Analysis
-
max time kernel
111s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
ee8506da91dacbe0410e3da743fa6c8ae98f4b571eecd87fe82687e66cbc7f3b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ee8506da91dacbe0410e3da743fa6c8ae98f4b571eecd87fe82687e66cbc7f3b.exe
Resource
win10v2004-20221111-en
General
-
Target
ee8506da91dacbe0410e3da743fa6c8ae98f4b571eecd87fe82687e66cbc7f3b.exe
-
Size
197KB
-
MD5
b65e17a82359a42bf03921ced0fff478
-
SHA1
62f05f4f1f50e48e2754f54d363ea3cb4156e898
-
SHA256
ee8506da91dacbe0410e3da743fa6c8ae98f4b571eecd87fe82687e66cbc7f3b
-
SHA512
a0828d4d975bed42770d69f3091b140905d050df9ab667eaa921290c4ed073462efc256c070a864610b871db1e8c4966ccced562818801416bf21ab17f337c0a
-
SSDEEP
3072:Hg8BVsYVr1MQNqAhXMFBXaeJl3OMhCLnU7314Hn7ei2oYVIUu+s4YErKqe:LPJPMENa1JlpanU7KH7jYV/FrKq
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4232 winlogo.exe 4684 winlogo.exe 3796 winlogo.exe 176 winlogo.exe 1892 winlogo.exe 3636 winlogo.exe 3368 winlogo.exe 1216 winlogo.exe 5064 winlogo.exe 2472 winlogo.exe 1872 winlogo.exe 4336 winlogo.exe 508 winlogo.exe 1184 winlogo.exe 4224 winlogo.exe 3772 winlogo.exe 3496 winlogo.exe 1812 winlogo.exe 2208 winlogo.exe 4400 winlogo.exe 2236 winlogo.exe 792 winlogo.exe 1576 winlogo.exe 2420 winlogo.exe 2124 winlogo.exe 1088 winlogo.exe 4056 winlogo.exe 3792 winlogo.exe 1976 winlogo.exe 1724 winlogo.exe 4200 winlogo.exe 3176 winlogo.exe 4748 winlogo.exe 1712 winlogo.exe 4124 winlogo.exe 1684 winlogo.exe 1560 winlogo.exe 2216 winlogo.exe 3696 winlogo.exe 3480 winlogo.exe 1520 winlogo.exe 2296 winlogo.exe 2868 winlogo.exe 4524 winlogo.exe 4284 winlogo.exe 2732 winlogo.exe 868 winlogo.exe 4584 winlogo.exe 4692 winlogo.exe 4860 winlogo.exe 2152 winlogo.exe 2508 winlogo.exe 2228 winlogo.exe 4720 winlogo.exe 4240 winlogo.exe 3916 winlogo.exe 344 winlogo.exe 992 winlogo.exe 4588 winlogo.exe 4568 winlogo.exe 4044 winlogo.exe 4456 winlogo.exe 3064 winlogo.exe 2460 winlogo.exe -
Checks computer location settings 2 TTPs 62 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation ee8506da91dacbe0410e3da743fa6c8ae98f4b571eecd87fe82687e66cbc7f3b.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation winlogo.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exe winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exe winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exe winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exe winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exe winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exe winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exe winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exe winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat winlogo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4748 winlogo.exe Token: SeIncBasePriorityPrivilege 3176 winlogo.exe Token: SeIncBasePriorityPrivilege 4200 winlogo.exe Token: SeIncBasePriorityPrivilege 1724 winlogo.exe Token: SeIncBasePriorityPrivilege 1976 winlogo.exe Token: SeIncBasePriorityPrivilege 3792 winlogo.exe Token: SeIncBasePriorityPrivilege 4056 winlogo.exe Token: SeIncBasePriorityPrivilege 1088 winlogo.exe Token: SeIncBasePriorityPrivilege 2124 winlogo.exe Token: SeIncBasePriorityPrivilege 2420 winlogo.exe Token: SeIncBasePriorityPrivilege 1576 winlogo.exe Token: SeIncBasePriorityPrivilege 792 winlogo.exe Token: SeIncBasePriorityPrivilege 2236 winlogo.exe Token: SeIncBasePriorityPrivilege 4400 winlogo.exe Token: SeIncBasePriorityPrivilege 2208 winlogo.exe Token: SeIncBasePriorityPrivilege 1812 winlogo.exe Token: SeIncBasePriorityPrivilege 3496 winlogo.exe Token: SeIncBasePriorityPrivilege 3772 winlogo.exe Token: SeIncBasePriorityPrivilege 4224 winlogo.exe Token: SeIncBasePriorityPrivilege 1184 winlogo.exe Token: SeIncBasePriorityPrivilege 508 winlogo.exe Token: SeIncBasePriorityPrivilege 4336 winlogo.exe Token: SeIncBasePriorityPrivilege 1872 winlogo.exe Token: SeIncBasePriorityPrivilege 2472 winlogo.exe Token: SeIncBasePriorityPrivilege 5064 winlogo.exe Token: SeIncBasePriorityPrivilege 1216 winlogo.exe Token: SeIncBasePriorityPrivilege 3368 winlogo.exe Token: SeIncBasePriorityPrivilege 3636 winlogo.exe Token: SeIncBasePriorityPrivilege 1892 winlogo.exe Token: SeIncBasePriorityPrivilege 176 winlogo.exe Token: SeIncBasePriorityPrivilege 3796 winlogo.exe Token: SeIncBasePriorityPrivilege 4684 winlogo.exe Token: SeIncBasePriorityPrivilege 4232 winlogo.exe Token: SeIncBasePriorityPrivilege 3404 ee8506da91dacbe0410e3da743fa6c8ae98f4b571eecd87fe82687e66cbc7f3b.exe Token: SeIncBasePriorityPrivilege 1712 winlogo.exe Token: SeIncBasePriorityPrivilege 4124 winlogo.exe Token: SeIncBasePriorityPrivilege 1684 winlogo.exe Token: SeIncBasePriorityPrivilege 1560 winlogo.exe Token: SeIncBasePriorityPrivilege 2216 winlogo.exe Token: SeIncBasePriorityPrivilege 3696 winlogo.exe Token: SeIncBasePriorityPrivilege 3480 winlogo.exe Token: SeIncBasePriorityPrivilege 