Analysis
-
max time kernel
153s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-10-2022 23:56
Static task
static1
Behavioral task
behavioral1
Sample
1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe
Resource
win10v2004-20220812-en
General
-
Target
1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe
-
Size
87KB
-
MD5
91f5ab7932d6e5f0cb62a91546656050
-
SHA1
5c533769fe07bdf6dafff6d365311f5cb2d14688
-
SHA256
1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596
-
SHA512
4a32f6fb47df7e61e217bd01aeac70be6d3771c5efb411ea93e80f41940fb6229cd076fad8acbfa9ccc8c44e86dda22dd0197290c46c3930cafe643abef9387d
-
SSDEEP
1536:9bK2J/3UNp988Q1NpeECNP+UIvz+EW97qIAPISFcEzSMrkwYYHqb14cU0v5:9u2JsNp988Q5wPpMv0pOhFVzkiKb14S5
Malware Config
Signatures
-
Drops file in Windows directory 28 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1388 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 956 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1436 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 840 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 2040 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1752 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1608 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 872 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 576 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1744 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1572 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1500 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 848 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1416 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1792 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 516 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1612 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 628 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1168 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1340 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 964 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 820 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1112 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1960 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 436 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1736 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1236 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1952 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1224 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1204 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1604 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1912 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1692 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1564 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 996 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1600 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 472 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1740 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 780 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1536 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 316 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 344 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 240 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1792 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1400 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 960 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 320 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1060 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1412 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 436 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1064 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1516 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 364 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1540 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 640 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1768 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 240 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1640 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1400 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1004 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1944 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 1732 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 672 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe Token: SeDebugPrivilege 472 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1388 wrote to memory of 956 1388 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 27 PID 1388 wrote to memory of 956 1388 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 27 PID 1388 wrote to memory of 956 1388 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 27 PID 956 wrote to memory of 1436 956 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 28 PID 956 wrote to memory of 1436 956 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 28 PID 956 wrote to memory of 1436 956 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 28 PID 1436 wrote to memory of 840 1436 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 29 PID 1436 wrote to memory of 840 1436 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 29 PID 1436 wrote to memory of 840 1436 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 29 PID 840 wrote to memory of 2040 840 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 30 PID 840 wrote to memory of 2040 840 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 30 PID 840 wrote to memory of 2040 840 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 30 PID 2040 wrote to memory of 1752 2040 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 31 PID 2040 wrote to memory of 1752 2040 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 31 PID 2040 wrote to memory of 1752 2040 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 31 PID 1752 wrote to memory of 1608 1752 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 32 PID 1752 wrote to memory of 1608 1752 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 32 PID 1752 wrote to memory of 1608 1752 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 32 PID 1608 wrote to memory of 872 1608 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 33 PID 1608 wrote to memory of 872 1608 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 33 PID 1608 wrote to memory of 872 1608 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 33 PID 872 wrote to memory of 576 872 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 34 PID 872 wrote to memory of 576 872 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 34 PID 872 wrote to memory of 576 872 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 34 PID 576 wrote to memory of 1744 576 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 35 PID 576 wrote to memory of 1744 576 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 35 PID 576 wrote to memory of 1744 576 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 35 PID 1744 wrote to memory of 1572 1744 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 36 PID 1744 wrote to memory of 1572 1744 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 36 PID 1744 wrote to memory of 1572 1744 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 36 PID 1572 wrote to memory of 1500 1572 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 37 PID 1572 wrote to memory of 1500 1572 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 37 PID 1572 wrote to memory of 1500 1572 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 37 PID 1500 wrote to memory of 848 1500 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 38 PID 1500 wrote to memory of 848 1500 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 38 PID 1500 wrote to memory of 848 1500 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 38 PID 848 wrote to memory of 1416 848 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 39 PID 848 wrote to memory of 1416 848 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 39 PID 848 wrote to memory of 1416 848 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 39 PID 1416 wrote to memory of 1792 1416 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 40 PID 1416 wrote to memory of 1792 1416 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 40 PID 1416 wrote to memory of 1792 1416 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 40 PID 1792 wrote to memory of 516 1792 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 41 PID 1792 wrote to memory of 516 1792 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 41 PID 1792 wrote to memory of 516 1792 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 41 PID 516 wrote to memory of 1612 516 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 42 PID 516 wrote to memory of 1612 516 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 42 PID 516 wrote to memory of 1612 516 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 42 PID 1612 wrote to memory of 628 1612 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 43 PID 1612 wrote to memory of 628 1612 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 43 PID 1612 wrote to