Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09-10-2023 15:55
Behavioral task
behavioral1
Sample
NEAS.84446418e733266249b3ce6c8af14916_JC.exe
Resource
win7-20230831-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
NEAS.84446418e733266249b3ce6c8af14916_JC.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
NEAS.84446418e733266249b3ce6c8af14916_JC.exe
-
Size
348KB
-
MD5
84446418e733266249b3ce6c8af14916
-
SHA1
83e890c5660d19ceb2c44a3c7e6febc89a61a3cf
-
SHA256
e624ef743b6ae008716257de32231e9a4e9787d98c0702ee74c2e0452b3b3338
-
SHA512
bb0b369398575ff8037af90e3c4689405677df07af693e96e31e0e6fbc74242dd0570ee342003d4d3a8ab0e316dbb0f69b0b5620b01e7ed7aee3e4cffb8fb80b
-
SSDEEP
6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0SU:ouLwoZQGpnedeP/deUe1ppGjTGHZRT0o
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 64 IoCs
resource yara_rule behavioral1/memory/320-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0009000000015c88-16.dat family_gh0strat behavioral1/files/0x0009000000015c88-19.dat family_gh0strat behavioral1/files/0x0009000000015c88-24.dat family_gh0strat behavioral1/memory/320-26-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0009000000015c88-23.dat family_gh0strat behavioral1/files/0x0009000000015c88-22.dat family_gh0strat behavioral1/files/0x0009000000015c88-21.dat family_gh0strat behavioral1/files/0x000a000000015eb2-29.dat family_gh0strat behavioral1/files/0x00080000000162e0-47.dat family_gh0strat behavioral1/files/0x00080000000162e0-50.dat family_gh0strat behavioral1/memory/2640-53-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2640-54-0x00000000001C0000-0x00000000001EF000-memory.dmp family_gh0strat behavioral1/memory/1168-52-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x00080000000162e0-49.dat family_gh0strat behavioral1/files/0x00080000000162e0-48.dat family_gh0strat behavioral1/files/0x00080000000162e0-46.dat family_gh0strat behavioral1/files/0x00080000000162e0-41.dat family_gh0strat behavioral1/files/0x00080000000162e0-38.dat family_gh0strat behavioral1/files/0x0006000000016614-69.dat family_gh0strat behavioral1/files/0x0006000000016614-74.dat family_gh0strat behavioral1/memory/2640-81-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2772-82-0x0000000000230000-0x000000000025F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000016614-78.dat family_gh0strat behavioral1/files/0x0006000000016614-77.dat family_gh0strat behavioral1/files/0x0006000000016614-76.dat family_gh0strat behavioral1/files/0x0006000000016614-75.dat family_gh0strat behavioral1/memory/2772-93-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000016c21-97.dat family_gh0strat behavioral1/files/0x0006000000016c21-102.dat family_gh0strat behavioral1/files/0x0006000000016c21-103.dat family_gh0strat behavioral1/files/0x0006000000016c21-105.dat family_gh0strat behavioral1/memory/2560-108-0x00000000001C0000-0x00000000001EF000-memory.dmp family_gh0strat behavioral1/files/0x0006000000016c21-104.dat family_gh0strat behavioral1/files/0x0006000000016c21-101.dat family_gh0strat behavioral1/files/0x0006000000016cba-122.dat family_gh0strat behavioral1/files/0x0006000000016cba-130.dat family_gh0strat behavioral1/memory/2560-133-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000016cba-129.dat family_gh0strat behavioral1/files/0x0006000000016cba-128.dat family_gh0strat behavioral1/files/0x0006000000016cfc-148.dat family_gh0strat behavioral1/files/0x0006000000016cfc-153.dat family_gh0strat behavioral1/files/0x0006000000016cfc-154.dat family_gh0strat behavioral1/files/0x0006000000016cfc-156.dat family_gh0strat behavioral1/files/0x0006000000016cfc-157.dat family_gh0strat behavioral1/memory/1208-159-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000016cfc-155.dat family_gh0strat behavioral1/memory/2140-172-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000016cba-127.dat family_gh0strat behavioral1/files/0x0006000000016cba-125.dat family_gh0strat behavioral1/files/0x0006000000016d37-177.dat family_gh0strat behavioral1/files/0x0006000000016d37-185.dat family_gh0strat behavioral1/files/0x0006000000016d37-184.dat family_gh0strat behavioral1/files/0x0006000000016d37-183.dat family_gh0strat behavioral1/files/0x0006000000016d37-182.dat family_gh0strat behavioral1/files/0x0006000000016d37-180.dat family_gh0strat behavioral1/memory/1740-188-0x0000000000230000-0x000000000025F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000016d74-203.dat family_gh0strat behavioral1/files/0x0006000000016d74-208.dat family_gh0strat behavioral1/files/0x0006000000016d74-211.dat family_gh0strat behavioral1/memory/1740-214-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/files/0x0006000000016d74-212.dat family_gh0strat behavioral1/files/0x0006000000016d74-210.dat family_gh0strat behavioral1/files/0x0006000000016d74-209.dat family_gh0strat -
