Analysis
-
max time kernel
39s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 14:34
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6fabeaba1241d666562f01d87fedcebc.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
6fabeaba1241d666562f01d87fedcebc.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
6fabeaba1241d666562f01d87fedcebc.exe
-
Size
116KB
-
MD5
6fabeaba1241d666562f01d87fedcebc
-
SHA1
7e0605ca0c8b0a34ae896346ff6a4a7f20c4d4a5
-
SHA256
56932afee9baee62b57b56214a2dc5e828aa57d4a78a9f1daa12e83915176e22
-
SHA512
11b5b834729e6a897a7029feccaf29474b8520b4a670be0458d8e13670856cf053598f4eac8b8605f55fa35c2dd72771b96788d0a0245e84ef9c2fc1e659f3b3
-
SSDEEP
1536:Wjr4136+AK8zHMJUEmnSHabTJawIXZpx4keoarsM35saT1Agn+QzusN2/C:20F6PKmMJ6nIabYwEQkXKbD5RPb
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1220 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2176 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2696 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2932 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2444 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2752 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2672 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1252 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2628 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2724 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2532 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 592 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 984 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1632 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2760 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2896 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2480 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1156 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2500 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1984 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1952 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2112 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2276 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2360 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2936 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2308 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2316 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1148 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 684 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 780 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1740 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 952 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 792 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1164 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2304 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 900 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1132 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1292 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2640 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1704 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1584 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1756 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2784 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2852 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2384 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2612 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2676 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 660 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 984 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1660 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2624 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2268 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2284 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2424 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1856 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2004 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2024 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2012 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2388 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1316 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 844 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 848 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 2140 6fabeaba1241d666562f01d87fedcebc.exe Token: SeDebugPrivilege 1860 6fabeaba1241d666562f01d87fedcebc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2176 1220 6fabeaba1241d666562f01d87fedcebc.exe 28 PID 1220 wrote to memory of 2176 1220 6fabeaba1241d666562f01d87fedcebc.exe 28 PID 1220 wrote to memory of 2176 1220 6fabeaba1241d666562f01d87fedcebc.exe 28 PID 2176 wrote to memory of 2696 2176 6fabeaba1241d666562f01d87fedcebc.exe 29 PID 2176 wrote to memory of 2696 2176 6fabeaba1241d666562f01d87fedcebc.exe 29 PID 2176 wrote to memory of 2696 2176 6fabeaba1241d666562f01d87fedcebc.exe 29 PID 2696 wrote to memory of 2932 2696 6fabeaba1241d666562f01d87fedcebc.exe 30 PID 2696 wrote to memory of 2932 2696 6fabeaba1241d666562f01d87fedcebc.exe 30 PID 2696 wrote to memory of 2932 2696 6fabeaba1241d666562f01d87fedcebc.exe 30 PID 2932 wrote to memory of 2444 2932 6fabeaba1241d666562f01d87fedcebc.exe 31 PID 2932 wrote to memory of 2444 2932 6fabeaba1241d666562f01d87fedcebc.exe 31 PID 2932 wrote to memory of 2444 2932 6fabeaba1241d666562f01d87fedcebc.exe 31 PID 2444 wrote to memory of 2752 2444 6fabeaba1241d666562f01d87fedcebc.exe 32 PID 2444 wrote to memory of 2752 2444 6fabeaba1241d666562f01d87fedcebc.exe 32 PID 2444 wrote to memory of 2752 2444 6fabeaba1241d666562f01d87fedcebc.exe 32 PID 2752 wrote to memory of 2672 2752 6fabeaba1241d666562f01d87fedcebc.exe 33 PID 2752 wrote to memory of 2672 2752 6fabeaba1241d666562f01d87fedcebc.exe 33 PID 2752 wrote to memory of 2672 2752 6fabeaba1241d666562f01d87fedcebc.exe 33 PID 2672 wrote to memory of 1252 2672 6fabeaba1241d666562f01d87fedcebc.exe 209 PID 2672 wrote to memory of 1252 2672 6fabeaba1241d666562f01d87fedcebc.exe 209 PID 2672 wrote to memory of 1252 2672 6fabeaba1241d666562f01d87fedcebc.exe 209 PID 1252 wrote to memory of 2628 1252 6fabeaba1241d666562f01d87fedcebc.exe 35 PID 1252 wrote to memory of 2628 1252 6fabeaba1241d666562f01d87fedcebc.exe 35 PID 1252 wrote to memory of 2628 1252 6fabeaba1241d666562f01d87fedcebc.exe 35 PID 2628 wrote to memory of 2724 2628 6fabeaba1241d666562f01d87fedcebc.exe 37 PID 2628 wrote to memory of 2724 2628 6fabeaba1241d666562f01d87fedcebc.exe 37 PID 2628 wrote to memory of 2724 2628 6fabeaba1241d666562f01d87fedcebc.exe 37 PID 2724 wrote to memory of 2532 2724 6fabeaba1241d666562f01d87fedcebc.exe 36 PID 2724 wrote to memory of 2532 2724 6fabeaba1241d666562f01d87fedcebc.exe 36 PID 2724 wrote to memory of 2532 2724 6fabeaba1241d666562f01d87fedcebc.exe 36 PID 2532 wrote to memory of 592 2532 6fabeaba1241d666562f01d87fedcebc.exe 38 PID 2532 wrote to memory of 592 2532 6fabeaba1241d666562f01d87fedcebc.exe 38 PID 2532 wrote to memory of 592 2532 6fabeaba1241d666562f01d87fedcebc.exe 38 PID 592 wrote to memory of 984 592 6fabeaba1241d666562f01d87fedcebc.exe 143 PID 592 wrote to memory of 984 592 6fabeaba1241d666562f01d87fedcebc.exe 143 PID 592 wrote to memory of 984 592 6fabeaba1241d666562f01d87fedcebc.exe 143 PID 984 wrote to memory of 1632 984 6fabeaba1241d666562f01d87fedcebc.exe 121 PID 984 wrote to memory of 1632 984 6fabeaba1241d666562f01d87fedcebc.exe 121 PID 984 wrote to memory of 1632 984 6fabeaba1241d666562f01d87fedcebc.exe 121 PID 1632 wrote to memory of 2760 1632 6fabeaba1241d666562f01d87fedcebc.exe 288 PID 1632 wrote to memory of 2760 1632 6fabeaba1241d666562f01d87fedcebc.exe 288 PID 1632 wrote to memory of 2760 1632 6fabeaba1241d666562f01d87fedcebc.exe 288 PID 2760 wrote to memory of 2896 2760 6fabeaba1241d666562f01d87fedcebc.exe 40 PID 2760 wrote to memory of 2896 2760 6fabeaba1241d666562f01d87fedcebc.exe 40 PID 2760 wrote to memory of 2896 2760 6fabeaba1241d666562f01d87fedcebc.exe 40 PID 2896 wrote to memory of 2480 2896 6fabeaba1241d666562f01d87fedcebc.exe 109 PID 2896 wrote to memory of 2480 2896 6fabeaba1241d666562f01d87fedcebc.exe 109 PID 2896 wrote to memory of 2480 2896 6fabeaba1241d666562f01d87fedcebc.exe 109 PID 2480 wrote to memory of 1156 2480 6fabeaba1241d666562f01d87fedcebc.exe 42 PID 2480 wrote to memory of 1156 2480 6fabeaba1241d666562f01d87fedcebc.exe 42 PID 2480 wrote to memory of 1156 2480 6fabeaba1241d666562f01d87fedcebc.exe 42 PID 1156 wrote to memory of 2500 1156 6fabeaba1241d666562f01d87fedcebc.exe 41 PID 1156 wrote to memory of 2500 1156 6fabeaba1241d666562f01d87fedcebc.exe 41 PID 1156 wrote to memory of 2500 1156 6fabeaba1241d666562f01d87fedcebc.exe 41 PID 2500 wrote to memory of 1984 2500 6fabeaba1241d666562f01d87fedcebc.exe 107 PID 2500 wrote to memory of 1984 2500 6fabeaba1241d666562f01d87fedcebc.exe 107 PID 2500 wrote to memory of 1984 2500 6fabeaba1241d666562f01d87fedcebc.exe 107 PID 1984 wrote to memory of 1952 1984 6fabeaba1241d666562f01d87fedcebc.exe 278 PID 1984 wrote to memory of 1952 1984 6fabeaba1241d666562f01d87fedcebc.exe 278 PID 1984 wrote to memory of 1952 1984 6fabeaba1241d666562f01d87fedcebc.exe 278 PID 1952 wrote to memory of 2112 1952 6fabeaba1241d666562f01d87fedcebc.exe 94 PID 1952 wrote to memory of 2112 1952 6fabeaba1241d666562f01d87fedcebc.exe 94 PID 1952 wrote to memory of 2112 1952 6fabeaba1241d666562f01d87fedcebc.exe 94 PID 2112 wrote to memory of 2276 2112 6fabeaba1241d666562f01d87fedcebc.exe 301
