Analysis
-
max time kernel
120s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 05:03
Behavioral task
behavioral1
Sample
60ec58f5b707caacc5c469519a0c3b60N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
60ec58f5b707caacc5c469519a0c3b60N.exe
Resource
win10v2004-20240802-en
General
-
Target
60ec58f5b707caacc5c469519a0c3b60N.exe
-
Size
348KB
-
MD5
60ec58f5b707caacc5c469519a0c3b60
-
SHA1
15c0c01b07c32d7fe52c5084c4e8cb94c52b3515
-
SHA256
ef847e455aea6bbcba041b0e0f7fdffcd093fd423f3f89c2960c2ec1c5a0d905
-
SHA512
8cfc6c25dde56afe940e9584cc8f5d6d15949590db8c4bcac64f5942c3d1f7685fc81bded0ffa679f70c6b80c3b16a78ee0c34fd9e6df1e1f3ce6b2af2e626a4
-
SSDEEP
6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0Ss:ouLwoZQGpnedeP/deUe1ppGjTGHZRT0w
Malware Config
Signatures
-
Gh0st RAT payload 47 IoCs
resource yara_rule behavioral2/memory/3452-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x000800000002340c-13.dat family_gh0strat behavioral2/files/0x000700000002340d-20.dat family_gh0strat behavioral2/memory/3452-24-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023412-45.dat family_gh0strat behavioral2/memory/3700-48-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1248-46-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3700-25-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023416-65.dat family_gh0strat behavioral2/memory/1248-86-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x000700000002341a-92.dat family_gh0strat behavioral2/memory/3900-95-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x000700000002341e-117.dat family_gh0strat behavioral2/memory/2136-121-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023422-139.dat family_gh0strat behavioral2/memory/4124-142-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023426-162.dat family_gh0strat behavioral2/memory/3656-166-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023429-186.dat family_gh0strat behavioral2/memory/2308-190-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4724-211-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x000700000002342d-209.dat family_gh0strat behavioral2/files/0x0007000000023431-233.dat family_gh0strat behavioral2/memory/3308-236-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3584-257-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0008000000023436-260.dat family_gh0strat behavioral2/files/0x000700000002343a-280.dat family_gh0strat behavioral2/memory/2516-282-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x000700000002343e-304.dat family_gh0strat behavioral2/memory/3628-307-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023441-327.dat family_gh0strat behavioral2/memory/3868-330-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023445-350.dat family_gh0strat behavioral2/memory/4712-356-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023449-372.dat family_gh0strat behavioral2/memory/3616-375-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4224-395-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1960-413-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1660-433-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/208-454-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3416-473-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/5100-508-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3500-494-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/408-533-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4724-552-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1676-570-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1060-590-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 64 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A5AB9BDD-BAD2-4e37-A854-7D1B6E1CF069} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{882C5293-B374-46a7-8599-34323398D9FA}\stubpath = "C:\\Windows\\system32\\inxgoheoh.exe" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B3C1861-5135-4826-A5B4-15B4390A774C} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{18B40EEE-56AA-4a7c-A09D-AFB9F47C1F61} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3E22CC8C-0626-4261-A53B-4AD920CF5682}\stubpath = "C:\\Windows\\system32\\ineltxdyn.exe" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9EB31DB4-B7D3-4680-AEB4-B9CA56369A35} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3FEE3F1B-16A0-4b31-B8CE-F42A3D84D7A3}\stubpath = "C:\\Windows\\system32\\inwhpwale.exe" inwgusogd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F87CE320-997B-4a2e-80DA-CEE7AF3D2E7A} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9449164B-D398-41d0-BB0E-4D7EB6C0CEB1}\stubpath = "C:\\Windows\\system32\\inybnkijv.exe" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4460B8BD-8EFC-484a-910A-5E9B5F92A795} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3BA89EC9-7A9A-42e2-9957-FEE4EB2D84DD} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B065F080-6149-467e-9B08-E8ACD97CC484}\stubpath = "C:\\Windows\\system32\\inkbyhage.