Analysis
-
max time kernel
126s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:53
Behavioral task
behavioral1
Sample
19224d8fe2957721118d14faef5096ce.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19224d8fe2957721118d14faef5096ce.exe
Resource
win10v2004-20231215-en
General
-
Target
19224d8fe2957721118d14faef5096ce.exe
-
Size
68KB
-
MD5
19224d8fe2957721118d14faef5096ce
-
SHA1
2438ee98bc8a07143c6e64c7a1bcb1386878baa3
-
SHA256
fb4aef1c345a246ca40f7629e3a760a69e7a84161995286cda1fd26aa74c3ae9
-
SHA512
867d2e0d94ab71c4d6eb2ec9df1c79ebbca8b6d3db8c0f58cf27bb1ea852c0caed39fe058f0ed194df41354177881ee2d8ae4d9c59b10c3afbcb17a3425833de
-
SSDEEP
1536:p4jqi5axwdaPpyNlDgS54QuZxDuKTVWCrx4LTT61B8:ujpaxGaPpyNV54DyiVd12
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 9 IoCs
resource yara_rule behavioral1/memory/2748-5-0x0000000010000000-0x0000000010017000-memory.dmp modiloader_stage2 behavioral1/memory/2832-13-0x0000000010000000-0x0000000010017000-memory.dmp modiloader_stage2 behavioral1/memory/2760-22-0x0000000010000000-0x0000000010017000-memory.dmp modiloader_stage2 behavioral1/memory/2724-31-0x0000000010000000-0x0000000010017000-memory.dmp modiloader_stage2 behavioral1/memory/2636-40-0x0000000010000000-0x0000000010017000-memory.dmp modiloader_stage2 behavioral1/memory/2540-48-0x0000000010000000-0x0000000010017000-memory.dmp modiloader_stage2 behavioral1/memory/2924-57-0x0000000010000000-0x0000000010017000-memory.dmp modiloader_stage2 behavioral1/memory/1916-66-0x0000000010000000-0x0000000010017000-memory.dmp modiloader_stage2 behavioral1/memory/1644-75-0x0000000010000000-0x0000000010017000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2748 set thread context of 2652 2748 19224d8fe2957721118d14faef5096ce.exe 28 PID 2832 set thread context of 2844 2832 19224d8fe2957721118d14faef5096ce.exe 30 PID 2760 set thread context of 2744 2760 19224d8fe2957721118d14faef5096ce.exe 32 PID 2724 set thread context of 2624 2724 19224d8fe2957721118d14faef5096ce.exe 34 PID 2636 set thread context of 2108 2636 19224d8fe2957721118d14faef5096ce.exe 36 PID 2540 set thread context of 2472 2540 19224d8fe2957721118d14faef5096ce.exe 38 PID 2924 set thread context of 3036 2924 19224d8fe2957721118d14faef5096ce.exe 40 PID 1916 set thread context of 296 1916 19224d8fe2957721118d14faef5096ce.exe 42 PID 1644 set thread context of 796 1644 19224d8fe2957721118d14faef5096ce.exe 45 PID 2808 set thread context of 2820 2808 19224d8fe2957721118d14faef5096ce.exe 48 PID 568 set thread context of 1648 568 19224d8fe2957721118d14faef5096ce.exe 50 PID 1660 set thread context of 2348 1660 19224d8fe2957721118d14faef5096ce.exe 52 PID 1316 set thread context of 2952 1316 19224d8fe2957721118d14faef5096ce.exe 54 PID 2356 set thread context of 624 2356 19224d8fe2957721118d14faef5096ce.exe 56 PID 1960 set thread context of 1088 1960 19224d8fe2957721118d14faef5096ce.exe 58 PID 2056 set thread context of 776 2056 19224d8fe2957721118d14faef5096ce.exe 60 PID 1444 set thread context of 1556 1444 19224d8fe2957721118d14faef5096ce.exe 62 PID 748 set thread context of 928 748 19224d8fe2957721118d14faef5096ce.exe 64 PID 1932 set thread context of 900 1932 19224d8fe2957721118d14faef5096ce.exe 66 PID 2528 set thread context of 2520 2528 19224d8fe2957721118d14faef5096ce.exe 68 PID 3012 set thread context of 2200 3012 19224d8fe2957721118d14faef5096ce.exe 70 PID 1980 set thread context of 1360 1980 19224d8fe2957721118d14faef5096ce.exe 72 PID 1700 set thread context of 1248 1700 19224d8fe2957721118d14faef5096ce.exe 74 PID 2824 set thread context of 2856 2824 19224d8fe2957721118d14faef5096ce.exe 76 PID 2692 set thread context of 2276 2692 19224d8fe2957721118d14faef5096ce.exe 78 PID 2340 set thread context of 2848 2340 19224d8fe2957721118d14faef5096ce.exe 80 PID 2632 set thread context of 2476 2632 19224d8fe2957721118d14faef5096ce.exe 82 PID 2144 set thread context of 2020 2144 19224d8fe2957721118d14faef5096ce.exe 84 PID 2012 set thread context of 2912 2012 19224d8fe2957721118d14faef5096ce.exe 86 PID 2956 set thread context of 2432 2956 19224d8fe2957721118d14faef5096ce.exe 88 PID 1916 set thread context of 2916 1916 19224d8fe2957721118d14faef5096ce.exe 90 PID 768 set thread context of 2612 768 19224d8fe2957721118d14faef5096ce.exe 92 PID 284 set thread context of 1344 284 19224d8fe2957721118d14faef5096ce.exe 94 PID 320 set thread context of 992 320 19224d8fe2957721118d14faef5096ce.exe 96 PID 1660 set thread context of 1280 1660 19224d8fe2957721118d14faef5096ce.exe 98 PID 2100 set thread context of 1244 2100 19224d8fe2957721118d14faef5096ce.exe 100 PID 572 set thread context of 1812 572 19224d8fe2957721118d14faef5096ce.exe 102 PID 1928 set thread context of 1960 1928 19224d8fe2957721118d14faef5096ce.exe 104 PID 2456 set thread context of 2044 2456 19224d8fe2957721118d14faef5096ce.exe 106 PID 1804 set thread context of 1956 1804 19224d8fe2957721118d14faef5096ce.exe 108 PID 1936 set thread context of 1924 1936 19224d8fe2957721118d14faef5096ce.exe 110 PID 1932 set thread context of 1532 1932 19224d8fe2957721118d14faef5096ce.exe 112 PID 2484 set thread context of 2532 2484 19224d8fe2957721118d14faef5096ce.exe 114 PID 