Analysis
-
max time kernel
145s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12-11-2023 18:34
Behavioral task
behavioral1
Sample
NEAS.c18c43ed8bb89755a39c623615548d9b.exe
Resource
win7-20231023-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.c18c43ed8bb89755a39c623615548d9b.exe
Resource
win10v2004-20231023-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
NEAS.c18c43ed8bb89755a39c623615548d9b.exe
-
Size
348KB
-
MD5
c18c43ed8bb89755a39c623615548d9b
-
SHA1
26ccf1705a97c3581d852fe0ae25d30a8cb03a9f
-
SHA256
80ee6d90bbe17079b49291b1804764024cc74f8cac810817359c3319f3a90619
-
SHA512
857e32d6e4271f41700bb8d217f1f003f5392b6c4d7e0b538b4af31893a4e4d2d2a65a15c2a91a8e63ebec7be0bb6b096410c235089b4514be0c4fad8801c280
-
SSDEEP
6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0S/:ouLwoZQGpnedeP/deUe1ppGjTGHZRT0D
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 58 IoCs
resource yara_rule behavioral2/memory/4660-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cf8-14.dat family_gh0strat behavioral2/files/0x0006000000022cf9-19.dat family_gh0strat behavioral2/files/0x0006000000022cf9-20.dat family_gh0strat behavioral2/memory/4660-22-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cfe-42.dat family_gh0strat behavioral2/memory/4756-46-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022cfe-43.dat family_gh0strat behavioral2/files/0x0006000000022cfe-41.dat family_gh0strat behavioral2/files/0x0006000000022d02-65.dat family_gh0strat behavioral2/memory/2568-69-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d02-67.dat family_gh0strat behavioral2/files/0x0006000000022d06-88.dat family_gh0strat behavioral2/memory/3852-93-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/5000-92-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d06-90.dat family_gh0strat behavioral2/files/0x0006000000022d0a-112.dat family_gh0strat behavioral2/files/0x0006000000022d0a-115.dat family_gh0strat behavioral2/memory/5000-114-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d0e-135.dat family_gh0strat behavioral2/memory/4628-139-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d0e-137.dat family_gh0strat behavioral2/files/0x0006000000022d12-160.dat family_gh0strat behavioral2/memory/4912-162-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d12-158.dat family_gh0strat behavioral2/files/0x0006000000022d16-181.dat family_gh0strat behavioral2/memory/4740-185-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d16-183.dat family_gh0strat behavioral2/files/0x0007000000022d18-206.dat family_gh0strat behavioral2/memory/2044-208-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0007000000022d18-204.dat family_gh0strat behavioral2/files/0x0006000000022d1f-227.dat family_gh0strat behavioral2/files/0x0006000000022d1f-229.dat family_gh0strat behavioral2/memory/3128-230-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4856-254-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d23-252.dat family_gh0strat behavioral2/files/0x0006000000022d23-250.dat family_gh0strat behavioral2/files/0x0006000000022d28-275.dat family_gh0strat behavioral2/memory/3408-277-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d28-273.dat family_gh0strat behavioral2/files/0x0006000000022d2c-298.dat family_gh0strat behavioral2/memory/1844-300-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d2c-296.dat family_gh0strat behavioral2/files/0x0006000000022d30-320.dat family_gh0strat behavioral2/memory/3988-323-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d30-319.dat family_gh0strat behavioral2/files/0x0006000000022d34-343.dat family_gh0strat behavioral2/memory/4696-346-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d34-342.dat family_gh0strat behavioral2/memory/968-369-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0006000000022d3b-367.dat family_gh0strat behavioral2/files/0x0006000000022d3b-365.dat family_gh0strat behavioral2/memory/5064-387-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4912-406-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3584-426-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1948-446-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/116-443-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/116-449-0x00000000020A0000-0x0000000002113000-memory.dmp family_gh0strat -
Modifies Installed Components in the registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9BBF4424-5865-49b2-99C7-CD04EE30391E}\stubpath = "C:\\Windows\\system32\\indtosnaj.exe" inrfvkmdx.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C34C0AD6-E6A5-4d43-9C78-535A17F4F4F0} inzhpyfbx.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{557304C4-897C-4ddc-AC68-BFF99A6A4596} inkietvme.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E67D0990-FFB9-4a79-B0E0-EB36D11E53B4} inhbuwzwg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BEF259C5-D8F5-493e-8990-22FAFB2DA70F} inaexuhtj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B8ACF5D8-85F7-448d-857E-16BBF493A3DF}\stubpath = "C:\\Windows\\system32\\inhegsgsd.exe" inaouaylq.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6915EC5D-FC1C-49d4-BB52-6833455F89D9} inhwoipfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A840B0B1-AA53-4004-9E56-D2CD700A492A} inwhpwale.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9248F7E9-8D08-481c-8BC7-50D305AFBA9B}\stubpath = "C:\\Windows\\system32\\inqxbfmkb.exe" inesqmezb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{76C1A5A3-D496-48cc-8164-2956809E195F}\stubpath = "C:\\Windows\\system32\\infslrijv.exe" inopeewva.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{08BD73ED-CA02-43bb-BD56-22B61923BB22} injrhdzvq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B0E0274-935D-4c66-8C2F-938308EEAD5F}\stubpath = "C:\\Windows\\system32\\inzprbebn.exe" iniqzgcyz.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DD7AC0ED-A5DD-49cb-9517-AD8A49974A1E} insezthji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B5758430-2968-4785-8DC3-97CBA4EC6C12}\stubpath = "C:\\Windows\\system32\\incvyzsfr.exe" BackgroundTransferHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7704EAAB-05A0-4cea-9771-9A38F3DD8DF2}\stubpath = "C:\\Windows\\system32\\insvxwpco.exe" injsnioht.