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{297175A7-4767-4822-98FB-7427B05111AF}\stubpath = "C:\\Windows\\system32\\inxaelfcs.exe" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{827C3B9B-CDEC-4018-9888-6CA4EB7DC5E8} inruwvobn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FA885ABE-A150-4392-93F8-7E91FD7988E9}\stubpath = "C:\\Windows\\system32\\inbfyviuk.exe" inugvjlkd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{884288F3-4E82-4adc-B881-CD69F8239419}\stubpath = "C:\\Windows\\system32\\insyjghrx.exe" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4C2DF20E-1391-40a9-B9C8-23B67A037CB6} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{37835D5E-5628-4472-AEF5-D4B743D2F40A}\stubpath = "C:\\Windows\\system32\\inwmzsjsv.exe" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B473ECED-F858-49a8-8075-25C3FB2CA316} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6B7A1487-ED56-4aaf-9160-365DA0B55313} inlsmacbt.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{47FDE22E-4DFD-4081-A756-F7FCAD3BC5E9} inddmxhxc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3A82166C-52DF-4cc3-9237-98172CBD3E0B} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7F97F810-6470-4c85-A81F-57DDB4E05D4B} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{FE8B5E01-B535-450a-9D53-F5AED8050332}\stubpath = "C:\\Windows\\system32\\inebgydau.exe" incbrdfjw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B9735BC9-A707-4751-BFE4-20FCB0729682}\stubpath = "C:\\Windows\\system32\\inbhrywnq.exe" innboczda.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6647AB42-50E0-4220-87D8-000033D67754} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1CE75F66-267D-4985-86CD-A96729C85B18}\stubpath = "C:\\Windows\\system32\\injkufcol.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{16DCF21A-E42A-4c9b-BA66-03E48B3B7C48}\stubpath = "C:\\Windows\\system32\\indhovuhp.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CF87DC21-CC65-4069-BE52-87820F105A60}\stubpath = "C:\\Windows\\system32\\indrzpldy.exe" inqdhyock.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E446FF2B-2590-434c-A99D-CE2C74675954}\stubpath = "C:\\Windows\\system32\\inovtknpq.exe" inckekwln.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3FC67DD2-8C3F-46cf-874F-1F217EC9C7E4} incgowgcf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5041BEA2-A2B5-4387-A4C6-7D24DA3ABCAE}\stubpath = "C:\\Windows\\system32\\inbdauejc.exe" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4F2DCC83-C8E5-4f6a-9311-FF72449CCBDE} insywlfel.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{F961C3D8-B843-4451-8007-6A9A66AFEE9A} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DA421828-956B-4797-86C8-A4014BD9149F} indkntxkp.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{86F23A09-EB2F-4cc8-98C9-E22FE6744DC1} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB19AE6D-D2D0-4402-813F-E59410F103CB} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{124B6359-87C0-45f9-ACF8-28F114F63722}\stubpath = "C:\\Windows\\system32\\inljswfrz.exe" infvqbbup.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0D2DCCC0-EBAD-4e67-B703-C6D16661FE49} inpfvwyie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8FAD3826-FF05-4e24-8071-DCBF89B843AE}\stubpath = "C:\\Windows\\system32\\inemiltdh.exe" injfdlthy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5596AF62-F405-4cf1-90D5-FAF72D0458CB}\stubpath = "C:\\Windows\\system32\\injkhlstg.exe" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{882C5293-B374-46a7-8599-34323398D9FA} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5F5DAB78-2FC8-40fb-AC6D-62CCBE315CEC}\stubpath = "C:\\Windows\\system32\\indajuknb.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B3D29619-52EC-4029-837A-8D0921AC042B}\stubpath = "C:\\Windows\\system32\\inyetbegv.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1FFD48A8-AE71-420b-BFE8-7C51F397DC96}\stubpath = "C:\\Windows\\system32\\invqlrkwy.exe" invkhejgd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D1913090-E396-4e1b-9CBC-24DD30643078}\stubpath = "C:\\Windows\\system32\\inkdbjsnc.exe" inkhtihxi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CB00EB6A-B84F-41bf-A693-81FBF487B3A1}\stubpath = "C:\\Windows\\system32\\inunagpvs.exe" inyherndc.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1C5E6EC9-9B8E-42ae-B988-F125F58875F1} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D6CE09ED-D0C3-4e02-A31D-2C069BA6CC90} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B3A5EFB3-EE17-4fd2-9626-E34EAB34D302} incpdebyb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{946C3050-1D2E-4f27-AE1F-4C5CE4A6F971}\stubpath = "C:\\Windows\\system32\\inubqxcbr.exe" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0B02C34F-20FA-4ad2-9DAE-2F763A11B1F7} injwnoaqy.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D4DD193C-665D-419f-8266-3A4ADEA268E3} innusjmop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D6D4244E-5C4A-4e81-827C-E16F3B83E6A1}\stubpath = "C:\\Windows\\system32\\inniucjdf.exe" innnpmjol.