Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 09:08
Behavioral task
behavioral1
Sample
4723efdca1f69b04580a11467bb6240c7a38fffe1e6d5bb8d7179bee837b2fc7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4723efdca1f69b04580a11467bb6240c7a38fffe1e6d5bb8d7179bee837b2fc7.exe
Resource
win10v2004-20220812-en
General
-
Target
4723efdca1f69b04580a11467bb6240c7a38fffe1e6d5bb8d7179bee837b2fc7.exe
-
Size
374KB
-
MD5
6509cbef69f53a8d7c7b0ce827214c99
-
SHA1
82d1fab5531d9ea63f92c7db89683c514b276886
-
SHA256
4723efdca1f69b04580a11467bb6240c7a38fffe1e6d5bb8d7179bee837b2fc7
-
SHA512
28fbf20d2520e34ee49519701aea6b3c007b9f44287a07ee05a4e5bd72c58edbcd8f3a6085a763e44ade9abfdf2656fec782ca6eb7f9520d847788a890474a9a
-
SSDEEP
6144:5YLibtVwumPlJewcLSmjlCExWrBF65RjRbsNW0kj1+EqJ+nTnmUA7pkAmIQyO2+h:HbtO58wclRr4u5HsN4x+BOmUArhORRT3
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2764 g1.exe 4796 g1.exe 1988 g1.exe 3388 g1.exe 1712 g1.exe 3320 g1.exe 220 g1.exe 4024 g1.exe 2904 g1.exe 4236 g1.exe 3364 g1.exe 4492 g1.exe 4952 g1.exe 4604 g1.exe 2772 g1.exe 4184 g1.exe 2996 g1.exe 1204 g1.exe 3192 g1.exe 5000 g1.exe 1684 g1.exe 2712 g1.exe 2512 g1.exe 2132 g1.exe 2768 g1.exe 456 g1.exe 3808 g1.exe 1952 g1.exe 2784 g1.exe 1140 g1.exe 3336 g1.exe 1276 g1.exe 1668 g1.exe 4756 g1.exe 2356 g1.exe 3976 g1.exe 1960 g1.exe 4536 g1.exe 3440 g1.exe 1944 g1.exe 1568 g1.exe 3320 g1.exe 316 g1.exe 3896 g1.exe 2592 g1.exe 4236 g1.exe 3364 g1.exe 1948 g1.exe 3448 g1.exe 1376 g1.exe 3776 g1.exe 3492 g1.exe 4376 g1.exe 1452 g1.exe 4528 g1.exe 2324 g1.exe 1460 g1.exe 1684 g1.exe 2712 g1.exe 3316 g1.exe 4708 g1.exe 2832 g1.exe 788 g1.exe 2276 g1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 4723efdca1f69b04580a11467bb6240c7a38fffe1e6d5bb8d7179bee837b2fc7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2764 g1.exe Token: SeDebugPrivilege 4796 g1.exe Token: SeDebugPrivilege 1988 g1.exe Token: SeDebugPrivilege 3388 g1.exe Token: SeDebugPrivilege 1712 g1.exe Token: SeDebugPrivilege 3320 g1.exe Token: SeDebugPrivilege 220 g1.exe Token: SeDebugPrivilege 4024 g1.exe Token: SeDebugPrivilege 2904 g1.exe Token: SeDebugPrivilege 4236 g1.exe Token: SeDebugPrivilege 3364 g1.exe Token: SeDebugPrivilege 4492 g1.exe Token: SeDebugPrivilege 4952 g1.exe Token: SeDebugPrivilege 4604 g1.exe Token: SeDebugPrivilege 2772 g1.exe Token: SeDebugPrivilege 4184 g1.exe Token: SeDebugPrivilege 2996 g1.exe Token: SeDebugPrivilege 1204 g1.exe Token: SeDebugPrivilege 3192 g1.exe Token: SeDebugPrivilege 5000 g1.exe Token: SeDebugPrivilege 1684 g1.exe Token: SeDebugPrivilege 2712 g1.exe Token: SeDebugPrivilege 2512 g1.exe Token: SeDebugPrivilege 2132 g1.exe Token: SeDebugPrivilege 2768 g1.exe Token: SeDebugPrivilege 456 g1.exe Token: SeDebugPrivilege 3808 g1.exe Token: SeDebugPrivilege 1952 g1.exe Token: SeDebugPrivilege 2784 g1.exe Token: SeDebugPrivilege 1140 g1.exe Token: SeDebugPrivilege 3336 g1.exe Token: SeDebugPrivilege 1276 g1.exe Token: SeDebugPrivilege 1668 g1.exe Token: SeDebugPrivilege 4756 g1.exe Token: SeDebugPrivilege 2356 g1.exe Token: SeDebugPrivilege 3976 g1.exe Token: SeDebugPrivilege 1960 g1.exe Token: SeDebugPrivilege 4536 g1.exe Token: SeDebugPrivilege 3440 g1.exe Token: SeDebugPrivilege 1944 g1.exe Token: SeDebugPrivilege 1568 g1.exe Token: SeDebugPrivilege 3320 g1.exe Token: SeDebugPrivilege 316 g1.exe Token: SeDebugPrivilege 3896 g1.exe Token: SeDebugPrivilege 2592 g1.exe Token: SeDebugPrivilege 4236 g1.exe Token: SeDebugPrivilege 3364 g1.exe Token: SeDebugPrivilege 1948 g1.exe Token: SeDebugPrivilege 3448 g1.exe Token: SeDebugPrivilege 1376 g1.exe Token: SeDebugPrivilege 3776 g1.exe Token: SeDebugPrivilege 3492 g1.exe Token: SeDebugPrivilege 4376 g1.exe Token: SeDebugPrivilege 1452 g1.exe Token: SeDebugPrivilege 4528 g1.exe Token: SeDebugPrivilege 2324 g1.exe Token: SeDebugPrivilege 1460 g1.exe Token: SeDebugPrivilege 1684 g1.exe Token: SeDebugPrivilege 2712 g1.exe Token: SeDebugPrivilege 3316 g1.exe Token: SeDebugPrivilege 4708 g1.exe Token: SeDebugPrivilege 2832 g1.exe