Analysis
-
max time kernel
120s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 05:23
Behavioral task
behavioral1
Sample
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
Resource
win10v2004-20241007-en
General
-
Target
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
-
Size
348KB
-
MD5
b9befe5cf8c341b816fcd1922accf117
-
SHA1
08ca40d0fc0c580caeb6c15aa5289bef223dd6d4
-
SHA256
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d
-
SHA512
3e85b180156fd665618fca532f4588f9edb9935fe2ecf3ebd60621a974c8fd30e32adee3a5d36c8bdefbec05787d69e721a13ade542f6d372681c4c80e448cac
-
SSDEEP
6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0SQ:ouLwoZQGpnedeP/deUe1ppGjTGHZRT08
Malware Config
Signatures
-
Gh0st RAT payload 39 IoCs
Processes:
resource yara_rule behavioral1/memory/2668-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Users\Admin\AppData\Local\Temp\rxlEAAE.tmp family_gh0strat \Windows\SysWOW64\inmprqjiy.exe family_gh0strat C:\Windows\SysWOW64\insohtodl.exe family_gh0strat behavioral1/memory/2668-22-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2832-59-0x00000000002D0000-0x00000000002FF000-memory.dmp family_gh0strat behavioral1/memory/2832-57-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2688-50-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat \Windows\SysWOW64\innfvgrkz.exe family_gh0strat behavioral1/memory/812-87-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2832-79-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat \Windows\SysWOW64\invhwkmle.exe family_gh0strat behavioral1/memory/2236-118-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/812-110-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat \Windows\SysWOW64\inpbwqegf.exe family_gh0strat behavioral1/memory/2236-137-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1236-139-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1236-144-0x00000000001C0000-0x00000000001EF000-memory.dmp family_gh0strat \Windows\SysWOW64\inxiaqxbm.exe family_gh0strat behavioral1/memory/604-167-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1236-164-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat \Windows\SysWOW64\indhxkwmb.exe family_gh0strat behavioral1/memory/2232-199-0x0000000000820000-0x000000000084F000-memory.dmp family_gh0strat behavioral1/memory/604-193-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat \Windows\SysWOW64\incgzwjvl.exe family_gh0strat behavioral1/memory/2620-413-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2864-393-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2668-373-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2260-353-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1420-335-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1756-314-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2004-294-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2004-276-0x00000000001C0000-0x00000000001EF000-memory.dmp family_gh0strat behavioral1/memory/1516-273-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1516-255-0x0000000000230000-0x000000000025F000-memory.dmp family_gh0strat behavioral1/memory/1516-254-0x0000000000230000-0x000000000025F000-memory.dmp family_gh0strat \Windows\SysWOW64\injwnoaqy.exe family_gh0strat behavioral1/memory/1160-247-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2232-220-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat -
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 64 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
inlgyukjh.exeinbzddobb.exeinnsieqyf.exeinvbdruwx.exeinunawidf.exeinrmslxzd.exeinyoqadam.exeinugdksck.exeinclzteci.exeiniqjgqjr.exeinhfoszse.exeinuwftrhn.exeinbyxsvdb.exeintekobge.exeinjhiaohu.exeinjmdckxk.exeingmbrmzt.exeinftrnfcc.exeinrjcgagg.exeinrtkbsie.exeinirmhzng.exeinfuxbnop.exeinhfnbzwf.exeinyaereiz.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{71C7681D-2943-4bd0-BB6E-84468F82AF21}\stubpath = "C:\\Windows\\system32\\ingjdrmaq.exe" inlgyukjh.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{84FA9834-E3E9-47ee-A692-849349E9C49E}\stubpath = "C:\\Windows\\system32\\inoidxcao.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{25B5FC0D-52CA-44ee-8CD5-DE07164825B1}\stubpath = "C:\\Windows\\system32\\inakexijj.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2A962ABA-E652-4929-892B-007F6A3EAAAE}\stubpath = "C:\\Windows\\system32\\inunzybak.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D1CFE4BC-7A4C-4021-A70A-673EB26ABFCD}\stubpath = "C:\\Windows\\system32\\inawcxoij.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F96DC629-5B3D-4644-B0E5-8A1DDB229678} inbzddobb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A51E70DC-3448-46c8-99A8-D6DA4620FDEC} innsieqyf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1CA498D1-56B2-4921-9202-5ABA7CBDAB00}\stubpath = "C:\\Windows\\system32\\inivxkbyw.exe" invbdruwx.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{437E05CB-1A75-4433-BC28-A021B8696A5E}\stubpath = "C:\\Windows\\system32\\ingmbrmzt.exe" inunawidf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A67FDC28-EFCD-43b4-B29C-1AD0985428B2}\stubpath = "C:\\Windows\\system32\\inesltdsz.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8B8AB8B6-635B-473f-9334-45287E9341DC} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{65238A2E-4BF7-4f44-93ED-00FFF2A5CB6A} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7E3904C7-9134-4e61-89EE-132DCD7CDDCA} inrmslxzd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA93D41F-CFF3-4696-9041-36A09F702449}\stubpath = "C:\\Windows\\system32\\inyegrpfl.exe" inyoqadam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B794F6B1-8DE4-4e1b-96A3-A37217B1E247}\stubpath = "C:\\Windows\\system32\\injhulmow.exe" inugdksck.