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{691C9277-F1FD-407a-A568-BCCC85D6F8D5} inbuzcxoc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A6E653DD-95BD-4a80-8A8C-859BFB9897C4}\stubpath = "C:\\Windows\\system32\\inewrcnnk.exe" injausioy.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F317FE78-DED9-49c6-A6AE-69EBD5234AA9} invwyxcqk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6B642131-FA70-4f9d-B5F4-A732DB13090F}\stubpath = "C:\\Windows\\system32\\inhsblrqs.exe" inkivmnpx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{74683603-76E0-400c-BB61-B556A73490FC}\stubpath = "C:\\Windows\\system32\\infvqbbup.exe" inhwfuyzl.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{12E77466-9010-47f7-9936-1AFA3B1F3D24} inlhzufqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F3DC9BA0-12C0-41a0-ADA2-BE7C68AB005E} inmhxsddw.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8130D3D6-9E26-4269-943F-6C32DF901F11} insgwlney.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{84C5F25D-FF02-4cd2-8C15-89D0E5841765} invlhtipl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3DA45671-AE9D-48a6-A476-90185BA4E8D7}\stubpath = "C:\\Windows\\system32\\inyorihpp.exe" inrngsnzc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{75A4BBAA-DE02-49f7-BA22-B54DB33380A3} inilcbjwj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CD38227C-D2C2-4519-8CC4-DC4E6158B284}\stubpath = "C:\\Windows\\system32\\ingrakqpr.exe" inycopaqa.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BF86F922-399D-407f-AC3A-E34B197B284E} inhuwzjax.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B718C2F7-E45E-4716-9C1E-2E52B8EA607F} inwixlnmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B718C2F7-E45E-4716-9C1E-2E52B8EA607F}\stubpath = "C:\\Windows\\system32\\inatwyxqd.exe" inwixlnmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9B41A16F-335C-42f8-B5DB-7C72B936B656}\stubpath = "C:\\Windows\\system32\\inzhpyfbx.exe" inmnccutj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CFA9EC24-EA31-47fb-882B-7D2E0B86BF92}\stubpath = "C:\\Windows\\system32\\inyvsxuru.exe" ineeenyiy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{89C716B3-BA25-4e81-8098-4740064517CC}\stubpath = "C:\\Windows\\system32\\inyjbrycn.exe" ingcowdkg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0BE008AE-F8D8-4218-95DA-D102A99F5C6B} insywlfel.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{51D6FC52-8AC1-4ddb-8342-836F2C80A884} inixpjqgj.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4FBF1596-5E91-4dd9-B47A-BE820E2DCA5A} insnyjjgx.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{213E3EA1-EEB7-4e76-8BB4-0C6BBDA7B8D7} inniyteex.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AF21FF27-365B-418d-8A67-0B432530AD8C}\stubpath = "C:\\Windows\\system32\\inortslka.exe" inrdysgih.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{78A002D5-F3F8-44f3-B3A4-48A954A4003F}\stubpath = "C:\\Windows\\system32\\incgzwjvl.exe" ingvzmksi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2477F994-8A0B-469a-B18B-4EDF106D1A11} inbuzcxoc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ABA563A5-8C5A-4235-80D0-4F282AE10D9F} infsuonoj.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FA95E16F-4985-42d3-860C-204CBB65CC8F} inijzqpfx.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E3B251D0-9154-40ed-B8FB-6162902B714A} inpkfxleq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6F61CA9A-CA0D-4944-A581-8F89FD68545E}\stubpath = "C:\\Windows\\system32\\infdqdofu.exe" inbsfowhf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{00831076-EF48-4868-91A9-B04036482366}\stubpath = "C:\\Windows\\system32\\inochlfll.exe" inzloqpih.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B3599D2-B18F-41c7-8A16-AE1F876EC443} inytomigo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{36C0A9BF-63C1-4905-8CDF-AEA908DCB408}\stubpath = "C:\\Windows\\system32\\injlxlxig.exe" inmawkptn.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DD601F72-CEE9-40e0-8A05-D0ECCDAE0B84} indtfhlye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4D816531-46F3-4c9a-A914-BDA4BD8A7C78} insywlfel.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1ACB8585-B26F-4a40-B267-EB9B418FC1B8}\stubpath = "C:\\Windows\\system32\\inuqbjvqf.exe" inwhpwale.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AFB75308-3E31-4af6-9AE0-E06E9A33FB4A}\stubpath = "C:\\Windows\\system32\\inirmhzng.exe" innpclapa.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3DB77046-CD92-4e1d-AB58-122FCE905E01} inmkxopbr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3BD296AF-DED5-4d6f-851A-D250BBF4E7E3}\stubpath = "C:\\Windows\\system32\\inrxixhwa.exe" inxhvtpha.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{29E9689E-4F2A-4590-BDCD-C19DD9F68572} inipelkjl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DC4A8CC4-4090-48c6-8AB1-AE0766BA3317}\stubpath = "C:\\Windows\\system32\\indtkzjxv.exe" indpalewk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D7A6836D-F570-4f90-ADF3-E3AC1F0D76BD}\stubpath = "C:\\Windows\\system32\\inhhsffsh.exe" inaouaylq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6D4F01F2-EC16-4d27-B04B-6729D17DB2EB}\stubpath = "C:\\Windows\\system32\\invmsakfo.exe" inoropope.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4A62F32E-9C5D-4b10-A2B0-4A1487423D86} inqrggyxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D0D8AF57-40CA-43be-AF5D-73D664FF9D79} inhjvjvge.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6A75A916-4D9B-4afc-99C5-74918B2C6748} mousocoreworker.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E5D6A68-3387-46db-8D4F-3467DE5E10DA} inldtepix.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{314D908E-4911-4cdd-936C-C92B61D1FC39}\stubpath = "C:\\Windows\\system32\\insulctjf.exe" inzhpyfbx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{94AFAF86-DAC8-48ec-AA8B-DBA18A39714F}\stubpath = "C:\\Windows\\system32\\iniqzgcyz.exe" incbrcegj.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{18E8E80D-0DA9-4390-B358-F30DEDC32965}\stubpath = "C:\\Windows\\system32\\ingcmtril.exe" iniszaxor.exe -