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{358C8E3F-8387-4f3d-ADE9-A08220CF9841}\stubpath = "C:\\Windows\\system32\\inupeyqpk.exe" inbbmmbxa.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C4DD8139-1151-4210-BE71-4FF79D999FB9} inmbpckft.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CFBDB6CA-8D7D-4622-913E-0DE55789655E}\stubpath = "C:\\Windows\\system32\\ineyyaxuz.exe" inkfaovfk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{779A929A-2AD9-4be9-B287-E9F0872E3EC7} Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E0B86F96-5417-4a92-A33E-D975C9E34D68} Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0B954103-39D6-4f64-8344-1F450134F64E}\stubpath = "C:\\Windows\\system32\\inrwenjjv.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DCCB40FC-6EBD-4a1b-9D1A-85CF04E9F3EF}\stubpath = "C:\\Windows\\system32\\injrhdzvq.exe" iniqgcwmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9569B232-35DE-412e-89F1-2B1348B2A583} inwikohfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5343313F-C976-4dde-88B0-2241F14BBC74}\stubpath = "C:\\Windows\\system32\\innqmfdal.exe" inadlmaxb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E823FF66-EE16-48d8-8EF0-5C6624048240}\stubpath = "C:\\Windows\\system32\\inoyifzki.exe" inbwxiybi.exe -
ACProtect 1.3x - 1.4x DLL software 16 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0008000000023406-2.dat acprotect behavioral2/files/0x0007000000023410-29.dat acprotect behavioral2/files/0x0007000000023414-51.dat acprotect behavioral2/files/0x0007000000023418-76.dat acprotect behavioral2/files/0x000700000002341c-98.dat acprotect behavioral2/files/0x0007000000023420-124.dat acprotect behavioral2/files/0x0007000000023424-145.dat acprotect behavioral2/files/0x0007000000023428-168.dat acprotect behavioral2/files/0x000700000002342b-194.dat acprotect behavioral2/files/0x000700000002342f-217.dat acprotect behavioral2/files/0x0007000000023433-239.dat acprotect behavioral2/files/0x0007000000023438-264.dat acprotect behavioral2/files/0x000700000002343c-287.dat acprotect behavioral2/files/0x0009000000023315-309.dat acprotect behavioral2/files/0x0007000000023443-334.dat acprotect behavioral2/files/0x0007000000023447-355.dat acprotect -
Executes dropped EXE 64 IoCs
pid Process 3700 insvxwpco.exe 1248 inbuxzyre.exe 3900 innuocedv.exe 2136 inruwvobn.exe 4124 inhwoipfi.exe 3656 inkzrlbas.exe 2308 inrdysgih.exe 4724 inzvgovkd.exe 3308 inldtepix.exe 3584 inuqbjvqf.exe 2516 insbquvhx.exe 3628 injyqkarh.exe 3868 inoavpdfe.exe 4712 intfuikjc.exe 3616 ingvnhoze.exe 4224 inykznpoh.exe 1960 insohtodl.exe 1660 invrckwrg.exe 208 infumgnyd.exe 3416 incgzwjvl.exe 3500 inpbwqegf.exe 5100 inugvjlkd.exe 408 inbfyviuk.exe 4724 inrngsnzc.exe 1676 inazpsjiq.exe 1060 inetlfmxc.exe 4564 inkbaivic.exe 3960 inwmpgfnn.exe 1008 inqcxrfhg.exe 3044 inqgdzfrf.exe 628 inixpjqgj.exe 1868 inpsutmlb.exe 3568 inomzqrdt.exe 1204 inrcangym.exe 3536 invhwkmle.exe 2892 ingtgabri.exe 2656 inilcbjwj.exe 5044 inmeufqjy.exe 1700 injwnoaqy.exe 3692 indxawycz.exe 4960 inatwyxqd.exe 2692 incsvmltt.exe 2056 inxhvtpha.exe 2220 indtkzjxv.exe 1788 inmtnbdcu.exe 1596 inhiypoew.exe 4712 inbqiycju.exe 4464 infdqdofu.exe 3016 infnwdvwr.exe 4048 ingvzmksi.exe 4536 inochlfll.exe 2136 incanalcr.exe 4668 inbjwysrs.exe 3460 inyufnzuj.exe 3860 inaexuhtj.exe 4744 inaikwkwh.exe 1936 inmprqjiy.exe 4832 invuwaxma.exe 4188 inyorihpp.exe 4424 insezthji.exe 1640 ingerepgv.exe 3956 ineeenyiy.exe 1932 indeulkya.exe 612 inhwnltjf.exe -
Loads dropped DLL 64 IoCs
pid Process 3452 60ec58f5b707caacc5c469519a0c3b60N.exe 3452 60ec58f5b707caacc5c469519a0c3b60N.exe 3700 insvxwpco.exe 3700 insvxwpco.exe 1248 inbuxzyre.exe 1248 inbuxzyre.exe 3900 innuocedv.exe 3900 innuocedv.exe 2136 inruwvobn.exe 2136 inruwvobn.exe 4124 inhwoipfi.exe 4124 inhwoipfi.exe 3656 inkzrlbas.exe 3656 inkzrlbas.exe 2308 inrdysgih.exe 2308 inrdysgih.exe 4724 inzvgovkd.exe 4724 inzvgovkd.exe 3308 inldtepix.exe 3308 inldtepix.exe 3584 inuqbjvqf.exe 3584 inuqbjvqf.exe 2516 insbquvhx.exe 2516 insbquvhx.exe 3628 injyqkarh.exe 3628 injyqkarh.exe 3868 inoavpdfe.exe 3868 inoavpdfe.exe 4712 intfuikjc.exe 4712 intfuikjc.exe 3616 ingvnhoze.exe 3616 ingvnhoze.exe 4224 inykznpoh.exe 4224 inykznpoh.exe 1960 insohtodl.exe 1960 insohtodl.exe 1660 invrckwrg.exe 1660 invrckwrg.exe 208 infumgnyd.exe 208 infumgnyd.exe 3416 incgzwjvl.exe 3416 incgzwjvl.exe 3500 inpbwqegf.exe 3500 inpbwqegf.exe 5100 inugvjlkd.exe 5100 inugvjlkd.exe 408 inbfyviuk.exe 408 inbfyviuk.exe 4724 inrngsnzc.exe 4724 inrngsnzc.exe 1676 inazpsjiq.exe 1676 inazpsjiq.exe 1060 inetlfmxc.exe 1060 inetlfmxc.exe 4564 inkbaivic.exe 4564 inkbaivic.exe 3960 inwmpgfnn.exe 3960 inwmpgfnn.exe 1008 inqcxrfhg.exe 1008 inqcxrfhg.exe 3044 inqgdzfrf.exe 3044 inqgdzfrf.exe 628 inixpjqgj.exe 628 inixpjqgj.