Analysis
-
max time kernel
153s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe
Resource
win7-20220812-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe
-
Size
210KB
-
MD5
686644ac937edbcb5a0b280a544dac04
-
SHA1
1148316674e4071c0b25930557547c35278143aa
-
SHA256
b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1
-
SHA512
dd647d918fd250939c0f451989229fff8eae336311e25966e134785c3265e31bbf195dd7529ec4a3c4320593237f7b0a80ce417a2b55a9cab9895320a459a23a
-
SSDEEP
6144:8PN8/qsOGg1HwR0Msv5pe5t+R3IIhIIW:8e6Xk0dFIIhII
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1884 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1988 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1976 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 964 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 564 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 292 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1944 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 2012 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1260 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1620 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 2032 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1712 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1208 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1268 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1020 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1956 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1648 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 676 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 572 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1948 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1756 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 844 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 560 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1004 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 288 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1712 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1412 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1996 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1020 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1852 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1648 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1644 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1528 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1444 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1664 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1488 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1452 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 688 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1168 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 2008 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1512 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1636 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1852 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1568 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1760 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1844 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 844 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1148 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1080 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1452 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1532 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1076 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 964 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 704 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 636 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1916 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 840 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1660 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 308 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 2032 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1052 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1684 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1520 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe Token: SeDebugPrivilege 1480 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1884 wrote to memory of 1988 1884 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 27 PID 1884 wrote to memory of 1988 1884 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 27 PID 1884 wrote to memory of 1988 1884 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 27 PID 1988 wrote to memory of 1976 1988 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 28 PID 1988 wrote to memory of 1976 1988 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 28 PID 1988 wrote to memory of 1976 1988 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 28 PID 1976 wrote to memory of 964 1976 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 29 PID 1976 wrote to memory of 964 1976 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 29 PID 1976 wrote to memory of 964 1976 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 29 PID 964 wrote to memory of 564 964 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 30 PID 964 wrote to memory of 564 964 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 30 PID 964 wrote to memory of 564 964 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 30 PID 564 wrote to memory of 292 564 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 31 PID 564 wrote to memory of 292 564 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 31 PID 564 wrote to memory of 292 564 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 31 PID 292 wrote to memory of 1944 292 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 32 PID 292 wrote to memory of 1944 292 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 32 PID 292 wrote to memory of 1944 292 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 32 PID 1944 wrote to memory of 2012 1944 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 33 PID 1944 wrote to memory of 2012 1944 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 33 PID 1944 wrote to memory of 2012 1944 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 33 PID 2012 wrote to memory of 1260 2012 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 34 PID 2012 wrote to memory of 1260 2012 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 34 PID 2012 wrote to memory of 1260 2012 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 34 PID 1260 wrote to memory of 1620 1260 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 35 PID 1260 wrote to memory of 1620 1260 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 35 PID 1260 wrote to memory of 1620 1260 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 35 PID 1620 wrote to memory of 2032 1620 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 85 PID 1620 wrote to memory of 2032 1620 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 85 PID 1620 wrote to memory of 2032 1620 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 85 PID 2032 wrote to memory of 1712 2032 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 51 PID 2032 wrote to memory of 1712 2032 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 51 PID 2032 wrote to memory of 1712 2032 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 51 PID 1712 wrote to memory of 1208 1712 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 38 PID 1712 wrote to memory of 1208 1712 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 38 PID 1712 wrote to memory of 1208 1712 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 38 PID 1208 wrote to memory of 1268 1208 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 166 PID 1208 wrote to memory of 1268 1208 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 166 PID 1208 wrote to memory of 1268 1208 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 166 PID 1268 wrote to memory of 1020 1268 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 100 PID 1268 wrote to memory of 1020 1268 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 100 PID 1268 wrote to memory of 1020 1268 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 100 PID 1020 wrote to memory of 1956 1020 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 183 PID 1020 wrote to memory of 1956 1020 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 183 PID 1020 wrote to memory of 1956 1020 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 183 PID 1956 wrote to memory of 1648 1956 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 56 PID 1956 wrote to memory of 1648 1956 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 56 PID 1956 wrote to memory of 1648 1956 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 56 PID 1648 wrote to memory of 676 1648 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 43 PID 1648 wrote to memory of 676 1648 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 43 PID 1648 wrote to memory of 676 1648 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 43 PID 676 wrote to memory of 572 676 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 265 PID 676 wrote to memory of 572 676 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 265 PID 676 wrote to memory of 572 676 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 265 PID 572 wrote to memory of 1948 572 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 344 PID 572 wrote to memory of 1948 572 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 344 PID 572 wrote to memory of 1948 572 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 344 PID 1948 wrote to memory of 1756 1948 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 421 PID 1948 wrote to memory of 1756 1948 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 421 PID 1948 wrote to memory of 1756 1948 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 421 PID 1756 wrote to memory of 844 1756 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 262 PID 1756 wrote to memory of 844 1756 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 262 PID 1756 wrote to memory of 844 1756 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 262 PID 844 wrote to memory of 560 844 b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe 454
Processes
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe"C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe8⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe11⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe12⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe13⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe14⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe15⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe16⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe17⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe18⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe19⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe20⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe21⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe22⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe23⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe24⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe25⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe26⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe27⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe28⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe29⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe30⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe31⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe32⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe33⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe34⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe35⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe36⤵PID:1488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe1⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe2⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe3⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe5⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe6⤵PID:1636
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe1⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe2⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe4⤵PID:1844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe1⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe2⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe3⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe4⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe5⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe6⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe7⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe8⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe9⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe10⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe11⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe12⤵PID:1660
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe1⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe3⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe4⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe5⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe6⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe7⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe8⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe9⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe10⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe11⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe12⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe13⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe14⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe15⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe16⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe17⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe18⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe19⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe20⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe21⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe22⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe23⤵
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe24⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe25⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe26⤵PID:1148
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe27⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe28⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe29⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe30⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe31⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe32⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe33⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe34⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe35⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe36⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe37⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe38⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe39⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe40⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe41⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe42⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe43⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe44⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe45⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe46⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe47⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe48⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe49⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe50⤵
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe51⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe52⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe53⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe54⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe55⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe56⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe57⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe58⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe59⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe60⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe61⤵
- Suspicious use of AdjustPrivilegeToken
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe62⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe63⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe64⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe65⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe66⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe67⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe68⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe69⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe70⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe71⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe72⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe73⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe74⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe75⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe76⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe77⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe78⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe79⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe80⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe81⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe82⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe83⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe84⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe85⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe86⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe87⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe88⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe89⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe90⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe91⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe92⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe93⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe94⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe95⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe96⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe97⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe98⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe99⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe100⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe101⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe102⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe103⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe104⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe105⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe106⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe107⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe108⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe109⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe110⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe111⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe112⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe113⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe114⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe115⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe116⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe117⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe118⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe119⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe120⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe121⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exeC:\Users\Admin\AppData\Local\Temp\b08d2e75e7287e9c5abd90fe9db2ff456abbba7344845cdf361f7fd9e2bd82a1.exe122⤵PID:968
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-