ACProtect 1.3x - 1.4x DLL software 33 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0009000000022cf2-4.dat acprotect behavioral2/files/0x0009000000022cf2-2.dat acprotect behavioral2/files/0x0009000000022cf2-12.dat acprotect behavioral2/files/0x0006000000022cfc-24.dat acprotect behavioral2/files/0x0006000000022cfc-26.dat acprotect behavioral2/files/0x0006000000022d00-49.dat acprotect behavioral2/files/0x0006000000022d00-47.dat acprotect behavioral2/files/0x0006000000022d04-72.dat acprotect behavioral2/files/0x0006000000022d04-70.dat acprotect behavioral2/files/0x0006000000022d08-96.dat acprotect behavioral2/files/0x0006000000022d08-94.dat acprotect behavioral2/files/0x0006000000022d0c-119.dat acprotect behavioral2/files/0x0006000000022d0c-117.dat acprotect behavioral2/files/0x0006000000022d10-142.dat acprotect behavioral2/files/0x0006000000022d10-140.dat acprotect behavioral2/files/0x0006000000022d14-165.dat acprotect behavioral2/files/0x0006000000022d14-163.dat acprotect behavioral2/files/0x0006000000022d19-188.dat acprotect behavioral2/files/0x0006000000022d19-186.dat acprotect behavioral2/files/0x0006000000022d1d-211.dat acprotect behavioral2/files/0x0006000000022d1d-209.dat acprotect behavioral2/files/0x0006000000022d21-234.dat acprotect behavioral2/files/0x0006000000022d21-232.dat acprotect behavioral2/files/0x0006000000022d26-257.dat acprotect behavioral2/files/0x0006000000022d26-255.dat acprotect behavioral2/files/0x0006000000022d2a-280.dat acprotect behavioral2/files/0x0006000000022d2a-278.dat acprotect behavioral2/files/0x0006000000022d2e-303.dat acprotect behavioral2/files/0x0006000000022d2e-301.dat acprotect behavioral2/files/0x0006000000022d32-326.dat acprotect behavioral2/files/0x0006000000022d32-324.dat acprotect behavioral2/files/0x0006000000022d39-349.dat acprotect behavioral2/files/0x0006000000022d39-347.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 4756 inaexuhtj.exe 2568 inwsdlxsh.exe 3852 incrjzdkv.exe 5000 inxtemyti.exe 4628 inuqbjvqf.exe 4912 inrdysgih.exe 4740 TrustedInstaller.exe 2044 inpnehxjk.exe 3128 inetlfmxc.exe 4856 inpleqlxa.exe 3408 inlsmacbt.exe 1844 inbfyviuk.exe 3988 inykznpoh.exe 4696 ingcowdkg.exe 968 inopeewva.exe 5064 injmdckxk.exe 4912 inrdysgih.exe 3584 inwixlnmf.exe 1948 BackgroundTransferHost.exe 116 incvyzsfr.exe 5108 inaouaylq.exe 3168 infhthtec.exe 5036 inqmfrmyb.exe 3468 inigtklnv.exe 2400 inkbaivic.exe 4124 inhwoipfi.exe 4296 intfuikjc.exe 1384 infvqbbup.exe 2316 insywlfel.exe 392 inqcxrfhg.exe 3584 inwixlnmf.exe 1924 ingoxeawx.exe 3016 inrfvkmdx.exe 4544 inqtvunam.exe 4688 inaphxbit.exe 4064 backgroundTaskHost.exe 4608 innlypqcs.exe 4496 mousocoreworker.exe 2956 inupkqjvx.exe 1392 inrbrocsh.exe 2108 inpkfxleq.exe 2324 iniqzgcyz.exe 4836 inpbwqegf.exe 4864 indskelwb.exe 4528 intojzuff.exe 4300 inzvgovkd.exe 4452 inixomukg.exe 3212 inhfsfaqh.exe 2404 inwgusogd.exe 3580 indtwnmuu.exe 1836 innuocedv.exe 4700 invirzkie.exe 1956 indqsmlmh.exe 5048 injsnioht.exe 1984 insvxwpco.exe 2624 inrngsnzc.exe 1940 inyorihpp.exe 2132 infvypoww.exe 4636 inuiybnpg.exe 4752 inyaereiz.exe 3888 inhiypoew.exe 3872 inldtepix.exe 4872 ineugyxhj.exe 4496 mousocoreworker.exe -
Loads dropped DLL 64 IoCs
pid Process 4660 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 4660 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 4756 inaexuhtj.exe 4756 inaexuhtj.exe 2568 inwsdlxsh.exe 2568 inwsdlxsh.exe 3852 incrjzdkv.exe 3852 incrjzdkv.exe 5000 inxtemyti.exe 5000 inxtemyti.exe 4628 inuqbjvqf.exe 4628 inuqbjvqf.exe 4912 inrdysgih.exe 4912 inrdysgih.exe 4740 TrustedInstaller.exe 4740 TrustedInstaller.exe 2044 inpnehxjk.exe 2044 inpnehxjk.exe 3128 inetlfmxc.exe 3128 inetlfmxc.exe 4856 inpleqlxa.exe 4856 inpleqlxa.exe 3408 inlsmacbt.exe 3408 inlsmacbt.exe 1844 inbfyviuk.exe 1844 inbfyviuk.exe 3988 inykznpoh.exe 3988 inykznpoh.exe 4696 ingcowdkg.exe 4696 ingcowdkg.exe 968 inopeewva.exe 968 inopeewva.exe 5064 injmdckxk.exe 5064 injmdckxk.exe 4912 inrdysgih.exe 4912 inrdysgih.exe 3584 inwixlnmf.exe 3584 inwixlnmf.exe 1948 BackgroundTransferHost.exe 1948 BackgroundTransferHost.exe 116 incvyzsfr.exe 116 incvyzsfr.exe 5108 inaouaylq.exe 5108 inaouaylq.exe 3168 infhthtec.exe 3168 infhthtec.exe 5036 inqmfrmyb.exe 5036 inqmfrmyb.exe 3468 inigtklnv.exe 3468 inigtklnv.exe 2400 inkbaivic.exe 2400 inkbaivic.exe 4124 inhwoipfi.exe 4124 inhwoipfi.exe 4296 intfuikjc.exe 4296 intfuikjc.exe 1384 infvqbbup.exe 1384 infvqbbup.exe 2316 insywlfel.exe 2316 insywlfel.exe 392 inqcxrfhg.exe 392 inqcxrfhg.exe 3584 inwixlnmf.exe 3584 inwixlnmf.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\syslog.dat inxsdoolp.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inomzqrdt.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inilcbjwj.exe File opened for modification C:\Windows\SysWOW64\inscqyokc.exe_lang.ini infgwnmcy.exe File created C:\Windows\SysWOW64\inrtwgusw.exe ingcowdkg.exe File opened for modification C:\Windows\SysWOW64\inkuaczqt.exe_lang.ini intetdxsy.exe File opened for modification C:\Windows\SysWOW64\syslog.dat invbdruwx.exe File opened for modification C:\Windows\SysWOW64\inckxztas.exe_lang.ini inochlfll.exe File opened for modification C:\Windows\SysWOW64\ingcmtril.exe_lang.ini iniszaxor.exe File created C:\Windows\SysWOW64\inlsmacbt.exe inpleqlxa.exe File opened for modification C:\Windows\SysWOW64\inaphxbit.exe_lang.ini inqtvunam.exe File opened for modification C:\Windows\SysWOW64\injwylczx.exe_lang.ini invwyxcqk.exe File opened for modification C:\Windows\SysWOW64\incbrcegj.exe_lang.ini inxuxrboe.exe File created C:\Windows\SysWOW64\inpqffxwb.exe inpkvggzd.exe File created C:\Windows\SysWOW64\ingerepgv.exe inuwegjgs.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inarenvge.exe File created C:\Windows\SysWOW64\ingvzmksi.exe invbdruwx.exe File opened for modification C:\Windows\SysWOW64\syslog.dat ineqbmfxl.exe File opened for modification C:\Windows\SysWOW64\inhjvjvge.exe_lang.ini inpdlvxfh.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inlvjosms.exe File created C:\Windows\SysWOW64\inczeboin.exe inomvcziu.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inqrggyxc.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inaqgiwze.exe File opened for modification C:\Windows\SysWOW64\infrfqjpo.exe_lang.ini inacgtgkr.exe File opened for modification C:\Windows\SysWOW64\indtwnmuu.exe_lang.ini inwgusogd.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inrngsnzc.exe File opened for modification C:\Windows\SysWOW64\inmtnbdcu.exe_lang.ini innusjmop.