Analysis
-
max time kernel
41s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
09-02-2021 21:57
Static task
static1
Behavioral task
behavioral1
Sample
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe
Resource
win10v20201028
General
-
Target
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe
-
Size
157KB
-
MD5
85cd7c6931b44a14f4899dfd0039e8b4
-
SHA1
5822f65dec879ba585112976a632b2c4435abf90
-
SHA256
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb
-
SHA512
9a8173eb7f08c1c9e2c9b66b2866c08a5e97bc16ceb3644a55cc9da17dec1b9941f0e30c23994952d31b3b60911d13e7cc20810ecada35cdca4bff72ccad5a15
Malware Config
Extracted
C:\Boot\bg-BG\read_me_lkd.txt
http://6x7dp6h3w6q3ugjv4yv5gycj3femb24kysgry5b44hhgfwc5ml5qrdad.onion/d87c3f9baf85b2e9ab2a824bb78868294e19992e2e26b54f248abfa73c42a7c0
Signatures
-
HelloKitty Ransomware
Ransomware family which has been active since late 2020, and in early 2021 a variant compromised the CDProjektRed game studio.
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exedescription ioc process File renamed C:\Users\Admin\Pictures\LimitDebug.tif => C:\Users\Admin\Pictures\LimitDebug.tif.crypted fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe File renamed C:\Users\Admin\Pictures\StopFind.raw => C:\Users\Admin\Pictures\StopFind.raw.crypted fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe File renamed C:\Users\Admin\Pictures\UnblockConnect.tif => C:\Users\Admin\Pictures\UnblockConnect.tif.crypted fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe File renamed C:\Users\Admin\Pictures\UnpublishSet.crw => C:\Users\Admin\Pictures\UnpublishSet.crw.crypted fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 41 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4116 taskkill.exe 5344 taskkill.exe 416 taskkill.exe 5152 taskkill.exe 5992 taskkill.exe 5660 taskkill.exe 5260 taskkill.exe 4968 taskkill.exe 3720 taskkill.exe 740 taskkill.exe 3668 taskkill.exe 2600 taskkill.exe 4468 taskkill.exe 5748 taskkill.exe 1176 taskkill.exe 5872 taskkill.exe 4488 taskkill.exe 520 taskkill.exe 4324 taskkill.exe 4404 taskkill.exe 5952 taskkill.exe 4928 taskkill.exe 2312 taskkill.exe 1320 taskkill.exe 4592 taskkill.exe 6072 taskkill.exe 4972 taskkill.exe 6092 taskkill.exe 5128 taskkill.exe 500 taskkill.exe 1648 taskkill.exe 4060 taskkill.exe 4524 taskkill.exe 5604 taskkill.exe 3832 taskkill.exe 4860 taskkill.exe 200 taskkill.exe 4176 taskkill.exe 5156 taskkill.exe 6100 taskkill.exe 4836 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exepid process 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exepid process 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exevssvc.exedescription pid process Token: SeDebugPrivilege 416 taskkill.exe Token: SeDebugPrivilege 3720 taskkill.exe Token: SeDebugPrivilege 740 taskkill.exe Token: SeDebugPrivilege 1648 taskkill.exe Token: SeDebugPrivilege 500 taskkill.exe Token: SeDebugPrivilege 3668 taskkill.exe Token: SeDebugPrivilege 4060 taskkill.exe Token: SeDebugPrivilege 2600 taskkill.exe Token: SeDebugPrivilege 2312 taskkill.exe Token: SeDebugPrivilege 520 taskkill.exe Token: SeDebugPrivilege 200 taskkill.exe Token: SeDebugPrivilege 1176 taskkill.exe Token: SeDebugPrivilege 1320 taskkill.exe Token: SeDebugPrivilege 4116 taskkill.exe Token: SeDebugPrivilege 4176 taskkill.exe Token: SeDebugPrivilege 4324 taskkill.exe Token: SeDebugPrivilege 4404 taskkill.exe Token: SeDebugPrivilege 4468 taskkill.exe Token: SeDebugPrivilege 4524 taskkill.exe Token: SeDebugPrivilege 4592 taskkill.exe Token: SeDebugPrivilege 5152 taskkill.exe Token: SeDebugPrivilege 5660 taskkill.exe Token: SeDebugPrivilege 6072 taskkill.exe Token: SeDebugPrivilege 5604 taskkill.exe Token: SeDebugPrivilege 5952 taskkill.exe Token: SeDebugPrivilege 6092 taskkill.exe Token: SeDebugPrivilege 5156 taskkill.exe Token: SeDebugPrivilege 6100 taskkill.exe Token: SeDebugPrivilege 4836 taskkill.exe Token: SeDebugPrivilege 5260 taskkill.exe Token: SeDebugPrivilege 5992 taskkill.exe Token: SeDebugPrivilege 4928 taskkill.exe Token: SeDebugPrivilege 5872 taskkill.exe Token: SeDebugPrivilege 4968 taskkill.exe Token: SeDebugPrivilege 5128 taskkill.exe Token: SeDebugPrivilege 3832 taskkill.exe Token: SeDebugPrivilege 4972 taskkill.exe Token: SeDebugPrivilege 4488 taskkill.exe Token: SeDebugPrivilege 5344 taskkill.exe Token: SeDebugPrivilege 5748 taskkill.exe Token: SeDebugPrivilege 4860 taskkill.exe Token: SeBackupPrivilege 2116 vssvc.exe Token: SeRestorePrivilege 2116 vssvc.exe Token: SeAuditPrivilege 2116 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exedescription pid process target process PID 580 wrote to memory of 3720 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 3720 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 3720 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 416 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 416 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 416 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 740 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 740 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 740 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 500 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 500 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 500 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 1648 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 1648 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 1648 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 3668 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 3668 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 3668 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4060 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4060 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4060 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 2600 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 2600 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 2600 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 200 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 200 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 200 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 2312 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 2312 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 2312 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 520 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 520 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 520 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 1176 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 1176 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 1176 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 1320 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 1320 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 1320 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4116 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4116 