWOW64\indxawycz.exeC:\Windows\system32\indxawycz.exe8⤵PID:2272
-
C:\Windows\SysWOW64\inuinrlrc.exeC:\Windows\system32\inuinrlrc.exe9⤵PID:2376
-
C:\Windows\SysWOW64\inixomukg.exeC:\Windows\system32\inixomukg.exe10⤵PID:2296
-
C:\Windows\SysWOW64\inovtknpq.exeC:\Windows\system32\inovtknpq.exe11⤵PID:276
-
C:\Windows\SysWOW64\indeulkya.exeC:\Windows\system32\indeulkya.exe12⤵PID:1580
-
C:\Windows\SysWOW64\inlhzufqa.exeC:\Windows\system32\inlhzufqa.exe13⤵PID:1140
-
C:\Windows\SysWOW64\infnwdvwr.exeC:\Windows\system32\infnwdvwr.exe14⤵PID:2616
-
C:\Windows\SysWOW64\innswqwhw.exeC:\Windows\system32\innswqwhw.exe15⤵PID:1564
-
-
C:\Windows\SysWOW64\invzesqzg.exeC:\Windows\system32\invzesqzg.exe15⤵PID:1888
-
C:\Windows\SysWOW64\inzfhvydh.exeC:\Windows\system32\inzfhvydh.exe16⤵PID:2140
-
C:\Windows\SysWOW64\inligcrtk.exeC:\Windows\system32\inligcrtk.exe17⤵PID:1708
-
C:\Windows\SysWOW64\injausioy.exeC:\Windows\system32\injausioy.exe18⤵PID:556
-
C:\Windows\SysWOW64\inaouaylq.exeC:\Windows\system32\inaouaylq.exe19⤵PID:2624
-
C:\Windows\SysWOW64\infgwnmcy.exeC:\Windows\system32\infgwnmcy.exe20⤵PID:1628
-
C:\Windows\SysWOW64\infnxzhjm.exeC:\Windows\system32\infnxzhjm.exe21⤵PID:2392
-
C:\Windows\SysWOW64\inqrgtvyi.exeC:\Windows\system32\inqrgtvyi.exe22⤵PID:2380
-
C:\Windows\SysWOW64\inrgbjark.exeC:\Windows\system32\inrgbjark.exe23⤵PID:2444
-
C:\Windows\SysWOW64\inrurbsrs.exeC:\Windows\system32\inrurbsrs.exe24⤵PID:2572
-
C:\Windows\SysWOW64\incgncjih.exeC:\Windows\system32\incgncjih.exe25⤵PID:2320
-
C:\Windows\SysWOW64\inpnehxjk.exeC:\Windows\system32\inpnehxjk.exe26⤵PID:944
-
C:\Windows\SysWOW64\ingcowdkg.exeC:\Windows\system32\ingcowdkg.exe27⤵PID:1788
-
C:\Windows\SysWOW64\inkxmjgli.exeC:\Windows\system32\inkxmjgli.exe28⤵PID:1868
-
C:\Windows\SysWOW64\inhbuwzwg.exeC:\Windows\system32\inhbuwzwg.exe29⤵PID:1400
-
C:\Windows\SysWOW64\inhrtbdgd.exeC:\Windows\system32\inhrtbdgd.exe30⤵PID:696
-
C:\Windows\SysWOW64\inatybwnb.exeC:\Windows\system32\inatybwnb.exe31⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Windows\SysWOW64\intndtuwg.exeC:\Windows\system32\intndtuwg.exe32⤵PID:2512
-
C:\Windows\SysWOW64\inkjzlnrk.exeC:\Windows\system32\inkjzlnrk.exe33⤵PID:1472
-
C:\Windows\SysWOW64\inimthpzj.exeC:\Windows\system32\inimthpzj.exe34⤵PID:1044
-
C:\Windows\SysWOW64\inmflkmos.exeC:\Windows\system32\inmflkmos.exe35⤵PID:2944
-
