Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
14-11-2024 05:29
Behavioral task
behavioral1
Sample
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
Resource
win10v2004-20241007-en
General
-
Target
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
-
Size
348KB
-
MD5
b9befe5cf8c341b816fcd1922accf117
-
SHA1
08ca40d0fc0c580caeb6c15aa5289bef223dd6d4
-
SHA256
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d
-
SHA512
3e85b180156fd665618fca532f4588f9edb9935fe2ecf3ebd60621a974c8fd30e32adee3a5d36c8bdefbec05787d69e721a13ade542f6d372681c4c80e448cac
-
SSDEEP
6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0SQ:ouLwoZQGpnedeP/deUe1ppGjTGHZRT08
Malware Config
Signatures
-
Gh0st RAT payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2076-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Users\Admin\AppData\Local\Temp\crlAC18.tmp family_gh0strat \Windows\SysWOW64\indhxkwmb.exe family_gh0strat behavioral1/memory/2772-27-0x0000000000230000-0x000000000025F000-memory.dmp family_gh0strat behavioral1/memory/2832-55-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\insvxwpco.exe family_gh0strat \Windows\SysWOW64\inmprqjiy.exe family_gh0strat behavioral1/memory/744-459-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1924-439-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2692-419-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1496-400-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2084-381-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/620-361-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1396-342-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2224-324-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/1560-303-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/568-284-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2052-264-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat \Windows\SysWOW64\injyqkarh.exe family_gh0strat behavioral1/memory/1736-238-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat \Windows\SysWOW64\inzvgovkd.exe family_gh0strat behavioral1/memory/1064-210-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat \Windows\SysWOW64\inrdysgih.exe family_gh0strat behavioral1/memory/976-183-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat \Windows\SysWOW64\insohtodl.exe family_gh0strat behavioral1/memory/628-156-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2724-130-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat \Windows\SysWOW64\invhwkmle.exe family_gh0strat behavioral1/memory/3028-103-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2832-75-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat \Windows\SysWOW64\innfvgrkz.exe family_gh0strat behavioral1/memory/2772-47-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral1/memory/2076-21-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat -
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 64 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
inlqtitkh.exeinrtwgusw.exeinvhauplr.exeinnpkjuac.exeinoxdfqoe.exeindcsegkx.exeinjfevnir.exeinwudrhvq.exeincmhaqvq.exeingxtmkhs.exeinueiodto.exeinthmqkqb.exeinortslka.exeinrnisxfb.exeinbjmhcqx.exeinbjudnts.exeinwecdjcp.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{02FEA090-AB4A-45a6-AFF0-F8EB60F02A2C}\stubpath = "C:\\Windows\\system32\\inyizbwki.exe" inlqtitkh.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6B850296-6F51-431e-A0BE-ED1C0BEE1F96} inrtwgusw.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{C54E8069-57DB-463a-A2B8-64077A2A3DBD} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{565BFE61-D7CF-4ae7-8F67-31063BA1ADC7}\stubpath = "C:\\Windows\\system32\\inlziemgh.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DF2797C6-97DB-49f0-97B5-447ADC635F42} invhauplr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E224577B-EF23-49ff-8D97-7B19A70BE466} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CE335799-57AF-44e8-9DB8-75974F6C0BAA} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{469156C7-EFF5-4de7-8923-883F406309A2} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0D3C20E7-84C5-4a82-B081-5F5D88CE70A9} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1A8F9D3B-750A-43e0-8D08-A154CA91E6AB} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{632FD924-5057-4637-B7EB-76B975329FA4} innpkjuac.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8E689FA7-AF7E-48fa-86E8-CE716C1699DC} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2FDA9D00-BFCE-4642-86A8-BF2811B8C42C} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6B594EA4-14C1-46bd-B0E8-45ECA3010CFC}\stubpath = "C:\\Windows\\system32\\innnbwbss.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{179D42D7-1D2B-4277-804D-4A77A0282EE5}\stubpath = "C:\\Windows\\system32\\inrjcuqwg.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{682D25D9-031D-4eee-9088-F2085F3A6DF4} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B66998A7-C0A5-4e1d-8A0C-DC527C29CB8B}\stubpath = "C:\\Windows\\system32\\intazjygs.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E2198D9E-A42B-48d6-8AA5-A8CB60A7DF1E}\stubpath = "C:\\Windows\\system32\\inkqbqzau.