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4116 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4176 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4176 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4176 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4324 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4324 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4324 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4404 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4404 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4404 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4468 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4468 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4468 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4524 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4524 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4524 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4592 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4592 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4592 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe taskkill.exe PID 580 wrote to memory of 4664 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe net.exe PID 580 wrote to memory of 4664 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe net.exe PID 580 wrote to memory of 4664 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe net.exe PID 580 wrote to memory of 4716 580 fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe"C:\Users\Admin\AppData\Local\Temp\fa722d0667418d68c4935e1461010a8f730f02fa1f595ee68bd0768fd5d1f8bb.exe"1⤵
- Modifies extensions of user files
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im mysql*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im dsa*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:416
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im ds_monitor*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:500
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Notifier*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Ntrtscan*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:740
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im TmListen*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im iVPAgent*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im CNTAoSMgr*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im IBM*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:200
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im bes10*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im black*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:520
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im robo*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1176
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im copy*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im store.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im sql*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im vee*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im wrsa*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4404
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im wrsa.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im postg*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im sage*2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop MSSQLServerADHelper1002⤵PID:4664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper1003⤵PID:4804
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop MSSQL$ISARS2⤵PID:4716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$ISARS3⤵PID:4848
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop MSSQL$MSFW2⤵PID:4776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$MSFW3⤵PID:4904
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SQLAgent$ISARS2⤵PID:4864
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$ISARS3⤵PID:5008
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SQLAgent$MSFW2⤵PID:4960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$MSFW3⤵PID:5072
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SQLBrowser2⤵PID:5020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser3⤵PID:3724
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop ReportServer$ISARS2⤵PID:5096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$ISARS3⤵PID:4616
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SQLWriter2⤵PID:1828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter3⤵PID:3560
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop WinDefend2⤵PID:4788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WinDefend3⤵PID:4680
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop mr2kserv2⤵PID:3980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mr2kserv3⤵PID:5192
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop MSExchangeADTopology2⤵PID:5124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeADTopology3⤵PID:5320
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop MSExchangeFBA2⤵PID:5148
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeFBA3⤵PID:5292
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop MSExchangeIS2⤵PID:5232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeIS3⤵PID:5404
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop ShadowProtectSvc2⤵PID:5416
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ShadowProtectSvc3⤵PID:5568
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SPAdminV42⤵PID:5504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SPAdminV43⤵PID:5708
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop MSExchangeSA2⤵PID:5304
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SPTimerV42⤵PID:5588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SPTimerV43⤵PID:5940
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SPUserCodeV42⤵PID:5640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SPUserCodeV43⤵PID:6000
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SPTraceV42⤵PID:5608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SPTraceV43⤵PID:5980
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SPSearch42⤵PID:5720
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SPSearch43⤵PID:6056
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop IISADMIN2⤵PID:5796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IISADMIN3⤵PID:6108
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop MSSQLServerADHelper1002⤵PID:5756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper1003⤵PID:2264
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SPWriterV42⤵PID:5664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SPWriterV43⤵PID:6068
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop firebirdguardiandefaultinstance2⤵PID:5960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop firebirdguardiandefaultinstance3⤵PID:4920
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop ibmiasrw2⤵PID:6136