1520 winlogo.exe Token: SeIncBasePriorityPrivilege 2296 winlogo.exe Token: SeIncBasePriorityPrivilege 2868 winlogo.exe Token: SeIncBasePriorityPrivilege 4524 winlogo.exe Token: SeIncBasePriorityPrivilege 4284 winlogo.exe Token: SeIncBasePriorityPrivilege 2732 winlogo.exe Token: SeIncBasePriorityPrivilege 868 winlogo.exe Token: SeIncBasePriorityPrivilege 4584 winlogo.exe Token: SeIncBasePriorityPrivilege 4692 winlogo.exe Token: SeIncBasePriorityPrivilege 4860 winlogo.exe Token: SeIncBasePriorityPrivilege 2152 winlogo.exe Token: SeIncBasePriorityPrivilege 2508 winlogo.exe Token: SeIncBasePriorityPrivilege 2228 winlogo.exe Token: SeIncBasePriorityPrivilege 4720 winlogo.exe Token: SeIncBasePriorityPrivilege 4240 winlogo.exe Token: SeIncBasePriorityPrivilege 3916 winlogo.exe Token: SeIncBasePriorityPrivilege 344 winlogo.exe Token: SeIncBasePriorityPrivilege 992 winlogo.exe Token: SeIncBasePriorityPrivilege 4588 winlogo.exe Token: SeIncBasePriorityPrivilege 4568 winlogo.exe Token: SeIncBasePriorityPrivilege 4044 winlogo.exe Token: SeIncBasePriorityPrivilege 4456 winlogo.exe Token: SeIncBasePriorityPrivilege 3064 winlogo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3404 wrote to memory of 4232 3404 ee8506da91dacbe0410e3da743fa6c8ae98f4b571eecd87fe82687e66cbc7f3b.exe 85 PID 3404 wrote to memory of 4232 3404 ee8506da91dacbe0410e3da743fa6c8ae98f4b571eecd87fe82687e66cbc7f3b.exe 85 PID 3404 wrote to memory of 4232 3404 ee8506da91dacbe0410e3da743fa6c8ae98f4b571eecd87fe82687e66cbc7f3b.exe 85 PID 4232 wrote to memory of 4684 4232 winlogo.exe 86 PID 4232 wrote to memory of 4684 4232 winlogo.exe 86 PID 4232 wrote to memory of 4684 4232 winlogo.exe 86 PID 4684 wrote to memory of 3796 4684 winlogo.exe 87 PID 4684 wrote to memory of 3796 4684 winlogo.exe 87 PID 4684 wrote to memory of 3796 4684 winlogo.exe 87 PID 3796 wrote to memory of 176 3796 winlogo.exe 88 PID 3796 wrote to memory of 176 3796 winlogo.exe 88 PID 3796 wrote to memory of 176 3796 winlogo.exe 88 PID 176 wrote to memory of 1892 176 winlogo.exe 89 PID 176 wrote to memory of 1892 176 winlogo.exe 89 PID 176 wrote to memory of 1892 176 winlogo.exe 89 PID 1892 wrote to memory of 3636 1892 winlogo.exe 90 PID 1892 wrote to memory of 3636 1892 winlogo.exe 90 PID 1892 wrote to memory of 3636 1892 winlogo.exe 90 PID 3636 wrote to memory of 3368 3636 winlogo.exe 91 PID 3636 wrote to memory of 3368 3636 winlogo.exe 91 PID 3636 wrote to memory of 3368 3636 winlogo.exe 91 PID 3368 wrote to memory of 1216 3368 winlogo.exe 92 PID 3368 wrote to memory of 1216 3368 winlogo.exe 92 PID 3368 wrote to memory of 1216 3368 winlogo.exe 92 PID 1216 wrote to memory of 5064 1216 winlogo.exe 93 PID 1216 wrote to memory of 5064 1216 winlogo.exe 93 PID 1216 wrote to memory of 5064 1216 winlogo.exe 93 PID 5064 wrote to memory of 2472 5064 winlogo.exe 94 PID 5064 wrote to memory of 2472 5064 winlogo.exe 94 PID 5064 wrote to memory of 2472 5064 winlogo.exe 94 PID 2472 wrote to memory of 1872 2472 winlogo.exe 95 PID 2472 wrote to memory of 1872 2472 winlogo.exe 95 PID 2472 wrote to memory of 1872 2472 winlogo.exe 95 PID 1872 wrote to memory of 4336 1872 winlogo.exe 96 PID 1872 wrote to memory of 4336 1872 winlogo.exe 96 PID 1872 wrote to memory of 4336 1872 winlogo.exe 96 PID 4336 wrote to memory of 508 4336 winlogo.exe 97 PID 4336 wrote to memory of 508 4336 winlogo.exe 97 PID 4336 wrote to memory of 508 4336 winlogo.exe 97 PID 508 wrote to memory of 1184 508 winlogo.exe 98 PID 508 wrote to memory of 1184 508 winlogo.exe 98 PID 508 wrote to memory of 1184 508 winlogo.exe 98 PID 1184 wrote to memory of 4224 1184 winlogo.exe 99 PID 1184 wrote to memory of 4224 1184 winlogo.exe 99 PID 1184 wrote to memory of 4224 1184 winlogo.exe 99 PID 4224 wrote to memory of 3772 4224 winlogo.exe 100 PID 4224 wrote to memory of 3772 4224 winlogo.exe 100 PID 4224 wrote to memory of 3772 4224 winlogo.exe 100 PID 3772 wrote to memory of 3496 3772 winlogo.exe 101 PID 3772 wrote to memory of 3496 3772 winlogo.exe 101 PID 3772 wrote to memory of 3496 3772 winlogo.exe 101 PID 3496 wrote to memory of 1812 3496 winlogo.exe 102 PID 3496 wrote to memory of 1812 3496 winlogo.exe 102 PID 3496 wrote to memory of 1812 3496 winlogo.exe 102 PID 1812 wrote to memory of 2208 1812 winlogo.exe 103 PID 1812 wrote to memory of 2208 1812 winlogo.exe 103 PID 1812 wrote to memory of 2208 1812 winlogo.exe 103 PID 2208 wrote to memory of 4400 2208 winlogo.exe 104 PID 2208 wrote to memory of 4400 2208 winlogo.exe 104 PID 2208 wrote to memory of 4400 2208 winlogo.exe 104 PID 4400 wrote to memory of 2236 4400 winlogo.exe 105 PID 4400 wrote to memory of 2236 4400 winlogo.exe 105 PID 4400 wrote to memory of 2236 4400 winlogo.exe 105 PID 2236 wrote to memory of 792 2236 winlogo.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee8506da91dacbe0410e3da743fa6c8ae98f4b571eecd87fe82687e66cbc7f3b.exe"C:\Users\Admin\AppData\Local\Temp\ee8506da91dacbe0410e3da743fa6c8ae98f4b571eecd87fe82687e66cbc7f3b.