Analysis
-
max time kernel
188s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 01:29
Static task
static1
Behavioral task
behavioral1
Sample
af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe
Resource
win10v2004-20220812-en
General
-
Target
af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe
-
Size
92KB
-
MD5
39a99fd8cade75608df521ed09c627b0
-
SHA1
8cf0e9a6ef824df7b04e11d394f757a040afbd2d
-
SHA256
af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad
-
SHA512
434f13b0bcdd490bb9c973574eab6b1efccbee5de95b690f01d1e5ef1ea882089971cedd040bfa12d995ec9281f357ae544e87bf6ee7d48d7cc93a3c16d15a18
-
SSDEEP
1536:AEECv+LztIYgpv6UABPI6xxs4+gE9hQ+dfoD1C5/J48sW+Cm5f6x+esQI:AESLBc6xBA6eVLdfsCXojz6xTI
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1748 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1748 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1748 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1096 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1096 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1096 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1328 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1328 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1328 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1336 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1336 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1336 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1212 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1212 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1212 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1736 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1736 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1736 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1752 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1752 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1752 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1468 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1468 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1468 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1152 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1152 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1152 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1176 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1176 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1176 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 544 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 544 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 544 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 1980 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: 33 1980 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeIncBasePriorityPrivilege 1980 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe Token: SeDebugPrivilege 2016 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1652 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 28 PID 1704 wrote to memory of 1652 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 28 PID 1704 wrote to memory of 1652 1704 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 28 PID 1652 wrote to memory of 952 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 29 PID 1652 wrote to memory of 952 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 29 PID 1652 wrote to memory of 952 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 29 PID 952 wrote to memory of 1460 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 30 PID 952 wrote to memory of 1460 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 30 PID 952 wrote to memory of 1460 952 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 30 PID 1460 wrote to memory of 756 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 31 PID 1460 wrote to memory of 756 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 31 PID 1460 wrote to memory of 756 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 31 PID 756 wrote to memory of 1568 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 32 PID 756 wrote to memory of 1568 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 32 PID 756 wrote to memory of 1568 756 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 32 PID 1568 wrote to memory of 1748 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 33 PID 1568 wrote to memory of 1748 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 33 PID 1568 wrote to memory of 1748 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 33 PID 1748 wrote to memory of 1096 1748 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 34 PID 1748 wrote to memory of 1096 1748 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 34 PID 1748 wrote to memory of 1096 1748 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 34 PID 1096 wrote to memory of 1328 1096 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 35 PID 1096 wrote to memory of 1328 1096 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 35 PID 1096 wrote to memory of 1328 1096 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 35 PID 1328 wrote to memory of 1336 1328 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 36 PID 1328 wrote to memory of 1336 1328 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 36 PID 1328 wrote to memory of 1336 1328 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 36 PID 1336 wrote to memory of 1212 1336 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 37 PID 1336 wrote to memory of 1212 1336 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 37 PID 1336 wrote to memory of 1212 1336 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 37 PID 1212 wrote to memory of 1736 1212 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 38 PID 1212 wrote to memory of 1736 1212 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 38 PID 1212 wrote to memory of 1736 1212 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 38 PID 1736 wrote to memory of 1752 1736 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 39 PID 1736 wrote to memory of 1752 1736 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 39 PID 1736 wrote to memory of 1752 1736 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 39 PID 1752 wrote to memory of 1652 1752 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 40 PID 1752 wrote to memory of 1652 1752 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 40 PID 1752 wrote to memory of 1652 1752 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 40 PID 1652 wrote to memory of 1468 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 41 PID 1652 wrote to memory of 1468 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 41 PID 1652 wrote to memory of 1468 1652 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 41 PID 1468 wrote to memory of 1460 1468 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 42 PID 1468 wrote to memory of 1460 1468 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 42 PID 1468 wrote to memory of 1460 1468 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 42 PID 1460 wrote to memory of 1152 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 43 PID 1460 wrote to memory of 1152 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 43 PID 1460 wrote to memory of 1152 1460 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 43 PID 1152 wrote to memory of 1568 1152 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 44 PID 1152 wrote to memory of 1568 1152 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 44 PID 1152 wrote to memory of 1568 1152 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 44 PID 1568 wrote to memory of 1176 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 45 PID 1568 wrote to memory of 1176 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 45 PID 1568 wrote to memory of 1176 1568 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 45 PID 1176 wrote to memory of 544 1176 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 46 PID 1176 wrote to memory of 544 1176 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 46 PID 1176 wrote to memory of 544 1176 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 46 PID 544 wrote to memory of 1980 544 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 47 PID 544 wrote to memory of 1980 544 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 47 PID 544 wrote to memory of 1980 544 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 47 PID 1980 wrote to memory of 2016 1980 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 143 PID 1980 wrote to memory of 2016 1980 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 143 PID 1980 wrote to memory of 2016 1980 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 143 PID 2016 wrote to memory of 1552 2016 af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe"C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe8⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe11⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe13⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe14⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe15⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe16⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe17⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe18⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe19⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe20⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe22⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe23⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe24⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe25⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe26⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe27⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe28⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe29⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe30⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe31⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe32⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe33⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe34⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe35⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe36⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe37⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe38⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe39⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe40⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe41⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe42⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe43⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe44⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe45⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe46⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe47⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe48⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe49⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe50⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe51⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe52⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe53⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe54⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe55⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe56⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe57⤵PID:744
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe58⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe59⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe60⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe61⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe62⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe63⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe64⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe65⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe66⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe67⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe68⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe69⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe70⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe71⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe72⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe73⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe74⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe75⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe76⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe77⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe78⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe79⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe80⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe81⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe82⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe83⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe84⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe85⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe86⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe87⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe88⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe89⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe90⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe91⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe92⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe93⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe94⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe95⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe96⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe97⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe98⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe99⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe100⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe101⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe102⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe103⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe104⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe105⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe106⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe107⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe108⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe109⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe110⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe111⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe112⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe113⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe114⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe115⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe116⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe117⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe118⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe119⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe120⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe121⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exeC:\Users\Admin\AppData\Local\Temp\af3140da6b9e0752a8d60796d0d2bf3821a0f0430963e919e7a4fc358846e1ad.exe122⤵PID:1460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-