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7906343C-8B92-4a8e-B90C-BD0D524B3608}\stubpath = "C:\\Windows\\system32\\inooqnkpm.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{388DFC23-DF49-448e-98CD-E37ED5AF00A7} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0F119170-5FC7-4406-BBAC-BB08507E7B72} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9094ADFD-39EA-452a-B9F7-61F4C8D3A1A8}\stubpath = "C:\\Windows\\system32\\inzmuprzl.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5D99C996-69A3-4a20-896C-4576623C68EA} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6F6322B7-2918-4fc7-A754-BAB126FD82C3} inclzteci.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A993BCD6-5C1E-4bc3-88D3-0BFAD8C312F6} iniqjgqjr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3063AE5C-BF08-465c-97EE-B29B40305C02}\stubpath = "C:\\Windows\\system32\\inebdvara.exe" inhfoszse.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A8165473-2F2D-46bb-8DD6-934AABFD7879} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4BF4F54F-0414-4f63-8DA5-72C1E0BE46EB} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2C536F15-FFE6-42cd-B566-319725306DFF}\stubpath = "C:\\Windows\\system32\\inhatmlse.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9A787234-2241-40b9-A94B-87AADAFB682B}\stubpath = "C:\\Windows\\system32\\inqlvsvyu.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6B5011DF-0981-412a-91F0-A003E14FAAC4} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C2730C1A-8949-43b5-8B3F-74E71D6BD566}\stubpath = "C:\\Windows\\system32\\inqrgtvyi.exe" inuwftrhn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0DCC266B-64CC-4fae-AC94-BCA58A50FE93} inbyxsvdb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C0BDB0D-C44E-402f-899D-1A85E5AB7377}\stubpath = "C:\\Windows\\system32\\inhswlgxa.exe" intekobge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{47CE440B-C510-4ac7-A87C-65B1D6B7AC9B} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CF3C2B31-5245-4119-A2F6-A63EE63F28FC}\stubpath = "C:\\Windows\\system32\\inrpojtkr.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{9249EC37-88D2-4d98-A8FF-EA1FD5D4C0FD} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7F50A635-4FF5-4af6-8011-8218D8450AA3}\stubpath = "C:\\Windows\\system32\\inrjxgyck.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E487B1A6-CB28-466e-B6F8-D9D51CD42903}\stubpath = "C:\\Windows\\system32\\iniixogak.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{109FD577-57A1-40fc-A212-9283E27546F0}\stubpath = "C:\\Windows\\system32\\ingukgutf.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{126A9D24-09CC-4e8c-93E7-F803327A7BDE} injhiaohu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{60380F08-2937-4126-9718-4AAC8AFB0002}\stubpath = "C:\\Windows\\system32\\inzvnieka.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B8FC0B4E-91D8-4725-BEEB-06B42AEBC1E2} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3A2807AB-5E8F-4b1d-83B5-0EB0038E638C} injmdckxk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{223C2B3B-7977-44fd-9C0A-33EA0E0C0669}\stubpath = "C:\\Windows\\system32\\inxoqaroc.exe" ingmbrmzt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1111DDCC-D375-4edd-AE7B-D76566518047} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4EBEDED5-A82A-428b-9989-B20E20D4A097}\stubpath = "C:\\Windows\\system32\\inoxbcsnd.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A3275038-FF4E-4b0f-B5AF-E43EB74079EF} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{228410E3-800C-4cce-B532-3F17BAE6A229} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{366C6BD7-CBA0-4d91-989D-EED2983836DF} inftrnfcc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6EE9A17C-CE26-48c5-8C95-1142D8EDD8D3}\stubpath = "C:\\Windows\\system32\\inkuaczqt.exe" inrjcgagg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10D24182-4D1E-43c8-AB28-84F8CF52063A} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{86E88B1D-3BC7-4cea-8641-E2AB0B0CD60E} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA146C42-9063-43d4-B31A-359565424CED}\stubpath = "C:\\Windows\\system32\\intuprtxq.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{902B40D5-198C-4aac-A9FC-5492A78E4498} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6A172743-070A-4968-B2D9-CDB8F7F460F4} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA15BCF9-0761-441a-A97C-5D70EA889BF0}\stubpath = "C:\\Windows\\system32\\inqnshcoc.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{41BCF35B-DA82-4f65-B3CB-BABE6AF2406C} inrtkbsie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7D899BFD-747F-459b-B622-FD254D5A29E4}\stubpath = "C:\\Windows\\system32\\inshvhsxn.exe" inirmhzng.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B7627C03-E6BA-426c-A794-FA03DD99F79B} infuxbnop.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C57869E2-6FB5-4ae4-9B9D-038FB7E6FF28}\stubpath = "C:\\Windows\\system32\\inklimtau.exe" inhfnbzwf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3DC7E1C8-49F4-4954-90E4-88F54B59DF32}\stubpath = "C:\\Windows\\system32\\injrmowiv.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C52FB692-4B75-41ff-90DF-418804172019}\stubpath = "C:\\Windows\\system32\\inncofxew.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5B6FC500-6D28-4065-BD4C-751C58697C10} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D24364EC-78BA-44a5-B558-5094C5920305} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1D7F7BF0-4FF6-49f1-8E2F-8A1734D9A37F}\stubpath = "C:\\Windows\\system32\\inryfclin.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{551F3A47-64F5-4f39-B412-BC65975D91C2}\stubpath = "C:\\Windows\\system32\\indlyubtu.exe" inyaereiz.exe -