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FDAD767D-09E4-4566-955B-71AC099C5059}\stubpath = "C:\\Windows\\system32\\inisucehe.exe" inoxdfqoe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AB63ACC7-14A0-4482-85BC-A07181BD8FAB}\stubpath = "C:\\Windows\\system32\\inwuyycww.exe" indcsegkx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5274F350-F892-43cb-804D-EC82FB8817F2} injfevnir.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{487118F8-5BD2-4cdd-A6F1-3BE2E286AAAF} inwudrhvq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{35854EB1-4AC8-4087-82EA-3DA97B0476BC}\stubpath = "C:\\Windows\\system32\\inilnihsa.exe" incmhaqvq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DFAF983B-EE73-4b96-B559-A4619EC00CC6} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A51656DD-5D93-4605-81BC-10D8EF8E8E92} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{048558C7-4656-4d18-8757-9F841D8F0883} ingxtmkhs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2A2C5030-0747-434e-8EDD-E2BC3BA6F5CD}\stubpath = "C:\\Windows\\system32\\innkkuuzq.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1896BBBB-E660-4e43-A373-17E552263E07} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FA4E9B62-41EC-4999-B90B-CA6E83413740} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0CB7A653-6CF6-4835-9E14-18BBF109218F}\stubpath = "C:\\Windows\\system32\\inxktppji.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{118089B4-5A35-4e0c-80AD-2C21569E0A8A} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D34843A3-8AE1-4c60-BD7A-C72CE83F5E45} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{44115961-C42D-4cd6-BD2A-50A9E8C6E651}\stubpath = "C:\\Windows\\system32\\inbzygmpl.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{81C60EDC-5BE5-45c3-A2BE-FC4FB5DDE27D}\stubpath = "C:\\Windows\\system32\\inyherndc.exe" inueiodto.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{95784EF2-7967-408b-BDC7-A5EB414FA460}\stubpath = "C:\\Windows\\system32\\inhefpvts.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{68596CD8-613F-4f92-8935-044F35AD109D} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B0BC9F0B-BCAE-404a-9581-85CCEBA9538E}\stubpath = "C:\\Windows\\system32\\inifrbozs.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{F186CB57-C450-48cd-AE21-572645CD6B6A} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{000D2FEE-FF55-4645-9749-64CC55424AB0}\stubpath = "C:\\Windows\\system32\\invrxlnsw.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1390A9B1-6830-469d-AFEA-1E89005633D9}\stubpath = "C:\\Windows\\system32\\inocjgjvr.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3BEC4FF3-91C7-4e7a-98B9-4DD6F1AED49E} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38983B81-98AB-4edc-AD04-401F768925B4} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{300CE7CE-9034-47cf-93C6-54AA8A5A6069}\stubpath = "C:\\Windows\\system32\\indpfdtxu.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0BF25F0D-714D-4e63-902F-F16F19595843}\stubpath = "C:\\Windows\\system32\\inrhgeune.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{3C3DE4F8-D82E-4045-92FD-41D30FCD7A94} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A319538D-44A6-48b6-B10D-E87FDD17BF8B}\stubpath = "C:\\Windows\\system32\\inphkcqrd.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{155A0BAC-6B8D-4dee-A400-CDDB8A36D200}\stubpath = "C:\\Windows\\system32\\inkcbpzka.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{E9481608-154D-4e56-9499-981FA959ACE6} inthmqkqb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{A52B5476-9265-4bf3-9587-A51680281675}\stubpath = "C:\\Windows\\system32\\inkunagpv.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0BE971BA-1F1F-46ce-A7E7-623B019D418E} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8C9E2891-86CB-4574-A69F-732296BBCA36} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{695365F7-7B67-4414-A185-396D1C4B7D31} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{459777BC-1A30-431d-A446-367CE4C3F3C0}\stubpath = "C:\\Windows\\system32\\incrjzdkv.exe" inortslka.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0166A0E6-5351-43a4-ACD6-3C15BDF635B1}\stubpath = "C:\\Windows\\system32\\indqezurm.exe" inrnisxfb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1FBC359A-B0D9-410d-8998-0482C21B2B9F} inbjmhcqx.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{38C06EA5-BD99-41e6-992D-39070A4FEB9E} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{2F2C2A8D-228D-4df1-8540-6683AD3238A3}\stubpath = "C:\\Windows\\system32\\incubtlew.exe" Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0C1BA6F6-BDD6-4581-B4F3-C4644CDBFD06} Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0CA7ECB4-3F80-4453-AE45-3CF8DA2859FA} inbjudnts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{1F330C3F-3BE3-401a-A01B-960265372A05}\stubpath = "C:\\Windows\\system32\\inmuqtlpg.exe" inwecdjcp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{FAB4A983-DE75-4457-9D94-FCB511DA2875} Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{10FE9D59-1E50-4249-B988-EF4768FD5472}\stubpath = "C:\\Windows\\system32\\inlpljxfc.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6168607E-45BE-4251-B2A4-125DE680EDCF}\stubpath = "C:\\Windows\\system32\\invbviubu.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{61BB5B04-8C1E-4bd6-87C1-15D7EA7C4E70}\stubpath = "C:\\Windows\\system32\\inpaccokf.exe" -
