Analysis
-
max time kernel
23s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 09:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a37d66f7fcb1a85030e5d0287d599c56.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a37d66f7fcb1a85030e5d0287d599c56.exe
Resource
win10v2004-20240221-en
4 signatures
150 seconds
General
-
Target
a37d66f7fcb1a85030e5d0287d599c56.exe
-
Size
2.6MB
-
MD5
a37d66f7fcb1a85030e5d0287d599c56
-
SHA1
5cfdc6e191ab908743b03dbbdce7f7b62414164d
-
SHA256
6cb4d9fe612f9a0016235ed9bb364ca7c69186eee0f50590443ed78ac4e87c75
-
SHA512
e0f54e2452129077f5b86b29752bd06eca23725bd6afa59cf7b1f1dfd24616b608d11c8f4bd78d8222b34f405ae5a2efa2fbfb33ed4d403703047dd7714fc2a4
-
SSDEEP
49152:7EcVubfxZasY6DwOBfrnvV7UeWtCVQwdl:7EcobFYiwOBpIeWrwdl
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeDebugPrivilege 2908 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 3064 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2600 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2560 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2628 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2520 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2888 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2740 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2480 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 1684 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 1712 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2212 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 1620 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 1308 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2980 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2816 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 1512 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2404 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 1428 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 1828 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 652 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2528 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 2100 a37d66f7fcb1a85030e5d0287d599c56.exe Token: SeDebugPrivilege 3024 a37d66f7fcb1a85030e5d0287d599c56.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3064 2908 a37d66f7fcb1a85030e5d0287d599c56.exe 28 PID 2908 wrote to memory of 3064 2908 a37d66f7fcb1a85030e5d0287d599c56.exe 28 PID 2908 wrote to memory of 3064 2908 a37d66f7fcb1a85030e5d0287d599c56.exe 28 PID 2908 wrote to memory of 3064 2908 a37d66f7fcb1a85030e5d0287d599c56.exe 28 PID 3064 wrote to memory of 2600 3064 a37d66f7fcb1a85030e5d0287d599c56.exe 29 PID 3064 wrote to memory of 2600 3064 a37d66f7fcb1a85030e5d0287d599c56.exe 29 PID 3064 wrote to memory of 2600 3064 a37d66f7fcb1a85030e5d0287d599c56.exe 29 PID 3064 wrote to memory of 2600 3064 a37d66f7fcb1a85030e5d0287d599c56.exe 29 PID 2600 wrote to memory of 2560 2600 a37d66f7fcb1a85030e5d0287d599c56.exe 56 PID 2600 wrote to memory of 2560 2600 a37d66f7fcb1a85030e5d0287d599c56.exe 56 PID 2600 wrote to memory of 2560 2600 a37d66f7fcb1a85030e5d0287d599c56.exe 56 PID 2600 wrote to memory of 2560 2600 a37d66f7fcb1a85030e5d0287d599c56.exe 56 PID 2560 wrote to memory of 2628 2560 a37d66f7fcb1a85030e5d0287d599c56.exe 31 PID 2560 wrote to memory of 2628 2560 a37d66f7fcb1a85030e5d0287d599c56.exe 31 PID 2560 wrote to memory of 2628 2560 a37d66f7fcb1a85030e5d0287d599c56.exe 31 PID 2560 wrote to memory of 2628 2560 a37d66f7fcb1a85030e5d0287d599c56.exe 31 PID 2628 wrote to memory of 2520 2628 a37d66f7fcb1a85030e5d0287d599c56.exe 33 PID 2628 wrote to memory of 2520 2628 a37d66f7fcb1a85030e5d0287d599c56.exe 33 PID 2628 wrote to memory of 2520 2628 a37d66f7fcb1a85030e5d0287d599c56.exe 33 PID 2628 wrote to memory of 2520 2628 a37d66f7fcb1a85030e5d0287d599c56.exe 33 PID 2520 wrote to memory of 2888 2520 a37d66f7fcb1a85030e5d0287d599c56.exe 32 PID 2520 wrote to memory of 2888 2520 a37d66f7fcb1a85030e5d0287d599c56.exe 32 PID 2520 wrote to memory of 2888 2520 a37d66f7fcb1a85030e5d0287d599c56.exe 32 PID 2520 wrote to memory of 2888 2520 a37d66f7fcb1a85030e5d0287d599c56.exe 32 PID 2888 wrote to memory of 2740 2888 a37d66f7fcb1a85030e5d0287d599c56.exe 34 PID 2888 wrote to memory of 2740 2888 a37d66f7fcb1a85030e5d0287d599c56.exe 34 PID 2888 wrote to memory of 2740 2888 a37d66f7fcb1a85030e5d0287d599c56.exe 34 PID 2888 wrote to memory of 2740 2888 a37d66f7fcb1a85030e5d0287d599c56.exe 34 PID 2740 wrote to memory of 2480 2740 a37d66f7fcb1a85030e5d0287d599c56.exe 42 PID 2740 wrote to memory of 2480 2740 a37d66f7fcb1a85030e5d0287d599c56.exe 42 PID 2740 wrote to memory of 2480 2740 a37d66f7fcb1a85030e5d0287d599c56.exe 42 PID 2740 wrote to memory of 2480 2740 a37d66f7fcb1a85030e5d0287d599c56.exe 42 PID 2480 wrote to memory of 1684 2480 a37d66f7fcb1a85030e5d0287d599c56.exe 237 PID 2480 wrote to memory of 1684 2480 a37d66f7fcb1a85030e5d0287d599c56.exe 237 PID 2480 wrote to memory of 1684 2480 a37d66f7fcb1a85030e5d0287d599c56.exe 237 PID 2480 wrote to memory of 1684 2480 a37d66f7fcb1a85030e5d0287d599c56.exe 237 PID 1684 wrote to memory of 1712 1684 a37d66f7fcb1a85030e5d0287d599c56.exe 234 PID 1684 wrote to memory of 1712 1684 a37d66f7fcb1a85030e5d0287d599c56.exe 234 PID 1684 wrote to memory of 1712 1684 a37d66f7fcb1a85030e5d0287d599c56.exe 234 PID 1684 wrote to memory of 1712 1684 a37d66f7fcb1a85030e5d0287d599c56.exe 234 PID 1712 wrote to memory of 2212 1712 a37d66f7fcb1a85030e5d0287d599c56.exe 310 PID 1712 wrote to memory of 2212 1712 a37d66f7fcb1a85030e5d0287d599c56.exe 310 PID 1712 wrote to memory of 2212 1712 a37d66f7fcb1a85030e5d0287d599c56.exe 310 PID 1712 wrote to memory of 2212 1712 a37d66f7fcb1a85030e5d0287d599c56.exe 310 PID 2212 wrote to memory of 1620 2212 a37d66f7fcb1a85030e5d0287d599c56.exe 39 PID 2212 wrote to memory of 1620 2212 a37d66f7fcb1a85030e5d0287d599c56.exe 39 PID 2212 wrote to memory of 1620 2212 a37d66f7fcb1a85030e5d0287d599c56.exe 39 PID 2212 wrote to memory of 1620 2212 a37d66f7fcb1a85030e5d0287d599c56.exe 39 PID 1620 wrote to memory of 1308 1620 a37d66f7fcb1a85030e5d0287d599c56.exe 311 PID 1620 wrote to memory of 1308 1620 a37d66f7fcb1a85030e5d0287d599c56.exe 311 PID 1620 wrote to memory of 1308 1620 a37d66f7fcb1a85030e5d0287d599c56.exe 311 PID 1620 wrote to memory of 1308 1620 a37d66f7fcb1a85030e5d0287d599c56.exe 311 PID 1308 wrote to memory of 2980 1308 a37d66f7fcb1a85030e5d0287d599c56.exe 265 PID 1308 wrote to memory of 2980 1308 a37d66f7fcb1a85030e5d0287d599c56.exe 265 PID 1308 wrote to memory of 2980 1308 a37d66f7fcb1a85030e5d0287d599c56.exe 265 PID 1308 wrote to memory of 2980 1308 a37d66f7fcb1a85030e5d0287d599c56.exe 265 PID 2980 wrote to memory of 2816 2980 a37d66f7fcb1a85030e5d0287d599c56.exe 320 PID 2980 wrote to memory of 2816 2980 a37d66f7fcb1a85030e5d0287d599c56.exe 320 PID 2980 wrote to memory of 2816 2980 a37d66f7fcb1a85030e5d0287d599c56.exe 320 PID 2980 wrote to memory of 2816 2980 a37d66f7fcb1a85030e5d0287d599c56.exe 320 PID 2816 wrote to memory of 1512 2816 a37d66f7fcb1a85030e5d0287d599c56.exe 273 PID 2816 wrote to memory of 1512 2816 a37d66f7fcb1a85030e5d0287d599c56.exe 273 PID 2816 wrote to memory of 1512 2816 a37d66f7fcb1a85030e5d0287d599c56.exe 273 PID 2816 wrote to memory of 1512 2816 a37d66f7fcb1a85030e5d0287d599c56.exe 273
Processes
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"4⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480
-
-