ACProtect 1.3x - 1.4x DLL software 10 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\pxlEA9D.tmp acprotect C:\Users\Admin\AppData\Local\Temp\xxlEAEB.tmp acprotect \Users\Admin\AppData\Local\Temp\wxlEBE5.tmp acprotect \Users\Admin\AppData\Local\Temp\cxlED1D.tmp acprotect \Users\Admin\AppData\Local\Temp\jxlED5B.tmp acprotect \Users\Admin\AppData\Local\Temp\rxlEEB2.tmp acprotect \Users\Admin\AppData\Local\Temp\dxlEF20.tmp acprotect \Users\Admin\AppData\Local\Temp\zxlEFFA.tmp acprotect \Users\Admin\AppData\Local\Temp\iylF151.tmp acprotect \Users\Admin\AppData\Local\Temp\qylF0A6.tmp acprotect -
Executes dropped EXE 64 IoCs
Processes:
inmprqjiy.exeinsohtodl.exeinnfvgrkz.exeinvhwkmle.exeinpbwqegf.exeinxiaqxbm.exeindhxkwmb.exeincgzwjvl.exeinjwnoaqy.exeincrjzdkv.exeinugvjlkd.exeinbfyviuk.exeinldtepix.exeinoavpdfe.exeinqcxrfhg.exeinbuxzyre.exeinxjymong.exeinsrzztuj.exeinogwahsa.exeincvyzsfr.exeinwixlnmf.exeinjlxlxig.exeinnqsrkjz.exeinpsutmlb.exeinyorihpp.exeinyufnzuj.exeinaexuhtj.exeinkzrlbas.exeingtvpopk.exeinuqbjvqf.exeinxtemyti.exeinzvgovkd.exeinjyqkarh.exeinlsmacbt.exeinixomukg.exeintpaiupe.exeinjkrqgyq.exeintfuikjc.exeinfumgnyd.exeinwhpwale.exeinaikwkwh.exeinjfqeotx.exeinortslka.exeinruwvobn.exeinadbobmd.exeinetlfmxc.exeinsbquvhx.exeinhjvjvge.exeinzloqpih.exeintsuvkkg.exeinwmpgfnn.exeinbqiycju.exeinvrckwrg.exeinqgdzfrf.exeingiuiufd.exeinfslrijv.exeinrxixhwa.exeinnuocedv.exeinnlypqcs.exeinatwyxqd.exeincsvmltt.exeinhwoipfi.exeinxrqyyst.exeinejnhnnw.exepid process 2688 inmprqjiy.exe 2832 insohtodl.exe 812 innfvgrkz.exe 2236 invhwkmle.exe 1236 inpbwqegf.exe 604 inxiaqxbm.exe 2232 indhxkwmb.exe 1160 incgzwjvl.exe 1516 injwnoaqy.exe 2004 incrjzdkv.exe 1756 inugvjlkd.exe 1420 inbfyviuk.exe 2260 inldtepix.exe 2668 inoavpdfe.exe 2864 inqcxrfhg.exe 2620 inbuxzyre.exe 1588 inxjymong.exe 3052 insrzztuj.exe 684 inogwahsa.exe 264 incvyzsfr.exe 588 inwixlnmf.exe 2792 injlxlxig.exe 2416 innqsrkjz.exe 2424 inpsutmlb.exe 2524 inyorihpp.exe 2316 inyufnzuj.exe 1092 inaexuhtj.exe 2128 inkzrlbas.exe 2708 ingtvpopk.exe 1520 inuqbjvqf.exe 2824 inxtemyti.exe 1716 inzvgovkd.exe 1420 injyqkarh.exe 3068 inlsmacbt.exe 1112 inixomukg.exe 532 intpaiupe.exe 2928 injkrqgyq.exe 2960 intfuikjc.exe 604 infumgnyd.exe 1144 inwhpwale.exe 956 inaikwkwh.exe 836 injfqeotx.exe 2180 inortslka.exe 2272 inruwvobn.exe 2752 inadbobmd.exe 1220 inetlfmxc.exe 2556 insbquvhx.exe 1620 inhjvjvge.exe 2100 inzloqpih.exe 2564 intsuvkkg.exe 2948 inwmpgfnn.exe 1500 inbqiycju.exe 2280 invrckwrg.exe 1740 inqgdzfrf.exe 596 ingiuiufd.exe 1880 infslrijv.exe 2396 inrxixhwa.exe 2308 innuocedv.exe 2504 innlypqcs.exe 2452 inatwyxqd.exe 2072 incsvmltt.exe 2760 inhwoipfi.exe 2776 inxrqyyst.exe 1520 inejnhnnw.exe -
Loads dropped DLL 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeinmprqjiy.exeinsohtodl.exeinnfvgrkz.exeinvhwkmle.exeinpbwqegf.exeinxiaqxbm.exeindhxkwmb.exeincgzwjvl.exeinjwnoaqy.exeincrjzdkv.exeinugvjlkd.exeinbfyviuk.exeinldtepix.exepid process 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 2688 inmprqjiy.exe 2688 inmprqjiy.exe 2688 inmprqjiy.exe 2688 inmprqjiy.exe 2688 inmprqjiy.exe 2832 insohtodl.exe 2832 insohtodl.exe 2832 insohtodl.exe 2832 insohtodl.exe 2832 insohtodl.exe 812 innfvgrkz.exe 812 innfvgrkz.exe 812 innfvgrkz.exe 812 innfvgrkz.exe 812 innfvgrkz.exe 2236 invhwkmle.exe 2236 invhwkmle.exe 2236 invhwkmle.exe 2236 invhwkmle.exe 2236 invhwkmle.exe 1236 inpbwqegf.exe 1236 inpbwqegf.exe 1236 inpbwqegf.exe 1236 inpbwqegf.exe 1236 inpbwqegf.exe 604 inxiaqxbm.exe 604 inxiaqxbm.exe 604 inxiaqxbm.exe 604 inxiaqxbm.exe 604 inxiaqxbm.exe 2232 indhxkwmb.exe 2232 indhxkwmb.exe 2232 indhxkwmb.exe 2232 indhxkwmb.exe 2232 indhxkwmb.exe 1160 incgzwjvl.exe 1160 incgzwjvl.exe 1160 incgzwjvl.exe 1160 incgzwjvl.exe 1160 incgzwjvl.exe 1516 injwnoaqy.exe 1516 injwnoaqy.exe 1516 injwnoaqy.exe 1516 injwnoaqy.exe 1516 injwnoaqy.exe 2004 incrjzdkv.exe 2004 incrjzdkv.exe 2004 incrjzdkv.exe 2004 incrjzdkv.exe 2004 incrjzdkv.exe 1756 inugvjlkd.exe 1756 inugvjlkd.exe 1756 inugvjlkd.exe 1756 inugvjlkd.exe 1756 inugvjlkd.exe 1420 inbfyviuk.exe 1420 inbfyviuk.exe 1420 inbfyviuk.exe 1420 inbfyviuk.exe 1420 inbfyviuk.exe 2260 inldtepix.exe 2260 inldtepix.exe -
Drops file in System32 directory 64 IoCs
Processes:
ingerepgv.exeinjaxsmjs.exeingzrkglm.exeinxrnrycv.exeinrumczhz.exeinhrkssoj.exeinlolxmlm.exeincajnuiq.exeinijzqpfx.exeindvdvgmq.exeinygczwba.exeinspmpjxs.exeinbkobdgw.exeinvtcqgup.exeincanalcr.exeinczrcetn.exeincrjzdkv.exeinnljnnyl.exeinscqyokc.exeinofbieyd.exedescription ioc process File created C:\Windows\SysWOW64\inqjpgzht.exe ingerepgv.exe File opened for modification C:\Windows\SysWOW64\insulctjf.exe_lang.ini injaxsmjs.exe File opened for modification C:\Windows\SysWOW64\intxcqoxe.exe_lang.ini ingzrkglm.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\inphzczxa.exe_lang.ini File created C:\Windows\SysWOW64\intkqnccl.exe inxrnrycv.exe File opened for modification C:\Windows\SysWOW64\indltdckl.exe_lang.ini inrumczhz.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inhrkssoj.exe File opened for modification C:\Windows\SysWOW64\inzlipaxh.exe_lang.ini File created C:\Windows\SysWOW64\infhrodsv.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\inergdafx.exe_lang.ini inlolxmlm.exe File created C:\Windows\SysWOW64\intxedkzb.exe File opened for modification C:\Windows\SysWOW64\innsieqyf.exe_lang.ini incajnuiq.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inalzlawr.exe inijzqpfx.exe File opened for modification C:\Windows\SysWOW64\injwylczx.exe_lang.ini indvdvgmq.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\inddnmlix.exe_lang.ini File created C:\Windows\SysWOW64\invfbeman.exe File opened for modification C:\Windows\SysWOW64\inknbtcvi.exe_lang.ini File created C:\Windows\SysWOW64\inuqjjsiv.exe File opened for modification C:\Windows\SysWOW64\indysfeko.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat inygczwba.exe File created C:\Windows\SysWOW64\injvneaxr.exe File created C:\Windows\SysWOW64\inlktiefo.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\inndxkvnd.exe_lang.ini File created C:\Windows\SysWOW64\inyboxamo.exe File opened for modification C:\Windows\SysWOW64\inglzeskz.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\innwxjjmk.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\indfdzqme.exe_lang.ini File created C:\Windows\SysWOW64\intudaynf.exe File opened for modification C:\Windows\SysWOW64\intrnkczd.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat inspmpjxs.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inelaxlvq.exe inbkobdgw.exe File opened for modification C:\Windows\SysWOW64\syslog.dat invtcqgup.exe File opened for modification C:\Windows\SysWOW64\inxahngtx.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inebbznwq.exe File created C:\Windows\SysWOW64\infnxzhjm.exe incanalcr.exe File opened for modification C:\Windows\SysWOW64\inqmmyfvv.exe_lang.ini File created C:\Windows\SysWOW64\inmktvyiu.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\ineendqrj.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat inczrcetn.exe File created C:\Windows\SysWOW64\inugvjlkd.exe incrjzdkv.exe File created C:\Windows\SysWOW64\inkdpokcq.exe innljnnyl.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\infdqdofu.exe inscqyokc.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\inapioiyr.exe_lang.ini File created C:\Windows\SysWOW64\invlbrhjx.exe inofbieyd.exe File opened for modification C:\Windows\SysWOW64\syslog.dat -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
inlisltat.exeinsrmoybg.exeinjwnoaqy.exeintygcqsp.exeinonlgkxw.exeinfgqgwzc.exeinxkpvpwb.exeinxqlnlfy.exeinnhnzoqa.exeincirxuum.exeinxtleici.exeinbhrywnq.exeintfuikjc.exeindtfhlye.exeinhscspdt.exeinvpovkyk.exeinhrycguw.exeinaulrodd.exeinkdpokcq.exeinnnzgwwh.exeinipelkjl.exeinrshhzyd.exeinnkqyvdn.exeinuqbjvqf.exeinqzaupvo.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inlisltat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language insrmoybg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injwnoaqy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intygcqsp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inonlgkxw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language infgqgwzc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inxkpvpwb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inxqlnlfy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language innhnzoqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language incirxuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inxtleici.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inbhrywnq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intfuikjc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language indtfhlye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inhscspdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language invpovkyk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inhrycguw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inaulrodd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inkdpokcq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language innnzgwwh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inipelkjl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inrshhzyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language innkqyvdn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inuqbjvqf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inqzaupvo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeinmprqjiy.exeinsohtodl.exeinnfvgrkz.exeinvhwkmle.exeinpbwqegf.exeinxiaqxbm.exeindhxkwmb.exeincgzwjvl.exeinjwnoaqy.exeincrjzdkv.exeinugvjlkd.exeinbfyviuk.exeinldtepix.exeinoavpdfe.exeinqcxrfhg.exeinbuxzyre.exeinxjymong.exeinsrzztuj.exeinogwahsa.exeincvyzsfr.exeinwixlnmf.exeinjlxlxig.exeinnqsrkjz.exeinpsutmlb.exeinyorihpp.exeinyufnzuj.exeinaexuhtj.exeinkzrlbas.exeingtvpopk.exeinuqbjvqf.exeinxtemyti.exeinzvgovkd.exeinjyqkarh.exeinlsmacbt.exeinixomukg.exeintpaiupe.exeinjkrqgyq.exeintfuikjc.exeinfumgnyd.exeinwhpwale.exeinaikwkwh.exeinjfqeotx.exeinortslka.exeinruwvobn.exeinadbobmd.exeinetlfmxc.exeinsbquvhx.exeinhjvjvge.exeinzloqpih.exeintsuvkkg.exeinwmpgfnn.exeinbqiycju.exeinvrckwrg.exeinqgdzfrf.exeingiuiufd.exeinfslrijv.exeinrxixhwa.exeinnuocedv.exeinnlypqcs.exeinatwyxqd.exeincsvmltt.exeinhwoipfi.exeinxrqyyst.exepid process 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 