Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 05:29
Behavioral task
behavioral1
Sample
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
Resource
win10v2004-20241007-en
General
-
Target
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe
-
Size
348KB
-
MD5
b9befe5cf8c341b816fcd1922accf117
-
SHA1
08ca40d0fc0c580caeb6c15aa5289bef223dd6d4
-
SHA256
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d
-
SHA512
3e85b180156fd665618fca532f4588f9edb9935fe2ecf3ebd60621a974c8fd30e32adee3a5d36c8bdefbec05787d69e721a13ade542f6d372681c4c80e448cac
-
SSDEEP
6144:MJueTkwOwoWOQ3dwaWB28edeP/deUv80P80Ap8UGwoTGHZOWJkqd0K4rG7eVT0SQ:ouLwoZQGpnedeP/deUe1ppGjTGHZRT08
Malware Config
Signatures
-
Gh0st RAT payload 50 IoCs
Processes:
resource yara_rule behavioral2/memory/4648-0-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Users\Admin\AppData\Local\Temp\vuiCFD4.tmp family_gh0strat C:\Windows\SysWOW64\indwztgsi.exe family_gh0strat behavioral2/memory/4648-22-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\innqsrkjz.exe family_gh0strat behavioral2/memory/1520-48-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inwixlnmf.exe family_gh0strat behavioral2/memory/2268-71-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/2452-70-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inykznpoh.exe family_gh0strat behavioral2/memory/2268-94-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\insvxwpco.exe family_gh0strat behavioral2/memory/3812-372-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4848-418-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1640-648-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4112-618-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3572-610-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/2324-580-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3400-571-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4588-553-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/716-534-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3068-504-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3848-496-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/3752-477-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4992-450-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1116-422-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/1640-391-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\infhthtec.exe family_gh0strat behavioral2/memory/2156-349-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inxtemyti.exe family_gh0strat behavioral2/memory/4516-338-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\invrckwrg.exe family_gh0strat behavioral2/memory/1768-315-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inaphxbit.exe family_gh0strat behavioral2/memory/1120-292-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\innuocedv.exe family_gh0strat behavioral2/memory/1204-257-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inmprqjiy.exe family_gh0strat behavioral2/memory/4904-234-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inixpjqgj.exe family_gh0strat behavioral2/memory/4836-210-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\invhwkmle.exe family_gh0strat behavioral2/memory/716-200-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\intfuikjc.exe family_gh0strat behavioral2/memory/3960-165-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat behavioral2/memory/4816-154-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inpsutmlb.exe family_gh0strat behavioral2/memory/1404-119-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat C:\Windows\SysWOW64\inqmfrmyb.exe family_gh0strat behavioral2/memory/1404-92-0x0000000000400000-0x000000000042F000-memory.dmp family_gh0strat -
Gh0strat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 64 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
inqcxrfhg.exeinwezaozq.exeinauxfdek.exeinilcbjwj.exeinlubyhti.exeinfmbihgy.exeinktbmkag.exeindigocxg.exeinsezthji.exeinbfyviuk.exeincldxuje.exeinyzokcmk.exeinpzchsnz.exeinjprzfoi.exeinsywlfel.exeinhpdyhbh.exeinomlwaho.exeinfumgnyd.exeinqtvunam.exeindqezurm.exeincanalcr.exeintdzdpys.exeinqutiquu.exeinrbvqwap.exeinkdpokcq.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{51E7D4C4-F6BC-4b9f-A7C2-7796EC078CAA}\stubpath = "C:\\Windows\\system32\\infsufvyy.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{83D029C5-3449-4a90-BBC9-694725532993} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E95E7968-C5D4-495f-92A5-999FBE44A56E} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BD4CF39E-40E6-41f2-9158-43389329064A} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9E90D957-06CD-44c5-BA4E-9A228FEBD94D}\stubpath = "C:\\Windows\\system32\\inqgdzfrf.exe" inqcxrfhg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{055C77B3-BBF2-47e5-B267-6E893E0937BC} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2E5749AC-89EA-4796-8B9F-C2BA4BBE3D52}\stubpath = "C:\\Windows\\system32\\inojesplp.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BE5423D6-6088-4015-8775-A9C6CD5C2167}\stubpath = "C:\\Windows\\system32\\inqwawilu.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{425928D6-4CE3-48e4-9878-F2FC77F2D084}\stubpath = "C:\\Windows\\system32\\inouakffm.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D2067361-CA6B-4a90-B402-7D547CDE6597} inwezaozq.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B7D3C118-ADBC-45c6-8D9B-4E24F7B931DF}\stubpath = "C:\\Windows\\system32\\inqjvuqid.exe" inauxfdek.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3FD47B7D-B051-4400-B3D5-9C53731E972A} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DA851988-1C80-49ad-A05D-73F4BB47CEF7} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{985A44D9-1006-4491-8F25-FA08B6660276} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E91A8A31-D794-4e76-ADC5-FA82FBFD5B50}\stubpath = "C:\\Windows\\system32\\inljzdsjp.