C:\Windows\SysWOW64\invudbffq.exeC:\Windows\system32\invudbffq.exe36⤵PID:2948
-
C:\Windows\SysWOW64\inagshjtq.exeC:\Windows\system32\inagshjtq.exe37⤵PID:624
-
C:\Windows\SysWOW64\innhnzoqa.exeC:\Windows\system32\innhnzoqa.exe38⤵PID:1976
-
C:\Windows\SysWOW64\inczeboin.exeC:\Windows\system32\inczeboin.exe39⤵PID:2404
-
C:\Windows\SysWOW64\incjmswjo.exeC:\Windows\system32\incjmswjo.exe40⤵PID:1988
-
C:\Windows\SysWOW64\inumafjdj.exeC:\Windows\system32\inumafjdj.exe41⤵PID:2552
-
C:\Windows\SysWOW64\inhxjkmql.exeC:\Windows\system32\inhxjkmql.exe42⤵PID:2352
-
C:\Windows\SysWOW64\inqqspmro.exeC:\Windows\system32\inqqspmro.exe43⤵PID:1908
-
C:\Windows\SysWOW64\inhuwzjax.exeC:\Windows\system32\inhuwzjax.exe44⤵PID:1772
-
C:\Windows\SysWOW64\ingcmtril.exeC:\Windows\system32\ingcmtril.exe45⤵PID:2400
-
C:\Windows\SysWOW64\inyepukgs.exeC:\Windows\system32\inyepukgs.exe46⤵PID:2464
-
C:\Windows\SysWOW64\injtvdfif.exeC:\Windows\system32\injtvdfif.exe47⤵PID:940
-
C:\Windows\SysWOW64\incajnuiq.exeC:\Windows\system32\incajnuiq.exe48⤵PID:1136
-
C:\Windows\SysWOW64\inrbwntbl.exeC:\Windows\system32\inrbwntbl.exe49⤵PID:2212
-
C:\Windows\SysWOW64\inctckufj.exeC:\Windows\system32\inctckufj.exe50⤵PID:2832
-
C:\Windows\SysWOW64\inmqlrpew.exeC:\Windows\system32\inmqlrpew.exe51⤵PID:1904
-
C:\Windows\SysWOW64\inpiofygs.exeC:\Windows\system32\inpiofygs.exe52⤵PID:612
-
C:\Windows\SysWOW64\invzzdxxz.exeC:\Windows\system32\invzzdxxz.exe53⤵PID:2088
-
C:\Windows\SysWOW64\inxmeiauv.exeC:\Windows\system32\inxmeiauv.exe54⤵PID:1324
-
C:\Windows\SysWOW64\ingugrwmi.exeC:\Windows\system32\ingugrwmi.exe55⤵PID:976
-
C:\Windows\SysWOW64\ingrakqpr.exeC:\Windows\system32\ingrakqpr.exe56⤵PID:2016
-
C:\Windows\SysWOW64\incbskfog.exeC:\Windows\system32\incbskfog.exe57⤵PID:1692
-
C:\Windows\SysWOW64\injvkjzkm.exeC:\Windows\system32\injvkjzkm.exe58⤵PID:1292
-
C:\Windows\SysWOW64\inwuyycww.exeC:\Windows\system32\inwuyycww.exe59⤵PID:1048
-
C:\Windows\SysWOW64\inhrkssoj.exeC:\Windows\system32\inhrkssoj.exe60⤵PID:2608
-
C:\Windows\SysWOW64\inpkfxleq.exeC:\Windows\system32\inpkfxleq.exe61⤵PID:1988
-
C:\Windows\SysWOW64\innoqupvt.exeC:\Windows\system32\innoqupvt.exe62⤵PID:3012
-
C:\Windows\SysWOW64\inhoksmcs.exeC:\Windows\system32\inhoksmcs.exe63⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:2352 -
C:\Windows\SysWOW64\inisglpjp.exeC:\Windows\system32\inisglpjp.exe64⤵PID:2068
-