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inmkxopbr.exe File opened for modification C:\Windows\SysWOW64\inbohznex.exe_lang.ini inyaereiz.exe File opened for modification C:\Windows\SysWOW64\inbqiycju.exe_lang.ini inhjvjvge.exe File created C:\Windows\SysWOW64\indwztgsi.exe inwixlnmf.exe File opened for modification C:\Windows\SysWOW64\injkrqgyq.exe_lang.ini inipelkjl.exe File opened for modification C:\Windows\SysWOW64\inpkfxleq.exe_lang.ini innoddvuk.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpkvggzd.exe File created C:\Windows\SysWOW64\inqxbfmkb.exe inesqmezb.exe File created C:\Windows\SysWOW64\incanalcr.exe inniombtb.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inrdysgih.exe File created C:\Windows\SysWOW64\indlyubtu.exe inaphxbit.exe File opened for modification C:\Windows\SysWOW64\innoddvuk.exe_lang.ini injwylczx.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inkhtihxi.exe File opened for modification C:\Windows\SysWOW64\inwemzvcu.exe_lang.ini inqdhyock.exe File created C:\Windows\SysWOW64\inlofemzm.exe ingoxeawx.exe File created C:\Windows\SysWOW64\inrurbsrs.exe inmvbdomc.exe File created C:\Windows\SysWOW64\inqzfhsqg.exe invspsmvj.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpnehxjk.exe File created C:\Windows\SysWOW64\inecpcnet.exe innfvgrkz.exe File created C:\Windows\SysWOW64\innbxlquo.exe ineguxzcg.exe File opened for modification C:\Windows\SysWOW64\syslog.dat indtosnaj.exe File opened for modification C:\Windows\SysWOW64\injsnioht.exe_lang.ini inqrggyxc.exe File opened for modification C:\Windows\SysWOW64\inupkqjvx.exe_lang.ini indjvakex.exe File created C:\Windows\SysWOW64\inxjymong.exe inpkfxleq.exe File opened for modification C:\Windows\SysWOW64\insrzztuj.exe_lang.ini inwhpwale.exe File opened for modification C:\Windows\SysWOW64\injfqeotx.exe_lang.ini inkietvme.exe File created C:\Windows\SysWOW64\inbjwysrs.exe inmkxopbr.exe File opened for modification C:\Windows\SysWOW64\inpleqlxa.exe_lang.ini inetlfmxc.exe File opened for modification C:\Windows\SysWOW64\syslog.dat indskelwb.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inniombtb.exe File created C:\Windows\SysWOW64\inrjcgagg.exe inrngsnzc.exe File opened for modification C:\Windows\SysWOW64\invbdruwx.exe_lang.ini inmktaxgs.exe File created C:\Windows\SysWOW64\inzprbebn.exe iniqzgcyz.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inrbrocsh.exe File created C:\Windows\SysWOW64\inyctgpxi.exe inwikohfo.exe File opened for modification C:\Windows\SysWOW64\ingerepgv.exe_lang.ini inuwegjgs.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inbfyviuk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4660 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 4660 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 4756 inaexuhtj.exe 4756 inaexuhtj.exe 2568 inwsdlxsh.exe 2568 inwsdlxsh.exe 3852 incrjzdkv.exe 3852 incrjzdkv.exe 5000 inwhpwale.exe 5000 inwhpwale.exe 4628 inuqbjvqf.exe 4628 inuqbjvqf.exe 4912 inrdysgih.exe 4912 inrdysgih.exe 4740 TrustedInstaller.exe 4740 TrustedInstaller.exe 2044 inpnehxjk.exe 2044 inpnehxjk.exe 3128 inetlfmxc.exe 3128 inetlfmxc.exe 4856 inpleqlxa.exe 4856 inpleqlxa.exe 3408 inlsmacbt.exe 3408 inlsmacbt.exe 1844 inbfyviuk.exe 1844 inbfyviuk.exe 3988 inykznpoh.exe 3988 inykznpoh.exe 4696 ingcowdkg.exe 4696 ingcowdkg.exe 968 inopeewva.exe 968 inopeewva.exe 5064 injmdckxk.exe 5064 injmdckxk.exe 4912 inrdysgih.exe 4912 inrdysgih.exe 3584 inwixlnmf.exe 3584 inwixlnmf.exe 1948 BackgroundTransferHost.exe 1948 BackgroundTransferHost.exe 116 incvyzsfr.exe 116 incvyzsfr.exe 5108 inaouaylq.exe 5108 inaouaylq.exe 3168 infhthtec.exe 3168 infhthtec.exe 5036 inqmfrmyb.exe 5036 inqmfrmyb.exe 3468 inigtklnv.exe 3468 inigtklnv.exe 2400 inkbaivic.exe 2400 inkbaivic.exe 4124 inhwoipfi.exe 4124 inhwoipfi.exe 4296 intfuikjc.exe 4296 intfuikjc.exe 1384 infvqbbup.exe 1384 infvqbbup.exe 2316 insywlfel.exe 2316 insywlfel.exe 392 inqcxrfhg.exe 392 inqcxrfhg.exe 3584 inwixlnmf.exe 3584 inwixlnmf.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4660 NEAS.c18c43ed8bb89755a39c623615548d9b.exe Token: SeDebugPrivilege 4756 inaexuhtj.exe Token: SeDebugPrivilege 2568 inwsdlxsh.exe Token: SeDebugPrivilege 3852 incrjzdkv.exe Token: SeDebugPrivilege 5000 inwhpwale.exe Token: SeDebugPrivilege 4628 inuqbjvqf.exe Token: SeDebugPrivilege 4912 inrdysgih.exe Token: SeDebugPrivilege 4740 TrustedInstaller.exe Token: SeDebugPrivilege 2044 inpnehxjk.exe Token: SeDebugPrivilege 3128 inetlfmxc.exe Token: SeDebugPrivilege 4856 inpleqlxa.exe Token: SeDebugPrivilege 3408 inlsmacbt.exe Token: SeDebugPrivilege 1844 inbfyviuk.exe Token: SeDebugPrivilege 3988 inykznpoh.exe Token: SeDebugPrivilege 4696 ingcowdkg.exe Token: SeDebugPrivilege 968 inopeewva.exe Token: SeDebugPrivilege 5064 injmdckxk.exe Token: SeDebugPrivilege 4912 inrdysgih.exe Token: SeDebugPrivilege 3584 inwixlnmf.exe Token: SeDebugPrivilege 1948 BackgroundTransferHost.exe Token: SeDebugPrivilege 116 incvyzsfr.exe Token: SeDebugPrivilege 5108 inaouaylq.exe Token: SeDebugPrivilege 3168 infhthtec.exe Token: SeDebugPrivilege 5036 inqmfrmyb.exe Token: SeDebugPrivilege 3468 inigtklnv.exe Token: SeDebugPrivilege 2400 inkbaivic.exe Token: SeDebugPrivilege 4124 inhwoipfi.exe Token: SeDebugPrivilege 4296 intfuikjc.exe Token: SeDebugPrivilege 1384 infvqbbup.exe Token: SeDebugPrivilege 2316 insywlfel.exe Token: SeDebugPrivilege 392 inqcxrfhg.exe Token: SeDebugPrivilege 3584 inwixlnmf.exe Token: SeDebugPrivilege 1924 ingoxeawx.exe Token: SeDebugPrivilege 3016 inrfvkmdx.exe Token: SeDebugPrivilege 4544 inqtvunam.exe Token: SeDebugPrivilege 4688 inaphxbit.exe Token: SeDebugPrivilege 4064 backgroundTaskHost.exe Token: SeDebugPrivilege 4608 innlypqcs.exe Token: SeDebugPrivilege 4496 mousocoreworker.exe Token: SeDebugPrivilege 2956 inupkqjvx.exe Token: SeDebugPrivilege 1392 inrbrocsh.exe Token: SeDebugPrivilege 2108 inpkfxleq.exe Token: SeDebugPrivilege 2324 iniqzgcyz.exe Token: SeDebugPrivilege 4836 inpbwqegf.exe Token: SeDebugPrivilege 4864 indskelwb.exe Token: SeDebugPrivilege 4528 intojzuff.exe Token: SeDebugPrivilege 4300 inzvgovkd.exe Token: SeDebugPrivilege 4452 inixomukg.exe Token: SeDebugPrivilege 3212 inhfsfaqh.exe Token: SeDebugPrivilege 2404 inwgusogd.exe Token: SeDebugPrivilege 3580 indtwnmuu.exe Token: SeDebugPrivilege 1836 innuocedv.exe Token: SeDebugPrivilege 4700 invirzkie.exe Token: SeDebugPrivilege 1956 indqsmlmh.exe Token: SeDebugPrivilege 5048 injsnioht.exe Token: SeDebugPrivilege 1984 insvxwpco.exe Token: SeDebugPrivilege 2624 inrngsnzc.exe Token: SeDebugPrivilege 1940 inyorihpp.exe Token: SeDebugPrivilege 2132 infvypoww.exe Token: SeDebugPrivilege 4636 inuiybnpg.exe Token: SeDebugPrivilege 4752 inyaereiz.exe Token: SeDebugPrivilege 3888 inhiypoew.exe Token: SeDebugPrivilege 3872 inldtepix.exe Token: SeDebugPrivilege 4872 ineugyxhj.