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9A0C115C-23FC-474b-94F7-DD55E3709225} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0F0B0738-3C91-4a22-8D24-F4A3931C9B6E}\stubpath = "C:\\Windows\\system32\\injsnioht.exe" inilcbjwj.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{67A69B48-C0C1-4841-9860-9C3BD9B10327} inlubyhti.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BB865362-C8EB-4c6c-B785-B2AFF08FF622} infmbihgy.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{CA572096-CA3C-42f7-9429-2495C63F5DF3}\stubpath = "C:\\Windows\\system32\\inxjbsmyi.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BAACFCA3-59E1-4a61-A932-79234B681F16}\stubpath = "C:\\Windows\\system32\\inetjorgr.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BE5682F5-C53E-4d88-BAD5-4CA3B24273D6}\stubpath = "C:\\Windows\\system32\\inczeboin.exe" inktbmkag.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{514355C6-69DA-40a7-9C4C-AF6B34B018C2}\stubpath = "C:\\Windows\\system32\\infzicqlp.exe" indigocxg.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E5768C23-2914-4736-96ED-FE4697A7D26C} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B10C469E-7476-4daa-ABEF-0A896CC18A43}\stubpath = "C:\\Windows\\system32\\inavtceys.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A4819B95-E1DA-45fe-A334-7E26449CE956}\stubpath = "C:\\Windows\\system32\\inibhdflh.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3002DC84-5B4F-4704-B855-5AB1D4DD7363} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D420CDE6-C714-4acc-B8C9-25CDB87B7109}\stubpath = "C:\\Windows\\system32\\inxhvtpha.exe" insezthji.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1643DFE9-FFAA-44f9-8847-5A16E4F8B142}\stubpath = "C:\\Windows\\system32\\iniizepdz.exe" inbfyviuk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C70B62A5-8150-4f46-A7C0-8A15173A2DC7} incldxuje.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4B29CD6E-9602-4af8-954D-9D16F38DBD6D} inyzokcmk.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3717818A-3701-45a1-BE10-45DBCEEA6D3B} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{0A05E7B9-AB47-4a6b-A25C-1057365798A6}\stubpath = "C:\\Windows\\system32\\intywobqk.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D68FD26B-AA4A-4c7b-A15C-DB716216F278} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{AD7C10EB-F960-4c62-A7D0-35482B7B3263} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{91D9F120-43A8-44e6-B0F4-C8E48AC4CBDF}\stubpath = "C:\\Windows\\system32\\inyeylxex.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6160695B-5270-4928-BB53-30A69CAF4D8D}\stubpath = "C:\\Windows\\system32\\indvpwggs.exe" inpzchsnz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DCFAD098-6C3D-44ac-ABBB-7561EA6E1A87}\stubpath = "C:\\Windows\\system32\\inbqzdbaf.exe" injprzfoi.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{46A37B15-25E0-4b05-8490-3CABA73E2B30} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5DEC2612-BA2D-4fe6-B60B-75040B81AC2C}\stubpath = "C:\\Windows\\system32\\inowshcik.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6618EDC0-27A3-4884-BF1F-B43D46C54C1A}\stubpath = "C:\\Windows\\system32\\intqijqta.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DD1B1048-44E3-443a-B452-0C9F4E60025E}\stubpath = "C:\\Windows\\system32\\inoqvziwx.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{3172A096-1830-4f93-AAB8-5A486C229496}\stubpath = "C:\\Windows\\system32\\inepoecga.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E4BEE36D-56B3-4d5a-9138-2C10CDDF8782} insywlfel.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C7D73CD4-A787-4870-8DBF-18CA352AE62C} inhpdyhbh.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6F2113CD-9411-4f53-AD03-0747F1A9C5A6} inomlwaho.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A8BD9E4D-3A6D-44ba-9E97-89618A4DBEC1}\stubpath = "C:\\Windows\\system32\\inpllrqcx.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{52D1DE0E-360B-4103-9D16-F23CE93DA1ED}\stubpath = "C:\\Windows\\system32\\injbrhuee.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{58A270BA-E64B-4927-BAC6-0C9EF842B6CD} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{ED1DFD9E-CEC6-4163-B615-E554A38C506B}\stubpath = "C:\\Windows\\system32\\injrrjwyx.exe" Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{50F779D0-67C0-4e4e-8EF4-C83CB3C0C12A} Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4741329C-3654-4ccd-95C9-4D6ED0D8B280}\stubpath = "C:\\Windows\\system32\\inoxbcsnd.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{4B2C8466-727D-4b19-ADB9-9FB0DE1299C5}\stubpath = "C:\\Windows\\system32\\indvjzcoq.exe" infumgnyd.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{B4A32B57-067B-4b12-ABCF-DD4795071DC9} inqtvunam.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{18FED5F6-17A9-45df-AFCC-8A8264F7F7E6}\stubpath = "C:\\Windows\\system32\\inbgwtosr.exe" indqezurm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{78E43138-1EF4-4e0b-817F-ECE150B1F798}\stubpath = "C:\\Windows\\system32\\inkswwwod.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{1D498F31-893E-4f7b-A03C-294DF4C6806D}\stubpath = "C:\\Windows\\system32\\inrnffekc.exe" Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{DE43752A-BFD3-4127-AEFF-FEC9023EE263}\stubpath = "C:\\Windows\\system32\\inrcangym.exe" incanalcr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D1CFE88B-83A3-459b-9F67-AC78D18B1357}\stubpath = "C:\\Windows\\system32\\inkfpgznc.exe" intdzdpys.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{9C323F80-31F1-4e81-8D6C-6671051BA288} inqutiquu.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B05C3B5-B4A1-4f7f-9BBF-0A362477870B} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{72F522EA-B5F2-43c2-944A-6BBC3891C383} Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{D4F81A94-76CA-4f9b-BF81-1FF373BDACC6} inrbvqwap.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{A85A3170-0034-413d-9A4C-33447818CE73} inkdpokcq.exe -