Modifies Installed Components in the registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D833AB8-2F40-444b-BA83-90BB64E6B2D4}\stubpath = "C:\\Windows\\system32\\inkietvme.exe" inbbmmbxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2894B7D0-BEE3-435b-A712-C0CE6F7FF0E0} inihodrxd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DC46E390-217B-4a45-807E-67E4E22F9CA8} inogxmhdp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DAD3751E-204F-4c78-AF00-8247E1152C5A}\stubpath = "C:\\Windows\\system32\\inimbeutc.exe" invhyunli.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CBA2E8DB-75D0-486c-B6A2-9DD123063D5E} inbuxzyre.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2DDBA26B-6CD1-4ab5-9008-89E26CC99E21}\stubpath = "C:\\Windows\\system32\\inmkimmxk.exe" inkveoutv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5E88F097-24AD-46cd-BF3D-021D3BEAA6BF} inbwxiybi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1FE7A6C9-A697-4d17-AFC4-ED09EAAA38E6}\stubpath = "C:\\Windows\\system32\\incybtpgq.exe" ineyhbpzk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0F867102-4D6A-4929-A3A5-7EC6C1BA0997}\stubpath = "C:\\Windows\\system32\\inhpbxdla.exe" inkxncqsn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{18BBFE55-7DD4-4218-9A30-278DA9430885}\stubpath = "C:\\Windows\\system32\\inytozkkh.exe" inmprqjiy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D62029B-4DCC-4932-9849-D275ED8772F3}\stubpath = "C:\\Windows\\system32\\inzkcszdo.exe" inmibthrw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BEB5688B-652D-42e2-A68F-77C711FE2B46} inpkvggzd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1ACEB02F-6990-4c0f-874E-3494A0099DE2}\stubpath = "C:\\Windows\\system32\\inomaugiq.exe" insuhmxsm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8ACD4FF3-127C-4d4a-A430-9D86490E9C7C} inpqffxwb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{03F1D8C1-E6F8-4b21-BCE4-6071ED7FE048} ingwzqpxx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B8595BEF-95EF-4564-87AE-1E7B99CC1F71} inyctgpxi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5C393663-2478-4228-B066-ACFC62738AE2}\stubpath = "C:\\Windows\\system32\\inebdvara.exe" inyaereiz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B8595BEF-95EF-4564-87AE-1E7B99CC1F71}\stubpath = "C:\\Windows\\system32\\inhoksmcs.exe" inyctgpxi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E3460141-0C10-43b1-9AAA-01943D83F307}\stubpath = "C:\\Windows\\system32\\inhiypoew.exe" inkmpmynm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C85B1B1C-0A3B-49b0-B982-4F48F46A27F3} inbohznex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CE8B7DF1-7743-43b3-B26F-FACB5DEC80E3} inrvqwujd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6CFA31D2-950C-4762-8101-E504CD36393D}\stubpath = "C:\\Windows\\system32\\inztjzmib.exe" inmfnxnjy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{97518910-2DC8-475c-877F-D27394195FB5}\stubpath = "C:\\Windows\\system32\\inncucufl.exe" ingtjmoji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B42C5C7C-FDC3-46c3-97B1-FA579085D66A}\stubpath = "C:\\Windows\\system32\\ingvnhoze.exe" incgzwjvl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{12F57079-0DED-4632-8339-DE443B68F28C} inecpcnet.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{39C58E7F-893B-4cd2-8ABE-484BC7729935}\stubpath = "C:\\Windows\\system32\\inefvmlzb.exe" inbdhuahl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2296D678-DCB0-427a-8AFC-E52A01CA588D}\stubpath = "C:\\Windows\\system32\\inblsqhkm.exe" inxtleici.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{689266DB-A3CF-4a53-ACCE-669D6649D224} insezthji.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C050F8F-BD9A-47cc-98D9-231FA7ACF9A3} inrcangym.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E945FC62-4E5B-482f-97B7-2B77A825A1D5}\stubpath = "C:\\Windows\\system32\\infcpjolj.exe" inkwblfyk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{60AF2FA0-A337-4704-AF59-2F388132748B}\stubpath = "C:\\Windows\\system32\\inyxynpgc.exe" inkmpnlpp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9AE16EEA-04EF-46f3-9141-331CB1A27247}\stubpath = "C:\\Windows\\system32\\inbbkvfva.exe" inwanaevl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9CF177D1-13FE-4b97-AB66-1B7ED0E8A174} inhsblrqs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0625490D-9B71-4748-9CEF-CD0C5E701F4C}\stubpath = "C:\\Windows\\system32\\incldxuje.exe" inyegtexf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3D6EAF40-E322-4a82-BF39-B55BFDAB2FCD} inisucehe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E88F4ECF-5705-41f6-B10D-8B648F19A602} inmtiwity.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{86059BB4-A752-444a-97BA-F5BC37C8F8C8}\stubpath = "C:\\Windows\\system32\\inwhpwale.exe" inatwyxqd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9BDFCD38-6A65-4b13-877D-1D995541912D}\stubpath = "C:\\Windows\\system32\\incwvxbyn.exe" inclwgwbt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{82FF4E2E-3211-46bd-8B1C-F53C8D91D898} inncprues.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{42C326A8-FB50-472f-9ECB-B76BA743BB28}\stubpath = "C:\\Windows\\system32\\inesqmezb.exe" indxawycz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D833AB8-2F40-444b-BA83-90BB64E6B2D4} inbbmmbxa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14D7077F-8214-4237-A000-8762A7AE4C0B}\stubpath = "C:\\Windows\\system32\\inykmqjhq.exe" injymewrt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F2F6D2FD-5272-40a9-BAAE-8F2A7DE918FA}\stubpath = "C:\\Windows\\system32\\ingvetxyk.exe" inhegsgsd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E7446B03-2A7E-42e9-813F-2CBA4C9033A8}\stubpath = "C:\\Windows\\system32\\inxnqhgoo.exe" incraptug.