ACProtect 1.3x - 1.4x DLL software 10 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\arlAC08.tmp acprotect \Users\Admin\AppData\Local\Temp\krlAC65.tmp acprotect \Users\Admin\AppData\Local\Temp\grlAF43.tmp acprotect \Users\Admin\AppData\Local\Temp\arlAF04.tmp acprotect \Users\Admin\AppData\Local\Temp\qrlAEA7.tmp acprotect \Users\Admin\AppData\Local\Temp\irlAE59.tmp acprotect \Users\Admin\AppData\Local\Temp\zrlADFB.tmp acprotect \Users\Admin\AppData\Local\Temp\prlAD9D.tmp acprotect \Users\Admin\AppData\Local\Temp\brlAD11.tmp acprotect \Users\Admin\AppData\Local\Temp\qrlACA4.tmp acprotect -
Executes dropped EXE 64 IoCs
Processes:
indhxkwmb.exeinnfvgrkz.exeinsvxwpco.exeinvhwkmle.exeinmprqjiy.exeinsohtodl.exeinrdysgih.exeinzvgovkd.exeinjyqkarh.exeinnqsrkjz.exeinpsutmlb.exeinqcxrfhg.exeinyufnzuj.exeinkzrlbas.exeinortslka.exeincrjzdkv.exeinugvjlkd.exeinxiaqxbm.exeintsuvkkg.exeinyorihpp.exeincraptug.exeinwhpwale.exeinsrzztuj.exeinqtvunam.exeincsvmltt.exeinwixlnmf.exeinldtepix.exeinoavpdfe.exeineybxzdp.exeinfumgnyd.exeinxjymong.exeinpleqlxa.exeinogwahsa.exeinuqbjvqf.exeinetlfmxc.exeingvnhoze.exeinkbaivic.exeinlsmacbt.exeintpaiupe.exeindskelwb.exeintcrvwiy.exeinigtklnv.exeinutvwllh.exeinadbobmd.exeinwsdlxsh.exeinhfsfaqh.exeinjlxlxig.exeinwmpgfnn.exeindpalewk.exeindtwnmuu.exeinixpjqgj.exeindqsmlmh.exeinjwnoaqy.exeinnlypqcs.exeinazpsjiq.exeinnoddvuk.exeinbfyviuk.exeinrfpuysy.exeinmkxopbr.exeinbuxzyre.exeindwztgsi.exeinyjbrycn.exeinmeufqjy.exeincwvxbyn.exepid process 2772 indhxkwmb.exe 2832 innfvgrkz.exe 3028 insvxwpco.exe 2724 invhwkmle.exe 628 inmprqjiy.exe 976 insohtodl.exe 1064 inrdysgih.exe 1736 inzvgovkd.exe 2052 injyqkarh.exe 568 innqsrkjz.exe 1560 inpsutmlb.exe 2224 inqcxrfhg.exe 1396 inyufnzuj.exe 620 inkzrlbas.exe 2084 inortslka.exe 1496 incrjzdkv.exe 2692 inugvjlkd.exe 1924 inxiaqxbm.exe 744 intsuvkkg.exe 2968 inyorihpp.exe 2828 incraptug.exe 1996 inwhpwale.exe 1768 insrzztuj.exe 2800 inqtvunam.exe 2404 incsvmltt.exe 1792 inwixlnmf.exe 2720 inldtepix.exe 1656 inoavpdfe.exe 1476 ineybxzdp.exe 1528 infumgnyd.exe 2040 inxjymong.exe 3064 inpleqlxa.exe 1776 inogwahsa.exe 940 inuqbjvqf.exe 1416 inetlfmxc.exe 1648 ingvnhoze.exe 2780 inkbaivic.exe 2352 inlsmacbt.exe 2728 intpaiupe.exe 1784 indskelwb.exe 1608 intcrvwiy.exe 844 inigtklnv.exe 1804 inutvwllh.exe 1820 inadbobmd.exe 1344 inwsdlxsh.exe 2196 inhfsfaqh.exe 1660 injlxlxig.exe 3032 inwmpgfnn.exe 2068 indpalewk.exe 2784 indtwnmuu.exe 348 inixpjqgj.exe 108 indqsmlmh.exe 2804 injwnoaqy.exe 2744 innlypqcs.exe 2124 inazpsjiq.exe 1580 innoddvuk.exe 1776 inbfyviuk.exe 1664 inrfpuysy.exe 1928 inmkxopbr.exe 2276 inbuxzyre.exe 800 indwztgsi.exe 1936 inyjbrycn.exe 2424 inmeufqjy.exe 2976 incwvxbyn.exe -
Loads dropped DLL 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeindhxkwmb.exeinnfvgrkz.exeinsvxwpco.exeinvhwkmle.exeinmprqjiy.exeinsohtodl.exeinrdysgih.exeinzvgovkd.exeinjyqkarh.exeinnqsrkjz.exeinpsutmlb.exeinqcxrfhg.exeinyufnzuj.exepid process 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 2772 indhxkwmb.exe 2772 indhxkwmb.exe 2772 indhxkwmb.exe 2772 indhxkwmb.exe 2772 indhxkwmb.exe 2832 innfvgrkz.exe 2832 innfvgrkz.exe 2832 innfvgrkz.exe 2832 innfvgrkz.exe 2832 innfvgrkz.exe 3028 insvxwpco.exe 3028 insvxwpco.exe 3028 insvxwpco.exe 3028 insvxwpco.exe 3028 insvxwpco.exe 2724 invhwkmle.exe 2724 invhwkmle.exe 2724 invhwkmle.exe 2724 invhwkmle.exe 2724 invhwkmle.exe 628 inmprqjiy.exe 628 inmprqjiy.exe 628 inmprqjiy.exe 628 inmprqjiy.exe 628 inmprqjiy.exe 976 insohtodl.exe 976 insohtodl.exe 976 insohtodl.exe 976 insohtodl.exe 976 insohtodl.exe 1064 inrdysgih.exe 1064 inrdysgih.exe 1064 inrdysgih.exe 1064 inrdysgih.exe 1064 inrdysgih.exe 1736 inzvgovkd.exe 1736 inzvgovkd.exe 1736 inzvgovkd.exe 1736 inzvgovkd.exe 1736 inzvgovkd.exe 2052 injyqkarh.exe 2052 injyqkarh.exe 2052 injyqkarh.exe 2052 injyqkarh.exe 2052 injyqkarh.exe 568 innqsrkjz.exe 568 innqsrkjz.exe 568 innqsrkjz.exe 568 innqsrkjz.exe 568 innqsrkjz.exe 1560 inpsutmlb.exe 1560 inpsutmlb.exe 1560 inpsutmlb.exe 1560 inpsutmlb.exe 1560 inpsutmlb.exe 2224 inqcxrfhg.exe 2224 inqcxrfhg.exe 2224 inqcxrfhg.exe 2224 inqcxrfhg.exe 2224 inqcxrfhg.exe 1396 inyufnzuj.exe 1396 inyufnzuj.exe -
Drops file in System32 directory 64 IoCs
Processes:
inckagkpg.exeinnbtqbfb.exeinmhjtbmh.exeinfvqbbup.exeintvfbarj.exeinefvqvoa.exeinblsqhkm.exeinlaoqlkv.exeinbnjcuis.exeingwzqpxx.exeinfuxbnop.exeinjzuzsez.exeinobjeszj.exeinvbdruwx.exeinphclvql.exeinwojflbg.exeinqbjpnmx.exedescription ioc process File opened for modification C:\Windows\SysWOW64\inddyhqyz.exe_lang.ini File created C:\Windows\SysWOW64\inquqvwfg.exe File created C:\Windows\SysWOW64\indvsdhdh.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat inckagkpg.exe File created C:\Windows\SysWOW64\inoqoipvx.exe innbtqbfb.exe File created C:\Windows\SysWOW64\inejathve.exe inmhjtbmh.exe File created C:\Windows\SysWOW64\inendwupi.exe File opened for modification C:\Windows\SysWOW64\inpaccokf.exe_lang.ini File opened for modification C:\Windows\SysWOW64\inkjzlnrk.exe_lang.ini infvqbbup.exe File opened for modification C:\Windows\SysWOW64\inwzrvmwp.exe_lang.ini intvfbarj.exe File created C:\Windows\SysWOW64\inkkhylua.exe File created C:\Windows\SysWOW64\intlbygys.exe inefvqvoa.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inflnxuqy.exe File created C:\Windows\SysWOW64\inomvcziu.exe inblsqhkm.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inlaoqlkv.exe File created C:\Windows\SysWOW64\inyofxrod.exe File opened for modification C:\Windows\SysWOW64\infagiwpz.exe_lang.ini File created C:\Windows\SysWOW64\indardaop.