1196 set thread context of 3024 1196 19224d8fe2957721118d14faef5096ce.exe 116 PID 1696 set thread context of 2668 1696 19224d8fe2957721118d14faef5096ce.exe 120 PID 2840 set thread context of 2832 2840 19224d8fe2957721118d14faef5096ce.exe 122 PID 2720 set thread context of 2768 2720 19224d8fe2957721118d14faef5096ce.exe 124 PID 2696 set thread context of 2496 2696 19224d8fe2957721118d14faef5096ce.exe 126 PID 2616 set thread context of 2560 2616 19224d8fe2957721118d14faef5096ce.exe 128 PID 2004 set thread context of 2476 2004 19224d8fe2957721118d14faef5096ce.exe 130 PID 2904 set thread context of 1992 2904 19224d8fe2957721118d14faef5096ce.exe 132 PID 3048 set thread context of 2600 3048 19224d8fe2957721118d14faef5096ce.exe 134 PID 1752 set thread context of 876 1752 19224d8fe2957721118d14faef5096ce.exe 136 PID 2312 set thread context of 1772 2312 19224d8fe2957721118d14faef5096ce.exe 138 PID 1524 set thread context of 1904 1524 19224d8fe2957721118d14faef5096ce.exe 140 PID 1944 set thread context of 2784 1944 19224d8fe2957721118d14faef5096ce.exe 142 PID 568 set thread context of 288 568 19224d8fe2957721118d14faef5096ce.exe 144 PID 2252 set thread context of 836 2252 19224d8fe2957721118d14faef5096ce.exe 146 PID 2160 set thread context of 2408 2160 19224d8fe2957721118d14faef5096ce.exe 148 PID 2328 set thread context of 2428 2328 19224d8fe2957721118d14faef5096ce.exe 150 PID 1624 set thread context of 1812 1624 19224d8fe2957721118d14faef5096ce.exe 152 PID 784 set thread context of 3008 784 19224d8fe2957721118d14faef5096ce.exe 154 PID 1444 set thread context of 984 1444 19224d8fe2957721118d14faef5096ce.exe 156 PID 2192 set thread context of 2188 2192 19224d8fe2957721118d14faef5096ce.exe 158 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2652 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2844 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2744 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2624 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2108 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2472 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 3036 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 296 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 796 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2820 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1648 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2348 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2952 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 624 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1088 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 776 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1556 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 928 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 900 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2520 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2200 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1360 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1248 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2856 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2276 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2848 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2476 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2020 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2912 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2432 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2916 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2612 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1344 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 992 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1280 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1244 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1812 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1960 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2044 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1956 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1924 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1532 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2532 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 3024 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1600 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2668 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2832 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2768 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2496 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2560 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2476 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1992 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2600 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 876 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1772 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1904 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2784 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 288 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 836 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2408 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 2428 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 1812 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 3008 19224d8fe2957721118d14faef5096ce.exe Token: SeIncBasePriorityPrivilege 984 19224d8fe2957721118d14faef5096ce.