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 4660 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 4756 inaexuhtj.exe 2568 inwsdlxsh.exe 3852 incrjzdkv.exe 5000 inwhpwale.exe 4628 inuqbjvqf.exe 4912 inrdysgih.exe 4740 TrustedInstaller.exe 2044 inpnehxjk.exe 3128 inetlfmxc.exe 4856 inpleqlxa.exe 3408 inlsmacbt.exe 1844 inbfyviuk.exe 3988 inykznpoh.exe 4696 ingcowdkg.exe 968 inopeewva.exe 5064 injmdckxk.exe 4912 inrdysgih.exe 3584 inwixlnmf.exe 1948 BackgroundTransferHost.exe 116 incvyzsfr.exe 5108 inaouaylq.exe 3168 infhthtec.exe 5036 inqmfrmyb.exe 3468 inigtklnv.exe 2400 inkbaivic.exe 4124 inhwoipfi.exe 4296 intfuikjc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4756 4660 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 88 PID 4660 wrote to memory of 4756 4660 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 88 PID 4660 wrote to memory of 4756 4660 NEAS.c18c43ed8bb89755a39c623615548d9b.exe 88 PID 4756 wrote to memory of 2568 4756 inaexuhtj.exe 89 PID 4756 wrote to memory of 2568 4756 inaexuhtj.exe 89 PID 4756 wrote to memory of 2568 4756 inaexuhtj.exe 89 PID 2568 wrote to memory of 3852 2568 inwsdlxsh.exe 90 PID 2568 wrote to memory of 3852 2568 inwsdlxsh.exe 90 PID 2568 wrote to memory of 3852 2568 inwsdlxsh.exe 90 PID 3852 wrote to memory of 5000 3852 incrjzdkv.exe 91 PID 3852 wrote to memory of 5000 3852 incrjzdkv.exe 91 PID 3852 wrote to memory of 5000 3852 incrjzdkv.exe 91 PID 5000 wrote to memory of 4628 5000 inwhpwale.exe 92 PID 5000 wrote to memory of 4628 5000 inwhpwale.exe 92 PID 5000 wrote to memory of 4628 5000 inwhpwale.exe 92 PID 4628 wrote to memory of 4912 4628 inuqbjvqf.exe 107 PID 4628 wrote to memory of 4912 4628 inuqbjvqf.exe 107 PID 4628 wrote to memory of 4912 4628 inuqbjvqf.exe 107 PID 4912 wrote to memory of 4740 4912 inrdysgih.exe 172 PID 4912 wrote to memory of 4740 4912 inrdysgih.exe 172 PID 4912 wrote to memory of 4740 4912 inrdysgih.exe 172 PID 4740 wrote to memory of 2044 4740 TrustedInstaller.exe 275 PID 4740 wrote to memory of 2044 4740 TrustedInstaller.exe 275 PID 4740 wrote to memory of 2044 4740 TrustedInstaller.exe 275 PID 2044 wrote to memory of 3128 2044 inpnehxjk.exe 96 PID 2044 wrote to memory of 3128 2044 inpnehxjk.exe 96 PID 2044 wrote to memory of 3128 2044 inpnehxjk.exe 96 PID 3128 wrote to memory of 4856 3128 inetlfmxc.exe 98 PID 3128 wrote to memory of 4856 3128 inetlfmxc.exe 98 PID 3128 wrote to memory of 4856 3128 inetlfmxc.exe 98 PID 4856 wrote to memory of 3408 4856 inpleqlxa.exe 99 PID 4856 wrote to memory of 3408 4856 inpleqlxa.exe 99 PID 4856 wrote to memory of 3408 4856 inpleqlxa.exe 99 PID 3408 wrote to memory of 1844 3408 inlsmacbt.exe 100 PID 3408 wrote to memory of 1844 3408 inlsmacbt.exe 100 PID 3408 wrote to memory of 1844 3408 inlsmacbt.exe 100 PID 1844 wrote to memory of 3988 1844 inbfyviuk.exe 101 PID 1844 wrote to memory of 3988 1844 inbfyviuk.exe 101 PID 1844 wrote to memory of 3988 1844 inbfyviuk.exe 101 PID 3988 wrote to memory of 4696 3988 inykznpoh.exe 355 PID 3988 wrote to memory of 4696 3988 inykznpoh.exe 355 PID 3988 wrote to memory of 4696 3988 inykznpoh.exe 355 PID 4696 wrote to memory of 968 4696 ingcowdkg.exe 273 PID 4696 wrote to memory of 968 4696 ingcowdkg.exe 273 PID 4696 wrote to memory of 968 4696 ingcowdkg.exe 273 PID 968 wrote to memory of 5064 968 inopeewva.exe 106 PID 968 wrote to memory of 5064 968 inopeewva.exe 106 PID 968 wrote to memory of 5064 968 inopeewva.exe 106 PID 5064 wrote to memory of 4912 5064 injmdckxk.exe 107 PID 5064 wrote to memory of 4912 5064 injmdckxk.exe 107 PID 5064 wrote to memory of 4912 5064 injmdckxk.exe 107 PID 4912 wrote to memory of 3584 4912 inrdysgih.exe 123 PID 4912 wrote to memory of 3584 4912 inrdysgih.exe 123 PID 4912 wrote to memory of 3584 4912 inrdysgih.exe 123 PID 3584 wrote to memory of 1948 3584 inwixlnmf.exe 171 PID 3584 wrote to memory of 1948 3584 inwixlnmf.exe 171 PID 3584 wrote to memory of 1948 3584 inwixlnmf.exe 171 PID 1948 wrote to memory of 116 1948 BackgroundTransferHost.exe 110 PID 1948 wrote to memory of 116 1948 BackgroundTransferHost.exe 110 PID 1948 wrote to memory of 116 1948 BackgroundTransferHost.exe 110 PID 116 wrote to memory of 5108 116 incvyzsfr.exe 354 PID 116 wrote to memory of 5108 116 incvyzsfr.exe 354 PID 116 wrote to memory of 5108 116 incvyzsfr.exe 354 PID 5108 wrote to memory of 3168 5108 inaouaylq.exe 222
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.c18c43ed8bb89755a39c623615548d9b.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.c18c43ed8bb89755a39c623615548d9b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\inaexuhtj.exeC:\Windows\system32\inaexuhtj.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\inwsdlxsh.exeC:\Windows\system32\inwsdlxsh.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\inxtemyti.exeC:\Windows\system32\inxtemyti.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5000 -
C:\Windows\SysWOW64\inuqbjvqf.exeC:\Windows\system32\inuqbjvqf.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\insohtodl.exeC:\Windows\system32\insohtodl.exe7⤵PID:4912
-
C:\Windows\SysWOW64\invhwkmle.exeC:\Windows\system32\invhwkmle.exe8⤵PID:4740
-
C:\Windows\SysWOW64\injyqkarh.exeC:\Windows\system32\injyqkarh.exe9⤵PID:2044
-
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\SysWOW64\inbfyviuk.exeC:\Windows\system32\inbfyviuk.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\inykznpoh.exeC:\Windows\system32\inykznpoh.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\ingvnhoze.exeC:\Windows\system32\ingvnhoze.exe15⤵PID:4696
-
C:\Windows\SysWOW64\inyjbrycn.exeC:\Windows\system32\inyjbrycn.exe16⤵PID:968
-