ACProtect 1.3x - 1.4x DLL software 16 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\suiCFB4.tmp acprotect C:\Users\Admin\AppData\Local\Temp\luiD06F.tmp acprotect C:\Users\Admin\AppData\Local\Temp\zuiD0FC.tmp acprotect C:\Users\Admin\AppData\Local\Temp\puiD198.tmp acprotect C:\Users\Admin\AppData\Local\Temp\vuiD1D7.tmp acprotect C:\Users\Admin\AppData\Local\Temp\jviD263.tmp acprotect C:\Users\Admin\AppData\Local\Temp\rviD3AB.tmp acprotect C:\Users\Admin\AppData\Local\Temp\hviD448.tmp acprotect C:\Users\Admin\AppData\Local\Temp\cviD419.tmp acprotect C:\Users\Admin\AppData\Local\Temp\vviD3DA.tmp acprotect C:\Users\Admin\AppData\Local\Temp\mviD37C.tmp acprotect C:\Users\Admin\AppData\Local\Temp\hviD34E.tmp acprotect C:\Users\Admin\AppData\Local\Temp\zviD2FF.tmp acprotect C:\Users\Admin\AppData\Local\Temp\uviD2D1.tmp acprotect C:\Users\Admin\AppData\Local\Temp\oviD292.tmp acprotect C:\Users\Admin\AppData\Local\Temp\dviD225.tmp acprotect -
Executes dropped EXE 64 IoCs
Processes:
indwztgsi.exeinnqsrkjz.exeinwixlnmf.exeinykznpoh.exeinqmfrmyb.exeinpsutmlb.exeinsvxwpco.exeintfuikjc.exeinvhwkmle.exeinixpjqgj.exeinmprqjiy.exeinnuocedv.exeinaphxbit.exeinvrckwrg.exeinxtemyti.exeinfhthtec.exeincgzwjvl.exeinsrzztuj.exeinortslka.exeinruwvobn.exeinatwyxqd.exeinugvjlkd.exeineuxonvv.exeinzloqpih.exeinmtnbdcu.exeinogwahsa.exeinbqiycju.exeinwsdlxsh.exeincvyzsfr.exeinxiaqxbm.exeindhxkwmb.exeinjhulmow.exeintpaiupe.exeingwzqpxx.exeinlsmacbt.exeinmeufqjy.exeinbmkzbqa.exeinomzqrdt.exeinbuxzyre.exeindtwnmuu.exeinhwoipfi.exeinyjbrycn.exeinhwnltjf.exeinsohtodl.exeindxawycz.exeinrdysgih.exeinetlfmxc.exeingtgabri.exeingvetxyk.exeinldtepix.exeinrngsnzc.exeinuqbjvqf.exeineybxzdp.exeinbrulkss.exeingvnhoze.exeinfudswxj.exeinjmdckxk.exeindpalewk.exeinmnccutj.exeinopeewva.exeinrshhzyd.exeinefvmlzb.exeinxsdoolp.exeinjwnoaqy.exepid process 1520 indwztgsi.exe 2452 innqsrkjz.exe 2268 inwixlnmf.exe 1404 inykznpoh.exe 4816 inqmfrmyb.exe 3960 inpsutmlb.exe 716 insvxwpco.exe 4836 intfuikjc.exe 4904 invhwkmle.exe 1204 inixpjqgj.exe 1120 inmprqjiy.exe 1768 innuocedv.exe 4516 inaphxbit.exe 2156 invrckwrg.exe 3812 inxtemyti.exe 1640 infhthtec.exe 1116 incgzwjvl.exe 4848 insrzztuj.exe 4992 inortslka.exe 3752 inruwvobn.exe 3848 inatwyxqd.exe 3068 inugvjlkd.exe 716 ineuxonvv.exe 4588 inzloqpih.exe 3400 inmtnbdcu.exe 2324 inogwahsa.exe 3572 inbqiycju.exe 4112 inwsdlxsh.exe 1640 incvyzsfr.exe 4352 inxiaqxbm.exe 4848 indhxkwmb.exe 1500 injhulmow.exe 412 intpaiupe.exe 4332 ingwzqpxx.exe 2856 inlsmacbt.exe 1404 inmeufqjy.exe 3464 inbmkzbqa.exe 2940 inomzqrdt.exe 3428 inbuxzyre.exe 2816 indtwnmuu.exe 1944 inhwoipfi.exe 2232 inyjbrycn.exe 2032 inhwnltjf.exe 920 insohtodl.exe 3308 indxawycz.exe 4364 inrdysgih.exe 3172 inetlfmxc.exe 368 ingtgabri.exe 2880 ingvetxyk.exe 3584 inldtepix.exe 2792 inrngsnzc.exe 1428 inuqbjvqf.exe 1456 ineybxzdp.exe 1612 inbrulkss.exe 4476 ingvnhoze.exe 2040 infudswxj.exe 2360 injmdckxk.exe 3268 indpalewk.exe 1236 inmnccutj.exe 4224 inopeewva.exe 5060 inrshhzyd.exe 4928 inefvmlzb.exe 4216 inxsdoolp.exe 3944 injwnoaqy.exe -
Loads dropped DLL 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeindwztgsi.exeinnqsrkjz.exeinwixlnmf.exeinykznpoh.exeinqmfrmyb.exeinpsutmlb.exeinsvxwpco.exeintfuikjc.exeinvhwkmle.exeinixpjqgj.exeinmprqjiy.exeinnuocedv.exeinaphxbit.exeinvrckwrg.exeinxtemyti.exeinfhthtec.exeincgzwjvl.exeinsrzztuj.exeinortslka.exeinruwvobn.exeinatwyxqd.exeinugvjlkd.exeineuxonvv.exeinzloqpih.exeinmtnbdcu.exeinogwahsa.exeinbqiycju.exeinwsdlxsh.exeincvyzsfr.exeinxiaqxbm.exeindhxkwmb.exepid process 4648 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 4648 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 1520 indwztgsi.exe 1520 indwztgsi.exe 2452 innqsrkjz.exe 2452 innqsrkjz.exe 2268 inwixlnmf.exe 2268 inwixlnmf.exe 1404 inykznpoh.exe 1404 inykznpoh.exe 4816 inqmfrmyb.exe 4816 inqmfrmyb.exe 3960 inpsutmlb.exe 3960 inpsutmlb.exe 716 insvxwpco.exe 716 insvxwpco.exe 4836 intfuikjc.exe 4836 intfuikjc.exe 4904 invhwkmle.exe 4904 invhwkmle.exe 1204 inixpjqgj.exe 1204 inixpjqgj.exe 1120 inmprqjiy.exe 1120 inmprqjiy.exe 1768 innuocedv.exe 1768 innuocedv.exe 4516 inaphxbit.exe 4516 inaphxbit.exe 2156 invrckwrg.exe 2156 invrckwrg.exe 3812 inxtemyti.exe 3812 inxtemyti.exe 1640 infhthtec.exe 1640 infhthtec.exe 1116 incgzwjvl.exe 1116 incgzwjvl.exe 4848 insrzztuj.exe 4848 insrzztuj.exe 4992 inortslka.exe 4992 inortslka.exe 3752 inruwvobn.exe 3752 inruwvobn.exe 3848 inatwyxqd.exe 3848 inatwyxqd.exe 3068 inugvjlkd.exe 3068 inugvjlkd.exe 716 ineuxonvv.exe 716 ineuxonvv.exe 4588 inzloqpih.exe 4588 inzloqpih.exe 3400 inmtnbdcu.exe 3400 inmtnbdcu.exe 2324 inogwahsa.exe 2324 inogwahsa.exe 3572 inbqiycju.exe 3572 inbqiycju.exe 4112 inwsdlxsh.exe 4112 inwsdlxsh.exe 1640 incvyzsfr.exe 1640 incvyzsfr.exe 4352 inxiaqxbm.exe 4352 inxiaqxbm.exe 4848 indhxkwmb.exe 4848 indhxkwmb.exe -
Drops file in System32 directory 64 IoCs
Processes:
inixomukg.exeinwtyvsvp.exeinjmdckxk.exeinoxdfqoe.exeinhuwzjax.exeindrzpldy.exeinskscibo.exeinxshctsn.exeinlgisalg.exeinwikshbc.exeinspmpjxs.exeinnpclapa.exeinsuhmxsm.exeinnsyszet.exeinfacmfam.exeinblsqhkm.exeinrkqhiua.exeincgncjih.exeinqmmyfvv.exeinlmosntr.exeinkwlklan.exeinxndtjlz.exeinsanriau.exeinxoqaroc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\inomaugiq.exe_lang.ini File created C:\Windows\SysWOW64\infswsuoa.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\inuhmcksg.exe_lang.ini inixomukg.exe File created C:\Windows\SysWOW64\intnjpska.exe inwtyvsvp.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inalttlya.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat injmdckxk.exe File created C:\Windows\SysWOW64\inmfdiwbp.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inwmpgfnn.exe inoxdfqoe.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inhuwzjax.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inpwlnteb.exe File created C:\Windows\SysWOW64\inovtknpq.exe indrzpldy.exe File created C:\Windows\SysWOW64\inhjrgabu.exe inskscibo.exe File created C:\Windows\SysWOW64\inqkfjkmk.exe File created C:\Windows\SysWOW64\infshxrfm.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\insslbmgd.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inxshctsn.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inihciizg.exe File created C:\Windows\SysWOW64\inrnfatcb.exe inlgisalg.exe File opened for modification C:\Windows\SysWOW64\syslog.dat inwikshbc.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inirhbzcu.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\invjwwjhc.exe_lang.ini File opened for modification C:\Windows\SysWOW64\infvypoww.exe_lang.ini inspmpjxs.exe File opened for modification C:\Windows\SysWOW64\syslog.dat innpclapa.exe File created C:\Windows\SysWOW64\infrgacrf.exe insuhmxsm.exe File opened for modification C:\Windows\SysWOW64\incpdebyb.exe_lang.ini innsyszet.exe File opened for modification C:\Windows\SysWOW64\inpkljmmf.exe_lang.ini File created C:\Windows\SysWOW64\inqhgrqer.exe File opened for modification C:\Windows\SysWOW64\inckjqhkt.exe_lang.ini File opened for modification C:\Windows\SysWOW64\syslog.dat infacmfam.exe File opened for modification C:\Windows\SysWOW64\inlrrkalf.exe_lang.ini File opened for modification C:\Windows\SysWOW64\inntvjsmn.exe_lang.ini File created C:\Windows\SysWOW64\invarrlkr.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\incraptug.exe_lang.ini inblsqhkm.exe File created C:\Windows\SysWOW64\inqxbfmkb.exe inrkqhiua.exe File opened for modification C:\Windows\SysWOW64\syslog.dat incgncjih.exe File opened for modification C:\Windows\SysWOW64\syslog.dat File opened for modification C:\Windows\SysWOW64\syslog.dat File created C:\Windows\SysWOW64\inawyqjag.exe inqmmyfvv.exe File opened for modification C:\Windows\SysWOW64\intvsvjfw.exe_lang.ini File opened for modification C:\Windows\SysWOW64\inzrluplx.exe_lang.ini File opened for modification C:\Windows\SysWOW64\inouyugyj.exe_lang.ini File created C:\Windows\SysWOW64\inxtlppjg.exe File created C:\Windows\SysWOW64\intojzuff.exe inlmosntr.exe File created C:\Windows\SysWOW64\inquussur.exe inkwlklan.exe File created C:\Windows\SysWOW64\inczogbkc.exe inxndtjlz.exe File opened for modification C:\Windows\SysWOW64\innsyszet.exe_lang.ini insanriau.exe File opened for modification C:\Windows\SysWOW64\inwaymvpq.exe_lang.ini inxoqaroc.exe File opened for modification C:\Windows\SysWOW64\inehjyswv.exe_lang.ini File created C:\Windows\SysWOW64\inzjpoith.exe File opened for modification C:\Windows\SysWOW64\inpcozymz.exe_lang.ini File opened for modification C:\Windows\SysWOW64\indefwxeh.exe_lang.ini File created C:\Windows\SysWOW64\inbqdghqy.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
insaljfpw.exeinjprzfoi.exeindexckbc.exeinfcnwrgb.exeinskhcuqg.exeinxnqhgoo.exeinpriaela.exeinliirakg.exeinlnqnzon.exeinwyzbftn.exeinilftocs.exeinomvcziu.exeinnsyszet.exeingfvhjng.exeinecvhest.exeinpkvggzd.exeinfgwnmcy.exeinyluacnl.exeinkhtihxi.exeinionprva.exeinnvcvbrm.exeinzrzcjpi.exeinniucjdf.exeinpxucmtx.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language insaljfpw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language injprzfoi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language indexckbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language infcnwrgb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inskhcuqg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inxnqhgoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inpriaela.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inliirakg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inlnqnzon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inwyzbftn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inilftocs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inomvcziu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language innsyszet.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ingfvhjng.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inecvhest.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inpkvggzd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language infgwnmcy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inyluacnl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inkhtihxi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inionprva.