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inbnuxnxl.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inrfvdjqm.exe File opened for modification C:\Windows\SysWOW64\inwohdijp.exe_lang.ini File opened for modification C:\Windows\SysWOW64\inmsciibc.exe_lang.ini File opened for modification C:\Windows\SysWOW64\inzwyollv.exe_lang.ini File opened for modification C:\Windows\SysWOW64\injhlewdz.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\innvzfpxn.exe File created C:\Windows\SysWOW64\inatwyxqd.exe inbnjcuis.exe File created C:\Windows\SysWOW64\inqmfrmyb.exe ingwzqpxx.exe File opened for modification C:\Windows\SysWOW64\inzvprwjx.exe_lang.ini infuxbnop.exe File created C:\Windows\SysWOW64\intbiceth.exe injzuzsez.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inobjeszj.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\indwqrtwy.exe_lang.ini File opened for modification C:\Windows\SysWOW64\inpnrwved.exe_lang.ini File created C:\Windows\SysWOW64\inthjosvx.exe File created C:\Windows\SysWOW64\inhavkmpx.exe File opened for modification C:\Windows\SysWOW64\inwyzbftn.exe_lang.ini invbdruwx.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inphclvql.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat inwojflbg.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inqbjpnmx.exe File created C:\Windows\SysWOW64\inrbomntt.exe File created C:\Windows\SysWOW64\inwukabct.exe File created C:\Windows\SysWOW64\inxgoheoh.exe File opened for modification C:\Windows\SysWOW64\inoymfsij.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inngbxzqb.exe File created C:\Windows\SysWOW64\inksbetmk.exe File opened for modification C:\Windows\SysWOW64\inxwmyeom.exe_lang.ini File opened for modification C:\Windows\SysWOW64\inylqwqxc.exe_lang.ini File created C:\Windows\SysWOW64\inxfqxuqh.exe File created C:\Windows\SysWOW64\infeyhjxw.exe File opened for modification C:\Windows\SysWOW64\inxibmfzj.exe_lang.ini File opened for modification C:\Windows\SysWOW64\inwacmaou.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\insaamwkd.exe_lang.ini -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
inyluacnl.exeinpdimgmm.exeinwezaozq.exeinjzbuthb.exeinqofiykl.exeinlhzufqa.exeinvjtohcx.exeinlqtitkh.exeinjmdckxk.exeinxswcvtn.exeintlbygys.exeinemwygil.exeincraptug.exeintndtuwg.exeinlisltat.exeinwtzamwg.exeinzhuwqpq.exeinsuhmxsm.exeinxzfxryi.exeinjausioy.exeinlubyhti.exeinuwftrhn.exeinxyajpff.exeindtfhlye.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inyluacnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inpdimgmm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inwezaozq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injzbuthb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inqofiykl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inlhzufqa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language invjtohcx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inlqtitkh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injmdckxk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inxswcvtn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intlbygys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inemwygil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language incraptug.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language intndtuwg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inlisltat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inwtzamwg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inzhuwqpq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language insuhmxsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inxzfxryi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injausioy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inlubyhti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inuwftrhn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inxyajpff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language indtfhlye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeindhxkwmb.exeinnfvgrkz.exeinsvxwpco.exeinvhwkmle.exeinmprqjiy.exeinsohtodl.exeinrdysgih.exeinzvgovkd.exeinjyqkarh.exeinnqsrkjz.exeinpsutmlb.exeinqcxrfhg.exeinyufnzuj.exeinkzrlbas.exeinortslka.exeincrjzdkv.exeinugvjlkd.exeinxiaqxbm.exeintsuvkkg.exeinyorihpp.exeincraptug.exeinwhpwale.exeinsrzztuj.exeinqtvunam.exeincsvmltt.exeinwixlnmf.exeinldtepix.exeinoavpdfe.exeineybxzdp.exeinfumgnyd.exeinxjymong.exeinpleqlxa.exeinogwahsa.exeinuqbjvqf.exeinetlfmxc.exeingvnhoze.exeinkbaivic.exeinlsmacbt.exeintpaiupe.exeindskelwb.exeintcrvwiy.exeinigtklnv.exeinutvwllh.exeinadbobmd.exeinwsdlxsh.exeinhfsfaqh.exeinjlxlxig.exeinwmpgfnn.exeindpalewk.exeindtwnmuu.exeinixpjqgj.exeindqsmlmh.exeinjwnoaqy.exeinnlypqcs.exeinazpsjiq.exeinnoddvuk.exeinbfyviuk.exeinrfpuysy.exeinmkxopbr.exeinbuxzyre.exeindwztgsi.exeinyjbrycn.exeinmeufqjy.exepid process 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 2772 indhxkwmb.exe 2832 innfvgrkz.exe 3028 insvxwpco.exe 2724 invhwkmle.exe 628 inmprqjiy.exe 976 insohtodl.exe 1064 inrdysgih.exe 1736 inzvgovkd.exe 2052 injyqkarh.exe 568 innqsrkjz.exe 1560 inpsutmlb.exe 2224 inqcxrfhg.exe 1396 inyufnzuj.exe 620 inkzrlbas.exe 2084 inortslka.exe 1496 incrjzdkv.exe 2692 inugvjlkd.exe 1924 inxiaqxbm.exe 