Analysis
-
max time kernel
102s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06-12-2022 13:53
Static task
static1
Behavioral task
behavioral1
Sample
79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe
Resource
win10v2004-20221111-en
General
-
Target
79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe
-
Size
958KB
-
MD5
ed7272f7f45de161f0c7f49f80aebf11
-
SHA1
fb4507805f927cea5511474f8dde93d1e9a0dcd4
-
SHA256
79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9
-
SHA512
f0b4ebdb1d55a4946dcd2594bb8647615ac4bab417bdc3950d4d925d0bcd25f642f6fe4d5c4bf85b487a98a68f46d0c779da97952585cfa667f85da5d8262866
-
SSDEEP
24576:qc//////5T0CHKaKy5hAETLg9HY3tfE93cazXKZjUM:qc//////5IQK8KETL4HGs93tKG
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\drivers\qdfy.sys 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe File opened for modification C:\WINDOWS\SysWOW64\drivers\qdfy.sys 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1700 set thread context of 952 1700 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 28 -
Kills process with taskkill 15 IoCs
pid Process 956 taskkill.exe 1068 taskkill.exe 2480 taskkill.exe 844 taskkill.exe 752 taskkill.exe 1812 taskkill.exe 316 taskkill.exe 1508 taskkill.exe 1048 taskkill.exe 988 taskkill.exe 1748 taskkill.exe 628 taskkill.exe 696 taskkill.exe 292 taskkill.exe 608 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 464 Process not Found 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe Token: SeDebugPrivilege 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe Token: SeDebugPrivilege 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe Token: SeDebugPrivilege 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe Token: SeDebugPrivilege 1508 taskkill.exe Token: SeDebugPrivilege 1048 taskkill.exe Token: SeDebugPrivilege 752 taskkill.exe Token: SeDebugPrivilege 696 taskkill.exe Token: SeDebugPrivilege 608 taskkill.exe Token: SeDebugPrivilege 956 taskkill.exe Token: SeDebugPrivilege 1812 taskkill.exe Token: SeDebugPrivilege 1068 taskkill.exe Token: SeDebugPrivilege 316 taskkill.exe Token: SeDebugPrivilege 844 taskkill.exe Token: SeDebugPrivilege 1748 taskkill.exe Token: SeDebugPrivilege 628 taskkill.exe Token: SeDebugPrivilege 988 taskkill.exe Token: SeDebugPrivilege 292 taskkill.exe Token: SeDebugPrivilege 2480 taskkill.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1700 wrote to memory of 952 1700 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 28 PID 1700 wrote to memory of 952 1700 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 28 PID 1700 wrote to memory of 952 1700 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 28 PID 1700 wrote to memory of 952 1700 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 28 PID 1700 wrote to memory of 952 1700 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 28 PID 1700 wrote to memory of 952 1700 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 28 PID 952 wrote to memory of 628 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 30 PID 952 wrote to memory of 628 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 30 PID 952 wrote to memory of 628 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 30 PID 952 wrote to memory of 628 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 30 PID 952 wrote to memory of 844 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 32 PID 952 wrote to memory of 844 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 32 PID 952 wrote to memory of 844 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 32 PID 952 wrote to memory of 844 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 32 PID 952 wrote to memory of 1508 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 33 PID 952 wrote to memory of 1508 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 33 PID 952 wrote to memory of 1508 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 33 PID 952 wrote to memory of 1508 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 33 PID 952 wrote to memory of 752 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 35 PID 952 wrote to memory of 752 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 35 PID 952 wrote to memory of 752 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 35 PID 952 wrote to memory of 752 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 35 PID 952 wrote to memory of 1048 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 38 PID 952 wrote to memory of 1048 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 38 PID 952 wrote to memory of 1048 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 38 PID 952 wrote to memory of 1048 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 38 PID 952 wrote to memory of 696 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 40 PID 952 wrote to memory of 696 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 40 PID 952 wrote to memory of 696 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 40 PID 952 wrote to memory of 696 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 40 PID 952 wrote to memory of 608 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 46 PID 952 wrote to memory of 608 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 46 PID 952 wrote to memory of 608 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 46 PID 952 wrote to memory of 608 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 46 PID 952 wrote to memory of 292 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 42 PID 952 wrote to memory of 292 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 42 PID 952 wrote to memory of 292 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 42 PID 952 wrote to memory of 292 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 42 PID 952 wrote to memory of 1812 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 45 PID 952 wrote to memory of 1812 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 45 PID 952 wrote to memory of 1812 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 45 PID 952 wrote to memory of 1812 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 45 PID 952 wrote to memory of 988 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 47 PID 952 wrote to memory of 988 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 47 PID 952 wrote to memory of 988 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 47 PID 952 wrote to memory of 988 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 47 PID 952 wrote to memory of 1068 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 56 PID 952 wrote to memory of 1068 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 56 PID 952 wrote to memory of 1068 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 56 PID 952 wrote to memory of 1068 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 56 PID 952 wrote to memory of 1748 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 53 PID 952 wrote to memory of 1748 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 53 PID 952 wrote to memory of 1748 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 53 PID 952 wrote to memory of 1748 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 53 PID 952 wrote to memory of 316 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 49 PID 952 wrote to memory of 316 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 49 PID 952 wrote to memory of 316 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 49 PID 952 wrote to memory of 316 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 49 PID 952 wrote to memory of 956 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 50 PID 952 wrote to memory of 956 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 50 PID 952 wrote to memory of 956 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 50 PID 952 wrote to memory of 956 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 50 PID 952 wrote to memory of 2480 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 60 PID 952 wrote to memory of 2480 952 79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe 60
Processes
-
C:\Users\Admin\AppData\Local\Temp\79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe"C:\Users\Admin\AppData\Local\Temp\79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exeC:\Users\Admin\AppData\Local\Temp\79af0854a72fdd0d1dfe41e6790637347c995f671fa49342c026d81ce483d6a9.exe2⤵
- Drops file in Drivers directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im DNF.exe.manifest3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TenSafe.exe_13⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TenSafe.exe_23⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TenSafe.exe_1.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TenSafe.exe_2.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im QQDL.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Tencentdl.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TenSafe.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im TXPlatform.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im QQLOING.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im DNF.exe.manifest3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im DNF.exe.manifest3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Tencentdl.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im DNFchina.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im DNF.exe.manifest3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2480
-
-