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\inttgetsi.exe_lang.ini Process not Found File created C:\Windows\SysWOW64\inpatbkcw.exe inpitupmy.exe File opened for modification C:\Windows\SysWOW64\intutegrn.exe_lang.ini inrtfmbnz.exe File created C:\Windows\SysWOW64\inknpnmhr.exe Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat inpwpbxsu.exe File opened for modification C:\Windows\SysWOW64\inunzybak.exe_lang.ini Process not Found File created C:\Windows\SysWOW64\inlyiimvo.exe Process not Found File created C:\Windows\SysWOW64\inczrcetn.exe Process not Found File opened for modification C:\Windows\SysWOW64\inewwuqnf.exe_lang.ini Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat inbwxiybi.exe File created C:\Windows\SysWOW64\indlflxmo.exe inunawidf.exe File created C:\Windows\SysWOW64\inknbtcvi.exe Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\insuxuebv.exe_lang.ini indigocxg.exe File created C:\Windows\SysWOW64\inyepukgs.exe injgmuryj.exe File created C:\Windows\SysWOW64\inhcqmqos.exe Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat inuwegjgs.exe File opened for modification C:\Windows\SysWOW64\inttrrtqn.exe_lang.ini infnxzhjm.exe File opened for modification C:\Windows\SysWOW64\inlshjpai.exe_lang.ini inmachloq.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inotudemc.exe File opened for modification C:\Windows\SysWOW64\inzebhpmt.exe_lang.ini Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File created C:\Windows\SysWOW64\inhnnghbv.exe Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat injyiwuqi.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inuonujxj.exe File created C:\Windows\SysWOW64\inwbpkebv.exe inbmflkmo.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inqwuteip.exe File created C:\Windows\SysWOW64\intfuikjc.exe inoavpdfe.exe File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\indhodkji.exe_lang.ini inhrmfavc.exe File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File created C:\Windows\SysWOW64\inlkacycq.exe Process not Found File created C:\Windows\SysWOW64\inecpcnet.exe inikbvtjp.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inhpxhdgo.exe File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat inmkxopbr.exe File opened for modification C:\Windows\SysWOW64\inexlaczi.exe_lang.ini Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat inqmfrmyb.exe File opened for modification C:\Windows\SysWOW64\inkfaovfk.exe_lang.ini intoipjfl.exe File opened for modification C:\Windows\SysWOW64\infcwglex.exe_lang.ini Process not Found File opened for modification C:\Windows\SysWOW64\inepoecga.exe_lang.ini Process not Found File created C:\Windows\SysWOW64\ingjwtnaf.exe Process not Found File created C:\Windows\SysWOW64\inyccnaan.exe invqmdynu.exe File created C:\Windows\SysWOW64\ingxztboz.exe Process not Found File created C:\Windows\SysWOW64\invcsswdc.exe Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\innboczda.exe_lang.ini indrmgdxz.exe File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\ingyqklnq.exe_lang.ini Process not Found File opened for modification C:\Windows\SysWOW64\inwssygxj.exe_lang.ini Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\intojzuff.exe_lang.ini ingyagyjp.exe File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat inniyteex.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inpyudmwu.exe File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found File opened for modification C:\Windows\SysWOW64\inaggaocx.exe_lang.ini Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat inetlfmxc.exe File opened for modification C:\Windows\SysWOW64\inikxaosp.exe_lang.ini Process not Found File opened for modification C:\Windows\SysWOW64\syslog.dat Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language insuxuebv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inopeewva.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inhngmkjz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inqklaasr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inmflkmos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inaaajueu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language insbznvcp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inbbmmbxa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inhucnyzu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injlxlxig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inrzweovz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inlmosntr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language insulctjf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language incbrcegj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inyegrpfl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inqnbrgit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inoioprby.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inqjwwyse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language innvrumqh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language infdqdofu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inenfzwlg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inyvsxuru.