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language innvcvbrm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inzrzcjpi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inniucjdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inpxucmtx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeindwztgsi.exeinnqsrkjz.exeinwixlnmf.exeinykznpoh.exeinqmfrmyb.exeinpsutmlb.exeinsvxwpco.exeintfuikjc.exeinvhwkmle.exeinixpjqgj.exeinmprqjiy.exeinnuocedv.exeinaphxbit.exeinvrckwrg.exeinxtemyti.exeinfhthtec.exeincgzwjvl.exeinsrzztuj.exeinortslka.exeinruwvobn.exeinatwyxqd.exeinugvjlkd.exeineuxonvv.exeinzloqpih.exeinmtnbdcu.exeinogwahsa.exeinbqiycju.exeinwsdlxsh.exeincvyzsfr.exeinxiaqxbm.exeindhxkwmb.exepid process 4648 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 4648 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 1520 indwztgsi.exe 1520 indwztgsi.exe 2452 innqsrkjz.exe 2452 innqsrkjz.exe 2268 inwixlnmf.exe 2268 inwixlnmf.exe 1404 inykznpoh.exe 1404 inykznpoh.exe 4816 inqmfrmyb.exe 4816 inqmfrmyb.exe 3960 inpsutmlb.exe 3960 inpsutmlb.exe 716 insvxwpco.exe 716 insvxwpco.exe 4836 intfuikjc.exe 4836 intfuikjc.exe 4904 invhwkmle.exe 4904 invhwkmle.exe 1204 inixpjqgj.exe 1204 inixpjqgj.exe 1120 inmprqjiy.exe 1120 inmprqjiy.exe 1768 innuocedv.exe 1768 innuocedv.exe 4516 inaphxbit.exe 4516 inaphxbit.exe 2156 invrckwrg.exe 2156 invrckwrg.exe 3812 inxtemyti.exe 3812 inxtemyti.exe 1640 infhthtec.exe 1640 infhthtec.exe 1116 incgzwjvl.exe 1116 incgzwjvl.exe 4848 insrzztuj.exe 4848 insrzztuj.exe 4992 inortslka.exe 4992 inortslka.exe 3752 inruwvobn.exe 3752 inruwvobn.exe 3848 inatwyxqd.exe 3848 inatwyxqd.exe 3068 inugvjlkd.exe 3068 inugvjlkd.exe 716 ineuxonvv.exe 716 ineuxonvv.exe 4588 inzloqpih.exe 4588 inzloqpih.exe 3400 inmtnbdcu.exe 3400 inmtnbdcu.exe 2324 inogwahsa.exe 2324 inogwahsa.exe 3572 inbqiycju.exe 3572 inbqiycju.exe 4112 inwsdlxsh.exe 4112 inwsdlxsh.exe 1640 incvyzsfr.exe 1640 incvyzsfr.exe 4352 inxiaqxbm.exe 4352 inxiaqxbm.exe 4848 indhxkwmb.exe 4848 indhxkwmb.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeindwztgsi.exeinnqsrkjz.exeinwixlnmf.exeinykznpoh.exeinqmfrmyb.exeinpsutmlb.exeinsvxwpco.exeintfuikjc.exeinvhwkmle.exeinixpjqgj.exeinmprqjiy.exeinnuocedv.exeinaphxbit.exeinvrckwrg.exeinxtemyti.exeinfhthtec.exeincgzwjvl.exeinsrzztuj.exeinortslka.exeinruwvobn.exeinatwyxqd.exeinugvjlkd.exeineuxonvv.exeinzloqpih.exeinmtnbdcu.exeinogwahsa.exeinbqiycju.exeinwsdlxsh.exeincvyzsfr.exeinxiaqxbm.exeindhxkwmb.exeinjhulmow.exeintpaiupe.exeingwzqpxx.exeinlsmacbt.exeinmeufqjy.exeinbmkzbqa.exeinomzqrdt.exeinbuxzyre.exeindtwnmuu.exeinhwoipfi.exeinyjbrycn.exeinhwnltjf.exeinsohtodl.exeindxawycz.exeinrdysgih.exeinetlfmxc.exeingtgabri.exeingvetxyk.exeinldtepix.exeinrngsnzc.exeinuqbjvqf.exeineybxzdp.exeinbrulkss.exeingvnhoze.exeinfudswxj.exeinjmdckxk.exeindpalewk.exeinmnccutj.exeinopeewva.exeinrshhzyd.exeinefvmlzb.exeinxsdoolp.exedescription pid process Token: SeDebugPrivilege 4648 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe Token: SeDebugPrivilege 1520 indwztgsi.exe Token: SeDebugPrivilege 2452 innqsrkjz.exe Token: SeDebugPrivilege 2268 inwixlnmf.exe Token: SeDebugPrivilege 1404 inykznpoh.exe Token: SeDebugPrivilege 4816 inqmfrmyb.exe Token: SeDebugPrivilege 3960 inpsutmlb.exe Token: SeDebugPrivilege 716 insvxwpco.exe Token: SeDebugPrivilege 4836 intfuikjc.exe Token: SeDebugPrivilege 4904 invhwkmle.exe Token: SeDebugPrivilege 1204 inixpjqgj.exe Token: SeDebugPrivilege 1120 inmprqjiy.exe Token: SeDebugPrivilege 1768 innuocedv.exe Token: SeDebugPrivilege 4516 inaphxbit.exe Token: SeDebugPrivilege 2156 invrckwrg.exe Token: SeDebugPrivilege 3812 inxtemyti.exe Token: SeDebugPrivilege 1640 infhthtec.exe Token: SeDebugPrivilege 1116 incgzwjvl.exe Token: SeDebugPrivilege 4848 insrzztuj.exe Token: SeDebugPrivilege 4992 inortslka.exe Token: SeDebugPrivilege 3752 inruwvobn.exe Token: SeDebugPrivilege 3848 inatwyxqd.exe Token: SeDebugPrivilege 3068 inugvjlkd.exe Token: SeDebugPrivilege 716 ineuxonvv.exe Token: SeDebugPrivilege 4588 inzloqpih.exe Token: SeDebugPrivilege 3400 inmtnbdcu.exe Token: SeDebugPrivilege 2324 inogwahsa.exe Token: SeDebugPrivilege 3572 inbqiycju.exe Token: SeDebugPrivilege 4112 inwsdlxsh.exe Token: SeDebugPrivilege 1640 incvyzsfr.exe Token: SeDebugPrivilege 4352 inxiaqxbm.exe Token: SeDebugPrivilege 4848 indhxkwmb.exe Token: SeDebugPrivilege 1500 injhulmow.exe Token: SeDebugPrivilege 412 intpaiupe.exe Token: SeDebugPrivilege 4332 ingwzqpxx.exe Token: SeDebugPrivilege 2856 inlsmacbt.exe Token: SeDebugPrivilege 1404 inmeufqjy.exe Token: SeDebugPrivilege 3464 inbmkzbqa.exe Token: SeDebugPrivilege 2940 inomzqrdt.exe Token: SeDebugPrivilege 3428 inbuxzyre.exe Token: SeDebugPrivilege 2816 indtwnmuu.exe Token: SeDebugPrivilege 1944 inhwoipfi.exe Token: SeDebugPrivilege 2232 inyjbrycn.exe Token: SeDebugPrivilege 2032 inhwnltjf.exe Token: SeDebugPrivilege 920 insohtodl.exe Token: SeDebugPrivilege 3308 indxawycz.exe Token: SeDebugPrivilege 4364 inrdysgih.exe Token: SeDebugPrivilege 3172 inetlfmxc.exe Token: SeDebugPrivilege 368 ingtgabri.exe Token: SeDebugPrivilege 2880 ingvetxyk.exe Token: SeDebugPrivilege 3584 inldtepix.exe Token: SeDebugPrivilege 2792 inrngsnzc.exe Token: SeDebugPrivilege 1428 inuqbjvqf.exe Token: SeDebugPrivilege 1456 ineybxzdp.exe Token: SeDebugPrivilege 1612 inbrulkss.exe Token: SeDebugPrivilege 4476 ingvnhoze.exe Token: SeDebugPrivilege 2040 infudswxj.exe Token: SeDebugPrivilege 2360 injmdckxk.exe Token: SeDebugPrivilege 3268 indpalewk.exe Token: SeDebugPrivilege 1236 inmnccutj.exe Token: SeDebugPrivilege 4224 inopeewva.exe Token: SeDebugPrivilege 5060 inrshhzyd.exe Token: SeDebugPrivilege 4928 inefvmlzb.exe Token: SeDebugPrivilege 4216 inxsdoolp.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeindwztgsi.exeinnqsrkjz.exeinwixlnmf.exeinykznpoh.exeinqmfrmyb.exeinpsutmlb.exeinsvxwpco.exeintfuikjc.exeinvhwkmle.exeinixpjqgj.exeinmprqjiy.exeinnuocedv.exeinaphxbit.exeinvrckwrg.exeinxtemyti.exeinfhthtec.exeincgzwjvl.exeinsrzztuj.exeinortslka.exeinruwvobn.exeinatwyxqd.exeinugvjlkd.exeineuxonvv.exeinzloqpih.exeinmtnbdcu.exeinogwahsa.exeinbqiycju.exepid process 4648 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe 1520 indwztgsi.exe 2452 innqsrkjz.exe 2268 inwixlnmf.exe 1404 inykznpoh.exe 4816 inqmfrmyb.exe 3960 inpsutmlb.exe 716 insvxwpco.exe 4836 intfuikjc.exe 4904 invhwkmle.exe 1204 inixpjqgj.exe 1120 inmprqjiy.exe 1768 innuocedv.exe 4516 inaphxbit.exe 2156 invrckwrg.exe 3812 inxtemyti.exe 1640 infhthtec.exe 1116 incgzwjvl.exe 4848 insrzztuj.exe 4992 inortslka.exe 3752 inruwvobn.exe 3848 inatwyxqd.exe 3068 inugvjlkd.exe 716 ineuxonvv.exe 4588 inzloqpih.exe 3400 inmtnbdcu.exe 2324 inogwahsa.exe 3572 inbqiycju.