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2652 2748 19224d8fe2957721118d14faef5096ce.exe 28 PID 2748 wrote to memory of 2652 2748 19224d8fe2957721118d14faef5096ce.exe 28 PID 2748 wrote to memory of 2652 2748 19224d8fe2957721118d14faef5096ce.exe 28 PID 2748 wrote to memory of 2652 2748 19224d8fe2957721118d14faef5096ce.exe 28 PID 2748 wrote to memory of 2652 2748 19224d8fe2957721118d14faef5096ce.exe 28 PID 2748 wrote to memory of 2652 2748 19224d8fe2957721118d14faef5096ce.exe 28 PID 2652 wrote to memory of 2832 2652 19224d8fe2957721118d14faef5096ce.exe 29 PID 2652 wrote to memory of 2832 2652 19224d8fe2957721118d14faef5096ce.exe 29 PID 2652 wrote to memory of 2832 2652 19224d8fe2957721118d14faef5096ce.exe 29 PID 2652 wrote to memory of 2832 2652 19224d8fe2957721118d14faef5096ce.exe 29 PID 2832 wrote to memory of 2844 2832 19224d8fe2957721118d14faef5096ce.exe 30 PID 2832 wrote to memory of 2844 2832 19224d8fe2957721118d14faef5096ce.exe 30 PID 2832 wrote to memory of 2844 2832 19224d8fe2957721118d14faef5096ce.exe 30 PID 2832 wrote to memory of 2844 2832 19224d8fe2957721118d14faef5096ce.exe 30 PID 2832 wrote to memory of 2844 2832 19224d8fe2957721118d14faef5096ce.exe 30 PID 2832 wrote to memory of 2844 2832 19224d8fe2957721118d14faef5096ce.exe 30 PID 2844 wrote to memory of 2760 2844 19224d8fe2957721118d14faef5096ce.exe 31 PID 2844 wrote to memory of 2760 2844 19224d8fe2957721118d14faef5096ce.exe 31 PID 2844 wrote to memory of 2760 2844 19224d8fe2957721118d14faef5096ce.exe 31 PID 2844 wrote to memory of 2760 2844 19224d8fe2957721118d14faef5096ce.exe 31 PID 2760 wrote to memory of 2744 2760 19224d8fe2957721118d14faef5096ce.exe 32 PID 2760 wrote to memory of 2744 2760 19224d8fe2957721118d14faef5096ce.exe 32 PID 2760 wrote to memory of 2744 2760 19224d8fe2957721118d14faef5096ce.exe 32 PID 2760 wrote to memory of 2744 2760 19224d8fe2957721118d14faef5096ce.exe 32 PID 2760 wrote to memory of 2744 2760 19224d8fe2957721118d14faef5096ce.exe 32 PID 2760 wrote to memory of 2744 2760 19224d8fe2957721118d14faef5096ce.exe 32 PID 2744 wrote to memory of 2724 2744 19224d8fe2957721118d14faef5096ce.exe 33 PID 2744 wrote to memory of 2724 2744 19224d8fe2957721118d14faef5096ce.exe 33 PID 2744 wrote to memory of 2724 2744 19224d8fe2957721118d14faef5096ce.exe 33 PID 2744 wrote to memory of 2724 2744 19224d8fe2957721118d14faef5096ce.exe 33 PID 2724 wrote to memory of 2624 2724 19224d8fe2957721118d14faef5096ce.exe 34 PID 2724 wrote to memory of 2624 2724 19224d8fe2957721118d14faef5096ce.exe 34 PID 2724 wrote to memory of 2624 2724 19224d8fe2957721118d14faef5096ce.exe 34 PID 2724 wrote to memory of 2624 2724 19224d8fe2957721118d14faef5096ce.exe 34 PID 2724 wrote to memory of 2624 2724 19224d8fe2957721118d14faef5096ce.exe 34 PID 2724 wrote to memory of 2624 2724 19224d8fe2957721118d14faef5096ce.exe 34 PID 2624 wrote to memory of 2636 2624 19224d8fe2957721118d14faef5096ce.exe 35 PID 2624 wrote to memory of 2636 2624 19224d8fe2957721118d14faef5096ce.exe 35 PID 2624 wrote to memory of 2636 2624 19224d8fe2957721118d14faef5096ce.exe 35 PID 2624 wrote to memory of 2636 2624 19224d8fe2957721118d14faef5096ce.exe 35 PID 2636 wrote to memory of 2108 2636 19224d8fe2957721118d14faef5096ce.exe 36 PID 2636 wrote to memory of 2108 2636 19224d8fe2957721118d14faef5096ce.exe 36 PID 2636 wrote to memory of 2108 2636 19224d8fe2957721118d14faef5096ce.exe 36 PID 2636 wrote to memory of 2108 2636 19224d8fe2957721118d14faef5096ce.exe 36 PID 2636 wrote to memory of 2108 2636 19224d8fe2957721118d14faef5096ce.exe 36 PID 2636 wrote to memory of 2108 2636 19224d8fe2957721118d14faef5096ce.exe 36 PID 2108 wrote to memory of 2540 2108 19224d8fe2957721118d14faef5096ce.exe 37 PID 2108 wrote to memory of 2540 2108 19224d8fe2957721118d14faef5096ce.exe 37 PID 2108 wrote to memory of 2540 2108 19224d8fe2957721118d14faef5096ce.exe 37 PID 2108 wrote to memory of 2540 2108 19224d8fe2957721118d14faef5096ce.exe 37 PID 2540 wrote to memory of 2472 2540 19224d8fe2957721118d14faef5096ce.exe 38 PID 2540 wrote to memory of 2472 2540 19224d8fe2957721118d14faef5096ce.exe 38 PID 2540 wrote to memory of 2472 2540 19224d8fe2957721118d14faef5096ce.exe 38 PID 2540 wrote to memory of 2472 2540 19224d8fe2957721118d14faef5096ce.exe 38 PID 2540 wrote to memory of 2472 2540 19224d8fe2957721118d14faef5096ce.exe 38 PID 2540 wrote to memory of 2472 2540 19224d8fe2957721118d14faef5096ce.exe 38 PID 2472 wrote to memory of 2924 2472 19224d8fe2957721118d14faef5096ce.exe 39 PID 2472 wrote to memory of 2924 2472 19224d8fe2957721118d14faef5096ce.exe 39 PID 2472 wrote to memory of 2924 2472 19224d8fe2957721118d14faef5096ce.exe 39 PID 2472 wrote to memory of 2924 2472 19224d8fe2957721118d14faef5096ce.exe 39 PID 2924 wrote to memory of 3036 2924 19224d8fe2957721118d14faef5096ce.exe 40 PID 2924 wrote to memory of 3036 2924 19224d8fe2957721118d14faef5096ce.exe 40 PID 2924 wrote to memory of 3036 2924 19224d8fe2957721118d14faef5096ce.exe 40 PID 2924 wrote to memory of 3036 2924 19224d8fe2957721118d14faef5096ce.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s5⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s7⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe8⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s9⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s13⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe14⤵
