Analysis
-
max time kernel
187s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe
Resource
win7-20221111-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe
Resource
win10v2004-20221111-en
4 signatures
150 seconds
General
-
Target
a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe
-
Size
25KB
-
MD5
be121c14912b8b866283e0c4845b2c3a
-
SHA1
b406ab7f819a961b24ae994ce43e5459bd764ad5
-
SHA256
a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344
-
SHA512
197aba926af9da92c3acaf37f379986fee1bc3a89ae522908c9e51bf7c0a7d2673033266fef193dd62ee74e29219e1281da1879bc0ba053e299147dc40b9b3ee
-
SSDEEP
384:4F/wt1EkmlMvGfanyyL/rh6o8m0G8oF62m9h:40Wuyqjh6o8mt14dh
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1996 vmnat.exe 1984 vmnat.exe 1120 vmnat.exe 768 vmnat.exe 1108 vmnat.exe 680 vmnat.exe 892 vmnat.exe 620 vmnat.exe 1152 vmnat.exe 1552 vmnat.exe 1544 vmnat.exe 1528 vmnat.exe 1372 vmnat.exe 688 vmnat.exe 572 vmnat.exe 1192 vmnat.exe 924 vmnat.exe 1328 vmnat.exe 2016 vmnat.exe 1264 vmnat.exe 776 vmnat.exe 1008 vmnat.exe 1644 vmnat.exe 1652 vmnat.exe 1616 vmnat.exe 1912 vmnat.exe 2040 vmnat.exe 952 vmnat.exe 1608 vmnat.exe 1200 vmnat.exe 1988 vmnat.exe 948 vmnat.exe 1496 vmnat.exe 1492 vmnat.exe 884 vmnat.exe 860 vmnat.exe 580 vmnat.exe 1188 vmnat.exe 1700 vmnat.exe 1056 vmnat.exe 628 vmnat.exe 1856 vmnat.exe 1992 vmnat.exe 1452 vmnat.exe 772 vmnat.exe 1356 vmnat.exe 852 vmnat.exe 1576 vmnat.exe 432 vmnat.exe 1476 vmnat.exe 388 vmnat.exe 1624 vmnat.exe 972 vmnat.exe 1520 vmnat.exe 1920 vmnat.exe 1020 vmnat.exe 240 vmnat.exe 1752 vmnat.exe 1924 vmnat.exe 1092 vmnat.exe 1660 vmnat.exe 1612 vmnat.exe 956 vmnat.exe 1028 vmnat.exe -
Deletes itself 1 IoCs
pid Process 4444 cmd.exe -
Loads dropped DLL 64 IoCs
pid Process 2028 a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe 2028 a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe 1996 vmnat.exe 1996 vmnat.exe 1984 vmnat.exe 1984 vmnat.exe 1120 vmnat.exe 1120 vmnat.exe 768 vmnat.exe 768 vmnat.exe 1108 vmnat.exe 1108 vmnat.exe 680 vmnat.exe 680 vmnat.exe 892 vmnat.exe 892 vmnat.exe 620 vmnat.exe 620 vmnat.exe 1152 vmnat.exe 1152 vmnat.exe 1552 vmnat.exe 1552 vmnat.exe 1544 vmnat.exe 1544 vmnat.exe 1528 vmnat.exe 1528 vmnat.exe 1372 vmnat.exe 1372 vmnat.exe 688 vmnat.exe 688 vmnat.exe 572 vmnat.exe 572 vmnat.exe 1192 vmnat.exe 1192 vmnat.exe 924 vmnat.exe 924 vmnat.exe 1328 vmnat.exe 1328 vmnat.exe 2016 vmnat.exe 2016 vmnat.exe 1264 vmnat.exe 1264 vmnat.exe 776 vmnat.exe 776 vmnat.exe 1008 vmnat.exe 1008 vmnat.exe 1644 vmnat.exe 1644 vmnat.exe 1652 vmnat.exe 1652 vmnat.exe 1616 vmnat.exe 1616 vmnat.exe 1912 vmnat.exe 1912 vmnat.exe 2040 vmnat.exe 2040 vmnat.exe 952 vmnat.exe 952 vmnat.exe 1608 vmnat.exe 1608 vmnat.exe 1200 vmnat.exe 1200 vmnat.exe 1988 vmnat.exe 1988 vmnat.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe Process not Found File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe File created C:\Windows\SysWOW64\vmnat.exe vmnat.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2028 a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe Token: SeIncBasePriorityPrivilege 1996 vmnat.exe Token: SeIncBasePriorityPrivilege 1984 vmnat.exe Token: SeIncBasePriorityPrivilege 1120 vmnat.exe Token: SeIncBasePriorityPrivilege 768 vmnat.exe Token: SeIncBasePriorityPrivilege 1108 vmnat.exe Token: SeIncBasePriorityPrivilege 680 vmnat.exe Token: SeIncBasePriorityPrivilege 892 vmnat.exe Token: SeIncBasePriorityPrivilege 620 vmnat.exe Token: SeIncBasePriorityPrivilege 1152 vmnat.exe Token: SeIncBasePriorityPrivilege 1552 vmnat.exe Token: SeIncBasePriorityPrivilege 1544 vmnat.exe Token: SeIncBasePriorityPrivilege 1528 vmnat.exe Token: SeIncBasePriorityPrivilege 1372 vmnat.exe Token: SeIncBasePriorityPrivilege 688 vmnat.exe Token: SeIncBasePriorityPrivilege 572 vmnat.exe Token: SeIncBasePriorityPrivilege 1192 vmnat.exe Token: SeIncBasePriorityPrivilege 924 vmnat.exe Token: SeIncBasePriorityPrivilege 1328 vmnat.exe Token: SeIncBasePriorityPrivilege 2016 vmnat.exe Token: SeIncBasePriorityPrivilege 1264 vmnat.exe Token: SeIncBasePriorityPrivilege 776 vmnat.exe Token: SeIncBasePriorityPrivilege 1008 vmnat.exe Token: SeIncBasePriorityPrivilege 1644 vmnat.exe Token: SeIncBasePriorityPrivilege 1652 vmnat.exe Token: SeIncBasePriorityPrivilege 1616 vmnat.exe Token: SeIncBasePriorityPrivilege 1912 vmnat.exe Token: SeIncBasePriorityPrivilege 2040 vmnat.exe Token: SeIncBasePriorityPrivilege 952 vmnat.exe Token: SeIncBasePriorityPrivilege 1608 vmnat.exe Token: SeIncBasePriorityPrivilege 1200 vmnat.exe Token: SeIncBasePriorityPrivilege 1988 vmnat.exe Token: SeIncBasePriorityPrivilege 948 vmnat.exe Token: SeIncBasePriorityPrivilege 1496 vmnat.exe Token: SeIncBasePriorityPrivilege 1492 vmnat.exe Token: SeIncBasePriorityPrivilege 884 vmnat.exe Token: SeIncBasePriorityPrivilege 860 vmnat.exe Token: SeIncBasePriorityPrivilege 580 vmnat.exe Token: SeIncBasePriorityPrivilege 1188 vmnat.exe Token: SeIncBasePriorityPrivilege 1700 vmnat.exe Token: SeIncBasePriorityPrivilege 1056 vmnat.exe Token: SeIncBasePriorityPrivilege 628 vmnat.exe Token: SeIncBasePriorityPrivilege 1856 vmnat.exe Token: SeIncBasePriorityPrivilege 1992 vmnat.exe Token: SeIncBasePriorityPrivilege 1452 vmnat.exe Token: SeIncBasePriorityPrivilege 772 vmnat.exe Token: SeIncBasePriorityPrivilege 1356 vmnat.exe Token: SeIncBasePriorityPrivilege 852 vmnat.exe Token: SeIncBasePriorityPrivilege 1576 vmnat.exe Token: SeIncBasePriorityPrivilege 432 vmnat.exe Token: SeIncBasePriorityPrivilege 1476 vmnat.exe Token: SeIncBasePriorityPrivilege 388 vmnat.exe Token: SeIncBasePriorityPrivilege 1624 vmnat.exe Token: SeIncBasePriorityPrivilege 972 vmnat.exe Token: SeIncBasePriorityPrivilege 1520 vmnat.exe Token: SeIncBasePriorityPrivilege 1920 vmnat.exe Token: SeIncBasePriorityPrivilege 1020 vmnat.exe Token: SeIncBasePriorityPrivilege 240 vmnat.exe Token: SeIncBasePriorityPrivilege 1752 vmnat.exe Token: SeIncBasePriorityPrivilege 1924 vmnat.exe Token: SeIncBasePriorityPrivilege 1092 vmnat.exe Token: SeIncBasePriorityPrivilege 1612 vmnat.exe Token: SeIncBasePriorityPrivilege 956 vmnat.exe Token: SeIncBasePriorityPrivilege 1028 vmnat.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1996 2028 a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe 28 PID 2028 wrote to memory of 1996 2028 a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe 28 PID 2028 wrote to memory of 1996 2028 a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe 28 PID 2028 wrote to memory of 1996 2028 a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe 28 PID 1996 wrote to memory of 1984 1996 vmnat.exe 29 PID 1996 wrote to memory of 1984 1996 vmnat.exe 29 PID 1996 wrote to memory of 1984 1996 vmnat.exe 29 PID 1996 wrote to memory of 1984 1996 vmnat.exe 29 PID 1984 wrote to memory of 1120 1984 vmnat.exe 30 PID 1984 wrote to memory of 1120 1984 vmnat.exe 30 PID 1984 wrote to memory of 1120 1984 vmnat.exe 30 PID 1984 wrote to memory of 1120 1984 vmnat.exe 30 PID 1120 wrote to memory of 768 1120 vmnat.exe 31 PID 1120 wrote to memory of 768 1120 vmnat.exe 31 PID 1120 wrote to memory of 768 1120 vmnat.exe 31 PID 1120 wrote to memory of 768 1120 vmnat.exe 31 PID 768 wrote to memory of 1108 768 vmnat.exe 32 PID 768 wrote to memory of 1108 768 vmnat.exe 32 PID 768 wrote to memory of 1108 768 vmnat.exe 32 PID 768 wrote to memory of 1108 768 vmnat.exe 32 PID 1108 wrote to memory of 680 1108 vmnat.exe 33 PID 1108 wrote to memory of 680 1108 vmnat.exe 33 PID 1108 wrote to memory of 680 1108 vmnat.exe 33 PID 1108 wrote to memory of 680 1108 vmnat.exe 33 PID 680 wrote to memory of 892 680 vmnat.exe 34 PID 680 wrote to memory of 892 680 vmnat.exe 34 PID 680 wrote to memory of 892 680 vmnat.exe 34 PID 680 wrote to memory of 892 680 vmnat.exe 34 PID 892 wrote to memory of 620 892 vmnat.exe 35 PID 892 wrote to memory of 620 892 vmnat.exe 