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1F8FD82F-422B-4fb5-943D-A51B7EDFB129} inmhxsddw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CAA89EA4-13FB-4ddf-9662-E74AB530A7F8}\stubpath = "C:\\Windows\\system32\\insaljfpw.exe" injtvdfif.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{341AB11E-8A62-4d4e-A0C2-B77680BA27E8}\stubpath = "C:\\Windows\\system32\\inmqlrpew.exe" invgvfzue.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0CDFA6EB-EEFA-4483-919E-742BED0E6F06} inziwmdvp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9085F7F0-331C-4fa8-BB10-F51D674224D6}\stubpath = "C:\\Windows\\system32\\inhrmfavc.exe" ingjdrmaq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{23E5FDBF-5AB4-4a9f-B6BA-9E8070CD3397} inwixlnmf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{095D155A-FE60-4d4b-AD79-246697C9FC52}\stubpath = "C:\\Windows\\system32\\intpaiupe.exe" inaivxrqr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C2ABC10-EAA6-4377-8FC7-B539D48B0349}\stubpath = "C:\\Windows\\system32\\inqdmufdj.exe" inhwoipfi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4D62029B-4DCC-4932-9849-D275ED8772F3} inmibthrw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0F76E7A4-0304-435a-B4B5-245FDA9DDA39} inhvtxxbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BA3F4DC3-A447-412b-9A68-BACA77D51067}\stubpath = "C:\\Windows\\system32\\infakywft.exe" invatpnbv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A4E4A07D-CDB3-40c9-837F-35D753F60028}\stubpath = "C:\\Windows\\system32\\inetlfmxc.exe" innuocedv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2DB9168-BC85-4aef-A23C-550272231B27} indskelwb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E4A61A0F-0C83-4d9c-A535-7CFCFB7A8152}\stubpath = "C:\\Windows\\system32\\indrzpldy.exe" inuiybnpg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{69D8CA47-E99D-449d-9950-5069D9F2499E} inwhxahtz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6794062B-CA31-47a5-9015-17D09700AD5E} inyjbrycn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8DBA3BD0-45A9-47ee-A155-FD24D73E9FFB}\stubpath = "C:\\Windows\\system32\\indhxkwmb.exe" incrjzdkv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{BD522D7A-0C9C-4b36-B026-20C2F0829A99} inazpsjiq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{750C1CCA-010B-4489-B0C3-57FD46DDDBBE} inclzteci.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6216B934-A278-49f9-91DD-668843782C28}\stubpath = "C:\\Windows\\system32\\inepndjtb.exe" inqzaupvo.exe -
ACProtect 1.3x - 1.4x DLL software 11 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00070000000120e3-3.dat acprotect behavioral1/files/0x0007000000015e3d-28.dat acprotect behavioral1/files/0x0007000000015e3d-27.dat acprotect behavioral1/files/0x0006000000016597-56.dat acprotect behavioral1/files/0x0006000000016ae1-83.dat acprotect behavioral1/files/0x0006000000016c31-109.dat acprotect behavioral1/files/0x0006000000016ce3-135.dat acprotect behavioral1/files/0x0006000000016d07-162.dat acprotect behavioral1/files/0x0006000000016d60-190.dat acprotect behavioral1/files/0x0006000000016d80-217.dat acprotect behavioral1/files/0x0006000000017560-242.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 1168 inmeufqjy.exe 2640 intfuikjc.exe 2772 inmtnbdcu.exe 2560 inwixlnmf.exe 1208 inuqbjvqf.exe 2140 innuocedv.exe 1740 inetlfmxc.exe 804 inzloqpih.exe 2068 inqmfrmyb.exe 2392 inpbwqegf.exe 1788 invhwkmle.exe 1736 ineuxonvv.exe 3000 indskelwb.exe 1076 inyjbrycn.exe 1564 incvyzsfr.exe 2972 inlofemzm.exe 1392 inxtemyti.exe 2628 inogwahsa.exe 1068 inlsmacbt.exe 2616 incgzwjvl.exe 1708 ingvnhoze.exe 2688 inghxondz.exe 2776 inhwnltjf.exe 2140 inhegsgsd.exe 1684 ingvetxyk.exe 2924 inhfsfaqh.exe 2052 inyufnzuj.exe 448 insohtodl.exe 708 innfvgrkz.exe 1756 indtwnmuu.exe 2424 inkzrlbas.exe 2436 inykznpoh.exe 1628 inbuxzyre.exe 2588 inpleqlxa.exe 2824 inzvgovkd.exe 2296 incraptug.exe 2668 inxnqhgoo.exe 2092 inxiaqxbm.exe 1668 insezthji.exe 2908 innlypqcs.exe 528 infudswxj.exe 868 inopeewva.exe 1792 inaivxrqr.exe 2108 intpaiupe.exe 2592 infumgnyd.exe 2228 inljyapnv.exe 3012 inpqffxwb.exe 1732 inqcxrfhg.exe 2124 inlvjosms.exe 3044 inigtklnv.exe 1588 inatwyxqd.exe 2132 inwhpwale.exe 320 inmhxsddw.exe 2984 inbfyviuk.exe 2832 inaphxbit.exe 2712 indwztgsi.exe 2100 inlhzufqa.exe 2780 insbquvhx.exe 2560 inldtepix.exe 2724 inyorihpp.exe 1760 inixpjqgj.exe 880 inortslka.exe 1716 inmawkptn.exe 2088 inoavpdfe.exe -
Loads dropped DLL 64 IoCs
