Analysis
-
max time kernel
150s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 23:20
Static task
static1
Behavioral task
behavioral1
Sample
63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe
Resource
win10v2004-20220901-en
General
-
Target
63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe
-
Size
152KB
-
MD5
16edef117c7d5ae3332f2c0863b8f3e8
-
SHA1
ebc41889a442dd3ca7ac151ea389a2fe84aaeb45
-
SHA256
63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264
-
SHA512
2d16131a81391aba6f8f44b5f6a80b9638229cd0328da6083a79eb92329698fbcaf09ca90ab6ea6457be497b0f9add7d32610508301c9669b19d206d7dfc8c59
-
SSDEEP
768:T1h1Gpjw3DwVKrJLcdIFN+y3C6mTGep2UZEccJAPfTYolQ7eB8pGIy0O8y1ozz73:TpGTiK8N+yS6mQQSUIXryCSwO+qq
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1408 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1408 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1408 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 1408 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 1408 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4180 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2316 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4452 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 1636 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 3948 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4940 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2412 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4816 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2364 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 672 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2440 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2844 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 1592 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 5116 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4508 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4320 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4124 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4544 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 976 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4944 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4704 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 3448 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 1700 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 5092 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4136 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2520 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2104 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2616 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 5052 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2264 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4036 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2160 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2832 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4608 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 548 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 5084 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 1396 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2668 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 1848 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4760 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 1488 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 3568 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 3724 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 3164 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2584 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2368 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4248 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4544 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 5012 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4712 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 1880 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 3012 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 1892 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 5024 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 3992 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 4128 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe Token: SeDebugPrivilege 2848 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 644 wrote to memory of 1924 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 80 PID 644 wrote to memory of 1924 644 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 80 PID 1924 wrote to memory of 4752 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 81 PID 1924 wrote to memory of 4752 1924 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 81 PID 4752 wrote to memory of 3604 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 82 PID 4752 wrote to memory of 3604 4752 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 82 PID 3604 wrote to memory of 3916 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 83 PID 3604 wrote to memory of 3916 3604 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 83 PID 3916 wrote to memory of 1408 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 84 PID 3916 wrote to memory of 1408 3916 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 84 PID 1408 wrote to memory of 4180 1408 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 85 PID 1408 wrote to memory of 4180 1408 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 85 PID 4180 wrote to memory of 2316 4180 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 86 PID 4180 wrote to memory of 2316 4180 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 86 PID 2316 wrote to memory of 4452 2316 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 87 PID 2316 wrote to memory of 4452 2316 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 87 PID 4452 wrote to memory of 1636 4452 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 88 PID 4452 wrote to memory of 1636 4452 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 88 PID 1636 wrote to memory of 3948 1636 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 89 PID 1636 wrote to memory of 3948 1636 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 89 PID 3948 wrote to memory of 4940 3948 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 90 PID 3948 wrote to memory of 4940 3948 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 90 PID 4940 wrote to memory of 2412 4940 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 163 PID 4940 wrote to memory of 2412 4940 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 163 PID 2412 wrote to memory of 4816 2412 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 92 PID 2412 wrote to memory of 4816 2412 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 92 PID 4816 wrote to memory of 2364 4816 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 93 PID 4816 wrote to memory of 2364 4816 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 93 PID 2364 wrote to memory of 672 2364 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 165 PID 2364 wrote to memory of 672 2364 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 165 PID 672 wrote to memory of 2440 672 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 95 PID 672 wrote to memory of 2440 672 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 95 PID 2440 wrote to memory of 2844 2440 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 96 PID 2440 wrote to memory of 2844 2440 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 96 PID 2844 wrote to memory of 1592 2844 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 97 PID 2844 wrote to memory of 1592 2844 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 97 PID 1592 wrote to memory of 5116 1592 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 98 PID 1592 wrote to memory of 5116 1592 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 98 PID 5116 wrote to memory of 4508 5116 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 99 PID 5116 wrote to memory of 4508 5116 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 99 PID 4508 wrote to memory of 4320 4508 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 100 PID 4508 wrote to memory of 4320 4508 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 100 PID 4320 wrote to memory of 4124 4320 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 101 PID 4320 wrote to memory of 4124 4320 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 101 PID 4124 wrote to memory of 4544 4124 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 138 PID 4124 wrote to memory of 4544 4124 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 138 PID 4544 wrote to memory of 976 4544 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 