35 PID 892 wrote to memory of 620 892 vmnat.exe 35 PID 892 wrote to memory of 620 892 vmnat.exe 35 PID 620 wrote to memory of 1152 620 vmnat.exe 36 PID 620 wrote to memory of 1152 620 vmnat.exe 36 PID 620 wrote to memory of 1152 620 vmnat.exe 36 PID 620 wrote to memory of 1152 620 vmnat.exe 36 PID 1152 wrote to memory of 1552 1152 vmnat.exe 37 PID 1152 wrote to memory of 1552 1152 vmnat.exe 37 PID 1152 wrote to memory of 1552 1152 vmnat.exe 37 PID 1152 wrote to memory of 1552 1152 vmnat.exe 37 PID 1552 wrote to memory of 1544 1552 vmnat.exe 38 PID 1552 wrote to memory of 1544 1552 vmnat.exe 38 PID 1552 wrote to memory of 1544 1552 vmnat.exe 38 PID 1552 wrote to memory of 1544 1552 vmnat.exe 38 PID 1544 wrote to memory of 1528 1544 vmnat.exe 39 PID 1544 wrote to memory of 1528 1544 vmnat.exe 39 PID 1544 wrote to memory of 1528 1544 vmnat.exe 39 PID 1544 wrote to memory of 1528 1544 vmnat.exe 39 PID 1528 wrote to memory of 1372 1528 vmnat.exe 40 PID 1528 wrote to memory of 1372 1528 vmnat.exe 40 PID 1528 wrote to memory of 1372 1528 vmnat.exe 40 PID 1528 wrote to memory of 1372 1528 vmnat.exe 40 PID 1372 wrote to memory of 688 1372 vmnat.exe 41 PID 1372 wrote to memory of 688 1372 vmnat.exe 41 PID 1372 wrote to memory of 688 1372 vmnat.exe 41 PID 1372 wrote to memory of 688 1372 vmnat.exe 41 PID 688 wrote to memory of 572 688 vmnat.exe 42 PID 688 wrote to memory of 572 688 vmnat.exe 42 PID 688 wrote to memory of 572 688 vmnat.exe 42 PID 688 wrote to memory of 572 688 vmnat.exe 42 PID 572 wrote to memory of 1192 572 vmnat.exe 43 PID 572 wrote to memory of 1192 572 vmnat.exe 43 PID 572 wrote to memory of 1192 572 vmnat.exe 43 PID 572 wrote to memory of 1192 572 vmnat.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe"C:\Users\Admin\AppData\Local\Temp\a46c890fa3c5cad4af94dd0ddffb32006f44882186e724924bda6bac665b0344.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1192 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:924 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1328 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1264 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:776 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1644 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1652 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1912 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:952 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1608 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:948 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1496 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1492 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:860 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:580 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1188 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:628 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1356 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:852 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:432 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:388 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1624 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:972 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1520 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1020 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe58⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:240 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1924 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1092 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe62⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1612 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:956 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe65⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1028 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe66⤵
- Drops file in System32 directory