pid Process 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe 1168 inmeufqjy.exe 1168 inmeufqjy.exe 1168 inmeufqjy.exe 1168 inmeufqjy.exe 1168 inmeufqjy.exe 2640 intfuikjc.exe 2640 intfuikjc.exe 2640 intfuikjc.exe 2640 intfuikjc.exe 2640 intfuikjc.exe 2772 inmtnbdcu.exe 2772 inmtnbdcu.exe 2772 inmtnbdcu.exe 2772 inmtnbdcu.exe 2772 inmtnbdcu.exe 2560 inwixlnmf.exe 2560 inwixlnmf.exe 2560 inwixlnmf.exe 2560 inwixlnmf.exe 2560 inwixlnmf.exe 1208 inuqbjvqf.exe 1208 inuqbjvqf.exe 1208 inuqbjvqf.exe 1208 inuqbjvqf.exe 1208 inuqbjvqf.exe 2140 innuocedv.exe 2140 innuocedv.exe 2140 innuocedv.exe 2140 innuocedv.exe 2140 innuocedv.exe 1740 inetlfmxc.exe 1740 inetlfmxc.exe 1740 inetlfmxc.exe 1740 inetlfmxc.exe 1740 inetlfmxc.exe 804 inzloqpih.exe 804 inzloqpih.exe 804 inzloqpih.exe 804 inzloqpih.exe 804 inzloqpih.exe 2068 inqmfrmyb.exe 2068 inqmfrmyb.exe 2068 inqmfrmyb.exe 2068 inqmfrmyb.exe 2068 inqmfrmyb.exe 2392 inpbwqegf.exe 2392 inpbwqegf.exe 2392 inpbwqegf.exe 2392 inpbwqegf.exe 2392 inpbwqegf.exe 1788 invhwkmle.exe 1788 invhwkmle.exe 1788 invhwkmle.exe 1788 invhwkmle.exe 1788 invhwkmle.exe 1736 ineuxonvv.exe 1736 ineuxonvv.exe 1736 ineuxonvv.exe 1736 ineuxonvv.exe 1736 ineuxonvv.exe 3000 indskelwb.exe 3000 indskelwb.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\inckxztas.exe infauwnfj.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inamdunku.exe File opened for modification C:\Windows\SysWOW64\inniucjdf.exe_lang.ini inikojpnc.exe File created C:\Windows\SysWOW64\inbohznex.exe infgwnmcy.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inqofiykl.exe File created C:\Windows\SysWOW64\inxgusiod.exe inpkvggzd.exe File opened for modification C:\Windows\SysWOW64\inkbaivic.exe_lang.ini inalzlawr.exe File opened for modification C:\Windows\SysWOW64\syslog.dat infxiosfk.exe File opened for modification C:\Windows\SysWOW64\syslog.dat iniqzgcyz.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inytozkkh.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inwemzvcu.exe File created C:\Windows\SysWOW64\intsuvkkg.exe ingtgabri.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inivlaoql.exe File opened for modification C:\Windows\SysWOW64\syslog.dat insnyjjgx.exe File opened for modification C:\Windows\SysWOW64\inujlcwuk.exe_lang.ini invnbgkek.exe File opened for modification C:\Windows\SysWOW64\innbxlquo.exe_lang.ini inbjwysrs.exe File created C:\Windows\SysWOW64\inuytxoyr.exe invkhejgd.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inktbmkag.exe File created C:\Windows\SysWOW64\indpalewk.exe inrkqhiua.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inuwjozuo.exe File created C:\Windows\SysWOW64\inswrxvke.exe inmkimmxk.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inthmqkqb.exe File opened for modification C:\Windows\SysWOW64\syslog.dat infcpjolj.exe File opened for modification C:\Windows\SysWOW64\infmbihgy.exe_lang.ini inziwmdvp.exe File created C:\Windows\SysWOW64\inddmxhxc.exe inasgqvzt.exe File opened for modification C:\Windows\SysWOW64\syslog.dat indpalewk.exe File created C:\Windows\SysWOW64\inqklaasr.exe inpnehxjk.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpqffxwb.exe File created C:\Windows\SysWOW64\ingrakqpr.exe inionprva.exe File opened for modification C:\Windows\SysWOW64\injavkrnv.exe_lang.ini ineeenyiy.exe File created C:\Windows\SysWOW64\inbobfwma.exe inquussur.exe File opened for modification C:\Windows\SysWOW64\inkwlklan.exe_lang.ini inujqmuoe.exe File created C:\Windows\SysWOW64\intuwvzao.exe inbaqtkjr.exe File created C:\Windows\SysWOW64\inijzocok.exe indbkovjr.exe File opened for modification C:\Windows\SysWOW64\inyegrpfl.exe_lang.ini inuytzxmg.exe File opened for modification C:\Windows\SysWOW64\inwanaevl.exe_lang.ini ingiuiufd.exe File opened for modification C:\Windows\SysWOW64\incvdypdo.exe_lang.ini ineugyxhj.exe File created C:\Windows\SysWOW64\inuwftrhn.exe innptoush.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inmhgesgy.exe File created C:\Windows\SysWOW64\incvyzsfr.exe inyjbrycn.exe File opened for modification C:\Windows\SysWOW64\syslog.dat indrzpldy.exe File opened for modification C:\Windows\SysWOW64\ineupaato.exe_lang.ini inthxpach.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inhgwhjlo.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inncprues.exe File opened for modification C:\Windows\SysWOW64\inbkobdgw.exe_lang.ini inewhnrej.exe File opened for modification C:\Windows\SysWOW64\incbrdfjw.exe_lang.ini ingtvpopk.exe File opened for modification C:\Windows\SysWOW64\innptoush.exe_lang.ini inkuaczqt.exe File opened for modification C:\Windows\SysWOW64\syslog.dat infmbihgy.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inlofemzm.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inxiaqxbm.exe File opened for modification C:\Windows\SysWOW64\inftrnfcc.exe_lang.ini injhulmow.exe File opened for modification C:\Windows\SysWOW64\inqjpgzht.exe_lang.ini inulkzdji.exe File created C:\Windows\SysWOW64\inocymrvp.exe inumafjdj.exe File opened for modification C:\Windows\SysWOW64\inbqostfv.exe_lang.ini inwyzbftn.exe File created C:\Windows\SysWOW64\inqjvuqid.exe inazojdaz.exe File opened for modification C:\Windows\SysWOW64\ingjdrmaq.exe_lang.ini inipelkjl.exe File opened for modification C:\Windows\SysWOW64\inmiqkaqr.exe_lang.ini inknhvqeu.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inhegsgsd.exe File opened for modification C:\Windows\SysWOW64\inrfpuysy.exe_lang.ini insgoyikn.exe File opened for modification C:\Windows\SysWOW64\syslog.dat ineqbmfxl.exe File opened for modification C:\Windows\SysWOW64\invatpnbv.exe_lang.ini inygczwba.