744 intsuvkkg.exe 2968 inyorihpp.exe 2828 incraptug.exe 1996 inwhpwale.exe 1768 insrzztuj.exe 2800 inqtvunam.exe 2404 incsvmltt.exe 1792 inwixlnmf.exe 2720 inldtepix.exe 1656 inoavpdfe.exe 1476 ineybxzdp.exe 1528 infumgnyd.exe 2040 inxjymong.exe 3064 inpleqlxa.exe 1776 inogwahsa.exe 940 inuqbjvqf.exe 1416 inetlfmxc.exe 1648 ingvnhoze.exe 2780 inkbaivic.exe 2352 inlsmacbt.exe 2728 intpaiupe.exe 1784 indskelwb.exe 1608 intcrvwiy.exe 844 inigtklnv.exe 1804 inutvwllh.exe 1820 inadbobmd.exe 1344 inwsdlxsh.exe 2196 inhfsfaqh.exe 1660 injlxlxig.exe 3032 inwmpgfnn.exe 2068 indpalewk.exe 2784 indtwnmuu.exe 348 inixpjqgj.exe 108 indqsmlmh.exe 2804 injwnoaqy.exe 2744 innlypqcs.exe 2124 inazpsjiq.exe 1580 innoddvuk.exe 1776 inbfyviuk.exe 1664 inrfpuysy.exe 1928 inmkxopbr.exe 2276 inbuxzyre.exe 800 indwztgsi.exe 1936 inyjbrycn.exe 2424 inmeufqjy.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeindhxkwmb.exeinnfvgrkz.exeinsvxwpco.exeinvhwkmle.exeinmprqjiy.exeinsohtodl.exeinrdysgih.exeinzvgovkd.exeinjyqkarh.exeinnqsrkjz.exeinpsutmlb.exeinqcxrfhg.exeinyufnzuj.exeinkzrlbas.exeinortslka.exeincrjzdkv.exeinugvjlkd.exeinxiaqxbm.exeintsuvkkg.exeinyorihpp.exeincraptug.exeinwhpwale.exeinsrzztuj.exeinqtvunam.exeincsvmltt.exeinwixlnmf.exeinldtepix.exeinoavpdfe.exeineybxzdp.exeinfumgnyd.exeinxjymong.exeinpleqlxa.exeinogwahsa.exeinuqbjvqf.exeinetlfmxc.exeingvnhoze.exeinkbaivic.exeinlsmacbt.exeintpaiupe.exeindskelwb.exeintcrvwiy.exeinigtklnv.exeinutvwllh.exeinadbobmd.exeinwsdlxsh.exeinhfsfaqh.exeinjlxlxig.exeinwmpgfnn.exeindpalewk.exeindtwnmuu.exeinixpjqgj.exeindqsmlmh.exeinjwnoaqy.exeinnlypqcs.exeinazpsjiq.exeinnoddvuk.exeinbfyviuk.exeinrfpuysy.exeinmkxopbr.exeinbuxzyre.exeindwztgsi.exeinyjbrycn.exeinmeufqjy.exedescription pid process Token: SeDebugPrivilege 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe Token: SeDebugPrivilege 2772 indhxkwmb.exe Token: SeDebugPrivilege 2832 innfvgrkz.exe Token: SeDebugPrivilege 3028 insvxwpco.exe Token: SeDebugPrivilege 2724 invhwkmle.exe Token: SeDebugPrivilege 628 inmprqjiy.exe Token: SeDebugPrivilege 976 insohtodl.exe Token: SeDebugPrivilege 1064 inrdysgih.exe Token: SeDebugPrivilege 1736 inzvgovkd.exe Token: SeDebugPrivilege 2052 injyqkarh.exe Token: SeDebugPrivilege 568 innqsrkjz.exe Token: SeDebugPrivilege 1560 inpsutmlb.exe Token: SeDebugPrivilege 2224 inqcxrfhg.exe Token: SeDebugPrivilege 1396 inyufnzuj.exe Token: SeDebugPrivilege 620 inkzrlbas.exe Token: SeDebugPrivilege 2084 inortslka.exe Token: SeDebugPrivilege 1496 incrjzdkv.exe Token: SeDebugPrivilege 2692 inugvjlkd.exe Token: SeDebugPrivilege 1924 inxiaqxbm.exe Token: SeDebugPrivilege 744 intsuvkkg.exe Token: SeDebugPrivilege 2968 inyorihpp.exe Token: SeDebugPrivilege 2828 incraptug.exe Token: SeDebugPrivilege 1996 inwhpwale.exe Token: SeDebugPrivilege 1768 insrzztuj.exe Token: SeDebugPrivilege 2800 inqtvunam.exe Token: SeDebugPrivilege 2404 incsvmltt.exe Token: SeDebugPrivilege 1792 inwixlnmf.exe Token: SeDebugPrivilege 2720 inldtepix.exe Token: SeDebugPrivilege 1656 inoavpdfe.exe Token: SeDebugPrivilege 1476 ineybxzdp.exe Token: SeDebugPrivilege 1528 infumgnyd.exe Token: SeDebugPrivilege 2040 inxjymong.exe Token: SeDebugPrivilege 3064 inpleqlxa.exe Token: SeDebugPrivilege 1776 inogwahsa.exe Token: SeDebugPrivilege 940 inuqbjvqf.exe Token: SeDebugPrivilege 1416 inetlfmxc.exe Token: SeDebugPrivilege 1648 ingvnhoze.exe Token: SeDebugPrivilege 2780 inkbaivic.exe Token: SeDebugPrivilege 2352 inlsmacbt.exe Token: SeDebugPrivilege 2728 intpaiupe.exe Token: SeDebugPrivilege 1784 indskelwb.exe Token: SeDebugPrivilege 1608 intcrvwiy.exe Token: SeDebugPrivilege 844 inigtklnv.exe Token: SeDebugPrivilege 1804 inutvwllh.exe Token: SeDebugPrivilege 1820 inadbobmd.exe Token: SeDebugPrivilege 1344 inwsdlxsh.exe Token: SeDebugPrivilege 2196 inhfsfaqh.exe Token: SeDebugPrivilege 1660 injlxlxig.exe Token: SeDebugPrivilege 3032 inwmpgfnn.exe Token: SeDebugPrivilege 2068 indpalewk.exe Token: SeDebugPrivilege 2784 indtwnmuu.exe Token: SeDebugPrivilege 348 inixpjqgj.exe Token: SeDebugPrivilege 108 indqsmlmh.exe Token: SeDebugPrivilege 2804 injwnoaqy.exe Token: SeDebugPrivilege 2744 innlypqcs.exe Token: SeDebugPrivilege 2124 inazpsjiq.exe Token: SeDebugPrivilege 1580 innoddvuk.exe Token: SeDebugPrivilege 1776 inbfyviuk.exe Token: SeDebugPrivilege 1664 inrfpuysy.exe Token: SeDebugPrivilege 1928 inmkxopbr.exe Token: SeDebugPrivilege 2276 inbuxzyre.exe Token: SeDebugPrivilege 800 indwztgsi.exe Token: SeDebugPrivilege 1936 inyjbrycn.exe Token: SeDebugPrivilege 2424 inmeufqjy.exe -
Suspicious use of SetWindowsHookEx 29 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeindhxkwmb.exeinnfvgrkz.exeinsvxwpco.exeinvhwkmle.exeinmprqjiy.exeinsohtodl.exeinrdysgih.exeinzvgovkd.exeinjyqkarh.exeinnqsrkjz.exeinpsutmlb.exeinqcxrfhg.exeinyufnzuj.exeinkzrlbas.exeinortslka.exeincrjzdkv.exeinugvjlkd.exeinxiaqxbm.exeintsuvkkg.exeinyorihpp.exeincraptug.exeinwhpwale.exeinsrzztuj.exeinqtvunam.exeincsvmltt.exeinwixlnmf.exeinldtepix.exeinoavpdfe.exepid process 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 2772 indhxkwmb.exe 2832 innfvgrkz.exe 3028 insvxwpco.exe 2724 invhwkmle.exe 628 inmprqjiy.exe 976 insohtodl.exe 1064 inrdysgih.exe 1736 inzvgovkd.exe 2052 injyqkarh.exe 568 innqsrkjz.exe 1560 inpsutmlb.exe 2224 inqcxrfhg.exe 1396 inyufnzuj.exe 620 inkzrlbas.exe 2084 inortslka.exe 1496 