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe"C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:1728
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:984
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2480
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2316
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:684 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:792 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1164
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:900
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵
- Suspicious use of AdjustPrivilegeToken
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:660 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:2268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵
- Suspicious use of AdjustPrivilegeToken
PID:844 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵
- Suspicious use of AdjustPrivilegeToken
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:2164
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe15⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe16⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe17⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe18⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe19⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe20⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe21⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe22⤵PID:2300
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵
- Suspicious use of AdjustPrivilegeToken
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵PID:2392
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2688
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:2656
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe1⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe2⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe3⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:900 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe6⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe7⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe8⤵PID:516
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe9⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe11⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe12⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe13⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe14⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe15⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe16⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe17⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe18⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe19⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe20⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe21⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe22⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe23⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe24⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe25⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe26⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe27⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe28⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe29⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe30⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe31⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe32⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe33⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe34⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe35⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe36⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe37⤵
- Suspicious use of AdjustPrivilegeToken
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe38⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe39⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe40⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe41⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe42⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe43⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe44⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe45⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe46⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe47⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe48⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe49⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe50⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe51⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe52⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe53⤵PID:2936
-
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe53⤵
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe54⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe55⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe56⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe57⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe58⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe59⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe60⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe61⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe62⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe63⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe64⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe65⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe66⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe67⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe68⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe69⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe70⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe71⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe72⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe73⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe74⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe75⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe76⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe77⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe78⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe79⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe80⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe81⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe82⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe83⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe84⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe85⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe86⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe87⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe88⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe89⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe90⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe91⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe92⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe93⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe94⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe95⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe96⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe97⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe98⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe99⤵
- Suspicious use of AdjustPrivilegeToken
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe100⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe101⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe102⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe103⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe104⤵
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe105⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe106⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe107⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe108⤵
- Suspicious use of AdjustPrivilegeToken
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe109⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe110⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe111⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe112⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe113⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe114⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe115⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe116⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe117⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe118⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe119⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe120⤵
- Suspicious use of AdjustPrivilegeToken
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe121⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exeC:\Users\Admin\AppData\Local\Temp\6fabeaba1241d666562f01d87fedcebc.exe122⤵PID:2492
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-