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inthxpach.exe File created C:\Windows\SysWOW64\inyaereiz.exe inmsevrki.exe File opened for modification C:\Windows\SysWOW64\inqgdzfrf.exe_lang.ini indhxkwmb.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe 1168 inmeufqjy.exe 2640 intfuikjc.exe 2772 inmtnbdcu.exe 2560 inwixlnmf.exe 1208 inuqbjvqf.exe 2140 innuocedv.exe 1740 inetlfmxc.exe 804 inzloqpih.exe 2068 inqmfrmyb.exe 2392 inpbwqegf.exe 1788 invhwkmle.exe 1736 ineuxonvv.exe 3000 indskelwb.exe 1076 inyjbrycn.exe 1564 incvyzsfr.exe 2972 inlofemzm.exe 1392 inxtemyti.exe 2628 inogwahsa.exe 1068 inlsmacbt.exe 2616 incgzwjvl.exe 1708 ingvnhoze.exe 2688 inghxondz.exe 2776 inhwnltjf.exe 2140 inhegsgsd.exe 1684 ingvetxyk.exe 2924 inhfsfaqh.exe 2052 inyufnzuj.exe 448 insohtodl.exe 708 innfvgrkz.exe 1756 indtwnmuu.exe 2424 inkzrlbas.exe 2436 inykznpoh.exe 1628 inbuxzyre.exe 2588 inpleqlxa.exe 2824 inzvgovkd.exe 2296 incraptug.exe 2668 inxnqhgoo.exe 2092 inxiaqxbm.exe 1668 insezthji.exe 2908 innlypqcs.exe 528 infudswxj.exe 868 inopeewva.exe 1792 inaivxrqr.exe 2108 intpaiupe.exe 2592 infumgnyd.exe 2228 inljyapnv.exe 3012 inpqffxwb.exe 1732 inqcxrfhg.exe 2124 inlvjosms.exe 3044 inigtklnv.exe 1588 inatwyxqd.exe 2132 inwhpwale.exe 320 inmhxsddw.exe 2984 inbfyviuk.exe 2832 inaphxbit.exe 2712 indwztgsi.exe 2100 inlhzufqa.exe 2780 insbquvhx.exe 2560 inldtepix.exe 2724 inyorihpp.exe 1760 inixpjqgj.exe 880 inortslka.exe 1716 inmawkptn.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe Token: SeDebugPrivilege 1168 inmeufqjy.exe Token: SeDebugPrivilege 2640 intfuikjc.exe Token: SeDebugPrivilege 2772 inmtnbdcu.exe Token: SeDebugPrivilege 2560 inwixlnmf.exe Token: SeDebugPrivilege 1208 inuqbjvqf.exe Token: SeDebugPrivilege 2140 innuocedv.exe Token: SeDebugPrivilege 1740 inetlfmxc.exe Token: SeDebugPrivilege 804 inzloqpih.exe Token: SeDebugPrivilege 2068 inqmfrmyb.exe Token: SeDebugPrivilege 2392 inpbwqegf.exe Token: SeDebugPrivilege 1788 invhwkmle.exe Token: SeDebugPrivilege 1736 ineuxonvv.exe Token: SeDebugPrivilege 3000 indskelwb.exe Token: SeDebugPrivilege 1076 inyjbrycn.exe Token: SeDebugPrivilege 1564 incvyzsfr.exe Token: SeDebugPrivilege 2972 inlofemzm.exe Token: SeDebugPrivilege 1392 inxtemyti.exe Token: SeDebugPrivilege 2628 inogwahsa.exe Token: SeDebugPrivilege 1068 inlsmacbt.exe Token: SeDebugPrivilege 2616 incgzwjvl.exe Token: SeDebugPrivilege 1708 ingvnhoze.exe Token: SeDebugPrivilege 2688 inghxondz.exe Token: SeDebugPrivilege 2776 inhwnltjf.exe Token: SeDebugPrivilege 2140 inhegsgsd.exe Token: SeDebugPrivilege 1684 ingvetxyk.exe Token: SeDebugPrivilege 2924 inhfsfaqh.exe Token: SeDebugPrivilege 2052 inyufnzuj.exe Token: SeDebugPrivilege 448 insohtodl.exe Token: SeDebugPrivilege 708 innfvgrkz.exe Token: SeDebugPrivilege 1756 indtwnmuu.exe Token: SeDebugPrivilege 2424 inkzrlbas.exe Token: SeDebugPrivilege 2436 inykznpoh.exe Token: SeDebugPrivilege 1628 inbuxzyre.exe Token: SeDebugPrivilege 2588 inpleqlxa.exe Token: SeDebugPrivilege 2824 inzvgovkd.exe Token: SeDebugPrivilege 2296 incraptug.exe Token: SeDebugPrivilege 2668 inxnqhgoo.exe Token: SeDebugPrivilege 2092 inxiaqxbm.exe Token: SeDebugPrivilege 1668 insezthji.exe Token: SeDebugPrivilege 2908 innlypqcs.exe Token: SeDebugPrivilege 528 infudswxj.exe Token: SeDebugPrivilege 868 inopeewva.exe Token: SeDebugPrivilege 1792 inaivxrqr.exe Token: SeDebugPrivilege 2108 intpaiupe.exe Token: SeDebugPrivilege 2592 infumgnyd.exe Token: SeDebugPrivilege 2228 inljyapnv.exe Token: SeDebugPrivilege 3012 inpqffxwb.exe Token: SeDebugPrivilege 1732 inqcxrfhg.exe Token: SeDebugPrivilege 2124 inlvjosms.exe Token: SeDebugPrivilege 3044 inigtklnv.exe Token: SeDebugPrivilege 1588 inatwyxqd.exe Token: SeDebugPrivilege 2132 inwhpwale.exe Token: SeDebugPrivilege 320 inmhxsddw.exe Token: SeDebugPrivilege 2984 inbfyviuk.exe Token: SeDebugPrivilege 2832 inaphxbit.exe Token: SeDebugPrivilege 2712 indwztgsi.exe Token: SeDebugPrivilege 2100 inlhzufqa.exe Token: SeDebugPrivilege 2780 insbquvhx.exe Token: SeDebugPrivilege 2560 inldtepix.exe Token: SeDebugPrivilege 2724 inyorihpp.exe Token: SeDebugPrivilege 1760 inixpjqgj.exe Token: SeDebugPrivilege 880 inortslka.exe Token: SeDebugPrivilege 1716 inmawkptn.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
pid Process 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe 1168 inmeufqjy.exe 2640 intfuikjc.exe 2772 inmtnbdcu.exe 2560 inwixlnmf.exe 1208 inuqbjvqf.exe 2140 innuocedv.exe 1740 inetlfmxc.exe 804 inzloqpih.exe 2068 inqmfrmyb.exe 2392 inpbwqegf.exe 1788 invhwkmle.exe 1736 ineuxonvv.exe 3000 indskelwb.exe 1076 inyjbrycn.exe 1564 incvyzsfr.exe 2972 inlofemzm.exe 1392 inxtemyti.exe 2628 inogwahsa.exe 1068 inlsmacbt.exe 2616 incgzwjvl.exe 1708 ingvnhoze.exe 2688 inghxondz.exe 2776 inhwnltjf.exe 2140 inhegsgsd.exe 1684 ingvetxyk.exe 2924 inhfsfaqh.exe 2052 inyufnzuj.exe 448 insohtodl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 320 wrote to memory of 1168 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe 28 PID 320 wrote to memory of 1168 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe 28 PID 320 