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exeindwztgsi.exeinnqsrkjz.exeinwixlnmf.exeinykznpoh.exeinqmfrmyb.exeinpsutmlb.exeinsvxwpco.exeintfuikjc.exeinvhwkmle.exeinixpjqgj.exeinmprqjiy.exeinnuocedv.exeinaphxbit.exeinvrckwrg.exeinxtemyti.exeinfhthtec.exeincgzwjvl.exeinsrzztuj.exeinortslka.exeinruwvobn.exeinatwyxqd.exedescription pid process target process PID 4648 wrote to memory of 1520 4648 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe indwztgsi.exe PID 4648 wrote to memory of 1520 4648 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe indwztgsi.exe PID 4648 wrote to memory of 1520 4648 4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe indwztgsi.exe PID 1520 wrote to memory of 2452 1520 indwztgsi.exe innqsrkjz.exe PID 1520 wrote to memory of 2452 1520 indwztgsi.exe innqsrkjz.exe PID 1520 wrote to memory of 2452 1520 indwztgsi.exe innqsrkjz.exe PID 2452 wrote to memory of 2268 2452 innqsrkjz.exe inwixlnmf.exe PID 2452 wrote to memory of 2268 2452 innqsrkjz.exe inwixlnmf.exe PID 2452 wrote to memory of 2268 2452 innqsrkjz.exe inwixlnmf.exe PID 2268 wrote to memory of 1404 2268 inwixlnmf.exe inykznpoh.exe PID 2268 wrote to memory of 1404 2268 inwixlnmf.exe inykznpoh.exe PID 2268 wrote to memory of 1404 2268 inwixlnmf.exe inykznpoh.exe PID 1404 wrote to memory of 4816 1404 inykznpoh.exe inqmfrmyb.exe PID 1404 wrote to memory of 4816 1404 inykznpoh.exe inqmfrmyb.exe PID 1404 wrote to memory of 4816 1404 inykznpoh.exe inqmfrmyb.exe PID 4816 wrote to memory of 3960 4816 inqmfrmyb.exe inpsutmlb.exe PID 4816 wrote to memory of 3960 4816 inqmfrmyb.exe inpsutmlb.exe PID 4816 wrote to memory of 3960 4816 inqmfrmyb.exe inpsutmlb.exe PID 3960 wrote to memory of 716 3960 inpsutmlb.exe insvxwpco.exe PID 3960 wrote to memory of 716 3960 inpsutmlb.exe insvxwpco.exe PID 3960 wrote to memory of 716 3960 inpsutmlb.exe insvxwpco.exe PID 716 wrote to memory of 4836 716 insvxwpco.exe intfuikjc.exe PID 716 wrote to memory of 4836 716 insvxwpco.exe intfuikjc.exe PID 716 wrote to memory of 4836 716 insvxwpco.exe intfuikjc.exe PID 4836 wrote to memory of 4904 4836 intfuikjc.exe invhwkmle.exe PID 4836 wrote to memory of 4904 4836 intfuikjc.exe invhwkmle.exe PID 4836 wrote to memory of 4904 4836 intfuikjc.exe invhwkmle.exe PID 4904 wrote to memory of 1204 4904 invhwkmle.exe inixpjqgj.exe PID 4904 wrote to memory of 1204 4904 invhwkmle.exe inixpjqgj.exe PID 4904 wrote to memory of 1204 4904 invhwkmle.exe inixpjqgj.exe PID 1204 wrote to memory of 1120 1204 inixpjqgj.exe inmprqjiy.exe PID 1204 wrote to memory of 1120 1204 inixpjqgj.exe inmprqjiy.exe PID 1204 wrote to memory of 1120 1204 inixpjqgj.exe inmprqjiy.exe PID 1120 wrote to memory of 1768 1120 inmprqjiy.exe innuocedv.exe PID 1120 wrote to memory of 1768 1120 inmprqjiy.exe innuocedv.exe PID 1120 wrote to memory of 1768 1120 inmprqjiy.exe innuocedv.exe PID 1768 wrote to memory of 4516 1768 innuocedv.exe inaphxbit.exe PID 1768 wrote to memory of 4516 1768 innuocedv.exe inaphxbit.exe PID 1768 wrote to memory of 4516 1768 innuocedv.exe inaphxbit.exe PID 4516 wrote to memory of 2156 4516 inaphxbit.exe invrckwrg.exe PID 4516 wrote to memory of 2156 4516 inaphxbit.exe invrckwrg.exe PID 4516 wrote to memory of 2156 4516 inaphxbit.exe invrckwrg.exe PID 2156 wrote to memory of 3812 2156 invrckwrg.exe inxtemyti.exe PID 2156 wrote to memory of 3812 2156 invrckwrg.exe inxtemyti.exe PID 2156 wrote to memory of 3812 2156 invrckwrg.exe inxtemyti.exe PID 3812 wrote to memory of 1640 3812 inxtemyti.exe infhthtec.exe PID 3812 wrote to memory of 1640 3812 inxtemyti.exe infhthtec.exe PID 3812 wrote to memory of 1640 3812 inxtemyti.exe infhthtec.exe PID 1640 wrote to memory of 1116 1640 infhthtec.exe incgzwjvl.exe PID 1640 wrote to memory of 1116 1640 infhthtec.exe incgzwjvl.exe PID 1640 wrote to memory of 1116 1640 infhthtec.exe incgzwjvl.exe PID 1116 wrote to memory of 4848 1116 incgzwjvl.exe insrzztuj.exe PID 1116 wrote to memory of 4848 1116 incgzwjvl.exe insrzztuj.exe PID 1116 wrote to memory of 4848 1116 incgzwjvl.exe insrzztuj.exe PID 4848 wrote to memory of 4992 4848 insrzztuj.exe inortslka.exe PID 4848 wrote to memory of 4992 4848 insrzztuj.exe inortslka.exe PID 4848 wrote to memory of 4992 4848 insrzztuj.exe inortslka.exe PID 4992 wrote to memory of 3752 4992 inortslka.exe inruwvobn.exe PID 4992 wrote to memory of 3752 4992 inortslka.exe inruwvobn.exe PID 4992 wrote to memory of 3752 4992 inortslka.exe inruwvobn.exe PID 3752 wrote to memory of 3848 3752 inruwvobn.exe inatwyxqd.exe PID 3752 wrote to memory of 3848 3752 inruwvobn.exe inatwyxqd.exe PID 3752 wrote to memory of 3848 3752 inruwvobn.exe inatwyxqd.exe PID 3848 wrote to memory of 3068 3848 inatwyxqd.exe inugvjlkd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe"C:\Users\Admin\AppData\Local\Temp\4438107e7516d7b7896a15b097c2b9e0cd9fb65e5b6813e10203d9865f86c79d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\indwztgsi.exeC:\Windows\system32\indwztgsi.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\innqsrkjz.exeC:\Windows\system32\innqsrkjz.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\inwixlnmf.exeC:\Windows\system32\inwixlnmf.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\inykznpoh.exeC:\Windows\system32\inykznpoh.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\inqmfrmyb.exeC:\Windows\system32\inqmfrmyb.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\inpsutmlb.exeC:\Windows\system32\inpsutmlb.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\insvxwpco.exeC:\Windows\system32\insvxwpco.