memory of 628 1612 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 43 PID 628 wrote to memory of 1168 628 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 44 PID 628 wrote to memory of 1168 628 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 44 PID 628 wrote to memory of 1168 628 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 44 PID 1168 wrote to memory of 1340 1168 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 45 PID 1168 wrote to memory of 1340 1168 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 45 PID 1168 wrote to memory of 1340 1168 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 45 PID 1340 wrote to memory of 964 1340 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 46 PID 1340 wrote to memory of 964 1340 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 46 PID 1340 wrote to memory of 964 1340 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 46 PID 964 wrote to memory of 820 964 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 47 PID 964 wrote to memory of 820 964 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 47 PID 964 wrote to memory of 820 964 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 47 PID 820 wrote to memory of 1112 820 1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe"C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe3⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe4⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe5⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe6⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe7⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe8⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe9⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe10⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe11⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe12⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe13⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe14⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe15⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe16⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe17⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe18⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe19⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe20⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe22⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe23⤵
- Suspicious use of AdjustPrivilegeToken
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe24⤵
- Suspicious use of AdjustPrivilegeToken
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe25⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe26⤵
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe27⤵
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe28⤵
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe29⤵
- Suspicious use of AdjustPrivilegeToken
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe30⤵
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe31⤵
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe32⤵
- Suspicious use of AdjustPrivilegeToken
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe33⤵
- Suspicious use of AdjustPrivilegeToken
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe34⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe35⤵
- Suspicious use of AdjustPrivilegeToken
PID:996 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe36⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe37⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe38⤵
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe39⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe40⤵
- Suspicious use of AdjustPrivilegeToken
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe41⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe42⤵
- Suspicious use of AdjustPrivilegeToken
PID:344 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe43⤵PID:240
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe44⤵
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe45⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe46⤵
- Suspicious use of AdjustPrivilegeToken
PID:960 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe47⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe48⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe49⤵
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe50⤵
- Suspicious use of AdjustPrivilegeToken
PID:436 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe51⤵
- Suspicious use of AdjustPrivilegeToken
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe52⤵
- Suspicious use of AdjustPrivilegeToken
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe53⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe54⤵
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe55⤵
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe56⤵
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe57⤵
- Suspicious use of AdjustPrivilegeToken
PID:240 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe58⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe59⤵
- Suspicious use of AdjustPrivilegeToken
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe60⤵
- Suspicious use of AdjustPrivilegeToken
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe61⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe62⤵
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe63⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe64⤵
- Suspicious use of AdjustPrivilegeToken
PID:472 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe65⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe66⤵
- Suspicious use of AdjustPrivilegeToken
PID:780 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe67⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe68⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe69⤵
- Suspicious use of AdjustPrivilegeToken
PID:316 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe70⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe71⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe72⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe73⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe74⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe75⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe76⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe77⤵
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe78⤵
- Suspicious use of AdjustPrivilegeToken
PID:672 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe79⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe80⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe81⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe82⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe83⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe84⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe85⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe86⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe87⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe88⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe89⤵
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe90⤵
- Suspicious use of AdjustPrivilegeToken
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe91⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe92⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe93⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe94⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe95⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe96⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe97⤵
- Suspicious use of AdjustPrivilegeToken
PID:364 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe98⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe99⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe100⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe101⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe102⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe103⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe104⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe105⤵
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe106⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe107⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe108⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe109⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe110⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe111⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe112⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe113⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe114⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe115⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe116⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe117⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe118⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe119⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe120⤵
- Suspicious use of AdjustPrivilegeToken
PID:320 -
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe121⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exeC:\Users\Admin\AppData\Local\Temp\1e8d955fcc36c039a680281681cd9c404924a023143c8bbed822b320c03a8596.exe122⤵PID:872
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-