- Suspicious use of AdjustPrivilegeToken
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s15⤵
- Suspicious use of SetThreadContext
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe16⤵
- Suspicious use of AdjustPrivilegeToken
PID:296 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s17⤵
- Suspicious use of SetThreadContext
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe18⤵
- Suspicious use of AdjustPrivilegeToken
PID:796 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s19⤵
- Suspicious use of SetThreadContext
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe20⤵
- Suspicious use of AdjustPrivilegeToken
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s21⤵
- Suspicious use of SetThreadContext
PID:568 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe22⤵
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s23⤵
- Suspicious use of SetThreadContext
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe24⤵
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s25⤵
- Suspicious use of SetThreadContext
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe26⤵
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s27⤵
- Suspicious use of SetThreadContext
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe28⤵
- Suspicious use of AdjustPrivilegeToken
PID:624 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s29⤵
- Suspicious use of SetThreadContext
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe30⤵
- Suspicious use of AdjustPrivilegeToken
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s31⤵
- Suspicious use of SetThreadContext
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe32⤵
- Suspicious use of AdjustPrivilegeToken
PID:776 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s33⤵
- Suspicious use of SetThreadContext
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe34⤵
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s35⤵
- Suspicious use of SetThreadContext
PID:748 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe36⤵
- Suspicious use of AdjustPrivilegeToken
PID:928 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s37⤵
- Suspicious use of SetThreadContext
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe38⤵
- Suspicious use of AdjustPrivilegeToken
PID:900 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s39⤵
- Suspicious use of SetThreadContext
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe40⤵
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s41⤵
- Suspicious use of SetThreadContext
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe42⤵
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s43⤵
- Suspicious use of SetThreadContext
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe44⤵
- Suspicious use of AdjustPrivilegeToken
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s45⤵
- Suspicious use of SetThreadContext
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe46⤵
- Suspicious use of AdjustPrivilegeToken
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s47⤵
- Suspicious use of SetThreadContext
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe48⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s49⤵
- Suspicious use of SetThreadContext
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe50⤵
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s51⤵
- Suspicious use of SetThreadContext
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe52⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s53⤵
- Suspicious use of SetThreadContext
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe54⤵
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s55⤵
- Suspicious use of SetThreadContext
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe56⤵
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s57⤵
- Suspicious use of SetThreadContext
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe58⤵
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s59⤵
- Suspicious use of SetThreadContext
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe60⤵
- Suspicious use of AdjustPrivilegeToken
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s61⤵
- Suspicious use of SetThreadContext
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe62⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s63⤵
- Suspicious use of SetThreadContext
PID:768 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe64⤵
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s65⤵
- Suspicious use of SetThreadContext
PID:284 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe66⤵
- Suspicious use of AdjustPrivilegeToken