C:\Windows\SysWOW64\inmvbdomc.exeC:\Windows\system32\inmvbdomc.exe65⤵PID:1772
-
C:\Windows\SysWOW64\ingpzupnj.exeC:\Windows\system32\ingpzupnj.exe66⤵PID:1944
-
C:\Windows\SysWOW64\inlolxmlm.exeC:\Windows\system32\inlolxmlm.exe67⤵PID:2464
-
C:\Windows\SysWOW64\indvgidcn.exeC:\Windows\system32\indvgidcn.exe68⤵PID:2972
-
C:\Windows\SysWOW64\intygcqsp.exeC:\Windows\system32\intygcqsp.exe69⤵PID:1136
-
C:\Windows\SysWOW64\inmbydanh.exeC:\Windows\system32\inmbydanh.exe70⤵PID:1872
-
C:\Windows\SysWOW64\inboqtdrp.exeC:\Windows\system32\inboqtdrp.exe71⤵PID:2832
-
C:\Windows\SysWOW64\inpedtegi.exeC:\Windows\system32\inpedtegi.exe72⤵PID:2192
-
C:\Windows\SysWOW64\inddqfcew.exeC:\Windows\system32\inddqfcew.exe73⤵PID:2644
-
C:\Windows\SysWOW64\injavkrnv.exeC:\Windows\system32\injavkrnv.exe74⤵PID:2176
-
C:\Windows\SysWOW64\inmrhdpxe.exeC:\Windows\system32\inmrhdpxe.exe75⤵PID:2144
-
C:\Windows\SysWOW64\ineguxzcg.exeC:\Windows\system32\ineguxzcg.exe76⤵PID:328
-
C:\Windows\SysWOW64\iniszaxor.exeC:\Windows\system32\iniszaxor.exe77⤵PID:1648
-
C:\Windows\SysWOW64\invpovkyk.exeC:\Windows\system32\invpovkyk.exe78⤵PID:1424
-
C:\Windows\SysWOW64\inrshhzyd.exeC:\Windows\system32\inrshhzyd.exe79⤵PID:892
-
C:\Windows\SysWOW64\inrgfvgik.exeC:\Windows\system32\inrgfvgik.exe80⤵PID:2348
-
C:\Windows\SysWOW64\inmjhdsul.exeC:\Windows\system32\inmjhdsul.exe81⤵PID:2860
-
C:\Windows\SysWOW64\inhpbxdla.exeC:\Windows\system32\inhpbxdla.exe82⤵PID:2776
-
C:\Windows\SysWOW64\inxzpbsoh.exeC:\Windows\system32\inxzpbsoh.exe83⤵PID:2120
-
C:\Windows\SysWOW64\inuonujxj.exeC:\Windows\system32\inuonujxj.exe84⤵PID:2284
-
C:\Windows\SysWOW64\inonvvpqf.exeC:\Windows\system32\inonvvpqf.exe85⤵PID:2752
-
C:\Windows\SysWOW64\infzicqlp.exeC:\Windows\system32\infzicqlp.exe86⤵PID:944
-
C:\Windows\SysWOW64\inaaajueu.exeC:\Windows\system32\inaaajueu.exe87⤵PID:2504
-
C:\Windows\SysWOW64\inyvsxuru.exeC:\Windows\system32\inyvsxuru.exe88⤵PID:1868
-
C:\Windows\SysWOW64\inapytoun.exeC:\Windows\system32\inapytoun.exe89⤵PID:2592
-
C:\Windows\SysWOW64\inbsbjtei.exeC:\Windows\system32\inbsbjtei.exe90⤵PID:1400
-
C:\Windows\SysWOW64\invhyunli.exeC:\Windows\system32\invhyunli.exe91⤵PID:1268
-
C:\Windows\SysWOW64\infcnwrgb.exeC:\Windows\system32\infcnwrgb.exe92⤵PID:1572
-
C:\Windows\SysWOW64\inljhllwj.exeC:\Windows\system32\inljhllwj.exe93⤵PID:1900
-
C:\Windows\SysWOW64\insjarhdx.exeC:\Windows\system32\insjarhdx.exe94⤵PID:2644