C:\Windows\SysWOW64\injmdckxk.exeC:\Windows\system32\injmdckxk.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\inrdysgih.exeC:\Windows\system32\inrdysgih.exe18⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\inortslka.exeC:\Windows\system32\inortslka.exe19⤵PID:3584
-
C:\Windows\SysWOW64\indwztgsi.exeC:\Windows\system32\indwztgsi.exe20⤵PID:1948
-
C:\Windows\SysWOW64\incvyzsfr.exeC:\Windows\system32\incvyzsfr.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe22⤵PID:5108
-
C:\Windows\SysWOW64\inhegsgsd.exeC:\Windows\system32\inhegsgsd.exe23⤵PID:3168
-
C:\Windows\SysWOW64\inqmfrmyb.exeC:\Windows\system32\inqmfrmyb.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5036 -
C:\Windows\SysWOW64\inigtklnv.exeC:\Windows\system32\inigtklnv.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3468 -
C:\Windows\SysWOW64\inkbaivic.exeC:\Windows\system32\inkbaivic.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2400 -
C:\Windows\SysWOW64\inhwoipfi.exeC:\Windows\system32\inhwoipfi.exe27⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4124 -
C:\Windows\SysWOW64\intfuikjc.exeC:\Windows\system32\intfuikjc.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4296 -
C:\Windows\SysWOW64\ingiuiufd.exeC:\Windows\system32\ingiuiufd.exe29⤵PID:1384
-
C:\Windows\SysWOW64\inbqostfv.exeC:\Windows\system32\inbqostfv.exe30⤵PID:2316
-
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:392 -
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe32⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\inatwyxqd.exeC:\Windows\system32\inatwyxqd.exe33⤵PID:1924
-
C:\Windows\SysWOW64\inyufnzuj.exeC:\Windows\system32\inyufnzuj.exe34⤵PID:3016
-
C:\Windows\SysWOW64\inqtvunam.exeC:\Windows\system32\inqtvunam.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Windows\SysWOW64\inaphxbit.exeC:\Windows\system32\inaphxbit.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4688 -
C:\Windows\SysWOW64\indlyubtu.exeC:\Windows\system32\indlyubtu.exe37⤵PID:4064
-
C:\Windows\SysWOW64\innlypqcs.exeC:\Windows\system32\innlypqcs.exe38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4608 -
C:\Windows\SysWOW64\inhwnltjf.exeC:\Windows\system32\inhwnltjf.exe39⤵PID:4496
-
C:\Windows\SysWOW64\injwnoaqy.exeC:\Windows\system32\injwnoaqy.exe40⤵PID:2956
-
C:\Windows\SysWOW64\inogwahsa.exeC:\Windows\system32\inogwahsa.exe41⤵PID:1392
-
C:\Windows\SysWOW64\incraptug.exeC:\Windows\system32\incraptug.exe42⤵PID:2108
-
C:\Windows\SysWOW64\inxjymong.exeC:\Windows\system32\inxjymong.exe43⤵PID:2324
-
C:\Windows\SysWOW64\inpbwqegf.exeC:\Windows\system32\inpbwqegf.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4836 -
C:\Windows\SysWOW64\indskelwb.exeC:\Windows\system32\indskelwb.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4864 -
C:\Windows\SysWOW64\inqjpgzht.exeC:\Windows\system32\inqjpgzht.exe46⤵PID:4528
-
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4300 -
C:\Windows\SysWOW64\inutvwllh.exeC:\Windows\system32\inutvwllh.exe48⤵PID:4452
-
C:\Windows\SysWOW64\inhfsfaqh.exeC:\Windows\system32\inhfsfaqh.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3212 -
C:\Windows\SysWOW64\inwgusogd.exeC:\Windows\system32\inwgusogd.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2404 -
C:\Windows\SysWOW64\indtwnmuu.exeC:\Windows\system32\indtwnmuu.exe51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3580 -
C:\Windows\SysWOW64\innuocedv.exeC:\Windows\system32\innuocedv.exe52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1836 -
C:\Windows\SysWOW64\ineuxonvv.exeC:\Windows\system32\ineuxonvv.exe53⤵PID:4700
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\indqsmlmh.exeC:\Windows\system32\indqsmlmh.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\SysWOW64\inddmxhxc.exeC:\Windows\system32\inddmxhxc.exe2⤵PID:5048
-
C:\Windows\SysWOW64\insvxwpco.exeC:\Windows\system32\insvxwpco.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\SysWOW64\ingwzqpxx.exeC:\Windows\system32\ingwzqpxx.exe4⤵PID:2624
-
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\SysWOW64\infvypoww.exeC:\Windows\system32\infvypoww.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2132 -
C:\Windows\SysWOW64\inuiybnpg.exeC:\Windows\system32\inuiybnpg.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4636 -
C:\Windows\SysWOW64\inzkcszdo.exeC:\Windows\system32\inzkcszdo.exe8⤵PID:4752
-
C:\Windows\SysWOW64\inazpsjiq.exeC:\Windows\system32\inazpsjiq.exe9⤵PID:3888
-
C:\Windows\SysWOW64\iniysrzzt.exeC:\Windows\system32\iniysrzzt.exe10⤵PID:3872
-
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe11⤵PID:4872
-
C:\Windows\SysWOW64\inefvmlzb.exeC:\Windows\system32\inefvmlzb.exe12⤵PID:4496
-
C:\Windows\SysWOW64\inyoeaukm.exeC:\Windows\system32\inyoeaukm.exe13⤵PID:2984
-
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe14⤵PID:1884
-
C:\Windows\SysWOW64\inrshhzyd.exeC:\Windows\system32\inrshhzyd.exe15⤵PID:2624
-
C:\Windows\SysWOW64\inxsdoolp.exeC:\Windows\system32\inxsdoolp.exe16⤵
- Drops file in System32 directory
PID:4400 -
C:\Windows\SysWOW64\inruwvobn.exeC:\Windows\system32\inruwvobn.exe17⤵PID:3544
-
C:\Windows\SysWOW64\inugvjlkd.exeC:\Windows\system32\inugvjlkd.exe18⤵PID:1124
-
C:\Windows\SysWOW64\inldtepix.exeC:\Windows\system32\inldtepix.exe19⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3872 -
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe20⤵PID:4728
-
C:\Windows\SysWOW64\injkrqgyq.exeC:\Windows\system32\injkrqgyq.exe21⤵PID:4764
-
C:\Windows\SysWOW64\inmtnbdcu.exeC:\Windows\system32\inmtnbdcu.exe22⤵PID:3440
-
C:\Windows\SysWOW64\ineybxzdp.exeC:\Windows\system32\ineybxzdp.exe23⤵PID:3556
-
C:\Windows\SysWOW64\injhulmow.exeC:\Windows\system32\injhulmow.exe24⤵PID:4252
-
C:\Windows\SysWOW64\indpalewk.exeC:\Windows\system32\indpalewk.exe25⤵
- Modifies Installed Components in the registry
PID:184 -
C:\Windows\SysWOW64\indtkzjxv.exeC:\Windows\system32\indtkzjxv.exe26⤵PID:3676
-
C:\Windows\SysWOW64\inbmkzbqa.exeC:\Windows\system32\inbmkzbqa.exe27⤵PID:2376
-
C:\Windows\SysWOW64\inimbeutc.exeC:\Windows\system32\inimbeutc.exe28⤵PID:3088
-
C:\Windows\SysWOW64\incgzwjvl.exeC:\Windows\system32\incgzwjvl.exe29⤵PID:2020
-
C:\Windows\SysWOW64\inowmiavg.exeC:\Windows\system32\inowmiavg.exe30⤵PID:1636
-
C:\Windows\SysWOW64\inhsblrqs.exeC:\Windows\system32\inhsblrqs.exe31⤵PID:520
-
C:\Windows\SysWOW64\inqgdzfrf.exeC:\Windows\system32\inqgdzfrf.exe32⤵PID:2264
-
C:\Windows\SysWOW64\incsnrmiw.exeC:\Windows\system32\incsnrmiw.exe33⤵PID:1412