2688 inmprqjiy.exe 2832 insohtodl.exe 812 innfvgrkz.exe 2236 invhwkmle.exe 1236 inpbwqegf.exe 604 inxiaqxbm.exe 2232 indhxkwmb.exe 1160 incgzwjvl.exe 1516 injwnoaqy.exe 2004 incrjzdkv.exe 1756 inugvjlkd.exe 1420 inbfyviuk.exe 2260 inldtepix.exe 2668 inoavpdfe.exe 2864 inqcxrfhg.exe 2620 inbuxzyre.exe 1588 inxjymong.exe 3052 insrzztuj.exe 684 inogwahsa.exe 264 incvyzsfr.exe 588 inwixlnmf.exe 2792 injlxlxig.exe 2416 innqsrkjz.exe 2424 inpsutmlb.exe 2524 inyorihpp.exe 2316 inyufnzuj.exe 1092 inaexuhtj.exe 2128 inkzrlbas.exe 2708 ingtvpopk.exe 1520 inuqbjvqf.exe 2824 inxtemyti.exe 1716 inzvgovkd.exe 1420 injyqkarh.exe 3068 inlsmacbt.exe 1112 inixomukg.exe 532 intpaiupe.exe 2928 injkrqgyq.exe 2960 intfuikjc.exe 604 infumgnyd.exe 1144 inwhpwale.exe 956 inaikwkwh.exe 836 injfqeotx.exe 2180 inortslka.exe 2272 inruwvobn.exe 2752 inadbobmd.exe 1220 inetlfmxc.exe 2556 insbquvhx.exe 1620 inhjvjvge.exe 2100 inzloqpih.exe 2564 intsuvkkg.exe 2948 inwmpgfnn.exe 1500 inbqiycju.exe 2280 invrckwrg.exe 1740 inqgdzfrf.exe 596 ingiuiufd.exe 1880 infslrijv.exe 2396 inrxixhwa.exe 2308 innuocedv.exe 2504 innlypqcs.exe 2452 inatwyxqd.exe 2072 incsvmltt.exe 2760 inhwoipfi.exe 2776 inxrqyyst.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeinmprqjiy.exeinsohtodl.exeinnfvgrkz.exeinvhwkmle.exeinpbwqegf.exeinxiaqxbm.exeindhxkwmb.exeincgzwjvl.exeinjwnoaqy.exeincrjzdkv.exeinugvjlkd.exeinbfyviuk.exeinldtepix.exeinoavpdfe.exeinqcxrfhg.exeinbuxzyre.exeinxjymong.exeinsrzztuj.exeinogwahsa.exeincvyzsfr.exeinwixlnmf.exeinjlxlxig.exeinnqsrkjz.exeinpsutmlb.exeinyorihpp.exeinyufnzuj.exeinaexuhtj.exeinkzrlbas.exeingtvpopk.exeinuqbjvqf.exeinxtemyti.exeinzvgovkd.exeinjyqkarh.exeinlsmacbt.exeinixomukg.exeintpaiupe.exeinjkrqgyq.exeintfuikjc.exeinfumgnyd.exeinwhpwale.exeinaikwkwh.exeinjfqeotx.exeinortslka.exeinruwvobn.exeinadbobmd.exeinetlfmxc.exeinsbquvhx.exeinhjvjvge.exeinzloqpih.exeintsuvkkg.exeinwmpgfnn.exeinbqiycju.exeinvrckwrg.exeinqgdzfrf.exeingiuiufd.exeinfslrijv.exeinrxixhwa.exeinnuocedv.exeinnlypqcs.exeinatwyxqd.exeincsvmltt.exeinhwoipfi.exeinxrqyyst.exedescription pid process Token: SeDebugPrivilege 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe Token: SeDebugPrivilege 2688 inmprqjiy.exe Token: SeDebugPrivilege 2832 insohtodl.exe Token: SeDebugPrivilege 812 innfvgrkz.exe Token: SeDebugPrivilege 2236 invhwkmle.exe Token: SeDebugPrivilege 1236 inpbwqegf.exe Token: SeDebugPrivilege 604 inxiaqxbm.exe Token: SeDebugPrivilege 2232 indhxkwmb.exe Token: SeDebugPrivilege 1160 incgzwjvl.exe Token: SeDebugPrivilege 1516 injwnoaqy.exe Token: SeDebugPrivilege 2004 incrjzdkv.exe Token: SeDebugPrivilege 1756 inugvjlkd.exe Token: SeDebugPrivilege 1420 inbfyviuk.exe Token: SeDebugPrivilege 2260 inldtepix.exe Token: SeDebugPrivilege 2668 inoavpdfe.exe Token: SeDebugPrivilege 2864 inqcxrfhg.exe Token: SeDebugPrivilege 2620 inbuxzyre.exe Token: SeDebugPrivilege 1588 inxjymong.exe Token: SeDebugPrivilege 3052 insrzztuj.exe Token: SeDebugPrivilege 684 inogwahsa.exe Token: SeDebugPrivilege 264 incvyzsfr.exe Token: SeDebugPrivilege 588 inwixlnmf.exe Token: SeDebugPrivilege 2792 injlxlxig.exe Token: SeDebugPrivilege 2416 innqsrkjz.exe Token: SeDebugPrivilege 2424 inpsutmlb.exe Token: SeDebugPrivilege 2524 inyorihpp.exe Token: SeDebugPrivilege 2316 inyufnzuj.exe Token: SeDebugPrivilege 1092 inaexuhtj.exe Token: SeDebugPrivilege 2128 inkzrlbas.exe Token: SeDebugPrivilege 2708 ingtvpopk.exe Token: SeDebugPrivilege 1520 inuqbjvqf.exe Token: SeDebugPrivilege 2824 inxtemyti.exe Token: SeDebugPrivilege 1716 inzvgovkd.exe Token: SeDebugPrivilege 1420 injyqkarh.exe Token: SeDebugPrivilege 3068 inlsmacbt.exe Token: SeDebugPrivilege 1112 inixomukg.exe Token: SeDebugPrivilege 532 intpaiupe.exe Token: SeDebugPrivilege 2928 injkrqgyq.exe Token: SeDebugPrivilege 2960 intfuikjc.exe Token: SeDebugPrivilege 604 infumgnyd.exe Token: SeDebugPrivilege 1144 inwhpwale.exe Token: SeDebugPrivilege 956 inaikwkwh.exe Token: SeDebugPrivilege 836 injfqeotx.exe Token: SeDebugPrivilege 2180 inortslka.exe Token: SeDebugPrivilege 2272 inruwvobn.exe Token: SeDebugPrivilege 2752 inadbobmd.exe Token: SeDebugPrivilege 1220 inetlfmxc.exe Token: SeDebugPrivilege 2556 insbquvhx.exe Token: SeDebugPrivilege 1620 inhjvjvge.exe Token: SeDebugPrivilege 2100 inzloqpih.exe Token: SeDebugPrivilege 2564 intsuvkkg.exe Token: SeDebugPrivilege 2948 inwmpgfnn.exe Token: SeDebugPrivilege 1500 inbqiycju.exe Token: SeDebugPrivilege 2280 invrckwrg.exe Token: SeDebugPrivilege 1740 inqgdzfrf.exe Token: SeDebugPrivilege 596 ingiuiufd.exe Token: SeDebugPrivilege 1880 infslrijv.exe Token: SeDebugPrivilege 2396 inrxixhwa.exe Token: SeDebugPrivilege 2308 innuocedv.exe Token: SeDebugPrivilege 2504 innlypqcs.exe Token: SeDebugPrivilege 2452 inatwyxqd.exe Token: SeDebugPrivilege 2072 incsvmltt.exe Token: SeDebugPrivilege 2760 inhwoipfi.exe Token: SeDebugPrivilege 2776 inxrqyyst.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeinmprqjiy.exeinsohtodl.exeinnfvgrkz.exeinvhwkmle.exeinpbwqegf.exeinxiaqxbm.exeindhxkwmb.exeincgzwjvl.exeinjwnoaqy.exeincrjzdkv.exeinugvjlkd.exeinbfyviuk.exeinldtepix.exeinoavpdfe.exeinqcxrfhg.exeinbuxzyre.exeinxjymong.exeinsrzztuj.exeinogwahsa.exeincvyzsfr.exeinwixlnmf.exeinjlxlxig.exeinnqsrkjz.exeinpsutmlb.exeinyorihpp.exeinyufnzuj.exeinaexuhtj.exeinkzrlbas.exepid process 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 2688 inmprqjiy.exe 2832 insohtodl.exe 812 innfvgrkz.exe 2236 invhwkmle.exe 1236 inpbwqegf.exe 604 inxiaqxbm.exe 2232 indhxkwmb.exe 1160 incgzwjvl.exe 1516 injwnoaqy.exe 2004 incrjzdkv.exe 1756 inugvjlkd.exe 1420 inbfyviuk.exe 2260 inldtepix.exe 2668 inoavpdfe.exe 2864 inqcxrfhg.exe 2620 inbuxzyre.exe 1588 inxjymong.exe 3052 insrzztuj.exe 684 inogwahsa.exe 264 incvyzsfr.exe 588 inwixlnmf.exe 2792 injlxlxig.exe 2416 innqsrkjz.exe 2424 inpsutmlb.exe 2524 inyorihpp.exe 2316 inyufnzuj.exe 1092 inaexuhtj.exe 2128 inkzrlbas.