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inrshhzyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inqpnhcwb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language infvypoww.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3452 60ec58f5b707caacc5c469519a0c3b60N.exe 3452 60ec58f5b707caacc5c469519a0c3b60N.exe 3700 insvxwpco.exe 3700 insvxwpco.exe 1248 inbuxzyre.exe 1248 inbuxzyre.exe 3900 innuocedv.exe 3900 innuocedv.exe 2136 inruwvobn.exe 2136 inruwvobn.exe 4124 inhwoipfi.exe 4124 inhwoipfi.exe 3656 inkzrlbas.exe 3656 inkzrlbas.exe 2308 inrdysgih.exe 2308 inrdysgih.exe 4724 inzvgovkd.exe 4724 inzvgovkd.exe 3308 inldtepix.exe 3308 inldtepix.exe 3584 inuqbjvqf.exe 3584 inuqbjvqf.exe 2516 insbquvhx.exe 2516 insbquvhx.exe 3628 injyqkarh.exe 3628 injyqkarh.exe 3868 inoavpdfe.exe 3868 inoavpdfe.exe 4712 intfuikjc.exe 4712 intfuikjc.exe 3616 ingvnhoze.exe 3616 ingvnhoze.exe 4224 inykznpoh.exe 4224 inykznpoh.exe 1960 insohtodl.exe 1960 insohtodl.exe 1660 invrckwrg.exe 1660 invrckwrg.exe 208 infumgnyd.exe 208 infumgnyd.exe 3416 incgzwjvl.exe 3416 incgzwjvl.exe 3500 inpbwqegf.exe 3500 inpbwqegf.exe 5100 inugvjlkd.exe 5100 inugvjlkd.exe 408 inbfyviuk.exe 408 inbfyviuk.exe 4724 inrngsnzc.exe 4724 inrngsnzc.exe 1676 inazpsjiq.exe 1676 inazpsjiq.exe 1060 inetlfmxc.exe 1060 inetlfmxc.exe 4564 inkbaivic.exe 4564 inkbaivic.exe 3960 inwmpgfnn.exe 3960 inwmpgfnn.exe 1008 inqcxrfhg.exe 1008 inqcxrfhg.exe 3044 inqgdzfrf.exe 3044 inqgdzfrf.exe 628 inixpjqgj.exe 628 inixpjqgj.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3452 60ec58f5b707caacc5c469519a0c3b60N.exe Token: SeDebugPrivilege 3700 insvxwpco.exe Token: SeDebugPrivilege 1248 inbuxzyre.exe Token: SeDebugPrivilege 3900 innuocedv.exe Token: SeDebugPrivilege 2136 inruwvobn.exe Token: SeDebugPrivilege 4124 inhwoipfi.exe Token: SeDebugPrivilege 3656 inkzrlbas.exe Token: SeDebugPrivilege 2308 inrdysgih.exe Token: SeDebugPrivilege 4724 inzvgovkd.exe Token: SeDebugPrivilege 3308 inldtepix.exe Token: SeDebugPrivilege 3584 inuqbjvqf.exe Token: SeDebugPrivilege 2516 insbquvhx.exe Token: SeDebugPrivilege 3628 injyqkarh.exe Token: SeDebugPrivilege 3868 inoavpdfe.exe Token: SeDebugPrivilege 4712 intfuikjc.exe Token: SeDebugPrivilege 3616 ingvnhoze.exe Token: SeDebugPrivilege 4224 inykznpoh.exe Token: SeDebugPrivilege 1960 insohtodl.exe Token: SeDebugPrivilege 1660 invrckwrg.exe Token: SeDebugPrivilege 208 infumgnyd.exe Token: SeDebugPrivilege 3416 incgzwjvl.exe Token: SeDebugPrivilege 3500 inpbwqegf.exe Token: SeDebugPrivilege 5100 inugvjlkd.exe Token: SeDebugPrivilege 408 inbfyviuk.exe Token: SeDebugPrivilege 4724 inrngsnzc.exe Token: SeDebugPrivilege 1676 inazpsjiq.exe Token: SeDebugPrivilege 1060 inetlfmxc.exe Token: SeDebugPrivilege 4564 inkbaivic.exe Token: SeDebugPrivilege 3960 inwmpgfnn.exe Token: SeDebugPrivilege 1008 inqcxrfhg.exe Token: SeDebugPrivilege 3044 inqgdzfrf.exe Token: SeDebugPrivilege 628 inixpjqgj.exe Token: SeDebugPrivilege 1868 inpsutmlb.exe Token: SeDebugPrivilege 3568 inomzqrdt.exe Token: SeDebugPrivilege 1204 inrcangym.exe Token: SeDebugPrivilege 3536 invhwkmle.exe Token: SeDebugPrivilege 2892 ingtgabri.exe Token: SeDebugPrivilege 2656 inilcbjwj.exe Token: SeDebugPrivilege 5044 inmeufqjy.exe Token: SeDebugPrivilege 1700 injwnoaqy.exe Token: SeDebugPrivilege 3692 indxawycz.exe Token: SeDebugPrivilege 4960 inatwyxqd.exe Token: SeDebugPrivilege 2692 incsvmltt.exe Token: SeDebugPrivilege 2056 inxhvtpha.exe Token: SeDebugPrivilege 2220 indtkzjxv.exe Token: SeDebugPrivilege 1788 inmtnbdcu.exe Token: SeDebugPrivilege 1596 inhiypoew.exe Token: SeDebugPrivilege 4712 inbqiycju.exe Token: SeDebugPrivilege 4464 infdqdofu.exe Token: SeDebugPrivilege 3016 infnwdvwr.exe Token: SeDebugPrivilege 4048 ingvzmksi.exe Token: SeDebugPrivilege 4536 inochlfll.exe Token: SeDebugPrivilege 2136 incanalcr.exe Token: SeDebugPrivilege 4668 inbjwysrs.exe Token: SeDebugPrivilege 3460 inyufnzuj.exe Token: SeDebugPrivilege 3860 inaexuhtj.exe Token: SeDebugPrivilege 4744 inaikwkwh.exe Token: SeDebugPrivilege 1936 inmprqjiy.exe Token: SeDebugPrivilege 4832 invuwaxma.exe Token: SeDebugPrivilege 4188 inyorihpp.exe Token: SeDebugPrivilege 4424 insezthji.exe Token: SeDebugPrivilege 1640 ingerepgv.exe Token: SeDebugPrivilege 3956 ineeenyiy.exe Token: SeDebugPrivilege 1932 indeulkya.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