-
C:\Windows\SysWOW64\inxiaqxbm.exeC:\Windows\system32\inxiaqxbm.exe34⤵PID:1788
-
C:\Windows\SysWOW64\inertnmni.exeC:\Windows\system32\inertnmni.exe35⤵PID:4752
-
C:\Windows\SysWOW64\inyegrpfl.exeC:\Windows\system32\inyegrpfl.exe36⤵PID:2076
-
C:\Windows\SysWOW64\inpfzcyeq.exeC:\Windows\system32\inpfzcyeq.exe37⤵PID:1524
-
C:\Windows\SysWOW64\inqklaasr.exeC:\Windows\system32\inqklaasr.exe38⤵PID:1820
-
C:\Windows\SysWOW64\inejnhnnw.exeC:\Windows\system32\inejnhnnw.exe39⤵PID:4052
-
C:\Windows\SysWOW64\inxtleici.exeC:\Windows\system32\inxtleici.exe40⤵PID:872
-
C:\Windows\SysWOW64\inrngsnzc.exeC:\Windows\system32\inrngsnzc.exe41⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2624 -
C:\Windows\SysWOW64\inrjcgagg.exeC:\Windows\system32\inrjcgagg.exe42⤵PID:4972
-
C:\Windows\SysWOW64\inrcangym.exeC:\Windows\system32\inrcangym.exe43⤵PID:4260
-
C:\Windows\SysWOW64\inhzrfkoi.exeC:\Windows\system32\inhzrfkoi.exe44⤵PID:3268
-
C:\Windows\SysWOW64\innqsrkjz.exeC:\Windows\system32\innqsrkjz.exe45⤵PID:3592
-
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe46⤵PID:1292
-
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe47⤵PID:968
-
C:\Windows\SysWOW64\indwezqep.exeC:\Windows\system32\indwezqep.exe48⤵PID:4040
-
C:\Windows\SysWOW64\inknedlyl.exeC:\Windows\system32\inknedlyl.exe49⤵PID:972
-
C:\Windows\SysWOW64\incsvmltt.exeC:\Windows\system32\incsvmltt.exe50⤵PID:2040
-
C:\Windows\SysWOW64\ingvzmksi.exeC:\Windows\system32\ingvzmksi.exe51⤵
- Modifies Installed Components in the registry
PID:3088 -
C:\Windows\SysWOW64\inwmpgfnn.exeC:\Windows\system32\inwmpgfnn.exe52⤵PID:1080
-
C:\Windows\SysWOW64\inocymrvp.exeC:\Windows\system32\inocymrvp.exe53⤵PID:4968
-
C:\Windows\SysWOW64\inaeepccp.exeC:\Windows\system32\inaeepccp.exe54⤵PID:1636
-
C:\Windows\SysWOW64\invuwaxma.exeC:\Windows\system32\invuwaxma.exe55⤵PID:3132
-
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe56⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\insrzztuj.exeC:\Windows\system32\insrzztuj.exe57⤵PID:4556
-
C:\Windows\SysWOW64\indxawycz.exeC:\Windows\system32\indxawycz.exe58⤵PID:4332
-
C:\Windows\SysWOW64\innoddvuk.exeC:\Windows\system32\innoddvuk.exe59⤵
- Drops file in System32 directory
PID:2660 -
C:\Windows\SysWOW64\inpkfxleq.exeC:\Windows\system32\inpkfxleq.exe60⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\SysWOW64\intsuvkkg.exeC:\Windows\system32\intsuvkkg.exe61⤵PID:5108
-
C:\Windows\SysWOW64\inrfpuysy.exeC:\Windows\system32\inrfpuysy.exe62⤵PID:1840
-
C:\Windows\SysWOW64\inrmslxzd.exeC:\Windows\system32\inrmslxzd.exe63⤵PID:4408
-
C:\Windows\SysWOW64\inionprva.exeC:\Windows\system32\inionprva.exe64⤵PID:2424
-
C:\Windows\SysWOW64\inirmhzng.exeC:\Windows\system32\inirmhzng.exe65⤵PID:1880
-
C:\Windows\SysWOW64\inmibthrw.exeC:\Windows\system32\inmibthrw.exe66⤵PID:3256
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\inrfvkmdx.exeC:\Windows\system32\inrfvkmdx.exe59⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3016 -
C:\Windows\SysWOW64\inixpjqgj.exeC:\Windows\system32\inixpjqgj.exe60⤵
- Modifies Installed Components in the registry
PID:1156 -
C:\Windows\SysWOW64\inlcfvhzy.exeC:\Windows\system32\inlcfvhzy.exe61⤵PID:3352
-
C:\Windows\SysWOW64\inbsfowhf.exeC:\Windows\system32\inbsfowhf.exe62⤵
- Modifies Installed Components in the registry
PID:744
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\inaivxrqr.exeC:\Windows\system32\inaivxrqr.exe51⤵PID:744
-
C:\Windows\SysWOW64\infdqdofu.exeC:\Windows\system32\infdqdofu.exe52⤵PID:3528
-
C:\Windows\SysWOW64\ingvetxyk.exeC:\Windows\system32\ingvetxyk.exe53⤵PID:3112
-
C:\Windows\SysWOW64\incwvxbyn.exeC:\Windows\system32\incwvxbyn.exe54⤵PID:3276
-
C:\Windows\SysWOW64\inapnrseu.exeC:\Windows\system32\inapnrseu.exe55⤵PID:4920
-
C:\Windows\SysWOW64\insjarhdx.exeC:\Windows\system32\insjarhdx.exe56⤵PID:3016
-
C:\Windows\SysWOW64\indtosnaj.exeC:\Windows\system32\indtosnaj.exe57⤵
- Drops file in System32 directory
PID:4080 -
C:\Windows\SysWOW64\inuydrpyf.exeC:\Windows\system32\inuydrpyf.exe58⤵PID:4872
-
C:\Windows\SysWOW64\inxrycagn.exeC:\Windows\system32\inxrycagn.exe59⤵PID:2044
-
C:\Windows\SysWOW64\inclzteci.exeC:\Windows\system32\inclzteci.exe60⤵PID:4888
-
C:\Windows\SysWOW64\inpiofygs.exeC:\Windows\system32\inpiofygs.exe61⤵PID:3788
-
C:\Windows\SysWOW64\injfqeotx.exeC:\Windows\system32\injfqeotx.exe62⤵PID:1820
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\inyctgpxi.exeC:\Windows\system32\inyctgpxi.exe54⤵PID:3544
-
C:\Windows\SysWOW64\innqmfdal.exeC:\Windows\system32\innqmfdal.exe55⤵PID:4760
-
C:\Windows\SysWOW64\insbznvcp.exeC:\Windows\system32\insbznvcp.exe56⤵PID:2780
-
C:\Windows\SysWOW64\inzhuwqpq.exeC:\Windows\system32\inzhuwqpq.exe57⤵PID:524
-
C:\Windows\SysWOW64\inaaajueu.exeC:\Windows\system32\inaaajueu.exe58⤵PID:4872
-
C:\Windows\SysWOW64\ingoxeawx.exeC:\Windows\system32\ingoxeawx.exe59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1924 -
C:\Windows\SysWOW64\inlofemzm.exeC:\Windows\system32\inlofemzm.exe60⤵PID:4144
-
C:\Windows\SysWOW64\inuwegjgs.exeC:\Windows\system32\inuwegjgs.exe61⤵
- Drops file in System32 directory
PID:4716 -
C:\Windows\SysWOW64\ingerepgv.exeC:\Windows\system32\ingerepgv.exe62⤵PID:1840
-
C:\Windows\SysWOW64\inycopaqa.exeC:\Windows\system32\inycopaqa.exe63⤵
- Modifies Installed Components in the registry
PID:4828 -
C:\Windows\SysWOW64\inmhxsddw.exeC:\Windows\system32\inmhxsddw.exe64⤵
- Modifies Installed Components in the registry
PID:632 -
C:\Windows\SysWOW64\insywlfel.exeC:\Windows\system32\insywlfel.exe65⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2316 -
C:\Windows\SysWOW64\inclpwksm.exeC:\Windows\system32\inclpwksm.exe66⤵PID:4584
-
C:\Windows\SysWOW64\inudpxert.exeC:\Windows\system32\inudpxert.exe67⤵PID:4900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\inkwblfyk.exeC:\Windows\system32\inkwblfyk.exe52⤵PID:1456
-
C:\Windows\SysWOW64\inqrgtvyi.exeC:\Windows\system32\inqrgtvyi.exe53⤵PID:4768
-
C:\Windows\SysWOW64\inytomigo.exeC:\Windows\system32\inytomigo.exe54⤵
- Modifies Installed Components in the registry
PID:3288 -
C:\Windows\SysWOW64\ineqbmfxl.exeC:\Windows\system32\ineqbmfxl.exe55⤵
- Drops file in System32 directory
PID:3276 -
C:\Windows\SysWOW64\inmvbdomc.exeC:\Windows\system32\inmvbdomc.exe56⤵
- Drops file in System32 directory
PID:3884 -