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\intfuikjc.exeC:\Windows\system32\intfuikjc.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\invhwkmle.exeC:\Windows\system32\invhwkmle.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\inixpjqgj.exeC:\Windows\system32\inixpjqgj.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\inmprqjiy.exeC:\Windows\system32\inmprqjiy.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\innuocedv.exeC:\Windows\system32\innuocedv.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\inaphxbit.exeC:\Windows\system32\inaphxbit.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\invrckwrg.exeC:\Windows\system32\invrckwrg.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\inxtemyti.exeC:\Windows\system32\inxtemyti.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\infhthtec.exeC:\Windows\system32\infhthtec.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\incgzwjvl.exeC:\Windows\system32\incgzwjvl.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\insrzztuj.exeC:\Windows\system32\insrzztuj.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\inortslka.exeC:\Windows\system32\inortslka.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\inruwvobn.exeC:\Windows\system32\inruwvobn.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\inatwyxqd.exeC:\Windows\system32\inatwyxqd.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\inugvjlkd.exeC:\Windows\system32\inugvjlkd.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3068 -
C:\Windows\SysWOW64\ineuxonvv.exeC:\Windows\system32\ineuxonvv.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:716 -
C:\Windows\SysWOW64\inzloqpih.exeC:\Windows\system32\inzloqpih.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4588 -
C:\Windows\SysWOW64\inmtnbdcu.exeC:\Windows\system32\inmtnbdcu.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3400 -
C:\Windows\SysWOW64\inogwahsa.exeC:\Windows\system32\inogwahsa.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Windows\SysWOW64\inbqiycju.exeC:\Windows\system32\inbqiycju.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3572 -
C:\Windows\SysWOW64\inwsdlxsh.exeC:\Windows\system32\inwsdlxsh.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112 -
C:\Windows\SysWOW64\incvyzsfr.exeC:\Windows\system32\incvyzsfr.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\SysWOW64\inxiaqxbm.exeC:\Windows\system32\inxiaqxbm.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4352 -
C:\Windows\SysWOW64\indhxkwmb.exeC:\Windows\system32\indhxkwmb.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848 -
C:\Windows\SysWOW64\injhulmow.exeC:\Windows\system32\injhulmow.exe33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Windows\SysWOW64\intpaiupe.exeC:\Windows\system32\intpaiupe.exe34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:412 -
C:\Windows\SysWOW64\ingwzqpxx.exeC:\Windows\system32\ingwzqpxx.exe35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4332 -
C:\Windows\SysWOW64\inlsmacbt.exeC:\Windows\system32\inlsmacbt.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2856 -
C:\Windows\SysWOW64\inmeufqjy.exeC:\Windows\system32\inmeufqjy.exe37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1404 -
C:\Windows\SysWOW64\inbmkzbqa.exeC:\Windows\system32\inbmkzbqa.exe38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3464 -
C:\Windows\SysWOW64\inomzqrdt.exeC:\Windows\system32\inomzqrdt.exe39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2940 -
C:\Windows\SysWOW64\inbuxzyre.exeC:\Windows\system32\inbuxzyre.exe40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3428 -
C:\Windows\SysWOW64\indtwnmuu.exeC:\Windows\system32\indtwnmuu.exe41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2816 -
C:\Windows\SysWOW64\inhwoipfi.exeC:\Windows\system32\inhwoipfi.exe42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Windows\SysWOW64\inyjbrycn.exeC:\Windows\system32\inyjbrycn.exe43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2232 -
C:\Windows\SysWOW64\inhwnltjf.exeC:\Windows\system32\inhwnltjf.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\insohtodl.exeC:\Windows\system32\insohtodl.exe45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Windows\SysWOW64\indxawycz.exeC:\Windows\system32\indxawycz.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3308 -
C:\Windows\SysWOW64\inrdysgih.exeC:\Windows\system32\inrdysgih.exe47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4364 -
C:\Windows\SysWOW64\inetlfmxc.exeC:\Windows\system32\inetlfmxc.exe48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3172 -
C:\Windows\SysWOW64\ingtgabri.exeC:\Windows\system32\ingtgabri.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:368 -
C:\Windows\SysWOW64\ingvetxyk.exeC:\Windows\system32\ingvetxyk.exe50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2880 -
C:\Windows\SysWOW64\inldtepix.exeC:\Windows\system32\inldtepix.exe51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3584 -
C:\Windows\SysWOW64\inrngsnzc.exeC:\Windows\system32\inrngsnzc.exe52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Windows\SysWOW64\inuqbjvqf.exeC:\Windows\system32\inuqbjvqf.exe53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1428 -
C:\Windows\SysWOW64\ineybxzdp.exeC:\Windows\system32\ineybxzdp.exe54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Windows\SysWOW64\inbrulkss.exeC:\Windows\system32\inbrulkss.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\SysWOW64\ingvnhoze.exeC:\Windows\system32\ingvnhoze.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4476 -
C:\Windows\SysWOW64\infudswxj.exeC:\Windows\system32\infudswxj.exe57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\injmdckxk.exeC:\Windows\system32\injmdckxk.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2360 -