wrote to memory of 1168 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe 28 PID 320 wrote to memory of 1168 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe 28 PID 320 wrote to memory of 1168 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe 28 PID 320 wrote to memory of 1168 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe 28 PID 320 wrote to memory of 1168 320 NEAS.84446418e733266249b3ce6c8af14916_JC.exe 28 PID 1168 wrote to memory of 2640 1168 inmeufqjy.exe 29 PID 1168 wrote to memory of 2640 1168 inmeufqjy.exe 29 PID 1168 wrote to memory of 2640 1168 inmeufqjy.exe 29 PID 1168 wrote to memory of 2640 1168 inmeufqjy.exe 29 PID 1168 wrote to memory of 2640 1168 inmeufqjy.exe 29 PID 1168 wrote to memory of 2640 1168 inmeufqjy.exe 29 PID 1168 wrote to memory of 2640 1168 inmeufqjy.exe 29 PID 2640 wrote to memory of 2772 2640 intfuikjc.exe 30 PID 2640 wrote to memory of 2772 2640 intfuikjc.exe 30 PID 2640 wrote to memory of 2772 2640 intfuikjc.exe 30 PID 2640 wrote to memory of 2772 2640 intfuikjc.exe 30 PID 2640 wrote to memory of 2772 2640 intfuikjc.exe 30 PID 2640 wrote to memory of 2772 2640 intfuikjc.exe 30 PID 2640 wrote to memory of 2772 2640 intfuikjc.exe 30 PID 2772 wrote to memory of 2560 2772 inmtnbdcu.exe 31 PID 2772 wrote to memory of 2560 2772 inmtnbdcu.exe 31 PID 2772 wrote to memory of 2560 2772 inmtnbdcu.exe 31 PID 2772 wrote to memory of 2560 2772 inmtnbdcu.exe 31 PID 2772 wrote to memory of 2560 2772 inmtnbdcu.exe 31 PID 2772 wrote to memory of 2560 2772 inmtnbdcu.exe 31 PID 2772 wrote to memory of 2560 2772 inmtnbdcu.exe 31 PID 2560 wrote to memory of 1208 2560 inwixlnmf.exe 32 PID 2560 wrote to memory of 1208 2560 inwixlnmf.exe 32 PID 2560 wrote to memory of 1208 2560 inwixlnmf.exe 32 PID 2560 wrote to memory of 1208 2560 inwixlnmf.exe 32 PID 2560 wrote to memory of 1208 2560 inwixlnmf.exe 32 PID 2560 wrote to memory of 1208 2560 inwixlnmf.exe 32 PID 2560 wrote to memory of 1208 2560 inwixlnmf.exe 32 PID 1208 wrote to memory of 2140 1208 inuqbjvqf.exe 33 PID 1208 wrote to memory of 2140 1208 inuqbjvqf.exe 33 PID 1208 wrote to memory of 2140 1208 inuqbjvqf.exe 33 PID 1208 wrote to memory of 2140 1208 inuqbjvqf.exe 33 PID 1208 wrote to memory of 2140 1208 inuqbjvqf.exe 33 PID 1208 wrote to memory of 2140 1208 inuqbjvqf.exe 33 PID 1208 wrote to memory of 2140 1208 inuqbjvqf.exe 33 PID 2140 wrote to memory of 1740 2140 innuocedv.exe 34 PID 2140 wrote to memory of 1740 2140 innuocedv.exe 34 PID 2140 wrote to memory of 1740 2140 innuocedv.exe 34 PID 2140 wrote to memory of 1740 2140 innuocedv.exe 34 PID 2140 wrote to memory of 1740 2140 innuocedv.exe 34 PID 2140 wrote to memory of 1740 2140 innuocedv.exe 34 PID 2140 wrote to memory of 1740 2140 innuocedv.exe 34 PID 1740 wrote to memory of 804 1740 inetlfmxc.exe 35 PID 1740 wrote to memory of 804 1740 inetlfmxc.exe 35 PID 1740 wrote to memory of 804 1740 inetlfmxc.exe 35 PID 1740 wrote to memory of 804 1740 inetlfmxc.exe 35 PID 1740 wrote to memory of 804 1740 inetlfmxc.exe 35 PID 1740 wrote to memory of 804 1740 inetlfmxc.exe 35 PID 1740 wrote to memory of 804 1740 inetlfmxc.exe 35 PID 804 wrote to memory of 2068 804 inzloqpih.exe 36 PID 804 wrote to memory of 2068 804 inzloqpih.exe 36 PID 804 wrote to memory of 2068 804 inzloqpih.exe 36 PID 804 wrote to memory of 2068 804 inzloqpih.exe 36 PID 804 wrote to memory of 2068 804 inzloqpih.exe 36 PID 804 wrote to memory of 2068 804 inzloqpih.exe 36 PID 804 wrote to memory of 2068 804 inzloqpih.exe 36 PID 2068 wrote to memory of 2392 2068 inqmfrmyb.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.84446418e733266249b3ce6c8af14916_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.84446418e733266249b3ce6c8af14916_JC.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\intfuikjc.exeC:\Windows\system32\intfuikjc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\inmtnbdcu.exeC:\Windows\system32\inmtnbdcu.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\inuqbjvqf.exeC:\Windows\system32\inuqbjvqf.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\innuocedv.exeC:\Windows\system32\innuocedv.exe7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\inzloqpih.exeC:\Windows\system32\inzloqpih.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\inqmfrmyb.exeC:\Windows\system32\inqmfrmyb.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\inpbwqegf.exeC:\Windows\system32\inpbwqegf.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2392 -
C:\Windows\SysWOW64\invhwkmle.exeC:\Windows\system32\invhwkmle.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Windows\SysWOW64\ineuxonvv.exeC:\Windows\system32\ineuxonvv.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Windows\SysWOW64\indskelwb.exeC:\Windows\system32\indskelwb.exe14⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Windows\SysWOW64\inyjbrycn.exeC:\Windows\system32\inyjbrycn.exe15⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1076 -
C:\Windows\SysWOW64\incvyzsfr.exeC:\Windows\system32\incvyzsfr.exe16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Windows\SysWOW64\inlofemzm.exeC:\Windows\system32\inlofemzm.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\Windows\SysWOW64\inxtemyti.exeC:\Windows\system32\inxtemyti.exe18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1392 -