pid Process 3452 60ec58f5b707caacc5c469519a0c3b60N.exe 3700 insvxwpco.exe 1248 inbuxzyre.exe 3900 innuocedv.exe 2136 inruwvobn.exe 4124 inhwoipfi.exe 3656 inkzrlbas.exe 2308 inrdysgih.exe 4724 inzvgovkd.exe 3308 inldtepix.exe 3584 inuqbjvqf.exe 2516 insbquvhx.exe 3628 injyqkarh.exe 3868 inoavpdfe.exe 4712 intfuikjc.exe 3616 ingvnhoze.exe 4224 inykznpoh.exe 1960 insohtodl.exe 1660 invrckwrg.exe 208 infumgnyd.exe 3416 incgzwjvl.exe 3500 inpbwqegf.exe 5100 inugvjlkd.exe 408 inbfyviuk.exe 4724 inrngsnzc.exe 1676 inazpsjiq.exe 1060 inetlfmxc.exe 4564 inkbaivic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3452 wrote to memory of 3700 3452 60ec58f5b707caacc5c469519a0c3b60N.exe 85 PID 3452 wrote to memory of 3700 3452 60ec58f5b707caacc5c469519a0c3b60N.exe 85 PID 3452 wrote to memory of 3700 3452 60ec58f5b707caacc5c469519a0c3b60N.exe 85 PID 3700 wrote to memory of 1248 3700 insvxwpco.exe 86 PID 3700 wrote to memory of 1248 3700 insvxwpco.exe 86 PID 3700 wrote to memory of 1248 3700 insvxwpco.exe 86 PID 1248 wrote to memory of 3900 1248 inbuxzyre.exe 88 PID 1248 wrote to memory of 3900 1248 inbuxzyre.exe 88 PID 1248 wrote to memory of 3900 1248 inbuxzyre.exe 88 PID 3900 wrote to memory of 2136 3900 innuocedv.exe 89 PID 3900 wrote to memory of 2136 3900 innuocedv.exe 89 PID 3900 wrote to memory of 2136 3900 innuocedv.exe 89 PID 2136 wrote to memory of 4124 2136 inruwvobn.exe 91 PID 2136 wrote to memory of 4124 2136 inruwvobn.exe 91 PID 2136 wrote to memory of 4124 2136 inruwvobn.exe 91 PID 4124 wrote to memory of 3656 4124 inhwoipfi.exe 92 PID 4124 wrote to memory of 3656 4124 inhwoipfi.exe 92 PID 4124 wrote to memory of 3656 4124 inhwoipfi.exe 92 PID 3656 wrote to memory of 2308 3656 inkzrlbas.exe 94 PID 3656 wrote to memory of 2308 3656 inkzrlbas.exe 94 PID 3656 wrote to memory of 2308 3656 inkzrlbas.exe 94 PID 2308 wrote to memory of 4724 2308 inrdysgih.exe 95 PID 2308 wrote to memory of 4724 2308 inrdysgih.exe 95 PID 2308 wrote to memory of 4724 2308 inrdysgih.exe 95 PID 4724 wrote to memory of 3308 4724 inzvgovkd.exe 96 PID 4724 wrote to memory of 3308 4724 inzvgovkd.exe 96 PID 4724 wrote to memory of 3308 4724 inzvgovkd.exe 96 PID 3308 wrote to memory of 3584 3308 inldtepix.exe 97 PID 3308 wrote to memory of 3584 3308 inldtepix.exe 97 PID 3308 wrote to memory of 3584 3308 inldtepix.exe 97 PID 3584 wrote to memory of 2516 3584 inuqbjvqf.exe 98 PID 3584 wrote to memory of 2516 3584 inuqbjvqf.exe 98 PID 3584 wrote to memory of 2516 3584 inuqbjvqf.exe 98 PID 2516 wrote to memory of 3628 2516 insbquvhx.exe 99 PID 2516 wrote to memory of 3628 2516 insbquvhx.exe 99 PID 2516 wrote to memory of 3628 2516 insbquvhx.exe 99 PID 3628 wrote to memory of 3868 3628 injyqkarh.exe 100 PID 3628 wrote to memory of 3868 3628 injyqkarh.exe 100 PID 3628 wrote to memory of 3868 3628 injyqkarh.exe 100 PID 3868 wrote to memory of 4712 3868 inoavpdfe.exe 101 PID 3868 wrote to memory of 4712 3868 inoavpdfe.exe 101 PID 3868 wrote to memory of 4712 3868 inoavpdfe.exe 101 PID 4712 wrote to memory of 3616 4712 intfuikjc.exe 102 PID 4712 wrote to memory of 3616 4712 intfuikjc.exe 102 PID 4712 wrote to memory of 3616 4712 intfuikjc.exe 102 PID 3616 wrote to memory of 4224 3616 ingvnhoze.exe 103 PID 3616 wrote to memory of 4224 3616 ingvnhoze.exe 103 PID 3616 wrote to memory of 4224 3616 ingvnhoze.exe 103 PID 4224 wrote to memory of 1960 4224 inykznpoh.exe 104 PID 4224 wrote to memory of 1960 4224 inykznpoh.exe 104 PID 4224 wrote to memory of 1960 4224 inykznpoh.exe 104 PID 1960 wrote to memory of 1660 1960 insohtodl.exe 105 PID 1960 wrote to memory of 1660 1960 insohtodl.exe 105 PID 1960 wrote to memory of 1660 1960 insohtodl.exe 105 PID 1660 wrote to memory of 208 1660 invrckwrg.exe 106 PID 1660 wrote to memory of 208 1660 invrckwrg.exe 106 PID 1660 wrote to memory of 208 1660 invrckwrg.exe 106 PID 208 wrote to memory of 3416 208 infumgnyd.exe 107 PID 208 wrote to memory of 3416 208 infumgnyd.exe 107 PID 208 wrote to memory of 3416 208 infumgnyd.exe 107 PID 3416 wrote to memory of 3500 3416 incgzwjvl.exe 108 PID 3416 wrote to memory of 3500 3416 incgzwjvl.exe 108 PID 3416 wrote to memory of 3500 3416 incgzwjvl.exe 108 PID 3500 wrote to memory of 5100 3500 inpbwqegf.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\60ec58f5b707caacc5c469519a0c3b60N.exe"C:\Users\Admin\AppData\Local\Temp\60ec58f5b707caacc5c469519a0c3b60N.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\insvxwpco.exeC:\Windows\system32\insvxwpco.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\innuocedv.exeC:\Windows\system32\innuocedv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\inruwvobn.exeC:\Windows\system32\inruwvobn.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\inhwoipfi.exeC:\Windows\system32\inhwoipfi.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\inkzrlbas.exeC:\Windows\system32\inkzrlbas.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\inrdysgih.exeC:\Windows\system32\inrdysgih.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\inldtepix.exeC:\Windows\system32\inldtepix.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\inuqbjvqf.exeC:\Windows\system32\inuqbjvqf.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\insbquvhx.exeC:\Windows\system32\insbquvhx.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\injyqkarh.exeC:\Windows\system32\injyqkarh.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\intfuikjc.exeC:\Windows\system32\intfuikjc.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\ingvnhoze.exeC:\Windows\system32\ingvnhoze.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\inykznpoh.exeC:\Windows\system32\inykznpoh.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\insohtodl.exeC:\Windows\system32\insohtodl.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\invrckwrg.exeC:\Windows\system32\invrckwrg.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\infumgnyd.exeC:\Windows\system32\infumgnyd.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\incgzwjvl.exeC:\Windows\system32\incgzwjvl.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\inpbwqegf.exeC:\Windows\system32\inpbwqegf.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\inugvjlkd.exeC:\Windows\system32\inugvjlkd.exe23⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5100 -