-
C:\Windows\SysWOW64\infuxbnop.exeC:\Windows\system32\infuxbnop.exe95⤵PID:956
-
C:\Windows\SysWOW64\inttrrtqn.exeC:\Windows\system32\inttrrtqn.exe96⤵PID:2116
-
C:\Windows\SysWOW64\inulkzdji.exeC:\Windows\system32\inulkzdji.exe97⤵PID:1272
-
C:\Windows\SysWOW64\ineamubie.exeC:\Windows\system32\ineamubie.exe98⤵PID:1648
-
C:\Windows\SysWOW64\inulrjenx.exeC:\Windows\system32\inulrjenx.exe99⤵PID:1424
-
C:\Windows\SysWOW64\inicbilrv.exeC:\Windows\system32\inicbilrv.exe100⤵PID:2836
-
C:\Windows\SysWOW64\inoxlbteg.exeC:\Windows\system32\inoxlbteg.exe101⤵PID:2436
-
C:\Windows\SysWOW64\inuzplcxm.exeC:\Windows\system32\inuzplcxm.exe102⤵PID:2264
-
C:\Windows\SysWOW64\inniombtb.exeC:\Windows\system32\inniombtb.exe103⤵PID:2344
-
C:\Windows\SysWOW64\inindltah.exeC:\Windows\system32\inindltah.exe104⤵PID:2120
-
C:\Windows\SysWOW64\inzprbebn.exeC:\Windows\system32\inzprbebn.exe105⤵PID:300
-
C:\Windows\SysWOW64\inljswfrz.exeC:\Windows\system32\inljswfrz.exe106⤵PID:2752
-
C:\Windows\SysWOW64\intuwvzao.exeC:\Windows\system32\intuwvzao.exe107⤵PID:2696
-
C:\Windows\SysWOW64\invqmdynu.exeC:\Windows\system32\invqmdynu.exe108⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\inbhrywnq.exeC:\Windows\system32\inbhrywnq.exe109⤵PID:836
-
C:\Windows\SysWOW64\intbpxrhx.exeC:\Windows\system32\intbpxrhx.exe110⤵PID:1840
-
C:\Windows\SysWOW64\intxcqoxe.exeC:\Windows\system32\intxcqoxe.exe111⤵PID:1120
-
C:\Windows\SysWOW64\injsnioht.exeC:\Windows\system32\injsnioht.exe112⤵PID:2832
-
C:\Windows\SysWOW64\inspmpjxs.exeC:\Windows\system32\inspmpjxs.exe113⤵PID:2112
-
C:\Windows\SysWOW64\inewhnrej.exeC:\Windows\system32\inewhnrej.exe114⤵PID:1324
-
C:\Windows\SysWOW64\inloiwrfv.exeC:\Windows\system32\inloiwrfv.exe115⤵PID:2944
-
C:\Windows\SysWOW64\insnlhfnv.exeC:\Windows\system32\insnlhfnv.exe116⤵PID:2016
-
C:\Windows\SysWOW64\indbxwxmz.exeC:\Windows\system32\indbxwxmz.exe117⤵
- Executes dropped EXE
PID:2128 -
C:\Windows\SysWOW64\ingwobgus.exeC:\Windows\system32\ingwobgus.exe118⤵PID:1460
-
C:\Windows\SysWOW64\ingatvyvf.exeC:\Windows\system32\ingatvyvf.exe119⤵PID:1480
-
C:\Windows\SysWOW64\inwyoarng.exeC:\Windows\system32\inwyoarng.exe120⤵PID:2472
-
C:\Windows\SysWOW64\inbjmhcqx.exeC:\Windows\system32\inbjmhcqx.exe121⤵PID:2772
-
C:\Windows\SysWOW64\inorbpnrr.exeC:\Windows\system32\inorbpnrr.exe122⤵PID:2436
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-