Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe
Resource
win10v2004-20220812-en
General
-
Target
6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe
-
Size
148KB
-
MD5
0541203ba4f1531c267f2df60d0a7994
-
SHA1
918359784ca7a521fd18d4b8a0df965335a04db1
-
SHA256
6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38
-
SHA512
e09dd3d00a4dcb1f3581c15c937ac5e819c20c5c327b3f5f1bd16b5b78e6d2ee89a05060b5317c139a7b6a48cdb14e0a520b64d500d2b1209528b9795a6fb4d9
-
SSDEEP
768:tWEEpO23DwVKrJLcdIFN+y3C6mTGep2UZEccJAPfTYolQ7eB8pGIy0O8y1ozz7yn:wjUiK8N+yS6mQQSUIXryCSwOy0R
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4264 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4440 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3608 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 532 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1824 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3572 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4696 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 5080 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3156 Process not Found Token: SeDebugPrivilege 4908 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4820 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4388 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4084 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 2372 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 2380 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3452 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4004 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3396 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 5108 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 2008 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 2440 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 2492 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4764 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4844 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1388 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3516 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1020 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3144 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3648 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3640 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4328 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4856 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 744 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4164 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 216 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 5068 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3948 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1780 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1604 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3744 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1708 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3928 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4008 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 5076 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4580 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4444 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1260 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4412 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 2380 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3996 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4324 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3368 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1272 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 640 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1204 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4928 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1600 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1892 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 2792 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1564 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 2832 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 4312 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 1332 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe Token: SeDebugPrivilege 3964 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4264 wrote to memory of 4440 4264 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 80 PID 4264 wrote to memory of 4440 4264 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 80 PID 4440 wrote to memory of 3608 4440 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 81 PID 4440 wrote to memory of 3608 4440 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 81 PID 3608 wrote to memory of 532 3608 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 82 PID 3608 wrote to memory of 532 3608 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 82 PID 532 wrote to memory of 1824 532 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 83 PID 532 wrote to memory of 1824 532 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 83 PID 1824 wrote to memory of 3572 1824 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 84 PID 1824 wrote to memory of 3572 1824 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 84 PID 3572 wrote to memory of 4696 3572 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 85 PID 3572 wrote to memory of 4696 3572 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 85 PID 4696 wrote to memory of 5080 4696 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 86 PID 4696 wrote to memory of 5080 4696 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 86 PID 5080 wrote to memory of 3156 5080 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 87 PID 5080 wrote to memory of 3156 5080 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 87 PID 3156 wrote to memory of 4908 3156 Process not Found 88 PID 3156 wrote to memory of 4908 3156 Process not Found 88 PID 4908 wrote to memory of 4820 4908 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 89 PID 4908 wrote to memory of 4820 4908 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 89 PID 4820 wrote to memory of 4388 4820 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 90 PID 4820 wrote to memory of 4388 4820 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 90 PID 4388 wrote to memory of 4084 4388 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 91 PID 4388 wrote to memory of 4084 4388 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 91 PID 4084 wrote to memory of 2372 4084 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 92 PID 4084 wrote to memory of 2372 4084 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 92 PID 2372 wrote to memory of 2380 2372 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 129 PID 2372 wrote to memory of 2380 2372 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 129 PID 2380 wrote to memory of 3452 2380 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 209 PID 2380 wrote to memory of 3452 2380 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 209 PID 3452 wrote to memory of 4004 3452 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 95 PID 3452 wrote to memory of 4004 3452 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 95 PID 4004 wrote to memory of 3396 4004 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 96 PID 4004 wrote to memory of 3396 4004 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 96 PID 3396 wrote to memory of 5108 3396 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 97 PID 3396 wrote to memory of 5108 3396 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 97 PID 5108 wrote to memory of 2008 5108 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 98 PID 5108 wrote to memory of 2008 5108 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 98 PID 2008 wrote to memory of 2440 2008 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 282 PID 2008 wrote to memory of 2440 2008 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 282 PID 2440 wrote to memory of 2492 2440 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 100 PID 2440 wrote to memory of 2492 2440 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 100 PID 2492 wrote to memory of 4764 2492 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 101 PID 2492 wrote to memory of 4764 2492 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 101 PID 4764 wrote to memory of 4844 4764 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 102 PID 4764 wrote to memory of 4844 4764 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 102 PID 4844 wrote to memory of 1388 4844 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 103 PID 4844 wrote to memory of 1388 4844 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 103 PID 1388 wrote to memory of 3516 1388 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 104 PID 1388 wrote to memory of 3516 1388 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 104 PID 3516 wrote to memory of 1020 3516 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 248 PID 3516 wrote to memory of 1020 3516 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 248 PID 1020 wrote to memory of 3144 1020 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 106 PID 1020 wrote to memory of 3144 1020 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 106 PID 3144 wrote to memory of 3648 3144 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 107 PID 3144 wrote to memory of 3648 3144 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 107 PID 3648 wrote to memory of 3640 3648 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 289 PID 3648 wrote to memory of 3640 3648 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 289 PID 3640 wrote to memory of 4328 3640 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 109 PID 3640 wrote to memory of 4328 3640 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 109 PID 4328 wrote to memory of 4856 4328 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 254 PID 4328 wrote to memory of 4856 4328 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 254 PID 4856 wrote to memory of 744 4856 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 111 PID 4856 wrote to memory of 744 4856 6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe"C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe8⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe9⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe11⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe13⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe14⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe15⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe16⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe17⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe18⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe19⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe20⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe21⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe22⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe23⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe24⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe25⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe26⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe27⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe28⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe29⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe30⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe31⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe32⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe33⤵
- Suspicious use of AdjustPrivilegeToken
PID:744 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe34⤵
- Suspicious use of AdjustPrivilegeToken
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe35⤵
- Suspicious use of AdjustPrivilegeToken
PID:216 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe36⤵
- Suspicious use of AdjustPrivilegeToken
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe37⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe38⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe39⤵
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe40⤵
- Suspicious use of AdjustPrivilegeToken
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe42⤵
- Suspicious use of AdjustPrivilegeToken
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe43⤵
- Suspicious use of AdjustPrivilegeToken
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe44⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe45⤵
- Suspicious use of AdjustPrivilegeToken
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe46⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe47⤵
- Suspicious use of AdjustPrivilegeToken
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe48⤵
- Suspicious use of AdjustPrivilegeToken
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe49⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe50⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe51⤵
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe52⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe53⤵
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe54⤵
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe55⤵
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe56⤵
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe57⤵
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe58⤵
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe59⤵
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe60⤵
- Suspicious use of AdjustPrivilegeToken
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe61⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe62⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe63⤵
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe64⤵
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe65⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe66⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe67⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe68⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe69⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe70⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe71⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe72⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe73⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe74⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe75⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe76⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe77⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe78⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe79⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe80⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe81⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe82⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe83⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe84⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe85⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe86⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe87⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe88⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe89⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe90⤵PID:3128
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe91⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe92⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe93⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe94⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe95⤵
- Suspicious use of AdjustPrivilegeToken
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe96⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe97⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe98⤵PID:204
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe99⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe100⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe101⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe102⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe103⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe104⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe105⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe106⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe107⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe108⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe109⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe110⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe111⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe112⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe113⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe114⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe115⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe116⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe117⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe118⤵PID:3368
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe119⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe120⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe121⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exeC:\Users\Admin\AppData\Local\Temp\6f7b7c71a9d317ef22808e6fa1d2d3791b08802f7987763d33c538d6f7e7fd38.exe122⤵PID:4088
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-