C:\Windows\SysWOW64\inogwahsa.exeC:\Windows\system32\inogwahsa.exe19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2628 -
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Windows\SysWOW64\incgzwjvl.exeC:\Windows\system32\incgzwjvl.exe21⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Windows\SysWOW64\ingvnhoze.exeC:\Windows\system32\ingvnhoze.exe22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Windows\SysWOW64\inghxondz.exeC:\Windows\system32\inghxondz.exe23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Windows\SysWOW64\inhwnltjf.exeC:\Windows\system32\inhwnltjf.exe24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Windows\SysWOW64\inhegsgsd.exeC:\Windows\system32\inhegsgsd.exe25⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Windows\SysWOW64\ingvetxyk.exeC:\Windows\system32\ingvetxyk.exe26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Windows\SysWOW64\inhfsfaqh.exeC:\Windows\system32\inhfsfaqh.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Windows\SysWOW64\inyufnzuj.exeC:\Windows\system32\inyufnzuj.exe28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Windows\SysWOW64\insohtodl.exeC:\Windows\system32\insohtodl.exe29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:448 -
C:\Windows\SysWOW64\innfvgrkz.exeC:\Windows\system32\innfvgrkz.exe30⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:708 -
C:\Windows\SysWOW64\indtwnmuu.exeC:\Windows\system32\indtwnmuu.exe31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1756 -
C:\Windows\SysWOW64\inkzrlbas.exeC:\Windows\system32\inkzrlbas.exe32⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2424 -
C:\Windows\SysWOW64\inykznpoh.exeC:\Windows\system32\inykznpoh.exe33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436 -
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe34⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588 -
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Windows\SysWOW64\incraptug.exeC:\Windows\system32\incraptug.exe37⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\inxnqhgoo.exeC:\Windows\system32\inxnqhgoo.exe38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Windows\SysWOW64\inxiaqxbm.exeC:\Windows\system32\inxiaqxbm.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\SysWOW64\insezthji.exeC:\Windows\system32\insezthji.exe40⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Windows\SysWOW64\innlypqcs.exeC:\Windows\system32\innlypqcs.exe41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\SysWOW64\infudswxj.exeC:\Windows\system32\infudswxj.exe42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528 -
C:\Windows\SysWOW64\inopeewva.exeC:\Windows\system32\inopeewva.exe43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868 -
C:\Windows\SysWOW64\inaivxrqr.exeC:\Windows\system32\inaivxrqr.exe44⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\SysWOW64\intpaiupe.exeC:\Windows\system32\intpaiupe.exe45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\SysWOW64\infumgnyd.exeC:\Windows\system32\infumgnyd.exe46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Windows\SysWOW64\inljyapnv.exeC:\Windows\system32\inljyapnv.exe47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\SysWOW64\inpqffxwb.exeC:\Windows\system32\inpqffxwb.exe48⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
C:\Windows\SysWOW64\inlvjosms.exeC:\Windows\system32\inlvjosms.exe50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124 -
C:\Windows\SysWOW64\inigtklnv.exeC:\Windows\system32\inigtklnv.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Windows\SysWOW64\inatwyxqd.exeC:\Windows\system32\inatwyxqd.exe52⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588 -
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132 -
C:\Windows\SysWOW64\inmhxsddw.exeC:\Windows\system32\inmhxsddw.exe54⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320 -
C:\Windows\SysWOW64\inbfyviuk.exeC:\Windows\system32\inbfyviuk.exe55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\SysWOW64\inaphxbit.exeC:\Windows\system32\inaphxbit.exe56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Windows\SysWOW64\indwztgsi.exeC:\Windows\system32\indwztgsi.exe57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712 -
C:\Windows\SysWOW64\inlhzufqa.exeC:\Windows\system32\inlhzufqa.exe58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Windows\SysWOW64\insbquvhx.exeC:\Windows\system32\insbquvhx.exe59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780 -
C:\Windows\SysWOW64\inldtepix.exeC:\Windows\system32\inldtepix.exe60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560 -
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724 -
C:\Windows\SysWOW64\inixpjqgj.exeC:\Windows\system32\inixpjqgj.exe62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Windows\SysWOW64\inortslka.exeC:\Windows\system32\inortslka.exe63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Windows\SysWOW64\inmawkptn.exeC:\Windows\system32\inmawkptn.exe64⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe65⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\ingerepgv.exeC:\Windows\system32\ingerepgv.exe66⤵PID:2896