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeinmprqjiy.exeinsohtodl.exeinnfvgrkz.exeinvhwkmle.exeinpbwqegf.exeinxiaqxbm.exeindhxkwmb.exeincgzwjvl.exeinjwnoaqy.exedescription pid process target process PID 2668 wrote to memory of 2688 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe inmprqjiy.exe PID 2668 wrote to memory of 2688 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe inmprqjiy.exe PID 2668 wrote to memory of 2688 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe inmprqjiy.exe PID 2668 wrote to memory of 2688 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe inmprqjiy.exe PID 2668 wrote to memory of 2688 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe inmprqjiy.exe PID 2668 wrote to memory of 2688 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe inmprqjiy.exe PID 2668 wrote to memory of 2688 2668 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe inmprqjiy.exe PID 2688 wrote to memory of 2832 2688 inmprqjiy.exe insohtodl.exe PID 2688 wrote to memory of 2832 2688 inmprqjiy.exe insohtodl.exe PID 2688 wrote to memory of 2832 2688 inmprqjiy.exe insohtodl.exe PID 2688 wrote to memory of 2832 2688 inmprqjiy.exe insohtodl.exe PID 2688 wrote to memory of 2832 2688 inmprqjiy.exe insohtodl.exe PID 2688 wrote to memory of 2832 2688 inmprqjiy.exe insohtodl.exe PID 2688 wrote to memory of 2832 2688 inmprqjiy.exe insohtodl.exe PID 2832 wrote to memory of 812 2832 insohtodl.exe innfvgrkz.exe PID 2832 wrote to memory of 812 2832 insohtodl.exe innfvgrkz.exe PID 2832 wrote to memory of 812 2832 insohtodl.exe innfvgrkz.exe PID 2832 wrote to memory of 812 2832 insohtodl.exe innfvgrkz.exe PID 2832 wrote to memory of 812 2832 insohtodl.exe innfvgrkz.exe PID 2832 wrote to memory of 812 2832 insohtodl.exe innfvgrkz.exe PID 2832 wrote to memory of 812 2832 insohtodl.exe innfvgrkz.exe PID 812 wrote to memory of 2236 812 innfvgrkz.exe invhwkmle.exe PID 812 wrote to memory of 2236 812 innfvgrkz.exe invhwkmle.exe PID 812 wrote to memory of 2236 812 innfvgrkz.exe invhwkmle.exe PID 812 wrote to memory of 2236 812 innfvgrkz.exe invhwkmle.exe PID 812 wrote to memory of 2236 812 innfvgrkz.exe invhwkmle.exe PID 812 wrote to memory of 2236 812 innfvgrkz.exe invhwkmle.exe PID 812 wrote to memory of 2236 812 innfvgrkz.exe invhwkmle.exe PID 2236 wrote to memory of 1236 2236 invhwkmle.exe inpbwqegf.exe PID 2236 wrote to memory of 1236 2236 invhwkmle.exe inpbwqegf.exe PID 2236 wrote to memory of 1236 2236 invhwkmle.exe inpbwqegf.exe PID 2236 wrote to memory of 1236 2236 invhwkmle.exe inpbwqegf.exe PID 2236 wrote to memory of 1236 2236 invhwkmle.exe inpbwqegf.exe PID 2236 wrote to memory of 1236 2236 invhwkmle.exe inpbwqegf.exe PID 2236 wrote to memory of 1236 2236 invhwkmle.exe inpbwqegf.exe PID 1236 wrote to memory of 604 1236 inpbwqegf.exe inxiaqxbm.exe PID 1236 wrote to memory of 604 1236 inpbwqegf.exe inxiaqxbm.exe PID 1236 wrote to memory of 604 1236 inpbwqegf.exe inxiaqxbm.exe PID 1236 wrote to memory of 604 1236 inpbwqegf.exe inxiaqxbm.exe PID 1236 wrote to memory of 604 1236 inpbwqegf.exe inxiaqxbm.exe PID 1236 wrote to memory of 604 1236 inpbwqegf.exe inxiaqxbm.exe PID 1236 wrote to memory of 604 1236 inpbwqegf.exe inxiaqxbm.exe PID 604 wrote to memory of 2232 604 inxiaqxbm.exe indhxkwmb.exe PID 604 wrote to memory of 2232 604 inxiaqxbm.exe indhxkwmb.exe PID 604 wrote to memory of 2232 604 inxiaqxbm.exe indhxkwmb.exe PID 604 wrote to memory of 2232 604 inxiaqxbm.exe indhxkwmb.exe PID 604 wrote to memory of 2232 604 inxiaqxbm.exe indhxkwmb.exe PID 604 wrote to memory of 2232 604 inxiaqxbm.exe indhxkwmb.exe PID 604 wrote to memory of 2232 604 inxiaqxbm.exe indhxkwmb.exe PID 2232 wrote to memory of 1160 2232 indhxkwmb.exe incgzwjvl.exe PID 2232 wrote to memory of 1160 2232 indhxkwmb.exe incgzwjvl.exe PID 2232 wrote to memory of 1160 2232 indhxkwmb.exe incgzwjvl.exe PID 2232 wrote to memory of 1160 2232 indhxkwmb.exe incgzwjvl.exe PID 2232 wrote to memory of 1160 2232 indhxkwmb.exe incgzwjvl.exe PID 2232 wrote to memory of 1160 2232 indhxkwmb.exe incgzwjvl.exe PID 2232 wrote to memory of 1160 2232 indhxkwmb.exe incgzwjvl.exe PID 1160 wrote to memory of 1516 1160 incgzwjvl.exe injwnoaqy.exe PID 1160 wrote to memory of 1516 1160 incgzwjvl.exe injwnoaqy.exe PID 1160 wrote to memory of 1516 1160 incgzwjvl.exe injwnoaqy.exe PID 1160 wrote to memory of 1516 1160 incgzwjvl.exe injwnoaqy.exe PID 1160 wrote to memory of 1516 1160 incgzwjvl.exe injwnoaqy.exe PID 1160 wrote to memory of 1516 1160 incgzwjvl.exe injwnoaqy.exe PID 1160 wrote to memory of 1516 1160 incgzwjvl.exe injwnoaqy.exe PID 1516 wrote to memory of 2004 1516 injwnoaqy.exe incrjzdkv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe"C:\Users\Admin\AppData\Local\Temp\4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\insohtodl.exeC:\Windows\system32\insohtodl.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\innfvgrkz.exeC:\Windows\system32\innfvgrkz.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\SysWOW64\invhwkmle.exeC:\Windows\system32\invhwkmle.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\inpbwqegf.exeC:\Windows\system32\inpbwqegf.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\inxiaqxbm.exeC:\Windows\system32\inxiaqxbm.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\indhxkwmb.exeC:\Windows\system32\indhxkwmb.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\incgzwjvl.exeC:\Windows\system32\incgzwjvl.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\injwnoaqy.exeC:\Windows\system32\injwnoaqy.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Windows\SysWOW64\inugvjlkd.exeC:\Windows\system32\inugvjlkd.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Windows\SysWOW64\inbfyviuk.exeC:\Windows\system32\inbfyviuk.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1420 -