103 PID 4544 wrote to memory of 976 4544 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 103 PID 976 wrote to memory of 4944 976 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 104 PID 976 wrote to memory of 4944 976 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 104 PID 4944 wrote to memory of 4704 4944 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 105 PID 4944 wrote to memory of 4704 4944 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 105 PID 4704 wrote to memory of 3448 4704 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 106 PID 4704 wrote to memory of 3448 4704 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 106 PID 3448 wrote to memory of 1700 3448 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 107 PID 3448 wrote to memory of 1700 3448 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 107 PID 1700 wrote to memory of 5092 1700 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 292 PID 1700 wrote to memory of 5092 1700 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 292 PID 5092 wrote to memory of 4136 5092 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 109 PID 5092 wrote to memory of 4136 5092 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 109 PID 4136 wrote to memory of 2520 4136 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 110 PID 4136 wrote to memory of 2520 4136 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 110 PID 2520 wrote to memory of 2104 2520 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 111 PID 2520 wrote to memory of 2104 2520 63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe"C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe8⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe11⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe13⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe14⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe15⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe16⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe17⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe18⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe19⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe20⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe22⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe23⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe24⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe25⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe26⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe27⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe28⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe29⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe30⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe31⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe32⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe33⤵
- Suspicious use of AdjustPrivilegeToken
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe34⤵
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe35⤵
- Suspicious use of AdjustPrivilegeToken
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe36⤵
- Suspicious use of AdjustPrivilegeToken
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe37⤵
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe38⤵
- Suspicious use of AdjustPrivilegeToken
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe39⤵
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe40⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe41⤵
- Suspicious use of AdjustPrivilegeToken
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe42⤵
- Suspicious use of AdjustPrivilegeToken
PID:548 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe43⤵
- Suspicious use of AdjustPrivilegeToken
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe44⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe45⤵
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe46⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe47⤵
- Suspicious use of AdjustPrivilegeToken
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe48⤵
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe49⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe50⤵
- Suspicious use of AdjustPrivilegeToken
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe51⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe52⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe53⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe54⤵
- Suspicious use of AdjustPrivilegeToken
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe55⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe56⤵
- Suspicious use of AdjustPrivilegeToken
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe57⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe58⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe59⤵
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe60⤵
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe61⤵
- Suspicious use of AdjustPrivilegeToken
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe62⤵
- Suspicious use of AdjustPrivilegeToken
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe63⤵
- Suspicious use of AdjustPrivilegeToken
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe64⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe65⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe66⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe67⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe68⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe69⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe70⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe71⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe72⤵
- Suspicious use of AdjustPrivilegeToken
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe73⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe74⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe75⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe76⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe77⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe78⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe79⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe80⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe81⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe82⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe83⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe84⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe85⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe86⤵
- Suspicious use of AdjustPrivilegeToken
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe87⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe88⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe89⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe90⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe91⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe92⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe93⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe94⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe95⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe96⤵PID:3188
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe97⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe98⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe99⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe100⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe101⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe102⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe103⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe104⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe105⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe106⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe107⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe108⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe109⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe110⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe111⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe112⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe113⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe114⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe115⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe116⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe117⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe118⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe119⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe120⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe121⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exeC:\Users\Admin\AppData\Local\Temp\63b092f832979f053a1253a986f8f36b28f12378233b506174d4e9170a124264.exe122⤵PID:3768
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-