incrjzdkv.exe 2692 inugvjlkd.exe 1924 inxiaqxbm.exe 744 intsuvkkg.exe 2968 inyorihpp.exe 2828 incraptug.exe 1996 inwhpwale.exe 1768 insrzztuj.exe 2800 inqtvunam.exe 2404 incsvmltt.exe 1792 inwixlnmf.exe 2720 inldtepix.exe 1656 inoavpdfe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeindhxkwmb.exeinnfvgrkz.exeinsvxwpco.exeinvhwkmle.exeinmprqjiy.exeinsohtodl.exeinrdysgih.exeinzvgovkd.exeinjyqkarh.exedescription pid process target process PID 2076 wrote to memory of 2772 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe indhxkwmb.exe PID 2076 wrote to memory of 2772 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe indhxkwmb.exe PID 2076 wrote to memory of 2772 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe indhxkwmb.exe PID 2076 wrote to memory of 2772 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe indhxkwmb.exe PID 2076 wrote to memory of 2772 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe indhxkwmb.exe PID 2076 wrote to memory of 2772 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe indhxkwmb.exe PID 2076 wrote to memory of 2772 2076 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe indhxkwmb.exe PID 2772 wrote to memory of 2832 2772 indhxkwmb.exe innfvgrkz.exe PID 2772 wrote to memory of 2832 2772 indhxkwmb.exe innfvgrkz.exe PID 2772 wrote to memory of 2832 2772 indhxkwmb.exe innfvgrkz.exe PID 2772 wrote to memory of 2832 2772 indhxkwmb.exe innfvgrkz.exe PID 2772 wrote to memory of 2832 2772 indhxkwmb.exe innfvgrkz.exe PID 2772 wrote to memory of 2832 2772 indhxkwmb.exe innfvgrkz.exe PID 2772 wrote to memory of 2832 2772 indhxkwmb.exe innfvgrkz.exe PID 2832 wrote to memory of 3028 2832 innfvgrkz.exe insvxwpco.exe PID 2832 wrote to memory of 3028 2832 innfvgrkz.exe insvxwpco.exe PID 2832 wrote to memory of 3028 2832 innfvgrkz.exe insvxwpco.exe PID 2832 wrote to memory of 3028 2832 innfvgrkz.exe insvxwpco.exe PID 2832 wrote to memory of 3028 2832 innfvgrkz.exe insvxwpco.exe PID 2832 wrote to memory of 3028 2832 innfvgrkz.exe insvxwpco.exe PID 2832 wrote to memory of 3028 2832 innfvgrkz.exe insvxwpco.exe PID 3028 wrote to memory of 2724 3028 insvxwpco.exe invhwkmle.exe PID 3028 wrote to memory of 2724 3028 insvxwpco.exe invhwkmle.exe PID 3028 wrote to memory of 2724 3028 insvxwpco.exe invhwkmle.exe PID 3028 wrote to memory of 2724 3028 insvxwpco.exe invhwkmle.exe PID 3028 wrote to memory of 2724 3028 insvxwpco.exe invhwkmle.exe PID 3028 wrote to memory of 2724 3028 insvxwpco.exe invhwkmle.exe PID 3028 wrote to memory of 2724 3028 insvxwpco.exe invhwkmle.exe PID 2724 wrote to memory of 628 2724 invhwkmle.exe inmprqjiy.exe PID 2724 wrote to memory of 628 2724 invhwkmle.exe inmprqjiy.exe PID 2724 wrote to memory of 628 2724 invhwkmle.exe inmprqjiy.exe PID 2724 wrote to memory of 628 2724 invhwkmle.exe inmprqjiy.exe PID 2724 wrote to memory of 628 2724 invhwkmle.exe inmprqjiy.exe PID 2724 wrote to memory of 628 2724 invhwkmle.exe inmprqjiy.exe PID 2724 wrote to memory of 628 2724 invhwkmle.exe inmprqjiy.exe PID 628 wrote to memory of 976 628 inmprqjiy.exe insohtodl.exe PID 628 wrote to memory of 976 628 inmprqjiy.exe insohtodl.exe PID 628 wrote to memory of 976 628 inmprqjiy.exe insohtodl.exe PID 628 wrote to memory of 976 628 inmprqjiy.exe insohtodl.exe PID 628 wrote to memory of 976 628 inmprqjiy.exe insohtodl.exe PID 628 wrote to memory of 976 628 inmprqjiy.exe insohtodl.exe PID 628 wrote to memory of 976 628 inmprqjiy.exe insohtodl.exe PID 976 wrote to memory of 1064 976 insohtodl.exe inrdysgih.exe PID 976 wrote to memory of 1064 976 insohtodl.exe inrdysgih.exe PID 976 wrote to memory of 1064 976 insohtodl.exe inrdysgih.exe PID 976 wrote to memory of 1064 976 insohtodl.exe inrdysgih.exe PID 976 wrote to memory of 1064 976 insohtodl.exe inrdysgih.exe PID 976 wrote to memory of 1064 976 insohtodl.exe inrdysgih.exe PID 976 wrote to memory of 1064 976 insohtodl.exe inrdysgih.exe PID 1064 wrote to memory of 1736 1064 inrdysgih.exe inzvgovkd.exe PID 1064 wrote to memory of 1736 1064 inrdysgih.exe inzvgovkd.exe PID 1064 wrote to memory of 1736 1064 inrdysgih.exe inzvgovkd.exe PID 1064 wrote to memory of 1736 1064 inrdysgih.exe inzvgovkd.exe PID 1064 wrote to memory of 1736 1064 inrdysgih.exe inzvgovkd.exe PID 1064 wrote to memory of 1736 1064 inrdysgih.exe inzvgovkd.exe PID 1064 wrote to memory of 1736 1064 inrdysgih.exe inzvgovkd.exe PID 1736 wrote to memory of 2052 1736 inzvgovkd.exe injyqkarh.exe PID 1736 wrote to memory of 2052 1736 inzvgovkd.exe injyqkarh.exe PID 1736 wrote to memory of 2052 1736 inzvgovkd.exe injyqkarh.exe PID 1736 wrote to memory of 2052 1736 inzvgovkd.exe injyqkarh.exe PID 1736 wrote to memory of 2052 1736 inzvgovkd.exe injyqkarh.exe PID 1736 wrote to memory of 2052 1736 inzvgovkd.exe injyqkarh.exe PID 1736 wrote to memory of 2052 1736 inzvgovkd.exe injyqkarh.exe PID 2052 wrote to memory of 568 2052 injyqkarh.exe innqsrkjz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe"C:\Users\Admin\AppData\Local\Temp\4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\indhxkwmb.exeC:\Windows\system32\indhxkwmb.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\innfvgrkz.exeC:\Windows\system32\innfvgrkz.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\insvxwpco.exeC:\Windows\system32\insvxwpco.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\invhwkmle.exeC:\Windows\system32\invhwkmle.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\insohtodl.exeC:\Windows\system32\insohtodl.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\inrdysgih.exeC:\Windows\system32\inrdysgih.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\injyqkarh.exeC:\Windows\system32\injyqkarh.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\innqsrkjz.exeC:\Windows\system32\innqsrkjz.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:568 -