C:\Windows\SysWOW64\inldtepix.exeC:\Windows\system32\inldtepix.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2620 -
C:\Windows\SysWOW64\inxjymong.exeC:\Windows\system32\inxjymong.exe18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Windows\SysWOW64\insrzztuj.exeC:\Windows\system32\insrzztuj.exe19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Windows\SysWOW64\inogwahsa.exeC:\Windows\system32\inogwahsa.exe20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Windows\SysWOW64\incvyzsfr.exeC:\Windows\system32\incvyzsfr.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:264 -
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:588 -
C:\Windows\SysWOW64\injlxlxig.exeC:\Windows\system32\injlxlxig.exe23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Windows\SysWOW64\innqsrkjz.exeC:\Windows\system32\innqsrkjz.exe24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2416 -
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Windows\SysWOW64\inyufnzuj.exeC:\Windows\system32\inyufnzuj.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2316 -
C:\Windows\SysWOW64\inaexuhtj.exeC:\Windows\system32\inaexuhtj.exe28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Windows\SysWOW64\inkzrlbas.exeC:\Windows\system32\inkzrlbas.exe29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2128 -
C:\Windows\SysWOW64\ingtvpopk.exeC:\Windows\system32\ingtvpopk.exe30⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\SysWOW64\inuqbjvqf.exeC:\Windows\system32\inuqbjvqf.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520 -
C:\Windows\SysWOW64\inxtemyti.exeC:\Windows\system32\inxtemyti.exe32⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\SysWOW64\injyqkarh.exeC:\Windows\system32\injyqkarh.exe34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1420 -
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Windows\SysWOW64\inixomukg.exeC:\Windows\system32\inixomukg.exe36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112 -
C:\Windows\SysWOW64\intpaiupe.exeC:\Windows\system32\intpaiupe.exe37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532 -
C:\Windows\SysWOW64\injkrqgyq.exeC:\Windows\system32\injkrqgyq.exe38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928 -
C:\Windows\SysWOW64\intfuikjc.exeC:\Windows\system32\intfuikjc.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960 -
C:\Windows\SysWOW64\infumgnyd.exeC:\Windows\system32\infumgnyd.exe40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:604 -
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1144 -
C:\Windows\SysWOW64\inaikwkwh.exeC:\Windows\system32\inaikwkwh.exe42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956 -
C:\Windows\SysWOW64\injfqeotx.exeC:\Windows\system32\injfqeotx.exe43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836 -
C:\Windows\SysWOW64\inortslka.exeC:\Windows\system32\inortslka.exe44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\SysWOW64\inruwvobn.exeC:\Windows\system32\inruwvobn.exe45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1220 -
C:\Windows\SysWOW64\insbquvhx.exeC:\Windows\system32\insbquvhx.exe48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556 -
C:\Windows\SysWOW64\inhjvjvge.exeC:\Windows\system32\inhjvjvge.exe49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620 -
C:\Windows\SysWOW64\inzloqpih.exeC:\Windows\system32\inzloqpih.exe50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Windows\SysWOW64\intsuvkkg.exeC:\Windows\system32\intsuvkkg.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564 -
C:\Windows\SysWOW64\inwmpgfnn.exeC:\Windows\system32\inwmpgfnn.exe52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948 -
C:\Windows\SysWOW64\inbqiycju.exeC:\Windows\system32\inbqiycju.exe53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Windows\SysWOW64\invrckwrg.exeC:\Windows\system32\invrckwrg.exe54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Windows\SysWOW64\inqgdzfrf.exeC:\Windows\system32\inqgdzfrf.exe55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
C:\Windows\SysWOW64\ingiuiufd.exeC:\Windows\system32\ingiuiufd.exe56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:596 -
C:\Windows\SysWOW64\infslrijv.exeC:\Windows\system32\infslrijv.exe57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880 -
C:\Windows\SysWOW64\inrxixhwa.exeC:\Windows\system32\inrxixhwa.exe58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396 -
C:\Windows\SysWOW64\innuocedv.exeC:\Windows\system32\innuocedv.exe59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308 -
C:\Windows\SysWOW64\innlypqcs.exeC:\Windows\system32\innlypqcs.exe60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504 -