C:\Windows\SysWOW64\inrurbsrs.exeC:\Windows\system32\inrurbsrs.exe57⤵PID:4532
-
C:\Windows\SysWOW64\inakrpgjz.exeC:\Windows\system32\inakrpgjz.exe58⤵PID:2280
-
C:\Windows\SysWOW64\inupeyqpk.exeC:\Windows\system32\inupeyqpk.exe59⤵PID:2012
-
C:\Windows\SysWOW64\inwauuwtq.exeC:\Windows\system32\inwauuwtq.exe60⤵PID:3252
-
C:\Windows\SysWOW64\invlbrhjx.exeC:\Windows\system32\invlbrhjx.exe61⤵PID:4396
-
C:\Windows\SysWOW64\inligcrtk.exeC:\Windows\system32\inligcrtk.exe62⤵PID:2076
-
C:\Windows\SysWOW64\incjmswjo.exeC:\Windows\system32\incjmswjo.exe63⤵PID:1048
-
C:\Windows\SysWOW64\inilcbjwj.exeC:\Windows\system32\inilcbjwj.exe64⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:4888 -
C:\Windows\SysWOW64\inpdlvxfh.exeC:\Windows\system32\inpdlvxfh.exe65⤵
- Drops file in System32 directory
PID:4656 -
C:\Windows\SysWOW64\inhjvjvge.exeC:\Windows\system32\inhjvjvge.exe66⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:4768 -
C:\Windows\SysWOW64\inbqiycju.exeC:\Windows\system32\inbqiycju.exe67⤵PID:3364
-
C:\Windows\SysWOW64\inoioprby.exeC:\Windows\system32\inoioprby.exe68⤵PID:4960
-
C:\Windows\SysWOW64\infzzbyva.exeC:\Windows\system32\infzzbyva.exe69⤵PID:2476
-
C:\Windows\SysWOW64\invirzkie.exeC:\Windows\system32\invirzkie.exe70⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4700 -
C:\Windows\SysWOW64\inwuyycww.exeC:\Windows\system32\inwuyycww.exe71⤵PID:3032
-
C:\Windows\SysWOW64\innfajbav.exeC:\Windows\system32\innfajbav.exe72⤵PID:1548
-
C:\Windows\SysWOW64\inebgydau.exeC:\Windows\system32\inebgydau.exe73⤵PID:2052
-
C:\Windows\SysWOW64\inlmosntr.exeC:\Windows\system32\inlmosntr.exe74⤵PID:1644
-
C:\Windows\SysWOW64\inupkqjvx.exeC:\Windows\system32\inupkqjvx.exe75⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\SysWOW64\inhbuwzwg.exeC:\Windows\system32\inhbuwzwg.exe76⤵
- Modifies Installed Components in the registry
PID:1840 -
C:\Windows\SysWOW64\inipelkjl.exeC:\Windows\system32\inipelkjl.exe77⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:4728 -
C:\Windows\SysWOW64\indzyzoqh.exeC:\Windows\system32\indzyzoqh.exe78⤵PID:3804
-
C:\Windows\SysWOW64\inbobfwma.exeC:\Windows\system32\inbobfwma.exe79⤵PID:3248
-
C:\Windows\SysWOW64\insgwlney.exeC:\Windows\system32\insgwlney.exe80⤵
- Modifies Installed Components in the registry
PID:4760 -
C:\Windows\SysWOW64\injqftzfq.exeC:\Windows\system32\injqftzfq.exe81⤵PID:4292
-
C:\Windows\SysWOW64\inhgwhjlo.exeC:\Windows\system32\inhgwhjlo.exe82⤵PID:5076
-
C:\Windows\SysWOW64\inmflkmos.exeC:\Windows\system32\inmflkmos.exe83⤵PID:4000
-
C:\Windows\SysWOW64\inniombtb.exeC:\Windows\system32\inniombtb.exe84⤵
- Drops file in System32 directory
PID:4252 -
C:\Windows\SysWOW64\incanalcr.exeC:\Windows\system32\incanalcr.exe85⤵PID:2440
-
C:\Windows\SysWOW64\inahuhbcs.exeC:\Windows\system32\inahuhbcs.exe86⤵PID:3412
-
C:\Windows\SysWOW64\inthmqkqb.exeC:\Windows\system32\inthmqkqb.exe87⤵PID:4680
-
C:\Windows\SysWOW64\inyteppma.exeC:\Windows\system32\inyteppma.exe88⤵PID:2076
-
C:\Windows\SysWOW64\ineguxzcg.exeC:\Windows\system32\ineguxzcg.exe89⤵
- Drops file in System32 directory
PID:2800 -
C:\Windows\SysWOW64\innbxlquo.exeC:\Windows\system32\innbxlquo.exe90⤵PID:4728
-
C:\Windows\SysWOW64\inaqgiwze.exeC:\Windows\system32\inaqgiwze.exe91⤵
- Drops file in System32 directory
PID:2836 -
C:\Windows\SysWOW64\inisucehe.exeC:\Windows\system32\inisucehe.exe92⤵PID:4928
-
C:\Windows\SysWOW64\incbrdfjw.exeC:\Windows\system32\incbrdfjw.exe93⤵PID:3364
-
C:\Windows\SysWOW64\inxuxrboe.exeC:\Windows\system32\inxuxrboe.exe94⤵
- Drops file in System32 directory
PID:4912 -
C:\Windows\SysWOW64\incbrcegj.exeC:\Windows\system32\incbrcegj.exe95⤵
- Modifies Installed Components in the registry
PID:1788 -
C:\Windows\SysWOW64\inftrnfcc.exeC:\Windows\system32\inftrnfcc.exe96⤵PID:3556
-
C:\Windows\SysWOW64\inrkqhiua.exeC:\Windows\system32\inrkqhiua.exe97⤵PID:1428
-
C:\Windows\SysWOW64\invlhtipl.exeC:\Windows\system32\invlhtipl.exe98⤵
- Modifies Installed Components in the registry
PID:544 -
C:\Windows\SysWOW64\inbaqtkjr.exeC:\Windows\system32\inbaqtkjr.exe99⤵PID:1192
-
C:\Windows\SysWOW64\invmdukgq.exeC:\Windows\system32\invmdukgq.exe100⤵PID:3824
-
C:\Windows\SysWOW64\injrhdzvq.exeC:\Windows\system32\injrhdzvq.exe101⤵
- Modifies Installed Components in the registry
PID:408 -
C:\Windows\SysWOW64\iniwaqpwa.exeC:\Windows\system32\iniwaqpwa.exe102⤵PID:2376
-
C:\Windows\SysWOW64\inyodrton.exeC:\Windows\system32\inyodrton.exe103⤵PID:4128
-
C:\Windows\SysWOW64\inalzlawr.exeC:\Windows\system32\inalzlawr.exe104⤵PID:3748
-
C:\Windows\SysWOW64\inlvjosms.exeC:\Windows\system32\inlvjosms.exe105⤵
- Drops file in System32 directory
PID:3604 -
C:\Windows\SysWOW64\inwhjedoj.exeC:\Windows\system32\inwhjedoj.exe106⤵PID:2044
-
C:\Windows\SysWOW64\inijzqpfx.exeC:\Windows\system32\inijzqpfx.exe107⤵
- Modifies Installed Components in the registry
PID:1404 -
C:\Windows\SysWOW64\inhuwzjax.exeC:\Windows\system32\inhuwzjax.exe108⤵
- Modifies Installed Components in the registry
PID:4900 -
C:\Windows\SysWOW64\inyluacnl.exeC:\Windows\system32\inyluacnl.exe109⤵PID:4700
-
C:\Windows\SysWOW64\indscwrxb.exeC:\Windows\system32\indscwrxb.exe110⤵PID:1364
-
C:\Windows\SysWOW64\insnyjjgx.exeC:\Windows\system32\insnyjjgx.exe111⤵
- Modifies Installed Components in the registry
PID:4628 -
C:\Windows\SysWOW64\inawcknai.exeC:\Windows\system32\inawcknai.exe112⤵PID:1836
-
C:\Windows\SysWOW64\infrfqjpo.exeC:\Windows\system32\infrfqjpo.exe113⤵PID:1204
-
C:\Windows\SysWOW64\invspsmvj.exeC:\Windows\system32\invspsmvj.exe114⤵
- Drops file in System32 directory
PID:916 -
C:\Windows\SysWOW64\inqzfhsqg.exeC:\Windows\system32\inqzfhsqg.exe115⤵PID:3412
-
C:\Windows\SysWOW64\inzrcejxv.exeC:\Windows\system32\inzrcejxv.exe116⤵PID:4380
-
C:\Windows\SysWOW64\ineeenyiy.exeC:\Windows\system32\ineeenyiy.exe117⤵
- Modifies Installed Components in the registry
PID:2376 -
C:\Windows\SysWOW64\inyvsxuru.exeC:\Windows\system32\inyvsxuru.exe118⤵PID:4528
-
C:\Windows\SysWOW64\inljswfrz.exeC:\Windows\system32\inljswfrz.exe119⤵PID:3856
-
C:\Windows\SysWOW64\indlvgkyq.exeC:\Windows\system32\indlvgkyq.exe120⤵PID:4928
-
C:\Windows\SysWOW64\ineupaato.exeC:\Windows\system32\ineupaato.exe121⤵PID:3160
-
C:\Windows\SysWOW64\inmwepkwe.exeC:\Windows\system32\inmwepkwe.exe122⤵PID:4408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-