Analysis
-
max time kernel
153s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe
Resource
win10v2004-20221111-en
General
-
Target
998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe
-
Size
165KB
-
MD5
e0211b03e28d1041cb722bb51525b4c6
-
SHA1
faeac70d770a21f4ca2cf6bb2769e9fdc269f0b6
-
SHA256
998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075
-
SHA512
0e15a5b2d945239f04cff69b947424309b48b68495b019072d04f2ae83354e23d6c9bbe58f56429210014775f96b2d7daadc1dc3fa572532341f1fb70ab6181e
-
SSDEEP
3072:cdYdOKi6z26w28wZHAovE7xLEfDxj2RJ9iOG3YKg3vRpC1Ze:3ZFzY28w5U7xLE9m4a35pCf
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1632 netsh.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2040 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1260 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1096 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1444 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1844 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1764 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1316 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 692 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1664 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1456 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 628 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 2028 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1964 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1500 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 668 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 888 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1828 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1736 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 948 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1660 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 792 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1152 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1456 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 2008 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 2028 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1964 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 300 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 824 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 188 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1456 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 2008 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 2028 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 604 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1328 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 1496 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 2040 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1260 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1096 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1444 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1844 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1764 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1316 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 692 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1664 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1456 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 628 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 2028 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1964 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1500 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 668 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 888 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1828 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1736 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 948 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1660 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 792 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1152 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1456 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 2008 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 2028 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1964 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 300 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 824 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 188 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1456 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 2008 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 2028 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 604 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1328 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe Token: SeDebugPrivilege 1496 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1260 2040 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 28 PID 2040 wrote to memory of 1260 2040 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 28 PID 2040 wrote to memory of 1260 2040 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 28 PID 1260 wrote to memory of 1096 1260 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 29 PID 1260 wrote to memory of 1096 1260 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 29 PID 1260 wrote to memory of 1096 1260 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 29 PID 1096 wrote to memory of 1632 1096 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 30 PID 1096 wrote to memory of 1632 1096 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 30 PID 1096 wrote to memory of 1632 1096 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 30 PID 1096 wrote to memory of 1444 1096 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 32 PID 1096 wrote to memory of 1444 1096 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 32 PID 1096 wrote to memory of 1444 1096 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 32 PID 1444 wrote to memory of 1844 1444 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 33 PID 1444 wrote to memory of 1844 1444 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 33 PID 1444 wrote to memory of 1844 1444 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 33 PID 1844 wrote to memory of 1764 1844 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 34 PID 1844 wrote to memory of 1764 1844 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 34 PID 1844 wrote to memory of 1764 1844 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 34 PID 1764 wrote to memory of 1316 1764 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 35 PID 1764 wrote to memory of 1316 1764 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 35 PID 1764 wrote to memory of 1316 1764 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 35 PID 1316 wrote to memory of 692 1316 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 36 PID 1316 wrote to memory of 692 1316 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 36 PID 1316 wrote to memory of 692 1316 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 36 PID 692 wrote to memory of 1664 692 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 37 PID 692 wrote to memory of 1664 692 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 37 PID 692 wrote to memory of 1664 692 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 37 PID 1664 wrote to memory of 1456 1664 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 38 PID 1664 wrote to memory of 1456 1664 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 38 PID 1664 wrote to memory of 1456 1664 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 38 PID 1456 wrote to memory of 628 1456 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 39 PID 1456 wrote to memory of 628 1456 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 39 PID 1456 wrote to memory of 628 1456 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 39 PID 628 wrote to memory of 2028 628 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 40 PID 628 wrote to memory of 2028 628 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 40 PID 628 wrote to memory of 2028 628 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 40 PID 2028 wrote to memory of 1964 2028 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 41 PID 2028 wrote to memory of 1964 2028 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 41 PID 2028 wrote to memory of 1964 2028 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 41 PID 1964 wrote to memory of 1500 1964 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 42 PID 1964 wrote to memory of 1500 1964 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 42 PID 1964 wrote to memory of 1500 1964 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 42 PID 1500 wrote to memory of 668 1500 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 43 PID 1500 wrote to memory of 668 1500 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 43 PID 1500 wrote to memory of 668 1500 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 43 PID 668 wrote to memory of 888 668 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 44 PID 668 wrote to memory of 888 668 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 44 PID 668 wrote to memory of 888 668 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 44 PID 888 wrote to memory of 1828 888 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 45 PID 888 wrote to memory of 1828 888 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 45 PID 888 wrote to memory of 1828 888 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 45 PID 1828 wrote to memory of 1736 1828 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 46 PID 1828 wrote to memory of 1736 1828 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 46 PID 1828 wrote to memory of 1736 1828 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 46 PID 1736 wrote to memory of 948 1736 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 47 PID 1736 wrote to memory of 948 1736 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 47 PID 1736 wrote to memory of 948 1736 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 47 PID 948 wrote to memory of 1660 948 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 48 PID 948 wrote to memory of 1660 948 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 48 PID 948 wrote to memory of 1660 948 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 48 PID 1660 wrote to memory of 792 1660 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 49 PID 1660 wrote to memory of 792 1660 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 49 PID 1660 wrote to memory of 792 1660 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 49 PID 792 wrote to memory of 1152 792 998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe"C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe" "998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe" ENABLE4⤵
- Modifies Windows Firewall
PID:1632
-
-
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe7⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe9⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe10⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe14⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe15⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe16⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe17⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe18⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe19⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe20⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe21⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe23⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe24⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe25⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe26⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe27⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:300 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe28⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:824 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe29⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:188 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe30⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe31⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe32⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe33⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:604 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe34⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe35⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exeC:\Users\Admin\AppData\Local\Temp\998e00d4f5c64f0277727e0fce8e5d13f16cb1961ee7d83d278fcbc6772a9075.exe36⤵PID:1816
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-