C:\Windows\SysWOW64\inatwyxqd.exeC:\Windows\system32\inatwyxqd.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2452 -
C:\Windows\SysWOW64\incsvmltt.exeC:\Windows\system32\incsvmltt.exe62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
C:\Windows\SysWOW64\inhwoipfi.exeC:\Windows\system32\inhwoipfi.exe63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Windows\SysWOW64\inxrqyyst.exeC:\Windows\system32\inxrqyyst.exe64⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\SysWOW64\inejnhnnw.exeC:\Windows\system32\inejnhnnw.exe65⤵
- Executes dropped EXE
PID:1520 -
C:\Windows\SysWOW64\inbrulkss.exeC:\Windows\system32\inbrulkss.exe66⤵PID:2676
-
C:\Windows\SysWOW64\indtwnmuu.exeC:\Windows\system32\indtwnmuu.exe67⤵PID:1720
-
C:\Windows\SysWOW64\inixpjqgj.exeC:\Windows\system32\inixpjqgj.exe68⤵PID:2124
-
C:\Windows\SysWOW64\inzkcszdo.exeC:\Windows\system32\inzkcszdo.exe69⤵PID:444
-
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe70⤵PID:2440
-
C:\Windows\SysWOW64\inutvwllh.exeC:\Windows\system32\inutvwllh.exe71⤵PID:2816
-
C:\Windows\SysWOW64\inljyapnv.exeC:\Windows\system32\inljyapnv.exe72⤵PID:1072
-
C:\Windows\SysWOW64\inaivxrqr.exeC:\Windows\system32\inaivxrqr.exe73⤵PID:1780
-
C:\Windows\SysWOW64\inpfzcyeq.exeC:\Windows\system32\inpfzcyeq.exe74⤵PID:604
-
C:\Windows\SysWOW64\innoddvuk.exeC:\Windows\system32\innoddvuk.exe75⤵PID:1144
-
C:\Windows\SysWOW64\infnwdvwr.exeC:\Windows\system32\infnwdvwr.exe76⤵PID:2496
-
C:\Windows\SysWOW64\ineuxonvv.exeC:\Windows\system32\ineuxonvv.exe77⤵PID:2524
-
C:\Windows\SysWOW64\inkbaivic.exeC:\Windows\system32\inkbaivic.exe78⤵PID:1768
-
C:\Windows\SysWOW64\ingvzmksi.exeC:\Windows\system32\ingvzmksi.exe79⤵PID:2860
-
C:\Windows\SysWOW64\inrfpuysy.exeC:\Windows\system32\inrfpuysy.exe80⤵PID:3016
-
C:\Windows\SysWOW64\inhiypoew.exeC:\Windows\system32\inhiypoew.exe81⤵PID:2980
-
C:\Windows\SysWOW64\inmkxopbr.exeC:\Windows\system32\inmkxopbr.exe82⤵PID:2760
-
C:\Windows\SysWOW64\insvxwpco.exeC:\Windows\system32\insvxwpco.exe83⤵PID:2964
-
C:\Windows\SysWOW64\inmnccutj.exeC:\Windows\system32\inmnccutj.exe84⤵PID:1068
-
C:\Windows\SysWOW64\ingerepgv.exeC:\Windows\system32\ingerepgv.exe85⤵
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\inqjpgzht.exeC:\Windows\system32\inqjpgzht.exe86⤵PID:1588
-
C:\Windows\SysWOW64\infvypoww.exeC:\Windows\system32\infvypoww.exe87⤵PID:2628
-
C:\Windows\SysWOW64\inhwfuyzl.exeC:\Windows\system32\inhwfuyzl.exe88⤵PID:3068
-
C:\Windows\SysWOW64\inigtklnv.exeC:\Windows\system32\inigtklnv.exe89⤵PID:2356
-
C:\Windows\SysWOW64\infvqbbup.exeC:\Windows\system32\infvqbbup.exe90⤵PID:1500
-
C:\Windows\SysWOW64\indxawycz.exeC:\Windows\system32\indxawycz.exe91⤵PID:1236
-
C:\Windows\SysWOW64\inscqyokc.exeC:\Windows\system32\inscqyokc.exe92⤵
- Drops file in System32 directory
PID:3008 -
C:\Windows\SysWOW64\infdqdofu.exeC:\Windows\system32\infdqdofu.exe93⤵PID:2264
-
C:\Windows\SysWOW64\inhegsgsd.exeC:\Windows\system32\inhegsgsd.exe94⤵PID:2512
-
C:\Windows\SysWOW64\inrkqhiua.exeC:\Windows\system32\inrkqhiua.exe95⤵PID:1416
-
C:\Windows\SysWOW64\indtkzjxv.exeC:\Windows\system32\indtkzjxv.exe96⤵PID:272
-
C:\Windows\SysWOW64\injmdckxk.exeC:\Windows\system32\injmdckxk.exe97⤵
- Boot or Logon Autostart Execution: Active Setup
PID:956 -
C:\Windows\SysWOW64\inrngsnzc.exeC:\Windows\system32\inrngsnzc.exe98⤵PID:3032
-
C:\Windows\SysWOW64\inzhuwqpq.exeC:\Windows\system32\inzhuwqpq.exe99⤵PID:1000
-
C:\Windows\SysWOW64\ineybxzdp.exeC:\Windows\system32\ineybxzdp.exe100⤵PID:1092
-
C:\Windows\SysWOW64\inthmqkqb.exeC:\Windows\system32\inthmqkqb.exe101⤵PID:2256
-
C:\Windows\SysWOW64\inftrnfcc.exeC:\Windows\system32\inftrnfcc.exe102⤵
- Boot or Logon Autostart Execution: Active Setup
PID:1828 -
C:\Windows\SysWOW64\intcrvwiy.exeC:\Windows\system32\intcrvwiy.exe103⤵PID:2572
-
C:\Windows\SysWOW64\inqrggyxc.exeC:\Windows\system32\inqrggyxc.exe104⤵PID:2776
-
C:\Windows\SysWOW64\inilcbjwj.exeC:\Windows\system32\inilcbjwj.exe105⤵PID:2660
-
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe106⤵PID:2392
-
C:\Windows\SysWOW64\inclzteci.exeC:\Windows\system32\inclzteci.exe107⤵
- Boot or Logon Autostart Execution: Active Setup
PID:3048 -
C:\Windows\SysWOW64\inocokdvj.exeC:\Windows\system32\inocokdvj.exe108⤵PID:2616
-
C:\Windows\SysWOW64\ineqbmfxl.exeC:\Windows\system32\ineqbmfxl.exe109⤵PID:2076
-
C:\Windows\SysWOW64\inesqmezb.exeC:\Windows\system32\inesqmezb.exe110⤵PID:1800
-
C:\Windows\SysWOW64\inmxiifwj.exeC:\Windows\system32\inmxiifwj.exe111⤵PID:2368
-
C:\Windows\SysWOW64\inpqffxwb.exeC:\Windows\system32\inpqffxwb.exe112⤵PID:548
-
C:\Windows\SysWOW64\iniizepdz.exeC:\Windows\system32\iniizepdz.exe113⤵PID:2384
-
C:\Windows\SysWOW64\inewrcnnk.exeC:\Windows\system32\inewrcnnk.exe114⤵PID:1856
-
C:\Windows\SysWOW64\inyteppma.exeC:\Windows\system32\inyteppma.exe115⤵PID:1860
-
C:\Windows\SysWOW64\inlgwrccv.exeC:\Windows\system32\inlgwrccv.exe116⤵PID:2508
-
C:\Windows\SysWOW64\inomzqrdt.exeC:\Windows\system32\inomzqrdt.exe117⤵PID:1732
-
C:\Windows\SysWOW64\inqzaupvo.exeC:\Windows\system32\inqzaupvo.exe118⤵
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Windows\SysWOW64\inclwgwbt.exeC:\Windows\system32\inclwgwbt.exe119⤵PID:2340
-
C:\Windows\SysWOW64\ingoxeawx.exeC:\Windows\system32\ingoxeawx.exe120⤵PID:2180
-
C:\Windows\SysWOW64\injrhdzvq.exeC:\Windows\system32\injrhdzvq.exe121⤵PID:1668
-
C:\Windows\SysWOW64\ingfvhjng.exeC:\Windows\system32\ingfvhjng.exe122⤵PID:1092
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-