Analysis
-
max time kernel
39s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 19:56
Behavioral task
behavioral1
Sample
ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe
-
Size
301KB
-
MD5
ee51a087d5dc2b078fe32651202d964e
-
SHA1
a1c81574a0eb4f3a066fcf593fee215733524a31
-
SHA256
28c0647e6589a27872eea7158b066d291b40767daef5642e8fe4b9a0479de3b3
-
SHA512
17448623c8f598d775b8848881459ab035f425ec134d5e25ed6ddd0c4ed1efd5f8aee4d741845cb4acf6d4578ff16825266dd83543591f4946788243058e11b6
-
SSDEEP
6144:hDKOloJ7dZGPGVNN6dEf0/wogNUHlyDUIzuCEUPE:h7loBFV2IS7gNTNuN
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/memory/2276-16-0x0000000000400000-0x0000000000453000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2872 asd.scr 2820 asd.scr 2796 asd.scr 1860 asd.scr 2228 asd.scr 2864 asd.scr 2156 asd.scr 2508 asd.scr 1876 asd.scr 1120 asd.scr 396 asd.scr 552 asd.scr 1232 asd.scr 2204 asd.scr 2912 asd.scr 2084 asd.scr 1092 asd.scr 932 asd.scr 804 asd.scr 960 asd.scr 948 asd.scr 1552 asd.scr 1988 asd.scr 700 asd.scr 2888 asd.scr 2324 asd.scr 2476 asd.scr 1704 asd.scr 2816 asd.scr 2224 asd.scr 2292 asd.scr 3032 asd.scr 2824 asd.scr 2832 asd.scr 2616 asd.scr 2504 asd.scr 2388 asd.scr 1680 asd.scr 1708 asd.scr 1816 asd.scr 1524 asd.scr 1656 asd.scr 1916 asd.scr 1768 asd.scr 3028 asd.scr 1176 asd.scr 2380 asd.scr 2020 asd.scr 1668 asd.scr 300 asd.scr 1900 asd.scr 3068 asd.scr 2424 asd.scr 3020 asd.scr 2100 asd.scr 2596 asd.scr 2972 asd.scr 2976 asd.scr 748 asd.scr 1560 asd.scr 2964 asd.scr 1436 asd.scr 2080 asd.scr 2224 asd.scr -
Loads dropped DLL 2 IoCs
pid Process 2276 ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe 2276 ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2872 asd.scr 2872 asd.scr 2872 asd.scr 2872 asd.scr 2872 asd.scr 2872 asd.scr 2872 asd.scr 2872 asd.scr 2872 asd.scr 2872 asd.scr 2872 asd.scr 2820 asd.scr 2820 asd.scr 2820 asd.scr 2820 asd.scr 2820 asd.scr 2820 asd.scr 2820 asd.scr 2820 asd.scr 2820 asd.scr 2820 asd.scr 2820 asd.scr 2872 asd.scr 2872 asd.scr 2820 asd.scr 2820 asd.scr 2796 asd.scr 2796 asd.scr 2796 asd.scr 2796 asd.scr 2796 asd.scr 2796 asd.scr 2796 asd.scr 2796 asd.scr 2796 asd.scr 2796 asd.scr 2796 asd.scr 1860 asd.scr 1860 asd.scr 1860 asd.scr 1860 asd.scr 1860 asd.scr 1860 asd.scr 1860 asd.scr 1860 asd.scr 1860 asd.scr 1860 asd.scr 1860 asd.scr 1860 asd.scr 1860 asd.scr 2796 asd.scr 2796 asd.scr 2228 asd.scr 2228 asd.scr 2228 asd.scr 2228 asd.scr 2228 asd.scr 2228 asd.scr 2228 asd.scr 2228 asd.scr 2228 asd.scr 2228 asd.scr 2228 asd.scr 2864 asd.scr -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2872 asd.scr Token: SeDebugPrivilege 2820 asd.scr Token: SeDebugPrivilege 2796 asd.scr Token: SeDebugPrivilege 1860 asd.scr Token: SeDebugPrivilege 2228 asd.scr Token: SeDebugPrivilege 2864 asd.scr Token: SeDebugPrivilege 2156 asd.scr Token: SeDebugPrivilege 2508 asd.scr Token: SeDebugPrivilege 1876 asd.scr Token: SeDebugPrivilege 1120 asd.scr Token: SeDebugPrivilege 396 asd.scr Token: SeDebugPrivilege 552 asd.scr Token: SeDebugPrivilege 1232 asd.scr Token: SeDebugPrivilege 2204 asd.scr Token: SeDebugPrivilege 2912 asd.scr Token: SeDebugPrivilege 2084 asd.scr Token: SeDebugPrivilege 1092 asd.scr Token: SeDebugPrivilege 932 asd.scr Token: SeDebugPrivilege 804 asd.scr Token: SeDebugPrivilege 960 asd.scr Token: SeDebugPrivilege 948 asd.scr Token: SeDebugPrivilege 1552 asd.scr Token: SeDebugPrivilege 1988 asd.scr Token: SeDebugPrivilege 700 asd.scr Token: SeDebugPrivilege 2888 asd.scr Token: SeDebugPrivilege 2324 asd.scr Token: SeDebugPrivilege 2476 asd.scr Token: SeDebugPrivilege 1704 asd.scr Token: SeDebugPrivilege 2816 asd.scr Token: SeDebugPrivilege 2224 asd.scr Token: SeDebugPrivilege 2292 asd.scr Token: SeDebugPrivilege 3032 asd.scr Token: SeDebugPrivilege 2824 asd.scr Token: SeDebugPrivilege 2832 asd.scr Token: SeDebugPrivilege 2616 asd.scr Token: SeDebugPrivilege 2504 asd.scr Token: SeDebugPrivilege 2388 asd.scr Token: SeDebugPrivilege 1680 asd.scr Token: SeDebugPrivilege 1708 asd.scr Token: SeDebugPrivilege 1816 asd.scr Token: SeDebugPrivilege 1524 asd.scr