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Windows\SysWOW64\inyufnzuj.exeC:\Windows\system32\inyufnzuj.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1396 -
C:\Windows\SysWOW64\inkzrlbas.exeC:\Windows\system32\inkzrlbas.exe15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:620 -
C:\Windows\SysWOW64\inortslka.exeC:\Windows\system32\inortslka.exe16⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Windows\SysWOW64\inugvjlkd.exeC:\Windows\system32\inugvjlkd.exe18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Windows\SysWOW64\inxiaqxbm.exeC:\Windows\system32\inxiaqxbm.exe19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Windows\SysWOW64\intsuvkkg.exeC:\Windows\system32\intsuvkkg.exe20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:744 -
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Windows\SysWOW64\incraptug.exeC:\Windows\system32\incraptug.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Windows\SysWOW64\insrzztuj.exeC:\Windows\system32\insrzztuj.exe24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Windows\SysWOW64\inqtvunam.exeC:\Windows\system32\inqtvunam.exe25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2800 -
C:\Windows\SysWOW64\incsvmltt.exeC:\Windows\system32\incsvmltt.exe26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2404 -
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Windows\SysWOW64\inldtepix.exeC:\Windows\system32\inldtepix.exe28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Windows\SysWOW64\ineybxzdp.exeC:\Windows\system32\ineybxzdp.exe30⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Windows\SysWOW64\infumgnyd.exeC:\Windows\system32\infumgnyd.exe31⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\SysWOW64\inxjymong.exeC:\Windows\system32\inxjymong.exe32⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3064 -
C:\Windows\SysWOW64\inogwahsa.exeC:\Windows\system32\inogwahsa.exe34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Windows\SysWOW64\inuqbjvqf.exeC:\Windows\system32\inuqbjvqf.exe35⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe36⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Windows\SysWOW64\ingvnhoze.exeC:\Windows\system32\ingvnhoze.exe37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\SysWOW64\inkbaivic.exeC:\Windows\system32\inkbaivic.exe38⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780 -
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe39⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352 -
C:\Windows\SysWOW64\intpaiupe.exeC:\Windows\system32\intpaiupe.exe40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\SysWOW64\indskelwb.exeC:\Windows\system32\indskelwb.exe41⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1784 -
C:\Windows\SysWOW64\intcrvwiy.exeC:\Windows\system32\intcrvwiy.exe42⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608 -
C:\Windows\SysWOW64\inigtklnv.exeC:\Windows\system32\inigtklnv.exe43⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:844 -
C:\Windows\SysWOW64\inutvwllh.exeC:\Windows\system32\inutvwllh.exe44⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\SysWOW64\inwsdlxsh.exeC:\Windows\system32\inwsdlxsh.exe46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1344 -
C:\Windows\SysWOW64\inhfsfaqh.exeC:\Windows\system32\inhfsfaqh.exe47⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Windows\SysWOW64\injlxlxig.exeC:\Windows\system32\injlxlxig.exe48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660 -
C:\Windows\SysWOW64\inwmpgfnn.exeC:\Windows\system32\inwmpgfnn.exe49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Windows\SysWOW64\indpalewk.exeC:\Windows\system32\indpalewk.exe50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068 -
C:\Windows\SysWOW64\indtwnmuu.exeC:\Windows\system32\indtwnmuu.exe51⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2784 -
C:\Windows\SysWOW64\inixpjqgj.exeC:\Windows\system32\inixpjqgj.exe52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:348 -
C:\Windows\SysWOW64\indqsmlmh.exeC:\Windows\system32\indqsmlmh.exe53⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:108 -
C:\Windows\SysWOW64\injwnoaqy.exeC:\Windows\system32\injwnoaqy.exe54⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\SysWOW64\innlypqcs.exeC:\Windows\system32\innlypqcs.exe55⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\SysWOW64\inazpsjiq.exeC:\Windows\system32\inazpsjiq.exe56⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124 -
C:\Windows\SysWOW64\innoddvuk.exeC:\Windows\system32\innoddvuk.exe57⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580 -
C:\Windows\SysWOW64\inbfyviuk.exeC:\Windows\system32\inbfyviuk.exe58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Windows\SysWOW64\inrfpuysy.exeC:\Windows\system32\inrfpuysy.exe59⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\Windows\SysWOW64\inmkxopbr.exeC:\Windows\system32\inmkxopbr.exe60⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928 -