C:\Windows\SysWOW64\inbfyviuk.exeC:\Windows\system32\inbfyviuk.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:408 -
C:\Windows\SysWOW64\inrngsnzc.exeC:\Windows\system32\inrngsnzc.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4724 -
C:\Windows\SysWOW64\inazpsjiq.exeC:\Windows\system32\inazpsjiq.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1060 -
C:\Windows\SysWOW64\inkbaivic.exeC:\Windows\system32\inkbaivic.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4564 -
C:\Windows\SysWOW64\inwmpgfnn.exeC:\Windows\system32\inwmpgfnn.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3960 -
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\SysWOW64\inqgdzfrf.exeC:\Windows\system32\inqgdzfrf.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Windows\SysWOW64\inixpjqgj.exeC:\Windows\system32\inixpjqgj.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628 -
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Windows\SysWOW64\inomzqrdt.exeC:\Windows\system32\inomzqrdt.exe34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3568 -
C:\Windows\SysWOW64\inrcangym.exeC:\Windows\system32\inrcangym.exe35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\SysWOW64\invhwkmle.exeC:\Windows\system32\invhwkmle.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3536 -
C:\Windows\SysWOW64\ingtgabri.exeC:\Windows\system32\ingtgabri.exe37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2892 -
C:\Windows\SysWOW64\inilcbjwj.exeC:\Windows\system32\inilcbjwj.exe38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2656 -
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5044 -
C:\Windows\SysWOW64\injwnoaqy.exeC:\Windows\system32\injwnoaqy.exe40⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\SysWOW64\indxawycz.exeC:\Windows\system32\indxawycz.exe41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3692 -
C:\Windows\SysWOW64\inatwyxqd.exeC:\Windows\system32\inatwyxqd.exe42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4960 -
C:\Windows\SysWOW64\incsvmltt.exeC:\Windows\system32\incsvmltt.exe43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\SysWOW64\inxhvtpha.exeC:\Windows\system32\inxhvtpha.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\SysWOW64\indtkzjxv.exeC:\Windows\system32\indtkzjxv.exe45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Windows\SysWOW64\inmtnbdcu.exeC:\Windows\system32\inmtnbdcu.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Windows\SysWOW64\inhiypoew.exeC:\Windows\system32\inhiypoew.exe47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Windows\SysWOW64\inbqiycju.exeC:\Windows\system32\inbqiycju.exe48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4712 -
C:\Windows\SysWOW64\infdqdofu.exeC:\Windows\system32\infdqdofu.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\infnwdvwr.exeC:\Windows\system32\infnwdvwr.exe50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3016 -
C:\Windows\SysWOW64\ingvzmksi.exeC:\Windows\system32\ingvzmksi.exe51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4048 -
C:\Windows\SysWOW64\inochlfll.exeC:\Windows\system32\inochlfll.exe52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4536 -
C:\Windows\SysWOW64\incanalcr.exeC:\Windows\system32\incanalcr.exe53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\SysWOW64\inbjwysrs.exeC:\Windows\system32\inbjwysrs.exe54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4668 -
C:\Windows\SysWOW64\inyufnzuj.exeC:\Windows\system32\inyufnzuj.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3460 -
C:\Windows\SysWOW64\inaexuhtj.exeC:\Windows\system32\inaexuhtj.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3860 -
C:\Windows\SysWOW64\inaikwkwh.exeC:\Windows\system32\inaikwkwh.exe57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4744 -
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\invuwaxma.exeC:\Windows\system32\invuwaxma.exe59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4188 -
C:\Windows\SysWOW64\insezthji.exeC:\Windows\system32\insezthji.exe61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4424 -
C:\Windows\SysWOW64\ingerepgv.exeC:\Windows\system32\ingerepgv.exe62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\SysWOW64\ineeenyiy.exeC:\Windows\system32\ineeenyiy.exe63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3956 -