Token: SeDebugPrivilege 1656 asd.scr Token: SeDebugPrivilege 1916 asd.scr Token: SeDebugPrivilege 1768 asd.scr Token: SeDebugPrivilege 3028 asd.scr Token: SeDebugPrivilege 1176 asd.scr Token: SeDebugPrivilege 2380 asd.scr Token: SeDebugPrivilege 2020 asd.scr Token: SeDebugPrivilege 1668 asd.scr Token: SeDebugPrivilege 300 asd.scr Token: SeDebugPrivilege 1900 asd.scr Token: SeDebugPrivilege 3068 asd.scr Token: SeDebugPrivilege 2424 asd.scr Token: SeDebugPrivilege 3020 asd.scr Token: SeDebugPrivilege 2100 asd.scr Token: SeDebugPrivilege 2596 asd.scr Token: SeDebugPrivilege 2972 asd.scr Token: SeDebugPrivilege 2976 asd.scr Token: SeDebugPrivilege 748 asd.scr Token: SeDebugPrivilege 1560 asd.scr Token: SeDebugPrivilege 2964 asd.scr Token: SeDebugPrivilege 1436 asd.scr Token: SeDebugPrivilege 2080 asd.scr Token: SeDebugPrivilege 2224 asd.scr -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2688 DllHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2872 2276 ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe 29 PID 2276 wrote to memory of 2872 2276 ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe 29 PID 2276 wrote to memory of 2872 2276 ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe 29 PID 2276 wrote to memory of 2872 2276 ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe 29 PID 2872 wrote to memory of 2820 2872 asd.scr 31 PID 2872 wrote to memory of 2820 2872 asd.scr 31 PID 2872 wrote to memory of 2820 2872 asd.scr 31 PID 2820 wrote to memory of 2796 2820 asd.scr 33 PID 2820 wrote to memory of 2796 2820 asd.scr 33 PID 2820 wrote to memory of 2796 2820 asd.scr 33 PID 2796 wrote to memory of 1860 2796 asd.scr 34 PID 2796 wrote to memory of 1860 2796 asd.scr 34 PID 2796 wrote to memory of 1860 2796 asd.scr 34 PID 1860 wrote to memory of 2228 1860 asd.scr 35 PID 1860 wrote to memory of 2228 1860 asd.scr 35 PID 1860 wrote to memory of 2228 1860 asd.scr 35 PID 2228 wrote to memory of 2864 2228 asd.scr 36 PID 2228 wrote to memory of 2864 2228 asd.scr 36 PID 2228 wrote to memory of 2864 2228 asd.scr 36 PID 2864 wrote to memory of 2156 2864 asd.scr 37 PID 2864 wrote to memory of 2156 2864 asd.scr 37 PID 2864 wrote to memory of 2156 2864 asd.scr 37 PID 2156 wrote to memory of 2508 2156 asd.scr 38 PID 2156 wrote to memory of 2508 2156 asd.scr 38 PID 2156 wrote to memory of 2508 2156 asd.scr 38 PID 2508 wrote to memory of 1876 2508 asd.scr 39 PID 2508 wrote to memory of 1876 2508 asd.scr 39 PID 2508 wrote to memory of 1876 2508 asd.scr 39 PID 1876 wrote to memory of 1120 1876 asd.scr 40 PID 1876 wrote to memory of 1120 1876 asd.scr 40 PID 1876 wrote to memory of 1120 1876 asd.scr 40 PID 1120 wrote to memory of 396 1120 asd.scr 41 PID 1120 wrote to memory of 396 1120 asd.scr 41 PID 1120 wrote to memory of 396 1120 asd.scr 41 PID 396 wrote to memory of 552 396 asd.scr 42 PID 396 wrote to memory of 552 396 asd.scr 42 PID 396 wrote to memory of 552 396 asd.scr 42 PID 552 wrote to memory of 1232 552 asd.scr 43 PID 552 wrote to memory of 1232 552 asd.scr 43 PID 552 wrote to memory of 1232 552 asd.scr 43 PID 1232 wrote to memory of 2204 1232 asd.scr 44 PID 1232 wrote to memory of 2204 1232 asd.scr 44 PID 1232 wrote to memory of 2204 1232 asd.scr 44 PID 2204 wrote to memory of 2912 2204 asd.scr 45 PID 2204 wrote to memory of 2912 2204 asd.scr 45 PID 2204 wrote to memory of 2912 2204 asd.scr 45 PID 2912 wrote to memory of 2084 2912 asd.scr 46 PID 2912 wrote to memory of 2084 2912 asd.scr 46 PID 2912 wrote to memory of 2084 2912 asd.scr 46 PID 2084 wrote to memory of 1092 2084 asd.scr 47 PID 2084 wrote to memory of 1092 2084 asd.scr 47 PID 2084 wrote to memory of 1092 2084 asd.scr 47 PID 1092 wrote to memory of 932 1092 asd.scr 48 PID 1092 wrote to memory of 932 1092 asd.scr 48 PID 1092 wrote to memory of 932 1092 asd.scr 48 PID 932 wrote to memory of 804 932 asd.scr 49 PID 932 wrote to memory of 804 932 asd.scr 49 PID 932 wrote to memory of 804 932 asd.scr 49 PID 804 wrote to memory of 960 804 asd.scr 50 PID 804 wrote to memory of 960 804 asd.scr 50 PID 804 wrote to memory of 960 804 asd.scr 50 PID 960 wrote to memory of 948 960 asd.scr 118 PID 960 wrote to memory of 948 960 asd.scr 118 PID 960 wrote to memory of 948 960 asd.scr 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee51a087d5dc2b078fe32651202d964e_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\asd.scr"C:\Users\Admin\AppData\Local\Temp\asd.scr" /S2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:948 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:700 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr32⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:300 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:748 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr65⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr66⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr67⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr68⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr69⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr70⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr71⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr72⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr73⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr74⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr75⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr76⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr77⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr78⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr79⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr80⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr81⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr82⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr83⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr84⤵PID:792
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr85⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr86⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr87⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr88⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr89⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr90⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr91⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr92⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr93⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr94⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr95⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr96⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr97⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr98⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr99⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr100⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr101⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr102⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr103⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr104⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr105⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr106⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr107⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr108⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr109⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr110⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr111⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr112⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr113⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr114⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr115⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr116⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr117⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr118⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr119⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr120⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr121⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\asd.scrC:\Users\Admin\AppData\Local\Temp\asd.scr122⤵PID:368
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-