Token: SeDebugPrivilege 788 g1.exe Token: SeDebugPrivilege 2276 g1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4632 wrote to memory of 2764 4632 4723efdca1f69b04580a11467bb6240c7a38fffe1e6d5bb8d7179bee837b2fc7.exe 82 PID 4632 wrote to memory of 2764 4632 4723efdca1f69b04580a11467bb6240c7a38fffe1e6d5bb8d7179bee837b2fc7.exe 82 PID 2764 wrote to memory of 4796 2764 g1.exe 84 PID 2764 wrote to memory of 4796 2764 g1.exe 84 PID 4796 wrote to memory of 1988 4796 g1.exe 85 PID 4796 wrote to memory of 1988 4796 g1.exe 85 PID 1988 wrote to memory of 3388 1988 g1.exe 86 PID 1988 wrote to memory of 3388 1988 g1.exe 86 PID 3388 wrote to memory of 1712 3388 g1.exe 87 PID 3388 wrote to memory of 1712 3388 g1.exe 87 PID 1712 wrote to memory of 3320 1712 g1.exe 88 PID 1712 wrote to memory of 3320 1712 g1.exe 88 PID 3320 wrote to memory of 220 3320 g1.exe 89 PID 3320 wrote to memory of 220 3320 g1.exe 89 PID 220 wrote to memory of 4024 220 g1.exe 90 PID 220 wrote to memory of 4024 220 g1.exe 90 PID 4024 wrote to memory of 2904 4024 g1.exe 91 PID 4024 wrote to memory of 2904 4024 g1.exe 91 PID 2904 wrote to memory of 4236 2904 g1.exe 92 PID 2904 wrote to memory of 4236 2904 g1.exe 92 PID 4236 wrote to memory of 3364 4236 g1.exe 93 PID 4236 wrote to memory of 3364 4236 g1.exe 93 PID 3364 wrote to memory of 4492 3364 g1.exe 94 PID 3364 wrote to memory of 4492 3364 g1.exe 94 PID 4492 wrote to memory of 4952 4492 g1.exe 95 PID 4492 wrote to memory of 4952 4492 g1.exe 95 PID 4952 wrote to memory of 4604 4952 g1.exe 96 PID 4952 wrote to memory of 4604 4952 g1.exe 96 PID 4604 wrote to memory of 2772 4604 g1.exe 97 PID 4604 wrote to memory of 2772 4604 g1.exe 97 PID 2772 wrote to memory of 4184 2772 g1.exe 98 PID 2772 wrote to memory of 4184 2772 g1.exe 98 PID 4184 wrote to memory of 2996 4184 g1.exe 99 PID 4184 wrote to memory of 2996 4184 g1.exe 99 PID 2996 wrote to memory of 1204 2996 g1.exe 101 PID 2996 wrote to memory of 1204 2996 g1.exe 101 PID 1204 wrote to memory of 3192 1204 g1.exe 102 PID 1204 wrote to memory of 3192 1204 g1.exe 102 PID 3192 wrote to memory of 5000 3192 g1.exe 103 PID 3192 wrote to memory of 5000 3192 g1.exe 103 PID 5000 wrote to memory of 1684 5000 g1.exe 228 PID 5000 wrote to memory of 1684 5000 g1.exe 228 PID 1684 wrote to memory of 2712 1684 g1.exe 142 PID 1684 wrote to memory of 2712 1684 g1.exe 142 PID 2712 wrote to memory of 2512 2712 g1.exe 106 PID 2712 wrote to memory of 2512 2712 g1.exe 106 PID 2512 wrote to memory of 2132 2512 g1.exe 107 PID 2512 wrote to memory of 2132 2512 g1.exe 107 PID 2132 wrote to memory of 2768 2132 g1.exe 230 PID 2132 wrote to memory of 2768 2132 g1.exe 230 PID 2768 wrote to memory of 456 2768 g1.exe 109 PID 2768 wrote to memory of 456 2768 g1.exe 109 PID 456 wrote to memory of 3808 456 g1.exe 110 PID 456 wrote to memory of 3808 456 g1.exe 110 PID 3808 wrote to memory of 1952 3808 g1.exe 111 PID 3808 wrote to memory of 1952 3808 g1.exe 111 PID 1952 wrote to memory of 2784 1952 g1.exe 112 PID 1952 wrote to memory of 2784 1952 g1.exe 112 PID 2784 wrote to memory of 1140 2784 g1.exe 113 PID 2784 wrote to memory of 1140 2784 g1.exe 113 PID 1140 wrote to memory of 3336 1140 g1.exe 114 PID 1140 wrote to memory of 3336 1140 g1.exe 114 PID 3336 wrote to memory of 1276 3336 g1.exe 115 PID 3336 wrote to memory of 1276 3336 g1.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\4723efdca1f69b04580a11467bb6240c7a38fffe1e6d5bb8d7179bee837b2fc7.exe"C:\Users\Admin\AppData\Local\Temp\4723efdca1f69b04580a11467bb6240c7a38fffe1e6d5bb8d7179bee837b2fc7.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\g1.exe"C:\Users\Admin\AppData\Local\Temp\g1.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe22⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe23⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe26⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe36⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe37⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe38⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe39⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe43⤵PID:3320
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe44⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe45⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe48⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe50⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe54⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe59⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:788 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe65⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe66⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe67⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe68⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe69⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe70⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe71⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe72⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe73⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe74⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe75⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe76⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe77⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe78⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe79⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe80⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe81⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe82⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe83⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe84⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe85⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:316 -
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe86⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe87⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe88⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe89⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe90⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe91⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe92⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe93⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe94⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe95⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe96⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe97⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe98⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe99⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe100⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe101⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe102⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe103⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe104⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe105⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe106⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe107⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe108⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe109⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe110⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe111⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe112⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe113⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe114⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe115⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe116⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe117⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe118⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe119⤵PID:4796
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe120⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe121⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\g1.exeC:\Users\Admin\AppData\Local\Temp\g1.exe122⤵PID:540
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-