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ibmiasrw3⤵PID:2656
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QBCFMonitorService2⤵PID:5220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBCFMonitorService3⤵PID:4688
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QBVSS2⤵PID:3088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBVSS3⤵PID:4784
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "IBM Domino Server(CProgramFilesIBMDominodata)"2⤵PID:4420
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IBM Domino Server(CProgramFilesIBMDominodata)"3⤵PID:5392
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "IBM Domino Diagnostics(CProgramFilesIBMDomino)"2⤵PID:4692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IBM Domino Diagnostics(CProgramFilesIBMDomino)"3⤵PID:2604
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QBPOSDBServiceV122⤵PID:5396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBPOSDBServiceV123⤵PID:5000
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop IISADMIN2⤵PID:4988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IISADMIN3⤵PID:5384
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Simply Accounting Database Connection Manager"2⤵PID:2184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Simply Accounting Database Connection Manager"3⤵PID:4200
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB12⤵PID:4892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB13⤵PID:5556
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB22⤵PID:5140
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB23⤵PID:5280
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB32⤵PID:3976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB33⤵PID:5500
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB42⤵PID:5088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB43⤵PID:5764
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB52⤵PID:5208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB53⤵PID:5544
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB62⤵PID:5852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB63⤵PID:5580
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB72⤵PID:5988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB73⤵PID:5832
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB82⤵PID:5444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB83⤵PID:6080
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB92⤵PID:5732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB93⤵PID:5896
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB102⤵PID:5612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB103⤵PID:5616
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB112⤵PID:5700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB113⤵PID:5908
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB122⤵PID:5652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB123⤵PID:5760
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB132⤵PID:5724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB133⤵PID:5836
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB142⤵PID:4740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB143⤵PID:4916
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB152⤵PID:6012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB153⤵PID:5432
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB162⤵PID:3948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB163⤵PID:5024
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB172⤵PID:4872
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB173⤵PID:4548
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB182⤵PID:996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB183⤵PID:5328
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB192⤵PID:4888
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB193⤵PID:4976
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB202⤵PID:5324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB203⤵PID:2188
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB212⤵PID:5004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB213⤵PID:5160
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB222⤵PID:5428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB223⤵PID:5456
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB242⤵PID:4908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB243⤵PID:5180
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB232⤵PID:732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB233⤵PID:5084
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop QuickBooksDB252⤵PID:4796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QuickBooksDB253⤵PID:5264
-
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "2512"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5152
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "2512"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5660
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "2512"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6072
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "4888"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5604
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "4888"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5952
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "4888"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6092
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "5324"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5156
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "5324"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6100
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "5324"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "5004"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5260
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "5004"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5992
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "5004"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4928
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "5428"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5872
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "5428"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "5428"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5128
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "4908"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "4908"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "4908"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "4796"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5344
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "4796"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5748
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /PID "4796"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSA1⤵PID:5476
-
\??\c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:640
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2116