-
C:\Windows\SysWOW64\injwnoaqy.exeC:\Windows\system32\injwnoaqy.exe67⤵PID:2928
-
C:\Windows\SysWOW64\intetdxsy.exeC:\Windows\system32\intetdxsy.exe68⤵PID:908
-
C:\Windows\SysWOW64\inmkxopbr.exeC:\Windows\system32\inmkxopbr.exe69⤵PID:1268
-
C:\Windows\SysWOW64\inahuhbcs.exeC:\Windows\system32\inahuhbcs.exe70⤵PID:2008
-
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe71⤵
- Modifies Installed Components in the registry
PID:2472 -
C:\Windows\SysWOW64\indhxkwmb.exeC:\Windows\system32\indhxkwmb.exe72⤵
- Drops file in System32 directory
PID:2232 -
C:\Windows\SysWOW64\inqgdzfrf.exeC:\Windows\system32\inqgdzfrf.exe73⤵PID:1596
-
C:\Windows\SysWOW64\inknedlyl.exeC:\Windows\system32\inknedlyl.exe74⤵PID:2136
-
C:\Windows\SysWOW64\inzhpyfbx.exeC:\Windows\system32\inzhpyfbx.exe75⤵PID:2620
-
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe76⤵PID:2604
-
C:\Windows\SysWOW64\inxjymong.exeC:\Windows\system32\inxjymong.exe77⤵PID:2520
-
C:\Windows\SysWOW64\inijzqpfx.exeC:\Windows\system32\inijzqpfx.exe78⤵PID:2812
-
C:\Windows\SysWOW64\injyiwuqi.exeC:\Windows\system32\injyiwuqi.exe79⤵PID:2464
-
C:\Windows\SysWOW64\ingtvpopk.exeC:\Windows\system32\ingtvpopk.exe80⤵
- Drops file in System32 directory
PID:2696 -
C:\Windows\SysWOW64\incbrdfjw.exeC:\Windows\system32\incbrdfjw.exe81⤵PID:992
-
C:\Windows\SysWOW64\invuwaxma.exeC:\Windows\system32\invuwaxma.exe82⤵PID:1488
-
C:\Windows\SysWOW64\intcrvwiy.exeC:\Windows\system32\intcrvwiy.exe83⤵PID:2376
-
C:\Windows\SysWOW64\inpdimgmm.exeC:\Windows\system32\inpdimgmm.exe84⤵PID:2960
-
C:\Windows\SysWOW64\incajnuiq.exeC:\Windows\system32\incajnuiq.exe85⤵PID:1968
-
C:\Windows\SysWOW64\inixomukg.exeC:\Windows\system32\inixomukg.exe86⤵PID:2924
-
C:\Windows\SysWOW64\infhthtec.exeC:\Windows\system32\infhthtec.exe87⤵PID:936
-
C:\Windows\SysWOW64\inutvwllh.exeC:\Windows\system32\inutvwllh.exe88⤵PID:1512
-
C:\Windows\SysWOW64\inrdysgih.exeC:\Windows\system32\inrdysgih.exe89⤵PID:1736
-
C:\Windows\SysWOW64\ingvzmksi.exeC:\Windows\system32\ingvzmksi.exe90⤵PID:2424
-
C:\Windows\SysWOW64\inbmkzbqa.exeC:\Windows\system32\inbmkzbqa.exe91⤵PID:1700
-
C:\Windows\SysWOW64\ingoxeawx.exeC:\Windows\system32\ingoxeawx.exe92⤵PID:1516
-
C:\Windows\SysWOW64\inqtvunam.exeC:\Windows\system32\inqtvunam.exe93⤵PID:320
-
C:\Windows\SysWOW64\inwgusogd.exeC:\Windows\system32\inwgusogd.exe94⤵PID:2628
-
C:\Windows\SysWOW64\inwmpgfnn.exeC:\Windows\system32\inwmpgfnn.exe95⤵PID:2568
-
C:\Windows\SysWOW64\inrcangym.exeC:\Windows\system32\inrcangym.exe96⤵
- Modifies Installed Components in the registry
PID:2476 -
C:\Windows\SysWOW64\inqnbrgit.exeC:\Windows\system32\inqnbrgit.exe97⤵PID:2668
-
C:\Windows\SysWOW64\infnwdvwr.exeC:\Windows\system32\infnwdvwr.exe98⤵PID:776
-
C:\Windows\SysWOW64\injmdckxk.exeC:\Windows\system32\injmdckxk.exe99⤵PID:2852
-
C:\Windows\SysWOW64\indscwrxb.exeC:\Windows\system32\indscwrxb.exe100⤵PID:1000
-
C:\Windows\SysWOW64\inasgqvzt.exeC:\Windows\system32\inasgqvzt.exe101⤵
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\inddmxhxc.exeC:\Windows\system32\inddmxhxc.exe102⤵PID:1980
-
C:\Windows\SysWOW64\inyteppma.exeC:\Windows\system32\inyteppma.exe103⤵PID:1020
-
C:\Windows\SysWOW64\insnyjjgx.exeC:\Windows\system32\insnyjjgx.exe104⤵
- Drops file in System32 directory
PID:1968 -
C:\Windows\SysWOW64\inzkzjyci.exeC:\Windows\system32\inzkzjyci.exe105⤵PID:1028
-
C:\Windows\SysWOW64\inkmpmynm.exeC:\Windows\system32\inkmpmynm.exe106⤵
- Modifies Installed Components in the registry
PID:1752 -
C:\Windows\SysWOW64\inhiypoew.exeC:\Windows\system32\inhiypoew.exe107⤵PID:2360
-
C:\Windows\SysWOW64\inktbmkag.exeC:\Windows\system32\inktbmkag.exe108⤵
- Drops file in System32 directory
PID:1648 -
C:\Windows\SysWOW64\infgwnmcy.exeC:\Windows\system32\infgwnmcy.exe109⤵
- Drops file in System32 directory
PID:896 -
C:\Windows\SysWOW64\inbohznex.exeC:\Windows\system32\inbohznex.exe110⤵
- Modifies Installed Components in the registry
PID:2992 -
C:\Windows\SysWOW64\inqzfhsqg.exeC:\Windows\system32\inqzfhsqg.exe111⤵PID:2836
-
C:\Windows\SysWOW64\indwezqep.exeC:\Windows\system32\indwezqep.exe112⤵PID:2412
-
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe113⤵
- Modifies Installed Components in the registry
PID:2384 -
C:\Windows\SysWOW64\inytozkkh.exeC:\Windows\system32\inytozkkh.exe114⤵
- Drops file in System32 directory
PID:2092 -
C:\Windows\SysWOW64\inecpcnet.exeC:\Windows\system32\inecpcnet.exe115⤵
- Modifies Installed Components in the registry
PID:1212 -
C:\Windows\SysWOW64\inaikwkwh.exeC:\Windows\system32\inaikwkwh.exe116⤵PID:368
-
C:\Windows\SysWOW64\inrhnxdft.exeC:\Windows\system32\inrhnxdft.exe117⤵PID:2872
-
C:\Windows\SysWOW64\inugvjlkd.exeC:\Windows\system32\inugvjlkd.exe118⤵PID:2672
-
C:\Windows\SysWOW64\innqsrkjz.exeC:\Windows\system32\innqsrkjz.exe119⤵PID:2056
-
C:\Windows\SysWOW64\insvxwpco.exeC:\Windows\system32\insvxwpco.exe120⤵PID:2956
-
C:\Windows\SysWOW64\inpiofygs.exeC:\Windows\system32\inpiofygs.exe121⤵PID:2168
-
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe122⤵PID:1232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-