PID:692 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe67⤵PID:888
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe68⤵PID:1956
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe69⤵PID:604
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe70⤵PID:1512
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe71⤵PID:1796
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe72⤵PID:1232
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe73⤵PID:2008
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe74⤵PID:1864
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe75⤵PID:1804
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe76⤵PID:1656
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe77⤵PID:1768
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe78⤵
- Drops file in System32 directory
PID:520 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe79⤵PID:2052
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe80⤵PID:2060
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe81⤵PID:2068
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe82⤵PID:2076
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe83⤵PID:2084
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe84⤵PID:2092
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe85⤵PID:2100
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe86⤵PID:2108
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe87⤵PID:2116
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe88⤵PID:2124
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe89⤵PID:2132
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe90⤵PID:2140
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe91⤵PID:2148
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe92⤵PID:2156
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe93⤵PID:2164
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe94⤵PID:2172
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe95⤵PID:2180
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe96⤵PID:2188
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe97⤵PID:2196
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe98⤵PID:2204
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe99⤵PID:2212
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe100⤵
- Drops file in System32 directory
PID:2220 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe101⤵PID:2228
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe102⤵PID:2236
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe103⤵PID:2244
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe104⤵PID:2252
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe105⤵PID:2260
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe106⤵
- Drops file in System32 directory
PID:2268 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe107⤵PID:2276
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe108⤵PID:2284
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe109⤵PID:2292
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe110⤵PID:2300
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe111⤵PID:2308
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe112⤵PID:2316
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe113⤵PID:2324
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe114⤵PID:2332
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe115⤵PID:2340
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe116⤵PID:2348
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe117⤵PID:2356
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe118⤵
- Drops file in System32 directory
PID:2364 -
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe119⤵PID:2372
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe120⤵PID:2380
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe121⤵PID:2388
-
C:\Windows\SysWOW64\vmnat.exeC:\Windows\system32\vmnat.exe122⤵PID:2396
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-