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:176 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe7⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe8⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe9⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe10⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe11⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe12⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe13⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe14⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe15⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe16⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe17⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe18⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe19⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe20⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe21⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe22⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe23⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:792 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe24⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe25⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2420 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe26⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2124 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe27⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1088 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe28⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4056 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe29⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3792 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe30⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1976 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe31⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe32⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4200 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe33⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3176 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe34⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4748 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe35⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1712 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe36⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4124 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe37⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe38⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe39⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe40⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3696 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe41⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3480 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe42⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1520 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe43⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe44⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe45⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4524 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe46⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4284 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe47⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2732 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe48⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:868 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe49⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4584 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe50⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4692 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe51⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4860 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe52⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2152 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe53⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2508 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe54⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe55⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4720 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe56⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4240 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe57⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe58⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:344 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe59⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe60⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4588 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe61⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe62⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4044 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe63⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4456 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3064 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe65⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe66⤵
- Drops file in System32 directory
PID:4628 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe67⤵
- Drops file in System32 directory
PID:2412 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe68⤵PID:5100
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe69⤵PID:4712
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe70⤵PID:4920
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe71⤵
- Drops file in System32 directory
PID:2064 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe72⤵
- Drops file in System32 directory
PID:4328 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe73⤵
- Drops file in System32 directory
PID:2760 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe74⤵
- Drops file in System32 directory
PID:4636 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe75⤵
- Drops file in System32 directory
PID:3908 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe76⤵
- Drops file in System32 directory
PID:1796 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe77⤵
- Drops file in System32 directory
PID:4176 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe78⤵PID:3304
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe79⤵
- Drops file in System32 directory
PID:3412 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe80⤵
- Drops file in System32 directory
PID:4952 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe81⤵PID:3348
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe82⤵PID:3784
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe83⤵PID:212
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe84⤵PID:3972
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe85⤵PID:4428
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe86⤵PID:4972
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe87⤵PID:2068
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe88⤵
- Drops file in System32 directory
PID:4000 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe89⤵PID:4776
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe90⤵
- Drops file in System32 directory
PID:1028 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe91⤵PID:2300
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe92⤵PID:404
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe93⤵
- Drops file in System32 directory
PID:4108 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe94⤵
- Drops file in System32 directory
PID:5024 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe95⤵
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe96⤵PID:2908
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe97⤵PID:2108
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe98⤵PID:4660
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe99⤵PID:4212
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe100⤵PID:1200
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe101⤵PID:5124
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe102⤵
- Drops file in System32 directory
PID:5140 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe103⤵PID:5156
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe104⤵PID:5172
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe105⤵
- Drops file in System32 directory
PID:5220 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe106⤵PID:5236
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe107⤵PID:5252
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe108⤵
- Drops file in System32 directory
PID:5268 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe109⤵PID:5284
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe110⤵PID:5336
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe111⤵PID:5352
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe112⤵
- Drops file in System32 directory
PID:5372 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe113⤵PID:5388
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe114⤵PID:5404
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe115⤵PID:5436
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe116⤵PID:5504
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe117⤵PID:5528
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe118⤵PID:5576
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe119⤵PID:5596
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe120⤵PID:5616
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe121⤵PID:5636
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\winlogo.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\winlogo.exe122⤵
- Drops file in System32 directory
PID:5668
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-