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"1⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"1⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"2⤵PID:2980
-
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"1⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"2⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"3⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"4⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"5⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"6⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"7⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"8⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"9⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"10⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"11⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"12⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"13⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"14⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"15⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"16⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"17⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"18⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"19⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"20⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"21⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"22⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"23⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"24⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"25⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"26⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"27⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"28⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"29⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"30⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"31⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"32⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"33⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"34⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"35⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"36⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"37⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"38⤵PID:2652
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"39⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"40⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"41⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"42⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"43⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"44⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"45⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"46⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"47⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"48⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"49⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"50⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"51⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"52⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"53⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"54⤵
- Suspicious use of AdjustPrivilegeToken
PID:652 -
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"55⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"56⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"57⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"58⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"59⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"60⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"61⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"62⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"63⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"64⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"65⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"66⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"67⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"68⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"69⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"70⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"71⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"72⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"73⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"74⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"75⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"76⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"77⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"78⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"79⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"80⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"81⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"82⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"83⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"84⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"85⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"86⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"87⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"88⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"89⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"90⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"91⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"92⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"93⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"94⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"95⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"96⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"97⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"98⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"99⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"100⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"101⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"102⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"103⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"104⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"105⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"106⤵
- Suspicious use of AdjustPrivilegeToken
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"107⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"108⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"109⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"110⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"111⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"112⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"113⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"114⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"115⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"116⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"117⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"118⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"119⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"120⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"121⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"C:\Users\Admin\AppData\Local\Temp\a37d66f7fcb1a85030e5d0287d599c56.exe"122⤵PID:1912
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-