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s67⤵
- Suspicious use of SetThreadContext
PID:320 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe68⤵
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s69⤵
- Suspicious use of SetThreadContext
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe70⤵
- Suspicious use of AdjustPrivilegeToken
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s71⤵
- Suspicious use of SetThreadContext
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe72⤵
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s73⤵
- Suspicious use of SetThreadContext
PID:572 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe74⤵
- Suspicious use of AdjustPrivilegeToken
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s75⤵
- Suspicious use of SetThreadContext
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe76⤵
- Suspicious use of AdjustPrivilegeToken
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s77⤵
- Suspicious use of SetThreadContext
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe78⤵
- Suspicious use of AdjustPrivilegeToken
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s79⤵
- Suspicious use of SetThreadContext
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe80⤵
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s81⤵
- Suspicious use of SetThreadContext
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe82⤵
- Suspicious use of AdjustPrivilegeToken
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s83⤵
- Suspicious use of SetThreadContext
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe84⤵
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s85⤵
- Suspicious use of SetThreadContext
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe86⤵
- Suspicious use of AdjustPrivilegeToken
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s87⤵
- Suspicious use of SetThreadContext
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe88⤵
- Suspicious use of AdjustPrivilegeToken
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s89⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe90⤵
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s91⤵
- Suspicious use of SetThreadContext
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe92⤵
- Suspicious use of AdjustPrivilegeToken
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s93⤵
- Suspicious use of SetThreadContext
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe94⤵
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s95⤵
- Suspicious use of SetThreadContext
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe96⤵
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s97⤵
- Suspicious use of SetThreadContext
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe98⤵
- Suspicious use of AdjustPrivilegeToken
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s99⤵
- Suspicious use of SetThreadContext
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe100⤵
- Suspicious use of AdjustPrivilegeToken
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s101⤵
- Suspicious use of SetThreadContext
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe102⤵
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s103⤵
- Suspicious use of SetThreadContext
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe104⤵
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s105⤵
- Suspicious use of SetThreadContext
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe106⤵
- Suspicious use of AdjustPrivilegeToken
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s107⤵
- Suspicious use of SetThreadContext
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe108⤵
- Suspicious use of AdjustPrivilegeToken
PID:876 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s109⤵
- Suspicious use of SetThreadContext
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe110⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s111⤵
- Suspicious use of SetThreadContext
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe112⤵
- Suspicious use of AdjustPrivilegeToken
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s113⤵
- Suspicious use of SetThreadContext
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe114⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s115⤵
- Suspicious use of SetThreadContext
PID:568 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe116⤵
- Suspicious use of AdjustPrivilegeToken
PID:288 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s117⤵
- Suspicious use of SetThreadContext
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe118⤵
- Suspicious use of AdjustPrivilegeToken
PID:836 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s119⤵
- Suspicious use of SetThreadContext
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe120⤵
- Suspicious use of AdjustPrivilegeToken
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe"C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe" -s121⤵
- Suspicious use of SetThreadContext
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exeC:\Users\Admin\AppData\Local\Temp\19224d8fe2957721118d14faef5096ce.exe122⤵
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-