C:\Windows\SysWOW64\indeulkya.exeC:\Windows\system32\indeulkya.exe64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Windows\SysWOW64\inhwnltjf.exeC:\Windows\system32\inhwnltjf.exe65⤵
- Executes dropped EXE
PID:612 -
C:\Windows\SysWOW64\inogwahsa.exeC:\Windows\system32\inogwahsa.exe66⤵PID:4472
-
C:\Windows\SysWOW64\inocokdvj.exeC:\Windows\system32\inocokdvj.exe67⤵PID:4708
-
C:\Windows\SysWOW64\inpfzcyeq.exeC:\Windows\system32\inpfzcyeq.exe68⤵PID:2360
-
C:\Windows\SysWOW64\indwztgsi.exeC:\Windows\system32\indwztgsi.exe69⤵PID:3936
-
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe70⤵PID:4528
-
C:\Windows\SysWOW64\inrjcgagg.exeC:\Windows\system32\inrjcgagg.exe71⤵PID:4492
-
C:\Windows\SysWOW64\inknedlyl.exeC:\Windows\system32\inknedlyl.exe72⤵PID:224
-
C:\Windows\SysWOW64\inupkqjvx.exeC:\Windows\system32\inupkqjvx.exe73⤵PID:4644
-
C:\Windows\SysWOW64\inbpxnjbw.exeC:\Windows\system32\inbpxnjbw.exe74⤵PID:2620
-
C:\Windows\SysWOW64\inesqmezb.exeC:\Windows\system32\inesqmezb.exe75⤵PID:3060
-
C:\Windows\SysWOW64\inhfsfaqh.exeC:\Windows\system32\inhfsfaqh.exe76⤵PID:4556
-
C:\Windows\SysWOW64\inxiaqxbm.exeC:\Windows\system32\inxiaqxbm.exe77⤵PID:1844
-
C:\Windows\SysWOW64\inewrcnnk.exeC:\Windows\system32\inewrcnnk.exe78⤵PID:3468
-
C:\Windows\SysWOW64\innfvgrkz.exeC:\Windows\system32\innfvgrkz.exe79⤵PID:3152
-
C:\Windows\SysWOW64\intpaiupe.exeC:\Windows\system32\intpaiupe.exe80⤵PID:1984
-
C:\Windows\SysWOW64\inniyteex.exeC:\Windows\system32\inniyteex.exe81⤵
- Drops file in System32 directory
PID:2952 -
C:\Windows\SysWOW64\indwezqep.exeC:\Windows\system32\indwezqep.exe82⤵PID:3716
-
C:\Windows\SysWOW64\ingiuiufd.exeC:\Windows\system32\ingiuiufd.exe83⤵PID:4064
-
C:\Windows\SysWOW64\ingwzqpxx.exeC:\Windows\system32\ingwzqpxx.exe84⤵PID:2420
-
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe85⤵
- Boot or Logon Autostart Execution: Active Setup
PID:1292 -
C:\Windows\SysWOW64\inlofemzm.exeC:\Windows\system32\inlofemzm.exe86⤵PID:4984
-
C:\Windows\SysWOW64\injkrqgyq.exeC:\Windows\system32\injkrqgyq.exe87⤵PID:4436
-
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe88⤵PID:4540
-
C:\Windows\SysWOW64\inxtemyti.exeC:\Windows\system32\inxtemyti.exe89⤵PID:3488
-
C:\Windows\SysWOW64\infhthtec.exeC:\Windows\system32\infhthtec.exe90⤵PID:4168
-
C:\Windows\SysWOW64\infslrijv.exeC:\Windows\system32\infslrijv.exe91⤵PID:4184
-
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe92⤵PID:3512
-
C:\Windows\SysWOW64\infgwnmcy.exeC:\Windows\system32\infgwnmcy.exe93⤵PID:4800
-
C:\Windows\SysWOW64\inxnqhgoo.exeC:\Windows\system32\inxnqhgoo.exe94⤵PID:4848
-
C:\Windows\SysWOW64\inqklaasr.exeC:\Windows\system32\inqklaasr.exe95⤵
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Windows\SysWOW64\innoddvuk.exeC:\Windows\system32\innoddvuk.exe96⤵PID:3008
-
C:\Windows\SysWOW64\ineuxonvv.exeC:\Windows\system32\ineuxonvv.exe97⤵PID:3952
-
C:\Windows\SysWOW64\inpkfxleq.exeC:\Windows\system32\inpkfxleq.exe98⤵PID:4716
-
C:\Windows\SysWOW64\inoxdfqoe.exeC:\Windows\system32\inoxdfqoe.exe99⤵PID:4564
-
C:\Windows\SysWOW64\inljyapnv.exeC:\Windows\system32\inljyapnv.exe100⤵PID:1456
-
C:\Windows\SysWOW64\innlypqcs.exeC:\Windows\system32\innlypqcs.exe101⤵PID:3164
-
C:\Windows\SysWOW64\ineybxzdp.exeC:\Windows\system32\ineybxzdp.exe102⤵PID:4216
-
C:\Windows\SysWOW64\inmxiifwj.exeC:\Windows\system32\inmxiifwj.exe103⤵PID:1620
-
C:\Windows\SysWOW64\inqjpgzht.exeC:\Windows\system32\inqjpgzht.exe104⤵PID:1960
-
C:\Windows\SysWOW64\indhxkwmb.exeC:\Windows\system32\indhxkwmb.exe105⤵PID:1292
-
C:\Windows\SysWOW64\innqsrkjz.exeC:\Windows\system32\innqsrkjz.exe106⤵PID:3412
-
C:\Windows\SysWOW64\inmibthrw.exeC:\Windows\system32\inmibthrw.exe107⤵PID:1168
-
C:\Windows\SysWOW64\inejnhnnw.exeC:\Windows\system32\inejnhnnw.exe108⤵PID:1260
-
C:\Windows\SysWOW64\indskelwb.exeC:\Windows\system32\indskelwb.exe109⤵PID:2356
-
C:\Windows\SysWOW64\inwgusogd.exeC:\Windows\system32\inwgusogd.exe110⤵
- Boot or Logon Autostart Execution: Active Setup
PID:2208 -
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe111⤵PID:532
-
C:\Windows\SysWOW64\inbjudnts.exeC:\Windows\system32\inbjudnts.exe112⤵PID:3888
-
C:\Windows\SysWOW64\insrzztuj.exeC:\Windows\system32\insrzztuj.exe113⤵PID:2648
-
C:\Windows\SysWOW64\inftrnfcc.exeC:\Windows\system32\inftrnfcc.exe114⤵PID:3480
-
C:\Windows\SysWOW64\intcrvwiy.exeC:\Windows\system32\intcrvwiy.exe115⤵PID:2516
-
C:\Windows\SysWOW64\inyjbrycn.exeC:\Windows\system32\inyjbrycn.exe116⤵PID:4480
-
C:\Windows\SysWOW64\inigtklnv.exeC:\Windows\system32\inigtklnv.exe117⤵PID:3468
-
C:\Windows\SysWOW64\inortslka.exeC:\Windows\system32\inortslka.exe118⤵PID:3836
-
C:\Windows\SysWOW64\inlhzufqa.exeC:\Windows\system32\inlhzufqa.exe119⤵PID:2588
-
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe120⤵PID:1264
-
C:\Windows\SysWOW64\inbbkvfva.exeC:\Windows\system32\inbbkvfva.exe121⤵PID:2964
-
C:\Windows\SysWOW64\insaljfpw.exeC:\Windows\system32\insaljfpw.exe122⤵PID:4748
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-