C:\Windows\SysWOW64\indpalewk.exeC:\Windows\system32\indpalewk.exe59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3268 -
C:\Windows\SysWOW64\inmnccutj.exeC:\Windows\system32\inmnccutj.exe60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Windows\SysWOW64\inopeewva.exeC:\Windows\system32\inopeewva.exe61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4224 -
C:\Windows\SysWOW64\inrshhzyd.exeC:\Windows\system32\inrshhzyd.exe62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5060 -
C:\Windows\SysWOW64\inefvmlzb.exeC:\Windows\system32\inefvmlzb.exe63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\SysWOW64\inxsdoolp.exeC:\Windows\system32\inxsdoolp.exe64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4216 -
C:\Windows\SysWOW64\injwnoaqy.exeC:\Windows\system32\injwnoaqy.exe65⤵
- Executes dropped EXE
PID:3944 -
C:\Windows\SysWOW64\insezthji.exeC:\Windows\system32\insezthji.exe66⤵
- Boot or Logon Autostart Execution: Active Setup
PID:2792 -
C:\Windows\SysWOW64\inxhvtpha.exeC:\Windows\system32\inxhvtpha.exe67⤵PID:1740
-
C:\Windows\SysWOW64\iniqzgcyz.exeC:\Windows\system32\iniqzgcyz.exe68⤵PID:4608
-
C:\Windows\SysWOW64\inyegrpfl.exeC:\Windows\system32\inyegrpfl.exe69⤵PID:1456
-
C:\Windows\SysWOW64\inpbwqegf.exeC:\Windows\system32\inpbwqegf.exe70⤵PID:2240
-
C:\Windows\SysWOW64\incrjzdkv.exeC:\Windows\system32\incrjzdkv.exe71⤵PID:5024
-
C:\Windows\SysWOW64\inbqostfv.exeC:\Windows\system32\inbqostfv.exe72⤵PID:636
-
C:\Windows\SysWOW64\inzvgovkd.exeC:\Windows\system32\inzvgovkd.exe73⤵PID:2172
-
C:\Windows\SysWOW64\inxrqyyst.exeC:\Windows\system32\inxrqyyst.exe74⤵PID:864
-
C:\Windows\SysWOW64\ingvzmksi.exeC:\Windows\system32\ingvzmksi.exe75⤵PID:5072
-
C:\Windows\SysWOW64\inkivmnpx.exeC:\Windows\system32\inkivmnpx.exe76⤵PID:4308
-
C:\Windows\SysWOW64\inthmqkqb.exeC:\Windows\system32\inthmqkqb.exe77⤵PID:1684
-
C:\Windows\SysWOW64\inhfsfaqh.exeC:\Windows\system32\inhfsfaqh.exe78⤵PID:4040
-
C:\Windows\SysWOW64\inzhpyfbx.exeC:\Windows\system32\inzhpyfbx.exe79⤵PID:2204
-
C:\Windows\SysWOW64\inewrcnnk.exeC:\Windows\system32\inewrcnnk.exe80⤵PID:1952
-
C:\Windows\SysWOW64\inertnmni.exeC:\Windows\system32\inertnmni.exe81⤵PID:980
-
C:\Windows\SysWOW64\inmkxopbr.exeC:\Windows\system32\inmkxopbr.exe82⤵PID:3420
-
C:\Windows\SysWOW64\inqcxrfhg.exeC:\Windows\system32\inqcxrfhg.exe83⤵
- Boot or Logon Autostart Execution: Active Setup
PID:1852 -
C:\Windows\SysWOW64\inqgdzfrf.exeC:\Windows\system32\inqgdzfrf.exe84⤵PID:3532
-
C:\Windows\SysWOW64\inlvjosms.exeC:\Windows\system32\inlvjosms.exe85⤵PID:1616
-
C:\Windows\SysWOW64\inahuhbcs.exeC:\Windows\system32\inahuhbcs.exe86⤵PID:4352
-
C:\Windows\SysWOW64\inzkcszdo.exeC:\Windows\system32\inzkcszdo.exe87⤵PID:4584
-
C:\Windows\SysWOW64\indtosnaj.exeC:\Windows\system32\indtosnaj.exe88⤵PID:3636
-
C:\Windows\SysWOW64\invuwaxma.exeC:\Windows\system32\invuwaxma.exe89⤵PID:1472
-
C:\Windows\SysWOW64\inyorihpp.exeC:\Windows\system32\inyorihpp.exe90⤵PID:4616
-
C:\Windows\SysWOW64\inadbobmd.exeC:\Windows\system32\inadbobmd.exe91⤵PID:4932
-
C:\Windows\SysWOW64\indlyubtu.exeC:\Windows\system32\indlyubtu.exe92⤵PID:4036
-
C:\Windows\SysWOW64\inwhpwale.exeC:\Windows\system32\inwhpwale.exe93⤵PID:3116
-
C:\Windows\SysWOW64\inupalliz.exeC:\Windows\system32\inupalliz.exe94⤵PID:220
-
C:\Windows\SysWOW64\inknedlyl.exeC:\Windows\system32\inknedlyl.exe95⤵PID:2900
-
C:\Windows\SysWOW64\inpfzcyeq.exeC:\Windows\system32\inpfzcyeq.exe96⤵PID:648
-
C:\Windows\SysWOW64\incsvmltt.exeC:\Windows\system32\incsvmltt.exe97⤵PID:1532
-
C:\Windows\SysWOW64\ineeenyiy.exeC:\Windows\system32\ineeenyiy.exe98⤵PID:4508
-
C:\Windows\SysWOW64\inbfyviuk.exeC:\Windows\system32\inbfyviuk.exe99⤵
- Boot or Logon Autostart Execution: Active Setup
PID:1952 -
C:\Windows\SysWOW64\iniizepdz.exeC:\Windows\system32\iniizepdz.exe100⤵PID:4724
-
C:\Windows\SysWOW64\infsuonoj.exeC:\Windows\system32\infsuonoj.exe101⤵PID:972
-
C:\Windows\SysWOW64\innlypqcs.exeC:\Windows\system32\innlypqcs.exe102⤵PID:1520
-
C:\Windows\SysWOW64\inbuzcxoc.exeC:\Windows\system32\inbuzcxoc.exe103⤵PID:1488
-
C:\Windows\SysWOW64\inwgusogd.exeC:\Windows\system32\inwgusogd.exe104⤵PID:2532
-
C:\Windows\SysWOW64\inxtleici.exeC:\Windows\system32\inxtleici.exe105⤵PID:4504
-
C:\Windows\SysWOW64\inoavpdfe.exeC:\Windows\system32\inoavpdfe.exe106⤵PID:2324
-
C:\Windows\SysWOW64\inngmlnpt.exeC:\Windows\system32\inngmlnpt.exe107⤵PID:3424
-
C:\Windows\SysWOW64\inyufnzuj.exeC:\Windows\system32\inyufnzuj.exe108⤵PID:5024
-
C:\Windows\SysWOW64\intcrvwiy.exeC:\Windows\system32\intcrvwiy.exe109⤵PID:5076
-
C:\Windows\SysWOW64\inhwfuyzl.exeC:\Windows\system32\inhwfuyzl.exe110⤵PID:3864
-
C:\Windows\SysWOW64\inlofemzm.exeC:\Windows\system32\inlofemzm.exe111⤵PID:4404
-
C:\Windows\SysWOW64\injkrqgyq.exeC:\Windows\system32\injkrqgyq.exe112⤵PID:3088
-
C:\Windows\SysWOW64\infumgnyd.exeC:\Windows\system32\infumgnyd.exe113⤵
- Boot or Logon Autostart Execution: Active Setup
PID:2360 -
C:\Windows\SysWOW64\indvjzcoq.exeC:\Windows\system32\indvjzcoq.exe114⤵PID:596
-
C:\Windows\SysWOW64\inmvbdomc.exeC:\Windows\system32\inmvbdomc.exe115⤵PID:3012
-
C:\Windows\SysWOW64\inpleqlxa.exeC:\Windows\system32\inpleqlxa.exe116⤵PID:3304
-
C:\Windows\SysWOW64\inutvwllh.exeC:\Windows\system32\inutvwllh.exe117⤵PID:2548
-
C:\Windows\SysWOW64\inocokdvj.exeC:\Windows\system32\inocokdvj.exe118⤵PID:4604
-
C:\Windows\SysWOW64\inazpsjiq.exeC:\Windows\system32\inazpsjiq.exe119⤵PID:3136
-
C:\Windows\SysWOW64\infdqdofu.exeC:\Windows\system32\infdqdofu.exe120⤵PID:972
-
C:\Windows\SysWOW64\insbquvhx.exeC:\Windows\system32\insbquvhx.exe121⤵PID:3580
-
C:\Windows\SysWOW64\inhjvjvge.exeC:\Windows\system32\inhjvjvge.exe122⤵PID:3680
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-