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe61⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\SysWOW64\indwztgsi.exeC:\Windows\system32\indwztgsi.exe62⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:800 -
C:\Windows\SysWOW64\inyjbrycn.exeC:\Windows\system32\inyjbrycn.exe63⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe64⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2424 -
C:\Windows\SysWOW64\incwvxbyn.exeC:\Windows\system32\incwvxbyn.exe65⤵
- Executes dropped EXE
PID:2976 -
C:\Windows\SysWOW64\inscqyokc.exeC:\Windows\system32\inscqyokc.exe66⤵PID:3036
-
C:\Windows\SysWOW64\ineuxonvv.exeC:\Windows\system32\ineuxonvv.exe67⤵PID:2904
-
C:\Windows\SysWOW64\ingvzmksi.exeC:\Windows\system32\ingvzmksi.exe68⤵PID:320
-
C:\Windows\SysWOW64\inhiypoew.exeC:\Windows\system32\inhiypoew.exe69⤵PID:2700
-
C:\Windows\SysWOW64\injkrqgyq.exeC:\Windows\system32\injkrqgyq.exe70⤵PID:2832
-
C:\Windows\SysWOW64\inopeewva.exeC:\Windows\system32\inopeewva.exe71⤵PID:2528
-
C:\Windows\SysWOW64\infvypoww.exeC:\Windows\system32\infvypoww.exe72⤵PID:2544
-
C:\Windows\SysWOW64\incsnrmiw.exeC:\Windows\system32\incsnrmiw.exe73⤵PID:1984
-
C:\Windows\SysWOW64\inljyapnv.exeC:\Windows\system32\inljyapnv.exe74⤵PID:744
-
C:\Windows\SysWOW64\inapnrseu.exeC:\Windows\system32\inapnrseu.exe75⤵PID:1504
-
C:\Windows\SysWOW64\incvyzsfr.exeC:\Windows\system32\incvyzsfr.exe76⤵PID:1772
-
C:\Windows\SysWOW64\intmsjkwc.exeC:\Windows\system32\intmsjkwc.exe77⤵PID:1696
-
C:\Windows\SysWOW64\injyixbhg.exeC:\Windows\system32\injyixbhg.exe78⤵PID:1756
-
C:\Windows\SysWOW64\inecpcnet.exeC:\Windows\system32\inecpcnet.exe79⤵PID:2788
-
C:\Windows\SysWOW64\inqgdzfrf.exeC:\Windows\system32\inqgdzfrf.exe80⤵PID:444
-
C:\Windows\SysWOW64\infhthtec.exeC:\Windows\system32\infhthtec.exe81⤵PID:1020
-
C:\Windows\SysWOW64\inqrggyxc.exeC:\Windows\system32\inqrggyxc.exe82⤵PID:2680
-
C:\Windows\SysWOW64\inilcbjwj.exeC:\Windows\system32\inilcbjwj.exe83⤵PID:1932
-
C:\Windows\SysWOW64\inhwnltjf.exeC:\Windows\system32\inhwnltjf.exe84⤵PID:2552
-
C:\Windows\SysWOW64\ingtvpopk.exeC:\Windows\system32\ingtvpopk.exe85⤵PID:2092
-
C:\Windows\SysWOW64\inbnjcuis.exeC:\Windows\system32\inbnjcuis.exe86⤵
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\inatwyxqd.exeC:\Windows\system32\inatwyxqd.exe87⤵PID:2524
-
C:\Windows\SysWOW64\inuinrlrc.exeC:\Windows\system32\inuinrlrc.exe88⤵PID:2592
-
C:\Windows\SysWOW64\inpqffxwb.exeC:\Windows\system32\inpqffxwb.exe89⤵PID:1860
-
C:\Windows\SysWOW64\inykznpoh.exeC:\Windows\system32\inykznpoh.exe90⤵PID:2772
-
C:\Windows\SysWOW64\inwikohfo.exeC:\Windows\system32\inwikohfo.exe91⤵PID:3000
-
C:\Windows\SysWOW64\inochlfll.exeC:\Windows\system32\inochlfll.exe92⤵PID:2384
-
C:\Windows\SysWOW64\inejnhnnw.exeC:\Windows\system32\inejnhnnw.exe93⤵PID:2852
-
C:\Windows\SysWOW64\indrzpldy.exeC:\Windows\system32\indrzpldy.exe94⤵PID:2744
-
C:\Windows\SysWOW64\ingerepgv.exeC:\Windows\system32\ingerepgv.exe95⤵PID:2856
-
C:\Windows\SysWOW64\ingoxeawx.exeC:\Windows\system32\ingoxeawx.exe96⤵PID:2360
-
C:\Windows\SysWOW64\ingvetxyk.exeC:\Windows\system32\ingvetxyk.exe97⤵PID:2460
-
C:\Windows\SysWOW64\injfqeotx.exeC:\Windows\system32\injfqeotx.exe98⤵PID:2596
-
C:\Windows\SysWOW64\inasgqvzt.exeC:\Windows\system32\inasgqvzt.exe99⤵PID:1696
-
C:\Windows\SysWOW64\inpbwqegf.exeC:\Windows\system32\inpbwqegf.exe100⤵PID:844
-
C:\Windows\SysWOW64\inaivxrqr.exeC:\Windows\system32\inaivxrqr.exe101⤵PID:2896
-
C:\Windows\SysWOW64\inckxztas.exeC:\Windows\system32\inckxztas.exe102⤵PID:892
-
C:\Windows\SysWOW64\inhegsgsd.exeC:\Windows\system32\inhegsgsd.exe103⤵PID:1936
-
C:\Windows\SysWOW64\infudswxj.exeC:\Windows\system32\infudswxj.exe104⤵PID:972
-
C:\Windows\SysWOW64\ingwzqpxx.exeC:\Windows\system32\ingwzqpxx.exe105⤵
- Drops file in System32 directory
PID:2920 -
C:\Windows\SysWOW64\inqmfrmyb.exeC:\Windows\system32\inqmfrmyb.exe106⤵PID:2204
-
C:\Windows\SysWOW64\inzhuwqpq.exeC:\Windows\system32\inzhuwqpq.exe107⤵
- System Location Discovery: System Language Discovery
PID:552 -
C:\Windows\SysWOW64\inbuzcxoc.exeC:\Windows\system32\inbuzcxoc.exe108⤵PID:2564
-
C:\Windows\SysWOW64\insezthji.exeC:\Windows\system32\insezthji.exe109⤵PID:2944
-
C:\Windows\SysWOW64\inlvjosms.exeC:\Windows\system32\inlvjosms.exe110⤵PID:832
-
C:\Windows\SysWOW64\insnyjjgx.exeC:\Windows\system32\insnyjjgx.exe111⤵PID:2264
-
C:\Windows\SysWOW64\indeulkya.exeC:\Windows\system32\indeulkya.exe112⤵PID:2748
-
C:\Windows\SysWOW64\inmtnbdcu.exeC:\Windows\system32\inmtnbdcu.exe113⤵PID:1912
-
C:\Windows\SysWOW64\inxnqhgoo.exeC:\Windows\system32\inxnqhgoo.exe114⤵PID:1240
-
C:\Windows\SysWOW64\inmhxsddw.exeC:\Windows\system32\inmhxsddw.exe115⤵PID:1100
-
C:\Windows\SysWOW64\inpfzcyeq.exeC:\Windows\system32\inpfzcyeq.exe116⤵PID:1672
-
C:\Windows\SysWOW64\inrbvqwap.exeC:\Windows\system32\inrbvqwap.exe117⤵PID:2720
-
C:\Windows\SysWOW64\inmawkptn.exeC:\Windows\system32\inmawkptn.exe118⤵PID:2152
-
C:\Windows\SysWOW64\indtkzjxv.exeC:\Windows\system32\indtkzjxv.exe119⤵PID:1976
-
C:\Windows\SysWOW64\insbznvcp.exeC:\Windows\system32\insbznvcp.exe120⤵PID:2732
-
C:\Windows\SysWOW64\inixomukg.exeC:\Windows\system32\inixomukg.exe121⤵PID:860
-
C:\Windows\SysWOW64\inrmslxzd.exeC:\Windows\system32\inrmslxzd.exe122⤵PID:1532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-